• Title/Summary/Keyword: Variety protection

Search Result 424, Processing Time 0.031 seconds

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

Advances in Imaging of Subsurface Archaeology using GPR

  • Goodman Dean;Nishimur Yasushi;Schneider Kent;Piro Salvadore;Hongo Hiromichi;Higashi Noriaki
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.8-21
    • /
    • 2004
  • Examples of GPR survey results at a variety of archaeological sites are presented. Several new analyses which include static corrections for the tilt of the GPR antenna are shown for imaging of burial mounds with significant topography. Example archaeological site plans developed from GPR remote sensing of Roman and Japanese sites are given. The first completely automated GPR survey, using only Global Positioning Satellite navigation to create 3D data volumes, is employed for a site in Louisiana to detect lost graves of the Choctaw Indian Tribe.

  • PDF

A Study on the Mitigation of Market Power using Contingent Transmission Rights in Competitive Electricity Markets (경쟁적 전력시장에서 송전권을 이용한 지역적 시장지배력 완화방안)

  • Park, Jung-Sung;Chung, Kooh-Hyung;Kim, Bal-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.2
    • /
    • pp.268-276
    • /
    • 2007
  • Transmission congestion is one of the key factors to local market power in competitive electricity markets. Financial transmission rights provide the financial protection to their holders by paying back the congestion rent. A variety researches have shown that the existing trading mechanisms on transmission right can exacerbate market power. This paper proposes an alternative methodology in mitigating the local market power using the Contingent Transmission Rights on the locational marginal pricing scheme. The proposed methodology was demonstrated with the Optimal Power Flow.

Behaviour of lightweight composite trusses in fire - A case study

  • Choi, Seng-Kwan;Burgess, Ian;Plank, Roger
    • Steel and Composite Structures
    • /
    • v.7 no.2
    • /
    • pp.105-118
    • /
    • 2007
  • On September $11^{th}$ 2001, the twin towers of the World Trade Center in New York City were struck by two hijacked airplanes. Despite severe local damage induced by the impact, the towers were able to sustain 102 and 56 minutes of the subsequent multi-storey fires before collapsing. The purpose of this study is to contribute to the understanding of the in-fire performance of composite trusses by examining the behaviour of the longer-span type used in the towers. It makes no attempt to be a forensic study of the actual events. Using the finite element package Vulcan, the structural mechanics of typical long-span composite floor trusses are explained, under a variety of scenarios, as the fire temperatures rise. Different boundary conditions, degrees of protection and loading are all covered, the results being presented mainly in the form of graphs of deflection and internal force of members against time.

Hiding Digital Watermark for Increasing Trust in E-Commerce

  • Moon, Ho--Seok;Sohn, Myung--Ho
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.223-226
    • /
    • 2004
  • Several studies have shown that the trust is a significant barrier for realizing the potential of e-commerce. Trust is not only a short-term issue but also the most significant long-term barrier for realizing the potentials of e-commerce. Because digital contents which have been used in e-commerce are easy to be duplicated, the enforcement of digital copyright protection is an important issue. Watermarking is a technique for labeling digital pictures by hiding secret information in the image. In this paper, a discrete wavelet transform(DWT) based technique for embedding digital watermark into image is proposed. The performance of the proposed watermarking is robust to a variety of signal distortions, such as JPEG and image processing operations.

  • PDF

A Study on the Procedure of Fault on Electric Power Systems by Special Fibers (특수섬유에 의한 전력계통의 고장유발 과정 고찰)

  • Rim, One-Kwon;Kim, Seong-Shik;Jung, Dong-Hak
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.667-675
    • /
    • 2009
  • Faults can be generated at electric power systems by variety of both certain and uncertain reasons, which may cause harmful effects on electrical apparatuses under operation and stability of electric power system operations, and may also lead to great confusions and inconveniences to individual livings, public works, industrial activities, services, military affairs, etc.. In some cases, intentional inductions of faults are committed for specific purposes, and it is necessary to understand the procedures of fault by some foreign materials. In this paper, compositions and operations of electric power systems, summaries of electrical fault phenomena and fault protection, and restrictions to power system operation were outlined. And the analogies on the procedure of faults from former papers were introduced, and test results that revealed the validity of those analogies were also introduced.

In Vitro Selection of RNA Aptamer Specific to Salmonella Typhimurium

  • Han, Seung Ryul;Lee, Seong-Wook
    • Journal of Microbiology and Biotechnology
    • /
    • v.23 no.6
    • /
    • pp.878-884
    • /
    • 2013
  • Salmonella is a major foodborne pathogen that causes a variety of human diseases. Development of ligands directly and specifically binding to the Salmonella will be crucial for the rapid detection of, and thus for efficient protection from, the virulent bacteria. In this study, we identified a RNA aptamer-based ligand that can specifically recognize Salmonella Typhimurium through SELEX technology. To this end, we isolated and characterized an RNase-resistant RNA aptamer that bound to the OmpC protein of Salmonella Typhimurium with high specificity and affinity ($K_d$ ~ 20 nM). Of note, the selected aptamer was found to specifically bind to Salmonella Typhimurium, but neither to Gram-positive bacteria (Staphylococcus aureus) nor to other Gram-negative bacteria (Escherichia coli O157:H7). This was evinced by aptamer-immobilized ELISA and aptamer-linked precipitation experiments. This Salmonella species-specific aptamer could be useful as a diagnostic ligand against pathogen-caused foodborne sickness.

Cloud Computing in the Vulnerability Analysis for Personal Information Security (Cloud Computing의 개인 정보 보안을 위한 취약점 분석)

  • Sun, Jae-Hoon;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.77-82
    • /
    • 2010
  • Cloud computing is defined as numerous concepts by research institutions and scholars. However, due to the present business trend in the IT sector, emphasizing on cost and efficiency, cloud computing has been defined as a form of computing which can provide extendable mass storage components in the virtual environment. As a result, security issues have been arising due to the variety of cloud computing services provided by the industries. This paper aims to analyze the weaknesses such as security techniques and inquiries, and personal information protection required for various cloud computing services.

Total Synthesis of Hepatoprotective Isowogonin and a Synthetic Approach to Wogonin (간보호 효과를 나타내는 Isowogonin의 전합성 및 Wogonin 합성을 위한 반응조건 탐색)

  • Kim, Kwang-Sik;Kim, Hak-Sung
    • YAKHAK HOEJI
    • /
    • v.53 no.6
    • /
    • pp.377-381
    • /
    • 2009
  • Isowogonin, 5,8-dihydroxy-7-methoxyflavone, is a flavonoid isolated from the root of Scutellaria baicalensis Georgi, a medicinal plant traditionally used since the ancient time. It was thought to possess a variety of biological activities, such as antioxidation, anti-inflammation and hepatoprotective effect. But a quantity of isowogonin obtained from Scutellaria baicalensis Georgi is not that enough for in vivo test. There have been no appropriate approaches available for a facile synthesis of isowogonin. So we describe a concise and efficient scheme for synthesis of isowogonin from a commercial available 2,4,6-trimethoxyphenol, which includes the Fries rearrangement and selective demethylation as key steps.

Application of Microwave Activation Techniques to the N-Alkenyl Protection of Lactams

  • Kim, Ki-Won;Ahn, Hee-Sook;Lee, Ho-Joon;Song, Suk-Jin;Kim, Chung-Gi;Kwon, Tae-Woo
    • Bulletin of the Korean Chemical Society
    • /
    • v.27 no.2
    • /
    • pp.286-290
    • /
    • 2006
  • Rapid and facile syntheses of N-alkenyl lactam series via condensation between lactams and a variety of aldehydes such as n-propanal, isobutanal, n-butanal, n-hexanal, n-octanal and phenylacetaldehyde were studied under microwave or conventional heating. Various solid catalysts and solvents were examined to maximize the yields of condensation reactions.