• 제목/요약/키워드: 오작동

Search Result 299, Processing Time 0.024 seconds

Development of the EM Wave Absorber Using MnZn-Ferrite and Sendust for Wireless LAN at 2.4 GHz (MnZn-Ferrite와 Sendust를 이용한 2.4 GHz 무선LAN용 전파흡수체 개발)

  • Lee, Dae-Hee;Choi, Chang-Mook;Choi, Dong-Han;Kim, Dong-Il
    • Journal of Navigation and Port Research
    • /
    • v.31 no.10
    • /
    • pp.865-868
    • /
    • 2007
  • Recently, wireless LANs are often applied in home or office because of its various of convenience. Frequency range of wireless LANs specified by IEEE 802.11b is at 2.4 GHz. The bluetooth, the microwave oven, and the PDA(Personal Digital Assistants) uses, however, the same frequency band. So problems will be produced in these environments, such as multi-pass interference and system-to-system interference. These problems can be eliminated by using EM wave absorber. In this paper, we designed and fabricated EM wave absorber using MnZn-Ferrite, Sendust, and CPE( Chlorinated Polyethylene). The EM wave absorber with the ratio of material (MnZn-Ferrite : Sendust : CPE = 64 : 16 : 20 wt.%) has thickness of 3.7 mm and absorption ability more than 17 dB at 2.4 GHz.

Trace impurities analysis of the electronic polymer resins by neutron activation analysis (중성자방사화분석법에 의한 전자소재용 고분자수지의 불순물 분석법연구)

  • Yoon, Yoon Yeol;Cho, Soo Young;Lee, Kil Yong;Yang, Myung Kwon;Shim, Sang Kwon;Chung, Yong Sam
    • Analytical Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.308-314
    • /
    • 2004
  • When the polymer was used for the guard raw materials of electronic device, the content of U, Th and their daughter nuclides were known as a factor of soft error. Because emitted alpha ray could be caused of mis-operation. And ionic impurities such as Cl, Fe, Na could shorten the device life-time. For the analysis of trace impurities in the polymer, neutron activation analysis(NAA) and ICP/AES have been studied. To improve the accuracy and sensitivity of the trace and ultratrace metallic impurities in the epoxy and phenol polymer, sample pretreatment method and optimum analytical condition of NAA were developed. Using the above method, U, Th and other 23 trace impurity elements were analyzed.

Experiments on Development A Pulse-Gun Pressure-Wave Inducing Device for Stability Rating Test Technique (연소안정성 평가시험 기법을 위한 펄스건 압력파 유도장치 개발 실험)

  • Lee, Kwang-Jin;Kim, Hong-Jip;Seo, Seong-Hyeon;Moon, Il-Yoon;Kim, Hyung-Mo;Lee, Soo-Yong;Ko, Young-Sung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.3
    • /
    • pp.99-106
    • /
    • 2005
  • The SRT(stability rating test) technique, which is indispensable for the development of a LRE(liquid rocket engine), essentially requires a development of a combustion test sequence as well as artificial perturbation devices. For the development of an indigenous SRT technique, several combustion tests of sub-scale LRE were performed to search a proper combustion test sequence. At first, a pressure-wave inducing device which is used for adapting pulse gun was designed and a cooling gas supply system for the pressure-wave inducing device was set up to prevent a malfunction of pulse gun. Through the several combustion tests which included cooling procedure of a pressure-wave inducing device, a proper combustion test sequence was found out. It did not make any significant disturbance at normal combustion process. Finally, an indigenous SRT technique has been developed successfully.

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.

A Study of Recognition-Based user Multi-Smart Plug System (사용자 인식 기반 멀티-스마트 플러그에 관한 연구)

  • Oh, Jin-Seok;Lee, Hunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2976-2983
    • /
    • 2013
  • Interest in reducing standby power is increasing because of electric power shortages. Most of electric equipment are in standby state that does not use a function of the original, most electronic devices consume a lot of electric power even in standby mode. In many countries, research on the smart plug is advanced in order to prevent power consumption due to standby state. However, due to the nature of the function, expensive in many case. These smart plugs would be to cut the standby power using motion detecting sensor or pattern control of the user. Theses features have no advantages because of malfunction of motion detecting sensor and in accordance with the diversification ot user's pattern. In this study, developing a multi-smart plug system that linked with bluetooth function of user's smart phone. Using smart phone bluetooth function, determination of the position of the user. The suggestion smart plug cutting the standby power of the electronic apparatus. It was confirmed that it is able to reduce the power consumption according to the location of the user.

A Fair MAC Algorithm under Capture Effect in IEEE 802.11 DCF -based WLANs (IEEE 802.11 무선랜에서 캡쳐 효과를 고려한 Fair MAC 알고리즘)

  • Jeong, Ji-Woong;Choi, Sun-Woong;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.386-395
    • /
    • 2010
  • Widespread deployment of infrastructure WLANs has made Wi-Fi an integral part of today's Internet access technology. Despite its crucial role in affecting end-to-end performance, past research has focused on MAC protocol enhancement, analysis, and simulation-based performance evaluation without sufficiently considering a misbehavior stemming from capture effect. It is well known that the capture effect occurs frequently in wireless environment and incurs throughput unfairness between nodes. In this paper, we propose a novel Fair MAC algorithm which achieves fairness even under physically unfair environment. While satisfying the fairness, the proposed algorithm maximizes the system throughput. Extensive simulation results show that the proposed Fair MAC algorithm substantially improves fairness without throughput reduction.

A Owner's Privacy Preserving Protocol for u-Fitness-based Exercise Management in Cloud Computing (클라우드 컴퓨팅에서 u-Fitness 기반 운동 관리를 위한 소유자의 프라이버시를 보장하는 프로토콜)

  • Kim, Tae-yeon;Cho, Ki-hwan;Choi, Eun-Bok
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2017
  • There is growing interest in the use of cloud services these days because the amount of sensitive physical information related to u-fitness-based exercise management increase in explosive. However, it is possible to illegally access information stored in a cloud server, and to find out who owns the information, even, to illegally deduce an association among the information stored in its memory. The cloud server may also intentionally pass over the owner's legitimate operation requests such as modification and deletion of stored information, and may lose or damage information due to its malfunction. So, it is strongly required to solve the above problems because we can not trust the cloud server entirely. In this paper, we propose a protocol to preserve the privacy of the owner for u-Fitness-based exercise management in a cloud computing environment. And we show that our proposed architecture is applicable in real environment through security analysis and performance analysis.

A Design of the Ontology-based Situation Recognition System to Detect Risk Factors in a Semiconductor Manufacturing Process (반도체 공정의 위험요소 판단을 위한 온톨로지 기반의 상황인지 시스템 설계)

  • Baek, Seung-Min;Jeon, Min-Ho;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.804-809
    • /
    • 2013
  • The current state monitoring system at a semiconductor manufacturing process is based on the manually collected sensor data, which involves limitations when it comes to complex malfunction detection and real time monitoring. This study aims to design a situation recognition algorithm to form a network over time by creating a domain ontology and to suggest a system to provide users with services by generating events upon finding risk factors in the semiconductor process. To this end, a multiple sensor node for situational inference was designed and tested. As a result of the experiment, events to which the rule of time inference was applied occurred for the contents formed over time with regard to a quantity of collected data while the events that occurred with regard to malfunction and external time factors provided log data only.

Design of Identification and Measurements Acquisition Algorithm for Multi-Type Jammer Localization (다종 전파교란원 위치추정을 위한 식별 및 측정치 획득 알고리즘 설계)

  • Kang, Jae-Min;Lim, Deok-Won;Heo, Moon-Beom;Nam, Gi-Wook
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.616-624
    • /
    • 2013
  • When jamming signal is received, there would be malfunctions in GPS-based precise location systems. Especially, in aviation fields, these malfunctions may lead to more serious damages. Naturally, there are some research results about the prevention or location method for one jammer, but it is hard to identify and obtain measurements when multiple and various type signals are received. Therefore, we propose a method of identification and measurements acquisition algorithm in order to localize the multiple jammers which transmit CW, DSSS and SCW type signals. Also, a computer simulation is carried out so as to validate the feasibility of the proposed method by using MATLAB. From the simulation results, it is confirmed that the proposed method successfully identified the signal type and acquired the measurements of CW, DSSS and SCW type signals.

Heat Dissipation Design for KW Class Power Control Unit Mounted on Aircraft Store (항공기 장착물에 탑재되는 KW급 전력변환장치의 방열설계)

  • Choi, Seok-min;Kim, Hyung-jae;Jung, Jae-won;Lee, Chul
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.4
    • /
    • pp.261-266
    • /
    • 2020
  • When a KW-class power control unit is installed in an aircraft installation, a heat dissipation design for a large amount of heat generated during power conversion should be considered. Failure to provide adequate heat dissipation can lead to equipment malfunction and fire, which can be a fatal factor in aviation operations. This paper describes the heat dissipation design of a KW-class power control unit installed in aircraft installation. The design and manufacturing test were conducted through computerized analysis, and the analysis model was corrected by confirming the rapid heat generation phenomenon of the heating element due to high power control. After the model revision, the design was improved, and the high-temperature operation test of the US military standard MIL-STD-810G was performed to confirm the feasibility of the improved design.