• Title/Summary/Keyword: process control techniques

Search Result 601, Processing Time 0.026 seconds

A Review on Environmental Restoration of the Waste Landfills (쓰레기매립지의 환경복원)

  • Kim, Kee Dae;Lee, Eun Ju
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.6 no.6
    • /
    • pp.56-71
    • /
    • 2003
  • Waste landfills have been the center of environmental problems and they must be restored due to environmental pollution, disgusting landscape, and cost of management. It is suggested that they be recycled urban space as cities expand. Specially, nonsanitary waste landfills which have no pollution prevention facilities cause serious problems. Restoring the landfills as parks and golf courses, so on makes more benefits because of cheap use land, closeness to urban area, flat topography applicable to parks and golf courses, and high land values after restoration and the changes to local recreation sites. Restoration of waste landfills is a complex, costly, and interdisciplinary work. But, the waste landfill is a manmade ecosystem. Control, restoration and postmanagement of waste landfills are very important problems. The role of vegetation prevents soil erosion, reduces soil water storage, and obstructs leachate seepage. Early restoration makes derelict lands into man park artificially geared to soil, vegetation, landforms and hydrology. But, Ideal restoration is to make stable ecosystem nature-friendly and compatible with surrounding landscape without more management. Landscape is structured hierarchically with patches and stands as small components and forms forest as large components. Therefore, landscape formation of the waste landfills needs much restoration process. There are many ecological restoration techniques for the waste landfills. Those are divided into artificial and natural methods. The artificial method is anthropogenic plantings while the natural method is to trigger and use succession processes. The most important thing in the restoration of waste landfills is to consider the final restoration objectives of each waste landfill. According to these objectives, the depth of covering layer, planting degree, and structural design should be determined. The effective restoration methods should be selected of artificial and natural options.

Effect of biocide addition on plantlet growth and contamination occurrence during the in vitro culture of blueberry

  • Huh, Yoon Sun;Lee, Joung Kwan;Kim, Ik Jei;Kang, Bo Goo;Lee, Ki Yeol
    • Journal of Plant Biotechnology
    • /
    • v.42 no.2
    • /
    • pp.111-116
    • /
    • 2015
  • Interest and great demand for blueberry (Vaccinium corymbosum) have increased, as V. corymbosum is now one of the most economically important crops in Korea. It is expected that blueberry production and the area planted for cultivation will increase consistently in the years ahead because of high profitability and the consumer's demand for healthy ingredients. Effective mass production of blueberry is urgently needed for commercial cultivation establishment, but a main limitation is lack of a propagation system that produces a disease-free plant material for commercial plantation. A large amount of research has focused entirely on developing tissue culture techniques for blueberry propagation. However, controlling fungal and bacterial contamination of woody plant material is extremely difficult. Our study was conducted to investigate the effect of biocide addition during the in vitro culture of blueberry on plantlet growth and contamination occurrence. Four biocides, including Plant Preservative Mixture ($PPM^{TM}$), vancomycin, nystatin and penicillin G, were used in varying concentrations during the in vitro propagation of blueberry. When nystatin was added into the medium at low concentrations, the overall growth of blueberry plantlets was retarded. Addition of vancomycin and penicillin G in high concentrations decreased contamination but induced plantlet mortality. On the other hand, when 1ml/L $PPM^{TM}$ was added, the growth characteristics of blueberry plantlets did not significantly differ from non-treatment (control), and the contamination occurrence rate was very low. From these results, we found that the addition of the appropriate biocide could provide an effective method to reduce contamination in the culture process, thereby raising in vitro production efficiency.

ESTIMATION OF SUGAR AND REDUCING SUGAR IN MOLASSES USING NEAR INFRARED REFLECTANCE SPECTROSCOPY

  • Mehrotra, Ranjana;Gupta, Alka;Tewari, Jagdish;Varma, S.P.
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1258-1258
    • /
    • 2001
  • Estimation of sugar and reducing sugar content in molasses is very important task in sugar refineries. Conventional methods of determination of sugar content in molasses samples are highly time consuming and employ hazardous chemicals. Due to the physical properties of molasses, probability of error in conventional analytical techniques is high. These methods have proven to be inefficient for a process control in any sugar industry. Hence development of a rapid, inexpensive, physical and also accurate method for sugar determination in molasses will be highly useful. Near Infrared spectroscopy is being widely used worldwide as an analytical technique in food industry. The technique offers the advantage of being non-destructive and rapid. The present paper highlights the potential of near infrared reflectance spectroscopy as a rapid and automated analytical technique for determination of sugar and reducing sugar content in molasses. A number of molasses samples were collected during and after the sugar season from Havana Sugar Industry, Havana. The samples were chosen so as to obtain a wide range of concentration of sugar and reducing sugars. This was done in order to achieve a good calibration curve with widely spread data points. These samples were scanned in the region of 1100 - 2500 nm in diffuse reflectance mode. An indigenous ELICO NIR spectrophotometer, modified according to the requirements of sugar industry was used for this purpose. Each sample was also analyzed simultaneously by standard chemical methods. Chemical values were taken as reference for near infrared analysis. In order to obtain the most accurate calibration for the set of samples, various mathematical treatments were employed. Partial Least Square method was found to be most suitable for the analysis. A comparison is made between the actual values (chemical values) and the predicted values (NIR values). The actual values agree very well with the predicted values showing the accuracy of the technique. The validity of the technique is checked by predicting the concentration of sugar in unknown molasses samples using the calibration curve. The present investigation assesses the feasibility of the technique for on-line monitoring of sugars present in molasses in sugar industries.

  • PDF

Issues of IPR Database Construction through Interdisciplinary Research (학제간 연구를 통한 IPR 데이터베이스 구축의 쟁점)

  • Kim, Dong Yong;Park, Young Chul
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.59-69
    • /
    • 2017
  • Humanities and social sciences researchers and database experts have teamed up to build a database of IPR materials prepared by the Institute of Pacific Relations (IPR). This paper presents the issues and solutions inherent in the database construction for ensuring the quality of IPR materials. For the accessibility of the database, we maintain the database on the Web so that researchers can access it via web browsers; for the convenience of the database construction, we provide an integrated interface that allows researchers to perform all tasks in it; for the completeness of IPR materials constructed, we support the responsible input and the responsible approval that identify responsibilities of each IPR material entered; and for the immediacy of the approval, we support an interactive approval process facilitating the input of researchers. We also use database design, query processing, transaction management, and search and sorting techniques to ensure the correctness of IPR materials entered. In particular, through concurrency control using existence dependency relationships between records, we ensure the correctness between the operating system files and their paths. Our future studies include content search, database download and upload, and copyright related work on IPR materials.

Chine Shape Optimization for Directional Stability at High Angle of Attack (고 받음각에서의 방향 안정성 향상을 위한 Chine 형상 최적설계)

  • Park, Hyeong-Uk;Park, Mee-Young;Lee, Jae-Woo;Byun, Yung-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.9
    • /
    • pp.825-834
    • /
    • 2008
  • Nose chine shape optimization study has been performed to maximize the directional stability at high angle of attack supersonic flow. Various chine shapes are generated using super ellipse equation. By numerically investigating the directional stability characteristics of those shapes, the baseline configuration for the shape optimization has been selected using the three-dimensional Navier-Stokes equations. The configuration is represented by the NURBS curves which can adjust the surface geometry by the control points. The response surfaces are constructed to obtain optimum shape which has high directional stability characteristics and lift-to-drag ratio. From this study, an efficient configuration design and optimization process which utilizes the parameter-based configuration generation techniques and approximation method has been established, then 29% improvement of the directional stability by strong vortexes from chine nose is accomplished.

Vital Area Identification Rule Development and Its Application for the Physical Protection of Nuclear Power Plants (원자력발전소의 물리적방호를 위한 핵심구역파악 규칙 개발 및 적용)

  • Jung, Woo Sik;Hwang, Mee-Jeong;Kang, Minho
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.3
    • /
    • pp.160-171
    • /
    • 2017
  • US national research laboratories developed the first Vital Area Identification (VAI) method for the physical protection of nuclear power plants that is based on Event Tree Analysis (ETA) and Fault Tree Analysis (FTA) techniques in 1970s. Then, Korea Atomic Energy Research Institute proposed advanced VAI method that takes advantage of fire and flooding Probabilistic Safety Assessment (PSA) results. In this study, in order to minimize the burden and difficulty of VAI, (1) a set of streamlined VAI rules were developed, and (2) this set of rules was applied to PSA fault tree and event tree at the initial stage of VAI process. This new rule-based VAI method is explained, and its efficiency and correctness are demonstrated throughout this paper. This new rule-based VAI method drastically reduces problem size by (1) performing PSA event tree simplification by applying VAI rules to the PSA event tree, (2) calculating preliminary prevention sets with event tree headings, (3) converting the shortest preliminary prevention set into a sabotage fault tree, and (4) performing usual VAI procedure. Since this new rule-based VAI method drastically reduces VAI problem size, it provides very quick and economical VAI procedure. In spite of an extremely reduced sabotage fault tree, this method generates identical vital areas to those by traditional VAI method. It is strongly recommended that this new rule-based VAI method be applied to the physical protection of nuclear power plants and other complex safety-critical systems such as chemical and military systems.

Performance Analysis of Error Control Techniques Using Forward Error Correction in B-ISDN (B-ISDN에서 Forward Error Correction을 이용한 오류제어 기법의 성능분석)

  • 임효택
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9A
    • /
    • pp.1372-1382
    • /
    • 1999
  • The major source of errors in high-speed networks such as Broadband ISDN(B-lSDN) is buffer overflow during congested conditions. These congestion errors are the dominant sources of errors in 1high-speed networks and result in cell losses. Conventional communication protocols use error detection and retransmission to deal with lost packets and transmission errors. However, these conventional ARQ(Automatic Repeat Request) methods are not suitable for the high-speed networks since the transmission delay due to retransmissions becomes significantly large. As an alternative, we have presented a method to recover consecutive cell losses using forward error correction(FEC) in ATM(Asynchronous Transfer Mode)networks to reduce the problem. The performance estimation based on the cell discard process model has showed our method can reduce the cell loss rate substantially. Also, the performance estimations in ATM networks by interleaving and IP multicast service are discussed.

  • PDF

Study on Wear Properties of GCV Materials with DLC Coating (GCV소재의 DLC 코팅 마모특성에 관한 연구)

  • Lee, Soo-Chul;Kim, Nam-Seok;Nam, Ki-Woo;Ahn, Seok-Hwan;Kim, Hyun-Soo
    • Journal of Ocean Engineering and Technology
    • /
    • v.24 no.6
    • /
    • pp.71-75
    • /
    • 2010
  • Although Graphite Compacted Vermicular (GCV) was first observed in 1948, the narrow range for stable foundry production precluded the high volume application of GCV to complex components such as cylinder blocks and heads until advanced process control technologies became available. This, in turn, had to await the advent of modern measurement electronics and computer processors. Following the development of foundry techniques and manufacturing solutions, primarily initiated in Europe during the 1990s, the first series production of GCV cylinder blocks began during 1999. Today, more than 40,000 GCV cylinder blocks are produced each month for OEMs, including Audi, DAF, Ford, Hundai, MAN, Mercedes, PSA, Volkswagen, and Volvo. Given that new engine programs are typically intended to support three to four vehicle generations, the chosen engine materials must satisfy current design criteria and also provide the potential for future performance upgrades without changing the overall block architecture. With at least a 75% increase in the ultimate tensile strength, a 40% increase in the elastic modulus, and approximately double the fatigue strength of either iron or aluminum, GCV is ideally suited to meet current and future of engine design and performance requirements.

A Study on the Secure Database Controlled Under Cloud Environment (클라우드 환경하에서의 안전한 데이터베이스 구축에 관한 연구)

  • Kim, SungYong;Kim, Ji-Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1259-1266
    • /
    • 2013
  • Nowadays, the databases are getting larger and larger. As the company has difficulty in managing the database, they want to outsource the database to the cloud system. In this case the database security is more important because their database is managed by the cloud service provider. Among database security techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and on the approach for searching, and the retrieval efficiency that is implemented. In this paper we propose the new suitable mechanism to encrypt the database and lookup process on the encrypted database under control of the cloud service provider. This database encryption algorithm uses the bloom filter with the variable keyword based index. Finally, we demonstrate that the proposed algorithm should be useful for database encryption related research and application activities.

Response Technique for the Vulnerability of Broadcast Intent Security in Android (안드로이드 브로드캐스트 인텐트의 보안 취약성 대응기법)

  • Lim, Jae-Wan;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.61-67
    • /
    • 2012
  • Accordingly the number of smart-phone-based malicious codes is also increasing and their techniques for malicio us purpose are getting more clever and evolved. Among them, the malicious codes related to Android take the major portion and it can be estimated that they are based on open source so that the access to the system is easy. Intent is a technique to support the communication between application's components by transmitting message subjects in Android. Intent provides convenience to developers, but it can be utilized as security vulnerability that allows the developer with a malicious purpose to control the system as intended. The vulnerability of intent security is that personal information can be accessed using discretionally its proper function given to application and smart phone's functions can be maliciously controlled. This paper improves with the Intent security vulnerability caused by the smart phone users' discretional use of custom kernel. Lastly, it verifies the malicious behaviors in the process of installing an application and suggests a technique to watch the Intent security vulnerability in realtime after its installation.