• Title/Summary/Keyword: ETRi

Search Result 9,901, Processing Time 0.036 seconds

A Study on Analyzing the Validity between the Predicted and Measured Concentrations of VOCs in the Atmosphere Using the CalTOX Model (CalTOX 모델에 의한 휘발성유기화합물의 대기 중 예측 농도와 실측 농도간의 타당성 분석에 관한 연구)

  • Kim, Ok;Lee, Minwoo;Park, Sanghyun;Park, Changyoung;Song, Youngho;Kim, Byeongbin;Choi, Jinha;Lee, Jinheon
    • Journal of Environmental Health Sciences
    • /
    • v.46 no.5
    • /
    • pp.576-587
    • /
    • 2020
  • Objectives: This study calculated local residents exposures to VOCs (Volatile Organic Compounds) released into the atmosphere using the CalTOX model and carried out uncertainty analysis and sensitivity analysis. The model validity was analyzed by comparing the predicted and the actual atmospheric concentrations. Methods: Uncertainty was parsed by conducting a Monte Carlo simulation. Sensitivity was dissected with the regression (coefficients) method. The model validity was analyzed by applying r2 (coefficient of determination), RMSE (root mean square error), and the Nash-Sutcliffe EI (efficiency index) formula. Results: Among the concentrations in the atmosphere in this study, benzene was the highest and the lifetime average daily dose of benzene and the average daily dose of xylene were high. In terms of the sensitivity analysis outcome, the source term to air, exposure time, indoors resting (ETri), exposure time, outdoors at home (ETao), yearly average wind speed (v_w), contaminated area in ㎡ (Area), active breathing rate (BRa), resting breathing rate (BRr), exposure time, and active indoors (ETai) were elicited as input variables having great influence upon this model. In consequence of inspecting the validity of the model, r2 appeared to be a value close to 1 and RMSE appeared to be a value close to 0, but EI indicated unacceptable model efficiency. To supplement this value, the regression formula was derived for benzene with y=0.002+15.48x, ethylbenzene with y ≡ 0.001+57.240x, styrene with y=0.000+42.249x, toluene with y=0.004+91.588x, and xylene with y=0.000+0.007x. Conclusions: In consequence of inspecting the validity of the model, r2 appeared to be a value close to 1 and RMSE appeared to be a value close to 0, but EI indicated unacceptable model efficiency. This will be able to be used as base data for securing the accuracy and reliability of the model.

Technological Convergence Trend through Patent Network Analysis: Focusing on Patent Data in Korea, U.S., Europe, and Japan (특허 네트워크 분석을 통한 융합 기술 트렌드 분석: 한국.미국.유럽.일본의 특허데이터를 중심으로)

  • Baek, Hyun Mi;Kim, Myung Seuk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.11-19
    • /
    • 2013
  • Many companies are developing a numerous number of new products and business models for their sustainable growth. First, their unique technological capability needs to be obtained to develop new products and services. However, as the applicable period of a technology into its industrialization becomes shorter and shorter, the necessity of technological convergence is increasing. Therefore, this study aims to look at the patent status in Korea for the last ten years to analyze in which direction technological convergence had advanced and further compare the patent status in Korea with that in U.S., Europe, and Japan. In addition, this study looks at the impact of converged patent technology on the sales in relevant industries. To this end, this study collected 5,000 patents applied from 2000 to 2009 for the last ten years in Korea, U.S., and Europe every year and conducted network analysis by using UCINET, social network analysis program. In this study, we drew our research findings as follows: First, we could find that technological convergence increased over time and what technology was in the center of fusion. Second, our correlation analysis found that as we had more technological convergence, it was more related to the sales in relevant industries.

  • PDF

Image Reconstruction of Eigenvalue of Diffusion Principal Axis Using Diffusion Tensor Imaging (확산텐서영상을 이용한 확산 주축의 고유치 영상 재구성)

  • Kim, In-Seong;Kim, Joo-Hyun;Yeon, Gun;Suh, Kyung-Jin;Yoo, Don-Sik;Kang, Duk-Sik;Bae, Sung-Jin;Chang, Yong-Min
    • Investigative Magnetic Resonance Imaging
    • /
    • v.11 no.2
    • /
    • pp.110-118
    • /
    • 2007
  • Purpose: The objective of this work to construct eigenvalue maps that have information of magnitude of three primary diffusion directions using diffusion tensor images. Materials and Methods: To construct eigenvalue maps, we used a 3.0T MRI scanner. We also compared the Moore-Penrose pseudo-inverse matrix method and the SVD (single value decomposition) method to calculate magnitude of three primary diffusion directions. Eigenvalue maps were constructed by calculating of magnitude of three primary diffusion directions. We did investigate the relationship between eigenvalue maps and fractional anisotropy map. Results: Using Diffusion Tensor Images by diffusion tensor imaging sequence, we did construct eigenvalue maps of three primary diffusion directions. Comparison between eigenvalue maps and Fractional Anisotropy map shows what is difference of Fractional Anisotropy value in brain anatomy. Furthermore, through the simulation of variable eigenvalues, we confirmed changes of Fractional Anisotropy values by variable eigenvalues. And Fractional anisotropy was not determined by magnitude of each primary diffusion direction, but it was determined by combination of each primary diffusion direction. Conclusion: By construction of eigenvalue maps, we can confirm what is the reason of fractional anisotropy variation by measurement the magnitude of three primary diffusion directions on lesion of brain white matter, using eigenvalue maps and fractional anisotropy map.

  • PDF

Construction of real-time remote ship monitoring system using Ka-band payload of COMS (천리안 위성통신을 이용한 실시간 원격 선박 모니터링 체계 구축)

  • Jeong, Jaehoon;Kim, Tae-Ho;Yang, Chan-Su
    • Korean Journal of Remote Sensing
    • /
    • v.32 no.3
    • /
    • pp.323-330
    • /
    • 2016
  • Communication, Ocean and Meteorological Satellite (COMS) was launched in 2010 with three payloads that include Ka-band communication payload developed by Ministry of Science, ICT and Future Planning (MSIP) and Electronics and Telecommunications Research Institute (ETRI). This study introduces a real-time remote vessel monitoring system built in the Socheongcho Ocean Research Station using the Ka-band communication satellite. The system is composed of three steps; real-time data collection, transmission, and processing/visualization. We describe hardware (H/W) and software systems (S/W) installed to perform each step and the whole procedure that made the raw data become vessel information for a real-time ocean surveillance. In addition, we address functional requirements of H/W and S/W and the important considerations for successful operation of the system. The system is now successfully providing, in near real-time, ship information over a VHF range using AIS data collected in the station. The system is expected to support a rapid and effective surveillance over a huge oceanic area. We hope that the concept of the system can be fully used for real-time maritime surveillance using communication satellite in future.

Change of Schottky barrier height in Er-silicide/p-silicon junction (어븀-실리사이드/p-형 실리콘 접합에서 쇼트키 장벽 높이 변화)

  • Lee, Sol;Jeon, Seung-Ho;Ko, Chang-Hun;Han, Moon-Sup;Jang, Moon-Gyu;Lee, Seong-Jae;Park, Kyoung-Wan
    • Journal of the Korean Vacuum Society
    • /
    • v.16 no.3
    • /
    • pp.197-204
    • /
    • 2007
  • Ultra thin Er-silicide layers formed by Er deposition on the clean p-silicon and in situ post annealing technique were investigated with respect to change of the Schottky barrier height. The formation of Er silicides was confirmed by XPS results. UPS measurements revealed that the workfunction of the silicide decreased and was saturated as the deposited Er thickness increased up to $10{\AA}$. We found that the silicides were mainly composed of Er5Si3 phase through the XRD experiments. After Schottky diodes were fabricated with the Er silicide/p-Si junctions, the Schottky barrier heights were calculated $0.44{\sim}0.78eV$ from the I-V measurements of the Schottky diodes. There was large discrepancy in the Schottky barrier heights deduced from the UPS with the ideal junction condition and the real I-V measurements, so that we attributed the discrepancy to the $Er_5Si_3$ phase in the Er-silicides and the large interfacial density of trap state of it.

A Method to Reduce the Size of Amplifiers using Defected Ground Structure (결합된 접지 구조를 이용한 증폭기의 소형화 방법)

  • Lim, Jong-Sik;Park, Jun-Seok;Kim, Chul-Soo;Lee, Young-Tak;Ahn, Dal;Nam, Sang-Wook
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.5
    • /
    • pp.436-444
    • /
    • 2002
  • This paper presents a new method, which uses defected ground structure (DGS) on the ground planes of planar transmission lines such as microstrip and coplanar waveguide (CPW), to reduce the size of amplifiers. The main idea can be summarized as follow; DGS on the ground plane of microstrip or CPW line shows an increased slow-wave effect due to the additional equivalent L-C components. So the electrical length of the transmission line with DGS is longer than that of the standard transmission line for the same physical length. Then, the length of the transmission line with DGS can be shortened in order to maintain the original electrical length to be the same. This leads the matching of the original amplifier to be kept. In order to show the proposed method is valid, two kinds of amplifiers, the original amplifier and reduced amplifier, are fabricated, measured, and compared using both microstrip and CPW. The measured performances of the reduced amplifiers with DGS are quite similar to the ones of the original amplifiers for both microstrip and CPW amplifiers, even though the size of matching networks of the amplifiers with DGS are much smaller than those of the original amplifiers.

The Distributed Authentication and Key Exchange Protocols for Smartcard (스마트카드에 적용가능한 분산형 인증 및 키 교환 프로토콜)

  • Oh Heung-Ryongl;Yoon Ho-Sun;Youm Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.17-30
    • /
    • 2005
  • A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.

  • PDF

Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace (부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격)

  • Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1079-1087
    • /
    • 2018
  • Binary scalar multiplication which is the main operation of elliptic curve cryptography is vulnerable to the side-channel analysis. Especially, it is vulnerable to the side-channel analysis which uses power consumption and electromagnetic emission patterns. Thus, various countermeasures have been studied. However, they have focused on eliminating patterns of data dependent branches, statistical characteristic according to intermediate values, or the interrelationships between data. No countermeasure have been taken into account for the secure design of the key bit check phase, although the secret scalar bits are directly loaded during that phase. Therefore, in this paper, we demonstrate that we can extract secret scalar bits with 100% success rate using a single power or a single electromagnetic trace by performing key bit-dependent attack on hardware implementation of binary scalar multiplication algorithm. Experiments are focused on the $Montgomery-L{\acute{o}}pez-Dahab$ ladder algorithm protected by scalar randomization. Our attack does not require sophisticated pre-processing and can defeat existing countermeasures using a single-trace. As a result, we propose a countermeasure and suggest that it should be applied.

Research Institutes Network Analysis on the Established Research Equipment : Ministry of Knowledge Economy R&D Business Project (연구장비 구축 연구기관 네트워크 분석 : 지식경제부 R&D 사업 대상)

  • Ham, Myoung-In;Lee, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.307-317
    • /
    • 2013
  • This study aims to investigate the research equipment establishing relationship by looking at research equipment information transfer that follows the network's structural and positional characteristics and the research institute's responsibilities to increase the possibility of research equipment usage by using the SNA(Social Network Analysis) method. Consequently, with the given structural characteristics of research institute, it can be concluded that because of its low density, it appears to be difficult to transfer research equipment information within the network. Government-funded research institutes that can effectively deliver research equipment information within the network system through comparison positional characteristics are ETRI, KITECH, KRICT, Sungkyungwan University, and Kyungbook National University. In addition, a virtualization node not only invigorates the network system but also acts as an intermediary factor to effectively deliver research equipment information. As results, there can be three conceivable alternatives to increase the possibility of research equipment usage. Those includes: 1. policy to encourage relationship building among research institutes 2. utilizing suitable institutes for effective delivery of research equipment information and lastly, 3. establishing a virtual intermediary institute for information sharing and utilization of isolated institutes' research equipments.

An Analysis of Optimal Sequences for the Detection of Wake-up Signal in Disaster-preventing Broadcast (재난방송용 대기모드 해제신호 검출을 위한 최적 부호 성능 분석)

  • Park, Hae Yong;Jo, Bonggyun;Kim, Heung Mook;Han, Dong Seog
    • Journal of Broadcast Engineering
    • /
    • v.19 no.4
    • /
    • pp.491-501
    • /
    • 2014
  • Recently, the need for disaster-preventing broadcast has increased gradually to cope with natural disaster like earthquake and tsunami causing enormous losses of both life and property. In disaster-preventing broadcast system, the wake-up signal is used to alert user terminal and switch the current state of channel to the emergency channel, which is for the fast and efficient delivery of emergency information. In this paper, we propose the detection method of wake-up signal for disaster-preventing broadcast systems. The wake-up signals for disaster-preventing broadcast should have a good auto-correlation property in low power and narrow-band conditions that does not affect the existing digital television (DTV) system. The suitability of the m-sequence and complementary code (CC) is analyzed for wake-up signals according to signal to noise ratio. A wake-up signal is proposed by combining the direct sequence spread spectrum (DSSS) technique and pseudo noise (PN) sequences such as Barker and Walsh-Hadamard codes. By using the proposed method, a higher detecting performance can be achieved by the spreading gain compared to the single long m-sequence and the Golay code.