• 제목/요약/키워드: Performance of protecting

검색결과 292건 처리시간 0.024초

A Study on the Fluoro-polymer Composite Coatings for Protecting the Corrosion of Fossil-fuel Power Plants

  • Kang, Min Soo;Lee, Byung Seung;Chang, Hyun Young;Jin, Tae Eun;So, Il Soo
    • Corrosion Science and Technology
    • /
    • 제6권2호
    • /
    • pp.62-67
    • /
    • 2007
  • Several heavy duty coatings at an every kind industry facilities to various systems currently have been applied review to the many industry fields. Corrosion-protective characteristics in the case of novolac epoxy among them and unsaturated polyester have been applied most widely. epoxy and flake heavy duty coatings are applied for such reason in an every kind facilities(stack, FGD, cooler, chemical tank etc) of a fossil-fuel power plants Cases of the fossil-fuel power plants are exposed to more severe corrosion environment compared with other facilities and It is difficult to display the performance of long-term method at apply to be the partial. Our study shows fluoro-polymer composite coating method to overcome of the limit. The comparison did previous method and heavy duty coating about FGD plants most at a corrosion environment among fossil-fuel power plants. Additionally, other facilities examined different heavy duty method. The design mode of fluoro-polymer composite coating according to an every kind facilities show extensive methods that are characteristic revelation of film(top, middle and primer layer) composition of the paint, film thickness in accordance with a facilities corrosion and the corrosion protective effectiveness to come into being use fluoro-polymer composite with heavy duty paint(epoxy).

전력시스템 보호를 위한 정밀 시각 동기 적용 HW/SW 플랫폼 기술 (Precision time sync. HW/SW platform for power system protection)

  • 남경덕;손규정;장태규;강상희
    • 전기전자학회논문지
    • /
    • 제22권4호
    • /
    • pp.1036-1043
    • /
    • 2018
  • 본 논문에서는 IEC 61850 및 IEEE c37.238 표준 기반 정밀 시각 동기 적용 HW/SW 통합 플랫폼을 통한 미래 전력시스템 보호 기술을 제시하였다. 제시한 통합 플랫폼의 구현 성능을 확인하기 위해 표준에서 요구하는 시각 동기의 정밀성과 지연 시간을 만족하도록 하는 EVM(Evaluation Module) 예제를 구성하였다. 이를 실제 EVM과 네트워크 스위치로 이루어진 형태로 구현하여 동작 시험을 수행하였고, 본 논문에서 제시한 플랫폼이 시각 동기 표준에서 요구하는 수준의 시각 동기 오차와 전력시스템 보호에서 요구하는 수준의 지연 시간을 만족하는 미래 전력시스템 통합 IED(Intelligent Electronic Device) HW/SW 기술임을 확인하였다.

TTG블록의 교각국부세굴에 대한 수리모형 성능평가 (Hydraulic Model Test on Local Scour Protecting around Bridge Piers with TTG Blocks)

  • 박현주;지정환
    • 한국방재학회 논문집
    • /
    • 제10권6호
    • /
    • pp.165-174
    • /
    • 2010
  • 블록 TTG를 이용한 교각국부세굴보호공의 적합성과 유효성을 확인하기 위해 수리모형실험을 통해 모형 블록의 조도계수를 확인하고 안전성을 검토하였다. 현장조건을 대표하는 수리학적 조건하에서 개별 블록과 블록을 연결하여 매트화한 경우의 한계 안전중량을 결정하였다. 사석, 돌망태, TTG의 세굴보수공 성능을 비교한 결과 TTG의 안전성이 가장 우수하였다. 하상재료의 유출을 막기 위해 블록의 중간 부분을 적정한 자갈로 채우고, 토목섬유의 설치 여부를 검토하여야 한다.

천장구조를 이용한 공동주택 바닥충격음 차단성능 개선에 관한 실험적 연구 (An Experimental Study on the Improvement Floor Impact Sound Insulation by Ceiling Structure in Apartment Houses)

  • 백은선
    • KIEAE Journal
    • /
    • 제7권1호
    • /
    • pp.95-100
    • /
    • 2007
  • In apartment houses, said to be similar to a typical housing form, every household share the walls and floors. Many problems inevitably accompany such as an arrangement, as noise and vibration are shared among households. When investigating the percentage of apartment resident's dissatisfaction with housing environments, discontent due to noise ranks the highest. Among many different kinds of noises, noise such as floor crashing sounds show the highest indication rate in the residents' comparison of discontent. Therefore, it is the practice of insulating against noises such as floor crashing sounds that improves the apartment house environments. The factors influencing the floor impact sound insulation include floor finishing materials, shock absorbing floors (slabs included), and ceiling structures. The ceilings of the apartment houses, currently built in Korea, are set up with lower parts of slabs and paper finishing, or with double floors for protecting against floor impact sounds in order to improve the sound insulating performance. The most common the method of ceiling structure construction consists of 'wood boarded frames +Gypsum boards + ceiling papers', which is called the wood boarded frame method. This study aimed to measures and evaluates floor impact sound insulation by which the ceiling space are widened according to suppression system is added in apartment house ceiling structure.

Enhancing the Robustness and Efficiency of Scale-free Network with Limited Link Addition

  • Li, Li;Jia, Qing-Shan;Guan, Xiaohong;Wang, Hengtao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권5호
    • /
    • pp.1333-1353
    • /
    • 2012
  • The robustness of a network is usually measured by error tolerance and attack vulnerability. Significant research effort has been devoted to determining the network design with optimal robustness. However, little attention has been paid to the problem of how to improve the robustness of existing networks. In this paper, we investigate how to optimize attack tolerance and communication efficiency of an existing network under the limited link addition. A survival fitness metric is defined to measure both the attack tolerance and the communication efficiency of the network. We show that network topology reconfiguration optimization with limited link addition (NTRLA) problem is NP-hard. Two approximate solution methods are developed. First, we present a degree-fitness parameter to guide degree-based link addition method. Second, a preferential configuration node-protecting cycle (PCNC) method is developed to do trade-off between network robustness and efficiency. The performance of PCNC method is demonstrated by numerical experiments.

AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran;Jia, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2052-2072
    • /
    • 2012
  • Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access Control model for Emergences (AC4E) for mission-critical CPSs. The principal aim of AC4E is to control the criticalities in these systems by executing corresponding responsive actions. AC4E not only provides the ability to control access to data and services in normal situations, but also grants the correct set of access privileges, at the correct time, to the correct set of subjects in emergency situations. It can facilitate adaptively responsive actions altering the privileges to specific subjects in a proactive manner without the need for any explicit access requests. A semiformal validation of the AC4E model is presented, with respect to responsiveness, correctness, safety, non-repudiation and concurrency, respectively. Then a case study is given to demonstrate how the AC4E model detects, responds, and controls the emergency events for a typical CPS adaptively in a proactive manner. Eventually, a wide set of simulations and performance comparisons of the proposed AC4E model are presented.

A Study on the Anomalous Traffic Handling

  • 이근수;김세헌
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2004년도 추계학술대회 및 정기총회
    • /
    • pp.619-622
    • /
    • 2004
  • For recent years, hacking is in the trends of making excessive traffic unnecessarily to obstruct the service by getting a system's performance down. And we can also see systems paralyzed in service ability due to the flash crowds of normal traffic to a popular website. This is an important problem certainly solved in the point of QoS guarantee for the clients. It is known that the former is DDoS(Distributed Denial of Service) attack and the latter is FE(Flash Event). These two are samely anomalous traffic because these make excessive congestion on the network or system and downgrade the system's service ability. In this paper, we propose a scheme for protecting the system against anomalous traffic and for guaranteeing the QoS. For this, a server records and maintains the information of clients accessed more than one time before when it is in normal condition. When it falls into the congestion, the records are used for filtering the spoofed IP. We send and receive the ICMP request/reply packet to know whether the IP is spoofed. And we also propose for applying the object spliting of CDN to guarantee the QoS in the initial FE situation.

  • PDF

누전차단기 폭로에 따른 동작 특성 및 재료 분석 (The Material Analyses and the Behavior Characteristics according to RCD Discloser)

  • 한운기;김향곤;길형준;이기연;최충석
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 C
    • /
    • pp.2019-2021
    • /
    • 2005
  • This paper describes the cut off time and the current characteristics of virgin RCDs and deteriorated ones in the seashore. The RCDs(Residual Current Protective Devices) are used for protecting the human body from electrical shock and for preventing facility accidents. According to the Korean standards, the RCDs are installed in panel boards. When RCDs are installed outside, they must be enclosed inside waterproof cases. In the case that RCOs are employed at temporary power sites and electrical facilities on the road, they are exposed to the external environment. As a result, the RCDs deteriorated in the seashore for 3 months showed high failure rate, while the virgin RCDs all complied with Korean Standard. Considering that the RCDs are used under exposed condition outside, the reliance of RCDs must be ensured by modifying the related regulations and codes and by developing Improved models advanced in their performance.

  • PDF

A Teleoperated Cleaning Robot for a High Radioactive Environment

  • Kim, Ki-Ho;Park, Jang-Jin;Yang, Myung-Seung;Oh, Chae-Youn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.849-854
    • /
    • 2003
  • The Korea Atomic Energy Research Institute has developed a teleoperated cleaning robot for use in the radioactive zone of the isolation room of the Irradiated Material Examination Facility where direct human access to the interior is strictly limited. The teleoperated cleaning robot that was designed to completely eliminate human interaction with the hazardous radioactive contaminants has five remotely replaceable submodules - a mobile module for navigation, a cleaning module for dislodging and sucking contaminated waste, a sensing module for obstacle avoidance, a collection module for storing the acquired waste, and a cover module for protecting the collection module. This cleaning robot is capable of cleaning the contaminated floor surface of the isolation room and collecting loose dry spent nuclear fuel debris and other radioactive waste fixed or scattered on the floor surface. The developed cleaning robot is operated either by a manual control or by autonomous control in conjunction with a graphical simulator, by which the human operator can monitor and intervene the robot performing cleanup tasks in the isolation room. In this paper, we present the mechanical and environmental design considerations and development of the teleoperated cleaning robot for radioactive isolation room use. We also demonstrate its mock-up performance test results from the viewpoint of a remote cleanup operation and remote maintenance.

  • PDF

Efficient Top-k Join Processing over Encrypted Data in a Cloud Environment

  • Kim, Jong Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권10호
    • /
    • pp.5153-5170
    • /
    • 2016
  • The benefit of the scalability and flexibility inherent in cloud computing motivates clients to upload data and computation to public cloud servers. Because data is placed on public clouds, which are very likely to reside outside of the trusted domain of clients, this strategy introduces concerns regarding the security of sensitive client data. Thus, to provide sufficient security for the data stored in the cloud, it is essential to encrypt sensitive data before the data are uploaded onto cloud servers. Although data encryption is considered the most effective solution for protecting sensitive data from unauthorized users, it imposes a significant amount of overhead during the query processing phase, due to the limitations of directly executing operations against encrypted data. Recently, substantial research work that addresses the execution of SQL queries against encrypted data has been conducted. However, there has been little research on top-k join query processing over encrypted data within the cloud computing environments. In this paper, we develop an efficient algorithm that processes a top-k join query against encrypted cloud data. The proposed top-k join processing algorithm is, at an early phase, able to prune unpromising data sets which are guaranteed not to produce top-k highest scores. The experiment results show that the proposed approach provides significant performance gains over the naive solution.