• Title/Summary/Keyword: Security-enhanced development

Search Result 101, Processing Time 0.032 seconds

A Study on Subsidence of Offshore Wind Power System Foundation (해상풍력시스템의 기초침하에 관한 연구)

  • Seo, Dong-Il;Shin, Sung-Ryul;Lim, Jong-Se;Yoon, Ji-Ho;Jang, Won-Yil
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.31 no.8
    • /
    • pp.1020-1027
    • /
    • 2007
  • As a national enterprise has been expanded over and over, the worldwide energy consumption has been growing necessarily. Moreover, as recently energy spendings are on the increase in countries such as BRICs, it has resulted that a rise in the price of both oil and mineral resources and instability between supply and demand become serious issue in the world resources market. The recent high price of oil and mineral resources have a deep influence on economy and threaten energy security and even national prosperity of Korea. In addition to these, exhaustion of fossil fuels and the enhanced greenhouse effect which results from gases emitted as a result of fossil fuels has been in serious questions which occur a great deal of effort to secure clean energy resources all around the world. As it is considerably possible for Korea that the Kyoto protocol may come into effect on and after 2013, it is essential to require the technological development to promote energy efficiency as well as to develope safe and renewable energy resources. The wind energy technology which converts kinetic energy into electrical energy has been in the focus of the world's attention. In this study, two-dimensional numerical analyses were conducted to observe subsidence aspects of the sea bottom on differently applied loads and various ground conditions.

Development of Enhanced Contingency Screening and Selection Algorithm for On-line Transient Security Assessment (과도안전도 평가를 위한 개선된 상정고장 선택 및 여과 알고리즘 개발)

  • Kim Yong-Hak;Song Sung-Geun;Nam Hae-Kon
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.6
    • /
    • pp.306-314
    • /
    • 2005
  • In this paper, a new approach that is based on EEAC & only with network solutions for CS&S in the transient stability assessment is developed. The proposed CS&S algorithm in conjunction with EEAC to include the capability of performing on-line TSA without TDS is used to calculate the critical clearing time for stability index. In this algorithm, all generators are represented by classical models and all loads are represented by constant impedance load models. The accelerating & synchronizing power coefficient as an index is determined at its disturbance through solving network equation directly. As mentioned above, a new index for generator is generally used to determine the critical generators group. The generator rotor angle is fixed for non-critical generators group, but has equal angle increments for critical generators group. Finally, the critical clearing time is calculated from the power-angle relationship of equivalent OMIB system. The proposed CS&S algorithm currently being implemented is applied to the KEPCO system. The CS&S result was remarkably similar to TSAT program and SIME. Therefore, it was found to be suitable for a fast & highly efficient CS&S algorithm in TSA. The time of CS&S for the 139 contingencies using proposed CS&S algorithm takes less than 3 seconds on Pentium 4, 3GHz Desktop.

Review on LTE-Advanced Mobile Technology

  • Seo, Dae-woong;Kim, Yoon-Hwan;Song, Jeong-Sang;Jang, Bongseog;Bae, Sang-Hyun
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.197-203
    • /
    • 2018
  • Long Term Evolution-Advanced (LTE-A) is the next drive in the broadband mobile communication, which allows operators to improve networks performance and service capabilities. LTE-A targets the peak data rates of 1Gbps in the downlink and 500Mbps in the uplink. This requirement is only fulfilled by a transmission bandwidth of up to 100MHz. However the accessibility of such large part of the contiguous spectrum is uncommon in practice. Therefore LTE-A uses some new features on top of the existing LTE standards to provide very high data rate transmission. Some of the most significant features introduced in LTE-A are carrier aggregation, heterogeneous network enhancement, coordinated multipoint transmission and reception, enhanced multiple input and multiple output, and development relay nodes with universal frequency reuse. This review paper presents an overview of the above mentioned LTE-A key features and functionalities. Based on this review, in the conclusion we discuss the current technical challenges for future broadband mobile communication systems.

A Measure for Improving the Systematic Evaluation of the Life Cycle Cost in Technical Proposal Tendering (기술제안입찰에서의 계적인 생애주기비용 평가를 위한 개선방안)

  • Son, Myung-Jin;Hyun, Chang-Taek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.6
    • /
    • pp.71-83
    • /
    • 2012
  • The use of technical proposal tendering has been expanding recently with the aim of effecting cost reduction, quality enhancement, technological development and value realization centered on multifunctional administrative cities, innovation cities, and the Yongsan relocation project. In line with the increasing interest towards life cycle cost improvement measures as an important evaluation category concerning technical proposal tendering, efforts in preparing measures that can execute the security of credibility and objective evaluation concerning architectural life cycle cost are being made. However, problems such as lack of applicable cases of design development and detail design, distortion of initial construction costs concerning the original plan, combination of constant price and current price, the ambiguity of the calculation standards between tendering corporations, inaccuracy of terms, and insufficient compositional formats concerning life cycle improvement measures are being cited. Accordingly, this study sought to propose a measure to improve the compositional guidelines, format, and standards so that a systematic life cycle cost evaluation can be executed for the reliable distinction of each participating corporation, enhanced credibility and objective evaluation of the life cycle cost improvement measure for technical proposals.

Study on the Current Status of Data Science Curriculum in Library and Information Science and its Direction (문헌정보학과의 데이터 사이언스 커리큘럼 개발 실태와 방향성 고찰)

  • Kang, Ji Hei
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.343-363
    • /
    • 2016
  • This study determines 69 iSchools provided which data science curriculum, and presents the direction for Korean LIS schools. It is certain that iSchools extend their subject territory including areas related to health, technology and biotechnology. However, this phenomenon is not actively observed in Korea. iSchools also focus on the area about how to process and manage data. iSchools, in deed, offer courses regarding data science, data management and data security. The 'database' was a higher proportion of 'data warehouse' curriculum, and, 'data statistic and analysis' curriculum are forming similar portion. As a result of analysis of the iSchool's curriculum and comparison with Korean curriculum, this study suggests: the expansion of LIS curriculum related to data science; the enhanced role of the data translational data science; development of curriculum to raise the mathematical analysis capabilities, development of specialized curriculum and experimental classes; and support new knowledge skills to interact with technology.

Technology Trends in CubeSat-Based Space Laser Communication (큐브위성 기반 우주 레이저 통신 기술 동향)

  • Chanil Yeo;Young Soon Heo;Siwoong Park;Hyoung Jun Park
    • Journal of Space Technology and Applications
    • /
    • v.4 no.2
    • /
    • pp.87-104
    • /
    • 2024
  • CubeSats are being utilized in various fields such as Earth observation, space exploration, and verification of space science and technology due to their low cost, short development period, enhanced mission-oriented performance, and ability to perform various missions through constellation and formation flights. Recently, as the availability of CubeSats has increased and their application areas have expanded, the demand for high-speed transmission of large amounts of data obtained by CubeSats has increased unprecedentedly. Laser-based free space optical communication technology is capable of transmitting large amounts of data at high speeds compared to the existing radio communication methods, and provides various advantages such as use of unlicensed spectrum, low cost, low power, high security characteristics, and of use a small communication platform. For this reason, it is suitable as a high-performance communication technology to support CubeSat missions. In this paper, we will present the core components and characteristics of CubeSat-based space laser communication system, and recent research trends, as well as representative technology development results.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Determination of the effective components in the various parts of Luffa cylindrica (L.) Roemer and development to remove the flesh from its fruit : (II) -Removal of flesh on the net fiber In fruit of sponge-gourd and improvement of quality of the net fiber- (수세미외의 부위별(部位別) 유효성분(有效成分) 조사(調査) 및 사과락중(絲瓜絡中) 육질제거(肉質除去) 방법(方法) 개발(開發) 연구(硏究) : (II) -사과락 육질제거 및 섬유품질개선-)

  • Yoo, Tae-Bang;Chang, Ki-Woon;An, Byung-Chang;Shin, Jong-Sun;Park, Joung-Sang
    • Applied Biological Chemistry
    • /
    • v.34 no.4
    • /
    • pp.373-378
    • /
    • 1991
  • The skin and fleshy substance on the net fiber of sponge-gourd fruit pressed mechanically was removed with 0.2% NaOH solution in $3{\sim}5$ hours. The treatment of 0.2% NaOH with 0.02% Monopol(non-ionogenic polyoxethylen derivative) as surfactnat and with 0.1% $Ca(OCl)_2$ as bleaching agent enhanced the effect to remove the fleshy substance and improve the quality of net fiber. Also, the wet hardness and tensile strength of net fiber were controlled by the crosslinkage of the fiber with glu tardialdehyde, glyoxal, and formalin, respectively. The net fiber was stable on the acid and alkaline solutions. Also the range of temperature to degradate the fiber was $338{\sim}385^{\circ}C$. These values indicated a fair stability. The improved net fiber can be used for raw material of bath, dish washing, oil and gas filter, and many kinds of decorations.

  • PDF

Current Status and Future Prospects of the IAEA Program in the Fields of Nuclear Fuel Cycle and Materials Technologies (핵연료주기 기술개발을 위한 IAEA 프로그램의 추이 분석 및 전망)

  • KIM Kyoung-Pyo;PARK Seong-Won;SEO Chung-Suk;KIM Ho-Dong;SONG Kee-Chan;JEONG Sang-Mun
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2005.11a
    • /
    • pp.221-228
    • /
    • 2005
  • The objectives of this paper are to present the general features of the current IAEA programs and their future prospects in the fields of the nuclear fuel cycle and the related materials technologies thus responding to a need to achieve a consolidated understanding of the Agency's programs for an effect ive implementation of the respective national R&D projects in Korea. During the development of the Agency's programs for 2005-2007 in the aforementioned fields. it is foreseen that an considerable attention will be attributed to the concepts, models and opportunities for optimizing the fuel cycle, mining the raw materials, re-using the materials and reducing the waste arisings (e.g. through Partitioning and transmutation), all of which, will Include an enhanced consideration for proliferation and security concerns.

  • PDF

An Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1204-1209
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking, stock dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF