• Title/Summary/Keyword: Protocol Economy

Search Result 26, Processing Time 0.023 seconds

HCCI Combustion Engines with Ultra Low CO2 and NOx Emissions and New Catalytic Emission Control Technology (CO2/NOx 초저배출형 HCCI 엔진 연소기술과 신촉매제어기술)

  • Kim, Moon-Hyeon
    • Journal of Environmental Science International
    • /
    • v.17 no.12
    • /
    • pp.1413-1419
    • /
    • 2008
  • The Kyoto Protocol, that had been in force from February 16, 2005, requires significant reduction in $CO_2$ emissions for all anthropogenic sources containing transportation, industrial, commercial, and residential fields, etc, and automotive emission standards for air pollutants such as particulate matter (PM) and nitrogen oxides $(NO_x)$ become more and more tight for improving ambient air quality. This paper has briefly reviewed homogeneous charge compression ignition (HCCI) combustion technology offering dramatic reduction in $CO_2,\;NO_x$ and PM emissions, compared to conventional gasoline and diesel engine vehicles, in an effort of automotive industries and their related academic activities to comply with future fuel economy legislation, e.g., $CO_2$ emission standards and corporate average fuel economy (CAFE) in the respective European Union (EU) and United States of America (USA), and to meet very stringent future automotive emission standards, e.g., Tier 2 program in USA and EURO V in EU. In addition, major challenges to the widespread use of HCCI engines in road applications are discussed in aspects of new catalytic emissions controls to remove high CO and unburned hydrocarbons from such engine-equipped vehicles.

Design and Verification of Interworking Protocol for CC and SIP in Next Generation Mobile Network (차세대 이동네트워크에서 CC와 SIP 연동 프로토콜의 설계 및 검증)

  • 지승한;박석천
    • Journal of Internet Computing and Services
    • /
    • v.3 no.3
    • /
    • pp.95-104
    • /
    • 2002
  • The interworking for voice service between next generation mobile network and traditional network can be deployed better flexible and expansible network conditions with providing efficiency and economy of network at the same time. So it is essential to develop the interworking strategies together with a evolved network and traditional network. This paper describes a design and verification of internetworking protocol for CC of next generation mobile network and SIP of IP network for applying interworking technology to next generation mobile network, which can harmoniously expropraise voice service from traditional network.

  • PDF

Hydrogen Refueling Stations Improving Safety and Economic Feasibility (안전성과 경제성이 개선된 수소충전소)

  • YunSil Huh;DongHoon Lee;Yongjin Chung;Yongchai Kwon
    • Korean Chemical Engineering Research
    • /
    • v.61 no.4
    • /
    • pp.611-618
    • /
    • 2023
  • The purpose of the refueling protocol and the contents of SAE J2601, which is used as the basis for hydrogen vehicles refueling around the world, were investigated, and research contents related to domestic protocols were also investigated. In addition, the components of the hydrogen refueling performance evaluation device developed in Korea and the method for evaluating the performance and safety of hydrogen refueling stations were reviewed. And, the result were analyzed by applying it to the hydrogen refueling stations currently operating in Korea. In addition, an economic feasibility analysis was conducted using data collected from domestic hydrogen refueling stations. In order to secure the safety and economy of a hydrogen refueling station, the protocol must be satisfied, and in order to satisfy the protocol, it is necessary to evaluate whether the refueling temperature, refueling pressure, and refueling flow are controlled within a safe range.

A Study on the Improvement of Information Security Management Condition Evaluation in Public Sector through the SCAP Analysis by NIST in U.S. (미(美) NIST 보안성 자동평가프로토콜(SCAP)분석을 통한 공공기관의 정보보안관리실태 평가제도 개선방안 연구)

  • Jee, Yoon Seok;Lee, Yong Suk;Yoon, Duck Jung;Shin, Yong Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.4
    • /
    • pp.31-39
    • /
    • 2019
  • The 129 public institutions in Korea are subject to Information Security Management Condition Evaluation (ISMCE) as a part of the government management evaluation system by the Ministry of Economy and Finance. ISMCE is started in 2006 with the central government institutions, and applied to the all public institutions in 2009. This evaluation is annually conducted by the National Intelligence Service through the site visits, and the number of the evaluated institutions is increasing year by year. However, the process of ISMCE - identifying existing vulnerabilities in the information system - is conducted manually. To improve this inconvenience, this paper introduces the various evaluation system in the major countries, especially in the United States, and analyzes the Security Content Automation Protocol (SCAP) by NIST. SCAP is automation protocol for the system vulnerability management (in technical fields) and security policy compliance evaluation. Based on SCAP, this paper suggests an improvement plan for the ISMCE of Korea.

Building a Big Data Platform Using Real-time Wearable Devices and Cases of Safety Accidents in KOREA

  • LEE, Ki Seok;CHOI, Youngjin;LEE, Kyung-cheun;SHIN, Yoonseok;YOO, Wi Sung
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.375-381
    • /
    • 2022
  • Safety accidents are of concern during construction projects, even given the recent innovations in digital technologies. These projects remain focused on overcoming specific and limited applications on construction sites. For this reason, the development of an inclusive safety management system has become crucial. This study aims to build a Big Data platform to inform decisions on how to proactively eliminate worker hazards on construction sites. The platform consists of about 100,000 real records and a real-time monitored database featuring various safety indices, such as workers' altitudes, heart rates, and fatigability during construction, which are determined through various wearable devices. The data types are customized and integrated by a research team in accordance with the characteristics of a specific project using hypertext transfer protocol (HTTP). The results can be helpful as efficient tools to ensure successful safety management in complex construction situations. This study is expected to provide three significant contributions to the field, including real-time fatigability analysis and tracking of workers on-site; providing early GPS-based warnings to workers who might be accessing dangerous spaces or places; and monitoring the workers' health indices, based on details from 100,000 cases.

  • PDF

The Economic Evaluation of the Forest Biodiversity in South Korea (산림생물다양성의 경제적 가치 평가)

  • Kim, Jung-Taek;Lee, Gwan-Gyu;Kim, Joon-Soon
    • Journal of agriculture & life science
    • /
    • v.46 no.4
    • /
    • pp.31-39
    • /
    • 2012
  • In this study, biodiversity was classified as 4 sectors (genes, species, ecosystems, and cultures) and overall 14 indicators were subdivided by the classification criterion of 4 sectors. Among those 14 indicators, monetary evaluation was conducted for 11 indicators that can be quantified in economic perspectives. Results show that negative economy effects (forest degradation, forest fire, forest damage caused by diseases and insects, deforestation, and cost under the assumption with the adoption of the Nagoya Protocol to be compensated for traditional knowledge) by reducing forest biodiversity were evaluated as 254.5 billion won annually. Also, Bioindustry, indigenous species, forest production, protection area, and income associated with mountain village were considered as positive economy effects and their annual economic value was 6.72 trillion won. Net annual benefit by maintaining forest biodiversity was about 6.5 trillion won.

[Retracted]Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions ([논문철회]전력계통 네트워크 통신방식 변화에 따른 사이버위협 분석 및 대응방안 제시)

  • Il Hwan Ji;Seungho Jeon;Jung Taek Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.91-102
    • /
    • 2023
  • The Energy Management System (EMS) communicates with power plants and substations, monitors the substations and plant operational status of the transmission and substation system for stability, continuity, real-time, and economy of power supply, and controls power plants and substations. Currently, the power exchange EMS communicates with power plants and substations based on the serial communication-based Distributed Network Protocol (DNP) 3.0 protocol. However, problems such as the difficulty of supply and demand of serial communication equipment and the lack of installation space for serial ports and modems are raised due to the continuous increase in new facilities to perform communication, including renewable power generation facilities. Therefore, this paper presents a TCP/IP-based communication method instead of the existing serial communication method of the power exchange EMS, and presents a security risk analysis that may occur due to changes in the communication method and a countermeasure to the security risk.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

A Facial Protocol for the Synthesis of Benzofuran Derivatives by the Reaction of o-Hydroxy Aryl Ketone, Amine and Chloroacetyl Chloride

  • Xia, Shuai;Wang, Xiu-Hua;Liu, Ji-Qiang;Liu, Chang;Chen, Jian-Bin;Zuo, Hua;Xie, Yong-Sheng;Dong, Wen-Liang;Shin, Dong-Soo
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.6
    • /
    • pp.1743-1748
    • /
    • 2014
  • A facile and effective method has been developed for the synthesis of a novel series of benzofuran derivatives via N-acylation, O-alkylation and intramolecular condensation reactions, starting from readily available substituted o-hydroxy aryl ketone, and chloroacetyl arylamides. This metal-free transition process is characterized by mild reaction conditions, atom economy, short reaction time and a high yield with a decreased amount of by-products.

Designing and building an efficient small-sized LAN (효율적인 소규모 네트워크 구축)

  • 안봉근;이병수;정현식
    • Korean Management Science Review
    • /
    • v.12 no.3
    • /
    • pp.97-115
    • /
    • 1995
  • Information sharing and automated office in the use of PC necessitate corporate network to implement business innovation. Building an efficient network requires competent knowledge on capabilities of various LAN technologies, hardwares and softwares that have rapidly improved in terms of efficiency and cost. This paper compares capabilities of network components: communication protocol, hardware, network operation system, low cost database software and mid-range priced SQL for application development. Also this study presents a new technology on virtual LAN and a selection guide among the various options of the network components which are suitable for PC-based small-sized network in balance of efficiency with economy. In the last section of this paper, a case of small-sized network is given for illustration.

  • PDF