• Title/Summary/Keyword: vulnerable

검색결과 4,228건 처리시간 0.035초

커튼월 유리의 열파손에 관한 실험적 연구 (An Experimental Study on Thermal Breakage in Curtain Wall Glazing)

  • 이재현;남중우;방중석
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2013년도 춘계 학술논문 발표대회
    • /
    • pp.236-237
    • /
    • 2013
  • In recent years, the use of glass applied to curtain wall as a building facade material has increased in our nation. However, the non-tempered curved double glass is very easy to broke because it is difficult to guarantee the quality in process of making it into double glazing. So, it is more vulnerable to thermal breakage than tempered double glass. In this paper, surface temperature difference on curved double glazing was compared to that of heat strengthened glass and flat glass by conducting thermal breakage experiments. As a result, flat single glass was broken at temperature difference of 100~140 degrees but curved double glazing was broken at that of 40~60 degrees. Therefore, it was concluded that curved double glazing is more vulnerable than flat double glazing to thermal breakage, and it should be considered the possibility of thermal breakage when curtain wall glazing is applied as a building facade material.

  • PDF

지리 정보를 이용한 순간 전압 품질 해석 시뮬레이터 (Voltage Sag Simulator with Geographical Information)

  • 김기현;박창현;장길수
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.213-216
    • /
    • 2003
  • A voltage sag is a short-duration reduction in rms voltage, and utilities have been faced with rising numbers of complaints about the quality of power due to voltage sags. In this paper, vulnerable areas of voltage sag are determined using representative loads at the buses. The CBEMA curves of the representative loads are used to determine whether the bus is vulnerable or not. Also, the ares are displayed with geographical information in order to help operators understand the situation going on easily. The proposed simulator is applied to Jeju power system to show its capabilities.

  • PDF

Design and Implementation of an Enhanced Secure Android-Based Smartphone using LIDS

  • Lee, Sang Hun
    • 디지털산업정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.49-55
    • /
    • 2012
  • Recently, with the rapid development of android-based smartphones, it is becomes a major security issue that the case of Android platform is an open platform. so it is easy to be a target of mobile virus penetration and hacking. Even there are a variety of security mechanisms to prevent the vulnerable points of the Android platform but the reason of most of the security mechanisms were designed at application-level that highly vulnerable to the attacks directly to the operating system or attacks using the disadvantages of an application's. It is necessary that the complementary of the android platform kernel blocks the kernel vulnerability and the application vulnerability. In this paper, we proposed a secure system using linux-based android kernel applied to LIDS(Linux Intrusion Detection and Defense System) and applied a smart phone with s5pc110 chip. As a result, the unauthorized alteration of the application was prevented with a proposed secure system.

Thermal Stress Analysis on the Solid Oxide Fuel Cell according to Operating Temperature

  • Kwon, Oh-Heon;Kang, Ji-Woong;Jo, Se-Jin
    • International Journal of Safety
    • /
    • 제10권1호
    • /
    • pp.1-4
    • /
    • 2011
  • The fuel cell is one of the green energy receiving a lot of attention. Among the fuel cells, it is generally referred to SOFC(solid oxide fuel cell) which is made up composites of a solid. SOFC has excellent merits in the side of environment and energy. However because of the high operating temperature, it has economic loss by the using of expensive materials and problems of structural instability by thermal stresses. Therefore, this study aims to the effect of analysis by the FEMLAB. The results have deformations and the maximum stresses from the variation of the thickness of vulnerability spots. The deformation shows expansion as 0.82% and the stress ${\sigma}_{xx}$ is 392MPa in electrolyte and -56.31MPa in anode. When increasing or decreasing the thickness to 50% of the reference thickness about the electrolyte which is vulnerable spots.

  • PDF

실내공기질을 고려한 유치원 보육실의 적정 환기량 검토 (Minimum Ventilation Rate of Kindergarten in the respect of IAQ)

  • 정창헌;이윤규;김태연;이승복
    • 대한설비공학회:학술대회논문집
    • /
    • 대한설비공학회 2006년도 하계학술발표대회 논문집
    • /
    • pp.283-288
    • /
    • 2006
  • Indoor Air Quality Guideline of Kindergarten in korea didn't consider the vulnerable properties of children to indoor air pollutants. For this reason, Suggestion for the IAQ guideline of formaldehyde and minimum ventilation rate was made in this study. Suggested IAQ guidelines for formaldehyde in the respect of children's vulnerable immune system is $30{\mu}g/m^3$ and $50{\mu}g/m^3$, and for the ventilation rate 11.9 ACH, 5.8 ACH, respectively. This value is based only formaldehyde and CO2 concentrations in child-care room of Kindergarten and needed to be verified by further investigations and studies. However it is discovered that lower formaldehyde concentration can do mal-effects to children's health by literature review.

  • PDF

드론 협업 지속을 위한 프레임워크 연구 (Study on Framework for Continuing Drone Collaboration)

  • 김강주;박용범
    • 반도체디스플레이기술학회지
    • /
    • 제17권3호
    • /
    • pp.1-9
    • /
    • 2018
  • The drone has the restrictions on the controls, the battery and the surrounding environment in performing missions such as fire extinguishing. This restriction can improve the limitations that leave the leader can be monitored. The existing method of constructing the leader based on the GPS is highly dependent on the signal and is vulnerable to hardware defects. In this paper, we solve these problems with dynamic leaders decision. Drones can use their leader drones rather than remote controls. Information about the drones changes depending on the surrounding environment by replacing the leader with a dead battery or electing leader by the drones themselves without human intervention. This suggests that the leader monitors the community through a framework for continuing the drones collaboration and that the community can collaborate to overcome the limitations and continue the mission. The analysis of the proposed system through simulation experiments confirm that it has a better task performance. By using this system, it is possible to continue the mission and solve problems that are vulnerable to hardware defects.

폐지수집 노인의 주관적 건강에 영향을 미치는 요인 (Factors Affecting Subjective Health Status among the Elderly Collecting and Selling Wastepaper)

  • 이성은
    • 한국생활환경학회지
    • /
    • 제24권3호
    • /
    • pp.360-367
    • /
    • 2017
  • Although the elderly collecting and selling wastepaper is one of the most vulnerable groups in society, this group has not been studied specifically. Subjective health status is an important aspect of quality of life in old age. The purpose of this study is to examine factors affecting subjective health status among the elderly collecting and selling wastepaper. Analyses are based on data from 2014 Korean Elderly Survey. Multiple regression analysis showed that gender, depression, and fear of falling were associated with subjective health status. The results of this study suggest that gender and mental health aspects should be considered in making intervention plan for assessments and providing services for health among the elderly collecting and selling wastepaper. The study findings also indicate that efforts to improve safety in worksite of elderly persons collecting and selling wastepaper are needed.

타워크레인의 용접부 비파괴검사 데이터 기반 취약부위 분석 (Analysis of Vulnerable Parts based on Non-destructive Testing Data of Tower Crane Welding Parts)

  • 정성모;임재용
    • 자동차안전학회지
    • /
    • 제13권2호
    • /
    • pp.50-56
    • /
    • 2021
  • The purpose of this study is to investigate vulnerable parts of tower crane structures by analyzing extensive non-destructive test data. Approximately ten percent of domestically registered tower cranes were inspected by using magnetic particle inspection. The testing was carried out as advised in KS B 0213. The non-destructive results was analyzed with respect to jib types, age and crane size. As a result, the number of crack occurrences were the largest in mast parts, followed by main jib part. Moreover, it was found that turntables were important parts deserved to be noticed at the perspective of safe maintenance.

COVID-19 유행 시기의 조현병 환자 지원 (Supporting Patients With Schizophrenia in the Era of COVID-19)

  • 김성완
    • 대한조현병학회지
    • /
    • 제24권2호
    • /
    • pp.45-51
    • /
    • 2021
  • The coronavirus disease 2019 (COVID-19) pandemic has drastically impacted our society and health care system. People with schizophrenia are more vulnerable to this burden of illness and related societal changes. In addition, they are more susceptible to the transmission of COVID-19 and have a significantly higher mortality rate compared to the general population. In a recent study, vaccinated patients with schizophrenia showed a greatly decreased mortality level similar to that of the general population. However, patients with schizophrenia were less likely to be vaccinated. Mental health professionals should provide them with appropriate information on prevention strategies against COVID-19 and vaccination. Long-lasting social distancing and social disconnection can make people with schizophrenia more vulnerable to loneliness and depression. Furthermore, patients with schizophrenia may face challenges continuing psychiatric treatment due to the COVID-19 pandemic. Social support and suitable mental health services using novel technologies should be developed and provided to patients with schizophrenia.

계층화된 쓰레드 생성을 이용한 DLL 삽입 탐지기술 우회 공격 기법 (Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System)

  • 김대엽
    • 전기전자학회논문지
    • /
    • 제27권3호
    • /
    • pp.239-245
    • /
    • 2023
  • 화이트리스트 기반 랜섬웨어 솔루션이 DLL 삽입공격을 활용한 사칭공격에 취약한 것으로 알려진 후, 이러한 문제점을 개선하기 위하여 DLL 삽입 공격을 활용한 사칭공격을 탐지하고, 랜섬웨어 탐지 및 대응 기술과 연동하는 기술이 제안되었다. 본 논문에서는 공격자가 이러한 탐지기술을 우회하여 불법적으로 공격 대상의 파일에 접근할 수 있음을 보여준다. 이는 화이트리스트 기반 랜섬웨어 솔루션이 여전히 DLL 삽입 공격에 취약함을 의미한다. 특히, 본 논문에서는 랜섬웨어 솔루션을 대상으로 실제 공격을 수행하여, 그 가능성을 증명하였다.