• Title/Summary/Keyword: external stores

Search Result 98, Processing Time 0.031 seconds

A Study on Aircraft Sensitivity Analysis for C.G Variation of Longitudinal Axis (항공기 세로축 무게중심의 변화에 따른 민감도 해석에 관한 연구)

  • 김종섭
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.6
    • /
    • pp.83-91
    • /
    • 2006
  • An advanced method of Relaxed Static Stability (RSS) is utilized for improving the aerodynamic performance of modern version supersonic jet fighter aircraft. The flight control system utilizes RSS criteria in longitudinal axis to achieve performance enhancements and improve stability. The flight control law of T-50 advanced trainer employs RSS concept in order to improve the aerodynamic performance and guarantee aircraft stability. The longitudinal center of gravity(X-c.g) varies as a function of external stores, fuel state and gear position. Shifts in X-c.g relate directly to longitudinal static margin in aircraft stability. This paper deals the maximum aft X-c.g for critical aircraft loadings and checks static margin limits using sensitivity such as damping, natural frequency, gain and phase margin. And nonlinear analysis was conducted for such as short period input. And also, this paper shows the T-50 aircraft stability based on the result of high angle of attack flight such as upright and inverted departure.

Mobile Eye Tracker and for Use of the Same for Revitalizing Studies on Eye Tracking (아이트래킹 연구 활성화를 위한 모바일 아이트래커의 활용)

  • Seo, Eun-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.10-18
    • /
    • 2016
  • The cognitive ability of humans depends much on the vision. 'Vision' refers to the sense that receives stimulus of light through eyes. 'Gaze' refers to a function of a straight line that connects the central point of the pupil and a viewpoint in the external world, and, in general, it means a straight line that connects an object that is viewed and the eyes. There are active studies on the gaze in various academic circles including 'psychology' and 'cognitive linguistics.' As a method to objectively analyze the gaze, studies on 'eye tracking' are revitalized. A device for studies on eye tracking is an 'eye tracker.' As the fields of the study expand from development and analysis of Web pages to analysis of stores, methods of traffic signal processing, transport equipment, analysis of user experiences on image contents, and marketing analysis, there occurs a greater demand for a glasses eye-tracking than that for a fixed eye tracker. This study identifies the overview and characteristics of eye tracking and presents a way for spreading studies on eye tracking.

Method of estimating the deleted time of applications using Amcache.hve (앰캐시(Amcache.hve) 파일을 활용한 응용 프로그램 삭제시간 추정방법)

  • Kim, Moon-Ho;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.573-583
    • /
    • 2015
  • Amcache.hve file is a registry hive file regarding Program Compatibility Assistant, which stores the executed information of applications. With Amcache.hve file, We can know execution path, first executed time as well as deleted time. Since it checks both the first install time and deleted time, Amcache.hve file can be used to draw up the overall timeline of applications when used with the Prefetch files and Iconcache.db files. Amcache.hve file is also an important artifact to record the traces of anti-forensic programs, portable programs and external storage devices. This paper illustrates the features of Amcache.hve file and methods for utilization in digital forensics such as estimation of deleted time of applications.

Low-Power Buck-Boost Converter for Multi-Input Energy Harvesting Systems (다중입력 에너지 하베스팅 시스템을 위한 저전력 벅-부스트 변환기)

  • Jo, Gil-Je;Kwak, Myoung-Jin;Im, Ju-An;Yu, Chong-Gun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.31-34
    • /
    • 2018
  • This paper presents a low-power buck-boost converter for multi-input energy harvesting systems. The designed circuit combines the energy harvested from three input channels in real time and stores it in a storage capacitor. The structure of the buck-boost converter is simplified by using one external inductor and applying time division technique using an arbiter. In addition, to improve the efficiency of the system, the controller circuits of the converter are designed so that current consumption is minimized. The proposed circuit is designed with $0.35{\mu}m$ CMOS process. Simulation results show that the designed circuit consumes up to 490nA of current when all three input channels are active, and the maximum power efficiency is 92%. The chip area of the designed circuit is $1310{\mu}m{\times}1100{\mu}m$.

  • PDF

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

PAUT-based defect detection method for submarine pressure hulls

  • Jung, Min-jae;Park, Byeong-cheol;Bae, Jeong-hoon;Shin, Sung-chul
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.10 no.2
    • /
    • pp.153-169
    • /
    • 2018
  • A submarine has a pressure hull that can withstand high hydraulic pressure and therefore, requires the use of highly advanced shipbuilding technology. When producing a pressure hull, periodic inspection, repair, and maintenance are conducted to maintain its soundness. Of the maintenance methods, Non-Destructive Testing (NDT) is the most effective, because it does not damage the target but sustains its original form and function while inspecting internal and external defects. The NDT process to detect defects in the welded parts of the submarine is applied through Magnetic particle Testing (MT) to detect surface defects and Ultrasonic Testing (UT) and Radiography Testing (RT) to detect internal defects. In comparison with RT, UT encounters difficulties in distinguishing the types of defects, can yield different results depending on the skills of the inspector, and stores no inspection record. At the same time, the use of RT gives rise to issues related to worker safety due to radiation exposure. RT is also difficult to apply from the perspectives of the manufacturing of the submarine and economic feasibility. Therefore, in this study, the Phased Array Ultrasonic Testing (PAUT) method was applied to propose an inspection method that can address the above disadvantages by designing a probe to enhance the precision of detection of hull defects and the reliability of calculations of defect size.

Anti-aging Healthcare through The System of Life Activity Process in Oriental Medicine (동양의학에서 생명활동과정의 시스템을 통한 항노화 헬스케어)

  • Kim, Meong-Ju
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.513-521
    • /
    • 2021
  • The purpose of this study is to suggest an anti-aging health care plan through a literature analysis of the life activity system of Oriental Medicine. The source of normal maintenace, development, and change of the natural world and the human body's life activity process is the dynamical cooperative equilibrium of the internal Shen-Ji's discipline that creates, grows, changes, makes differences and stores(生长化收藏) and external Qi-Li's process of change from birth to growth, maturity to old age and ending of life(生長壯老已). Therefore, it was analyzed that the natural and human life activity processes are normally maintained, developed, and transformed. As a result, when the natural healing power of Genuine-Qi, the source of the human vitality, rises with the 'breathing massage' that combines a static breathing method which is anti-aging health care method applying the lifting entering movement of Qi and a dynamic abdominal massage, and it harmonizes the Shen-Ji which is the life process system and Qi-Li so that it is believed to be helpful in prolonging a healthy lifespan.

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

Development of the Ice Machine Condition Monitoring System for Remote Diagnosis (원격진단을 위한 제빙기 상태 모니터링 시스템 개발)

  • Kim, Su-hong;Jeong, Jong-mun;Jung, Jin-uk;Jin, Kyo-hong;Hwang, Min-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.230-233
    • /
    • 2016
  • In this paper, we developed the ice machine conditions monitoring system that confirms conditions of the ice machine. The developed system is composed of Communication Board, Server Program, and Web-based User Application. Communication Board which is connected to the ice machine periodically sends various data, such as current, voltage, the refrigerant pressure and temperature, the external temperature and humidity. Server Program stores the data received from Communication Board into database. The manager or the ice machine operator can see the state of the own machine through User Application based on Web. When a symptom is detected on the ice machine, the manager and the operator can checks the current condition of the ice machine by using the data obtained in real time and also prevents the machine troubles by taking proper actions.

  • PDF

A Study on the Safety of Alcohol-based Hand Sanitizers (알코올을 주성분으로 하는 손소독제의 안전성 연구)

  • Sun-Ok Jung;Chun-Yeong Lee;Hoe-Jin Ryu;Hee-Jin Choi;Ji-Young Kim;Chae-Man Choi;In-Sook Hwang;Yong-Seung Shin
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.1
    • /
    • pp.34-39
    • /
    • 2023
  • Objectives: In this study, the safety of alcohol-based hand sanitizers (ABHSs) for quasi-drugs and cosmetics was investigated by analyzing the ethanol content, which is an active ingredient with a sterilizing effect, and methanol, which is toxic. Methods: Forty-one ABHSs were purchased at large supermarkets and online stores. Ethanol quantification was performed by gas chromatography-flame ionization detector, and methanol quantification was performed by headspace-gas chromatography-mass spectrometry. Results: The ethanol content of ABHS in quasi-drugs was 49.6-67.8%, which was suitable for standard manufacturing procedures for external disinfectants, and the ethanol content of ABHS in cosmetics was 9.1-61.3%. The methanol content of ABHS in quasi-drugs ranged from not detected(N.D.)-131.8 ppm, which was suitable for the methanol detection standard of ethanol raw materials in the Korean Pharmacopoeia. The methanol content of ABHS in cosmetics was 23.4-859.7 ppm, which was suitable for the detection limit of methanol in cosmetics. Conclusions: The ethanol and methanol content of ABHS was judged to be safe. When selecting an ABHS to be used for sterilization, it seems necessary to check the content of ethanol, an active ingredient, and use it according to its intended purpose.