• Title/Summary/Keyword: 제어성

Search Result 13,839, Processing Time 0.046 seconds

MXene Based Composite Membrane for Water Purification and Power Generation: A Review (정수 및 발전을 위한 맥신(MXene) 복합막에 관한 고찰)

  • Seohyun Kim;Rajkumar Patel
    • Membrane Journal
    • /
    • v.33 no.4
    • /
    • pp.181-190
    • /
    • 2023
  • Wastewater purification is one of the most important techniques for controlling environmental pollution and fulfilling the demand for freshwater supply. Various technologies, such as different types of distillations and reverse osmosis processes, need higher energy input. Capacitive deionization (CDI) is an alternative method in which power consumption is deficient and works on the supercapacitor principle. Research is going on to improve the electrode materials to improve the efficiency of the process. A reverse electrodialysis (RED) is the most commonly used desalination technology and osmotic power generator. Among many studies conducted to enhance the efficiency of RED, MXene, as an ion exchange membrane (IEM) and 2D nanofluidic channels in IEM, is rising as a promising way to improve the physical and electrochemical properties of RED. It is used alone and other polymeric materials are mixed with MXene to enhance the performance of the membrane further. The maximum desalination performances of MXene with preconditioning, Ti3C2Tx, Nafion, and hetero-structures were respectively measured, proving the potential of MXene for a promising material in the desalination industry. In terms of osmotic power generating via RED, adopting MXene as asymmetric nanofluidic ion channels in IEM significantly improved the maximum osmotic output power density, most of them surpassing the commercialization benchmark, 5 Wm-2. By connecting the number of unit cells, the output voltage reaches the point where it can directly power the electronic devices without any intermediate aid. The studies around MXene have significantly increased in recent years, yet there is more to be revealed about the application of MXene in the membrane and osmotic power-generating industry. This review discusses the electrodialysis process based on MXene composite membrane.

Introduction to Soil-grondwater monitoring technology for CPS (Cyber Physical System) and DT (Digital Twin) connection (CPS 및 DT 연계를 위한 토양-지하수 관측기술 소개)

  • Byung-Woo Kim;Doo-Houng Choi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.14-14
    • /
    • 2023
  • 산업발전에 따른 인구증가, 기후위기에 따른 가뭄 및 물 부족심화, 그리고 수질오염 등은 2015년 제79차 UN총회의 물 안보측면에서 국제사회의 물 분야 위기관리를 위해 2030년을 지속가능한 발전 목표(Sustainable Development Goals)로 하였다. 또한, 현재 물 산업은 빠르게 성장하고 있으며, 2016년 세계경제포럼(World Economic Forum) 의장 클라우스 슈밥(Klaus Schwab)부터 주창된 제4차 산업혁명로 인해 현재 물 산업의 패러다임 또한 급속히 변화하고 있다. 이는 컴퓨터를 기반으로 하는 CPS(Cyber Physical System) 및 DT(Digital Twin) 연계 분석방식의 혁신을 일컫는다. 2002년경에 DT의 기본개념이 제시되었고, 2006년경에는 Embedded System에서의 DT와 같은 개념으로 CPS의 용어가 등장했다. DT는 현실세계에 존재하는 사물, 시스템, 환경 등을 S/W시스템의 가상공간에 동일하게 모사(Virtualization) 및 모의(Simulation)할 수 있도록 하고, 모의결과를 가상시스템으로 현실세계를 최적화 체계 구현 기술을 말한다. DT의 6가지 기능은 ① 실제 데이터(Live Data), ② 모사, ③ 분석정보(Analytics), ④ 모의, ⑤ 예측(Predictions), ⑥ 자동화(Automation) 이다. 또한, CPS는 대규모 센서 및 액추에이터(Actuator)를 가지는 물리적 요소와 이를 실시간으로 제어하는 컴퓨팅 요소가 결합된 복합시스템을 말한다. CPS는 물리세계에서 발생하는 변화를 감지할 수 있는 다양한 센서를 통해 환경인지 기능을 수행한다. 센서로부터 수집된 정보와 물리세계를 재현 및 투영하는 고도화된 시스템 모델들을 기반으로 사이버 물리공간을 인지·분석·예측할 수 있다. CPS의 6가지 구성요소는 ① 상호 운용성(Interoperability), ② 가상화(Virtualization), ③ 분산화(Decentralization), ④ 실시간(Real-time Capability), ⑤ 서비스 오리엔테이션(Service Orientation), ⑥ 모듈화(Modularity)이다. DT와 CPS는 본질적으로 같은 목적, 내용, 그리고 결과를 만들어내고자 하는 같은 종류의 기술이라고 할 수 있다. CPS 및 DT는 물리세계에서 발생하는 변화를 감지할 수 있으며, 토양-지하수 센서를 포함한 관측기술을 통해 환경인지 기능을 수행한다. 지하수 관측기술로부터 수집된 정보와 물리세계를 재현 및 투영하는 고도화된 시스템 모델들을 기반으로 사이버 물리공간 및 디지털 트윈 공간을 인지·분석·예측할 수 있다. CPS 및 DT의 기본 요소들을 실현시키는 것은 양질의 데이터를 모니터링할 수 있는 정확하고 정밀한 1차원 연직 프로파일링 관측기술이며, 이를 토대로 한 수자원 관련 빅데이터의 증가, 빅데이터의 저장과 분석을 가능하게 하는 플랫폼의 개발이다. 본 연구는 CPS 및 DT 기반 토양수분-지하수 관측기술을 이용한 지표수-지하수 연계, 지하수 순환 및 관리, 정수 운영 및 진단프로그램 개발을 위한 토양수분-지하수 관측장치를 지하수 플랫폼 동시성과 디지털 트윈 시뮬레이터 시스템 개발 방향으로 제시하고자 한다.

  • PDF

Simulation-based Production Analysis of Food Processing Plant Considering Scenario Expansion (시나리오 확장을 고려한 식품 가공공장의 시뮬레이션 기반 생산량 분석)

  • Yeong-Hyun Lim ;Hak-Jong, Joo ;Tae-Kyung Kim ;Kyung-Min Seo
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.93-108
    • /
    • 2023
  • In manufacturing productivity analysis, understanding the intricate interplay among factors like facility performance, layout design, and workforce allocation within the production line is imperative. This paper introduces a simulation-based methodology tailored to food manufacturing, progressively expanding scenarios to analyze production enhancement. The target system is a food processing plant, encompassing production processes, including warehousing, processing, subdivision, packaging, inspection, loading, and storage. First, we analyze the target system and design a simulation model according to the actual layout arrangement of equipment and workers. Then, we validate the developed model reflecting the real data obtained from the target system, such as the workers' working time and the equipment's processing time. The proposed model aims to identify optimal factor values for productivity gains through incremental scenario comparisons. To this end, three stages of simulation experiments were conducted by extending the equipment and worker models of the subdivision and packaging processes. The simulation experiments have shown that productivity depends on the placement of skilled workers and the performance of the packaging machine. The proposed method in this study will offer combinations of factors for the specific production requirements and support optimal decision-making in the real-world field.

Metamodeling Construction for Generating Test Case via Decision Table Based on Korean Requirement Specifications (한글 요구사항 기반 결정 테이블로부터 테스트 케이스 생성을 위한 메타모델링 구축화)

  • Woo Sung Jang;So Young Moon;R. Young Chul Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.381-386
    • /
    • 2023
  • Many existing test case generation researchers extract test cases from models. However, research on generating test cases from natural language requirements is required in practice. For this purpose, the combination of natural language analysis and requirements engineering is very necessary. However, Requirements analysis written in Korean is difficult due to the diverse meaning of sentence expressions. We research test case generation through natural language requirement definition analysis, C3Tree model, cause-effect graph, and decision table steps as one of the test case generation methods from Korean natural requirements. As an intermediate step, this paper generates test cases from C3Tree model-based decision tables using meta-modeling. This method has the advantage of being able to easily maintain the model-to-model and model-to-text transformation processes by modifying only the transformation rules. If an existing model is modified or a new model is added, only the model transformation rules can be maintained without changing the program algorithm. As a result of the evaluation, all combinations for the decision table were automatically generated as test cases.

Cluster-based Delay-adaptive Sensor Scheduling for Energy-saving in Wireless Sensor Networks (센서네트워크에서 클러스터기반의 에너지 효율형 센서 스케쥴링 연구)

  • Choi, Wook;Lee, Yong;Chung, Yoo-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.47-59
    • /
    • 2009
  • Due to the application-specific nature of wireless sensor networks, the sensitivity to such a requirement as data reporting latency may vary depending on the type of applications, thus requiring application-specific algorithm and protocol design paradigms which help us to maximize energy conservation and thus the network lifetime. In this paper, we propose a novel delay-adaptive sensor scheduling scheme for energy-saving data gathering which is based on a two phase clustering (TPC). The ultimate goal is to extend the network lifetime by providing sensors with high adaptability to the application-dependent and time-varying delay requirements. The TPC requests sensors to construct two types of links: direct and relay links. The direct links are used for control and forwarding time critical sensed data. On the other hand, the relay links are used only for data forwarding based on the user delay constraints, thus allowing the sensors to opportunistically use the most energy-saving links and forming a multi-hop path. Simulation results demonstrate that cluster-based delay-adaptive data gathering strategy (CD-DGS) saves a significant amount of energy for dense sensor networks by adapting to the user delay constraints.

A Study on Intangible Impact of Personal Information Security Breach to Korean Firm's Value (개인정보 보안사고가 국내 기업의 가치에 미치는 비가시적 영향력에 관한 연구)

  • Lee, JongHyun;Kweon, SeongHo;Chang, Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.595-596
    • /
    • 2009
  • 정보화의 발전에 비례하여 정보보호의 중요성도 높아지고 있다. 최근까지 정보보호에 대한 관심과 주요 연구의 흐름은 기술적인 보호조치(예: 암호화, 접근제어, 방화벽 등)와 관리적 관점의 행동연구였다. 최근에 들어서야 국내외적으로 정보보호 투자효과에 대한 연구가 활성화되기 시작했다. 정보보호 투자효과에 대한 계량적 산정이 필요한 이유는 정보보호의 중요성을 정확하게 인식할 수 있어 적정규모의 예산을 책정하고 효율적으로 예산을 투입할 수 있는 기초를 마련할 수 있기 때문이다. 정보보호 투자효과를 측정하기 위한 선행연구로 보안사고의 피해규모를 산정하는 연구가 필수적이다. 보안사고의 피해규모는 가시적 손실(피해복구, 생산성 저하, 손해배상 등)과, 비가시적 손실(고객 충성도 저하, 회사의 브랜드 이미지 하락 등) 규모의 합으로 구성된다. 그 동안 가시적 손실규모 측정에 관한 연구는 상대적으로 많았으나, 비가시적 손실규모 측정에 관한 연구는 상대적으로 미흡하였던 것이 사실이다. 이는 현실적으로 비가시적 손실규모를 측정할 수 있는 접근방법을 고안해내는 것이 어려웠기 때문이다. 이로 인해 막연히 비가시적 손실규모가 가시적 손실규모에 비해 대단히 클 것이라고 짐작해 올 수 밖에 없었다. 본 논문에서는 보안사고의 비가시적 손실규모를 측정하기 위해 대규모 개인정보 보안 사고가 발생한 기업의 매출액 증가율을 경쟁기업과 분석하는 연구방법을 제안한다. 매출액은 영업이익 및 순이익과는 달리 회사 내부적인 회계방침에 의해 규모의 조절이 불가능한 재무요소이면서 회사가 고객 충성도 저하와 회사의 브랜드 이미지 하락으로 인해 받게 되는 영향을 가장 정확하게 반영하는 재무요소이기도 하다. 연구방법에 따라 2008년 대규모 개인정보 보안사고가 발생한 국내기업을 선정하고 그 경쟁사와 매출액 변화추이를 비교 분석하였다. 분석결과 보안사고가 발생한 기업의 평균 매출액 증가율이 경쟁사 평균 매출액 증가율 보다 0.0225% 높다는 사실을 발견했다. 이 결과는 국내의 보안 사고가 기업 가치에 미치는 비가시적 영향이 거의 없거나 또는 발생하더라도 그 영향력이 미미하여 가격정책 및 광고 홍보를 통해 충분히 극복할 수 있다는 점을 대변한다. 본 논문의 결과는 역설적으로 국내 보안사고의 피해규모를 측정하는데 있어 가시적 손실규모의 정확한 측정이 무엇보다 중요함을 의미한다.

Shielding Performance of PLA and Tungsten Mixture using Research Extruder (연구용 압출기를 활용한 PLA와 텅스텐 혼합물의 차폐 성능)

  • Do-Seong Kim;Tae-Hyung Kim;Myeong-Seong Yoon;Sang-Hyun Kim
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.4
    • /
    • pp.557-564
    • /
    • 2023
  • In this study, 3D printing technology was used to compensate for the shortcomings of the use of lead, which has proven to have excellent shielding performance, and to control unnecessary human exposure. 3D printers can implement three-dimensional shapes and can immediately apply individual ideas, which has great advantages in maintaining technology supplementation while reducing the cost and duration of prototyping. Among the various special 3D printers, the FDM method was adopted, and the filament used for output was manufactured using a research extruder by mixing two materials, PLA (Poly-Lactic-Acid) and tungsten. The purpose was to verify the validity through dose evaluation and to provide basic information on the production of chapezones of various materials. The mixed filament was implemented as a morphological shield. Filaments made of a research extruder by mixing PLA and tungsten were divided into 10 %, 20 %, 30 %, 40 %, and 50 % according to the tungsten content ratio. Through the process of 3D Modeling, STL File storage, G-code generation, and output, 10 cm × 10 cm × 0.5 cm was manufactured, respectively, and dose and shielding ability were evaluated under the conditions of tube voltages of 60 kVp, 80 kVp, 100 kVp, 120 kVp, and tube currents of 20 mAs and 40 mAs.

Efficient Multicasting Mechanism for Mobile Computing Environment Machine learning Model to estimate Nitrogen Ion State using Traingng Data from Plasma Sheath Monitoring Sensor (Plasma Sheath Monitoring Sensor 데이터를 활용한 질소이온 상태예측 모형의 기계학습)

  • Jung, Hee-jin;Ryu, Jinseung;Jeong, Minjoong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.27-30
    • /
    • 2022
  • The plasma process, which has many advantages in terms of efficiency and environment compared to conventional process methods, is widely used in semiconductor manufacturing. Plasma Sheath is a dark region observed between the plasma bulk and the chamber wall surrounding it or the electrode. The Plasma Sheath Monitoring Sensor (PSMS) measures the difference in voltage between the plasma and the electrode and the RF power applied to the electrode in real time. The PSMS data, therefore, are expected to have a high correlation with the state of plasma in the plasma chamber. In this study, a model for predicting the state of nitrogen ions in the plasma chamber is training by a deep learning machine learning techniques using PSMS data. For the data used in the study, PSMS data measured in an experiment with different power and pressure settings were used as training data, and the ratio, flux, and density of nitrogen ions measured in plasma bulk and Si substrate were used as labels. The results of this study are expected to be the basis of artificial intelligence technology for the optimization of plasma processes and real-time precise control in the future.

  • PDF

Personalized Speech Classification Scheme for the Smart Speaker Accessibility Improvement of the Speech-Impaired people (언어장애인의 스마트스피커 접근성 향상을 위한 개인화된 음성 분류 기법)

  • SeungKwon Lee;U-Jin Choe;Gwangil Jeon
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.17-24
    • /
    • 2022
  • With the spread of smart speakers based on voice recognition technology and deep learning technology, not only non-disabled people, but also the blind or physically handicapped can easily control home appliances such as lights and TVs through voice by linking home network services. This has greatly improved the quality of life. However, in the case of speech-impaired people, it is impossible to use the useful services of the smart speaker because they have inaccurate pronunciation due to articulation or speech disorders. In this paper, we propose a personalized voice classification technique for the speech-impaired to use for some of the functions provided by the smart speaker. The goal of this paper is to increase the recognition rate and accuracy of sentences spoken by speech-impaired people even with a small amount of data and a short learning time so that the service provided by the smart speaker can be actually used. In this paper, data augmentation and one cycle learning rate optimization technique were applied while fine-tuning ResNet18 model. Through an experiment, after recording 10 times for each 30 smart speaker commands, and learning within 3 minutes, the speech classification recognition rate was about 95.2%.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.