• Title/Summary/Keyword: 원동

Search Result 880, Processing Time 0.026 seconds

Experimental Study on the Characteristics of Polymer-modified Lightweight Aggregate Concrete Using SBR Latex (SBR Latex를 이용한 폴리머 개질 경량콘크리트의 특성에 관한 실험적 연구)

  • Ahn, Nam-Shik;Won, Dong-Min;Park, Noh-Hyun;Kim, Hee-Cheul;Kim, Kwan-Soo
    • Journal of Korean Association for Spatial Structures
    • /
    • v.9 no.4
    • /
    • pp.61-72
    • /
    • 2009
  • As a trend of construction has become high-rise and larger, it is necessary to reduce the self-weight of structures and buildings. One of the most effective methods to reduce the self-weight of structures and buildings is to use the lightweight aggregate concrete. To complement the strength of the lightweight aggregate concrete, polymer was added to concrete's mixing. In this study, experiments to make the moderate mixing proportion of polymer modified lightweight concrete were performed. Also the hardened concrete tests were performed to investigate the physical characteristics of the polymer-modified lightweight aggregate concrete. As a result, the flexural strength was increased by a small quantity of SBR Latex. Based on the test results the estimating equation was proposed through the regression analysis.

  • PDF

Implement of Semi-automatic Labeling Using Transcripts Text (전사텍스트를 이용한 반자동 레이블링 구현)

  • Won, Dong-Jin;Chang, Moon-soo;Kang, Sun-Mee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.6
    • /
    • pp.585-591
    • /
    • 2015
  • In transcription for spoken language research, labeling is a work linking text-represented utterance to recorded speech. Most existing labeling tools have been working manually. Semi-automatic labeling we are proposing consists of automation module and manual adjustment module. Automation module extracts voice boundaries utilizing G.Saha's algorithm, and predicts utterance boundaries using the number and length of utterance which established utterance text. For maintaining existing manual tool's accuracy, we provide manual adjustment user interface revising the auto-labeling utterance boundaries. The implemented tool of our semi-automatic algorithm speed up to 27% than existing manual labeling tools.

Effects of Novel Fin Shape of High Temperature Heat Exchanger on 1 kW Class Stirling Engine (1kW급 스털링엔진 고온 열교환기의 Fin 형상 개선 효과 분석)

  • Ahn, Joon;Kim, Seok Yeon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.41 no.8
    • /
    • pp.545-552
    • /
    • 2017
  • In this research, numerical analysis was carried out on novel and existing fins, adjusted in terms of factors such as length, spacing, and angle, of a high-temperature heat exchanger for a 1 kW class Stirling engine, designed as a prime mover for a domestic cogeneration system. The performance improvement as a result of shape optimization was confirmed with numerical analysis by including the air preheater, which was not considered during optimization. However, a negative heat flux was observed in the cylinder head portion. This phenomenon was clarified by analyzing the exhaust gas and wall surface temperature of the combustion chamber. Furthermore, assuming an ideal cycle, the effects of heat transfer enhancement on the thermodynamic cycle and system performance were predicted.

The study on Ceramic Kilns for Common Qualities Based on the Sejongsillokjiriji -Focused on Woohari Kiln Site- (世宗實錄地理志에 나타난 中品磁器所에 관한 硏究 -于下理 窯址를 中心으로-)

  • Kim, Jong-Tae
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.307-318
    • /
    • 2004
  • We could understand that Woohari oven place is the main place to create important ceramic from Sejongsillokjiriji through the research on the collected remains and books. It was very important founding to understand The history of Korean ceramic industry as well as the special feature of the valuable ceramic in Chosun Dynasty because this place is considered as the original place for center of creating valuable ceramic which called Gongseunghyun during the King, Sejong. Most of the unearthed pieces are containers for living. Specially, it shows clearly about this thought after we found a piece of a soup bowl which has the black letter "Seon". So Woorhar Kiln is an official place to manage food during the King, Sejong(1420') which took care of tribute for one of Sasunsa.

  • PDF

Frequency Control Method of Grid Interconnected Microgrid Operating in Stand Alone Mode (계통연계형 마이크로그리드의 독립운전시 주파수 제어에 관한 연구)

  • Chae, Woo-Kyu;Lee, Hak-Ju;Park, Jung-Sung;Cho, Jin-Tae;Won, Dong-June
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1099-1106
    • /
    • 2012
  • Microgrid is a new electrical energy system that composed of various generators, renewable energy, batteries and loads located near the electrical customers. When Microgrid is interconnected with large power system, Microgrid don't need to control the frequency. But in case of the outage or faults of power system, Microgrid should control the frequency to prevent the shutdown of Microgrid. This paper presents the frequency control methods using the droop function, being used by synchronous generators and EMS(Energy Management System). Using droop function, two battery systems could share the load based on locally measured signals without any communications between batteries. Also, we suggest that EMS should control the controllable distributed generators as P/Q control modes except batteries to overcome the weakness of droop function. Finally we suggest the two batteries systems to prolong the battery's life time considering the economical view. The validation of proposed methods is tested using PSCAD/EMTDC simulations and field test sites at the same time.

Design for Zombie PCs and APT Attack Detection based on traffic analysis (트래픽 분석을 통한 악성코드 감염PC 및 APT 공격탐지 방안)

  • Son, Kyungho;Lee, Taijin;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.491-498
    • /
    • 2014
  • Recently, cyber terror has been occurred frequently based on advanced persistent threat(APT) and it is very difficult to detect these attacks because of new malwares which cannot be detected by anti-virus softwares. This paper proposes and verifies the algorithms to detect the advanced persistent threat previously through real-time network monitoring and combinatorial analysis of big data log. In the future, APT attacks can be detected more easily by enhancing these algorithms and adapting big data platform.

An ID-based Blind Signature Scheme using the Gap Diffie-Hellman Group in Wireless Environments (무선환경에 적합한 GaP Diffie-Hellman 그룹을 사용한 ID 기반 은닉서명 방식)

  • 김현주;김수진;원동호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.720-728
    • /
    • 2003
  • Blind signature is such a signature scheme that conceals the contents of signature itself and who is the user of the signature make user's anonymity possible. For this reason, they are used in security services such as electronic cashes and electronic votes in which the behavior of actor should not be exposed. In this paper we propose an ID-based blind signature scheme from Gap Diffie-Hellman group. Its security is based on the hardness of Computational Diffie-Hellman Problem. Proposed scheme efficiently improve against existing blind signature scheme by using two-pass protocol between two users and by reducing computation process. Therefore it can be used efficiently in wireless PKI environment.

The DC Link Energy Control Method of Dynamic Voltage Restorer System (DVR(Dynamic Voltage Restorer)에서의 직류에너지 제어 방법)

  • Jeong, Il-Yeop;Park, Sang-Yeong;Won, Dong-Jun;Mun, Seung-Il;Park, Jong-Geun;Han, Byeong-Mun
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.12
    • /
    • pp.575-583
    • /
    • 2001
  • Dynamic Voltage Restorer(DVR) which is installed between the supply and a critical load can restore voltage disturbances in distribution system. The restoration is based on injecting the same voltages as voltage sags. The ideal restoration is compensation to make the load voltages be unchanged. But voltage restoration involves real power or energy injection and the capability of energy storage is limited. So it must be considered how injection energy can be minimized and voltages can be made close to the voltages before fault. This paper describes conventional restoration techniques, which draw minimum energy from the DVR in order to correct a given voltage sag or swell. And this paper proposes a new concept of restoration technique to inject minimum energy. The proposed method is based on the definition of voltage tolerance in load side. Hence using the proposed method a particular disturbance can be corrected with less amount of storage energy compared to those of conventional methods.

  • PDF

A Study on Recoverable and Untraceable E-cash for Improving Efficiency (복구가능성과 불추적성을 제공하는 전자화폐의 효율성 향상을 위한 연구)

  • Jang, Seung-Heui;Lee, Chang-Seop;Song, Jin-Wook;Lee, Jung-Pil;Chang, Woo-Suk;Won, Dong-Ho;Kim, Seung-Joo
    • Annual Conference of KIPS
    • /
    • 2006.11a
    • /
    • pp.735-738
    • /
    • 2006
  • 전자화폐가 안전하게 널리 사용되기 위해서는 여러 가지 특성을 만족해야 한다. 그러한 특성 중에서 데이터의 손실이나 분실에 따른 피해를 막기 위한 복구가능성과 사용자의 전자화폐 사용 내역과 같은 정보를 보호하기 위한 불추적성은 서로 충돌하는 특성으로 동시에 달성하는 것이 매우 어렵다. 기존에 제안된 전자회폐 시스템에서는 이 문제를 해결하는 과정에서 해쉬함수를 사용하였으나, 해쉬함수의 충돌회피성 때문에 실제로 구현하여 사용하는데 문제가 있다. 본 논문에서는 이에 대한 해결 방안을 제시하여 좀 더 효율적으로 구현 가능한 전자화폐 시스템을 제안한다.

  • PDF

Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria (아이디/패스워드 통합 관리 제품의 취약성 분석 및 평가기준 제안)

  • Han, Jeong-Hoon;Lee, Byung-Hee;Hong, Su-Min;Kim, Seung-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.125-132
    • /
    • 2008
  • As the development of Internet technology, the number of IDs managed by each individuals has been increased. And many software development institutes have developed ID/PW management solutions to facilitate secure and convenient management of ID/PW. However, these solutions also can be vulnerable in case of administrator's password exposure. Thus, we need to derive security requirements from the vulnerability analysis of these solutions, also we need evaluation criteria for secure ID/PW management solution development. In this paper, we analyze the vulnerability of ID/PW management solution and propose the evaluation criteria for secure ID/PW management solution.