• Title/Summary/Keyword: 보호공

Search Result 1,581, Processing Time 0.025 seconds

Effect of Thermally Grown TiO2 Interlayer on Chlorine Evolution Efficiency and Durability of Ti/RuO2-PdO-TiO2 Electrodes (열산화법으로 생성된 TiO2 중간보호층이 Ti/RuO2-PdO-TiO2전극의 염소발생 효율 및 내구성에 미치는 영향)

  • Park, Da Jung;Choi, Sung Mook;Lee, Kyu Hwan
    • Journal of the Korean institute of surface engineering
    • /
    • v.51 no.4
    • /
    • pp.207-213
    • /
    • 2018
  • Not only efficiency of chlorine evolution reaction (CER) but also durability namely service life is very important property in dimensional stable anode for Ballast Water Management System (BWMS) for marine ships. Many researchers have been focused on improving efficiency of CER by controlling composition, phase and surface area for a long time, but the efforts to increase durability was relatively small. In this study, we have investigated the effect of $TiO_2$ protective interlayers on efficiency and durability of DSA electrodes. $TiO_2$ protective interlayers were prepared by thermal oxidation at 500, 600 and $700^{\circ}C$ on Ti substrate. And then the DSA electrodes consisting of $Ti/RuO_2-PdO-TiO_2$ were prepared by thermal decomposition method on $TiO_2$ interlayers. The efficiencies of CER of DSA electrodes without $TiO_2$ interlayer and with $TiO_2$ interlayer grown at 500, 600 and $700^{\circ}C$ were 94.19, 94.45, 84.60 and 76.75% respectively. On the otherhand, durabilities were 30, 55, 90 and 65 hours respectively. In terms of industrial aspect, the performance of DSA is considered high efficiency and durability which can correspond to total production of chlorine. If we considered the performance index of DSA as the product of efficiency and durability, performance indices could be recalculated as 28.26, 50.85, 76.14 and 49.89 respectively. As the thermal oxidation temperature increasing, life time were increased remarkerbly, while efficiency of CER was decreased slightly. As a result, DSA electrode with $TiO_2$ interlayer grown at $600^{\circ}C$ has shown about 2.7 times performace of original DSA electrode without $TiO_2$ interlayer.

Consecutive Difference Expansion Based Reversible DNA Watermarking (연속적 차분 확장 기반 가역 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.51-62
    • /
    • 2015
  • Of recent interests on high capacity DNA storage, DNA watermarking for DNA copyright protection, and DNA steganography for DNA secret communication are augmented, the reversible DNA watermarking is much needed both to embed the watermark without changing the functionality of organism and to perfectly recover the host DNA sequence. In this paper, we address two ways of DE based reversible DNA watermarking using noncoding DNA sequence. The reversible DNA watermarking should consider the string structure of a DNA sequence, the organism functionality, the perfect recovery, and the high embedding capacity. We convert the string sequence of four characters in noncoding region to the decimal coded values and embed the watermark bit into coded values by two ways; DE based multiple bits embedding (DE-MBE) using pairs of neighbor coded values and consecutive DE-MBE (C-DE-MBE). Two ways process the comparison searching to prevent the false start codon that produces false coding region. Experimental results verified that our ways have more high embedding capacity than conventional methods and produce no false start codon and recover perfectly the host sequence without the reference sequence. Especially C-DE-MBE can embed more high two times than DE-MBE.

A Resilient Key Renewal Scheme in Wireless Sensor Networks (센서 네트워크에서 복원력을 지닌 키갱신 방안)

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.103-112
    • /
    • 2010
  • In sensor networks, because sensors are deployed in an unprotected environment, they are prone to be targets of compromise attack, If the number of compromised nodes increases considerably, the key management in the network is paralyzed. In particular, compromise of Cluster Heads (CHs) in clustered sensor networks is much more threatening than that of normalsensors. Recently, rekeying schemes which update the exposed keys using the keys unknown to the compromised nodes are emerging. However, they cause some security and efficiency problems such as single group key employment in a cluster, passive eviction of compromised nodes, and excessive communication and computation overhead. In this paper, we present a proactive rekeying scheme using renewals of duster organization for clustered sensor networks. In the proposed scheme, each sensor establishes individual keys with neighbors at network boot-up time, and these keys are employed for later transmissions between sensors and their CH. By the periodic cluster reorganization, the compromised nodes are expelled from network and the individual keys employed in a cluster are changed continuously. Besides, newly elected CHs securely agree a key with sink by informing their members to sink, without exchangingany keying materials. The simulation results shows that the proposed scheme remarkably improves the confidentiality and integrity of data in spite of the increase of compromised nodes. Also, they show that the proposed scheme exploits the precious energy resource more efficiently than SHELL.

Application of Oryza sativa (Rice) Bran Oil as an Anti-pollution Cosmetic Material (쌀겨오일의 안티폴루션 화장품 소재로써의 응용)

  • Kang, Hae-Ran;Jung, So Young;Heo, Hyojin;Cha, Byungsun;Brito, Sofia;Lee, So Min;Yeo, Hye Lim;Yoo, Kyung Wan;Kwak, Jun Soo;Kwak, Byeong-Mun;Lee, Mi-Gi;Bin, Bum-Ho
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.47 no.3
    • /
    • pp.237-245
    • /
    • 2021
  • Particulate matter and ultra-particle matters generally refer to very small floating dust, such as 1/6 to 1/7 and 1/20 to 1/30, respectively, compared to the thickness of human hair, and contain various types of heavy metal ions. In addition to breathing, particle matters (PM) that flows in through the gaps in the pores of the skin can induce health problems in the body's tissues and skin, so it must be removed by blocking the inflow or by washing. Through this study, we confirmed the possibility that heavy metal ions can be adsorbed and removed by using Oryza sativa (Rice) bran oil (OSBO). In addition, the cell viability is much higher than that of grain-derived components through cytotoxicity experiments, and the cytoprotective effect of an external stimulus source can be expected. It was confirmed that the expression amount of COL1A1 mRNA increased, and accordingly, it was believed that wrinkles that might be caused by moisture lost by heavy metal ions in fine dust could be alleviated. Based on the results of these experiments, we tried to present a cosmetics containing OSBO, which is a wash-off formulation, in order to finally remove heavy metals.

A Problematic Bubble Detection Algorithm for Conformal Coated PCB Using Convolutional Neural Networks (합성곱 신경망을 이용한 컨포멀 코팅 PCB에 발생한 문제성 기포 검출 알고리즘)

  • Lee, Dong Hee;Cho, SungRyung;Jung, Kyeong-Hoon;Kang, Dong Wook
    • Journal of Broadcast Engineering
    • /
    • v.26 no.4
    • /
    • pp.409-418
    • /
    • 2021
  • Conformal coating is a technology that protects PCB(Printed Circuit Board) and minimizes PCB failures. Since the defects in the coating are linked to failure of the PCB, the coating surface is examined for air bubbles to satisfy the successful conditions of the conformal coating. In this paper, we propose an algorithm for detecting problematic bubbles in high-risk groups by applying image signal processing. The algorithm consists of finding candidates for problematic bubbles and verifying candidates. Bubbles do not appear in visible light images, but can be visually distinguished from UV(Ultra Violet) light sources. In particular the center of the problematic bubble is dark in brightness and the border is high in brightness. In the paper, these brightness characteristics are called valley and mountain features, and the areas where both characteristics appear at the same time are candidates for problematic bubbles. However, it is necessary to verify candidates because there may be candidates who are not bubbles. In the candidate verification phase, we used convolutional neural network models, and ResNet performed best compared to other models. The algorithms presented in this paper showed the performance of precision 0.805, recall 0.763, and f1-score 0.767, and these results show sufficient potential for bubble test automation.

Numerical Analysis on Development of Nozzle Shape for NOVEC Gas Extinguishing System (NOVEC가스 소화설비용 노즐 형상 설계에 대한 수치해석)

  • Yun, Jeong In;Jung, Kyung Kuk;Kim, Ji Sung;Kim, Sung Yoon;Rho, Beom-Seok;Choi, Jae-Hyuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.7
    • /
    • pp.939-944
    • /
    • 2018
  • Clean fire extinguishing agents refer to chemical that can replace Halon 1211 and Halon 1310 according to the Montreal Protocol fermented to protect the Earth's ozone layer. In Korea and abroad, system standardization and performance evaluation of clean fire extinguishing agents are being carried out. This paper proposes an optimal nozzle shape by modeling and numerical analysis of various nozzle shapes based on general clean fire extinguishing system. The ejection speed of the nozzle can be improved by studying three - dimensional modeling of the nozzle for two shapes, Type A and B. Flow analysis was performed on the two types of nozzles and the gas velocity and pressure distribution were measured with different nozzle diameters. It was confirmed that the jetting speed was changed at the nozzle outlet according to the number and diameter of the nozzle holes. The flow rate increased with increasing the pressure regardless of the nozzle hole diameter. Based on the results obtained from the experiment, the K-factor value was deduced. Finally, a nozzle with a 12-hole structure with a 5-mm nozzle hole was proposed.

Antioxidant and Anti-inflammatory Effects of Ethanol Extract of Aster yomena in RAW 264.7 Macrophages (RAW 264.7 대식세포에서 쑥부쟁이 추출물의 항산화 및 항염증 효능에 관한 연구)

  • Kim, Sung Ok;Jeong, Ji-Suk;Choi, Yung Hyun
    • Journal of Life Science
    • /
    • v.29 no.9
    • /
    • pp.977-985
    • /
    • 2019
  • Aster yomena (Kitam.) Honda is an edible vegetable and perennial herb belonging to the Asteraceae family, and has been used for a long time for the prevention and treatment of various diseases. Although leaf extracts of A. yomena are known to have antioxidant and anti-inflammatory effects, accurate efficacy assessments are still inadequate. In this study, we investigated whether the antioxidant efficacy of ethanol extract of A. yomena leaf (EEAY) is correlated with the anti-inflammatory effect in RAW 264.7 macrophages. The results showed that EEAY significantly inhibited the hydrogen peroxide ($H_2O_2$)-induced growth inhibition in RAW 264.7 cells, which was associated with increased expression of nuclear factor erythroid 2-related factor-2 (Nrf2) and heme oxygenase-1 (HO-1). EEAY pretreatment also effectively prevented $H_2O_2$-induced reactive oxygen species generation and apoptosis through inhibition of caspase-3 activation and poly (ADP-ribose) polymerase degradation. Additionally, EEAY significantly increased the expression and production of interleukin-10, a representative anti-inflammatory cytokine, which was associated with increased expression of toll-like receptor 4 and myeloid differentiation factor 88 at transcriptional and translational levels. Furthermore, the increased production of nitric oxide (NO) by lipopolysaccharide was markedly abolished under the condition of EEAY pretreatment, and the inhibitory effect of NO production by EEAY was further increased by hemin, an HO-1 inducer. Overall, our results suggest that EEAY is able to activate the Nrf2/HO-1 signaling pathway to protect RAW 264.7 macrophages from oxidative and inflammatory stress.

A Study on the Improvement of Satellite Image Information Service System (위성영상정보 서비스 시스템 개선방안 연구)

  • Cho, Bo-Hyun;Yang, Keum-Cheol;Kim, Song-Gang;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.41-47
    • /
    • 2017
  • The Marine Environment Observation Information System supplies oceanographic information elements such as water temperature, chlorophyll, float, etc. based on satellite images to consumers. The data produced by the Korean marine environmental observatories are located in the coastal areas of Korea. But if the range is too far from a particular area of interest, due to distance or spatial constraints, the accuracy and up-to-dateness of the data can not be relied upon. Therefore, it is necessary to perform fusion and complex operation to solve the difference between the field observation and the marine satellite image. In this study, we develop a system that can process marine environmental information in the user's area of interest in the form of layered character (numeric) information considering the readability and light weight rather than the satellite image. In order to intuitively understand satellite image information, we characterize (quantify) the marine environmental information of the area of interest and we process the satellite image band values into layered characters to minimize the absolute amount of transmitted / received data. Also we study modular location-based interest information service method to be able to flexibly extend and connect interested items that diversify various observation fields as well as application technology to serve this.

Development of a Movable Dust Collector with High Efficiency for Ladle in Foundry (주물공장의 레이들용 고효율 이동형 집진장치 개발)

  • Hong, Jun Ho;Lee, Sang Hwan
    • Journal of Korea Foundry Society
    • /
    • v.41 no.1
    • /
    • pp.16-25
    • /
    • 2021
  • The development of technology to prevent environmental pollutants and reduce energy consumption has already become a very significant issue not only for the foundry industry but also for society as a whole. In this paper, we introduce a new dust collector developed for low energy consumption and high performance compared to a roof top dust collector. The roof top dust collector which is using widely in the domestic foundry plant has a low performance about the dust suction ability in spite of high energy consumption because it is installed in a high place to collect the whole dust from all processes in foundry. A dust collector away from dust sources inevitably has low energy efficiency. The development of an efficient collector for foundry is very difficult because the position of the dust source continues to change from the melting process to the pouring process. New dust collector is installed on the ladle transfer equipment such as cranes, hoists, and monorails to effectively respond to moving dust sources. The movable device, attached close to the source of dust, provides high performance even with low energy consumption. The new dust collector is expected to be an environment-friendly device that can be applied to the foundry.

Watermarking for Digital Hologram by a Deep Neural Network and its Training Considering the Hologram Data Characteristics (딥 뉴럴 네트워크에 의한 디지털 홀로그램의 워터마킹 및 홀로그램 데이터 특성을 고려한 학습)

  • Lee, Juwon;Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.26 no.3
    • /
    • pp.296-307
    • /
    • 2021
  • A digital hologram (DH) is an ultra-high value-added video content that includes 3D information in 2D data. Therefore, its intellectual property rights must be protected for its distribution. For this, this paper proposes a watermarking method of DH using a deep neural network. This method is a watermark (WM) invisibility, attack robustness, and blind watermarking method that does not use host information in WM extraction. The proposed network consists of four sub-networks: pre-processing for each of the host and WM, WM embedding watermark, and WM extracting watermark. This network expand the WM data to the host instead of shrinking host data to WM and concatenate it to the host to insert the WM by considering the characteristics of a DH having a strong high frequency component. In addition, in the training of this network, the difference in performance according to the data distribution property of DH is identified, and a method of selecting a training data set with the best performance in all types of DH is presented. The proposed method is tested for various types and strengths of attacks to show its performance. It also shows that this method has high practicality as it operates independently of the resolution of the host DH and WM data.