• Title/Summary/Keyword: Bypass function

Search Result 153, Processing Time 0.017 seconds

Changes in air pollutant emissions from road vehicles due to autonomous driving technology: A conceptual modeling approach

  • Hwang, Ha;Song, Chang-Keun
    • Environmental Engineering Research
    • /
    • v.25 no.3
    • /
    • pp.366-373
    • /
    • 2020
  • The autonomous vehicles (AVs) could make a positive or negative impact on reducing mobile emissions. This study investigated the changes of mobile emissions that could be caused by large-scale adoption of AVs. The factors of road capacity increase and speed limit increase impacts were simulated using a conceptual modeling approach that combines a hypothetical speed-emission function and a traffic demand model using a virtual transportation network. The simulation results show that road capacity increase impact is significant in decreasing mobile emissions until the market share of AVs is less than 80%. If the road capacity increases by 100%, the mobile emissions will decrease by about 30%. On the other hand, driving speed limit increase impact is significant in increasing mobile emissions, and the environmentally desirable speed limit was found at around 95 km/h. If the speed limit increases to 140 km/h, the mobile emissions will increase by about 25%. This is because some vehicles begin to bypass the congested routes at high speeds as speed limit increases. Based on the simulation results, it is clear that the vehicle platooning technology implemented at reasonable speed limit is one of the AV technologies that are encouraging from the environmental point of view.

A Simple Parameterization for the Rising Velocity of Bubbles in a Liquid Pool

  • Park, Sung Hoon;Park, Changhwan;Lee, JinYong;Lee, Byungchul
    • Nuclear Engineering and Technology
    • /
    • v.49 no.4
    • /
    • pp.692-699
    • /
    • 2017
  • The determination of the shape and rising velocity of gas bubbles in a liquid pool is of great importance in analyzing the radioactive aerosol emissions from nuclear power plant accidents in terms of the fission product release rate and the pool scrubbing efficiency of radioactive aerosols. This article suggests a simple parameterization for the gas bubble rising velocity as a function of the volume-equivalent bubble diameter; this parameterization does not require prior knowledge of bubble shape. This is more convenient than previously suggested parameterizations because it is given as a single explicit formula. It is also shown that a bubble shape diagram, which is very similar to the Grace's diagram, can be easily generated using the parameterization suggested in this article. Furthermore, the boundaries among the three bubble shape regimes in the $E_o-R_e$ plane and the condition for the bypass of the spheroidal regime can be delineated directly from the parameterization formula. Therefore, the parameterization suggested in this article appears to be useful not only in easily determining the bubble rising velocity (e.g., in postulated severe accident analysis codes) but also in understanding the trend of bubble shape change due to bubble growth.

Cardiac Surgery for the Patient with VVI Unipolar Pacing System -One Case- (VVI 단극유도의 심박조율치를 가진 환자의 개심술 -1례 치험-)

  • 정해동;최종범;최형호
    • Journal of Chest Surgery
    • /
    • v.31 no.4
    • /
    • pp.398-401
    • /
    • 1998
  • A 56-year-old female with a permanent unipolar pacing(VVI) system underwent elective coronary bypass surgery and mitral valve replacement. Because the unipolar sensing is subject to considerable nonmyocardial electrical noise, the pacing function may be disturbed by the use of electrocautery. Temporary atrial and ventricular bipolar epicardial leads and external generator were used for maintaining A-V sequential pacing during the use of electrocautery. Before aortic cross-clamp was released after cardiac operation, regular cardiac rhythm could spontaneously be resumed with an integrated cardioplegic strategy, avoiding the use of defibrillator

  • PDF

An Experiments Analysis of Comparison of Flow Gradients Across Disposable Arterial Perfusion Cannulas (일회용 각종 송혈관의 관류압차에 대한 비교실험)

  • Kim, Yo-Han;Kim, Hyeong-Muk
    • Journal of Chest Surgery
    • /
    • v.19 no.1
    • /
    • pp.18-24
    • /
    • 1986
  • The mean perfusion pressure produced by 20 different design and size of disposable aortic perfusion cannulas [size range: 18F to 20F] at flow rates of 1 to 5 L/min was compared. A roller pump with perfusion tubing 10mm in inner diameter was used with a mixture of 0.9% normal saline and 100% glycerin [mixing ratio of 6.72:13.28] to make the viscosity as normal blood in 20oC as the test solution. Line pressure in these cannulas at a flow rate of 3L/min ranged from 13.2$\pm$4.47 to 157$\pm$1 34 mmHg in a case of absence of resistance, and from 11.4$\pm$1.14 to 227.2$\pm$4.47 mmHg in a case of presence of resistances 14 cannulas had gradients of less than 100Hg at a flow rate of 3L/min and 9 cannulas less than 100mmHg at 4L/min. The following results were obtained from this experimental study: .1] A wide range of line pressure was observed in disposable aortic perfusion cannulas currently in clinical use; 2] Some cannulas currently used for cardiopulmonary bypass in adults generated excessive line pressure; 3] Both the material and design affect function, with some designs safer than others. Cardiac surgeons should base the choice of aortic perfusion cannula on the best performance and safest design available to avoid cannula-related problems during operation.

  • PDF

Effects of the Mitral Valve Replacement with Preservation of Posterior Mitral Leaflet and Chorda Tendinae for Mitral Valvular Disease (승모판막질환에서 승모판 대치술시 승모판 후엽 및 건삭 보존의 효과)

  • Jo, Gang-Rae;Kim, Jong-Won
    • Journal of Chest Surgery
    • /
    • v.23 no.3
    • /
    • pp.488-500
    • /
    • 1990
  • Author compared the effect of surgical methods between 40 patients who received mitral valve replacement with complete excision of the mitral valve[resected group] and 41 patients who received mitral valve replacement with preservation of posterior chorda tendineae and posterior mitral leaflet[preserved group] from 1985. 2. to 1989. 4. at cardiothoracic department of Pusan National University Hospital.v 1. There was no significant difference between the preserved group and resected group in cardiopulmonary bypass time and aortic cross clamping time and NYHA classification. 2. In preserved group of Mitral stenosis and Mitral regurgitation, the left ventricular functions were much improved after mitral valve replacement than resected group, but there was not so difference between the preserved group and reserved group in Mitral steno-regurgitation. 3. There were remarkable decrease in complication rate in preserved group compared to resected group. And also the death rates were remarkably decreased in preserved group which was 4.9% compared to resected group which was 17.5%. As the preservation of the posterior mitral leaflet and chorda tendineae during mitral valve replacement in mitral valve disease showed significantly improved effects in the maintaining of left ventricular function and reducing the postoperative complication, I assume the preservation of posterior mitral leaflet and chordae during mitral valve replacement will bring better result.

  • PDF

Fragility assessment for electric cabinet in nuclear power plant using response surface methodology

  • Tran, Thanh-Tuan;Cao, Anh-Tuan;Nguyen, Thi-Hong-Xuyen;Kim, Dookie
    • Nuclear Engineering and Technology
    • /
    • v.51 no.3
    • /
    • pp.894-903
    • /
    • 2019
  • An approach for collapse risk assessment is proposed to evaluate the vulnerability of electric cabinet in nuclear power plants. The lognormal approaches, namely maximum likelihood estimation and linear regression, are introduced to establish the fragility curves. These two fragility analyses are applied for the numerical models of cabinets considering various boundary conditions, which are expressed by representing restrained and anchored models at the base. The models have been built and verified using the system identification (SI) technique. The fundamental frequency of the electric cabinet is sensitive because of many attached devices. To bypass this complex problem, the average spectral acceleration $S_{\bar{a}}$ in the range of period that cover the first mode period is chosen as an intensity measure on the fragility function. The nonlinear time history analyses for cabinet are conducted using a suite of 40 ground motions. The obtained curves with different approaches are compared, and the variability of risk assessment is evaluated for restrained and anchored models. The fragility curves obtained for anchored model are found to be closer each other, compared to the fragility curves for restrained model. It is also found that the support boundary conditions played a significant role in acceleration response of cabinet.

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

Multi-Objective Optimization of Turbofan Engine Performance Using Particle Swarm Optimization (Particle Swarm Optimization을 이용한 터보팬 엔진 다목표 성능 최적화 연구)

  • Choi, Jaewon;Chung, Wonchul;Sung, Hong-Gye
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.4
    • /
    • pp.326-333
    • /
    • 2015
  • A turbo fan engine performance analysis program combined with a particle swarm optimization(PSO) has been developed to optimize the major design parameters of the combat aircraft gas turbine engine. The optimized parameters includes bypass ratio, fan pressure ratio, high pressure compression ratio and burner exit temperature. The objective parameters have been determined using a multi-objective function consisting of the net thrust and specific fuel consumption along a weight function. The basic model for the combat aircraft gas turbine engine has been selected as the F404 turbofan engine which is widely used in the combat aircraft, F-18 and Korean high level training aircraft, T-50. The optimal conditions of four parameters have been obtained for various design conditions.

A Study on Method for Bypassing Verification Function by Manipulating Return Value of Android Payment Application's Security Solution (안드로이드 간편결제 애플리케이션 보안 솔루션 결과값 변조를 통한 검증기능 우회 방법에 대한 연구)

  • You, Jaewook;Han, Mijeong;Kim, Kyuheon;Jang, Junyoung;Jin, Hoyong;Ji, Hanbyeol;Shin, Jeonghoon;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.827-838
    • /
    • 2018
  • Since 2014, ease of regulations on financial institutions expanded the mobile payment market based on simple authentication, and this resulted in the emergence of various simple payment services. Although several security solutions have been used to mitigate possible security threats to payment applications, there are vulnerabilities which can still be found due to the structure in which the security solution is applied to the payment service. In this paper, we analyze the payment application and security solution from the process perspective, and prove through experimentation that verification functions of security solutions can be bypassed without detailed analysis of each security function, but by simply manipulating the verification result value. Finally, we propose methods to mitigate the bypass method presented in this paper from three different perspectives, and thereby contribute to the improvement of security level of the payment service.