• Title/Summary/Keyword: 수동형

Search Result 457, Processing Time 0.034 seconds

Improvement of Seismic Performance of Long-span Bridges using Complex Dampers (복합감쇠기를 이용한 장대교량의 내진성능향상)

  • Ha, Dong-Ho;Park, Kwan-Soon;Park, Won-Suk;Pyeon, Mu-Wook
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.11 no.3 s.55
    • /
    • pp.53-62
    • /
    • 2007
  • This paper presents a new vibration control method for long-span bridges using complex damper system. The new system presents simple mechanical configuration with oil and elasto-plastic dampers which have velocity and displacement dependency in vibration energy absorbing. This system can produce various damping forces according to the applied external forces by the velocity and displacement-dependent characteristics of the dampers. The oil damper dissipates vibration energy for relatively frequent and small amplitude like in the case for small to moderate earthquakes, whereas the elasto-plastic damper system works for rare and large amplitude vibration such as high seismic excitation. Thus, the proposed system exhibits the advantage of low cost with high performance since the roles of the two different dampers are effectively separated. A numerical model is established for the complex damper system, and the response characteristics and effectiveness of the proposed system are presented through numerical simulations. Numerical results show that the proposed complex damper system can significantly improve the seismic performance of long-span bridge structures with much more effective damping mechanism than single conventional passive damper systems.

Fabrication and performance analysis of cost-effective fiber grating lasers for WDM-PON systems (WDM-PON 시스템용 저가형 Fiber Grating Laser의 제작 및 성능 분석)

  • Cho, Seung-Hyun;Lee, Woo-Ram;Lee, Jie-Hyun;Park, Jae-Dong;Kim, Byoung-Whi;Kang, Min-Ho;Shin, Dong-Wook
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.1
    • /
    • pp.13-20
    • /
    • 2005
  • Fiber-Bragg-grating external cavity laser(FGL) modules were fabricated and experimentally analyzed. Proposed as a cost-effective solution for optical sources in the WDM-PON access network, FGL modules were packaged to TO-CAN type. We obtained a low threshold current of 13 mA, and an optical output power of 3.6 mW with a bias current of 60 mA at $25^{\circ}C$. The lasing wavelength dependencies on current and temperature were as small as 5.2 pm/mA and 30 pm/$^{\circ}C$, respectively. These change rates of the wavelength with the temperature and current are smaller than those of the DFB laser. Single-mode oscillations with the side-mode suppression ratio(SMSR) over 30 dB are maintained above the threshold current level. The FGL modules can be directly modulated at 155 Mbps, PRBS(2$^{23}$ -1) NRZ signal. Through the BER plots, we did not see the significant degradations before and after the transmission over 20km of the SMF at 155 Mb/s.

Closed Static Chamber Methods for Measurement of Methane Fluxes from a Rice Paddy: A Review (벼논 메탄 플럭스 측정용 폐쇄형 정적 챔버법: 고찰)

  • Ju, Okjung;Kang, Namgoo;Lim, Gapjune
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.22 no.2
    • /
    • pp.79-91
    • /
    • 2020
  • Accurate assessment of greenhouse gas emissions is a cornerstone of every climate change response study, and reliable assessment of greenhouse gas emission data is being used as a practical basis for the entire climate change prediction and modeling studies. Essential, fundamental technologies for estimating greenhouse gas emissions include an on-site monitoring technology, an evaluation methodology of uncertainty in emission factors, and a verification technology for reductions. The closed chamber method is being commonly used to measure gas fluxes between soil-vegetation and atmosphere. This method has the advantages of being simple, easily available and economical. This study presented the technical bases of the closed chamber method for measuring methane fluxes from a rice paddy. The methane fluxes from rice paddies occupy the largest portion of a single source of greenhouse gas in the agricultural field. We reviewed the international and the domestic studies on automated chamber monitoring systems that have been developed from manually operated chambers. Based on this review, we discussed scientific concerns on chamber methods with a particular focus on quality control for improving measurement reliability of field data.

A design on low-power and small-area EEPROM for UHF RFID tag chips (UHF RFID 태그 칩용 저전력, 저면적 비동기식 EEPROM 설계)

  • Baek, Seung-Myun;Lee, Jae-Hyung;Song, Sung-Young;Kim, Jong-Hee;Park, Mu-Hun;Ha, Pan-Bong;Kim, Young-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2366-2373
    • /
    • 2007
  • In this paper, a low-power and small-area asynchronous 1 kilobit EEPROM for passive UHF RFID tag chips is designed with $0.18{\mu}m$ EEPROM cells. As small area solutions, command and address buffers are removed since we design asynchronous I/O interface and data output buffer is also removed by using separate I/O. To supply stably high voltages VPP and VPPL used in the cell array from low voltage VDD, Dickson charge pump is designed with schottky diodes instead of a PN junction diodes. On that account, we can decrease the number of stages of the charge pump, which can decrease layout area of charge pump. As a low-power solution, we can reduce write current by using the proposed VPPL power switching circuit which selects each needed voltage at either program or write mode. A test chip of asynchronous 1 kilobit EEPROM is fabricated, and its layout area is $554.8{\times}306.9{\mu}m2$., 11% smaller than its synchronous counterpart.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Development and Verification of Active Vibration Control System for Helicopter (소형민수헬기 능동진동제어시스템 개발)

  • Kim, Nam-Jo;Kwak, Dong-Il;Kang, Woo-Ram;Hwang, Yoo-Sang;Kim, Do-Hyung;Kim, Chan-Dong;Lee, Ki-Jin;So, Hee-Soup
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.3
    • /
    • pp.181-192
    • /
    • 2022
  • Active vibration control system(AVCS) for helicopter enables to control the vibration generated from the main rotor and has the superb vibration reduction performance with low weight compared passive vibration reduction device. In this paper, FxLMS algorithm-based vibration control software of the light civil helicopter tansmits the control command calculated using the signals of the tachometer and accelerometers to the circular force generator(CFG) is developed and verified. According to the RTCA DO-178C/DO-331, the vibration control software is developed through the model based design technique, and real-time operation performance is evaluated in PILS(processor in-the loop simulation) and HILS(hardware in-the loop simulation) environments. In particular, the reliability of the software is improved through the LDRA-based verification coverage in the PIL environments. In order to AVCS to light civil helicopter(LCH), the dynamic response characteristic model is obtained through the ground/flight tests. AVCS configuration which exhibits the optimal performance is determined using system optimization analysis and flight test and obtain STC certification.