• Title/Summary/Keyword: damage path

Search Result 248, Processing Time 0.032 seconds

Design of Defect Diagnosis Platform based on CAN Network for Reliability Improvement of Vehicle SoC (차량용 SoC의 신뢰성 향상을 위한 CAN 통신 기반의 고장진단 플랫폼 설계)

  • Hwang, Doyeon;Kim, Dooyoung;Park, Sungju
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.10
    • /
    • pp.47-55
    • /
    • 2015
  • To verify the function of vehicle is becoming more and more difficult because many electronic control units have been embedded in vehicle with development of electronics industry. The reliability of vehicle should be considered above all important because malfunction of vehicle can cause damage of human life. In this paper, defect diagnosis platform based on CAN network is proposed to improve the reliability of vehicle. Reliability of vehicle is significantly increased by adopting the structural test via dedicated test path after manufacturing. Besides, the test cost is reduced because additional test pins are not required.

An Experimental Study on the Effects of Bottom Ash Compaction Pile in the Sea Clay Layer (해성 점토지반의 저회다짐말뚝 보강 효과에 관한 실험적 연구)

  • Park, Se-Hyun;Han, Yun-Su;Do, Jong-Nam;Chun, Byung-Sik
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.595-598
    • /
    • 2010
  • Many economical and efficient methods such as sand drain method(SD), plastic board drain(PBD), sand compaction pile, vacuum consolidation method, etc., have been used for soft grounds. The case of sand compaction pile has an effect on accelerating consolidation and increasing bearing capacity by penetration at regular intervals under soft grounds for reducing the drainage path. But, this method has caused not only the nature damage by extracting the sands indiscreetly but also the economical problem for importing the sands because it needs so much sand to make the sand compaction pile. Thus, this study choosed the bottom ash which has similar engineering characteristics with sand. It was performed that clogging test and large direct shear test changing the bottom ash replacement ratio in soft ground for studying strength characteristics of soft ground using bottom ash compaction pile. As a result of the test, the internal friction angle was largely increased and the cohesion was decreased as the replacement ratio increased.

  • PDF

Ecological characteristics of areas naturally inhabited by Dolbae trees(Pyrus pyrifolia) on Mt. Kaya

  • Ahn, Young-Hee;Chung, Kyu-Hwan
    • Journal of Environmental Science International
    • /
    • v.11 no.11
    • /
    • pp.1149-1156
    • /
    • 2002
  • The ecological characteristics of Dolbae trees, a valuable genetic resource for native pyrus fruit trees, were investigated at four naturally inhabited areas on Mount Kaya, Gyeongsangnam-Do. Most Dolbae trees were found on the southwest side of an old hiking path to a mountain valley at altitudes of 610∼670 m. The surrounding flora consisted of 46 families, 69 genera, 75 species, and 10 varieties. The natural habitat of the Dolbae trees was basically a deciduous broad-leaved forest with a predominance of Quercus serrata and ligneous plants(xylophytes) from the Fagaceae and Betulaceae families. The habitat was also found to be in a second transition resulting from forest disturbance and exhibited a degree of diversity of 2.901-5.065, based on Shannon-Weiner's index. Examination of the Dolbae trees found in Mount Kaya revealed diameter breast heights(DBHs) ranging from 10 to 60 cm, including six old and large Dolbae trees with a DBH of 50∼60 cm, which will be particularly valuable as a genetic resource. Accordingly, the current results suggest that the study areas are a secondary forest in a typical mid-temperate zone resulting from forest damage about 10 years earlier.

A Study on Secure Routing Protocol using Multi-level Architecture in Mobile Ad Hoc Network (Multi-level 구조를 이용한 보안 라우팅 프로토콜에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.17-22
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

A Study on Development of On-line Condition Monitoring Program of a Turboshaft Engine (터보샤프트 엔진의 온라인 상태감시 프로그램 개발에 관한 연구)

  • Kong, Chang-Duk;Kho, Seong-Hee;Ki, Ja-Young;Gu, Young-Joo;Jun, Yong-Min
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.12 no.6
    • /
    • pp.7-11
    • /
    • 2008
  • The helicopter flies at low level flight mode in its own operational range comparing to other aircraft categories. The low level flight means that the engine operates at variable atmospheric condition such as hot and cold temperature, snow, heavy rain, etc. Furthermore it may increase the entering possibility of engine foreign object damage particles like sand, dust, etc., i.e. this operating condition gives rise to damages of engine gas path components. An on-line condition monitoring program was developed by using SIMULINK, where measurement signals were simulated as an input module. The reliability and capability of the developed on-line condition monitoring were confirmed through application to a real helicopter engine health monitoring.

Risk Assessment Strategy for Decommissioning of Fukushima Daiichi Nuclear Power Station

  • Yamaguchi, Akira;Jang, Sunghyon;Hida, Kazuki;Yamanaka, Yasunori;Narumiya, Yoshiyuki
    • Nuclear Engineering and Technology
    • /
    • v.49 no.2
    • /
    • pp.442-449
    • /
    • 2017
  • Risk management of the Fukushima Daiichi Nuclear Power Station decommissioning is a great challenge. In the present study, a risk management framework has been developed for the decommissioning work. It is applied to fuel assembly retrieval from Unit 3 spent fuel pool. Whole retrieval work is divided into three phases: preparation, retrieval, and transportation and storage. First of all, the end point has been established and the success path has been developed. Then, possible threats, which are internal/external and technical/societal/management, are identified and selected. "What can go wrong?" is a question about the failure scenario. The likelihoods and consequences for each scenario are roughly estimated. The whole decommissioning project will continue for several decades, i.e., long-term perspective is important. What should be emphasized is that we do not always have enough knowledge and experience of this kind. It is expected that the decommissioning can make steady and good progress in support of the proposed risk management framework. Thus, risk assessment and management are required, and the process needs to be updated in accordance with the most recent information and knowledge on the decommissioning works.

Modeling of Ransomware using Colored Petri Net (칼라 페트리 네트를 이용한 랜섬웨어의 모델링)

  • Lee, Yo-Seob
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • The advent of cryptography has become a means of obtaining real monetary benefits to hackers, which has recently led to a surge in the number of Ransomware and the associated damage has increased significantly. It is expected that malicious codes will be expanded to new areas by meeting passwords, and Ransomware will be further increased in the future. To solve these problems, we need a model that can detect and block intrusion of Ransomware by analyzing the intrusion path of Ransomware. In this paper, we collect and analyze the data of Ransomware, and create and analyze Ransomware's color Petri net model.

A Study on Tools for Worm Virus & DDoS Detection (대규모 백본망의 웜 바이러스와 분산서비스거부공격 탐지시스템 연구)

  • Lee Myung-Sun;Lee Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.993-998
    • /
    • 2004
  • As Worm Virus & DDoS attack appeares, the targets and damage of infringement accidents are extending from specific system or services to paralysis of the network itself. These attacks are expending very frequently and strongly, and ISP who will be used as the path of these attacks will face serious damages. But compare to Worm Virus & DDoS attack that generally occures in many Systems at one time with it's fast propagation velocity, network dimensional opposition is slow and disable to deal with the whole appearance for it is operated manually by the network manager. Therefore, this treatise present devices how to detect Worm Virus & DDoS attack's outbreak and the attacker(attacker IP adderss) automatically.

The Effect of Stellate Ganglion Block on Endotracheal Intubation (성상 신경절 차단이 기관내 삽관에 따른 심혈관계 반응에 미치는 영향)

  • Rah, Eun-Gil;Yoon, Jung-Su;Oh, Hyun-Ju;Koo, Gill-Hoi
    • The Korean Journal of Pain
    • /
    • v.7 no.2
    • /
    • pp.175-180
    • /
    • 1994
  • The impact of cardiovascular changes occurred by endotracheal intubation is risky for patients with ischemic heart disease, or intracranial pathologic conditions typically impairing cerebral autoregulatory mechanisms. Therefore, multiple approaches have been utilized to limit the impact of intubation and reduce damage of central nervous and cardiovascular systems. These approaches include modifications in intubation technique to diminish circulatory stimuli and pharmacologic modifications of either the sensory afferent path or the circulatory response itself. We tried the stellate ganglion block, a kind of sympathetic block, for the same purpose and evaluated the results. The results of study are as follows, 1) Blood pressure and heart rate increased significantly after intubation as compared with preintubation in both control group and SGB group. 2) The difference of the two groups is not found. We conclude the above method does not control cardiovascular consequences of endotracheal intubation.

  • PDF

Experimental Analysis of GDL Degradation in PEM Fuel Cell (고분자전해질형 연료전지 가스확산층의 내구 성능 저하에 관한 실험적 분석)

  • Ha, Tae-Hun;Park, Jae-Man;Cho, Jun-Hyun;Min, Kyoung-Doug;Lee, Eun-Suk;Jung, Ji-Young;Kim, Do-Hun;Jin, Yong-Won;Lee, Dae-Han
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.132-132
    • /
    • 2009
  • To achieve the commercialization of PEM fuel cell, the durability problem must be solved. Recently, many researchers have focused on this durability problem and degradation studies about membrane and electrode have been reported. But durability characteristics of gas diffusion layer is not much reported yet. Durability of GDL is very important to maintain the performance of PEM fuel cell because the main function of GDL is a path of fuel and water and the GDL degradation causes the loss of the GDL function. In this study, the degradation of GDL, especially, the mechanical degradation process was investigated with the leaching test. The effect of water dissolution was observed through the test and the amount of GDL degradation was measured with various measurement methods such as weight measurement, static contact angle measurement, scanning electron microscope. After 2,000 hours test, the GDL showed structural damage and loss of hydrophobicity.

  • PDF