• Title/Summary/Keyword: 안전성 강화

Search Result 1,279, Processing Time 0.038 seconds

Principles and Comparative Studies of Various Power Measurement Methods for Lithium Secondary Batteries (리튬이차전지 출력측정법의 원리 및 측정법간 비교 연구)

  • Lee, Hye-Won;Lee, Yong-Min
    • Journal of the Korean Electrochemical Society
    • /
    • v.15 no.3
    • /
    • pp.115-123
    • /
    • 2012
  • As the market of lithium secondary batteries moves from mobile IT devices to large-format electric vehicles or energy storage systems, the strengthened battery specifications such as long-term reliability longer than 10 years, pack-level safety and tough competitive price have been required. Moreover, even though high power properties should also be achieved for hybrid electric vehicles, it is not easy to measure accurate power values at various conditions. Because it is difficult to choose a proper measurement method and its experimental condition is more complex comparing to capacity measurement. In addition, the power values are very sensitive to power duration time, state-of-charge (SOC) of cells, cut-off voltages, and temperatures, whereas capacity values are not. In this paper, we introduce three kinds of power measurement methods, hybrid pulse power characterization (HPPC) suggested by US FreedomCar, so-called J-pulse by Japan electric vehicle association standards (JEVS) and constant power measurement, respectively. Moreover, with pouch-type unit cells for HEV, experimental power data are discussed in order to compare each power measurement.

A Study on the Measure for Prevention of Marine Pollution due to the Coastal Activities (해안활동으로 인한 해양오염방지 방안 마련 연구)

  • Gug, Seung-Gi;Seol, Dong-Il;Lee, Seung-Huan;Piao, Yong-Nan
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.319-324
    • /
    • 2005
  • This study was carried out for the purpose of proposing the guideline for the non-mischief and comfortable coastal leisure activities to reduce the marine pollution caused by sea fishing and strengthen the marine management and supervision for the fishing activity. In research method, a extensive reference was examined and analyzed, and the questionnaire investigation and field work were carried out to recognize the present conditions and problems concerning the environmental pollution caused by sea fishing. At the same time, the guideline for the safe and comfortable activities was proposed by diagnosing of actual evil conditions of marine environment due to the sea fishing activity and by analyzing of foreign mangement cases. On the basis of these research results, it is useful to contrive a management criteria for the realities investigation on the pollution of coastal activities. It also contributes to develop the regional economy by controlling coastal leisure activities effectively and systematically through the national publicity for the prevention of marine pollution.

  • PDF

Secret Sharing Scheme using Gray Code based on Steganography (스테가노그라피 기반에서 그레이코드를 사용한 비밀공유 기법)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.96-102
    • /
    • 2009
  • Due to the rapid growth of the Internet, it is possible to distribute the digital content efficiently. However, the need for image data protection and secret communication technique is also on the rise because of an infringement of the copyright by malicious attackers. Shamir and Lin-Tsai proposed simple secret image encryption algorithms based on the principle of secret sharing, respectively. However, their secret sharing schemes have a serious problem which can be declined the image quality and it is possible for third party to know embed information. In this paper, we propose a new secret sharing scheme using gray code that can be increased the image quality and security. As a result of our experiment, the proposed scheme is not only shown of good image quality and but also provide enhanced security compare with Shamir and Lin-Tasi's schemes.

Design of a FRP Deck Using Topology and Shape Optimization (위상과 형상최적화 기법을 사용한 FRP 교량 바닥판의 설계)

  • Lee, Eun-Hyung;Park, Jae-Gyun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.22 no.5
    • /
    • pp.501-507
    • /
    • 2009
  • By using topology and shape optimization, a theoretically optimum FRP deck was proposed. Firstly, a topologically optimal shape, truss-like structure without hinges, was found. A truss-shape frame is the most ideal structure when subjected to a concentrated force at the center of simply supported beam. An armature was found at the point joining horizontal chord and diagonal chord, which was used as a new design variable. Secondly, optimum value of each variable was decided through shape optimization using genetic algorithm. To compare it with existing commercial FRP decks, shape optimization was performed by fixing the height of FRP decks. To verify the performance of the FRP deck proposed in this study, a finite element analysis was performed. As a result, it satisfies serviceability and safety guide lines of FRP decks.

SecureJS : A Secure JavaSpace based on Jini2.0 (SecureJS : Jini2.0 기반의 안전한 JavaSpace)

  • Yu Yang-Woo;Moon Nam-Doo;Jung Hye-Young;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.999-1008
    • /
    • 2004
  • The Jini system provides an infrastructure to facilitate a programmer to develop distributed systems. As one of the Jini services, JavaSpare has been used as a repository which is accessible publicly in the Java distributed environment. Although JavaSpace could give a useful method for saving and sharing java object, it would not be applicable to develop a distributed system requiring access securities for the objects because JavaSpare does not support secure access control. In this paper, we present a secure JavaSpare service based on Jini2.0 named SeureJS, which strengthens the security weakness of JavaSpare. The system consists of ObjectStore to store Java objects, AccessManager to control access of ObjectStore and KeyManager to manage public keys.

A Study on the Influence of Career Satisfaction and Commitment on Career Anchor Style (경력 닻의 유형이 경력만족과 경력몰입에 미치는 영향 연구)

  • Park, Hee-Dong;Park, Min-Saeng
    • Management & Information Systems Review
    • /
    • v.31 no.3
    • /
    • pp.97-116
    • /
    • 2012
  • This pager purposed to investigate the style of career anchor and influence of career satisfaction and career commitment. also to concept each variable. The empirical research questions for the study are what kind of the career anchor is selected and what impacts on career satisfaction and career commitment. To examine the model, 299 questionnaires was collected from Korean workers. Each questions is based on a 7 point Likert-type scale, and the data were analyzed by SPSS and AMOS for Windows. The results of study are summarized as follows: First, style of career anchor(technical/functional, security, pure challenge, life-style integration) has an positive influence on career satisfaction. but partial style of career anchor(managerial, creativity, autonomy/independence, service/dedication) unconnected with career satisfaction. Secondly, style of career anchor(technical/functional, managerial, security, service/dedication) has an positive influence on career commitment. but partial style of career anchor(creativity, autonomy/independence, pure challenge, life-style integration) unconnected with career satisfaction.

  • PDF

Application Plan of Exhaust Systems in Strengthening Evacuation Safety in Apartment Houses (공동주택의 피난안전성 강화를 위한 배기시스템 활용 방안 연구)

  • Lee, Hyun-Sang;Yoon, Myung-Oh;Lee, Young-Ju;Kim, Jeong-Joon
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.49-57
    • /
    • 2020
  • Apartment buildings are becoming taller and more densely populated with the advancements in science and the development of cities, Consequently, various amenities and safety facilities are being developed to improve the quality of life for residents. However, according to statistics, the number of casualties in apartments accounts for a high proportion of accidents, and the leading cause of the casualties is smoke emitted from fires while sleeping at night. Although it is best to install separate indoor facilities in apartments to minimize smoke damages to occupants, it is useful to minimize the smoke damages by utilizing the installed facilities while reducing the financial burden of occupants. Based on the review, the heat exchanger ventilation system and the kitchen collective exhaust system were selected, and the feasibility of these systems was verified through fire simulation. From the verification results, the available safe egress time improved by 27, 30, and 35 s on the 25th, 35th, 50th floors, respectively.

Desing of Secure Adaptive Clustering Algorithm Using Symmetric Key and LEAP in Sensor Network (센서네트워크 통신에서 대칭키 방식과 LEAP을 적용한 안전한 동적 클러스터링 알고리즘 설계)

  • Jang Kun-Won;Shin Dong-Gyu;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.29-38
    • /
    • 2006
  • Recent advances in wireless communication technology promotes many researches related to sensor network and brings several proposals to fit into various types of sensor network communication. The research direction for sensor network is divided into the method to maximize an energy efficiency and security researches that has not been remarkable so far. To maximize an energy efficiency, the methods to support data aggregation and cluster-head selection algorithm are proposed. To strengthen the security, the methods to support encryption techniques and manage a secret key that is applicable to sensor network are proposed, In. However, the combined method to satisfy both energy efficiency and security is in the shell. This paper is devoted to design the protocol that combines an efficient clustering protocol with key management algorithm that is fit into various types of sensor network communication. This protocol may be applied to sensor network systems that deal with sensitive data.

Coerced Debt Victimization and Interventions: Focusing on Domestic Violence Research in the United States (강요된 빚 피해 및 개입방안: 미국의 가정폭력 연구를 중심으로)

  • Park, Eonju
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.596-605
    • /
    • 2022
  • This study aimed to introduce research on coerced debt victimization and interventions in the context of domestic violence. To achieve the aim, this study reviewed existing studies on coerced debt conducted in the US. This study discussed the followings: First, coerced debt was theorized by coerced control theory of domestic violence and control mechanisms of economic abuse and conceptualized as fraud and force. Second, the effects of coerced debt included credit damage, economic dependence, and barriers to housing, employment, and safety. Third, to intervene the victimization, service providers should endure uncertainty and its time consuming process of recovering, provide an intense and personalized advocacy, and overcome the problems of absence of policies to support the victims. Finally, service providers should have educations and training programs on the assessment and intervention skills of coerced debt acknowledging empowerment and safety of the victims as the most important.

A Study on Establishment of Connecting Information Conversion Criteria for Mobile Electronic Notification Service of Private Institutions (민간기관 모바일 전자고지서비스를 위한 연계정보 변환기준 수립에 대한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.735-743
    • /
    • 2021
  • The mobile electronic notice service (MENS) is a service that delivers a mobile electronic notice to a smartphone in the person's name through an authorized electronic document intermediary instead of a bill that was delivered by mail using paper. In order to provide the MENS, information is needed to identify the same user between the sending agency and the authorized electronic document relay. In this paper, we propose a standard for safe conversion and utilization of Connecting Information (CI) used as user identification information for MENS. In the proposed method, it is necessary for the requesting institution to send the electronic notice to provide the resident registration number to the identity verification institution and convert it into the CI. In this case, a safe and efficient MENS will be possible by proposing a review standard and processing method to verify the appropriateness of the conversion of CI. By applying the proposed method to the MENS, it can contribute to service activation and reinforcement of user privacy protection.