• Title/Summary/Keyword: 안전블록

Search Result 570, Processing Time 0.028 seconds

A Study on the Dynamic Charateristics for Control of Gas-Fueled industrial Gas Boiler(I) (산業용 GAS 보일러의 動特性에 관한 硏究 (I))

  • 임종한;이종원
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.16 no.5
    • /
    • pp.965-973
    • /
    • 1992
  • Boilers, which are considered to be one of the basic equipment in industry, consume large potion of nation's petroleum and their demand is growing everyday. In recent, the technology improvement in production of high efficiency boilers and their effective utilization is needed for design of boiler which steam condition is the large capacity of high temperature and high pressure. It is necessary that boiler control system be studied for high efficiency, high reliability and smooth operation. The control of drum pressure and water level particularly becomes an important task for greater accuracy with the avail ability of boiler operation. To achieve this aim, dynamic analysis of a boiler is accomplished by choosing a boiler as a model. Transfer function thus obtained is made a comparison of measurement with reckoning to technical design data. The results of comparison makes it possible to verify thermodynamical analysis on the dynamic behavior of the overall system.

Numerical Analysis of Wave Impact Forces in Numerical Wave Basin (수치파 수조를 이용한 파랑 충격력 수치해석)

  • Shin, Young-Seop;Hong, Key-Yong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.205-210
    • /
    • 2006
  • The impact forces of the highly nonlinear waves are one of the important factors in designing the ocean structures. The impact forces are very difficult to analyze numerically and experimentally because they are impulsive in magnitude and occur instantaneously. In this study the numerical program based on N.S. equations are used to investigate the impact forces of steep waves where the waves are gene rated by the wave maker in the numerical wave basin. The arbitrary steep waves are generated by the superposition of waves of single frequency and the impact forces on vertical cylinder are simulated on the multiblock grids. V.O.F. and the local height function methods are used to track the free surfaces. To validate the numerical analysis the numerical results are compared with the experimental ones and the acceptable agreements are found. It is thought that more studies on the simulations of the incoming breaking waves and the impact forces on the vertical cylinder should be made to obtain the useful results to be applied in the offshore design.

  • PDF

Design of YK2 Cipher Algorithm for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호 알고리즘 설계)

  • Kang, Young-Ku;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3138-3147
    • /
    • 2000
  • EC(Electronic Commerce) which is cone the virtual space through Internet, has the advantage of time and space. On the contrary, it also has weak point like security probelm because anybody can easily access to the system due to open network attribute of Internet. Theretore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solution is the implemonlation of a strong cipher algorithm. YK2(YoungKu Kang) cipher algorithm proposed in this paper is advantage for the EC security and it overcomes the limit of the current 6/1 bits block cipher algorithm using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is degigned for the increase of time complexity and probability calculation by adapting more complex design for key scheduling regarded as one of the important element effected to enciyption.

  • PDF

Investigation on Construction Process and Efficiency of Underwater Construction Equipment for Rubble Mound Leveling works (수중 고르기 장비의 건설 공정 및 효율성 분석)

  • Won, Deokhee;Jang, In-Sung;Shin, Changjoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.372-378
    • /
    • 2016
  • A mound was constructed to install a caisson and sofa blocks underwater. The mound riprap, which were of uniform grade, size, shape, and specific gravity, formed the foundation for the support superstructure. Also, rubble leveling works were performed before installing structures such as caissons. In this study, underwater construction equipment was developed with a remotely controlled operating system and underwater environment monitoring system for unmanned underwater rubble leveling work. The performance of the developed equipment was verified using on-land and underwater tests. In addition to the performance verification, the construction process and economic efficiency of the equipment should be checked before applying it to the real construction field for commercial purposes. In this paper, a construction process using the developed equipment was proposed and compared with the existing rubble leveling method. The results demonstrated that the new construction method has higher economic efficiency and safety than the existing construction method.

Implementation and Performance Analysis of the EVM's Java Dynamic Memory Manager and Garbage Collector (EVM에서의 자바 동적 메모리 관리기 및 쓰레기 수집기의 구현 및 성능 분석)

  • Lee Sang-Yun;Won Hee-Sun;Choi Byung-Uk
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.295-304
    • /
    • 2006
  • Java has been established as one of the most widely-used languages owing to its support of object-oriented concepts, safety, and flexibility. Garbage collection in the Java virtual machine is a core component that relieves application programmers of difficulties related to memory management. In this paper, we propose a memory manager and a garbage collector that is implemented on a embedded java virtual machine. The memory manager divide a heap into various-sized cells and manages it as blocks of same-sized cells. So it is possible to allocate and free memory fast. We adopted the 3-color based Mark & Sweep garbage collector as our base algorithm and we propose 4-color based Mark & Sweep garbage collector for supporting multi-threaded program. The proposed garbage collector occurs memory fragmentation but we show through a experiment that the fragmentation ratio is almost fixed according as we create objects continuously.

A Study on Dynamic Behavior and Power Management Method of MOST Network Devices (MOST 네트워크 장치의 동적 행동과 전원 관리 방법에 관한 연구)

  • Jeon, Young-Joon;Jang, Si-Woong;Yu, Yun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.761-764
    • /
    • 2010
  • Interest in vehicle infotainment system, that provides both entertainment of driving and information for safe and convenient driving, has been recently increased. MOST is defined as the network transmitting high-bandwidth infortainment data to vehicle, and it has been standardized as MOST150. In this research, dynamic behavior method that deals with roles and functions of each devices connected to MOST150 Network, and Power Management Method was studied. MOST Network consists of a master device, including function block 'NetworkMaster', and all other devices called slave devices. The purpose of this study is to apply the analysis of the methods of operating and power management based on condition of master device and slave devices on MOST150 network to the future development of MOST150 devices.

  • PDF

Evaluation of Risk Factors to Detect Anomaly in Water Supply Networks Based on the PROMETHEE and ANP (상수도관망의 이상징후 판정을 위한 위험요소 평가 - PROMETHEE와 ANP 기법 중심으로)

  • Hong, Sung-Jun;Lee, Yong-Dae;Kim, Sheung-Kown;Kim, Joong-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.1 s.162
    • /
    • pp.35-46
    • /
    • 2006
  • In this study, we proposed a layout of the integrated decision support system in order to prevent the contamination and to manage risk in water supply networks for safe and smooth water supply. We evaluated the priority of risk factors to detect anomaly in water supply networks using PROMETHEE and ANP techniques, which are applied to various Multi-Criteria Decision Making area in Europe and America. To develop the model, we selected pH, residual chlorine concentration, discharge, hydraulic pressure, electrical conductivity, turbidity, block leakage and water temperature as the key data item. We also chose pipe corrosion, pipe burst and water pollution in pipe as the criteria and then we present the results of PROMETHEE and ANP analysis. The evaluation results of the priority of risk factors in water supply networks will provide basic data to establish a contingency plan for accidents so that we can establish the specific emergency response procedures.

Study on Digital Finance Secure Architecture based on Blockchain (블록체인 기반의 디지털 금융보안 아키텍처에 관한 연구)

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.415-425
    • /
    • 2021
  • In line with the trend of the digital transformation, the financial sector is providing financial services with new technologies. Among them, the open banking, which is drawing attention from global financial industry, is a service environment that maximizes customers' convenience and data utilization. In addition, the shift in the digital paradigm has also increased anxiety that security problems such as hacking and information leakage caused by data sharing are also concerned. A failure to overcome the negative view will hinder the development of financial services. This study presents a security governance system that can safely and comprehensively manage data in a digital financial ecosystem. This prepares a technical application plan by presenting a digital financial security architecture to field workers, focusing on the open banking service environment. It can be seen that this study is worthwhile by presenting a comprehensive information protection system that allows financial IT to introduce and utilize open banking services in a changing environment.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network (베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가)

  • Yoo, Byeongcheol;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.637-659
    • /
    • 2021
  • Since the creation of the first Bitcoin blockchain in 2009, the number of cryptocurrency users has steadily increased. However, the number of hacking attacks targeting assets stored in these users' cryptocurrency wallets is also increasing. Therefore, we evaluate the security of the wallets currently on the market to ensure that they are safe. We first conduct threat modeling to identify threats to cryptocurrency wallets and identify the security requirements. Second, based on the derived security requirements, we utilize attack trees and Bayesian network analysis to quantitatively measure the risks inherent in each wallet and compare them. According to the results, the average total risk in software wallets is 1.22 times greater than that in hardware wallets. In the comparison of different hardware wallets, we found that the total risk inherent to the Trezor One wallet, which has a general-purpose MCU, is 1.11 times greater than that of the Ledger Nano S wallet, which has a secure element. However, use of a secure element in a cryptocurrency wallet has been shown to be less effective at reducing risks.