• Title/Summary/Keyword: Lock system

Search Result 558, Processing Time 0.029 seconds

Comparison of Macroscopic Spray Characteristics of Dimethyl Ether with Diesel (Dimethyl Ether와 디젤의 거시적 분무 특성 비교)

  • Yu, J.;Lee, J. K.;Bae, C. S.
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.10 no.5
    • /
    • pp.73-80
    • /
    • 2002
  • Dimethyl ether (DM) is one of the most attractive alternative fuel far compression ignition engine. Its main advantage in diesel engine application is high efficiency of diesel cycle with soot free combustion though conventional fuel injection system has to be modified due to the intrinsic properties of DME. Experimental study of DME and conventional diesel spray employing a common-rail type fuel injection system with a 5-holes sac type injector (hole diameter 0.168 ㎜/hole) was performed in a high pressure chamber pressurized with nitrogen gas. A CCD camera was employed to capture time series of spray images followed by spray cone angles and penetrations of DME were characterized and compared with those of diesel. Under atmospheric pressure condition, regardless of injection pressure, spray cone angles of the DME were wider than those of diesel and penetrations were shorter due to flash boiling effect. Tip of the DME spray was farmed in mushroom like shape at atmospheric chamber pressure but it was disappeared in higher chamber pressure. On the contrary, spray characteristics of the DME became similar to that of diesel under 3MPa of chamber pressure. Hole-to-hole variation of the DME spray was lower than that of diesel in both atmospheric and 3MPa chamber pressures. At 25MPa and 40MPa of DME injection pressures, regardless of chamber pressure, intermittent DME spray was observed. It was thought that vapor lock inside the injector was generated under the two injection pressures.

A Study on the Abnormal Oxidation of Stacked Capacitor due to Underlayer Dependent Nitride Deposition (질화막 성장의 하지의존성에 따른 적층캐패시터의 이상산화에 관한 연구)

  • 정양희
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.11 no.1
    • /
    • pp.33-40
    • /
    • 1998
  • The composite SiO$_2$/Si$_3$N$_4$/SiO$_2$(ONO) film formed by oxidation on nitride film has been widely studied as DRAM stacked capacitor multi-dielectric films. Load lock(L/L) LPCVD system by HF cleaning is used to improve electrical capacitance and to scale down of effective thickness for memory device, but is brings a new problem. Nitride film deposited using HF cleaning shows selective deposition on poly silicon and oxide regions of capacitor. This problem is avoidable by carpeting chemical oxide using $H_2O$$_2$cleaning before nitride deposition. In this paper, we study the limit of nitride thickness for abnormal oxidation and the initial deposition time for nitride deposition dependent on underlayer materials. We proposed an advanced fabrication process for stacked capacitor in order to avoid selective deposition problem and show the usefulness of nitride deposition using L/L LPCVD system by $H_2O$$_2$cleaning. The natural oxide thickness on polysilicon monitor after HF and $H_2O$$_2$cleaning are measured 3~4$\AA$, respectively. Two substrate materials have the different initial nitride deposition times. The initial deposition time for polysilicon is nearly zero, but initial deposition time for oxide is about 60seconds. However the deposition rate is constant after initial deposition time. The limit of nitride thickness for abnormal oxidation under the HF and $H_2O$$_2$cleaning method are 60$\AA$, 48$\AA$, respectively. The results obtained in this study are useful for developing ultra thin nitride fabrication of ONO scaling and for avoiding abnormal oxidation in stacked capacitor application.

  • PDF

Implementation of the Blood Pressure and Blood Flow Variation Rate Detection System using Impedance Method (임피던스법을 이용한 혈압 및 혈류 변화량 검출 시스템 구현)

  • Ro, Jung-Hoon;Bae, Jin-Woo;Ye, Soo-Young;Shin, Bum-Joo;Jeon, Gye-Rok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1926-1938
    • /
    • 2009
  • In this study, detection system of the blood flow variation rate was implemented using the variation effect of bio electric impedance at time of the blood pressure measurement by means of impedance method. The blood pressure measurement was performed by the oscillometric method. The mean arterial pressure was calculated using maximum amplitude algorithm. The systolic and diastolic pressure were estimated by establishment of the various characteristic ratio according to mean arterial pressure range. Alternative static current source and lock_in amplifier were introduced to impedance measurement. The variation of blood volume was measured using variation bio impedance according to induced cuff pressure at measuring area.

Multivariate analysis of the cleaning efficacy of different final irrigation techniques in the canal and isthmus of mandibular posterior teeth

  • Yoo, Yeon-Jee;Lee, WooCheol;Kim, Hyeon-Cheol;Shon, Won-Jun;Baek, Seung-Ho
    • Restorative Dentistry and Endodontics
    • /
    • v.38 no.3
    • /
    • pp.154-159
    • /
    • 2013
  • Objectives: The aim of this study was to compare the cleaning efficacy of different final irrigation regimens in canal and isthmus of mandibular molars, and to evaluate the influence of related variables on cleaning efficacy of the irrigation systems. Materials and Methods: Mesial root canals from 60 mandibular molars were prepared and divided into 4 experimental groups according to the final irrigation technique: Group C, syringe irrigation; Group U, ultrasonics activation; Group SC, VPro StreamClean irrigation; Group EV, EndoVac irrigation. Cross-sections at 1, 3 and 5 mm levels from the apex were examined to calculate remaining debris area in the canal and isthmus spaces. Statistical analysis was completed by using Kruskal-Wallis test and Mann-Whitney U test for comparison among groups, and multivariate linear analysis to identify the significant variables (regular replenishment of irrigant, vapor lock management, and ultrasonic activation of irrigant) affecting the cleaning efficacy of the experimental groups. Results: Group SC and EV showed significantly higher canal cleanliness values than group C and U at 1 mm level (p < 0.05), and higher isthmus cleanliness values than group U at 3 mm and all levels of group C (p < 0.05). Multivariate linear regression analysis demonstrated that all variables had independent positive correlation at 1 mm level of canal and at all levels of isthmus with statistical significances. Conclusions: Both VPro StreamClean and EndoVac system showed favorable result as final irrigation regimens for cleaning debris in the complicated root canal system having curved canal and/or isthmus. The debridement of the isthmi significantly depends on the variables rather than the canals.

Unlocking Shared Bike System by Exploiting an Application Log (애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법)

  • Cho, Junwan;Lee, Jeeun;Kim, Kwangjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2019
  • Recently, there has been a growing market for shared mobility businesses that share 'transport' such as cars and bikes, and many operators offer a variety of services. However, if the fare can not be charged normally because of security vulnerability, the operator can not continue the business. So there should be no security loopholes. However, there is a lack of awareness and research on shared mobility security. In this paper, we analyzed security vulnerabilities exposed in application log of shared bike service in Korea. We could easily obtain the password of the bike lock and the encryption key of the AES-128 algorithm through the log, and confirmed the data generation process for unlocking using software reverse engineering. It is shown that the service can be used without charge with a success rate of 100%. This implies that the importance of security in shared mobility business and new security measures are needed.

Design and Evaluation of a High-performance Journaling Scheme for Non-volatile Memory (비휘발성 메모리를 고려한 고성능 저널링 기법 설계 및 평가)

  • Han, Hyuck
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.368-374
    • /
    • 2020
  • Journaling file systems (JFS) manage changes of file systems not yet committed in a data structure known as a journal to restore the file system in the event of an unexpected failure. Extra write operations required for journaling negatively affect the performance of JFS. The high-performance and byte-addressable non-volatile memory (NVM) was expected to easily mitigate these performance problems by providing NVM space as journal storage. However, even with such non-volatile memory technologies, performance problems still arise due to scalability problems inherent in processing transactions of JFS. To solve this problem, we proposes a technique for processing file system transactions for scalable performance. To this end, lock-free data structures are used and multiple I/O requests are allowed to simultaneously be processed on high-performance storage devices with multiple I/O channels. We evaluate the file system with the proposed technique by comparing the original ext4 file system and the recent proposed NVM-based journaling file system on a multi-core server, and experimental results show that our file system has better performance (up-to 2.9/2.3 times) than the original ext4 file system and the recent NVM-based journaling file system, respectively.

Quality Tests for the Knee-Orthosis Velcro and Locking System (무릎보조기 벨크로 및 잠금장치에 대한 품질시험 연구)

  • Jung, Se-Wook;Seo, Won-San;Cho, KiHun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.275-283
    • /
    • 2016
  • In this study, three knee-orthoses (dial lock type, medium size, right side) were used for a quality level test (static bending test and solidity test of the locking system) of the knee-orthosis locking system. In the static bending test, a smaller maximum load was observed in samples A and C compared to the reference standard value (KS P 8408 standard value: 1000 N, sample A: 865 N, sample C: 833 N). In addition, in the solidity test of the locking system, a smaller maximum load was observed in the all samples compared to the referenced standard value (KS P 8411 standard value: 200 N, sample A: 41 N, sample B: 97 N, sample C: 54 N). Korean industrial standards for knee-orthoses and systematic test methods are lacking. Therefore, a systematic management plan for knee-orthoses is required. The result of the current study showed that a systematic management plan for the knee-orthosis locking system is required. In particular, the development of a quantitative and objective test method is needed. The findings of the current study may be useful for monitoring the quality of the knee-orthosis locking system and may provide foundational information for the development of a quantitative and objective test method.

A GNSS Code Tracking Scheme Based in Slope Difference of Correlation Outputs (상관 함수의 기울기 차에 기반한 GNSS의 부호 추적 기법)

  • Yoo, Seung-Soo;Yoo, Seung-Hwan;Chong, Da-Hae;Ahn, Sang-Ho;Yoon, Seok-Ho;Kim, Sun-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.505-511
    • /
    • 2008
  • The global navigation satellite system (GNSS) is using a direct sequence/spread spectrum (DS/SS) modulation. In order to recover the information data, the DS/SS system first performs a two-step synchronization process: acquisition and tracking. The acquisition process adjusts the phase difference between the received and locally generated acquisition sequences within ${\pm}T_c/2$ or less, where $T_c$ is the chip period. The tracking process performs fine synchronization. In this paper, we focus on the tracking issue. The single delta delay locked loop($\Delta$-DLL) is the optimal tracking scheme for a GNSS in the absence of multipath signals, where $\Delta$ means the spacing between the early and late correlation time offset. In the multipath environments, however, the $\Delta$-DLL suffers from huge estimation bias(denoted by $\beta$) caused by distorted correlation values. Although some modified schemes such as a $\Delta$-DLL with a narrow $\Delta$ and a double delta DLL (${\Delta}^{(2)}$-DLL) were proposed to reduce the estimation bias, they cannot remove the estimation bias completely and need more accurate acquisition process. This paper proposes a novel tracking scheme that can dramatically reduce the estimation bias, using the maximum slope change among the correlation outputs.

Chang in the Small Boat Building Industry: the Case of the Lake Washington Ship Canal (소규모 boat공업의 입지에 관한 연구 : Seattle 의 Washington 운하지역의 경우)

  • Lim, Yeong Dae
    • Journal of the Korean Geographical Society
    • /
    • v.24
    • /
    • pp.1-18
    • /
    • 1981
  • 본 연구는 미국에서 boat공업의 중심지 중의 하나인 Seattle의 boat 공업의 입지와 그 변화를 고찰하므로서 소기업의 입지를 구명하려고 하였다. 본 연구에서는 먼저 Seattle에서 소규모 boat제조업체가 가장 많이 집중한 Washington호와 Shilshole 만간의 운하지역을 연구지역으로 선정하려 이 지역내에 입지하고 있는 boat 제조업체의 기업주와 interview한 결과를 기본자료로 이용하였다. 이상에서 얻어진 결과는 다음과 같았다. 연구지역의 소규모 boat 공업은 boat제조에 흥미와 능력을 가진 기업가들이 boat 공업에 유리한 Seattle의 환경의 영향을 받아 그들의 기업을 그들의 오랜 거주 지역에서 시작하므로서 발생하게 되었다. 그러나 담수를 지향하는 이 공업의 입지상의 특색, 원료공급처와 제품판매처의 위치, 주위의 지형 그리고 지방정부의 정책에 기인하여 이 공업은 Chittenden Locks와 Portage 만간의 운하지역에 그 입지가 국한되었다. 다시 이 지역내에서는 주위의 지형과 토지이용, 기업의 재정적인 능력 때문에 이 운하지역에 연해있는 기존공장 혹은 건물을 이용하여 입지하게 되었다. 입지후에 이 공업은 원료공급처와 제품판매처와의 강한 linkage를 형성하고 있다. 더구나 원료공급처의 희소성에 기인한 공간적 독점과 소비자 및 제품의 특성 때문에 연구지역의 대부분의 소규모 boat 제조업체는 바로 근처에 있는 원료공급처 및 소비자와 긴밀한 contact를 하고 있고 이러한 contact를 통하여 그들의 입지를 존속시키고 있다. 한편 Seattle 이 가지고 있는 boat 공업에 유리한 기업환경의 덕택으로 이들 소규모 boat 제조업체들은 수요의 계절적인 변동에서 초래되는 노동력의 공급 때문에 곤란을 받을 뿐 장기적인 불황에 직면한 적은 없다. 이리하여 이들 업체들은 이러한 계절적인 변동에 대처하기 위해 생산 input 의 조절, 주위의 기존공장이나 건물의 병합을 통한 연속적인 확장 혹은 그들의 action space 내에 있는 기존공장이나 건물을 이용한 이동등과 같은 입지변화를 보여왔을 뿐이다. 이리하여 연구지역의 소규모 boat공업은 Seattle의 경제 system 내의 주요 subsystem의 하나로서 활발히 움직이고 있다. 그러나 만약 기업의 외부환경에서 초래되는 stress, 즉 주민의 소득저하, 타 recreation 산업이 쇠퇴하게 되면 이 공업 또한 쇠퇴될 것이다. 요컨대 담수 지향성과 관련된 입지상의 특색을 제외하고는 연구지역의 소규모 boat 공업은 타 소규모 공업과 동일한 입지상의 특색을 가지고 있다.

  • PDF

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.