• Title/Summary/Keyword: 차량 안전

Search Result 2,291, Processing Time 0.028 seconds

Quantitative Analysis of Fuel in Engine Oil (엔진오일 내 연료성분 정량분석)

  • Lim, Young-Kwan;Kim, Jiyeon;Na, Yong-Gyu;Kim, Jong-Ryeol
    • Applied Chemistry for Engineering
    • /
    • v.28 no.6
    • /
    • pp.714-719
    • /
    • 2017
  • The contaminated engine oil by fuel can intimidate driver safety due to vehicle problems such as engine abrasion, fire and sudden unintended acceleration. In this study, we investigate various functional properties of the engine oil contaminated with fuel. The test results indicated that the engine oil contaminated with fuel had relatively low values of the flash point, pour point, density, kinematic viscosity and cold cranking simulator. Furthermore, a four ball test suggested that the contaminated engine oil increased wear scar due to the poor lubricity. Moreover, SIMDIST (simulated distillation) using ASTM D2887 was applied to analyze fuel characteristics in an engine oil. The SIMDIST analysis result showed a lower carbon number, and the fuel was detected at an earlier retention time than that of using engine oil in chromatogram. Also, it is possible to quantitatively analyze for fuel contents in the engine oil. The SIMDIST method for the diagnosis of oil conditions can be used whether the fuel was involved or not, instead of analyzing other physical properties that require various analytical instruments, large volumes of oil samples, and long analysis time.

Study on the Next Disaster Safety Communication Network in M2M Communication (사물지능통신을 이용한 차세대 재난안전통신망에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.585-590
    • /
    • 2011
  • In the past few years, M2M (Machine-to-Machine) applications have become a hot topic in the wireless industry. While M2M applications can be used for many purposes (smart homes, smart metering/electricity meter reading, fleet management, mobile workforce, automobile insurance, vending machines, etc), and in many sectors (healthcare, agriculture, commercial, industrial, retail, utility, etc.), smart metering applications or smart grids present the biggest growth potential in the M2M market today. M2M platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. The promising technologies to tackle these problems are the Semantic technologies, for interoperability, and the Agent technologies for management of complex systems. In this paper the information communication technique based on the disaster prevention system's for the M2M, concepts and its requirement technology and application are studied.

A Study on Systems Engineering Based Compliance Procedure for A-SMGCS (시스템 엔지니어링을 적용한 A-SMGCS 적합성 검증 방안 연구)

  • Seol, Eun-Suk;Kim, Sang-Hun;Ku, Sung-Kwan;Cho, Jeong-Hyun
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.33-40
    • /
    • 2015
  • Advanced surface movement guidance and control system (A-SMGCS) is a system providing routing, guidance and surveillance for the control of aircraft and vehicles in order to maintain the predetermined surface movement rate under all weather conditions while maintaining the required level of safety. In the present study, system engineering was introduced to develop the compliance procedure for the A-SMGCS. At first, requirements for the level IV A-SMGCS were defined and analyzed from the concept of operations (CONOPS). Then, system architecture and specifications were constructed through the functional analysis and allocation. After that, work breakdown structure (WBS) and related integrated master schedule (IMS) were established. Lastly, compliance checklist (CCL) and test and evaluation master plan (TEMP) were developed to verify and validate the system.

Design and Implementation of Charger Monitoring System Based on CAN Protocol (CAN 통신 기반 충전 모니터링 시스템 설계 및 구현)

  • Choo, Yeon-Gyu;Kim, Hyun-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.541-548
    • /
    • 2012
  • On this paper, we proposed a design rule of charger monitoring system which allow us to watch the charging status and verify it for building the electric chargers infrastructure by spread of electric vehicle. Gathering the charging status of battery by proposed system makes us to enhance the charging algorithm, to interface with BMS(Battery Management System) of electric vehicle, to control the charging process with users. Because the technology of rapid charging is dependant upon various factors such as a performance and stability of battery. We proposed the monitoring system of rapid charger based on CAN protocol that can watch a working status of rapid charger including the charging status of battery with real time and can reduce the charging time of battery with optimized status. We also implement it and evaluate its performance.

A Design of MAC based SDAP(Secure Data Aggregation Protocol) for security and communication efficiency on VANET (VANET에서 보안과 통신효율을 고려한 MAC기반 SDAP(Secure Data Aggregation Protocol) 설계)

  • Lee, Byung-kwan;Ahn, Heui-hak;Jeong, Eun-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.650-652
    • /
    • 2013
  • As VANET(Vehicular Ad-hoc NETwork) improves road safety, efficiency, and comfort, and provides a value-added service such as commerce information or internet access. it is the most important technology in ITS(Intelligent Transportation System). But, In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. VANETs cannot get started without either of them. Therefore, to solve these problems simultaneously, this paper proposes MAC(Message Authentication Code) based SDAP(Secure Data Aggregation Protocol) which removes redundant data or abnormal data between vehicles and verifies the integrity of message. The MAC based SDAP not only improves the efficiency of data delivery but also enhances the security by detecting malicious attacks such as propagation jamming attack, forgery attack, and disguised attack.

  • PDF

Optimal path planning and analysis for the maximization of multi UAVs survivability for missions involving multiple threats and locations (다수의 위협과 복수의 목적지가 존재하는 임무에서 복수 무인기의 생존율 극대화를 위한 최적 경로 계획 및 분석)

  • Jeong, Seongsik;Jang, Dae-Sung;Park, Hyunjin;Seong, Taehyun;Ahn, Jaemyung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.6
    • /
    • pp.488-496
    • /
    • 2015
  • This paper proposes a framework to determine the routes of multiple unmanned aerial vehicles (UAVs) to conduct multiple tasks in different locations considering the survivability of the vehicles. The routing problem can be formulated as the vehicle routing problem (VRP) with different cost matrices representing the trade-off between the safety of the UAVs and the mission completion time. The threat level for a UAV at a certain location was modeled considering the detection probability and the shoot-down probability. The minimal-cost path connecting two locations considering the threat level and the flight distance was obtained using the Dijkstra algorithm in hexagonal cells. A case study for determining the optimal routes for a persistent multi-UAVs surveillance and reconnaissance missions given multiple enemy bases was conducted and its results were discussed.

Comparative Analysis on the Delay of Rotary and Roundabout by Operational Type (로터리와 회전교차로 운영방식별 지체 비교분석)

  • Park, Byung-Ho;Kim, Kyung-Hwan
    • International Journal of Highway Engineering
    • /
    • v.14 no.2
    • /
    • pp.83-91
    • /
    • 2012
  • This study deals with the operational efficiency of roundabout. The roundabouts generally have such the merits as high capacity, delay reduction, safety improvement, and others. Circular intersection can be divided into the rotary and roundabout according to travelling priority. The objective of this study is to comparatively analyze the operational efficiency of rotary and roundabout by scenario. In pursuing the above, this study gives the particular attentions to developing 256 scenarios according to the directional and entering traffic volume and analyzing the delay using VISSIM. The main results are as follows. First, the average delay of rotary was analyzed to be 1.56-8.74 times of roundabout. Second, the operational efficiencies of rotary and roundabout were analyzed to be better in the case of bigger differences in the traffic volumes between the main and minor roads. Third, the average delay of the 4-legged was evaluated to be 1.77-11.70 times of 3-legged intersection. Finally, 2-lane intersection (3-legged & 4-legged) was analyzed to be 2.02-2.23 times of 1-lane intersection.

Study About the Evaluation of Driving Stability Using 3-axis Accelerometer Test (3축 가속도 시험을 통한 도로 노면의 주행 안정성 평가에 대한 연구)

  • Lee, Dong-Hyun;Kim, Ji-Won;Mun, Sung-Ho;Jeong, Won-Seok
    • International Journal of Highway Engineering
    • /
    • v.14 no.3
    • /
    • pp.141-149
    • /
    • 2012
  • This paper attempts to evaluate driving stability by the vibration of human body. The purpose of this research is to establish an evaluation methodology for controling the quality of road surface. The study was conducted to investigate the relationship between road surface profiles (IRI, International Roughness Index) and the fatigue caused by the vibration of human body. Furthermore, 3-axis acceleration in driving vehicles was examined based on sampling sections under various road conditions. The acceleration value of frequency bands were analyzed by the characteristics of road surface, and realized the range of human influence by conditions and type of road surface with ISO-2631 standards. In general, more human fatigue by vehicle vibration was appeared in concrete pavements with high IRIs based on the analysis from given test data. Whereas, The SMA asphalt pavement and the diamond grinded concrete pavement reduce the human fatigue.

Study on Subsurface Collapse of Road Surface and Cavity Search in Urban Area (도심지 노면하부 지반함몰 및 공동탐사 사례 연구)

  • Chae, Hwi-Young
    • Tunnel and Underground Space
    • /
    • v.27 no.6
    • /
    • pp.387-392
    • /
    • 2017
  • Recently, road cave-ins, also referred to as ground sinking, have become a problem in urban environments. Public utility facilities such as sewage pipelines, communications pipes, gas pipes, power cables, and other types of underground structures are installed below the roads. It was reported that cave-ins are caused by the aging and lack of proper maintenance of underground facilities, as well as by construction problems. A road cave-in is first initiated by the formation of cavities typically induced by the breakage of underground pipelines. The cavities then grow and reach the base of the pavement. The traffic load applied at the surface of the roads causes an abrupt plastic deformation. This type of accident can be considered as a type of disaster. A road cave-in can threaten both human safety and the economy. It may even result in the loss of human life. In the city of Seoul, efforts to prevent damage before cave-ins occur have been prioritized, through a method of discovering and repairing joints through the 3D GPR survey.

A Study on EAP-AKA Authentication Architecture for WiBro Wireless Network (EAP-AKA를 적용한 WiBro 무선 네트워크의 인증구조 연구)

  • Lim Sun-Hee;Yi Ok-Yeon;Jun Sung-Ik;Han Jin-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.441-450
    • /
    • 2006
  • WiBro(Portable Internet Service) is service being capable to provide a high data rate wireless internet access with Personal Subscriber Station under the stationary or mobile environment, anytime and any where. It will fill the gap between very high data rate wireless local area networks and very high mobility cellular systems. The security is an important point of WiBro providing high data and mobile wireless services. This paper proposes user authentication mechanism of WiBro wireless networks applied EAP-AKA authentication protocol. As a result of Wireless authentication based on EAP-AKA, this mechanism is capable to be used in WiBro-WLAN-3GPP interworking scenario as well as the WiBro authentication mechanism.