• Title/Summary/Keyword: Separation of the network

Search Result 305, Processing Time 0.029 seconds

Processes of Outflow of the Boiling Steam-Water Mixture in the Widening Part of Hydro-Steam Turbine Nozzles

  • Leonid, Serejkin;Boris, Shifrin;Victor, Perov;Alexandr, Goldin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.178-184
    • /
    • 2022
  • Renewable energy sources based on solar radiation, wind energy, geothermal energy, and biomass energy have now reached the level of industrial application. A new way to generate electricity using low-potential heat is to install a hydro-steam turbine. In hydro-steam turbines, hot water is supplied directly to turbine rotor nozzles without prior separation into steam and water in separators, which significantly increases the efficiency of hot water energy use. Such turbines are suggested to be used as autonomous energy sources in geothermal heating systems, heating water boilers and cooling systems of chemical reactors, metallurgical furnaces, etc. The authors conclude that the installation of hydro-steam turbines in heating plants and process boiler plants can also be effective if the used exhaust steam-water mixture at the turbine outlet is used to heat the network water or as return water.

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

Autonomous, Scalable, and Resilient Overlay Infrastructure

  • Shami, Khaldoon;Magoni, Damien;Lorenz, Pascal
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.378-390
    • /
    • 2006
  • Many distributed applications build overlays on top of the Internet. Several unsolved issues at the network layer can explain this trend to implement network services such as multicast, mobility, and security at the application layer. On one hand, overlays creating basic topologies are usually limited in flexibility and scalability. On the other hand, overlays creating complex topologies require some form of application level addressing, routing, and naming mechanisms. Our aim is to design an efficient and robust addressing, routing, and naming infrastructure for these complex overlays. Our only assumption is that they are deployed over the Internet topology. Applications that use our middleware will be relieved from managing their own overlay topologies. Our infrastructure is based on the separation of the naming and the addressing planes and provides a convergence plane for the current heterogeneous Internet environment. To implement this property, we have designed a scalable distributed k-resilient name to address binding system. This paper describes the design of our overlay infrastructure and presents performance results concerning its routing scalability, its path inflation efficiency and its resilience to network dynamics.

The Remote Control of Mobile Robots on the Web (웹을 이용한 이동로봇의 원격제어)

  • Ok, J.S.;Kang, G.T.;Lee, W.C.
    • Journal of Power System Engineering
    • /
    • v.4 no.4
    • /
    • pp.78-83
    • /
    • 2000
  • It is often necessary to observe the working environment of a robot to control it efficiently in the remote location. The remote sensing data and control commands are transmitted via various media such as radio, microwave, and computer network. The World Wide Web can be used as the infrastructure for teleoperation of mobile robots. In this paper we propose an advanced technique of the remote control of mobile robots on the web. For the real-time control, the image separation algorithm is proposed to transmit the current positions of mobile robots instead of transmitting the full frame image. It is shown by experiments that the proposed algorithm is effective.

  • PDF

A Study on the Enhancement of Oxygen Permeability by Silicone in Polymeric Membranes (고분자분리막의 실리콘에 의한 산소투과향상에 관한 연구)

  • 변홍식
    • Membrane Journal
    • /
    • v.9 no.3
    • /
    • pp.151-156
    • /
    • 1999
  • Silicone was used in this study to enhance the oxygene permeability of gas separation membranes. PMP and PMMA were used to prepare the copolymers and IPN membranes, respectively. In the case of copolymers, there were two methodsCswelling and solvent evaporation) in this study and it was revealed that this preparation method affected the oxygene permeability. It was also shown that the IPN method brought the enhacement of oxygen permeability and slight decrease of separation factor. Regarding oxygen permeability 10 wt% of PMMA was the best composition of IPN membrane.

  • PDF

Carbon-Silica Membranes Derived from Polyimide/Silica Composites for Gas Separation

  • Lee, Young-Moo;Park, Ho-Bum;Kim, Myung-Jun;Jang, Jeong-Gyu
    • Proceedings of the Membrane Society of Korea Conference
    • /
    • 2003.07a
    • /
    • pp.47-50
    • /
    • 2003
  • Carbon-silica membranes were Prepared by Pyrolyzing polyimide/silica composite obtained from ill-situ polymerization of alkoxy silanes via sol-gel reaction. In this study, effects of silica content and silica network in polyimide matrix were focused on the gas permeation and separation properties of the final carbon-silica membrane. The membranes prepared were characterized with a field emission scanning electron microscopy (FE-SEM), a solid state $^{29}$ Si nuclear magnetic resonance spectroscopy ($^{29}$ Si-NMR), an electron spectroscopy for chemical analysis (ESCA), a thermogravimetric analysis (TGA) and gas permeation tests.

  • PDF

Performance Analysis of Space-Time Codes on OFDM-CDMA based Broadband Wireless Access Networks (OFDM-CDMA기반의 광대역 무선접속시스템에서 공간-시간부호의 성능분석)

  • Kang Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.173-178
    • /
    • 2006
  • In this paper, a channel estimation based on the time-domain windowing and its imperfectness in OFDM-based multiple-antenna transmission systems are analyzed with an emphasis on a preamble design for multi-channel separation, From the computer simulation results, the OFDM-CDMA system applying a space-time-frequency diversity with a full-rate full diversity code can give the diversity of D = 4 and D = 8 for both multi-user cases of maximum user and half user capacities, respectively

  • PDF

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.

Polyolefin Block Copolymer Thermoplastic Elastomer (폴리올레핀 블록공중합체 열가소성 탄성체)

  • Koo, Chong Min
    • Korean Chemical Engineering Research
    • /
    • v.46 no.1
    • /
    • pp.15-22
    • /
    • 2008
  • Polyolefin block copolymer has been taking a great deal of attention due to their great potential in polymer industry since a new metallocene catalytic method for producing polyolefin block copolymer was developed by Dow Chemicals. However, so far, there was no systematic study of olefin block copolymer. In this review, Linear polyolefin block copolymers, containing semicrystalline poly (ethylene) (E) blocks and a rubbery block as a thermoplastic elastomer, were investigated in the viewpoint of microphase separation mode, microstructure, deformation behavior, and molecular architecture.

A Percolation based M2M Networking Architecture for Data Transmission and Routing

  • Lu, Jihua;An, Jianping;Li, Xiangming;Yang, Jie;Yang, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.649-663
    • /
    • 2012
  • We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server-free and router-free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases: routing and data transmission phases. In the routing phase, probe packets will be transmitted and forwarded in the network thus multiple paths are selected and performed based on the constriction of the maximum hop number. In the second phase, the information will be encoded, say, with the fountain codes, and transmitted using the paths generated in the first phase. In such a way, an efficient routing and data transmission mechanism can be built, which allow us to construct a low-cost, flexible and ubiquitous network. Such a networking architecture and data transmission can be used in many M2M communications, such as the stub network of internet of things, and deep space networking, and so on.