• Title/Summary/Keyword: Modern Technical

Search Result 398, Processing Time 0.03 seconds

Modern Paper Quality Control

  • Olavi Komppa
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2000.06a
    • /
    • pp.16-23
    • /
    • 2000
  • The increasing functional needs of top-quality printing papers and packaging paperboards, and especially the rapid developments in electronic printing processes and various computer printers during past few years, set new targets and requirements for modern paper quality. Most of these paper grades of today have relatively high filler content, are moderately or heavily calendered , and have many coating layers for the best appearance and performance. In practice, this means that many of the traditional quality assurance methods, mostly designed to measure papers made of pure. native pulp only, can not reliably (or at all) be used to analyze or rank the quality of modern papers. Hence, introduction of new measurement techniques is necessary to assure and further develop the paper quality today and in the future. Paper formation , i.e. small scale (millimeter scale) variation of basis weight, is the most important quality parameter of paper-making due to its influence on practically all the other quality properties of paper. The ideal paper would be completely uniform so that the basis weight of each small point (area) measured would be the same. In practice, of course, this is not possible because there always exists relatively large local variations in paper. However, these small scale basis weight variations are the major reason for many other quality problems, including calender blacking uneven coating result, uneven printing result, etc. The traditionally used visual inspection or optical measurement of the paper does not give us a reliable understanding of the material variations in the paper because in modern paper making process the optical behavior of paper is strongly affected by using e.g. fillers, dye or coating colors. Futhermore, the opacity (optical density) of the paper is changed at different process stages like wet pressing and calendering. The greatest advantage of using beta transmission method to measure paper formation is that it can be very reliably calibrated to measure true basis weight variation of all kinds of paper and board, independently on sample basis weight or paper grade. This gives us the possibility to measure, compare and judge papers made of different raw materials, different color, or even to measure heavily calendered, coated or printed papers. Scientific research of paper physics has shown that the orientation of the top layer (paper surface) fibers of the sheet paly the key role in paper curling and cockling , causing the typical practical problems (paper jam) with modern fax and copy machines, electronic printing , etc. On the other hand, the fiber orientation at the surface and middle layer of the sheet controls the bending stiffness of paperboard . Therefore, a reliable measurement of paper surface fiber orientation gives us a magnificent tool to investigate and predict paper curling and coclking tendency, and provides the necessary information to finetune, the manufacturing process for optimum quality. many papers, especially heavily calendered and coated grades, do resist liquid and gas penetration very much, bing beyond the measurement range of the traditional instruments or resulting invonveniently long measuring time per sample . The increased surface hardness and use of filler minerals and mechanical pulp make a reliable, nonleaking sample contact to the measurement head a challenge of its own. Paper surface coating causes, as expected, a layer which has completely different permeability characteristics compared to the other layer of the sheet. The latest developments in sensor technologies have made it possible to reliably measure gas flow in well controlled conditions, allowing us to investigate the gas penetration of open structures, such as cigarette paper, tissue or sack paper, and in the low permeability range analyze even fully greaseproof papers, silicon papers, heavily coated papers and boards or even detect defects in barrier coatings ! Even nitrogen or helium may be used as the gas, giving us completely new possibilities to rank the products or to find correlation to critical process or converting parameters. All the modern paper machines include many on-line measuring instruments which are used to give the necessary information for automatic process control systems. hence, the reliability of this information obtained from different sensors is vital for good optimizing and process stability. If any of these on-line sensors do not operate perfectly ass planned (having even small measurement error or malfunction ), the process control will set the machine to operate away from the optimum , resulting loss of profit or eventual problems in quality or runnability. To assure optimum operation of the paper machines, a novel quality assurance policy for the on-line measurements has been developed, including control procedures utilizing traceable, accredited standards for the best reliability and performance.

The Expressionism on the Modern costume (20세기 현대복식에 나타난 표현주의)

  • 채금석;양숙희
    • Journal of the Korean Society of Costume
    • /
    • v.24
    • /
    • pp.121-142
    • /
    • 1995
  • The Expressionism took shape in the early twentieth century, so called as the time of change and innovation which intermediated between the time of extreme prosperity and peace and the time of disruption. This study is based on the wide sense of Expressionism out of various concepts of Expressionism. The afore-mentioned phenomenon was emphasized all the more in the French Expressionism and it is the most important and substantial object in the Art to make a direct transference of emotion , feeling and thought and it could be regarded as one of characteristics of the French Expressionism . In Addition, the Expressionism produced " Aesthetics on Ugliness "Aesthetics des H lichen )" in creating work of art. It was an expression of the Existentialism based on Humanism for modern people who lived at time of nihility and such artistic movement accepted polarity and ambivalance concepts claimed by Nietzsche into three specific fields in accordance with thought and technique in the work of art and those are the Intuitional Expressionism. Cubistic Expressionism and Fantastic Expressionism. This study makes a close analysis of costume style trends on the basis of the categorized Expressionism enumerated as above. The characteristics of Intuitional Expressionism is that poverty and a sense of alienation dominated all society and thus the social reality brought a trend of social participation . This social reality effected significantly modern costume style and a reformative costume turned up at last . This reformative costume was classified into Gar onne look, Military look and Lingerie look by characteristics of style in order to make a close examination for the relationship between social reality and the reformative structure. Cubistic Expressionism effected costume forming and changed costume style through " Deformation " and " Distortion" in forming technique , and also it has developed geometrical style of costume, which could be symbolized by mechanism. And on the other hand, this Cubistic Expressionism has emphasized exaggerated expression ability to produce rigid and stiff style of costume. Fantastic Expression pursued basic artistic worth from the primitive and ethnic customs and accepted fantastic oriental Exoticism . This Fantastic Expressionism effected costume style of twentieh century and such designers as Lon Bakst, Paul Poiret, Elsa Schiapareli adopted intentive primary color. It also applied " Depaysment" to modern costume style , which introduced avant-garde design to give an impact through destruction of the existing traditional concept. This study also analized seven major representative costume designers of the early twentieth century. They are L on Bakst, Paul Poiret, Madeline Vionnet, JeanPatou, Gabriel Chanel and Elsa Schiaparelli. These designers deployed creative costume design work with peculiar expression technique based on the French expressionism. The costume study related to art history was so far made mostly to approach costume forming but only a few study is found to have approached idealistic background of art history in connection with creating costume. From that point of view, it is profoundly significant for this study to analize idealistic background and characteristics of Expressionism and relationship between costume and expressionism and to examine modern costume of twntieth century in conjunction with technical characteristics and spiritual sense of Expresionism.eristics and spiritual sense of Expresionism.

  • PDF

Security Criteria for Design and Evaluation of Secure Plant Data Network on Nuclear Power Plants (원전 계측제어계통의 안전 네트워크 설계 및 평가를 위한 보안 기준)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.267-271
    • /
    • 2014
  • Nuclear power plant data networks and their associated safety systems are being modernized to include many information technology (IT) networks and applications. Along with the advancement of plant data networks (PDN), instrumentation and control systems are being upgraded with modern digital, microprocessor-based systems. However, nuclear PDN is confronted significant side-effects, which PDN is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in nuclear PDN. Consequently, it should be designed fully ensuring the PDN meet all reliability, performance and security requirements in order to overcome the disadvantages raised from adaption of IT technology. In this paper, we provide technical security criteria should be used in design and evaluation of secure PDN. It is believed PDN, which is designed and operated along with these technical security critera, effectively protect against possible outside cyber threats.

Construction of Wireless Sensor Network for Intelligent Home (지능형 홈을 위한 무선 센서 네트워크 구성)

  • Whang Se-Hee;Jang In-Hun;Sim Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.695-700
    • /
    • 2005
  • In the sensor network, a lot of sensor nodes are scattered sparsely and organizes a united communication network between each node. After that, environmental information around each sensor node are gathered and analyzed. Because each node operates under resource constraint, the efficiency and hardware specification of a node should be maximized. There exist technical constraints until now but recent technical progress in IC fabrication and wireless network enables to construct a tiny embedded system, which has the properties of low cost, low power consumption, multi functions. Wireless sensor network becomes a modern research field with technical improvements, is studied in numerous laboratories, and is called as diverse different project names - Wireless Integrated Network Sensors (WINS), Mobile Ad hoc NETwork (MANET), Ubiquitous Sensor Network (USN). TinyOS is one of leading project and is widely used. In this paper, we suggest a sensor network, which uses TinyOS platforms and aims for context awareness in a home environment.

Experimental verification of the linear and non-linear versions of a panel code

  • Grigoropoulos, G.J.;Katsikis, C.;Chalkias, D.S.
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.3 no.1
    • /
    • pp.27-36
    • /
    • 2011
  • In the proposed paper numerical calculations are carried out using two versions of a three-dimensional, timedomain panel method developed by the group of Prof. P. Sclavounos at MIT, i.e. the linear code SWAN2, enabling optionally the use of the instantaneous non-linear Froude-Krylov and hydrostatic forces and the fully non-linear SWAN4. The analytical results are compared with experimental results for three hull forms with increasing geometrical complexity, the Series 60, a reefer vessel with stern bulb and a modern fast ROPAX hull form with hollow bottom in the stern region. The details of the geometrical modeling of the hull forms are discussed. In addition, since SWAN4 does not support transom sterns, only the two versions of SWAN2 were evaluated over experimental results for the parent hull form of the NTUA double-chine, wide-transom, high-speed monohull series. The effect of speed on the numerical predictions was investigated. It is concluded that both versions of SWAN2 the linear and the one with the non-linear Froude-Krylov and hydrostatic forces provide a more robust tool for prediction of the dynamic response of the vessels than the non-linear SWAN4 code. In general, their results are close to what was expected on the basis of experience. Furthermore, the use of the option of non-linear Froude-Krylov and hydrostatic forces is beneficial for the accuracy of the predictions. The content of the paper is based on the Diploma thesis of the second author, supervised by the first one and further refined by the third one.

Integrated Ship Cybersecurity Management as a Part of Maritime Safety and Security System

  • Melnyk, Oleksiy;Onyshchenko, Svitlana;Pavlova, Nataliia;Kravchenko, Oleksandra;Borovyk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.135-140
    • /
    • 2022
  • Scientific and technological progress is also fundamental to the evolving merchant shipping industry, both in terms of the size and speed of modern ships and in the level of their technical capabilities. While the freight performance of ships is growing, the number of crew on board is steadily decreasing, as more work processes are being automated through the implementation of information technologies, including ship management systems. Although there have been repeated appeals from international maritime organizations to focus on building effective maritime security defenses against cyber attacks, the problems have remained unresolved. Owners of shipping companies do not disclose information about cyberattack attempts or incidents against them due to fear of commercial losses or consequences, such as loss of image, customer and insurance claims, and investigations by independent international organizations and government agencies. Issues of cybersecurity of control systems in the world today have gained importance, due to the fact that existing threats concern not only the security of technical means and devices, but also issues of environmental safety and safety of life at sea. The article examines the implementation of cyber risk management in the shipping industry, providing recommendations for the safe ship operation and its systems in order to improve vulnerability to external threats related to cyberattacks, and to ensure the safety and security of such a technical object as a seagoing ship.

Method of Generating Information Signals in the System Industrial Internet of Things

  • Aleksandr Serkov;Nina Kuchuk;Bogdan Lazurenko;Alla Horiuskina
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.206-210
    • /
    • 2024
  • Industrial facilities that use modern IT technologies require the ensured reliability and security of information in automated enterprise management. Concurrently, so as to ensure a high quality of communication, it is necessary to expand the bandwidth of communication channels, which are limited by the physical parameters of the radio frequency spectrum. In order to overcome this contradiction, we propose the application of technology fundamental to ultra-wideband signals, in which the ratio between the bandwidth and its central part is greater than "one". For this reason, the information signal is emitted without a carrier frequency - simultaneously within the entire frequency band - provided that the signal level is lower than the noise level. For the transmission of information content, the method of positional-time coding is used, in which each information bit is encoded by hundreds of ultrashort pulses that arrive within a certain sequence. Mathematical models of signals and values observed in wireless communication systems with autocorrelation reception of modulated ultra-wideband signals are furthermore recommended. These assist in identifying features of the dependence of the error probability on the normalized signal-to-noise ratio and the signal base. Comparative analysis has shown that the best noise immunity of the systems considered in this paper is the communication system, which uses the time separation of the reference and information signals. During the first half of the bit interval, the switch closes the output of the transmitter directly to the generator of the ultra-wideband signal - forming a reference signal. In the middle of the bit interval, the switch alternates the output to one of two possible positions depending on the encoding signal - "zero" or "one", forming the information part of the ultra-wideband signal. It should also be noted that systems with autocorrelation reception and separate transmission of reference and information signals, provide a high level of structural signal secrecy. Furthermore, they provide the reliable transmission of digital information, especially in interference conditions.

Recent Research Trend in Laser-Soldering Process

  • Kim, Hwan Tae;Kil, Sang Cheol;Hwang, Woon Suk
    • Corrosion Science and Technology
    • /
    • v.8 no.5
    • /
    • pp.184-187
    • /
    • 2009
  • The trend of the microjoining technology by the laser-soldering process has been reviewed. Among the production technologies, joining technology plays an important role in the fabrication of electronic components. This has led to an increasing attention towards the use of modern microjoining technology such as micro-resistance spot joining, micro-soldering, micro-friction stir joining and laser-soldering, etc. This review covers the recent technical trends of laser-soldering collected from the COMPENDEX DB analysis of published papers, research subject and research institutes.

Flexible Barrier System for Rockfall Protection (유연성 방호책을 이용한 철도변 낙석방호사례)

  • 최승일;유병옥;김경석
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.06a
    • /
    • pp.103-116
    • /
    • 2003
  • Rockfall Protection fence is one of the most common rockfall Protection methods in Korea. If rockfall protection fences are required along the road or railway, their location, height and capacity, in terms of the maximum kinetic energy that they can absorb, should be specified. Within this paper, the best practice of rockfall barrier is introduced. Modern rockfall simulations as a means to define risks, protection requirements, dynamic loading and height of potential structures and selection of appropriate placement is presented. Technical possibilities of rockfall barriers and their actual limits are presented. Safety concepts based on probabilistic approaches are proposed. Recent studies peformed in other countries show that Flexible Barriers are also a feasible system to stop and retain debris flows. Finally an outlook onto further development is given.

  • PDF

A Simulation Model for the Response of Information-Warfare based on Computer Forensics (정보전대응을 위한 컴퓨터 포렌식스 기반 모의실험1))

  • Choe, Yong-Rak;Ko, Byong-Su;Park, Meong-Chan
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.391-421
    • /
    • 2003
  • While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.

  • PDF