• Title/Summary/Keyword: Associated technologies

Search Result 462, Processing Time 0.023 seconds

Numerical Investigation on Wall Flow Control for Preventing Contaminants Deposition inside a Duct (덕트 내 오염물질 퇴적 방지를 위한 벽면유동 제어에 관한 해석적 연구)

  • Lee, Banguk;Lee, Jeekeun
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.25 no.5
    • /
    • pp.261-268
    • /
    • 2013
  • Technologies for preventing contaminants deposition are a key issue in a modern duct system. When particulate matters deposit inside the exhaust pipes, which are widely used in the Urea-SCR system to reduce $NO_x$ emission from heavy duty diesel engines, many problems arise associated with increased flow resistance and corrosion. Therefore, the development of the urea deposition avoidance technologies is being treated as an important issue of the Urea-SCR system. An analytical study was carried out to investigate the effects of the wall flow around the mixer with the variation of the mixer housing surrounding and supporting the mixer, which is designed to increase the wall flow and then to reduce droplet deposition. The housing angles and the position of the mixer were changed:angles of $0^{\circ}$, $1^{\circ}$, $2^{\circ}$, and $3^{\circ}$, and mixer positions of 0 L, 0.5 L, and 1 L. The axial velocity distributions, maximum velocity, the half-width, and momentum distribution of the wall flow were investigated to examine the effect of the mixer-housing assembly geometry.

Recent progress in using Drosophila as a platform for human genetic disease research

  • Wan Hee Yoon
    • Journal of Genetic Medicine
    • /
    • v.20 no.2
    • /
    • pp.39-45
    • /
    • 2023
  • As advanced sequencing technologies continue to uncover an increasing number of variants in genes associated with human genetic diseases, there is a growing demand for systematic approaches to assess the impact of these variants on human development, health, and disease. While in silico analyses have provided valuable insights, it is essential to complement these findings with model organism studies to determine the functional consequences of genetic variants in vivo. Drosophila melanogaster is an excellent genetic model for such functional studies due to its efficient genetic technologies, high gene conservation with humans, accessibility to mutant fly resources, short life cycles, and cost-effectiveness. The traditional GAL4-UAS system, allowing precise control of gene expression through binary regulation, is frequently employed to assess the effects of monoallelic variants. Recombinase medicated cassette exchange or CRISPR-Cas9-mediated GAL4 insertion within coding introns or substitution of gene body with Kozak-Gal4 result in the loss-of-function of the target gene. This GAL4 insertion strategy also enables the expression of reference complementary DNA (cDNA) or cDNA carrying genetic variants under the control of endogenous regulatory cis elements. Furthermore, the CRISPR-Cas9-directed tissue-specific knockout and cDNA rescue system provides the flexibility to investigate candidate variants in a tissue-specific and/or developmental-timing dependent manner. In this review, we will delve into the diverse genetic techniques available in Drosophila and their applications in diagnosing and studying numerous undiagnosed diseases over the past decade.

Methods of Improving Operational Reliability of Oil Well Casing

  • Sergey A. Dolgikh;Irek I. Mukhamatdinov
    • Corrosion Science and Technology
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • Oil well casing leak is caused by contact of casing outer surface with formation electrolyte. It is usually associated with an aquifer with a high salt content or absence of a cement ring behind the casing. The only way to reduce external casing corrosion is through cathodic protection. Through cathodic polarization of casing structure, electron content in crystal lattice and electron density will increase, leading to a potential shift towards the cathodic region. At Tatneft enterprises, cathodic protection is carried out according to cluster and individual schemes. The main criterion for cathodic protection is the size of protective current. For a casing, the protective current is considered sufficient if measurements with a two-contact probe show that the electric current directed to the casing has eliminated all anode sites. To determine the value of required protective current, all methods are considered in this work. In addition, an analysis of all methods used to determine the minimum protective current of the casing is provided. Results show that the method of measuring potential drop along casing is one of the most reliable methods for determining the value of protective current.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

An Intelligent Decision Support System for Selecting Promising Technologies for R&D based on Time-series Patent Analysis (R&D 기술 선정을 위한 시계열 특허 분석 기반 지능형 의사결정지원시스템)

  • Lee, Choongseok;Lee, Suk Joo;Choi, Byounggu
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.79-96
    • /
    • 2012
  • As the pace of competition dramatically accelerates and the complexity of change grows, a variety of research have been conducted to improve firms' short-term performance and to enhance firms' long-term survival. In particular, researchers and practitioners have paid their attention to identify promising technologies that lead competitive advantage to a firm. Discovery of promising technology depends on how a firm evaluates the value of technologies, thus many evaluating methods have been proposed. Experts' opinion based approaches have been widely accepted to predict the value of technologies. Whereas this approach provides in-depth analysis and ensures validity of analysis results, it is usually cost-and time-ineffective and is limited to qualitative evaluation. Considerable studies attempt to forecast the value of technology by using patent information to overcome the limitation of experts' opinion based approach. Patent based technology evaluation has served as a valuable assessment approach of the technological forecasting because it contains a full and practical description of technology with uniform structure. Furthermore, it provides information that is not divulged in any other sources. Although patent information based approach has contributed to our understanding of prediction of promising technologies, it has some limitations because prediction has been made based on the past patent information, and the interpretations of patent analyses are not consistent. In order to fill this gap, this study proposes a technology forecasting methodology by integrating patent information approach and artificial intelligence method. The methodology consists of three modules : evaluation of technologies promising, implementation of technologies value prediction model, and recommendation of promising technologies. In the first module, technologies promising is evaluated from three different and complementary dimensions; impact, fusion, and diffusion perspectives. The impact of technologies refers to their influence on future technologies development and improvement, and is also clearly associated with their monetary value. The fusion of technologies denotes the extent to which a technology fuses different technologies, and represents the breadth of search underlying the technology. The fusion of technologies can be calculated based on technology or patent, thus this study measures two types of fusion index; fusion index per technology and fusion index per patent. Finally, the diffusion of technologies denotes their degree of applicability across scientific and technological fields. In the same vein, diffusion index per technology and diffusion index per patent are considered respectively. In the second module, technologies value prediction model is implemented using artificial intelligence method. This studies use the values of five indexes (i.e., impact index, fusion index per technology, fusion index per patent, diffusion index per technology and diffusion index per patent) at different time (e.g., t-n, t-n-1, t-n-2, ${\cdots}$) as input variables. The out variables are values of five indexes at time t, which is used for learning. The learning method adopted in this study is backpropagation algorithm. In the third module, this study recommends final promising technologies based on analytic hierarchy process. AHP provides relative importance of each index, leading to final promising index for technology. Applicability of the proposed methodology is tested by using U.S. patents in international patent class G06F (i.e., electronic digital data processing) from 2000 to 2008. The results show that mean absolute error value for prediction produced by the proposed methodology is lower than the value produced by multiple regression analysis in cases of fusion indexes. However, mean absolute error value of the proposed methodology is slightly higher than the value of multiple regression analysis. These unexpected results may be explained, in part, by small number of patents. Since this study only uses patent data in class G06F, number of sample patent data is relatively small, leading to incomplete learning to satisfy complex artificial intelligence structure. In addition, fusion index per technology and impact index are found to be important criteria to predict promising technology. This study attempts to extend the existing knowledge by proposing a new methodology for prediction technology value by integrating patent information analysis and artificial intelligence network. It helps managers who want to technology develop planning and policy maker who want to implement technology policy by providing quantitative prediction methodology. In addition, this study could help other researchers by proving a deeper understanding of the complex technological forecasting field.

Case Study on Induced Seismicity during the Injection of Fluid Related to Energy Development Technologies (에너지개발기술에 있어 유체주입에 따른 유발지진 발생 사례분석)

  • Lee, Chung-In;Min, Ki-Bok;Kim, Kwang-Il
    • Tunnel and Underground Space
    • /
    • v.24 no.6
    • /
    • pp.418-429
    • /
    • 2014
  • Induced seismicity related to four energy development technologies that involve fluid injection or withdrawal: geothermal energy, conventional oil and gas development including enhanced oil recovery (EOR), shale gas recovery, and carbon capture and storage (CCS) is reviewed by literature investigation. The largest induced seismic events reported in the technical literature are associated with projects that did not balance the large volume of fluids injected into, or extracted from the underground reservoir. A statistical observation shows that the net volume of fluid injected and/or extracted may serve as a proxy for changes in subsurface stress conditions and pore pressure, and other factors. Energy technology projects that are designed to maintain a balance between the amount of fluid being injected and the amount of fluid being withdrawn, such as geothermal and most oil and gas development, may produce fewer induced seismic events than technologies that do not maintain fluid balance, such as long-term wastewater disposal wells and CCS projects.

Design and Implementation of a Intelligent Power-Saving Management System using RFID/USN Technology (RFID/USN 기술을 이용한 지능형 절전관리 시스템 설계 및 구현)

  • Jeong, kyu-seuck;Seo, dong-min;Park, young-hun;Yoo, jae-soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.526-531
    • /
    • 2009
  • Recently, many interests on the ubiquitous environment and the practical technologies associated with it have been significantly increasing along with the rapid development of wireless technologies. The development of the automated systems based on the ubiquitous environment is required as the concept of the term "ubiquitous" is integrated into the fields of existing IT. In this paper, we design and implement a power-saving management system using RFID/USN technologies. It efficiently manages the power consumption of the electronic machine such as electric lights, electric heaters, and air conditioners in a building. The proposed system controls the electronic machines and monitors their status by RFID and collects the real time information about the surroundings and power consumption of the electronic machines by USN. Especially, it analyzes the real time information and supports the intelligent scheduler with the best power-saving. Finally, this paper shows the difference between the proposed system and the existing systems and the reality of our system through the real time user interface about the power-saving management.

  • PDF

Ultrahigh Vacuum Technologies Developed for a Large Aluminum Accelerator Vacuum System

  • Hsiung, G.Y.;Chang, C.C.;Yang, Y.C.;Chang, C.H.;Hsueh, H.P.;Hsu, S.N.;Chen, J.R.
    • Applied Science and Convergence Technology
    • /
    • v.23 no.6
    • /
    • pp.309-316
    • /
    • 2014
  • A large particle accelerator requires an ultrahigh vacuum (UHV) system of average pressure under $1{\times}10^{-7}$ Pa for mitigating the impact of beam scattering from the residual gas molecules. The surface inside the beam ducts should be controlled with an extremely low thermal outgassing rate under $1{\times}10^{-9}Pa{\cdot}m^3/(s{\cdot}m^2)$ for the sake of the insufficient pumping speed. To fulfil the requirements, the aluminum alloys were adopted as the materials of the beam ducts for large accelerator that thanks to the good features of higher thermal conductivity, non-radioactivity, non-magnetism, precise machining capability, et al. To put the aluminum into the large accelerator vacuum systems, several key technologies have been developed will be introduced. The concepts contain the precise computer numerical control (CNC) machining process for the large aluminum ducts and parts in pure alcohol and in an oil-free environment, surface cleaning with ozonized water, stringent welding process control manually or automatically to form a large sector of aluminum ducts, ex-situ baking process to reach UHV and sealed for transportation and installation, UHV pumping with the sputtering ion pumps and the non-evaporable getters (NEG), et al. The developed UHV technologies have been applied to the 3 GeV Taiwan Photon Source (TPS) and revealed good results as the expectation. The problems of leakage encountered during the assembling were most associated with the vacuum baking which result in the consequent trouble shootings and more times of baking. Then the installation of the well-sealed UHV systems is recommended.

Contribution of Geophysics to the Study of Barite Mineralization in the Paleozoic Formations of Asdaf Tinejdad (Eastern Anti Atlas Morocco)

  • Ibrahim, Dakir;Ahmed, Benamara;Habiba, Aassoumi;Abdessalam, Ouallali;Youssef, Ait Bahammou
    • Economic and Environmental Geology
    • /
    • v.53 no.3
    • /
    • pp.259-269
    • /
    • 2020
  • The use of the geophysical method in mining prospecting has been studied in the Asdaf region (South-East of Morocco). The objective of the study is to examine the aptitude of the electrical technique, in this case induced polarization (IP) and electric tomography, combined with the electromagnetic method (VLF), in the exploration of barite . The result obtained by the pseudo-sections of electrical tomography and that of KH filtration highlighted anomalies of resistant contact (greater than 400Ω.m) and of high charge chargeability (5mV / V). These contacts are hosted in less resistant Devonian age shale and sandstone. The resistivity response obtained at their level is characteristic of the venous structures associated with barite mineralization. The direction of the mineralized veins is parallel to the direction of the fractured zones (NE-SW), which indicates that the mineralization in place is due to the tectonic movements of the Hercynian orogeny (from Devonian to Permian). These veins are aligned with the locations of abandoned mine shafts and with surface mining areas. Geophysical technique therefore seems to play a key role in barite mining exploration.

The Research on the Recovery Techniques of Deleted Files in the XFS Filesystem (XFS 파일 시스템 내의 삭제된 파일 복구 기법 연구)

  • Ahn, Jae-Hyoung;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.885-896
    • /
    • 2014
  • The files in computer storages can be deleted due to unexpected failures or accidents. Some malicious users often delete data by himself for anti-forensics. If deleted files are associated with crimes or important documents in business, they should be recovered and the recovery tool is necessary. The recovery methods and tools for some filesystems such as NTFS, FAT, and EXT have been developed actively. However, there has not been any researches for recovering deleted files in XFS filesystem applied to NAS or CCTV. In addition, since the current related tools are based on the traditional signature detection methods, they have low recovery rates. Therefore, this paper suggests the recovery methods for deleted files based on metadata and signature detection in XFS filesystem, and verifies the results by conducting experiment in real environment.