• Title/Summary/Keyword: 전력적 틈새

Search Result 7, Processing Time 0.022 seconds

방산물자 국산화 촉진방안

  • Park, Su-Gyu
    • Defense and Technology
    • /
    • no.4 s.254
    • /
    • pp.18-29
    • /
    • 2000
  • 다급한 전력화 요구를 충족시키느라 급속히 팽창한 우리 나라 방위산업은 괄목할 외형성장의 내면에 구조적인 취약성의 씨앗도 은밀히 배태하고 있었다. 따라서 방산업계는 업체차원에서 경영개선, 전략계획 등을 통해 체질개선과 경쟁력을 강화하고, 업체상호간 연대강화 모색, 해외로의 수출 및 국제적 공동개발 참여 등을 통해서, 그리고 민수겸업을 통한 군수의존도 축소, 방산 틈새시장 개척 등 근본적인 자구노력을 통해 생존과 성장전략을 능동적으로 추구해야 할 것이다.

  • PDF

Development of the lonely old care system based on BPLC AMR Infrastructure (BPLC기반의 독거노인 관리시스템 개발)

  • Baek, Jong-Mock;Lim, Yong-Hun;Ju, Seong-Ho
    • Proceedings of the KIPE Conference
    • /
    • 2010.07a
    • /
    • pp.591-592
    • /
    • 2010
  • 전력사를 중심으로 BPL기반의 통신기술 개발을 통해 제공되는 대표적인 서비스는 현재 전기데이터 원격검침서비스, 변압기 부하관리등이 있으며 이 인프라를 이용하여 댁내 방범/방재서비스, 인터넷 같은 서비스의 제공에 대해 연구되어 왔으며 제한된 시범서비스 수준에서 실시간 영상감시서비스도 시도되었다. 향후 BPL기술의 신뢰성 및 안정성이 높아지고 인프라 확대구축 및 운영과 더불어 얻게 되는 기술과 노하우는 향후에 전력선 통신기술이 상용 통신망의 틈새시장으로서 다양한 산업분야에 적용 시킬 수 있는 핵심 기술로 자리매김 할 것 으로 전망 된다. 본 과제에서는 원격검침서비스의 통신매체로 활용되고있는 광대역 전력선통신 BPL 인프라에 독거노인 관리시스템 개발 및 시범적용을 통해 새로운 부가서비스를 수용할 수 있는 핵심통신망으로서의 역할 가능성을 확인하였다.

  • PDF

An Experience of Living Lab as Energy Transition Experiment: The Case of Urban Living Lab for Mini-PV System in Seong-Dae-Gol, Seoul, KOREA (에너지전환 실험의 장으로서 한국 리빙랩의 경험: 성대골의 도시지역 미니태양광 사례를 중심으로)

  • Kim, Jun han;Han, Jae kak
    • Journal of Science and Technology Studies
    • /
    • v.18 no.1
    • /
    • pp.219-265
    • /
    • 2018
  • Recently, interest in energy tranisition is rising. Energy transition requires active participation and cooperation of diverse stakeholders, including users / citizens, in that it requires not only changes in technological factors but also changes and coordination of various social factors. Living labs are attracting attention as one of the ways to do this. This article is a detailed analysis of the activities of the mini-PV living lab in the urban area from 2016 to 2017 at the Seoul, Sung Dae Goal. Through the Living Lab, mini PV DIY products, backup centers, local financial services, and the development of a variety of education and training strategies have been achieved. These activities and achievements were analyzed through questions raised on strategic, tactical, and operational levels, as well as through multi-level perspective and interaction between initiative, regime, and niche. In conclusion, this living lab activity confirmed the possibility of a 'transition lap' to solve social problems such as sustainability of energy production and utilization. In particular, it gained remarkable results in terms of the operational leves of transition management governance, that is, transition experiment, and it was also remarkable in that it was the initiative of citizens. However, it did not proceed without difficulty. In particular, structural problems such as the conflict between the flexibility inherent in living lab and the bureaucratic rigidity of the financial support organization have appeared. There was also a limitation that there was no 'transition field' on the strategic level necessary to replicate and expand strategic niches while spreading the knowledge gained from the transition experiment, forming the vision of transition.

Thermal Management for Multi-core Processor and Prototyping Thermal-aware Task Scheduler (멀티 코어 프로세서의 온도관리를 위한 방안 연구 및 열-인식 태스크 스케줄링)

  • Choi, Jeong-Hwan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.7
    • /
    • pp.354-360
    • /
    • 2008
  • Power-related issues have become important considerations in current generation microprocessor design. One of these issues is that of elevated on-chip temperatures. This has an adverse effect on cooling cost and, if not addressed suitably, on chip reliability. In this paper we investigate the general trade-offs between temporal and spatial hot spot mitigation schemes and thermal time constants, workload variations and microprocessor power distributions. By leveraging spatial and temporal heat slacks, our schemes enable lowering of on-chip unit temperatures by changing the workload in a timely manner with Operating System (OS) and existing hardware support.

Market dissemination strategies for Photovoltaics: (태양광발전산업의 보급확산 전략)

  • Park, Soo-Uk;Lee, Deok-Ki;Choi, Bong-Ha
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.197-201
    • /
    • 2006
  • 신재생에너지의 발전산업은 지구온난화가 우려되는 현시점에 적극적으로 적응되길 요구하고 있으며 전 세계적으로 태양광발전(PV), 풍력발전, 연료전지발전 등 기타 신재생에너지 발전 산업이 전력수급의 역할을 해 나가고 있다 PV산업은 국내외적으로 독립형시스템에서 연계형시스템으로 옮아가는 추세에 있으며 이들의 시장 확장 및 보급을 위해서는 틈새전략이 필요하며 특히 국가의 정책 드라이브와 규제가 필요한 시장이다. 본 연구에서는 현존하는 각 국의 태양광발전 시스템 보급의 활성화를 위해 각 국가 및 주요 지원 정책에 대하여 논하여 향후 태양광발전산업의 시장개척에 대한 방향제시 하고자 한다.

  • PDF

Query Slipping Prevention for Trajectory-based Contents Publishing and Subscribing in Wireless Sensor Networks (무선 센서 네트워크에서의 궤도 기반 콘텐츠 발간 및 구독을 위한 질의 이탈 방지)

  • Tscha, Yeong-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.525-534
    • /
    • 2005
  • This paper is concerned with the query slipping and its prevention for trajectory-based matchmaking service in wireless sensor networks. The problem happens when a query propagating along a subscribe trajectory moves through a publish trajectory without obtaining desired information, even though two trajectories intersect geometrically. There follows resubmission of the query or initiation of another subscribe trajectory Thus, query slipping results in considerable time delay and in the worst, looping in the trajectory or query flooding the network. We address the problem formally and suggest a solution. First, the area where nodes are distributed is logically partitioned into smaller grids, and a grid-based multicast next-hop selection algorithm is proposed. Our algorithm not only attempts to make the trajectory straight but also considers the nodal density of recipient nodes and the seamless grid-by-grid multicast. We prove that the publishing and subscribing using the algorithm eventually eliminate the possibility of the slipping. It toms out that our algorithm dissipates significantly less power of neighbor nodes, compared to the non grid-based method, as greedy forwarding, and the fixed- sized grid approach, as GAF (Geographical Adaptive Fidelity)

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.