• Title/Summary/Keyword: Storage Location

Search Result 408, Processing Time 0.022 seconds

Determination of Location and Depth for Groundwater Monitoring Wells Around Nuclear Facility (원자력이용시설 주변의 지하수 감시공의 위치와 심도 선정)

  • Park, Kyung-Woo;Kwon, Jang-Soon;Ji, Sung-Hoon
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.17 no.2
    • /
    • pp.245-261
    • /
    • 2019
  • Radioactive contaminant from a nuclear facility moves to the ecosystem by run-off or groundwater flow. Among the two mechanisms, contaminant plume through a river can be easily detected through a surface water monitoring system, but radioactive contaminant transport in groundwater is difficult to monitor because of lack of information on flow path. To understand the contaminant flow in groundwater, understanding of the geo-environment is needed. We suggest a method to decide on monitoring location and points around an imaginary nuclear facility by using the results of site characterization in the study area. To decide the location of a monitoring well, groundwater flow modeling around the study area was conducted. The results show that, taking account of groundwater flow direction, the monitoring well should be located at the downstream area. Also, monitoring sections in the monitoring well were selected, points at which groundwater moves fast through the flow path. The method suggested in the study will be widely used to detect potential groundwater contamination in the field of oil storage caverns, pollution by agricultural use, as well as nuclear use facilities including nuclear power plants.

Analysis of Applicability of the Detention in Trunk Sewer for Reducing Urban Inundation (도시 내수침수 저감을 위한 간선저류지 적용성 분석)

  • Lee, Sung Ho;Kim, Jung Soo;Kim, Seo Jun
    • Ecology and Resilient Infrastructure
    • /
    • v.8 no.1
    • /
    • pp.44-53
    • /
    • 2021
  • The flood prevention capacity of drainage facilities in urban areas has weakened because of the increase in impervious surface areas downtown owing to rapid urbanization as well as localized heavy rains caused by climate change. Detention can be installed in trunk sewers and linked to existing drainage facilities for the efficient drainage of runoff in various urban areas with increasing stormwater discharge and changing runoff patterns. In this study, the concept of detention in trunk sewers, which are storage facilities linked to existing sewer pipes, was applied. By selecting a virtual watershed with a different watershed shape, the relationship between the characteristic factors of detention in the trunk sewer and the design parameters was analyzed. The effect of reducing stormwater runoff according to the installation location and capacity of the reservoir was examined. The relationship between the installation location and the capacity of the detention trunk sewer in the Dowon district of the city of Yeosu, South Korea was verified. The effects of the existing water runoff reduction facility and the detention trunk sewer were also compared and analyzed. As a result of analyzing the effects of reducing internal inundation, it was found that the inundation area decreased by approximately 66.5% depending on the installation location of the detention trunk sewer. The detention trunk sewer proposed in this paper could effectively reduce internal inundation in urban areas.

Effects of an Empirical Capacitance Models and Storage Capacitance Types on TFT-LCD Pixel Operations (실험적 정전용량 모델과 축적 용량 설계 방법에 따른 TFT-LCD 화소의 동작 특성)

  • Yun, Young-Jun;Jung, Soon-Shin;Park, Jae-Woo;Choi, Jong-Sun
    • Proceedings of the KIEE Conference
    • /
    • 1999.07d
    • /
    • pp.1750-1752
    • /
    • 1999
  • An active-matrix liquid crystal display (LCD) using thin film transistors (TFTs) has been widely recognized as having potential for high-quality color flat-panel displays. Pixel-Design Array Simulation Tool (PDAST) was used to profoundly understand the gate signal distortion and pixel charging capability, which are the most critical limiting factors for high-quality TFT-LCDs. Since PDAST can simulate the sate, data and pixel voltages of a certain pixel on TFT array at any time and at any location on an array, the effect of the new set of capacitance models on the pixel operations can be effectively analyzed. The set of models which is adopted from VLSI interconnections calculate more precise capacitance. The information obtained from this study could be utilized to design the larger area and finer image quality panel.

  • PDF

Design of Global Buffer Manager in SAN-based Cluster File Systems (SAN 환경의 대용량 클러스터 파일 시스템을 위한 광역 버퍼 관리기의 설계)

  • Lee, Kyu-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2404-2410
    • /
    • 2011
  • This paper describes the design overview of cluster file system $SANique^{TM}$ based on SAN(Storage Area Network) environment. The design issues and problems of the conventional global buffer manager are also illustrated under a large set of clustered computing hosts. We propose the efficient global buffer management method that provides the more scalability and availability. In our proposed global buffer management method, we reuse the maintained list of lock information from our cluster lock manager. The global buffer manger can easily find and determine the location of requested data block cache based on that lock information. We present the pseudo code of the global buffer manager and illustration of global cache operation in cluster environment.

Towards Key Issues of Disaster Aid based on Wireless Body Area Networks

  • Liu, Jianqi;Wang, Qinruo;Wan, Jiafu;Xiong, Jianbin;Zeng, Bi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1014-1035
    • /
    • 2013
  • With recent advances in wireless communication and low-power miniaturized biomedical sensor and semiconductor technologies, wireless body area networks (WBAN) has become an integral part of the disaster aid system. Wearable vital sign sensors can track patients' status and location, thus enhancing disaster rescue efficiency. In the past few years, most of the literatures in the area of disaster aid system based on WBAN have focused on issues concerning wireless sensor design, sensor miniaturization, energy efficiency and communication protocols. In this paper, we will give an overview of disaster aid, discuss about the types of network communication as well as outline related issues. We will emphasize on analyzing six key issues in employing the disaster aid system. Finally, we will also highlight some of the challenges that still need to be addressed in the future in order to help the disaster aid system be truly and widely accepted by the public.

Elliptic Curve Signcryption Based Security Protocol for RFID

  • Singh, Anuj Kumar;Patro, B.D.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.344-365
    • /
    • 2020
  • Providing security has been always on priority in all areas of computing and communication, and for the systems that are low on computing power, implementing appropriate and efficient security mechanism has been a continuous challenge for the researchers. Radio Frequency Identification (RFID) system is such an environment, which requires the design and implementation of efficient security mechanism. Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. But, due to high strength and requirement of less key size in elliptic curve cryptography, the focus of researchers has been on designing efficient security protocol for RFID based on elliptic curves. In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability, forward security, anonymity, and scalability. Moreover, the proposed protocol successfully provides resistance from replay attack, impersonation attack, location tracking attack, de-synchronization attack, denial of service attack, man-in-the-middle attack, cloning attack, and key-compromise attack. Results have revealed that the proposed protocol is efficient than the other related protocols as it takes less computational time and storage cost, especially for the tag, making it ideal to be used for RFID systems.

Numerical Analysis on Melting Phenomena and Phase Interface Change of Frozen Urea-aqueous Solution by Electric Heater (전기 히터 방식의 동결 우레아 해동 현상 및 상경계면 이동에 대한 수치해석)

  • Woo, Seongmin;Choi, Byungchul
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.22 no.5
    • /
    • pp.13-19
    • /
    • 2014
  • Urea-SCR system is the selective catalytic reduction to reduce nitrogen oxides ($NO_x$) emitted from diesel vehicles. The objective of this study is numerical analysis of 3-dimensional unsteady melting problems of frozen urea by using an electric heater. It can be applied to determine capacity of power with respect to time and the location of the urea suction pipe in urea storage tank. The study includes the change of liquid volume fraction, temperature profiles and a influence of natural convection by using the commercial software STAR-CCM+(v7.06). The accuracy of the numerical analysis is estimated by comparisons with experimental data. After validation, a numerical analysis for freezing urea is conducted with four different heating power. From the results, it was found that relation of velocity of phase interface and amount of melting urea by increasing heating power in a container. There is also a difference in trend between velocity of phase interface and amounts of melting urea because of effect of natural convection.

Spatio-Temporal Index Structure for Trajectory Queries of Moving Objects in Video (비디오에서 이동 객체의 궤적 검색을 위한 시공간 색인구조)

  • Lee, Nak-Gyu;Bok, Kyoung-Soo;Yoo, Jae-Soo;Cho, Ki-Hyung
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.69-82
    • /
    • 2004
  • A moving object has a special feature that it's spatial location, shape and size are changed as time goes. These changes of the object accompany the continuous movement that is called the trajectory. In this paper, we propose an index structure that users can retrieve the trajectory of a moving object with the access of a page. We also propose the multi-complex query that is a new query type for trajectory retrieval. In order to prove the excellence of our method, we compare and analyze the performance for query time and storage space through experiments in various environments. It is shown that our method outperforms the existing index structures when processing spatio-temporal trajectory queries on moving objects.

Autonomous hardware development for impedance-based structural health monitoring

  • Grisso, Benjamin L.;Inman, Daniel J.
    • Smart Structures and Systems
    • /
    • v.4 no.3
    • /
    • pp.305-318
    • /
    • 2008
  • The development of a digital signal processor based prototype is described in relation to continuing efforts for realizing a fully self-contained active sensor system utilizing impedance-based structural health monitoring. The impedance method utilizes a piezoelectric material bonded to the structure under observation to act as both an actuator and sensor. By monitoring the electrical impedance of the piezoelectric material, insights into the health of the structured can be inferred. The active sensing system detailed in this paper interrogates a structure utilizing a self-sensing actuator and a low cost impedance method. Here, all the data processing, storage, and analysis is performed at the sensor location. A wireless transmitter is used to communicate the current status of the structure. With this new low cost, field deployable impedance analyzer, reliance on traditional expensive, bulky, and power consuming impedance analyzers is no longer necessary. A complete power analysis of the prototype is performed to determine the validity of power harvesting being utilized for self-containment of the hardware. Experimental validation of the prototype on a representative structure is also performed and compared to traditional methods of damage detection.

Method of Profile Storage for Improving Accuracy and Searching Time on Ubiquitous Computing

  • Jang, Chang-Bok;Lee, Joon-Dong;Lee, Moo-Hun;Cho, Sung-Hoon;Choi, Eui-In
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1709-1718
    • /
    • 2006
  • Users are able to use the information and service more free than previous wire network due to development of wireless network and device. For this reason, various studies on ubiquitous networks have been conducted. Various contexts brought in this ubiquitous environment, have recognized user's action through sensors. This results in the provision of better services. Because services exist in various places in ubiquitous networks, the application has the time of services searching. In addition, user's context is very dynamic, so a method needs to be found to recommend services to user by context. Therefore, techniques for reducing the time of service and increasing accuracy of recommendation are being studied. But it is difficult to quickly and appropriately provide large numbers of services, because only basic context information is stored. For this reason, we suggest DUPS(Dimension User Profile System), which stores location, time, and frequency information of often used services. Because previous technique used to simple information for recommending service without predicting services which is going to use on future, we can provide better service, and improve accuracy over previous techniques.

  • PDF