• Title/Summary/Keyword: impossible

Search Result 3,702, Processing Time 0.032 seconds

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

Image watermarking technique applying multiple encryption techniques (다중 암호화 기법을 적용한 영상 워터마킹 기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.503-510
    • /
    • 2020
  • In this paper, we proposed an effective technique that greatly improves the security of the watermark by concealing the multiple-encrypted watermark in the LSB of the image pixel. Even if multiple encrypted watermark hidden in the LSBs of an image pixel are extracted, it is impossible to decrypt them, so the security of the watermark is maintained very high. If the watermark is multiple encrypted and hidden in the image using the proposed technique, the visual quality of the watermark-hidden image is very high, making it impossible to distinguish between the original image and the resulting image in which the watermark is hidden. The original watermark data can be completely extracted without loss, according to the procedure of the proposed technique, from the resulting image that the watermark is encrypted and hidden in the original image. The performance of the proposed technique was analyzed mathematically and the superiority of the proposed technique was confirmed through experiments. The proposed technique is an excellent image watermarking technique that greatly improves the security of the watermark hidden in the image compared to the existing technique.

Comparison of Lower Extremity Muscle Activity during the Deep Squat Exercise Using Various Tools

  • Park, Jun Hyeon;Lee, Jong Kyung;Park, Ji Won
    • The Journal of Korean Physical Therapy
    • /
    • v.34 no.2
    • /
    • pp.63-67
    • /
    • 2022
  • Purpose: The purpose of this study was to investigate the effect of assistance tools such as gym balls, wedges, and straps on lower extremity muscle activity and the increase in the range of motion made possible by the use of these tools. The subjects were divided into two groups: a group capable of deep-squatting (PS) and the second finding it impossible or having difficulty in performing such squats (IS). Methods: Twenty-three subjects participated in this study. Surface electromyography was used to measure the muscle activation of the rectus femoris (RF), vastus medialis (VM), and tibialis anterior (TA) muscles during deep squats, normal squats (NS), gym ball squats (GS), wedge squats (WS), and strap squats (SS). A motion analysis system was used to measure the range of motion of the knee joint during each of these exercises. Results: There was a significant difference in the RF muscle activity between the possible squat (PS) and the impossible squat (IS) groups in the GS, and there were significant differences in the RF and TA muscle activity between the groups in the WS. Both the PS group and the IS group showed a significant difference in the TA muscle activity depending on the tool used. There were also significant differences in the range of motion of the knee joints between the intervention methods using NS and those using the tools. Conclusion: In both groups, the muscle activity of the TA muscles was lower when GS, WS, and SS were performed compared to NS. In addition, compared to NS, the range of motion of the knee joint increased when the three tools were used. This study shows that the activity of the RF, VM, and TA muscles decreased and the range of motion of the knee joint increased during deep squats for both the PS and IS groups when tools were used.

Development of virtual reality contents for vocational education Research on Semiconductor production line Clean Room Tour (직업교육을 위한 가상현실 콘텐츠 구현 반도체 생산라인 클린룸 투어 VR 중심으로)

  • Lee, Sun-Min
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.191-197
    • /
    • 2023
  • The purpose of the study was to provide an educational environment for designing and producing virtual reality practice contents that can be used in semiconductor production lines and clean rooms. Through this process, the user can acquire practical knowledge through experiences close to reality, such as experiencing the main semiconductor solar cell manufacturing facilities as well as procedural knowledge before and after entering the clean room.. In particular, it provides users with an immersion experience close to reality by creating an environment for experiential content necessary for semiconductor and solar cell manufacturing processes and clean room entrance procedure experiential content, which is expected to improve education immersion, realism, cost, efficiency, and education satisfaction. Depending on the characteristics of Dangerous, Impossible, Counter-productive etc, immersive content makes learners immersed in the learning content, induces proactive/active learning, and embodies the learning content, resulting in positive results in the field of improving educational effectiveness.

A Basic Study on Relative Liquefaction Failure Risk Assessment of Domestic Small to Medium-Sized Earthfill Dams (국내 중소규모 흙댐의 상대적 액상화 파괴위험도 평가 기초 연구)

  • Park, Tae Hoon;Ha, Ik-soo
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.27 no.3
    • /
    • pp.147-155
    • /
    • 2023
  • This study aims to present a method to evaluate the relative risk of failure due to liquefaction of domestic small to medium-sized earthfill dams with a height of less than 15 m, which has little information on geotechnical properties. Based on the results of previous researches, a series of methods and procedures for estimating the probability of dam failure due to liquefaction, which calculates the probability of liquefaction occurrence of the dam body, the amount of settlement at the dam crest according to the estimation of the residual strength of the dam after liquefaction, the overtopping depth determined from the amount of settlement at the dam crest, and the probability of failure of the dam due to overtopping was explicitly presented. To this end, representative properties essential for estimating the probability of failure due to the liquefaction of small to medium-sized earthfill dams were presented. Since it is almost impossible to directly determine these representative properties for each of the target dams because it is almost impossible to obtain geotechnical property information, they were estimated and determined from the results of field and laboratory tests conducted on existing small to medium-sized earthfill dams in previous researches. The method and procedure presented in this study were applied to 12 earthfill dams on a trial basis, and the liquefaction failure probability was calculated. The analysis of the calculation results confirmed that the representative properties were reasonable and that the overall evaluation procedure and method were effective.

Limitations of Spectrogram Analysis for Smartphone Voice Recording File Forgery Detection (스마트폰 음성 녹음 파일 위변조 검출을 위한 스펙트로그램 분석의 한계점)

  • Sangmin Han;Yeongmin Son;Jae Wan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.545-551
    • /
    • 2023
  • As digital information is readily available to everyone today, the adoption of digital evidence is increasing. However, it is virtually impossible to determine the authenticity of forgery in the case of a voice recording file that has gone through a sophisticated editing process along with the spread of various voice file editing tools. This study aims to prove that forgery, which is difficult to distinguish from the original file, is possible by using insertion, deletion, linking, and synthetic editing technologies in voice recording files. This study presents the difficulty of detecting forgery by encoding a forged voice file with the same extension as the original. In addition, it was shown that forgery detection is impossible if additional transition band deletion and secondary encoding are performed only for experiments in which features occurred. Through this, this study is expected to contribute to the establishment of more stringent evidence admissibility criteria for adopting voice recording files as digital evidence.

Experimental Study on Axial Stratification Process and Its Effects (I) - Stratification in Engine -

  • Ohm, In-Yong;Park, Chan-Jun
    • Journal of Mechanical Science and Technology
    • /
    • v.16 no.11
    • /
    • pp.1457-1469
    • /
    • 2002
  • This paper is the first of several companion papers, which investigate axial stratification process and its effects in an Sl engine. The axial stratification is very sophisticate phenomenon, which results from combination of fuel injection, port and in-cylinder flow and mixing. Because of the inherent unsteady condition in the reciprocating engine, it Is impossible to understand the mechanism through the analytical method. In this paper, the ports were characterized by swir and tumble number in steady flow bench test. After this, lean misfire limit of the engines, which had different port characteristic, were investigated as a function of swirl ratio and injection timing for confirming the existence of stratification. In addition, gas fuel was used for verifying whether this phenomenon depends on bulk air motion of cylinder or on evaporation of fuel. High-speed gas sampling and analysis was also performed to estimate stratification charging effect. The results show that the AFR at the spark plug and LML are very closely related and the AFR is the results of bulk air motion.

A Relative Position Estimation System using Digital Beam Forming and ToA for Automatic Formation Flight of UAV (UAV 자동 편대비행을 위한 디지털 빔포밍 및 ToA 기반의 상대위치 추정 시스템)

  • Kim, Jae-Wan;Yoon, Jun-Yong;Joo, Yang-Ick
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.9
    • /
    • pp.1092-1097
    • /
    • 2014
  • It is difficult to perform automatic formation flight of UAV (Unmanned Aerial vehicle) when GPS (Global Positionig System) is out of order or has a system error, since the relative position estimation in the flight group is impossible in that case. In this paper, we design a relative localization system for the automatic formation flight of UAV. For this purpose, we adopt digital beam forming (DBF) to estimate the angle with the central controller of the flight group and Particle Filtering scheme to compensate the estimation error of ToA (time of arrival) method. Computer simulation results present a proper distance between the central controller and a following unit to maintain the automatic formation flight.

Development of Design Program for ON/OFF Type Solenoid Actuator (개폐식 솔fp노이드 액츄에이터용 설계 프로그램 개발)

  • Sung, Baek-Ju;Lee, Eun-Woong;Kim, Hyoung-Eui
    • Proceedings of the KIEE Conference
    • /
    • 2002.07b
    • /
    • pp.929-931
    • /
    • 2002
  • For design of On/Off type solenoid actuator, designer must have the experimental knowledge as well as general electromagnetic formulas to design object. It is possible for theoretical knowledge to do the out-line design, but it is impossible to optimal design without experimental knowledge which only can achieve through many repeated experiments. In addition, in present On/Off type solenoid actuator field, smaller, lightening, lower consumption power, high response time are effected as the most important design factor. So, experimental knowledge is more needed for optimal design of solenoid actuator. In this study, we developed a design program composed electromagnetic theories and experimental parameter values for inexperienced designers. And we proved the propriety of this program by experiments.

  • PDF