• 제목/요약/키워드: sensor

Search Result 26,670, Processing Time 0.078 seconds

Quality Characteristics of Jochung Containing Various Level of Letinus edodes Powder (표고버섯 가루를 이용한 조청의 품질 특성)

  • Park, Jung-Suk;Na, Hwan-Sik
    • Korean Journal of Food Science and Technology
    • /
    • v.37 no.5
    • /
    • pp.768-775
    • /
    • 2005
  • Lentinus edodes powder was added at 1-3%(w/w) to improve functional properties of jocheong. Content of crude protein, ash, crude lipids, total mineral, free sugar and reducing sugar increased with increasing amount of L. edodes powder, while viscosity and solid and carbohydrate contents decreased. Through amino acid analysis, 17 amino acids were identified and quantified, glutamic acid being the major amino acid. No significant differences were observed in fatty acid composition and pH between control and L. edodes powder-added jocheong. Addition of mushroom powder in jocheong decreased lightness, yellowness and redness in Hunter's color value. Sensor score of jucheong containing 1% of L. edodes powder was similar to that of control. Results showed jocheong containing less than 2% L. edodes powder gave highest scores in quality characteristics and sensory evaluation.

A Respiration Rate Measurement of Fresh Fruits and Vegetables with a Corrected Pressure Variation Method (수정된 압력변위법을 이용한 과채류 호흡속도 측정)

  • Lee, Hyun-Dong;Chung, Hun-Sik;Kang, Jun-Soo;Chung, Shin-Kyo;Choi, Jong-Uck
    • Korean Journal of Food Science and Technology
    • /
    • v.29 no.6
    • /
    • pp.1119-1124
    • /
    • 1997
  • This study was carried out for improvement and correction of the traditional pressure variation method (PVM) in the respiration rate measurements of fresh fruits and vegetables using a microcomputer system and a differential pressure sensor. Water vapor pressure in the container was calculated by equations for psychrometric calculations. At the beginning of experimental period water vapor pressure in the container was increased and maintained constantly in the most experimental period, but was decreased dramatically after $CO_2$ scrubbing. The percentages of water vapor pressure on total differential pressure were $33{\sim}46%$ at $1^{\circ}C$, $23{\sim}45%$ at $11^{circ}C$ and $35{\sim}53%$ at $21^{\circ}C$. The differences between the respiration rates determined by gas chromatography and corrected pressure variation method (CPVM) were $0.2{\sim}0.3\;mgCO_2kg^{-1}h^{-1}$ at $1^{\circ}C$, $0.2{\sim}2.9\;mgCO_2kg^{-1}h^{-1}$ at $11^{\circ}C$ and 1.0{\sim}9.0\;mgCO_2kg^{-1}h^{-1}$ at $21^{circ}C$, while those between gas chromatography and normal pressure variation method (PVM) were $0.8{\sim}1.2\;mgCO_2kg^{-1}h^{-1}$ at $1^{\circ}C$, $3.9{\sim}11.0\;mgCO_2kg^{-1}h^{-1}$ at $11^{\circ}C$ and $8.0{\sim}32.0\;mgCO_2kg^{-1}h^{-1}$ at $21^{circ}C$, respectively. The differences of the respiration rates with CPVM were smaller than those with PVM. CPVM, therefore, were more exact and convenient method than PVM in the measurement of respiration rate of fresh produce.

  • PDF

A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System (NCW 환경에서 C4I 체계 전투력 상승효과 평가 알고리즘 : 기술 및 인적 요소 고려)

  • Jung, Whan-Sik;Park, Gun-Woo;Lee, Jae-Yeong;Lee, Sang-Hoon
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.55-72
    • /
    • 2010
  • Recently, the battlefield environment has changed from platform-centric warfare(PCW) which focuses on maneuvering forces into network-centric warfare(NCW) which is based on the connectivity of each asset through the warfare information system as information technology increases. In particular, C4I(Command, Control, Communication, Computer and Intelligence) system can be an important factor in achieving NCW. It is generally used to provide direction across distributed forces and status feedback from thoseforces. It can provide the important information, more quickly and in the correct format to the friendly units. And it can achieve the information superiority through SA(Situational Awareness). Most of the advanced countries have been developed and already applied these systems in military operations. Therefore, ROK forces also have been developing C4I systems such as KJCCS(Korea Joint Command Control System). And, ours are increasing the budgets in the establishment of warfare information systems. However, it is difficult to evaluate the C4I effectiveness properly by deficiency of methods. We need to develop a new combat effectiveness evaluation method that is suitable for NCW. Existing evaluation methods lay disproportionate emphasis on technical factors with leaving something to be desired in human factors. Therefore, it is necessary to consider technical and human factors to evaluate combat effectiveness. In this study, we proposed a new Combat Effectiveness evaluation algorithm called E-TechMan(A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System). This algorithm uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}\frac{V{\upsilon}I}{T}{\times}C$). Five factors considered in combat effectiveness evaluation are network power(M), movement velocity(v), information accuracy(I), command and control time(T) and collaboration level(C). Previous researches did not consider the value of the node and arc in evaluating the network power after the C4I system has been established. In addition, collaboration level which could be a major factor in combat effectiveness was not considered. E-TechMan algorithm is applied to JFOS-K(Joint Fire Operating System-Korea) system that can connect KJCCS of Korea armed forces with JADOCS(Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS(Joint Chiefs of Staff) level. We compared the result of evaluation of Combat Effectiveness by E-TechMan with those by other algorithms(e.g., C2 Theory, Newton's second Law). We can evaluate combat effectiveness more effectively and substantially by E-TechMan algorithm. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system. Part 2 will describe the changes of war paradigm and the previous combat effectiveness evaluation methods such as C2 theory while Part 3 will explain E-TechMan algorithm specifically. Part 4 will present the application to JFOS-K and analyze the result with other algorithms. Part 5 is the conclusions provided in the final part.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Growth and Opto-electric Characterization of ZnSe Thin Film by Chemical Bath Deposition (CBD(Chemical Bath Deposition)방법에 의한 ZnSe 박막성장과 광전기적 특성)

  • Hong, K.J.;You, S.H.
    • Journal of Sensor Science and Technology
    • /
    • v.10 no.1
    • /
    • pp.62-70
    • /
    • 2001
  • The ZnSe sample grown by chemical bath deposition (CBD) method were annealed in Ar gas at $45^{\circ}C$. Using extrapolation method of X-ray diffraction pattern, it was found to have zinc blend structure whose lattice parameter $a_o$ was $5.6687\;{\AA}$. From Hall effect, the mobility was likely to be decreased by impurity scattering at temperature range from 10 K to 150 K and by lattice scattering at temperature range from 150 K to 293 K. The band gap given by the transmission edge changed from $2.700{\underline{5}}\;eV$ at 293 K to $2.873{\underline{9}}\;eV$ at 10 K. Comparing photocurrent peak position with transmission edge, we could find that photocurrent peaks due to excition electrons from valence band, ${\Gamma}_8$ and ${\Gamma}_7$ and to conduction band ${\Gamma}_6$ were observed at photocurrent spectrum. From the photocurrent spectra by illumination of polarized light on the ZnSe thin film, we have found that values of spin orbit coupling splitting ${\Delta}so$ is $0.098{\underline{1}}\;eV$. From the PL spectra at 10K, the peaks corresponding to free bound excitons and D-A pair and a broad emission band due to SA is identified. The binding energy of the free excitons are determined to be $0.061{\underline{2}}\;eV$ and the dissipation energy of the donor -bound exciton and acceptor-bound exciton to be $0.017{\underline{2}}\;eV$, $0.031{\underline{0}}\;eV$, respectively.

  • PDF

Growth of CdSe thin films using Hot Wall Epitaxy method and their photoelectrical characteristics (HWE방법에 의한 CdSe 박막 성장과 광전기적 특성)

  • Hong, K.J.;Lee, K.K.;Lee, S.Y.;You, S.H.;Shin, Y.J.;Suh, S.S.;Jeong, J.W.;Jeong, K.A.;Shin, Y.J.;Jeong, T.S.;Kim, T.S.;Moon, J.D.;Kim, H.S.
    • Journal of Sensor Science and Technology
    • /
    • v.6 no.4
    • /
    • pp.328-336
    • /
    • 1997
  • The CdSe thin films were grown on the Si(100) wafers by a hot wall epitaxy method (HWE). The source and substrate temperature are $600^{\circ}C$ and $430^{\circ}C$ respectively. The crystalline structure of epilayers was investigated by double crystal X-ray diffraction(DCXD). Hall effect on the sample was measured by the van der Pauw method and studied on the carrier density and mobility dependence on temperature. From Hall data, the mobility was increased in the temperature range 30K to 150K by impurity scattering and decreased in the temperature range 150k to 293k by the lattice scattering. In order to explore the applicability as a photoconductive cell, we measured the sensitivity(${\gamma}$), the ratio of photocurrent to darkcurrent(pc/dc), maximum allowable power dissipation(MAPD), spectral response and response time. The results indicated that the photoconductive characteristic were the best for the samples annealed in Cu vapor compare with in Cd, Se, air and vacuum vapour. Then we obtained the sensitivity of 0.99, the value of pc/dc of $1.39{\times}10^{7}$, the MAPD of 335mW, and the rise and decay time of 10ms and 9.5ms, respectively.

  • PDF

Change in Yield and Quality Characteristics of Rice by Drought Treatment Time during the Seedling Stage (벼 이앙 직후 유묘기 한발 피해시기에 따른 수량 및 미질 특성 변화)

  • Jo, Sumin;Cho, Jun-Hyeon;Lee, Ji-Yoon;Kwon, Young-Ho;Kang, Ju-Won;Lee, Sais-Beul;Kim, Tae-Heon;Lee, Jong-Hee;Park, Dong-Soo;Lee, Jeom-Sig;Ko, Jong-Min
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.64 no.4
    • /
    • pp.344-352
    • /
    • 2019
  • Drought stress caused by global climate change is a serious problem for rice cultivation. Increasingly frequent abnormal weather occurrences could include severe drought, which could cause water stress to rice during the seedling stage. This experiment was conducted to clarify the effects of drought during the seedling period on yield and quality of rice. Drought conditions were created in a rain shelter house facility. The drought treatment was conducted at 3, 10, and 20 days after transplanting. Soil water content was measured by a soil moisture sensor during the whole growth stage. In this study, we have chosen 3 rice cultivars which are widely cultivated in Korea: 'Haedamssal' (Early maturing), 'Samkwang' (Medium maturing), and 'Saenuri' (Mid-late maturing). The decrease in yield due to drought treatment was most severe 3 days after transplanting because of the decrease in the number of effective tillers. The decrease in grain quality due to drought treatment was also most severe 3 days after transplanting because of the increased protein content and hardness of the grains. The cultivar 'Haedamssal' was the most severely damaged by water stress, resulting in about a 30% yield loss. Drought conditions diminished the early vigorous growth period and days to heading in early-maturing cultivars. The results show that drought stress affects yield components immediately after transplanting, which is a decisive factor in reducing yield and grain quality. This study can be used as basic data to calculate damage compensation for drought damage on actual rice farms.

EFFECT OF INSTRUMENT COMPLIANCE ON THE POLYMERIZATION SHRINKAGE STRESS MEASUREMENTS OF DENTAL RESIN COMPOSITES (측정장치의 compliance 유무가 복합레진의 중합수축음력의 측정에 미치는 영향)

  • Seo, Deog-Gyu;Min, Sun-Hong;Lee, In-Bog
    • Restorative Dentistry and Endodontics
    • /
    • v.34 no.2
    • /
    • pp.145-153
    • /
    • 2009
  • The purpose of this study was to evaluate the effect of instrument compliance on the polymerization shrinkage stress measurements of dental composites. The contraction strain and stress of composites during light curing were measured by a custom made stress-strain analyzer, which consisted of a displacement sensor, a cantilever load cell and a negative feedback mechanism. The instrument can measure the polymerization stress by two modes: with compliance mode in which the instrument compliance is allowed, or without compliance mode in which the instrument compliance is not allowed. A flowable (Filtek Flow: FF) and two universal hybrid (Z100: Z1 and Z250: Z2) composites were studied. A silane treated metal rod with a diameter of 3.0 mm was fixed at free end of the load cell, and other metal rod was fixed on the base plate. Composite of 1.0 mm thickness was placed between the two rods and light cured. The axial shrinkage strain and stress of the composite were recorded for 10 minutes during polymerization. and the tensile modulus of the materials was also determined with the instrument. The statistical analysis was conducted by ANOVA. paired t-test and Tukey's test (${\alpha}<0.05$). There were significant differences between the two measurement modes and among materials. With compliance mode, the contraction stress of FF was the highest: 3.11 (0.13). followed by Z1: 2.91 (0.10) and Z2: 1.94 (0.09) MPa. When the instrument compliance is not allowed, the contraction stress of Z1 was the highest: 17.08 (0.89), followed by FF: 10.11 (0.29) and Z2: 9.46 (1.63) MPa. The tensile modulus for Z1, Z2 and FF was 2.31 (0.18), 2.05 (0.20), 1.41 (0.11) GPa, respectively. With compliance mode. the measured stress correlated with the axial shrinkage strain of composite: while without compliance the elastic modulus of materials played a significant role in the stress measurement.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

THE CHANGE OF THE INITIAL DYNAMIC VISCO-ELASTIC MODULUS OF COMPOSITE RESINS DURING LIGHT POLYMERIZATION (광중합 복합레진의 중합초기 동적 점탄성의 변화)

  • Kim, Min-Ho;Lee, In-Bog
    • Restorative Dentistry and Endodontics
    • /
    • v.34 no.5
    • /
    • pp.450-459
    • /
    • 2009
  • The aim of this study was to measure the initial dynamic modulus changes of light cured composites using a custom made rheometer. The custom made rheometer consisted of 3 parts: (1) a measurement unit of parallel plates made of glass rods, (2) an oscillating shear strain generator with a DC motor and a crank mechanism, (3) a stress measurement device using an electromagnetic torque sensor. This instrument could measure a maximum torque of 2Ncm, and the switch of the light-curing unit was synchronized with the rheometer. Six commercial composite resins [Z-100 (Z1), Z-250 (Z2), Z-350 (Z3), DenFil (DF), Tetric Ceram (TC), and Clearfil AP-X (CF)] were investigated. A dynamic oscillating shear test was undertaken with the rheometer. A certain volume ($14.2\;mm^3$) of composite was loaded between the parallel plates, which were made of glass rods (3 mm in diameter). An oscillating shear strain with a frequency of 6 Hz and amplitude of 0.00579 rad was applied to the specimen and the resultant stress was measured. Data acquisition started simultaneously with light curing, and the changes in visco-elasticity of composites were recorded for 10 seconds. The measurements were repeated 5 times for each composite at $25{\pm}0.5^{\circ}C$. Complex shear modulus G*, storage shear modulus G', loss shear modulus G" were calculated from the measured strain-stress curves. Time to reach the complex modulus G* of 10 MPa was determined. The G* and time to reach the G* of 10 MPa of composites were analyzed with One-way ANOVA and Tukey's test ($\alpha$ = 0.05). The results were as follows. 1. The custom made rheometer in this study reliably measured the initial visco-elastic modulus changes of composites during 10 seconds of light curing. 2. In all composites, the development of complex shear modulus G* had a latent period for $1{\sim}2$ seconds immediately after the start of light curing, and then increased rapidly during 10 seconds. 3. In all composites, the storage shear modulus G" increased steeper than the loss shear modulus G" during 10 seconds of light curing. 4. The complex shear modulus of Z1 was the highest, followed by CF, Z2, Z3, TC and DF the lowest. 5. Z1 was the fastest and DF was the slowest in the time to reach the complex shear modulus of 10 MPa.