A supercapacitor, also called an ultracapacitor or an electrochemical capacitor, stores electrochemical energy by the adsorption/desorption of electrolytic ions or a fast and reversible redox reaction at the electrode surface, which is distinct from the chemical reaction of a battery. A supercapacitor features high specific power, high capacitance, almost infinite cyclability (~ 100,000 cycle), short charging time, good stability, low maintenance cost, and fast frequency response. Supercapacitors have been used in electronic devices to meet the requirements of rapid charging/discharging, such as for memory back-up, and uninterruptible power supply (UPS). Also, their use is being extended to transportation and large industry applications that require high power/energy density, such as for electric vehicles and power quality systems of smart grids. In power generation using intermittent power sources such as solar and wind, a supercapacitor is configured in the energy storage system together with a battery to compensate for the relatively slow charging/discharging time of the battery, to contribute to extending the lifecycle of the battery, and to improve the system power quality. This article provides a concise overview of the principles, mechanisms, and classification of energy storage of supercapacitors in accordance with the electrode materials. Also, it provides a review of the status of recent research and patent, product, and market trends in supercapacitor technology. There are many challenges to be solved to meet industrial demands such as for high voltage module technologies, high efficiency charging, safety, performance improvement, and competitive prices.
Electromygram was measured in three different cases; not wearing of a helmet, wearing of a 920g helmet, and wearing of a 1310g helmet, and it was revealed that there was a high level of muscle activities on the opposite side (sternocleidomastoid muscle) while the head and the neck were moving right and left and muscle activities of the curve and of the hyperextension were found to be not significant. Especially, the presence of a helmet seemed to cause a difference in a level of muscle activities on the deltoid and erector spine muscles while lifting or lowering with a weight placed on the deniz backboard. Therefore, it would be possible to assume that this newly developed smart helmet would not affect muscles around the necks of paramedics if they do not move their necks and heads right and left while lowering or lifting a patient using the deniz backboard. In addition, in case of the deltoid and erector spine muscles, it is shown that an increase in the degree of movement could lead to an increase in the level of muscle activities on the muscles controlling of the corresponding action, which are waist and back muscles. Despite it, it would be possible to prevent possible injuries and/or muscular and skeletal diseases around the lumbar by fully complying with a basic rule of straightening of the waist while making a power-lifting motion.
Mun, Jong Hyeok;Kim, Do Hyung;Choi, Jong Sun;Choi, Jae Young
KIPS Transactions on Software and Data Engineering
/
제10권4호
/
pp.133-142
/
2021
With the recent advancements of deep learning, companies such as smart home, healthcare, and intelligent transportation systems are utilizing its functionality to provide high-quality services for vehicle detection, emergency situation detection, and controlling energy consumption. To provide reliable services in such sensitive systems, deep learning models are required to have high accuracy. In order to develop a deep learning model for analyzing previously mentioned services, developers should utilize the state of the art deep learning models that have already been verified for higher accuracy. The developers can verify the accuracy of the referenced model by validating the model on the dataset. For this validation, the developer needs structural information to document and apply deep learning models, including metadata such as learning dataset, network architecture, and development environments. In this paper, we propose a description language that represents the network architecture of the deep learning model along with its metadata that are necessary to develop a deep learning model. Through the proposed description language, developers can easily verify the accuracy of the referenced deep learning model. Our experiments demonstrate the application scenario of a deep learning description document that focuses on the license plate recognition for the detection of illegally parked vehicles.
Journal of the Korean Society of Marine Environment & Safety
/
제27권7호
/
pp.1106-1115
/
2021
In this study, a fin that controls ship stern flow was attached on stern hull of a 80k bulk carrier to improve resistance performance. The rectangular cross-sectional fin was attached at several locations on the hull, and angle to streamline was changed with constant length, breadth, and thickness. The resistance performance and wake on propeller plane of the hull with and without the fin were analyzed using model-scale computational fluid dynamics simulation. The analysis results were extrapolated to full-scale to compare the performance and wake of the full-scale ship. First, the fin changed path of bilge vortex that flowed into the propeller along the stern hull without the fin to transom stern. This change increased pressure of the stern hull and upper region of the propeller, so pressure resistance and total resistance of the hull were reduced - the nearer the fin location to after perpendicular (AP) and base line of the hull, the larger the reduction of the resistances. Second, nominal wake fraction of the hull with the fin was lower than that without the fin. This dif erence was in proportion to the angle of the fin, but the total resistance reduction was in proportion until a certain angle at which the reduction was maximum. The largest total resistance reduction was approximately 2.1% at 12.5% of length between perpendiculars from the AP, 10% of draft from the base line, and 14° with respect to the streamline.
Maglev rail joints are vital components serving as connections between the adjacent F-type rail sections in maglev guideway. Damage to maglev rail joints such as bolt looseness may result in rough suspension gap fluctuation, failure of suspension control, and even sudden clash between the electromagnets and F-type rail. The condition monitoring of maglev rail joints is therefore highly desirable to maintain safe operation of maglev. In this connection, an online damage detection approach based on three-dimensional (3D) convolutional neural network (CNN) and time-frequency characterization is developed for simultaneous detection of multiple damage of maglev rail joints in this paper. The training and testing data used for condition evaluation of maglev rail joints consist of two months of acceleration recordings, which were acquired in-situ from different rail joints by an integrated online monitoring system during a maglev train running on a test line. Short-time Fourier transform (STFT) method is applied to transform the raw monitoring data into time-frequency spectrograms (TFS). Three CNN architectures, i.e., small-sized CNN (S-CNN), middle-sized CNN (M-CNN), and large-sized CNN (L-CNN), are configured for trial calculation and the M-CNN model with excellent prediction accuracy and high computational efficiency is finally optioned for multiple damage detection of maglev rail joints. Results show that the rail joints in three different conditions (bolt-looseness-caused rail step, misalignment-caused lateral dislocation, and normal condition) are successfully identified by the proposed approach, even when using data collected from rail joints from which no data were used in the CNN training. The capability of the proposed method is further examined by using the data collected after the loosed bolts have been replaced. In addition, by comparison with the results of CNN using frequency spectrum and traditional neural network using TFS, the proposed TFS-CNN framework is proven more accurate and robust for multiple damage detection of maglev rail joints.
Journal of the Korean Society of Marine Environment & Safety
/
제28권7호
/
pp.1231-1237
/
2022
In the present study, the optimization of the main particulars of a ship using AI-based design search techniques was investigated. For the design search techniques, the SHERPA algorithm by HEEDS was applied, and CFD analysis using STAR-CCM+ was applied for the calculation of resistance performance. Main particulars were automatically transformed by modifying the main particulars of the ship at the stage of preprocessing using JAVA script and Python. Small catamaran was chosen for the present study, and the main dimensions of the length, breadth, draft of demi-hull, and distance between demi-hulls were considered as design variables. Total resistance was considered as an objective function, and the range of displaced volume considering the arrangement of the outfitting system was chosen as the constraint. As a result, the changes in the individual design variables were within ±5%, and the total resistance of the optimized hull form was decreased by 11% compared with that of the existing hull form. Throughout the present study, the resistance performance of small catamaran could be improved by the optimization of the main dimensions without direct modification of the hull shape. In addition, the application of optimization using design search techniques is expected for the improvement in the resistance performance of a ship.
Journal of the Korea Institute of Building Construction
/
제23권3호
/
pp.305-313
/
2023
With an increasing interest in the commercialization of research results in the present societal climate, especially in the construction industry, preliminary product analysis plays a critical role when introducing a new product to the market. It significantly influences the product's success or failure. In this context, this study aims to investigate the utility of Importance-Performance Analysis (IPA) as a management strategy tool for preliminary analysis in the commercialization of new architectural technologies. The study specifically assesses a smart ball product engineered for pipeline inspection. The evaluation is carried out based on product quality, convenience, and usability categories. Seventeen factors are recognized as sub-items, and a survey is conducted among relevant experts and consumer groups. From the survey, four key items are chosen: "Keep up the good work," "Concentrate here," "Low priority," and "Possible overkill." Suitable strategic measures are derived for each item. By conducting a correlation analysis between product importance and performance, this study offers a method to establish priority directions for future development. This analysis assists in identifying areas that necessitate improvement or additional focus to increase the product's commercial potential. On the whole, this study contributes to understanding and applying Importance-Performance Analysis as a valuable tool in the preliminary analysis and commercialization of novel technologies in the field of architecture.
The Journal of the Institute of Internet, Broadcasting and Communication
/
제22권2호
/
pp.1-7
/
2022
The purpose of this study is to discuss the impact of unmanned aerial vehicle service and how to activate it. The discussion on the impact of the introduction of the unmanned aerial vehicle service was examined in terms of economic, environmental, and social acceptance, and a plan to revitalize the industry was presented. In terms of economic impact, if transportation services are increased using unmanned aerial vehicles in the future, road-based transportation cargo may decrease and road movement speed may increase due to reduced road congestion. This can have a positive effect on the increase in the value of land or real estate assets, and it also provides an impact on smart city design. In terms of environmental impact, unmanned aerial vehicles (UAVs) generally move through electricity, so they emit less exhaust gas compared to other existing devices, such as vehicles and railroads, and thus have less environmental impact. However, noise can have a negative impact on the habitat in the presence of wild animals along their migration routes. In terms of social acceptability of unmanned aerial vehicles (UAV) technology, areas that are declining due to the emergence of new services may appear, and at the same time, organizations that create profits may appear, causing conflicts between industries. Therefore, it is essential to form a social consensus on the acceptance of emerging industries. The government should come up with various countermeasures to minimize the negative impact that reflects the characteristics of the unmanned aerial vehicle use service. Just as various systems such as road signs were introduced so that vehicles can be operated on the ground to secure air routes in the mid- to long-term for revitalization of unmanned-based industries, development and establishment of services that should be introduced and applied prior to constructing air routes I need this. In addition, the design and implementation of information collection and operation plans for unmanned air traffic management in Korea and a plan to secure a control system for each region should also be made. This study can contribute to providing ideas for mid- to long-term research on new areas with the development of the unmanned aerial vehicle industry.
RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.
Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.