• Title/Summary/Keyword: 원동

Search Result 880, Processing Time 0.027 seconds

Combined Propulsion System Analysis for Naval Combatant Vessels using Diesel and Gas Turbine Engine (디젤 및 가스터빈 엔진을 사용하는 전투함의 복합추진체계 기술 동향 분석)

  • Lee, H.M.
    • Journal of Power System Engineering
    • /
    • v.15 no.5
    • /
    • pp.16-21
    • /
    • 2011
  • The large scale decisive battle will be gradually reduced on the sea in the future and surface combatant ship installed advanced weapon units as well as propulsion system will be continuously increased. The high level of military technology leads to appear state-of-the-art weapon system using high power energy. As a results, fossil fuel powered main prime mover as diesel engine and gas turbine which are composed of mechanical propulsion system should be decreased from combatant ship in the near future. The new building naval combatant ship with the latest technology has electric based propulsion method of the hybrid type combined with mechanical and electrical drive. U.S. and Royal Navy, especially, select the integrated fully electric based propulsion system for the next generation combat ship and play an important roll for developing them. In this context, this paper was focused on the deduction of implications through analyzing the combatant ship propulsion system using diesel and gas turbine engine which are promoted on the worldwide.

그래핀 투명전극을 이용한 태양전지 제작 및 특성연구

  • Yu, Gwon-Jae;Seo, Eun-Gyeong;Kim, Cheol-Gi;Kim, Won-Dong;Hwang, Chan-Yong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.02a
    • /
    • pp.81-81
    • /
    • 2010
  • 태양광 또는 자연의 힘을 이용한 에너지의 생산은 가까운 미래에 화석연료의 고갈과 이들의 소모로 인해 발행하는 이산화탄소로 인한 지구 온난화등의 문제로 인하여 그 중요성이 점증되고 있는 실정이다. 특히 태양광으로부터 전기에너지를 얻는 발전 방식은 오래전부터 연구되어 왔고 또한 상용화되어 국부적으로 보조 에너지원으로 이용되어 지고 있다. 동작 원리에 따라 이종접합에서 오는 전위차를 이용하는 방법, 동종 물질의 pn접합을 이용하여 기전력을 얻은 방법 및 연료 감응형 종류가 있다. 이 중에서 물질의 이종접합을 이용하는 방법은 아주 오래된 태양전력을 얻는 방식이나 그 동안 연구가 미비하였던 것이 사실이다. 이에 우리는 새로운 재료인 그래핀을 이용하여 산화구리와의 이종접합 태양전지의 제작및 특성을 분석 하였다. 화학기상증착법 (CVD)을 이용해 그래핀을 구리 박편 표면에 성장하였다. 적절한 온도(섭씨 약 1000도)에서 아주 적은 양의 수소 및 메탄을 흘려 주었을때 손쉽게 단일 원자층의 그래핀이 코팅된 구리박편을 얻을 수 있으며, 이 박편을 고온에서 산화 시키면 그래핀은 산화되지 않고 구리만 산화되어 손쉽게 쇼트키타입 태양전지를 얻을 수 있다. 이때 그래핀은 다른 공정 없이 투명전극의 역할을 한다. 간단한 전극을 부착하여 태양전지를 성능을 평가 하였고 그래핀 및 산화구리의 계면효과를 분석하였다. 효율면에서 III-V족 및 실리콘계의 태양전지에 비해 떨어지나 산화구리의 결정화 순도및 산화구리와 금속간의 계면개선 연구를 통해 극복가능 할 것으로 생각된다.

  • PDF

Effect of NiO spin switching on the Fe film magnetic anisotropy in epitaxially grown Fe/NiO/Ag(001) and Fe/NiO/MgO(001) systems

  • Kim, Won-Dong;Park, Ju-Sang;Hwang, Chan-Yong;Wu, J.;Qiu, Z.Q.
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.02a
    • /
    • pp.366-366
    • /
    • 2010
  • Single crystalline Fe/NiO bilayers were epitaxially grown on Ag(001) and on MgO(001), and investigated by Low Energy Electron Diffraction (LEED), Magneto-Optic Kerr Effect (MOKE), and X-ray Magnetic Linear Dichorism (XMLD). We find that while the Fe film has an in-plane magnetization in both Fe/NiO/Ag(001) and Fe/NiO/MgO(001) systems, the NiO spins switch from out-of-plane direction in Fe/NiO/MgO(001) to in-plane direction in Fe/NiO/Ag(001). These two different NiO spin orientations generate remarkable different effects that the NiO induced magnetic anisotropy in the Fe film is much greater in Fe/NiO/Ag(001) than in Fe/NiO/MgO(001). XMLD measurement shows that the much greater magnetic anisotropy in Fe/NiO/Ag(001) is due to a 90o-coupling between the in-plane NiO spins and the in-plane Fe spins which causes a switching of the NiO spins during the Fe magnetization reversal.

  • PDF

Influencing Factors Affecting Caregivers' Service Quality for the Elderly with Dementia: Focusing on Dementia Knowledge, Work Value, and Job Performance Confidence (치매 노인을 돌보는 요양보호사의 서비스 질에 미치는 영향요인: 치매에 대한 지식, 일 가치감과 업무수행 자신감을 중심으로)

  • Kim, Doo Ree;Kim, Kwang Hwan;Lee, Soo Yeon;Han, Sun Hee;Lee, Gi Ran
    • Research in Community and Public Health Nursing
    • /
    • v.32 no.3
    • /
    • pp.233-242
    • /
    • 2021
  • Purpose: The purpose of this study was to verify influencing factors affecting service quality provided by caregivers working for the elderly with dementia. Methods: Data were collected using a self-reported questionnaire from 214 caregivers in a long-term care facility in D city. The data were analyzed with service quality, dementia knowledge, work value, and job performance confidence. For data analysis, the descriptive statistics, t-test, one-way ANOVA, Pearson correlation coefficients, and multiple regression were performed using SPSS/WIN 21.0 program. Results: There were significant differences in service quality depending on the health status. Factors influencing service quality were work value, and job performance confidence with R2 value of 38%. The highly influencing factors were work value, and job performance confidence. Conclusion: The results of this study indicate that the effort to improve the service quality of caregivers should focus on work value and job performance confidence.

A Study of Split Learning Model to Protect Privacy (프라이버시 침해에 대응하는 분할 학습 모델 연구)

  • Ryu, Jihyeon;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.49-56
    • /
    • 2021
  • Recently, artificial intelligence is regarded as an essential technology in our society. In particular, the invasion of privacy in artificial intelligence has become a serious problem in modern society. Split learning, proposed at MIT in 2019 for privacy protection, is a type of federated learning technique that does not share any raw data. In this study, we studied a safe and accurate segmentation learning model using known differential privacy to safely manage data. In addition, we trained SVHN and GTSRB on a split learning model to which 15 different types of differential privacy are applied, and checked whether the learning is stable. By conducting a learning data extraction attack, a differential privacy budget that prevents attacks is quantitatively derived through MSE.

An Efficient Certificate Status and Path Validation System for Client-Server Environment (클라이언트-서버환경에 적합한 효율적인 인증서상태 및 경로검증 시스템)

  • 최영철;박상준;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.99-113
    • /
    • 2003
  • As a research on PKI(Public Key Infrastructure) is being very popular, the study relating to certificate status and path validation is being grown with aim to reduce an overhead of the protocol and to provide an efficient operation. But in spite of a lot of related research there is still almost no protocol that we can use for real-time based client-server environment with large scale like internet banking. In this paper, we shows that the existing standards or protocols are not suitable to be used for such a real-time based client-server environment with large scale, and then proposes an efficient certificate status and path validation system.

A WTLS Handshake protocol against Active Attack (능동적 공격에 안전한 WTLS Handshake 프로토콜)

  • Han, Jong-Soo;Jung, Young-Seok;An, Ki-Bum;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.113-127
    • /
    • 2003
  • WTLS as secure protocol of WAP makes TLS that is used in wireless Intemet protocol for TCP security be appropriate for wireless environments. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of 4 protocols(Handshake, ChangeCipherSpec, Alert, Application Data etc.). In this papers we analyze properties of Handshake protocol and procedures of establishing master secret in detail. And then we analyze securities against several attacker models with them for a basis. Also we propose new Handshake protocol that is secure against active attacker model and can provide various security services.

Cryptanalysis on the Authentication Mechanism of the NateOn Messenger (네이트온 메신저의 사용자 인증 메커니즘에 대한 취약점 분석)

  • Shin, Dong-Hwi;Choi, Youn-Sung;Park, Sang-Joon;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.67-80
    • /
    • 2007
  • Nateon Messenger, which has the most number of users in Korea, supports many services such as E-mail, note, Cyworld, SMS, etc. In this paper, we will analyse the authentication traffic which is transmitted and received by the Nateon Messenger. Through performing the replay attack with the authentication information, we will show that an attacker can be authenticated illegally. Furthermore, we will show that other domestic messengers have similar security problems.

A Protection Profile for Access Control Based Database Security System (접근제어형 데이터베이스 보안 시스템의 보호프로파일)

  • Jeon, Woong-Ryul;Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.109-113
    • /
    • 2007
  • With increasing the mont of processed information over the network, the importance of database system increases rapidly. There are two types of security system for database, access control and data encryption. However, it is hard to evaluate security of database systems using the Common Criteria(CC) as there is no protection profile(PP) for these systems. In this paper, we propose a protection profile for secure database systems which can be used in formal evaluation using the Common Criteria. The proposed protection profile can be used by both developer and consumer to evaluate security of database systems.

Dynamic Pipe Hash Function (동적 파이프 해쉬 함수)

  • Kim, Hie-Do;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.47-52
    • /
    • 2007
  • In this paper, we proposed a constrution that creates Dynamic Pipe Hash Function with a pipe hash function. To increase security lever, dynamic hash function take and additional compression function. Proposed hash function based on the piped hash function. Our proposed Dynamic Pipe Hash Function is as secure against multicollision attack as an ideal hash function. And it have advantage for a number of reasons because of variable digest size. For example, in digital signature protocol, If a user requires increased security by selecting a large key size, useing a dynamic hash function in a protocol make implementation much easier when it is mandated that the size of the digest by increased.