• Title/Summary/Keyword: New Calculation Framework

Search Result 44, Processing Time 0.021 seconds

Molecular Dynamics Simulation on Hydrogen Adsorption into Catenated Metal Organic Frameworks (분자 동역학을 이용한 상호 관통된 Metal Organic Framework의 수소 흡착에 관한 연구)

  • Lee, Tae-Bum;Kim, Dae-Jin;Jung, Dong-Hyun;Kim, Ja-Heon;Choi, Seung-Hoon
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.9-12
    • /
    • 2006
  • We performed molecular dynamics simulations on the conventional MOF, IRMOF-14 and the catenated MOF with two MOF chains, IRMOF13, to find out rational design and synthetic strategies toward efficient hydrogen storage materials. The molecular dynamics calculations were done using Universal force fields and the analysis of result was performed during the NVE dynamics after preliminary NVT dynamics at 77K. The results showed the density of adsorbed hydrogen molecules was increased in the various pores created by catenation of MOFs while the large amount of volume in conventional MOF was not effectively utilized to store hydrogen. Those calculation results commonly showed the proper control of pore si Be for hydrogen storage into MOF by catenation would be one of the efficient ways to increase hydrogen capacity of MOFs.

  • PDF

Economic Analysis of a Residential Ground-Source Heat Pump System (단독주택용 지열원 열펌프 시스템의 경제성 분석)

  • Sohn, Byong-Hu;Kang, Shin-Hyung;Lim, Hyo-Jae
    • New & Renewable Energy
    • /
    • v.3 no.4
    • /
    • pp.31-37
    • /
    • 2007
  • Because of their low operating and maintaining costs, ground-source heat pump(GSHP) systems are an increasingly popular choice for providing heating, cooling and water heating to public and commercial buildings. Despite these advantages and the growing awareness, GSHP systems to residential sectors have not been adopted in Korea until recently. A feasibility study of a residential GSHP system was therefore conducted using the traditional life cycle cost(LCC) analysis within the current electricity price framework and potential scenarios of that framework. As a result, when the current residential electricity costs for running the GSHP system are applied, the GSHP system has weak competitiveness to conventional HV AC systems considered. However, when the operating costs are calculated in the modified price frameworks of electricity, the residential GSHP system has the lower LCC than the existing cooling and heating equipments. The calculation results also show that the residential GSHP system has lower annual prime energy consumption and total pollutant emissions than the alternative HVAC systems considered in this work.

  • PDF

Measuring the Confidence of Human Disaster Risk Case based on Text Mining (텍스트마이닝 기반의 인적재난사고사례 신뢰도 측정연구)

  • Lee, Young-Jai;Lee, Sung-Soo
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.63-79
    • /
    • 2011
  • Deducting the risk level of infrastructure and buildings based on past human disaster risk cases and implementing prevention measures are important activities for disaster prevention. The object of this study is to measure the confidence to proceed quantitative analysis of various disaster risk cases through text mining methodology. Indeed, by examining confidence calculation process and method, this study suggests also a basic quantitative framework. The framework to measure the confidence is composed into four stages. First step describes correlation by categorizing basic elements based on human disaster ontology. Secondly, terms and cases of Term-Document Matrix will be created and the frequency of certain cases and terms will be quantified, the correlation value will be added to the missing values. In the third stage, association rules will be created according to the basic elements of human disaster risk cases. Lastly, the confidence value of disaster risk cases will be measured through association rules. This kind of confidence value will become a key element when deciding a risk level of a new disaster risk, followed up by preventive measures. Through collection of human disaster risk cases related to road infrastructure, this study will demonstrate a case where the four steps of the quantitative framework and process had been actually used for verification.

Derivation of a new dose constraint applicable to radioactive discharges from Korean nuclear power plants through retrospective dose assessment

  • Kim, Soyun;Cheong, Jae Hak
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3660-3671
    • /
    • 2022
  • A new methodology to derive a dose constraint for radioactive effluent from a unit of nuclear power plant (NPP) through retrospective assessment was developed to reflect operational flexibility in line with international standards. The new dose constraint can retain the safety margin between the offsite dose and the past dose constraints. As case studies, the new approach was applied to 24 Korean NPPs to address the limitations of the existing seven dose constraints that do not fully comply with current international radiation protection standards. Therefore, an effective dose constraint for Korean NPPs was proposed as no less than 0.15 mSv/y, which is comparable to the international practices and previous studies (0.05-0.3 mSv/y). Although the lower bound of the equivalent dose constraint was calculated as 0.17 mSv/y, it is not proposed in this study since the compliance with the derived effective dose constraint can prevent accompanied equivalent doses to any organs from exceeding equivalent dose limits. The new framework and the case studies are expected to contribute toward and support the revision of existing dose constraints for radioactive effluent from NPPs, ensuring better compliance with the current international safety standards as well as reflect the operational flexibility in practice.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

Economic Analysis of a Residential Ground-Source Heat Pump System (단독주택용 지열원 열펌프 시스템 경제성 분석)

  • Sohn, Byong-Hu;Kang, Shin-Hyung;Lim, Hyo-Jae
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.515-518
    • /
    • 2007
  • Because of their low operating and maintaining costs, ground-source heat pump(GSHP) systems are an increasingly popular choice for providing heating, cooling and water heating to public and commercial buildings. Despite these ad- vantages and the growing awareness, GSHP systems to residential sectors have not been adopted in Korea until recently. A feasibility study of a residential GSHP system was therefore conducted using the traditional life cycle cost(LCC) analysis within the current electricity price framework and potential scenarios of that framework. As a result, when the current residential electricity costs for running the GSHP system are applied, the GSHP system has weak competitiveness to conven- tional HVAC systems considered. However, when the operating costs are calculated in the modified price frameworks of electricity, the residential GSHP system has the lower LCC than the existing cooling and heating equipments. The calculation results also show that the residential GSHP system has lower annual prime energy consumption and total pollutant emissions than the alternative HVAC systems considered in this work.

  • PDF

A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube

  • Chhabra, Arpit;Singhal, Niraj;Bansal, Manav;Rizvi, Syed Vilayat
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.113-122
    • /
    • 2022
  • At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization.

Extension of Fast Level Set Method with Relationship Matrix, Modified Chan-Vese Criterion and Noise Reduction Filter

  • Vu, Dang-Tran;Kim, Jin-Young;Choi, Seung-Ho;Na, Seung-You
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.3E
    • /
    • pp.118-135
    • /
    • 2009
  • The level set based approach is one of active methods for contour extraction in image segmentation. Since Osher and Sethian introduced the level set framework in 1988, the method has made the great impact on image segmentation. However, there are some problems to be solved; such as multi-objects segmentation, noise filtering and much calculation amount. In this paper we address the drawbacks of the previous level set methods and propose an extension of the traditional fast level set to cope with the limitations. We introduce a relationship matrix, a new split-and-merge criterion, a modified Chan-Vese criterion and a novel filtering criterion into the traditional fast level set approach. With the segmentation experiments we evaluate the proposed method and show the promising results of the proposed method.

Fuzzy-based Trust Measurement for CoPs in Knowledge Management Systems (실행공동체를 위한 지식관리시스템에서의 퍼지기반 신뢰도 측정)

  • Yang, Kun-Woo
    • The Journal of Information Systems
    • /
    • v.19 no.4
    • /
    • pp.65-85
    • /
    • 2010
  • The importance of communities of practice(CoP) as an organizational informal unit for fostering knowledge transfer and sharing gains a lot of attention from KM researchers and practitioners. Since most of CoPs are formulated online these days, the credibility or trustworthiness of knowledge contents circulated within a certain CoP should be considered thoroughly for them to be fully utilized safely. Here comes the need for an appropriate trust measuring methodology to determine the true value of knowledge given by unknown people through an online channel. In this paper, an improved trust measuring method is proposed using new trust variables such as level of degrees derived from the relationships among community users. In addition, activeness, relevance, and usefulness of the knowledge contents themselves, which are calculated automatically using a text categorization technique, are also used for trust measurement. The proposed framework incorporates fuzzy set and calculation concepts to help build trust matrices and models, which are used to measure the level of trust involved in specific knowledge artifacts concerned.

A Study on the Aggregation and Structuring of Technological Knowledge Indicators (기술지식지표의 통합 및 구조화에 대한 연구)

  • 박광만;신준석;박용태
    • Proceedings of the Technology Innovation Conference
    • /
    • 2003.02a
    • /
    • pp.27-40
    • /
    • 2003
  • Though it has been recognized that the accumulation of technological knowledge has been the core competency to reinforce the competitiveness of individual firms and to raise the innovation capability of social and economic systems, only single or fragmentary variables, such as R&D expenditure, R&D stock, the number of researchers and the number of R&D employee have been adopted to measure the amount of technological knowledge. In this research, we use nine conventional technological knowledge measures under the conceptual structure of input-output framework to technological knowledge. Applying correlation and factor analysis, we examine the relationships among the nine proxy measures quantitatively and suggest the new approach for the calculation of technological knowledge index as a aggregated measure.

  • PDF