• Title/Summary/Keyword: MAL

Search Result 899, Processing Time 0.031 seconds

IAEA Concept for Exemption and Clearance

  • Kim, Jeong-Guk;Jang, Won Hyuk;Yoo, MalGoBalGaeBitNaLa;Choi, Yujeong;Kim, Jongjin;Chang, Seeun;Park, Hee-Seoung;Hong, Dae-Seok
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2019.05a
    • /
    • pp.41-42
    • /
    • 2019
  • PDF

CFD Analysis on Gas Injection System of Solid SCR for NOx Reduction of Exhaust Emissions in Diesel Engine (디젤엔진 배출가스의 질소산화물 저감을 위한 Solid SCR용 가스분사 시스템의 전산유체해석 연구)

  • Lee, Hoyeol;Yoon, Cheon Seog;Kim, Hongsuk
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.22 no.5
    • /
    • pp.73-83
    • /
    • 2014
  • CFD(computational fluid dynamics) model is developed to simulate direct injection of ammonia gas phase from ammonia transporting materials into the SCR catalyst in the exhaust pipe of the engine with solid SCR. Configurations of one-hole and four-hole nozzle, circumferential type, porous tube type, and the effect of mixer configurations which commonly used in liquid injection of AdBlue are considered for complex geometries. Mal-distribution index related to concentration of ammonia gas, flow uniformity index related to velocity distribution, and pressure drop related to flow resistance are compared for different configurations of complex geometries at the front section of SCR catalyst. These results are used to design the injection system of ammonia gas phase for solid SCR of target vehicle.

Malicious Application Determination Using the System Call Event (시스템 콜 이벤트 분석을 활용한 악성 애플리케이션 판별)

  • Yun, SeokMin;Ham, YouJeong;Han, GeunShik;Lee, HyungWoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.169-176
    • /
    • 2015
  • Recently smartphone market is rapidly growing and application market has also grown significantly. Mobile applications have been provided in various forms, such as education, game, SNS, weather and news. And It is distributed through a variety of distribution channels. Malicious applications deployed with malicious objectives are growing as well as applications that can be useful in everyday life well. In this study, Events from a malicious application that is provided by the normal application deployment and Android MalGenome Project through the open market were extracted and analyzed. And using the results, We create a model to determine whether the application is malicious. Finally, model was evaluated using a variety of statistical method.