• Title/Summary/Keyword: lock

Search Result 1,471, Processing Time 0.03 seconds

A proposal of Circular Lock Pattern Method on Smart phone (원형 스마트폰 잠금 패턴 방식 제안)

  • Im, Ji-woo;Lee, Seung-jay;Jang, Won-jun;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1471-1477
    • /
    • 2019
  • Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users' smart phones don't support biometric security. The most convenient security method for devices that don't support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It's expected to solve vulnerability.

Remote Control System for the Door Lock by the Unified Modem with the Wireless and Power Line Modem (전력선/무선 통합 모뎀을 이용한 Door Lock의 원격 제어 시스템)

  • Park, Chong-Youn;Lee, Hu-Chan;Choi, Won-Ho
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.189-193
    • /
    • 2005
  • In this paper we proposed the remote control system for the door lock by the unified modem with the wireless and the power line modem. We developed the management system program between the door-lock system and the proposed unified modem. The infrared communication system was used between the Door-Lock system and the power line modem. With the unified developed modem and the Door-Lock system, it is possible to control remotely the developed system in the internet service area.

  • PDF

A NUMERICAL STUDY ON THE ROLL LOCK-IN OF A CANARD-CONTROLLED MISSILE WITH FREELY SPINNING TAILFINS (자유회전 테일핀을 갖는 미사일에 대한 Roll Lock-in 현상의 수치적 연구)

  • Yang, Y.R.;Kim, M.S.;Myong, R.S.;Cho, T.H.
    • Journal of computational fluids engineering
    • /
    • v.14 no.4
    • /
    • pp.48-55
    • /
    • 2009
  • In this study, roll lock-in phenomena of freely spinning tailfins were investigated by a CFD code. To analyze a motion of freely spinning tailfins, this research use a Chimera method, an Euler code and a 6 degrees of freedom analysis. The numerical results of aerodynamic characteristics and roll rates of a canard-controlled missile with freely spinning tailfins show a good agreement with wind tunnel test results. Using the roll rates calculation result of freely spinning tailfins, roll lock-in phenomena is confirmed. Roll lock-in phenomena and Roll lock-in states can be predicted through effects of the induced vortex of the canards control and the analysis of the rolling moments of tailfins due to the bank angle.

A study on the second edition of Koryo Dae-Jang-Mock-Lock (고려재조대장목록고)

  • Jeong Pil-mo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.17
    • /
    • pp.11-47
    • /
    • 1989
  • This study intends to examine the background and the procedure of the carving of the tablets of the second edition of Dae-Jang-Mock­Lock(재조대장목록). the time and the route of the moving of the tablets. into Haein-sa, and the contents and the system of it. This study is mainly based on the second edition of Dae-Jang-Mock-Lock. But the other closely related materials such as restored first. edition of the Dae- Jang-Mock-Lock, Koryo Sin-Jo-Dae-Jang-Byeol-Lock (고려신조대장교정별록). Kae-Won-Seok-Kyo-Lock (개원석교록). Sok-Kae­Won-Seok-Kyo-Lock (속개원석교록). Jeong-Won-Sin-Jeong-Seok-Kyo­Lock(정원신정석교록), Sok-Jeong-Won-Seok-Kyo-Lock(속정원석교록), Dea-Jung-Sang-Bu-Beob-Bo-Lock(대중상부법보록), and Kyeong-Woo-Sin-Su-Beob-Bo-Lock(경우신수법보록), are also analysed and closely examined. The results of this study can be summarized as follows: 1. The second edition of Tripitaka Koreana(고려대장경) was carved for the purpose of defending the country from Mongolia with the power of Buddhism, after the tablets of the first edition in Buin-sa(부이사) was destroyed by fire. 2. In 1236. Dae-Jang-Do-Gam(대장도감) was established, and the preparation for the recarving of the tablets such as comparison between the content, of the first edition of Tripitalk Koreana, Gal-Bo-Chik-Pan-Dae­Jang-Kyeong and Kitan Dae- Jang-Kyeong, transcription of the original copy and the preparation of the wood, etc. was started. 3. In 1237 after the announcement of Dae-Jang-Gyeong-Gak-Pan-Gun­Sin-Gi-Go-Mun(대장경핵판군신석고문), the carving was started on a full scale. And seven years later (1243), Bun-Sa-Dae-Jang-Do-Gam(분사대장도감) was established in the area of the South to expand and hasten the work. And a large number of the tablets were carved in there. 4. It took 16 years to carve the main text and the supplements of the second edition of Tripitaka Koreana, the main text being carved from 1237 to 1248 and the supplement from 1244 to 1251. 5. It can be supposed that the tablets of the second edition of Tripitaka Koreana, stored in Seon-Won-Sa(선원사), Kang-Wha(강화), for about 140 years, was moved to Ji-Cheon-Sa(지천사), Yong-San(용산), and to Hae-In-Sa(해인사) again, through the west and the south sea and Jang-Gyeong-Po(장경포), Go-Ryeong(고령), in the autumn of the same year. 6. The second edition of Tripitaka Koreana was carved mainly based on the first edition, comparing with Gae-Bo-Chik-Pan-Dae-Jang-Kyeong(개보판대장경) and Kitan Dae-Jang-Kyeong(계단대장경). And the second edition of Dae-Jang-Mock-Lock also compiled mainly based on the first edition with the reference to Kae-Won-Seok-Kyo-Lock and Sok-Jeong-Won-Seok-Kyo-Lock. 7. Comparing with the first edition of Dae-Jang-Mock-Lock, in the second edition 7 items of 9 volumes of Kitan text such as Weol-Deung­Sam-Mae-Gyeong-Ron(월증삼매경론) are added and 3 items of 60 volumes such as Dae-Jong-Ji-Hyeon-Mun-Ron(대종지현문논) are substituted into others from Cheon chest(천함) to Kaeng chest(경함), and 92 items of 601 volumes such as Beob-Won-Ju-Rim-Jeon(법원주임전) are added after Kaeng chest. And 4 items of 50 volumes such as Yuk-Ja-Sin-Ju-Wang-Kyeong(육자신주왕경) are ommitted in the second edition. 8. Comparing with Kae-Won-Seok-Kyo-Lock, Cheon chest to Young chest (영함) of the second edition is compiled according to Ib-Jang-Lock(입장록) of Kae-Won-Seok-Kyo-Lock. But 15 items of 43 vol­umes such as Bul-Seol-Ban-Ju-Sam-Mae-Kyeong(불설반주삼매경) are ;added and 7 items of 35 volumes such as Dae-Bang-Deung-Dae-Jib-Il­Jang-Kyeong(대방등대집일장경) are ommitted. 9. Comparing with Sok-Jeong-Won-Seok-Kyo-Lock, 3 items of the 47 volumes (or 49 volumes) are ommitted and 4 items of 96 volumes are ;added in Caek chest(책함) to Mil chest(밀함) of the second edition. But the items are arranged in the same order. 10. Comparing with Dae- Jung-Sang-Bo-Beob-Bo-Lock, the arrangement of the second edition is entirely different from it. But 170 items of 329 volumes are also included in Doo chest(두함) to Kyeong chest(경함) of the second edition, and 53 items of 125 volumes in Jun chest(존함) to Jeong chest(정함). And 10 items of 108 volumes in the last part of Dae-Jung-Sang-Bo-Beob-Bo-Lock are ommitted and 3 items of 131 volumes such as Beob-Won-Ju-Rim-Jeon(법원주임전) are added in the second edition. 11. Comparing with Kyeong-Woo-Sin-Su-Beob-Bo-Lock, all of the items (21 items of 161 volumes) are included in the second edition without ;any classificatory system. And 22 items of 172 volumes in the Seong­Hyeon-Jib-Jeon(성현집전) part such as Myo-Gak-Bi-Cheon(묘각비전) are ommitted. 12. The last part of the second edition, Joo chest(주함) to Dong chest (동함), includes 14 items of 237 volumes. But these items cannot be found in any other former Buddhist catalog. So it might be supposed as the Kitan texts. 13. Besides including almost all items in Kae-Won-Seok-Kyo-Lock and all items in Sok-Jeong-Won-Seok-Kyo-Lock, Dae-Jung-Sang-Bo­Beob-Bo-Lock, and Kyeong-Woo-Sin-Su-Beob-Bo-Lock, the second edition of Dae-Jang-Mock-Lock includes more items, at least 20 items of about 300 volumes of Kitan Tripitaka and 15 items of 43 volumes of traditional Korean Tripitake that cannot be found any others. Therefore, Tripitaka Koreana can be said as a comprehensive Tripitaka covering all items of Tripitakas translated in Chinese character.

  • PDF

Adaptive Lock Escalation in Database Management Systems (데이타베이스 관리 시스템에서의 적응형 로크 상승)

  • Chang, Ji-Woong;Lee, Young-Koo;Whang, Kyu-Young;Yang, Jae-Heon
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.742-757
    • /
    • 2001
  • Since database management systems(DBMSS) have limited lock resources, transactions requesting locks beyond the limit mutt be aborted. In the worst carte, if such transactions are aborted repeatedly, the DBMS can become paralyzed, i.e., transaction execute but cannot commit. Lock escalation is considered a solution to this problem. However, existing lock escalation methods do not provide a complete solution. In this paper, we prognose a new lock escalation method, adaptive lock escalation, that selves most of the problems. First, we propose a general model for lock escalation and present the concept of the unescalatable look, which is the major cause making the transactions to abort. Second, we propose the notions of semi lock escalation, lock blocking, and selective relief as the mechanisms to control the number of unescalatable locks. We then propose the adaptive lock escalation method using these notions. Adaptive lock escalation reduces needless aborts and guarantees that the DBMS is not paralyzed under excessive lock requests. It also allows graceful degradation of performance under those circumstances. Third, through extensive simulation, we show that adaptive lock escalation outperforms existing lock escalation methods. The results show that, compared to the existing methods, adaptive lock escalation reduces the number of aborts and the average response time, and increases the throughput to a great extent. Especially, it is shown that the number of concurrent transactions can be increased more than 16 ~256 fold. The contribution of this paper is significant in that it has formally analysed the role of lock escalation in lock resource management and identified the detailed underlying mechanisms. Existing lock escalation methods rely on users or system administrator to handle the problems of excessive lock requests. In contrast, adaptive lock escalation releases the users of this responsibility by providing graceful degradation and preventing system paralysis through automatic control of unescalatable locks Thus adaptive lock escalation can contribute to developing self-tuning: DBMSS that draw a lot of attention these days.

  • PDF

Analysis on Current Limiting Characteristics of a Fault-lock Type SFCL Applied into a Simulated Power System (모의전력계통에 적용된 자속구속형 초전도 전류제한기의 전류제한 특성 분석)

  • Han, Tae-Hee;Lim, Sung-Hun
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.24 no.2
    • /
    • pp.141-146
    • /
    • 2011
  • When the current of the superconducting element exceeds its critical current by the fault occurrence, the quench of the high-$T_C$ superconducting fault current limiter (HTSC) comprising the flux-lock type superconducting fault current limiter (SFCL) occurs. Simultaneously, the magnetic flux in the iron core induces the voltage in each coil, which contributes to limit the fault current. In this paper, the fault current limiting characteristics of the flux-lock type SFCL as well as the load voltage sag suppressing characteristics according to the flux-lock type SFCL's winding direction were investigated. To confirm the fault current limiting and the voltage sag suppressing characteristics of the this SFCL, the short-circuit tests for the simulated power system with the flux-lock type SFCL were carried out. The flux-lock type SFCL designed with the additive polarity winding was shown to perform more effective fault current limiting and load voltage sag suppressing operations through the fast quench occurrence right after the fault occurs and the fast recovery operation after the fault removes than the flux-lock type SFCL designed with the subtractive polarity winding.

Direct Numerical Simulation of the Flow Past an Oscillating Circular Cylinder (진동하는 원주주위 유동의 직접수치해석)

  • Kang S. J.;Tanahashi M.;Miyauchi T.;Lee Y. H.
    • Journal of computational fluids engineering
    • /
    • v.6 no.4
    • /
    • pp.26-34
    • /
    • 2001
  • The flow past a circular cylinder forced to vibrate transversely is numerically simulated by solving the two-dimensional Navier-Stokes equations modified by the vibration velocity of a circular cylinder at a Reynolds number of 164. The higher-order finite difference scheme is employed for the spatial discretization along with the second order Adams-Bashforth and the first order backward-Euler time integration. The calculated cylinder vibration frequency is between 0.60 and 1.30 times of the natural vortex-shedding frequency. The calculated oscillation amplitude extends to 25% of the cylinder diameter and in the case of the lock-in region it is 60%. It is made clear that the cylinder oscillation has influence on the wake pattern, the time histories of the drag and lift forces, power spectral density and phase diagrams, etc. It is found that these results include both the periodic (lock-in) and the quasi-periodic (non-lock-in) state. The vortex shedding frequency equals the driving frequency in the lock-in region but is independent in the non-lock-in region. The mean drag and the maximum lift coefficient increase with the increase of the forcing amplitude in the lock-in state. The lock-in boundaries are also established from the present direct numerical simulation.

  • PDF

Direct Numerical Simulation of the Flow Past an Oscillating Circular Cylinder (진동하는 원주주위 유동의 직접수치해석)

  • KANG Shin-Jeong;TANAHASHI Mamoru;MIYAUCHI Toshio;NAM Cheong-Do;LEE Young-Ho
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2001.05a
    • /
    • pp.181-188
    • /
    • 2001
  • The flow past a circular cylinder forced to vibrate transversely is numerically simulated by solving the two-dimensional Wavier-Stokes equations modified by the vibration velocity of a circular cylinder at a Reynolds number of 164. The higher-order finite difference scheme is employed for the spatial discretization along with the second order Adams-Bashforth and the first order backward-Euler time integration. The calculated cylinder vibration frequency is between 0.60 and 1.30 times of the natural vortex-shedding frequency. The calculated oscillation amplitude extends to $25\%$ of the cylinder diameter and in the case of the lock-in region it is $60\%$. It is made clear that the cylinder oscillation has influence on the wake pattern, the time histories of the drag and lift forces, power spectral density and phase diagrams, etc. It is found that these results include both the periodic (lock-in) and the quasi-periodic (non-lock-in) state. The vortex shedding frequency equals the driving frequency in the lock-in region but is independent in the non-lock-in region. The mean drag and the maximum lift coefficient increase with the increase of the forcing amplitude in the lock-in state. The lock-in boundaries are also established from the present direct numerical simulation.

  • PDF

User Expectations and Preferences of Door Lock Control Devices (문 잠금 조정장치에 관한 사용자 기대 및 선호도)

  • Jung, Hwa S.;Jung, Hyung-shik
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.4
    • /
    • pp.283-291
    • /
    • 2003
  • The purposes of this study are to investigate the stereotype of position and direction that users expect door lock control devices in different orientations, and to collect information regarding preferred door lock design and orientations. Six hundred subjects aged from lOs to 60s were surveyed under the operating conditions of three different door locks(cylindrical, circular-type, and lever-type auxiliary locks) mounted on the miniature door in two different orientations(right and left side). The door locks presented to the subjects were the most widely used door locks in our living environment. The results indicated that if the door locks were seen from the inside, 59~67% of the subjects expected 'vertical' position locking depending on the door lock control types, cylinder or auxiliary lock. When the door locks were seen from the outside, the locking direction of door lock control was not consistent either 'clockwise' or 'counterclockwise'. It was rather dependent on the orientation of the door lock positions. As a concluding remark, it is better to design and install door lock control devices in the way that users expect them to work.