• Title/Summary/Keyword: 기밀성능

Search Result 214, Processing Time 0.029 seconds

A Study on the Life-time Prediction for the Rubber O-ring applied to decoy through the Accelerated Life Test (기만기 적용 고무 O-ring의 온도에 따른 가속수명시험을 통한 수명예측에 관한 연구)

  • Jo, Hee-Jin;Kim, Minwoo;Gwak, Hyerim
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.182-188
    • /
    • 2016
  • A decoy is a weapon system that can protect vessels from an enemy's torpedo. Thus, the decoy should be able to operate in the field without any failure. Because the decoy can be inoperable once its sealing is broken and water permeates inside the system, the hermetic sealing capability considering the operational environment is mandatory. To be hermetically sealed, a rubber-type O-ring is generally used in a decoy system. The sealed performance of rubber-type products, however, tends to age and deteriorate with time. Therefore, the O-ring needs to be maintained or changed periodically. This paper proposes a method to estimate the proper maintenance period using the hardness and elongation percentage, which represents the performance of the O-ring product and test data from Accelerated Life Test (ALT) of the product. The O-ring used in this paper is a NBR type, and the temperature was chosen to be the main accelerating factor as referenced in many studies. The criteria for the failure of the O-ring was set for the product to be 50% degraded compared to the initial performance. In addition, the Korean standard KS M 6518 was adopted and referenced for the preparation of test samples and the calculation of estimates. The O-ring's predicted life was simulated by analyzing the test results from a computer program, and the optimized maintenance period for the product was determined.

Interfacial Reaction between seal and metal interconnect and effets of protecting layer in planar type SOFC stack (평판형 SOFC 스택의 밀봉재와 금속 분리판의 계면반응 및 보호층 효과)

  • Moon, J.W.;Kim, Y.W.;Seong, B.K.;Kim, D.H.;Jun, J.H.
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.11a
    • /
    • pp.72.2-72.2
    • /
    • 2010
  • 평판형 고체산화물 연료전지 스택의 고온 밀봉 구조에 대하여 설명하고 스택 운전 후 사후 분석을 통하여 밀봉재와 금속 분리판의 계면반응에 대하여 고찰하였다. 대표적인 고온 밀봉재인 Barium-Silicate 계 결정화 유리와 Fe-Cr 계 금속 분리판은 스택의 작동온도인 $700{\sim}850^{\circ}C$ 에서 고온 반응을 통하여 계면에 반응생성물을 형성하는 것이 확인되었다. 이러한 계면반응은 장기 운전시 SOFC 스택 성능 저하의 원인이 되고, 열 싸이클(작동온도${\leftrightarrow}$상온)을 가하면 계면반응 생성물이 delamination 되어 밀봉구조가 파괴되어 수명을 단축시키게 된다. 계면반응은 Fe-Cr 계 금속 분리판의 산화물인 Cr 산화물, Fe 산화물이 밀봉유리 소재와 반응을 일으키는 것이 주요 원인으로 판명되었다. SOFC 스택에서 열 싸이클시 계면반응에 의하여 기밀도가 감소하는 현상이 확인되었으며, 밀봉 구조의 어느 부분에서 계면반응이 진행되는지 관찰하였다. 이러한 계면반응을 막기 위해서는 금속 분리판과 밀봉유리 사이에 계면반응을 억제하는 보호층을 형성하는 방법이 효과적이다. 본 연구에서는 보호층으로서 밀봉유리 및 Fe-Cr 계 금속 분리판과의 계면반응성이 낮고 열팽창 계수가 비슷한 Yttria Stabilized Zirconia 층을 APS(Atmospheric Plasma Spray) 공정을 이용하여 형성하였다. 밀봉유리/YSZ 보호층/금속분리판은 gas-tight 한 밀봉 구조를 형성하였으며, YSZ 보호층은 밀봉유리와 Fe-Cr 계 금속 분리판 소재와 계면반응을 효과적으로 억제하는 것이 확인되었다.

  • PDF

고진공펌프종합특성평가시스템 설계, 진단기술 개발

  • Im, Jong-Yeon;Jeong, Wan-Seop;Kim, Wan-Jung;Nam, Seung-Hwan;Im, Seong-Gyu;In, Sang-Yeol;Hong, Seung-Su;Go, Deuk-Yong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.08a
    • /
    • pp.100-100
    • /
    • 2012
  • 지식경제부의 청정제조기반 산업원천개발사업의 일환으로 진행 중인 "초고진공펌프 개발" 과제 중 제3세부 과제인 "고진공펌프 종합특성평가시스템 설계, 진단기술 개발" 과제에서 진행되고 있는 연구수행결과를 소개한다. 국내 초고진공펌프 개발 수준의 선진화를 위한 기본적인 초석 확립은 현존하는 모든 진공 발생 장치의 국제적 신뢰성이 있는 완벽한 성능평가의 구현에 있다고 할 수 있다. 고진공펌프개발 총괄 과제의 대명제는 "국제적 신뢰성을 가지는 상용화 제품의 완성"이며, 이를 위한 3세부과제의 추진 방향은 기 완료된 1단계 기술개발에 근거한 1세부과제 및 2세부과제와의 유기적인 infra를 통한 성공적인 지원체계 구축 및 상용화 제품 개발 단계의 모든 신뢰성 확보 전략을 수립, 수행하는 것을 골자로 하고 있다. 또한 2단계 사업 추진 동안 제품 개발 주체인 산업체에 모든 개발된 기술을 적용할 수 있는 기반 제공 및 상용화를 위한 성공적인 기술이전도 포함된다. 상용화 개발 완료 후인 Post Project 기간 동안에 발생할 수 있는 모든 지원체계의 구축도 장기간에 걸친 연구 개발의 연장선상에서 추진되어야 될 것으로 예상된다. 세부 추진내용으로 나노팹 공정현장의 고진공펌프 신뢰성평가의 기본 개념설계를 포함한 현장 데이터의 확보 및 분석 현황, 공정현장의 실제 환경에 투입하기 전 단계의 모든 신뢰성 확보 방안, 터보분자펌프의 경우 파괴실험을 포함한 over speed, shock venting, foreign debris dropping test 등 상용화 단계에 필요한 기본 시험평가 조건을 고찰하고자 한다. 상용화 단계의 내구성 및 신뢰성 확보를 위한 전제 조건은 대외적으로 공표할 수 있는 시험 평가 데이터와 개발 주체에서 기밀 수준으로 유지해야만 하는 민감한 자료의 상시 생산 infra의 구축으로 볼 수 있다. 이러한 고진공펌프개발이라는 과제의 대명제를 완성하기 위하여 추진 연구개발 방향 등 진행형인 2년간의 최종 상용화에 필요한 국제 신뢰성, 공정대응성 확보 등 핵심사업 추진내용 및 infra 구축의 상세개발 로드맵을 완성하고자 한다.

  • PDF

Design of Securer Electronic payment system based on ECC algorithm (타원 곡선 암호를 이용한 안전한 메일 기반 전자지불시스템 설계)

  • 김성일;최문석;신병철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.817-820
    • /
    • 2003
  • With a great improvement of computers and Network communication skills, we can exchange information quickly. There have been many researches on the subject how to guarantee the information security by security mechanism and cryptography schemes. Nowadays, many people in this area show their interest in money transfer systems between accounts, which can provide a secure mechanism in which people can send money to the legitimate party or person safe. However, we have teamed many ways to distort messages and repudiate the malicious activity in mail systems based on SSL mechanism. It is very likely that important information which must be kept in secret is laid exposed to un_authorized user. Accordingly, to provide stronger security service, researches on electronic payment system which tan guarantee the security characteristics such as confidentiality, integrity, user authentication, Non-repudiation, are strongly needed. In this paper, we analize the characteristics of the previous researches in this field, and also propose a securer electronic payment system based on ECC algorithm.

  • PDF

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF

An Implementation of Authentication and Encryption of Multimedia Conference using H.235 Protocol (H.235 프로토콜에 의한 영상회의의 인증과 암호화 구현)

  • Sim, Gyu-Bok;Lee, Keon-Bae;Seong, Dong-Su
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.343-350
    • /
    • 2002
  • This paper describes the implementation of H.235 protocol for authentication and media stream encryption of multimedia conference systems. H.235 protocol is recommended by ITU-T for H.323 multimedia conference security protocol to prevent from being eavesdropped and modified by an illegal attacker. The implementation in this paper has used password-based with symmetric encryption authentication. Media streams are encrypted using the Diffie-Hellman key exchange algorithm and symmetric encryption algorithms such as RC2, DES and Triple-DES. Also, 128-bit Advanced Encryption Standard and 128-bit Korean standard SEED algorithms are implemented for the future extension. The implemented authentication and media stream encryption has shown that it is possible to identify terminal users without exposing personal information on networks and to preserve security of multimedia conference. Also, encryption delay time and used memory are not increased even though supporting media stream encryption/decryption, thus the performance of multimedia conference system has not deteriorated.

A Secure Model for Reading and Writing in Hadoop Distributed File System and its Evaluation (하둡 분산파일시스템에서 안전한 쓰기, 읽기 모델과 평가)

  • Pang, Sechung;Ra, Ilkyeun;Kim, Yangwoo
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.55-64
    • /
    • 2012
  • Nowadays, as Cloud computing becomes popular, a need for a DFS(distributed file system) is increased. But, in the current Cloud computing environments, there is no DFS framework that is sufficient to protect sensitive private information from attackers. Therefore, we designed and proposed a secure scheme for distributed file systems. The scheme provides confidentiality and availability for a distributed file system using a secret sharing method. In this paper, we measured the speed of encryption and decryption for our proposed method, and compared them with that of SEED algorithm which is the most popular algorithm in this field. This comparison showed the computational efficiency of our method. Moreover, the proposed secure read/write model is independent of Hadoop DFS structure so that our modified algorithm can be easily adapted for use in the HDFS. Finally, the proposed model is evaluated theoretically using performance measurement method for distributed secret sharing model.

OTACUS: Parameter-Tampering Prevention Techniques using Clean URL (OTACUS: 간편URL기법을 이용한 파라미터변조 공격 방지기법)

  • Kim, Guiseok;Kim, Seungjoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.55-64
    • /
    • 2014
  • In a Web application, you can pass without restrictions special network security devices such as IPS and F/W, URL parameter, which is an important element of communication between the client and the server, is forwarded to the Web server. Parameters are modulated by an attacker requests a URL, disclose confidential information or through e-commerce, can take financial gain. Vulnerability parameter manipulation thereof cannot be able to determine whether to operate in only determined logical application, blocked with Web Application Firewall. In this paper, I will present a technique OTACUS(One-Time Access Control URL System) to complement the shortcomings of the measures existing approaches. OTACUS can be effectively blocked the modulation of the POST or GET method parameters passed to the server by preventing the exposure of the URL to the attacker by using clean URL technique simplifies complex URL that contains the parameter. Performance test results of the actual implementation OTACUS proves that it is possible to show a stable operation of less than 3% increase in the load.

A Study on the Chattering under Cryogenic Flow Test of a Oxidizer Shutoff Valve (산화제 개폐밸브의 극저온 유동시험에서 채터링의 고찰)

  • Lee, JoongYoup;Han, SangYeop;Lee, SooYong
    • Aerospace Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.108-117
    • /
    • 2013
  • The oxidizer shutoff valve of a gas generator controls the mass flow rate of the propellant of a rocket engine using pilot pressure and spring the force of the valve. The developing oxidizer shutoff valve can be shut off if the pilot pressure is removed from the actuator. Therefore, force balancing is necessary to analyze the characteristics of the forces with respect to the opening and closing of the valve in order to evaluate its performance. In light of this, the valve has been designed to adjust the control pressure required to open the poppet and to determine the working fluid pressure at which the valve starts to close. Under cryogenic flow test as a tests level of C.R.T(Control Random Test), the chattering phenomena occurred due to much leakage of a metal seat section. The pressure for chattering of the oxidizer valve is predicted at about 11 bar using force balancing analysis.

A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors (임베디드 프로세서에 적합한 LSB 기반 지문영상의 효율적인 부분 암호화 방법)

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Kim, Ju-Man
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1304-1313
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a specific bitplane of each pixel of the fingerprint image. We use the LSB as specific bitplane instead of MSB used to encrypt general multimedia contents because simple attacks can reveal the fingerprint ridge information even from the MSB-based encryption. Based on the experimental results, our proposed algorithm can reduce the execution time of the full encryption by a factor of six and guarantee both the integrity and the confidentiality without any leakage of the ridge information.

  • PDF