• Title/Summary/Keyword: control leakage

Search Result 932, Processing Time 0.034 seconds

Hop-by-Hop Dynamic Addressing Based Routing Protocol for Monitoring of long range Underwater Pipeline

  • Abbas, Muhammad Zahid;Bakar, Kamalrulnizam Abu;Ayaz, Muhammad;Mohamed, Mohammad Hafiz;Tariq, Moeenuddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.731-763
    • /
    • 2017
  • In Underwater Linear Sensor Networks (UW-LSN) routing process, nodes without proper address make it difficult to determine relative sensor details specially the position of the node. In addition, it effects to determine the exact leakage position with minimized delay for long range underwater pipeline monitoring. Several studies have been made to overcome the mentioned issues. However, little attention has been given to minimize communication delay using dynamic addressing schemes. This paper presents the novel solution called Hop-by-Hop Dynamic Addressing based Routing Protocol for Pipeline Monitoring (H2-DARP-PM) to deal with nodes addressing and communication delay. H2-DARP-PM assigns a dynamic hop address to every participating node in an efficient manner. Dynamic addressing mechanism employed by H2-DARP-PM differentiates the heterogeneous types of sensor nodes thereby helping to control the traffic flows between the nodes. The proposed dynamic addressing mechanism provides support in the selection of an appropriate next hop neighbour. Simulation results and analytical model illustrate that H2-DARP-PM addressing support distribution of topology into different ranges of heterogeneous sensors and sinks to mitigate the higher delay issue. One of the distinguishing characteristics of H2-DARP-PM has the capability to operate with a fewer number of sensor nodes deployed for long-range underwater pipeline monitoring.

A study on the perception of the Korean industrial security ecosystem using Delphi Method (전문가 델파이기법을 활용한 한국 산업보안 생태계 인식 조사연구)

  • Kang, Min Ji;Park, Chansoo
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.89-97
    • /
    • 2020
  • Recently, security issues on industrial technology are undergoing rapid changes around the world. Developed countries are establishing response strategies to protect their own core technologies while creating conflicts with global value chains and foreign capital movement. Also in Korea, we are approaching industrial security issues in the mid- to long-term industrial competitiveness. The purpose of this study is to survey on the awareness of the industrial security ecosystem and derive key policy issues. Based on a three round survey, four policies were suggested as followings : systemization of industrial security control tower, enhancement of security company's technical skills and training of security specialists, improvement of technology leakage prevention system through retirement personnel and M&A, reinforcement of research security in R&D process and proactive technology protection. It is hoped that this study will serve as a basis for policy-making as an evidence-based study reflecting the policy demands of industrial security.

Characterization of Electrical Properties of Si Nanocrystals Embedded in a SiO$_{2}$ Layer by Scanning Probe Microscopy (Scanning Probe Microscopy를 이용한 국소영역에서의 실리콘 나노크리스탈의 전기적 특성 분석)

  • Kim, Jung-Min;Her, Hyun-Jung;Kang, Chi-Jung;Kim, Yong-Sang
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.54 no.10
    • /
    • pp.438-442
    • /
    • 2005
  • Si nanocrystal (Si NC) memory device has several advantages such as better retention, lower operating voltage, reduced punch-through and consequently a smaller cell area, suppressed leakage current. However, the physical and electrical reasons for this behavior are not completely understood but could be related to interface states of Si NCs. In order to find out this effect, we characterized electrical properties of Si NCs embedded in a SiO$_{2}$ layer by scanning probe microscopy (SPM). The Si NCs were generated by the laser ablation method with compressed Si powder and followed by a sharpening oxidation. In this step Si NCs are capped with a thin oxide layer with the thickness of 1$\~$2 nm for isolation and the size control. The size of 51 NCs is in the range of 10$\~$50 m and the density around 10$^{11}$/cm$^{2}$ It also affects the interface states of Si NCs, resulting in the change of electrical properties. Using a conducting tip, the charge was injected directly into each Si NC, and the image contrast change and dC/dV curve shift due to the trapped charges were monitored. The results were compared with C-V characteristics of the conventional MOS capacitor structure.

Analysis of Impact Zone of Quantitative Risk Assessment based on Accident Scenarios by Meteorological Factors (기상요소별 사고 시나리오에 따른 정량적 위험성평가 피해영향범위 분석)

  • Kim, Hyun Sub;Jeon, Byeong Han
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.39 no.12
    • /
    • pp.685-688
    • /
    • 2017
  • Using ALOHA and PHAST Program, it was modeled assuming the leakage accident scenarios of chlorine which is designated as accident preparation chemical in chemical control act. End-point distances corresponding to ERPG-2 concentrations were calculated while varying annual mean temperature, wind speed, humidity, and atmospheric stability. The calculated endpoint distance values were compared and the correlation with each meteorological factor was analyzed. And we also investigated strengths and weaknesses of ALOHA and PHAST. The results show that ALOHA has little or no correlation with annual average temperature, humidity and it has a large correlation with wind speed and atmospheric stability. In the case of PHAST, the end-point distances were correlated with all the meteorological factors such as average annual temperature, wind speed, humidity, and atmospheric stability, Among them, the effect of atmospheric stability were the largest.

EXPERIMENTAL INVESTIGATIONS RELEVANT FOR HYDROGEN AND FISSION PRODUCT ISSUES RAISED BY THE FUKUSHIMA ACCIDENT

  • GUPTA, SANJEEV
    • Nuclear Engineering and Technology
    • /
    • v.47 no.1
    • /
    • pp.11-25
    • /
    • 2015
  • The accident at Japan's Fukushima Daiichi nuclear power plant in March 2011, caused by an earthquake and a subsequent tsunami, resulted in a failure of the power systems that are needed to cool the reactors at the plant. The accident progression in the absence of heat removal systems caused Units 1-3 to undergo fuel melting. Containment pressurization and hydrogen explosions ultimately resulted in the escape of radioactivity from reactor containments into the atmosphere and ocean. Problems in containment venting operation, leakage from primary containment boundary to the reactor building, improper functioning of standby gas treatment system (SGTS), unmitigated hydrogen accumulation in the reactor building were identified as some of the reasons those added-up in the severity of the accident. The Fukushima accident not only initiated worldwide demand for installation of adequate control and mitigation measures to minimize the potential source term to the environment but also advocated assessment of the existing mitigation systems performance behavior under a wide range of postulated accident scenarios. The uncertainty in estimating the released fraction of the radionuclides due to the Fukushima accident also underlined the need for comprehensive understanding of fission product behavior as a function of the thermal hydraulic conditions and the type of gaseous, aqueous, and solid materials available for interaction, e.g., gas components, decontamination paint, aerosols, and water pools. In the light of the Fukushima accident, additional experimental needs identified for hydrogen and fission product issues need to be investigated in an integrated and optimized way. Additionally, as more and more passive safety systems, such as passive autocatalytic recombiners and filtered containment venting systems are being retrofitted in current reactors and also planned for future reactors, identified hydrogen and fission product issues will need to be coupled with the operation of passive safety systems in phenomena oriented and coupled effects experiments. In the present paper, potential hydrogen and fission product issues raised by the Fukushima accident are discussed. The discussion focuses on hydrogen and fission product behavior inside nuclear power plant containments under severe accident conditions. The relevant experimental investigations conducted in the technical scale containment THAI (thermal hydraulics, hydrogen, aerosols, and iodine) test facility (9.2 m high, 3.2 m in diameter, and $60m^3$ volume) are discussed in the light of the Fukushima accident.

AN EXPERIMENTAL STUDY FOR MICROLEAKAGE OF AMALGAM USING RESIN ADHESIVE LINERS IN PRIMARY MOLAR TOOTH (유구치 아말감 수복물에서 레진 접착성 이장재의 미세 변연 누출에 관한 비교 연구)

  • Kim, Jong-Tae;Choi, Byung-Jai;Lee, Jae-Ho;Lee, Jong-Gap
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.23 no.2
    • /
    • pp.401-414
    • /
    • 1996
  • The purpose of this study was to compare the marginal leakage of resin liner which was used as a liner to amalgam restoration. Control group composed of no liner group, copalite group and experimental group composed of All-bond 2, Vitrebond, Superbond D-liner applied groups were evaluated. Cl.V preparation with a size of $3{\times}2{\times}1.5mm$ on 70 extracted primary molars were made and applied appropriate liners for each groups. After amalgam filling and polishing, polished specimens underwent temperature changed from $5^{\circ}C\;to\;55^{\circ}C$ a thousand times. After thermocycling, specimens were placed in 2% methylene blue dye solution for 72 hours in an incubator set at $37^{\circ}C$. The teeth were sectioned buccolingually and the degree of dye penetration was observed with a spectroscopy. (${\times}30$) The following results were obtained. 1. Vitrebond, All-bond 2, Superbond D-liner group exhibited a statistically significant lower degree of dye penetration than no liner and copalite group. (Kruskal-Wallis analysis, P<0.05) 2. No liner group and copalite group exhibited a similar degree of dye penetration. (Mann-Whitney analysis, P>0.05) 3. All-bond 2 group exhibited a statistically significant lower degree of dye penetration than Vitrebond group, (Mann-Whitney analysis, P<0.05) Superbond D-liner group also exhibited a lower degree of dye penetration than Vitrebond group but was statistically insignificant. (Mann-Whitney analysis, P>0.05)

  • PDF

The Convergence Application Example of Non-destructive Inspection System (비파괴 검사 시스템의 융합 적용 사례)

  • Lee, Jeong-Ick
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.191-197
    • /
    • 2017
  • This development is for non-destructive machine using X-Ray source about detecting outline faults of below middle size products. The differentiation is product of research and development unspecialized small and medium-sized products using X-Ray light sources can check real time if the surface of an external fault of radiation dose reference, within the leakage. The speed control is possible by software solution. In addition, we're working on possibly block doors for worker safety and equipment at the same time that inner drive can be identified in the image. These principles, as a key enabler of the current inspection system such as the container is small to medium-sized parts - a long way from utilization level is possible. This research will give rise to major effects for other various non-destructive market industries except car-industry. The most important fact is that this developed non-destructive machine is controlled below $0.2micro-S{\mu}v$.

Characteristics and Combined Sewer Overflows (합류식 하수관거의 유출 특성 분석 조사)

  • An, Ki-Sun;Jang, Sung-Ryong;Kwon, Young-Ho
    • Journal of Environmental Science International
    • /
    • v.19 no.6
    • /
    • pp.747-753
    • /
    • 2010
  • It follows in quality and sewage exclusion method of the investigation objective sector and the Combined Sewer Overflows which is suitable in regional characteristics and the confluence area against the rainfall initially a flow and the medulla and measurement - it analyzes the initial rainfall outflow possibility control plan which is suitable in the domestic actual condition and it proposes the monitor ring plan for the long-term flow and pollution load data accumulation. From the research which it sees the Infiltration water/Influent water and CSOs investigation it passes by the phase of hazard chain and Namwon right time 4 it does not hold reverse under selecting, Measurement it used the hazard automatic flow joint seal Sigma 910 machine and in case 15 minute interval of the I/I, it measured a flow at case 5, 15 minute standing of the CSOs. The water quality investigation for the water leakage investigation of the I/I and the sewage from the point which is identical with flow measurement during on-the-spot inspection duration against 6 items which include the BOD sampling and an analysis, when the rainfall analysis for CSOs fundamental investigation analyzed against 18 items which include the BOD sampling. Consequently, for the optimum interpretation invasion water / inflow water of the this investigation area day average the lowest flow - water quality assessment veterinarian optimum interpretation hazard average per day - lowest flow - it averages a medulla evaluation law department one lowest flow evaluation technique and it selects, it presentation collectively from here it gets, position result with base flow analysis of invasion water / inflow water.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Chopper Application for Magnetic Stimulation

  • Choi, Sun-Seob;Lee, Sun-Min;Kim, Jun-Hyoung;Kim, Whi-Young
    • Journal of Magnetics
    • /
    • v.15 no.4
    • /
    • pp.213-220
    • /
    • 2010
  • Since the hypothalamus immediately reacts to a nerve by processing all the information from the human body and the external stimulus being conducted, it performs a significant role in internal secretion; thus, a diverse and rapid stimulus pulse is required. By detecting Zero Detector accurately via the application of AVR on-Chip (ATMEL) using commercial electricity, chopping generates a stimulus pulse to the brain using an IGBT gate to designate a new magnetic stimulation following treatment and diagnosis. To simplify and generate a diverse range of stimuli for the brain, chopping can be used as a free magnetic stimulator. Then, commercial frequency (60Hz) is chopped precisely at the first level of the leakage transformer to deliver an appropriate stimulus pulse towards the hypothalamus when necessary. Discharge becomes stable, and the chopping frequency and duty-ratio provide variety after authorizing a high-pressure chopping voltage at the second level of the magnetic stimulator. These methods have several aims. The first is to apply a variable stimulus pulse via accurate switching frequency control by a voltaic pulse or a pulse repetition rate, according to the diagnostic purpose for a given hypothalamus. Consequently, the efficiency tends to increase. This experiment was conducted at a maximum of 210 W, a magnetic induced amplitude of 0.1~2.5 Tesla, a pulse duration of $200{\sim}350\;{\mu}s$, magnetic inducement of 5 Hz, stimulus frequency of 0.1~60 Hz, and a duration of stimulus train of 1~10 sec.