• Title/Summary/Keyword: Power electronic

Search Result 7,864, Processing Time 0.037 seconds

The Development of a Benthic Chamber (BelcI) for Benthic Boundary Layer Studies (저층 경계면 연구용 Benthic chamber(BelcI) 개발)

  • Lee, Jae-Seong;Bahk, Kyung-Soo;Khang, Buem-Joo;Kim, Young-Tae;Bae, Jae-Hyun;Kim, Seong-Soo;Park, Jung-Jun;Choi, Ok-In
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.15 no.1
    • /
    • pp.41-50
    • /
    • 2010
  • We have developed an in-situ benthic chamber (BelcI) for use in coastal studies that can be deployed from a small boat. It is expected that BelcI will be useful in studying the benthic boundary layer because of its flexibility. BelcI is divided into three main areas: 1) frame and body chamber, 2) water sampler, and 3) stirring devices, electric controller, and data acquisition technology. To maximize in-situ use, the frame is constructed from two layers that consist of square cells. All electronic parts (motor controller, pA meter, data acquisition, etc.) are low-power consumers so that the external power supply can be safely removed from the system. The hydrodynamics of BelcI, measured by PIV (particle image velocimetry), show a typical "radial-flow impeller" pattern. Mixing time of water in the chamber is about 30 s, and shear velocity ($u^*$) near the bottom layer was calculated at $0.32\;cm\;s^{-1}$. Measurements of diffusivity boundary layer thickness showed a range of $180-230\;{\mu}m$. Sediment oxygen consumption rate, measured in-situ,was $84\;mmol\;O_2\;m^{-2}\;d_{-1}$, more than two times higher than on-board incubation results. Benthic fluxes assessed from in-situ incubation were estimated as follows: nitrate + nitrite = $0.18\;{\pm}\;0.07\;mmol\;m^{-2}\;d^{-1}$ ammonium $23\;{\pm}\;1\;mmol\;m^{-2}\;d^{-1}$ phosphate = $0.09\;{\pm}\;0.02\;mmol\;m^{-2}\;d^{-1}$ and silicate = $23\;{\pm}\;1\;mmol\;m^{-2}\;d^{-1}$.

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.

THE CURRENT STATUS OF BIOMEDICAL ENGINEERING IN THE USA

  • Webster, John G.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1992 no.05
    • /
    • pp.27-47
    • /
    • 1992
  • Engineers have developed new instruments that aid in diagnosis and therapy Ultrasonic imaging has provided a nondamaging method of imaging internal organs. A complex transducer emits ultrasonic waves at many angles and reconstructs a map of internal anatomy and also velocities of blood in vessels. Fast computed tomography permits reconstruction of the 3-dimensional anatomy and perfusion of the heart at 20-Hz rates. Positron emission tomography uses certain isotopes that produce positrons that react with electrons to simultaneously emit two gamma rays in opposite directions. It locates the region of origin by using a ring of discrete scintillation detectors, each in electronic coincidence with an opposing detector. In magnetic resonance imaging, the patient is placed in a very strong magnetic field. The precessing of the hydrogen atoms is perturbed by an interrogating field to yield two-dimensional images of soft tissue having exceptional clarity. As an alternative to radiology image processing, film archiving, and retrieval, picture archiving and communication systems (PACS) are being implemented. Images from computed radiography, magnetic resonance imaging (MRI), nuclear medicine, and ultrasound are digitized, transmitted, and stored in computers for retrieval at distributed work stations. In electrical impedance tomography, electrodes are placed around the thorax. 50-kHz current is injected between two electrodes and voltages are measured on all other electrodes. A computer processes the data to yield an image of the resistivity of a 2-dimensional slice of the thorax. During fetal monitoring, a corkscrew electrode is screwed into the fetal scalp to measure the fetal electrocardiogram. Correlations with uterine contractions yield information on the status of the fetus during delivery To measure cardiac output by thermodilution, cold saline is injected into the right atrium. A thermistor in the right pulmonary artery yields temperature measurements, from which we can calculate cardiac output. In impedance cardiography, we measure the changes in electrical impedance as the heart ejects blood into the arteries. Motion artifacts are large, so signal averaging is useful during monitoring. An intraarterial blood gas monitoring system permits monitoring in real time. Light is sent down optical fibers inserted into the radial artery, where it is absorbed by dyes, which reemit the light at a different wavelength. The emitted light travels up optical fibers where an external instrument determines O2, CO2, and pH. Therapeutic devices include the electrosurgical unit. A high-frequency electric arc is drawn between the knife and the tissue. The arc cuts and the heat coagulates, thus preventing blood loss. Hyperthermia has demonstrated antitumor effects in patients in whom all conventional modes of therapy have failed. Methods of raising tumor temperature include focused ultrasound, radio-frequency power through needles, or microwaves. When the heart stops pumping, we use the defibrillator to restore normal pumping. A brief, high-current pulse through the heart synchronizes all cardiac fibers to restore normal rhythm. When the cardiac rhythm is too slow, we implant the cardiac pacemaker. An electrode within the heart stimulates the cardiac muscle to contract at the normal rate. When the cardiac valves are narrowed or leak, we implant an artificial valve. Silicone rubber and Teflon are used for biocompatibility. Artificial hearts powered by pneumatic hoses have been implanted in humans. However, the quality of life gradually degrades, and death ensues. When kidney stones develop, lithotripsy is used. A spark creates a pressure wave, which is focused on the stone and fragments it. The pieces pass out normally. When kidneys fail, the blood is cleansed during hemodialysis. Urea passes through a porous membrane to a dialysate bath to lower its concentration in the blood. The blind are able to read by scanning the Optacon with their fingertips. A camera scans letters and converts them to an array of vibrating pins. The deaf are able to hear using a cochlear implant. A microphone detects sound and divides it into frequency bands. 22 electrodes within the cochlea stimulate the acoustic the acoustic nerve to provide sound patterns. For those who have lost muscle function in the limbs, researchers are implanting electrodes to stimulate the muscle. Sensors in the legs and arms feed back signals to a computer that coordinates the stimulators to provide limb motion. For those with high spinal cord injury, a puff and sip switch can control a computer and permit the disabled person operate the computer and communicate with the outside world.

  • PDF

Development of Korean Green Business/IT Strategies Based on Priority Analysis (한국의 그린 비즈니스/IT 실태분석을 통한 추진전략 우선순위 도출에 관한 연구)

  • Kim, Jae-Kyeong;Choi, Ju-Choel;Choi, Il-Young
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.191-204
    • /
    • 2010
  • Recently, the CO2 emission and energy consumption have become critical global issues to decide the future of nations. Especially, the spread of IT products and the increased use of internet and web applications result in the energy consumption and CO2 emission of IT industry though information technologies drive global economic growth. EU, the United States, Japan and other developed countries are using IT related environmental regulations such as WEEE(Waste Electrical and Electronic Equipment), RoHS(Restriction of the use of Certain Hazardous Substance), REACH(Registration, Evaluation, Authorization and Restriction of CHemicals) and EuP(Energy using Product), and have established systematic green business/IT strategies to enhance the competitiveness of IT industry. For example, the Japan government proposed the "Green IT initiative" for being compatible with economic growth and environmental protection. Not only energy saving technologies but energy saving systems have been developed for accomplishing sustainable development. Korea's CO2 emission and energy consumption continuously have grown at comparatively high rates. They are related to its industrial structure depending on high energy-consuming industries such as iron and steel Industry, automotive industry, shipbuilding industry, semiconductor industry, and so on. In particular, export proportion of IT manufacturing is quite high in Korea. For example, the global market share of the semiconductor such as DRAM was about 80% in 2008. Accordingly, Korea needs to establish a systematic strategy to respond to the global environmental regulations and to maintain competitiveness in the IT industry. However, green competitiveness of Korea ranked 11th among 15 major countries and R&D budget for green technology is not large enough to develop energy-saving technologies for infrastructure and value chain of low-carbon society though that grows at high rates. Moreover, there are no concrete action plans in Korea. This research aims to deduce the priorities of the Korean green business/IT strategies to use multi attribute weighted average method. We selected a panel of 19 experts who work at the green business related firms such as HP, IBM, Fujitsu and so on, and selected six assessment indices such as the urgency of the technology development, the technology gap between Korea and the developed countries, the effect of import substitution, the spillover effect of technology, the market growth, and the export potential of the package or stand-alone products by existing literature review. We submitted questionnaires at approximately weekly intervals to them for priorities of the green business/IT strategies. The strategies broadly classify as follows. The first strategy which consists of the green business/IT policy and standardization, process and performance management and IT industry and legislative alignment relates to government's role in the green economy. The second strategy relates to IT to support environment sustainability such as the travel and ways of working management, printer output and recycling, intelligent building, printer rationalization and collaboration and connectivity. The last strategy relates to green IT systems, services and usage such as the data center consolidation and energy management, hardware recycle decommission, server and storage virtualization, device power management, and service supplier management. All the questionnaires were assessed via a five-point Likert scale ranging from "very little" to "very large." Our findings show that the IT to support environment sustainability is prior to the other strategies. In detail, the green business /IT policy and standardization is the most important in the government's role. The strategies of intelligent building and the travel and ways of working management are prior to the others for supporting environment sustainability. Finally, the strategies for the data center consolidation and energy management and server and storage virtualization have the huge influence for green IT systems, services and usage This research results the following implications. The amount of energy consumption and CO2 emissions of IT equipment including electrical business equipment will need to be clearly indicated in order to manage the effect of green business/IT strategy. And it is necessary to develop tools that measure the performance of green business/IT by each step. Additionally, intelligent building could grow up in energy-saving, growth of low carbon and related industries together. It is necessary to expand the affect of virtualization though adjusting and controlling the relationship between the management teams.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF

A Study on the Legislative Conception of Terror of the Advanced European Nations (유럽 선진국의 법제적 테러 개념에 관한 고찰)

  • Kwon, Jeong-Hun;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.29-50
    • /
    • 2008
  • Many countries throughout the world have enacted laws on terrorism in the light of the changes that time has brought to them, geographical features, cultural values, and environmental elements. Especially some advanced European nations prescribe the definition of terrorism, the purpose of terrorism, the behavior of terrorism, and the types of crimes related to terrorism and so on for the following reason that it is more vital for the authorities concerned to investigate and punish terrorists after the rise of terrorism. In this regard, this paper analyzes legislative countermoves against terrorists of advanced countries such as France, Germany, and England and through this sheds light on the need of future anti-terrorism bills. The legislative basic guidelines directly to manipulate future terrors based on theories derived from this study could be summarized as follows. In the first place, providing laws on direct investigative power and harsher punishment to those involved in terrorism is a prerequisite for social security and thus the presidential directive of the state anti-terrorism action guidelines just deals with administrative measures without any effective response to terrorism. Hence it is urgent to make anti-terrorism bill concerning investigation and punishment of terrorists. In the second place, it is associated with the objectives of terror. The expression "all sorts of" stated in Korean law is so quite unclear that it can not fulfill the required conditions for naming it "crime". Comprehending provisoes of the crime that meets the purpose of the terrorists is necessary in order to investigate and inflict punishment on them. Therefore, it is advisable to establish specific and precise principles such as political, social, ideological, and religious purpose of terrorists in the bill. In the third place, to meet the flow of times of technicalization, informatization, such provisoes as destruction of electronic data system, crimes related to nuclear materials, purchases of weapons by terrorists, tax administration for prohibition of sale, and arson should be considered in terror bill. In the fourth place, nonselective attack toward unspecified individuals has become a serious issue in our society. Terrorists leave poisonous foods or beverages to crowded place or dump toxic chemicals into river intentionally. Therefore more strict regulations must be included in terror bill to prevent possible terrorist attacks.

  • PDF

Recent Progress in Air Conditioning and Refrigeration Research - A Review of papers Published in the Korean Journal of Air-Conditioning and Refrigeration Engineering in 1998 and 1999 - (공기조화, 냉동 분야의 최근 연구 동향 - 1998년 1999년 학회지 논문에 대한 종합적 고찰 -)

  • 이재헌;김광우;김병주;이재효;김우승;조형희;김민수
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.12 no.12
    • /
    • pp.1098-1125
    • /
    • 2000
  • A review on the papers published in the Korean Journal of Air-Conditioning and Refrigerating Engineering in 1998 and 1999 has been done. Focus has been put on current status of research in the aspect of heating, cooling, ventilation, sanitation and building environment. The conclusions are as follows. 1) A review of the recent studies on fluid flow, turbomachinery and pipe-network shows that many experimental investigations are conducted in applications of impingement jets. Researches on turbulent flows, pipe flows, pipe-networks are focused on analyses of practical systems and prediction of system performance. The results of noise reduction in the turbomachinery are also reported. 2) A review of the recent studies on heat transfer analysis and heat exchanger shows that there were many papers on the channel flow with the application to the design of heat exchanger in the heat transfer analysis. Various experimental and numerical papers on heat exchanger were also published, however, there were few papers available for the analysis of whole system including heat exchanger. 3) A review of the recent studies on heat pump system have focused on the multi-type system and the heat pump cycle to utilize treated sewage as the heat source. The defrosting and the frosting behaviors in the fin-tube heat exchanger is experimentally examined by several authors. Several papers on the ice storage cooling system are presented to show the dynamic simulation program and optimal operation conditions. The study on the micro heat pipes for the cooling of high power electronic components is carried out to examine the characteristics of heat and mass transfer processed. In addition to these, new type of separate thermosyphon is studied experimentally. 4) The recent studies on refrigeration/air conditioning system have focused on the system performance and efficiency for new alternative refrigerants. New systems operating with natural refrigerants are drawing lots of attention. In addition to these, evaporation and condensation heat transfer characteristics of traditional and new refrigerants are investigated for plain tubes and also for microfin tubes. Capillary tubes and orifice are main topics of research as expansion devices and studies on thermophysical properties of new refrigerants and refrigerant/oil mixtures are widely carried out. 5) A review of the recent studies on absorption cooling system shows that numerous experimental and analytical studies on the improvement of absorber performance have been presented. Dynamic analysis of compressor have been performed to understand its vibration characteristics. However research works on tow-phase flow and heat transfer, which could be encountered in the refrigeration system and various phase-change heat exchanger, were seemed to be insufficient. 6) A review of recent studies on duct system shows that the methods for circuit analysis, and flow balancing have been presented. Researches on ventilation are focused on the measurement of ventilation efficiency, and variation of ventilation efficiency with ventilation methods by numerous experimental and numerical studies. Furthermore, many studies have been conducted in real building in order to estimate indoor thermal environments. Many research works to get some information for cooling tower design have been performed but are insufficient. 7) A review on the recent studies on architectural thermal environment and building mechanical systems design shows that thermal comfort analysis is sitting environment, thermal performance analysis of Korean traditional building structures., and evaluation of building environmental load have been performed. However research works to improve the performance of mechanical system design and construction technology were seemed to be insufficient.

  • PDF

An Empirical Study on the Impact of the Perception of the Monitoring Function on Effective BPMS Adoption (모니터링 기능에 대한 인식이 효과적인 BPMS 도입에 미치는 영향)

  • Chae, Myung-Sin;Park, Jin-Suk;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.105-130
    • /
    • 2007
  • Recently, there is a substantial interest in implementing Business Process Management System(BPMS) among enterprises with the purpose of business process innovation. BPMS redesigns and coordinates business processes in terms of both automated steps and human involvement in order to maximize the value of both involved people and systems. The reason why BPMS is getting attention from top managers is that it has the possibility to optimize the business processes by cycling the process of modeling, execution, monitoring, evaluation, and redesigning work processes. Thus, it has created high expectations about not only productivity improvement but also business process innovation. However. having an innovative nature, which is used for process innovation, BPMS implementation has great potential to stir up employee resistance. The analysis and the discussion about the prevention of the resistance against IS(Information Systems) is important because IS change the way people work and also alter the power structure within the organization, in general. The purpose of this study is to investigate factors that have an impact on the effective adoption of BPMS at the enterprise level. To find out these factors, this study considers two characteristics of BPMS: First. BPMS shares some characteristics with other enterprise-wide IS such as ERP. Second, it has special BPMS-specific characteristics. Due to the lack of previous research on BPMS adoption, interviews were carried out with IT-consultants and CIOs who conducted BPMS projects previously to find out BPMS-specific features that would make BPMS unique when compared to other enterprise-wide IS. As a result, the monitoring function was chosen as the main BPMS-specific factor. Thus, this paper reviewed studies both on enterprise-wide IS adoptions, which applied Technology Acceptance Model (TAM) and secondly on computer based monitoring to find out factors that would influence the employees' perception on the monitoring function of BPMS. Based on the literature review, the study suggested three factors that would have an impact on the employee's perception of the monitoring function: fairness of enterprise evaluation system, fairness of the boss, and self-efficacy of their work. Three factors that would impact the enterprise-wide IS adoption were also set: the shared belief in the benefit of BPMS, training, and communication. Then, these factors were integrated with TAM. Structural equation modeling was used to test hypotheses, out factors that would impact the employees' perception on the monitoring function of BPMS. Based on the literature review the study suggested three factors that would have an impact on the employee's perception of the monitoring function: fairness of enterprise evaluation system, fairness of the boss, and self-efficacy of their work. Three factors that would impact the enterprise-wide IS adoption were also set: the shared belief in the benefit of BPMS, training, and communication. Then, these factors were integrated with TAM. Structural equation modeling was used to test hypotheses. The data analysis results showed that two among three monitoring function related factors - enterprise evaluation system and fairness of the boss - were significant. This implies that employees would worry less about the BPMS implementation as long as they perceive the monitoring results will be used fairly for their performance evaluation. However, employees' high self-efficacy on their job was not a significant factor in their perception of the usefulness of BPMS. This is related to cases that showed employees resisted against the information systems because they automated their works (Markus, 1983). One specific case was an electronic company, where the accounting department workers were requested to redefine their job because their working processes were automated due to BPMS implementation.

Developed an output device for high-frequency cosmetic medical equipment using micro multi-needle (마이크로 멀티니들을 이용한 고주파 피부미용 의료기기를 위한 출력 장치 개발)

  • Kim, Jun-tae;Joo, Kyu-tai;Cha, Eun Jong;Kim, Myung-mi;Jeong, Jin-hyoung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • The entry of an aging society and the extension of human life expectancy, the increasing interest in women's social advancement and men's appearance, and the natural interest in K-culture through media media, while receiving worldwide attention, Focus on K-Bueaty. Recently, looking at the occupation of the medical tourism field, in the case of aesthetic medicine tourism such as molding and dermatology, it has gained popularity not only in Asia such as China and Japan, but also in North America and Europe. The first external confirmation of human aging is the wrinkles on the skin of the face. Clean, wrinkle-free, elastic and healthy skin is a desire of most people. Skin condition and condition such as focused ultrasonic stimulation (HIFU: High Intensity Focused Utrasound) and low frequency, high frequency (RF: Radio Frequency), galvanic therapy using microcurrent, cryotherapy using rapid cooling, etc. Depending on the method of management, the effect of the treatment differs depending on the output and the stimulation site, etc., even in the treatment of medical equipment and beauty equipment using the same mechanism. In this research, in order to develop invasive high-frequency dermatological devices using a large number of beauty medical devices and microneedles of beauty devices, the international standards IEC 60601-2 (standards for individual medical devices) and MFDS (Ministry of) We designed and developed a high-frequency output device in compliance with the high-frequency stimulation standard announced in the Food and Drug Safety (Ministry of Food and Drug Safety). The circuit design consists of an amplifier (AMP: Amplifier) using Class-A Topology and a power supply device using Half-Bridge Topology. As a result of measuring the developed high-frequency output device, an average efficiency of 63.86% was obtained, and the maximum output was measured at 116.7W and 50.67dBm.