• Title/Summary/Keyword: Security control system

Search Result 1,741, Processing Time 0.031 seconds

Development of Coolant/Waste-oil Separating and Cooling System with Chip Treatment (칩 처리가 포함된 절삭유/폐유 분리 및 냉각 시스템 개발)

  • Kim, Joong-Seon;Lee, Dong-Seop;Wang, Duck-Hyun
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.16 no.3
    • /
    • pp.16-23
    • /
    • 2017
  • For most machine tools, it is necessary to remove chips and coolant oil because it they will continue to be created during the manufacture of workpieces. Existing products that are in use are installed and used as they reflect depending on the characteristics of each device separately. This study proposes a method to remove the security chip as well as developing an integrated system capable of reducing coolant damage. The Leverage AutoCAD and CATIA program was used for 2D and 3D design, shapes were identified by utilizing the KeyShot program, and the load and displacement analysis of the development apparatus was performed utilizing the ANSYS program. After the prototype underwent sufficient design review, the mixed oil separation device had a complete sensor control program using the LabVIEW program. The chip design process for transferring experiments and experiments on the mixed oil cooling device were developed for performance tests of the product. The final product resulted in an increase in space utilization during commercialization, reduced installation costs, and caused social effects such as pulmonary flow reduction, which, through the economic costs, reduces pollution, resulting in various benefits to the industry, such as deceased errors in the workplace decreases.

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.

Planning System on Conservation and Improvement of Urban Forest - A Case Study in Daejon City, Korea - (도시림의 보호 및 증진관리를 위한 계획제도에 관한 연구 - 대전광역시를 사례로 -)

  • Chung, Soon-Oh
    • Journal of Korean Society of Rural Planning
    • /
    • v.15 no.4
    • /
    • pp.135-146
    • /
    • 2009
  • Urban forest area in South Korea has been increased up to 20.8% of national land as of 2007 by the mergence of municipalities and counties. The rate of park and green tract among urban forest averages out to about 4% nationally but the Capital, Seoul, almost 105% level, not easy to split the two. Park and green has positive management system because of its infrastructure attribute and relevant security obligation standard while urban forest left alone with no such concerns. The most important reason of the negligence comes from institutional inertia although it is possible to be managed functionally by forest laws as like forests of park, landscape, wind and noise protection, and timber product. As a results, it reaches below than 92.64% of the national average level of the timber stockpile especially in the metropolitan areas and loses broad acres rapidly due to the easy conversion system to the urban land usage. Therefore, there must be required some alternative methodologies to conserve and foster it. The paper proposes the four urban forest management types and their control methods. The four types divide into conservation, foster, development, and reservation ones. Also it suggests the five furtherance tract types with the combination among the four earlier types, optionally having one of the six aim climaxes and recommends the standardization of operation design. The total green quantity index of urban forest also suggested by the weight method according to location and DBH class. The case study of the suggested model was executed on the Daejon Metropolitan area and its index calculated as 110.4% level compared with the acreage.

A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard (2.4 GHz AES 무선 키보드 공격 시스템 구축에 관한 연구)

  • Lee, Ji-Woo;Sim, Bo-Yeon;Park, Aesun;Han, Dong-Guk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.233-240
    • /
    • 2017
  • Due to a recent rise in use of a wireless keyboard and mouse, attacks which take user's input information or control user's computer remotely exploiting the physical vulnerability in the wireless communication have been reported. Especially, MouseJack, announced by Bastille Network, attacks 2.4 GHz wireless keyboards and mice through exploiting vulnerability of each manufacturer's receiver. Unlike other attacks that have been revealed, this allows to attack AES wireless keyboards. Nonetheless, there is only a brief overview of the attack but no detailed information on this attacking method. Therefore, in this paper we will analyze the Microsoft 2.4 GHz wireless mouse packet and propose a way to set the packet configuration for HID packet injection simulating a wireless mouse. We also develop a system with 2.4 GHz AES wireless keyboard HID packet injection using the proposed packet and demonstrate via experiment that HID packet injection is possible through the system we built.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

A Study on the Fundamental Comparison of Simulation and Optimization Approaches for Water Resources Systems Planning and Management (수자원시스템의 효율적 운영을 위한 시뮬레이션과 최적화 기법의 원론적 비교 연구)

  • Kong, Jeong-Taek;Kim, Jaehee;Kim, Sheung-Kown
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.4
    • /
    • pp.373-387
    • /
    • 2013
  • For the efficient operation and management of the water resources system, coordinated operation of weirs and reservoirs is required. A simulation based, and an optimization based approaches are available to deal with the operation and management problems. The simulation based approach does not guarantee an optimal solution, and the optimization based approach is not so flexible to consider, complex, nonlinear problems we will face when trying to allocate water to different uses, various demand sectors in a basin. Hence, it is important to develop a model that would compensate for the weak points in both models. We will compare and contrast intrinsic and extrinsic properties of two modeling approaches, addressing issues related to setting system operation and control rules that would lead us to more efficient use of water in the basin. As a result, we propose to use CoWMOM(Coordinated weirs and multi-reservoir operating model), a "simulation based" optimization model for a simple simulation of the past periods, and for the real-time simulation process considering uncertain inflow.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

Response Methods against Acts of Terrorism That Utilize Unmanned Aircraft (무인항공기 테러의 대응방안)

  • OH, Jea-Hwan
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.61-83
    • /
    • 2012
  • Al-Qaeda follower who planned to attacks the Pentagon and the Assembly by unmanned aircraft equipped with explosives was caught in the dictionary in September 2011. In addition, high-performance unmanned aerial vehicles in the United States 'sentinel' of the technology being leaked to Iran in late 2011 was an accident. Terrorist attacks on the forces used unmanned aircraft will be the day the not too distant. The purpose of this research is to provide response plans against acts of terrorism utilizing unmanned aircrafts to prevent large losses of lives such as the terrorist attacks of September 11. Discussing in detail, this research suggests revising and newly implementing the definition and categorization of unmanned aircrafts as well as relevant punishment in current aeronautics regulations as an initial response against acts of terrorism utilizing unmanned aircrafts. This is in order to newly implement and revise current relevant regulations that inadequately address the rapidly developing and changing unmanned aircrafts which will lead to increased sense of alarm for the potential terrorists, and also to introduce a systematic tool to punish those who commit such acts by clearly establishing the grounds for punishment. Also, under the binary operating system over airspace currently implemented globally, it is impossible to identify and control the infiltration of airspace by unmanned aircrafts. Recognizing such limitations, this research suggests a combined operation of airspace for unmanned and manned aircrafts as a second way of response for acts of terrorism utilizing unmanned aircrafts. A systematic integrated operation of airspace will appropriately control unmanned/ manned aircrafts that were not previously reported or otherwise have deviated from navigation routes, and will be able to prevent terrorism attempts utilizing aircrafts beforehand.

  • PDF

The Actual Condition investigation of Residental Environment of Urban Life-Type Housing Regarding Crime Prevention Through Environmental Design -Focused on Five Single Households in studio-type housings in Gwanak-gu, Seoul Urban Life-Type Housing- (도시형생활주택의 범죄예방환경설계 측면에서 본 주거환경 실태조사에 관한 연구 - 서울시 관악구 원룸형 주택 1인가구 5개를 중심으로-)

  • Jung, Yoon-Hye;Lee, You-Mi;Lee, Youn-Jae
    • KIEAE Journal
    • /
    • v.16 no.6
    • /
    • pp.39-50
    • /
    • 2016
  • Purpose: The purpose of this study is to be performed with studio-type housings among urban life-type housings to investigate the physical characteristic and crime-related factors of studios from the viewpoint of the basic principles of crime prevention through environmental design (CPTED). Method: Eight CPTED guidelines available in Korea were reviewed to select 20 planing factors for actual condition investigation. Five single households in studio-type housings in Gwanak-gu, Seoul, were chosen according to the subject screening criteria to perform the actual condition investigation. Results: First, a lighting plan around a building for natural surveillance should consider the building location, relation with the front road, and surrounding facilities. In a building of a piloti structure, the parking lot and the building gate should be arranged in a manner that enables natural surveillance. Second, the shape of the corridors in studio-type housings should be considered to plan the installation of a lighting at the door of each household, the installation of a viewer window at the door of each household, and the arrangement of the elevator. Third, to support access control, an access control system having the function of video and voice communication is recommended to be installed at the building gate. Criteria for the type of security windows and the floors on which security windows should be installed, and the regulations about the CCTV installation inside and outside the building should be prepared. Fourth, to enhance territoriality in parking lots, ground patterns, parking lot gate, and signs may be installed. Fifth, in view of effective utilization and maintenance, lighting facilities should be installed to increase the usability of ground parking lots, and relevant installation criteria should be prepared regarding the type, number, and brightness of the lightings.

Proposal of Performance Evaluation Methodology for Hydropower Reservoirs with Resilience Index (회복탄력성을 고려한 발전용댐의 성능평가 방법론 제안)

  • Kim, Dong Hyun;Yoo, Hyung Ju;Shin, Hong-Joon;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.1
    • /
    • pp.47-56
    • /
    • 2022
  • Recently, water resources and energy policies such as integrated water management and carbon neutrality are changing rapidly. There is an opinion that the value of hydropower reservoirs related to these policies should be re-evaluated. In the past, they have contributed to flood control in addition to electricity generation, such as operating at a limited water level during the flood season, but loss of power generation is inevitable with this operation. Therefore, this study introduced the concept of resilience to the hydropower generation system to minimize the power loss. A framework for evaluating the power generation performance of them was presented by defining the maximization of electricity sales as performance. Based on the current procedure of multiple operation plan, a scenario was established and simulation was performed using HEC-5. As a result of applying to the framework, it was confirmed that the power generation performance according to each scenario was evaluated as an important factor. And it was confirmed that the performance of flood control and water use could also be evaluated.