• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.034 seconds

Implementation of the Digital Current Control System for an Induction Motor Using FPGA (FPGA를 이용한 유도 전동기의 디지털 전류 제어 시스템 구현)

  • Yang, Oh
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.11
    • /
    • pp.21-30
    • /
    • 1998
  • In this paper, a digital current control system using a FPGA(Field Programmable Gate Array) was implemented, and the system was applied to an induction motor widely used as an industrial driving machine. The FPGA designed by VHDL(VHSIC Hardware Description Language) consists of a PWM(Pulse Width Modulation) generation block, a PWM protection block, a speed measuring block, a watch dog timer block, an interrupt control block, a decoder logic block, a wait control block and digital input and output blocks respectively. Dedicated clock inputs on the FPGA were used for high-speed execution, and an up-down counter and a latch block were designed in parallel, in order that the triangle wave could be operated at 40 MHz clock. When triangle wave is compared with many registers respectively, gate delay occurs from excessive fan-outs. To reduce the delay, two triangle wave registers were implemented in parallel. Amplitude and frequency of the triangle wave, and dead time of PWM could be changed by software. This FPGA was synthesized by pASIC 2SpDE and Synplify-Lite synthesis tool of Quick Logic company. The final simulation for worst cases was successfully performed under a Verilog HDL simulation environment. And the FPGA programmed for an 84 pin PLCC package was applied to digital current control system for 3-phase induction motor. The digital current control system of the 3 phase induction motor was configured using the DSP(TMS320C31-40 MHz), FPGA, A/D converter and Hall CT etc., and experimental results showed the effectiveness of the digital current control system.

  • PDF

A Comparison Study of the Amplification Characteristics of the Seismic Station near Yedang Reservoir using Background Noise, S-wave and Coda wave Energy (배경잡음, S파 및 Coda파 에너지를 이용한 예당저수지 인근부지의 지반증폭 특성에 관한 비교 연구)

  • Wee, Soung-Hoon;Kim, Jun-Kyoung;Yoo, Seong-Hwa;Kyung, Jai-Bok
    • Journal of the Korean earth science society
    • /
    • v.36 no.7
    • /
    • pp.632-642
    • /
    • 2015
  • Seismograms are composed of 3 characteristics, that is, seismic source, attenuation, and site amplification. Among them, site amplification characteristics should be considered significantly to estimate seismic source and attenuation characteristics with more confidence. This purpose of this study is to estimate the site amplification characteristics at each site using horizontal to vertical (H/V) spectral ratio method. This method, originally proposed by Nakamura (1989), has been applied to study the surface waves in microtremor records. It has been recently extended to the shear wave energy of strong motion and applied to the study of site amplification. This study analyzed the H/V spectral ratio of 6 ground motions respectively using observed data from 4 sites nearby in Yedang Reservoir. And then, site amplification effects at each site, from 3 kinds of seismic energies, that is, S waves, Coda waves energy, and background noise were compared each other. The results suggested that 4 sites showed its own characteristics of site amplification property in specific resonance frequency ranges (YDS: ~11 Hz, YDU: ~4 Hz, YDD: ~7 Hz). Comparison of this study to other studies using different analysis method can give us much more information about dynamic amplification of domestic sites characteristics and site classification.

Estimation of Heavy Metal Contamination Level in Masan Bay and Nakdong Estuary Sediments (마산만과 낙동강 하구역 해양 퇴적토의 중금속 오염도 산정 연구)

  • Lee, Junho;Yang, Changeun;Han, Kyongsoo;Lee, Taeyoon
    • Journal of the Korean GEO-environmental Society
    • /
    • v.21 no.3
    • /
    • pp.13-21
    • /
    • 2020
  • The purpose of this study is to evaluate the concentrations of heavy metals in the marine sediments near the Masan bay and the Nakdong estuary, and to investigate the pollution intensity levels of six heavy metals using the existing pollution intensity assessment method. According to the US environmental protection agency, in the case of Cu, the B1 area was classified as severe pollution, while in Ni and Zn, it was classified as moderate pollution in some areas. According to the classification of Igeo, EF and PERF, the A and B regions were polluted by Cd. In particular, in the B1 region, Igeo, EF, and PERF values were the highest in all regions, and were regarded as serious pollution. According to the mean PEL quotient classification, which takes into account the effects of all six heavy metals, there is a 21% probability of toxicity from heavy metals in all regions. The highest concentration of Cd in the B1 region is 1.5 mg/kg. Therefore, the contamination of Cd contained in sediment near Masan Bay is serious, so it is necessary to clarify the cause and take careful approach to future treatment.

A Study on the Gap Analysis between Expectation and Perceptions of Users for IPTV Services based on N-Screen Technology (N-Screen 기술 기반 IPTV서비스에 대한 이용자의 기대와 인지 간의 GAP분석에 관한 연구)

  • Kim, Jun Soo;Kang, Sang Ug;Lim, Gyoo Gun
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.205-222
    • /
    • 2013
  • One of the recent important issues in IT fields is the convergence. It had been simply focused on functional convergence of technologyies. However the convergence in terms of businesses or services also has been made in recent years. The convergence between broadcasting and telecommunication industries can be possible because the e-transformation of broadcasting industry based on digital technology such as multimedia and multi-channel, can be combined with the high speed telecommunication network. It is giving a birth of various convergence services such as IPTV. IPTV is a kind of new service that is combined with the convergence of network, contents, and device. Nevertheless the controversy about the scope and the value of this new convergence service has constantly been raised; for example, what is the difference between IPTV and Internet TV? or what are the benefits that customers can have? This study measured the expectation level and the cognitive level of users before and after using the service and analyzed the gap between the importance and the satisfaction of the service. From this study, we proposed the priority of each function by analysing Importance-Performance Analysis(IPA) method to suggest required functions of IPTV service based on N-Screen technology. This study will identify the gap of awareness level between service providers and end users for the functions of broadcasting and telecommunications convergence service and suggest a solution enhancing user satisfaction.

A Survivability Model of an Intrusion Tolerance System (침입감내시스템의 생존성 모델)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.395-404
    • /
    • 2005
  • There have been large concerns about survivability defined as the capability of a system to perform a mission-critical role, in a timely manner, in the presence of attacks, failures. In particular, One of the most important core technologies required for the design of the ITS(Intrusion Tolerance System) that performs continuously minimal essential services even when the computer system is partially compromised because of intrusions is the survivability one of In included the dependability analysis of a reliability and availability etc. quantitative dependability analysis of the In. In this Paper, we applied self-healing mechanism utilizing two factors of self-healing mechanism (fault model and system response), the core technology of autonomic computing to secure the protection power of the ITS and consisted of a state transition diagram of the ITS composed of a primary server and a backup server. We also defined the survivability, availability, and downtime cost of the ITS, and then performed studies on simulation experiments and two cases of vulnerability attack. Simulation results show that intrusion tolerance capability at the initial state is more important than coping capability at the attack state in terms of the dependability enhancement.

Limitations and Challenges of Game Regulatory Law and Policy in Korea (현행 게임규제정책의 한계와 과제 : 합리적인 규제를 위한 고려사항)

  • Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.149-164
    • /
    • 2014
  • The laws and policies governing Korea's game regulations are becoming more and more topics for debate as we enter the Age of Internet. The nature of the basis for Internet regulations and policies are not rooted in freedom of speech or fundamental values of democracy, but rather focused on solving real-world problems such as protection of the youth. Furthermore, the reality is that regulatory devices for keeping the social order such as regulating gambling are being applied directly to games without consideration on the characteristics of Internet gaming, raising concerns that the expansion of constitutional values and innovative empowerment inherent to the Internet are being weakened. The Geun-Hye Park Administration which succeeded Myung-Bak Lee's Administration, even went so far as to implement the so-called "Shutdown Policy", which prohibits access to Internet games during pre-defined time zones and also instigated a time zone selection rule. In order to curb the gambling nature of Internet games, government-led policies such as the mandatory personal identification and prohibition of player selection or in other words mandatory random player selection are being implemented. These institutions can inhibit freedom of speech, which is the basis of democracy, violate the right of equality through unreasonable discrimination between domestic and foreign service providers, and infringe upon the principles of administrative law, such as laws, due process in policies, and balance in among policies and governmental bodies. Going forward, if Korea's Internet game regulations and polices is to develop in a rational manner, regulatory frameworks will need to be designed to protect the nature of the Internet and its innovative values that enable the realization of constitutional values; for example, the Internet acting as the "catalytic media for freedom of expression as a fundamental human right ", which has already been acknowledged by the Korea's Constitutional Court. At the same time, transparent procedures should be put into place that will allow diverse participation of stakeholders including game service providers, game users, the youth and parents in the legislation and enforcement process of regulatory institutions; policies will also need to be transformed to enable not only regulatory laws but also self-regulation system to be established. And in this process, scientific and empirical analysis on the expected effects before introducing regulations and the results of enforcing regulations after being introduced will need to be strengthened.

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Dynamic Predicate: An Efficient Access Control Mechanism for Hippocratic XML Databases (동적 프레디킷 : 허포크라테스 XML 데이타베이스를 위한 효율적인 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.32 no.5
    • /
    • pp.473-486
    • /
    • 2005
  • The Hippocratic database model recently proposed by Agrawal et at. incorporates privacy protection capabilities into relational databases. The authors have subsequenty proposed the Hippocratic XML daかabase model[4], an extension of the Hippocratic database model for XML databases. In this paper, we propose a new concept that we cail the dynamic predicate(DP) for effective access control in the Hippocratic XML database model. A DP is a novel concept that represents a dynamically constructed rendition that tan be adapted for determining the accessibility of elements during query execution. DPs allow us to effectively integrate authorization checking into the query plan so that unauthorized elements are excluded in the process of query execution. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 219 times over the top-down access control strategy and by up to 499 times over the bottom-up access control strategy. The major contribution of our, paper is enabling effective integration of access control mechanisms with the query plan using the DP under the Hippocratic XML database model.

A Study on the Application Scheme of Fire Identification Considering the Heat Release Rate Characteristics of Inflammable Material (가연물의 발열량 특성을 고려한 화재감식 적용방안에 관한 연구)

  • Kang, Jung-Ki;Oh, Jin-Hee;You, Woo-Jun;Ryou, Hong-Sun;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.28 no.6
    • /
    • pp.52-57
    • /
    • 2014
  • The present study suggests the fundamental method for the prediction time of the fire origin by analyzing the combustion phenomenon of inflammable material in the building structure. The heat release rate (HRR) with time variant is evaluated for the interphone as a inflammable material, which is opted from the fire incidents in the stairwell. the fire dynamics simulator (FDS ver. 6.1) is applied in order to analyze the difference of the smoke inflow time to the downstair from the fire event area with various fire pattern. The results show that the maximum inflow time difference for the case of the interphone made from ABS materials is about 4.93 times with the input conditions of heat flux values and the environment in the FDS for the fixed stairwell which composed of total volume $291.3m^3$, floorage $23.3m^2$ and the height of each floor 2.5 m. This research can be practical information for the application method of simulation scheme with experimental data to the fire Identification.