• Title/Summary/Keyword: laundering

Search Result 195, Processing Time 0.021 seconds

Improvement of the heat transfer ability on the heat transfer printing (열 전사날염의 열전사성 향상에 관한 연구)

  • Lee, Mun-Soo;Song, Kyung-Hun
    • The Journal of Natural Sciences
    • /
    • v.11 no.1
    • /
    • pp.151-157
    • /
    • 1999
  • The study was investigated the improved printing effect of heat transfer ability for the cotton fabric treated with disperse dyes. Some important factors were studied to determine the most optimal conditions such as concentration of dye, treated time and temperature, after treatment and before treatment using swelling agent, and molecular weight of dye. The fastness to laundering and light for heat transfer printing was measured.The optimal conditions of heat transfer printing for cotton fabric treated with disperse dye were concentration of 5% owf, treated temperature of $200^{\circ}C$, treated time of 3 minute. The diffusion of disperse dyes inside cotton fabric was accelerated as a result of swelling agent such as glycerin, ethylene glycol, tetramethylene glycol, propylene glycol using in this study. The effects of heat transfer printing were increased that the increasement of before treatment time for swelling agent, decrease of molecular weight of dye.

  • PDF

The Method of Feature Selection for Anomaly Detection in Bitcoin Network Transaction (비트코인 네트워크 트랜잭션 이상 탐지를 위한 특징 선택 방법)

  • Baek, Ui-Jun;Shin, Mu-Gon;Jee, Se-Hyun;Park, Jee-Tae;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.18-25
    • /
    • 2018
  • Since the development of block-chain technology by Satoshi Nakamoto and Bitcoin pioneered a new cryptocurrency market, a number of scale of cryptocurrency have emerged. There are crimes taking place using the anonymity and vulnerabilities of block-chain technology, and many studies are underway to improve vulnerability and prevent crime. However, they are not enough to detect users who commit crimes. Therefore, it is very important to detect abnormal behavior such as money laundering and stealing cryptocurrency from the network. In this paper, the characteristics of the transactions and user graphs in the Bitcoin network are collected and statistical information is extracted from them and presented as plots on the log scale. Finally, we analyze visualized plots according to the Densification Power Law and Power Law Degree, as a result, present features appropriate for detection of anomalies involving abnormal transactions and abnormal users in the Bitcoin network.

Democratic Deepening and Constitutional Engineering in Thailand (태국 민주주의의 심화와 헌정공학)

  • KIM, Hong Koo
    • The Southeast Asian review
    • /
    • v.23 no.1
    • /
    • pp.45-87
    • /
    • 2013
  • This paper aims to study Thai democratic deepening and the constitutional engineering with the analytical concepts of 'power sharing' and 'accountability' focusing on the 1997 and 2007 Constitution. With regard to power sharing, the 1997 Constitution had the characteristics of majoritarian principle including a two-party system, strengthening of prime minister and the executive's power etc. It enhanced significantly the aspects of accountability compared with the previous constitutions. The institutions such as Constitutional Court, Commission on Election, Administration Court, Commission on Human Right, Ombudsman, Commission on Anti-corruption, and the Measure for Anti-money Laundering were established by the 1997 Constitution. However, such empowered accountability system were often abused by the political power groups in the political process. The 2007 Constitution has the characteristics of consensual principle including a multiparty system, proportional representation system, weakened prime minister's power, balancing of cabinet and parliament's power, pushing ahead with decentralization. However, the consensual principle of the 2007 Constitution came, in part, from the factional interests. It is similar to the 1997 Constitution in terms of accountability system, which enhanced in law but abused often in practice. One of the critical reasons for the failure of the 1997 and 2007 constitutions to consolidate democratic system was the political game played around the so-called network for the monarchy composed by the military, the civilian bureaucracy, Constitutional Court and the privileged classes. The future of the Thai democratic deepening depends on the constitutional engineering in which the factional interests should be excluded, and the rules of power sharing and accountability which traditionally played around the network for the monarchy should be effectively institutionalized.

Optimal washing course for sustainable laundering and care - Focusing on the washing course, detergency, fabric damage and detergent concentration - (지속가능한 의류관리를 위한 최적 세탁코스 연구 - 세탁코스, 세탁성, 섬유손상도, 세제농도를 중심으로 -)

  • Seong Phil Baek;Seeun Park;Myung-Ja Park
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.24 no.4
    • /
    • pp.1-9
    • /
    • 2022
  • The purpose of this research is to improve sustainable clothes care by comparing household washer's standard course and quick course. Detergency at each course was classified by laundry weight, detergent concentration, and soils. Also, fabric damage from each course was compared. Washing experiments were carried out using two types of washing machines and three types of detergents. Using the standard soiled fabrics of EMPA 108 set, detergency was compared by laundry weight, soil, and detergent concentration. Additionally, fabric damage was evaluated using the mechanical action of MA-40. The results of the research were as follows. First, a standard course, having more working time exhibited better detergency than a quick course. However, the detergency deviation under 6kg laundry weight was as low as 9.0%. Second, detergency by the type of soil was more effective in standard course than in a quick course, but hydrophilic protein soils had a small detergency deviation at 7.6%. Moreover, hydrophobic oil, complex, and particulate soils had a higher deviation at 19.7% Third, fabric damage was in proportion to operating time. Fourth, a quick course showed approximately 80% detergency regardless of the type of detergent. in the case of using 50% of the recommended allowance by the detergent manufacturer. In conclusion, reducing the operating washing time and detergent concentration is in accordance with increasing sustainability, in the case of washing with lightly soiled fabrics under 6kg of laundry weight.

Anonymous Electronic Promissory Note System Based on Blockchain (블록체인 기반 익명 전자 어음 시스템)

  • HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.947-960
    • /
    • 2023
  • In Korea, traditional paper promissory notes are currently undergoing a transformation, being gradually replaced by electronic notes. This transformation is being steered under the Korea Financial Telecommunications Institute, a trusted authority. However, existing electronic systems have security vulnerabilities, including the risk of hacking and internal errors within the institute. To this end, we have defined a novel anonymous electronic promissory note system based on blockchain. We have constructed a concrete protocol and conducted security analysis of our protocol. Note that, in our protocol, every note information is committed so that the note remains undisclosed until the point of payment. Once the note information becomes public on the blockchain, it enables the detection of illicit activities, such as money laundering and tax evasion. Furthermore, our protocol incorporates a feature of split endorsement, which is a crucial functionality permitted by the Korean electronic note system. Consequently, our proposed protocol is suitable for practical applications in financial transactions.

Designing a system to defend against RDDoS attacks based on traffic measurement criteria after sending warning alerts to administrators (관리자에게 경고 알림을 보낸 후 트래픽 측정을 기준으로 RDDoS 공격을 방어하는 시스템 설계)

  • Cha Yeansoo;Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.109-118
    • /
    • 2024
  • Recently, a social issue has arisen involving RDDoS attacks following the sending of threatening emails to security administrators of companies and institutions. According to a report published by the Korea Internet & Security Agency and the Ministry of Science and ICT, survey results indicate that DDoS attacks are increasing. However, the top response in the survey highlighted the difficulty in countering DDoS attacks due to issues related to security personnel and costs. In responding to DDoS attacks, administrators typically detect anomalies through traffic monitoring, utilizing security equipment and programs to identify and block attacks. They also respond by employing DDoS mitigation solutions offered by external security firms. However, a challenge arises from the initial failure in early response to DDoS attacks, leading to frequent use of detection and mitigation measures. This issue, compounded by increased costs, poses a problem in effectively countering DDoS attacks. In this paper, we propose a system that creates detection rules, periodically collects traffic using mail detection and IDS, notifies administrators when rules match, and Based on predefined threshold, we use IPS to block traffic or DDoS mitigation. In the absence of DDoS mitigation, the system sends urgent notifications to administrators and suggests that you apply for and use of a cyber shelter or DDoS mitigation. Based on this, the implementation showed that network traffic was reduced from 400 Mbps to 100 Mbps, enabling DDoS response. Additionally, due to the time and expense involved in modifying detection and blocking rules, it is anticipated that future research could address cost-saving through reduced usage of DDoS mitigation by utilizing artificial intelligence for rule creation and modification, or by generating rules in new ways.

Improvement of Hygienic Characteristics of Material for Patients Clothing through Treatment with Chitosan/Nanosilver Mixed Solution (키토산/은나노 혼합용액 처리에 의한 환자복 소재 위생 성능 향상)

  • Bae, Hyun-Sook;Park, Hye-Won;Ryou, Eun-Jeong;Jeong, Kyoung-Mi
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.12
    • /
    • pp.1848-1856
    • /
    • 2008
  • In order to enhance the functionality of a cotton fabric actually used as the clothing material for patients, the fabrics are treated with chitosan/nanosilver mixed solution. The nanosilver has excellent biocompatibility, not causing an environmental pollution as a natural polymer, provides expectation of an additional performance, does not harm human beings, and shows a strong antibacterial activity even in a small amount, and supplements chitosan, which is disadvantaged if used alone for fabric treatment. This study evaluates functional improvement of the clothing material for patients and observes through hygienic characteristics which are the most important function. In antibacterial activity of the fabrics treated with chitosan/nanosilver mixed solution against Staphylococcus aureus, higher ratio of chitosan was observed to achieve better antibacterial activity. In antibacterial activity against Klebsiella pneumoniae, higher ratio of nanosilver was observed to achieve better activity. Regarding laundry durability of antibacterial activity after repeated laundering, activity against Staphylococcus aureus was little reduced, but was greatly lowered against Klebsiella pneumoniae. Deodorization activity was excellent as the mixed ratio of chitosan was increased, and air permeability, moisture permeability and moisture regain were reduced as the mixed ratio of nanosilver was increased.

The Impact of Corporate's Name Change on Cost of Capital (상호변경이 내재자본비용에 미치는 영향)

  • Yu, Soon-Mi
    • Management & Information Systems Review
    • /
    • v.33 no.4
    • /
    • pp.21-38
    • /
    • 2014
  • This study investigates whether and how a firm's cost of equity is influenced by the extent of a firms's name change. Even though corporate name change doesn't give any benefit to investors, it can be a signaling about firm's future valuation. And also, if that signaling has high credibility, it can be decrease information cost and the firm's cost of equity. on the contrary to this, if corporate name change is kind of break with the past and corporate image laundering, it is bad signaling to investors. So it can be increase information risk and the firm's cost of equity. Using yearly cross-sectional regressions of the cost of equity on our proxies for corporate name change, size, beta, market-to-book ratio and other innate risk factor over the 2005-2010, we find that the cost of capital is positively associated with corporate name change after controlling for all other factors. This result implies that corporate name change increase information risk of the business, and thus increase information asymmetries between managers and outside investors with respect to a firm's true future value. This increases information risk, and creates an adverse selection problem, on the part of outside investors. Rational investors therefore demand a premium for bearing this corporate name change-related information risk, which in turn leads us to observe a positive relation between the intensity of corporate name change and the cost of equity.

  • PDF

Research on the limiting factors and countermeasures of the virtual asset industry (가상자산 산업의 한계요인과 대응방안 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2021
  • The purpose of this study is to provide an environment that can support the development of the virtual asset industry. The limiting factors and countermeasures currently possessed by the virtual asset industry were considered in terms of legal and institutional aspects, technical aspects, and market aspects.Small businesses classified as virtual asset operators have difficulty meeting the government's requirements.Accordingly, SMEs with insufficient funds and manpower are withdrawn from the market, creating an environment where only large-scale enterprises with capital power survive.It is difficult to develop desirable technologies and markets in the virtual asset technology industry. In addition, small and medium-sized companies may be expelled from the market, causing damage to current users. Therefore, in terms of legal and institutional aspects, there is a lack of an exact scope of virtual asset providers, and thus it is necessary to respond to the controversial elements of virtual asset providers. In terms of technology, it is necessary to cope with the slowdown of the P2P method, the difficulty in recovering errors, and the absence of operational experts. Therefore, technology standardization and stabilization are required, and efforts must be made to cultivate operational technical personnel who can support them.In terms of the market, it is necessary to prepare measures to protect users of virtual assets and to establish countermeasures for companies operating virtual assets against weak user protection, inadequate application of the AML method, and limitations of taxation. This study is expected to contribute to active utilization support or related policies in the virtual asset industry.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.