• Title/Summary/Keyword: Primary Flow Direction

Search Result 74, Processing Time 0.026 seconds

Enhancement of combustion efficiency of a air-cooled combustor system with single F.D. Fan Using CFD (전산유체역학을 이용한 단일 송풍기가 적용된 공냉식 연소설비의 효율개선)

  • Kim, Min-Choul;Shon, Byung-Hyun;Lee, Jae-Jeong;Park, Hung-Suck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.460-468
    • /
    • 2021
  • This study investigated the enhanced combustion efficiency of an "air-cooled combustion system" with single F.D. fan, and performed a numerical analysis for the operation and design conditions to increase the combustion efficiency. The combustion efficiency in an actual combustor was compared before and after the structure modification. Numerical analysis for application of a single fan revealed the difficulty of forming a turbulence for circular combustion conditions. This is because the supply ratio of combustion air supplied into 2 flow paths becomes irregular in the combustion furnace due to a change in friction force and pressure in each flow path. Subsequently, two methods of supplying air into the combustion furnace were analyzed numerically to obtain the optimal combustion conditions of an air-cooled combustion system. The first method involved injecting the preheated combustion air after a 180~360 degree rotation from the outer wall, whereas in the second method, the combustion air was injected into the combustion furnace in a tangential direction after primary heat exchange outside the combustion furnace, by applying a rotatable vane structure in the combustion furnace. Results reveal that application of a single F.D. fan to the air injection into a rotatable combustion furnace is desirable for optimization of the combustion conditions for applying a duct structure having a dual cooling wall for the cooling of the outer wall of the combustion furnace, and for maintaining perfect mixing in the combustion furnace. We therefore confirmed enhanced combustion efficiency by comparing the actual combustion efficiency before and after structure modification.

Optimal Operation Algorithm of Protection Devices in Distribution Systems With PV System (대용량 태양광전원이 연계된 배전선로에 있어서 보호협조기기의 최적 운용알고리즘)

  • Kwon, Soon-hwan;Lee, Hu-dong;Nam, Yang-hyun;Rho, Dae-seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.17-26
    • /
    • 2018
  • If a photovoltaic (PV) system is installed in a primary feeder interconnected with the PV system, bi-directional power flow can occur, and then, the magnitude and direction of the fault current can change, depending on the fault location and point of common coupling (PCC) of the PV system, and the time current curve (TCC) cannot be properly coordinated between protection devices. Also, it is difficult to obtain a proper time interval for protection devices because the conventional setting approach is applied, even though the PV system is installed and operating. Therefore, this paper presents three operation modes considering the operational conditions of the PV system to obtain setting values for protection devices. Based on the mode, this paper proposes an algorithm to calculate the optimal protection coordination time interval according to the introduction capacity of the PV system. In addition, this paper performs modelling of a distribution system with the PV system and protection devices by using Off-DAS S/W, and analyzes the characteristics of the time interval between the protection devices, such as substation relays, reclosers, customer relays, and PV customer relays. The simulation results confirmed that the proposed operational modes and setting-value algorithms are useful and effective for protection coordination in a distribution system for a PV system.

Study on surface processing design of aluminum alloy materials that is applied to IT and electronics (IT 및 전자제품에 적용되는 알루미늄 합금소재의 표면처리디자인에 관한 연구)

  • Han, Jisu;Kim, Pureum;Kim, Hyun-Sung
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.27 no.4
    • /
    • pp.212-219
    • /
    • 2017
  • To become a person that is suitable to the 'High-Touch' generation where emotion takes over, we can focus on 6 skill including design, story, harmony, empathy, play, and meaning. Among these skills, harmony with design was chosen as the most important skill. Design can be seen as the basic element of all business, but it will be difficult to match the flow of the future Sensibility and intuitive generation with just the modern design that has been made based on reasonable and objective information and knowledge. This study suggests system and standardization of Sensibility surface processing design that satisfies great quality, attractive quality and Sensibility quality by applying surface processing design of product and Sensibility cognitive factors felt by the consumer by setting differentiated strategy and CMF (Color, Material, Finishing) understanding along with the importance of design materials in primary aspect. By considering the efficacy/characteristic of new surface processing characteristic/differentiation/possibility of implementation according to setting direction of differentiated CMF strategy per type of parts applied to the product, visual surface processing sample was implemented. Through this, it is expected that practical communication connected tool and Sensibility surface processing design's strategic access framework can be applied by understanding and sharing comprehensive elements such as target product, part type, applied material, applied surface processing, surface color, surface texture, and implementing feeling to environments such as designers, CMF designers, surface processing experts, and engineers in IT, electronics, and other areas. when developing a product.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF