• Title/Summary/Keyword: KAIST

Search Result 6,998, Processing Time 0.028 seconds

The Analysis of Quench Protection System through Thermo-Electrodynamics of Resistive Transition in SC Magnet (초전도자석내의 국부적 상변이에 대한 열적.전기역학적 해석 및 퀜치보호시스템의 설계 및 특성해석)

  • Chu, Y.;Bae, J.H.;Kim, H.M.;Jang, M.H.;Joo, M.S.;Ko, T.K.;Kim, K.M.;Jeong, S.K.
    • Proceedings of the KIEE Conference
    • /
    • 1997.07a
    • /
    • pp.86-88
    • /
    • 1997
  • The detection of the normal zones in the coil winding and the initiation of the proper dump sequence have been one of the most important areas in the superconducting magnet technology. In this paper, the process to derive optimal dump sequence has been investigated through quench simulation and analysis of magnetically coupled superconducting magnet system. The magnet terminal voltage and maximum temperature rise in the quench initiated point are calculated with respect to various input variables such as operation current, dump resistance, etc. The experimental system is comprised of sc solenoidal coil, data aquisition device, external circuit breakers and dump resistor. The quench behavior of the magnet(e.g., temperature profile and the voltage signal) was measured. From this results, theoretical predictions were found to coincide with the experimental observations.

  • PDF

Simultaneous Exfoliation and Dispersion of Graphene/Carbon Nanotube via Intercalation Reaction and Its Application as Conductive Composite Film (층간삽입 반응을 이용한 그래핀/탄소나노튜브 동시 개별 분산 및 전도성 복합 필름으로의 응용)

  • Kim, Jungmo;Kim, Jin;Yoon, Hyewon;Park, Minsu;Novak, Travis;Ashraful, Azam;Lee, Jinho;Jeon, Seokwoo
    • Composites Research
    • /
    • v.29 no.3
    • /
    • pp.104-110
    • /
    • 2016
  • This paper reports a novel method for simultaneous exfoliation of graphene and dispersion of carbon nanotube by using intercalation method. In common, graphene flake and carbon nanotubes can be produced through individual exfoliation or debundling process, but the process require significant amount of time. Here, potassium sodium tartrate was thermally intercalated into graphite and carbon nanotube bundle for simultaneous exfoliation and dispersion of graphene and carbon nanotubes. We confirmed expansion of interlayer distance via XRD, and also found that oxidation level of the exfoliated materials were significantly low (below 8.3 at%). The produced materials are fabricated in to conductive composite film via vacuum filtration and spray deposition to show enhancement of conductive properties.

Development and Verification for Flight Model of CubeSat LINK (큐브위성 LINK 비행모델 개발 및 설계 검증)

  • Kim, Jongbum;Jung, Youeyun;Lim, Yeerang;Bang, Hyochoong;Marin, Mikael
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.2
    • /
    • pp.114-123
    • /
    • 2017
  • Little Intelligent Nanosatellite of KAIST(LINK) is a 2U-size CubeSat which is developed by Aerospace Systems & Control Lab.(ASCL) of KAIST as a part of the international cooperation project QB50. The objective of the QB50 project is to carry out atmospheric research within the lower thermosphere and ionosphere and CubeSats are planned to be deployed at the International Space Station(ISS) from the first quarter of 2017. To implement this objective, a flight model(FM) of LINK has been successfully developed and the design and performance of the satellite have been verified by performing environment and function tests in accordance with acceptance requirement level. This paper describes the development of flight model and the results of vibration and thermal vacuum test.

Directed Assembly of Block Copolymers for Defect-Free Nanofabrication (블록공중합체 자기조립제어를 통한 무결함 나노구조제작)

  • Shin, Dong-Ok;Jeong, Seong-Jun;Kim, Bong-Hoon;Lee, Hyung-Min;Park, Seung-Hak;Xia, Guodong;Nghiem, Quoc Dat;Kim, Sang-Ouk
    • Korean Chemical Engineering Research
    • /
    • v.46 no.1
    • /
    • pp.1-6
    • /
    • 2008
  • Block copolymers spontaneously assemble into various nanoscale structures such as spheres, cylinders, and lamellar structures according to the relative volumn ratio of each macromolecular block and their overall molecular weights. The self-assembled structures of block copolymer have been extensively investigated for the applications such as nanocomposites, photonic crystals, nanowires, magnetic-storage media, flash memory devices. However, the naturally formed nanostructures of block copolymers contain a high density of defects such that the practical applications for nanoscale devices have been limited. For the practical application of block copolymer nanostructures, a robust process to direct the assembly of block copolymers in thin film geometry is required to be established. To exploit self-assembly of block copolymer for the nanotechnology, it is indispensible to fabricate defect-free self-assembled nanostructure over an arbitrarily large area.

Modeling Combat Entity with POMDP and DEVS (POMDP-DEVS를 활용한 전투 개체 모델링)

  • Bae, Jang Won;Lee, Kanghoon;Kim, Hyeoneun;Lee, Jun Seok;Goh, Bongseok;Nam, Bowon;Moon, Il-Chul;Kim, Kee-Eung;Park, Jaehyun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.6
    • /
    • pp.498-516
    • /
    • 2013
  • Combat Modeling and Simulation (M&S) is significant to decision makers who predict the next direction of wars. Classical methodologies for combat M&S aimed to describe the exact behaviors of combat entities from military doctrines, yet they had a limitation of describing reasonable behaviors of combat entities that did not appear in the doctrines. Hence, this paper proposed a synthesizing modeling methodology for combat entity models considering both 1) the exact behaviors using descriptive modeling and 2) the reasonable behaviors using prescriptive modeling. With the proposed methodology, combat entities can represent a reality for combat actions rather than the classical methodologies. Moreover, the experiment results using the proposed methodology were significantly different from the results using the classical methodologies. Through the analyses of the experiment results, we showed that the reasonable behaviors of combat entities, which are not specified in the doctrines, should be considered in combat M&S.

Automatic Project Planning Technique and Tool Based on Software Industry Requirements (소프트웨어 산업체 요구사항을 반영한 자동화된 프로젝트 계획 생성 지원 기법 및 도구)

  • Park, Jihun;Shin, Donghwan;Hong, Gwangui;Seo, Dongwon;Hwa, Jimin;Bae, Gigon;Seo, Yeong-Seok;Bae, Doo-Hwan
    • Journal of Software Engineering Society
    • /
    • v.26 no.4
    • /
    • pp.77-92
    • /
    • 2013
  • To plan a software project, the manager (1)make a work breakdown structure (WBS), (2) estimate efforts for each task, (3) assign employee to each task, and (4) estimate overall schedule. When software project becomes complicated, the possible combination of WBS, effort, and employee assignments dramatically becomes larger. Software planning tool can help software project managers to deal with this complexity. In this research, we discuss with a group of experts who work in software industry, to elicit practical requirements that should be considered in the software planning technique. Considering these requirements, we develop a software project planning tool APP (Automatic Project Planner) which provide effort estimation based on historical knowledge data and automatic human resource allocation. Our technique can be the basis of reasonable and practical software project planing.

  • PDF

Experimental Applications of in situ Liver Perfusion Machinery for the Study of Liver Disease

  • Choi, Won-Mook;Eun, Hyuk Soo;Lee, Young-Sun;Kim, Sun Jun;Kim, Myung-Ho;Lee, Jun-Hee;Shim, Young-Ri;Kim, Hee-Hoon;Kim, Ye Eun;Yi, Hyon-Seung;Jeong, Won-Il
    • Molecules and Cells
    • /
    • v.42 no.1
    • /
    • pp.45-55
    • /
    • 2019
  • The liver is involved in a wide range of activities in vertebrates and some other animals, including metabolism, protein synthesis, detoxification, and the immune system. Until now, various methods have been devised to study liver diseases; however, each method has its own limitations. In situ liver perfusion machinery, originally developed in rats, has been successfully adapted to mice, enabling the study of liver diseases. Here we describe the protocol, which is a simple but widely applicable method for investigating the liver diseases. The liver is perfused in situ by cannulation of the portal vein and suprahepatic inferior vena cava (IVC), with antegrade closed circuit circulation completed by clamping the infrahepatic IVC. In situ liver perfusion can be utilized to evaluate immune cell migration and function, hemodynamics and related cellular reactions in each type of hepatic cells, and the metabolism of toxic or other compounds by changing the composition of the circulating media. In situ liver perfusion method maintains liver function and cell viability for up to 2 h. This study also describes an optional protocol using density-gradient centrifugation for the separation of different types of hepatic cells, allowing the determination of changes in each cell type. In summary, this method of in situ liver perfusion will be useful for studying liver diseases as a complement to other established methods.

Design and Implementation of Web-browser based Malicious behavior Detection System(WMDS) (웹 브라우저 기반 악성행위 탐지 시스템(WMDS) 설계 및 구현)

  • Lee, Young-Wook;Jung, Dong-Jae;Jeon, Sang-Hun;Lim, Chae-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.667-677
    • /
    • 2012
  • Vulnerable web applications have been the primary method used by the attackers to spread their malware to a large number of victims. Such attacks commonly make use of malicious links to remotely execute a rather advanced malicious code. The attackers often deploy malwares that utilizes unknown vulnerabilities so-called "zero-day vulnerabilities." The existing computer vaccines are mostly signature-based and thus are effective only against known attack patterns, but not capable of detecting zero-days attacks. To mitigate such limitations of the current solutions, there have been a numerous works that takes a behavior-based approach to improve detection against unknown malwares. However, behavior-based solutions arbitrarily introduced a several limitations that made them unsuitable for real-life situations. This paper proposes an advanced web browser based malicious behavior detection system that solves the problems and limitations of the previous approaches.

Tsg101 Is Necessary for the Establishment and Maintenance of Mouse Retinal Pigment Epithelial Cell Polarity

  • Le, Dai;Lim, Soyeon;Min, Kwang Wook;Park, Joon Woo;Kim, Youjoung;Ha, Taejeong;Moon, Kyeong Hwan;Wagner, Kay-Uwe;Kim, Jin Woo
    • Molecules and Cells
    • /
    • v.44 no.3
    • /
    • pp.168-178
    • /
    • 2021
  • The retinal pigment epithelium (RPE) forms a monolayer sheet separating the retina and choroid in vertebrate eyes. The polarized nature of RPE is maintained by distributing membrane proteins differentially along apico-basal axis. We found the distributions of these proteins differ in embryonic, post-natal, and mature mouse RPE, suggesting developmental regulation of protein trafficking. Thus, we deleted tumor susceptibility gene 101 (Tsg101), a key component of endosomal sorting complexes required for transport (ESCRT), in embryonic and mature RPE to determine whether ESCRT-mediated endocytic protein trafficking correlated with the establishment and maintenance of RPE polarity. Loss of Tsg101 severely disturbed the polarity of RPE, which forms irregular aggregates exhibiting non-polarized distribution of cell adhesion proteins and activation of epidermal growth factor receptor signaling. These findings suggest that ESCRT-mediated protein trafficking is essential for the development and maintenance of RPE cell polarity.

A Study on the Development and Application of Efficient Evaluation Criteria for Performance Testing of Commercial Open Source Vulnerability Scanning Tools (상용 오픈소스 취약점 스캐닝 도구의 성능 시험을 위한 효율적 평가 기준 개발 및 적용)

  • Shin, Kangsik;Jung, Dong-Jae;Choe, Min-Ji;Cho, Ho-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.709-722
    • /
    • 2022
  • The recent "Log4j Security Vulnerability Incident" has occurred, and the information system that uses the open source "Log4J" has been exposed to vulnerabilities. The incident brought great vulnerabilities in the information systems of South Korea's major government agencies or companies and global information systems, causing problems with open source vulnerabilities. Despite the advantages of many advantages, the current development paradigm, which is developed using open source, can easily spread software security vulnerabilities, ensuring open source safety and reliability. You need to check the open source. However, open source vulnerability scan tools have various languages and functions. Therefore, the existing software evaluation criteria are ambiguous and it is difficult to evaluate advantages and weaknesses, so this paper has developed a new evaluation criteria for the vulnerability analysis tools of open source