• Title/Summary/Keyword: Efficiency Standards

Search Result 999, Processing Time 0.026 seconds

Zooplankton Removal in Seawater using UV, Electrolysis and UV+electrolysis Process (UV, 전기분해 및 UV+전기분해 공정을 이용한 해수 중의 동물성 플랑크톤 제거)

  • Kim, Dong-Seog;Park, Young-Seek
    • Journal of Environmental Science International
    • /
    • v.30 no.7
    • /
    • pp.597-604
    • /
    • 2021
  • The International Maritime Organization (IMO) ballast water management agreement (International Convention for the Control and Management of Ship's Ballast Water and Sediments) came into force on September 8, 2017. This study evaluated the disinfection performance of electrolysis, UV treatment, and electrolysis + UV combined, to improve the treatment of zooplankton (size ≥ 50 ㎛), which is expected to strengthen the standards for biodegradation efficiency. Among the methods used, the disinfection time leading to 100% death was in the order: electrolysis > electrolysis + UV > UV process. For the same level of disinfection performance, the amount of electricity required for the electrolysis, UV, and electrolysis + UV processes were 1,300 W.s, 8,400 W.S, and 4,500 W.s, respectively. The combination of electrolysis + UV process for inactivation of zooplankton in ballast water did not show a synergic effect owing to the slow disinfection time and high power consumption.

Improving the Efficiency and Scalability of Standard Methods for Data Cryptography

  • Abu-Faraj, Mua'ad M.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.451-458
    • /
    • 2021
  • Providing a secure and effective way to protect confidential and private data is an urgent process, and accordingly, we will present in this research paper a new method, which is called multiple rounds variable block method (MRVB) which depends on the use of a colored image that is kept secret to generate needed work and round keys. This method can be used to encrypt-decrypt data using various lengths private key and data blocks with various sizes. The number of rounds also will be variable starting from one round. MRVB will be implemented and compared with the encryption-decryption standards DES and AES to show the improvements provided by the proposed method in increasing the security level and in increasing the throughput of the process of data cryptography. The generated private key contents will depend on the used image_key and on the selected number of rounds and the selected number of bytes in each block of data.

Enhanced MPR Selection Strategy for Multicast OLSR

  • Matter, Safaa S.;Al Shaikhli, Imad F.;Hashim, Aisha H.A.;Ahmed, Abdelmoty M.;Khattab, Mahmoud M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.137-144
    • /
    • 2022
  • Wireless community networks (WCNs) are considered another form of ownership of internet protocol (IP) networks, where community members manage and own every piece of equipment in a decentralized way, and routing for traffic is done in a cooperative manner. However, the current routing protocols for WCNs suffer from stability and scalability issues. In this paper, an enhanced routing protocol is proposed based on the optimized link state routing (OLSR) protocol to meet the standards of efficiency in terms of stability and scalability. The proposed routing protocol is enhanced through two phases: multicasting expansion and multipoint relay (MPR) selection based on an analytical hierarchical process (AHP). The experimental results demonstrate that the proposed routing protocol outperforms the OLSR protocol in terms of network control overhead and packet delivery ratio by 18% and 1% respectively.

Safety Management System Prototype Based on BIM with RTLS

  • Kwang-pyo Lee;Hyunsoo Lee;Moonseo Park ;Hyunsoo Kim
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.890-896
    • /
    • 2009
  • In past projects, the main goal has been to enhance efficiency by reducing cost and time. However, considering the current condition of safety management in many construction companies, it can be confirmed that safety management has not been a top priority for a long time. Current safety management, which is based on safety standards and rules, is very ineffective and only emphasizes management after an incident. As well, although fewer accidents occur compared to the past, because construction projects are increasingly large in scale and complex, these accidents tend to be more serious and involve greater monetary loss. Furthermore, as the severity of these accidents increases, so does the possibility of fatalities. Therefore, improving safety management is essential. This study proposes an effective program for safety management, focusing on the processes to connect studies and systems, and the basic techniques required for program development. To realize this program, technical tools are suggested, including systems such as BIM (Building Information Modeling); additionally, the coordination of other systems such as an RTLS, a server, and an alarm system is proposed.

  • PDF

A Research on IoT Security Technology based on Blockchain and Lightweight Cryptographic Algorithms

  • Sun-Jib Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.343-348
    • /
    • 2023
  • As the IoT market continues to grow, security threats to IoT devices with limited resources are also increasing. However, the application of security technology to the existing system to IoT devices with limited resources is impossible due to the inherent characteristics of IoT devices. Various methods for solving related problems have been studied in existing studies to solve this problem. Therefore, this study analyzes the characteristics of domestic IoT authentication standards and existing research to propose an algorithm that applies blockchain-based authentication and lightweight encryption algorithms to IoT equipment with limited resources. In this study, a key generation method was applied using a Lamport hash-chain and data integrity between IoT devices were provided using a Merkle Tree, and an LEA encryption algorithm was applied using confidentiality in data communication. In the experiment, it was verified that the efficiency is high when the LEA encryption algorithm, which is a lightweight encryption algorithm, is applied to IoT devices with limited resources.

Analysis of the BIM technology status and the development strategy in Korea

  • Yun, Seok-Heon;Kim, Sang-Chul;Lee, Namhun
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.648-649
    • /
    • 2015
  • BIM could be used for integrating project information through life cycle of building facilities. Also it could improve the accuracy and work efficiency through data interoperability with other disciplines. However, these benefits from adopting BIM could not be attained easily in real project cases. In order to make the most use of BIM and get the maximum benefits from it, the environments such as standards, guidelines and the related technologies are also could be supported. Therefore many countries are developing or already developed the technology roadmap for BIM. In this study, we tried to analyze the BIM technology status and develop the strategy for improve usability of BIM in Korea.

  • PDF

Anomaly Detection System for Solar Power Distribution Panels utilizing Thermal Images

  • Kwang-Seong Shin;Jong-Chan Kim;Seong-Yoon Shin
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.159-164
    • /
    • 2024
  • This study aimed to develop an advanced anomaly-detection system tailored for solar power distribution panels using thermal imaging cameras to ensure operational stability. It addresses the imperative shift toward digitalized safety management in electrical facilities, transcending the limitations of conventional empirical methodologies. Our proposed system leverages a faster R-CNN-based artificial intelligence model optimized through meticulous hyperparameter tuning to efficiently detect anomalies in distribution panels. Through comprehensive experimentation, we validated the efficacy of the system in accurately identifying anomalies, thereby propelling safety protocols forward during the fourth industrial revolution. This study signifies a significant stride toward fortifying the integrity and resilience of solar power distribution systems, which is pivotal for adapting to emerging technological paradigms and evolving safety standards in the energy sector. These findings offer valuable insights for enhancing the reliability and efficiency of safety management practices and fostering a safer and more sustainable energy landscape.

THE ELEVATION OF EFFICACY IDENTIFYING PITUITARY TISSUE ABNORMALITIES WITHIN BRAIN IMAGES BY EMPLOYING MEMORY CONTRAST LEARNING TECHNIQUES

  • S. SINDHU;N. VIJAYALAKSHMI
    • Journal of applied mathematics & informatics
    • /
    • v.42 no.4
    • /
    • pp.931-943
    • /
    • 2024
  • Accurately identifying brain tumors is crucial for medical imaging's precise diagnosis and treatment planning. This study presents a novel approach that uses cutting-edge image processing techniques to automatically segment brain tumors. with the use of the Pyramid Network algorithm. This technique accurately and robustly delineates tumor borders in MRI images. Our strategy incorporates special algorithms that efficiently address problems such as tumor heterogeneity and size and shape fluctuations. An assessment using the RESECT Dataset confirms the validity and reliability of the method and yields promising results in terms of accuracy and computing efficiency. This method has a great deal of promise to help physicians accurately identify tumors and assess the efficacy of treatments, which could lead to higher standards of care in the field of neuro-oncology.

Semiotic Interpretation of Beauty Camera App Interface Design Elements: Centered on Roland Barthes' Semiotics

  • Yongfeng Liu
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.3
    • /
    • pp.213-224
    • /
    • 2024
  • This study utilizes Roland Barthes' semiotic theory to explore how interface design elements of beauty camera apps, such as filters and stickers, icons and buttons, layout and structure, function as symbols of self-expression, and their impact on users' social identity and personal image. Through in-depth analysis of applications like BeautyPlus, Ulike, MeituPic, and Faceu, this research found that these apps emphasize usability, visual appeal, and social interactivity in their design. These elements not only enhance user experience and operational efficiency but also reflect popular cultural trends and aesthetic preferences. From Barthes' perspective, these interface elements have become "myths" with specific social meanings, which are naturalized in daily use and promote the widespread acceptance of particular aesthetic standards. These interface design elements are not just tools for self-expression; they are also powerful cultural symbols that shape modern social interactions and visual culture. This research offers a new perspective to understand the interactions between individuals and society in the digital age, emphasizing the role of technology, culture, and social interaction in shaping contemporary human behavior and social relationships.

A Study on Integrated Group Control System for the Disabled Elevators (장애인용 엘리베이터의 통합 군관리제어시스템 방안 연구)

  • Lee, Ho-Cheol;Choi, Young-Kiu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.430-435
    • /
    • 2014
  • When multiple elevators are installed in the building, control systems for each of the elevators, reducing energy loss by elimination of unnecessary movements and assigning appropriate elevators to passengers upon request are called the elevator group control system. However, the group control system of three or more elevators for the Disabled is being limited by the domestic laws and standards because it can not predict which unit will be called. In this paper, as an improvement plan, an integrated group control system of elevators for the general passengers and the disabled is proposed; its efficiency that decreases 16.9 % of waiting time is verified with comparison of the traditional separate group control systems. The proposed Integrated Group Control System does not violate the domestic laws and standards. Also its good performance is shown through computer simulations.