• Title/Summary/Keyword: collision efficiency

Search Result 335, Processing Time 0.029 seconds

Characterization of membrane fouling and CEB (Chemical enhanced backwashing) efficiency with temperature in SMBR Process (MBR 공정에서 수온에 따른 막오염 및 CEB 세정효율 특성)

  • Park, Kitae;Park, Jeonghoon;Choi, Eunhye;Kim, Hyungsoo;Kim, Jihoon
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.31 no.5
    • /
    • pp.389-395
    • /
    • 2017
  • In this paper, we investigate the characteristics of membrane fouling caused by water temperature in the Membrane bioreactor(MBR) process and try to derive the membrane fouling control by chemical enhanced backwashing(CEB). The extracellular polymeric substances(EPS) concentration was analyzed according to the water temperature in the MBR, and the membrane fouling characteristics were investigated according to the conditions, with sludge & without sludge, through a lab-scale reactor. As shown in the existing literature the fouling resistance rate was increased within sludge with the water temperature was lowered. However, in the lab-scale test using the synthetic wastewater, the fouling resistance increased with the water temperature. This is because that the protein of the EPS was more easily adsorbed on the membrane surface due to the increase of entropy due to the structural rearrangement of the protein inside the protein as the water temperature increases. In order to control membrane fouling, we tried to derive the cleaning characteristics of CEB by using sodium hypochlorite(NaOCl). We selected the condition with the chemicals and the retention time, and the higher the water temperature and the chemical concentration are the higher the efficiencies. It is considered that the increasing temperature accelerated the chemical reaction such as protein peptide binding and hydrolysis, so that the attached proteinaceous structure was dissolved and the frequency of the reaction collision with the protein with the chemical agent becomes higher. These results suggest that the MBRs operation focus on the fouling control of cake layer on membrane surface in low temperatures. On the other hand, the higher the water temperature is the more the operation strategies of fouling control by soluble EPS adsorption are needed.

Backward Channel Protection Method For RFID Tag Security in the Randomized Tree Walking Algorithm (랜덤화된 트리워킹 알고리즘에서의 RFID 태그 보안을 위한 백워드 채널 보호 방식)

  • Choi Wonjoon;Roh Byeong-hee;Yoo S. W.;Oh Young Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.415-421
    • /
    • 2005
  • Passive RFID tag does not have its own power, so it has very poor computation abilities and it can deliver signals in very short range. From the facts, most RFID Tag security schemes assumed that the backward channel from tags to a reader is safe from eavesdropping. However, eavesdroppers near a tag can overhear message from a tag illegally. In this paper, we propose a method to protect the backward channel from eavesdropping by illegal readers. The proposed scheme can overcome the problems of conventional schemes such as randomized tree walking, which have been proposed to secure tag information in tree-walking algorithm as an anti-collision scheme for RFID tags. We showed the efficiency of our proposed method by using an analytical model, and it is also shown that the proposed method can provide the probability of eavesdropping in some standardized RFID tag system such as EPCglobal, ISO, uCode near to '0'.

Performance Analysis of Multiple Access Protocol for Maritime VHF Data Exchange System (VDES) (해상 초단파 대역 데이터 교환 시스템을 위한 다중 접속 방식의 성능 분석 연구)

  • Yun, Changho;Cho, A-Ra;Kim, Seung-Geun;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2839-2846
    • /
    • 2014
  • New VHF band for use in VDE is determined by WRC-12 due to the overload of AIS VDL, and the system characteristics of the VDE is recommended as ITU-R M. 1842-1. CS-TDMA, a multiple access method of AIS class B, is recommended as that of the VDE. It is inefficient for CS-TDMA just applying the report interval used in AIS class B to transmit high speed data with higher payload in the aspect of efficiency. In this paper, a simulation is executed in order to determine adequate report interval according to the number of active ships that affects directly network traffic. To this end, the performance of CS-TDMA, which includes the number of received packets, reception success rate, channel utilization, and collision rate, is investigated via a simulation.

IoT based Situation-specific Task Classification Algorithm (IoT 기반 상황 별 작업 분류 알고리즘)

  • Jeong, Dohyeong;Kim, Chuelhee;Lee, Jaeseung;Lee, Hyoungseon;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.613-614
    • /
    • 2017
  • Recently, research on the automation of home IoT has been carried out in which IoT (Internet of Things) is applied inside the home. However, the conventional IoT automation system has a problem that the operation of the device is limited only by the threshold value of the sensor, so that the device may collide and interfere with each other and the efficiency of the Task is low due to the malfunction of the device. In this paper, we propose a Situation-specific task classification algorithm to solve these problems. Using the sensor threshold and the current date as classification values in the decision tree, the task according to the internal situation of the home is classified and the corresponding device is selected and proceeded. Therefore, it is expected that the users will be provided with a service that changes flexibly according to changes in the internal situation of the home, and the accuracy of the operation will be increased by reducing the malfunction of the device and the collision between the devices.

  • PDF

QoS-Oriented Handoff Algorithm in IEEE 802.11 Wireless LAN (IEEE 802.11 무선랜에서 서비스 질(QoS) 지향적인 핸드오프 알고리즘에 관한 연구)

  • Choi Haeng-Keol;Kim Il-Hwan;Seo Seung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.338-348
    • /
    • 2005
  • Currently, IEEE 802.11 Wireless LAN (WLAN) is rising as the most popular means for the broadband wireless access network. In this thesis, we propose a QoS(Quality of Service)-Oriented mechanism using handshaking method of scanning phase in IEEE 802.11 handoff. In conventional process for handoff, the major criterion to select the best AP(Access Point) among candidates is normally based on the RSS(Received Signal Strength), which does not always make the selected network guarantee the maximum achievable performance. Even though the link quality with a neighboring AP is excellent, the AP may not be a good candidate to handoff to simply because MAC(Medium Access Control) protocol of IEEE 802.11 standard is contention-based such as CSMA/CA. Therefore, if we apply network level information to AP selection criteria, we can achieve better handoff efficiency rather than before. The analysis and simulation results applied to our new mechanism show clearly better performance than AP selection based on traditional handoff method.

Design of a 24 GHz Power Amplifier Using 65-nm CMOS Technology (65-nm CMOS 공정을 이용한 24 GHz 전력증폭기 설계)

  • Seo, Dong-In;Kim, Jun-Seong;Cui, Chenglin;Kim, Byung-Sung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.10
    • /
    • pp.941-944
    • /
    • 2016
  • This paper proposes 24 GHz power amplifier for automotive collision avoidance and surveillance short range radar using Samsung 65-nm CMOS process. The proposed circuit has a 2-stage differential power amplifier which includes common source structure and transformer for single to differential conversion, impedance matching, and power combining. The measurement results show 15.5 dB maximum voltage gain and 3.6 GHz 3 dB bandwidth. The measured maximum output power is 13.1 dBm, input $P1_{dB}$ is -4.72 dBm, output $P1_{dB}$ is 9.78 dBm, and maximum power efficiency is 17.7 %. The power amplifier consumes 74 mW DC power from 1.2 V supply voltage.

System Reliability Analysis of Rack Storage Facilities (물류보관 랙선반시설물의 시스템신뢰성 해석)

  • Ok, Seung-Yong;Kim, Dong-Seok
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.4
    • /
    • pp.116-122
    • /
    • 2014
  • This study proposes a system reliability analysis of rack storage facilities subjected to forklift colliding events. The proposed system reliability analysis consists of two steps: the first step is to identify dominant failure modes that most contribute to the failure of the whole rack facilities, and the second step is to evaluate the system failure probability. In the first step, dominant failure modes are identified by using a simulation-based selective searching technique where the contribution of a failure mode to the system failure is roughly estimated based on the distance from the origin in the space of the random variables. In the second step, the multi-scale system reliability method is used to compute the system reliability where the first-order reliability method (FORM) is initially used to evaluate the component failure probability (failure probability of one member), and then the probabilities of the identified failure modes and their statistical dependence are evaluated, which is called as the lower-scale reliability analysis. Since the system failure probability is comprised of the probabilities of the failure modes, a higher-scale reliability analysis is performed again based on the results of the lower-scale analyses, and the system failure probability is finally evaluated. The illustrative example demonstrates the results of the system reliability analysis of the rack storage facilities subjected to forklift impact loadings. The numerical efficiency and accuracy of the approach are compared with the Monte Carlo simulations. The results show that the proposed two-step approach is able to provide accurate reliability assessment as well as significant saving of computational time. The results of the identified failure modes additionally let us know the most-critical members and their failure sequence under the complicated configuration of the member connections.

Reaction Mechanism of Low Temperature NH3 SCR over MnOx/Sewage Sludge Char (MnOx/Sewage Sludge Char를 이용한 저온 NH3 SCR의 반응 메커니즘)

  • Cha, Jin-Sun;Park, Young-Kwon;Park, Sung Hoon;Jeon, Jong-Ki
    • Applied Chemistry for Engineering
    • /
    • v.22 no.3
    • /
    • pp.308-311
    • /
    • 2011
  • The reaction mechanism of selective catalytic reduction of NOx over sewage sludge char impregnated with MnOx using $NH_3$ as the reducing agent was investigated. The active Mn phase was shown to be $Mn_3O_4$ from the XRD analysis. Adsorption was the dominant NOx removal mechanism at low temperatures below $150^{\circ}C$ although reduction reaction also contributed partly to the NOx removal at $100{\sim}150^{\circ}C$. The reaction rate constants of NOx removal over non-impregnated and MnOx-impregnated active chars were compared based on experimental results. The MnOx-impregnated char was shown to have a higher reaction rate constant and a higher NOx removal efficiency due to a higher collision coefficient and a lower activation energy. The activation energy for both chars was shown to be relatively low (10~12 kJ/mol) under the experimental conditions of this study.

Message Authentication Code based on k-invertible Matrices (k-역행렬을 이용한 메시지 인증 기법)

  • Lee Hee Jung;Kim Tae Gwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.105-110
    • /
    • 2004
  • MAC is used for data origin authentication or message integrity protection. In Crypto'03 Cary and Venkatesan introduced new MAC based on unimodular matrix groups. It is to encrypt messages using private keys and to encrypt them again using public keys which are matrices whose determinants are $\pm$1. These matrices have property called k-invertible. This k effects on the collision probability of this new MAC. The smaller k is, the less collisions occur. Cary shows 6-invertible matrices, and 10-invertible matrices whose components are only 1, 0, -1. In this paper we figure out sufficient conditions about choosing 4 matrices among special 22 matrices. Also, we introduce 5-invertible matrices whose components are 1, 0, -1. Those have better efficiency and security.

A Random Access based on Pilot-Assisted Opportunistic Transmission for Cellular IoT Networks (셀룰라 IoT 네트워크를 위한 파일럿 지원 기회적 전송 기반 임의 접속 기법)

  • Kim, Taehoon;Chae, Seong Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1254-1260
    • /
    • 2019
  • Recently, 5G cellular systems have been attracted great attention as a key enabler for Industry 4.0. In this paper, we propose a novel random access based on pilot-assisted opportunistic transmission to support internet-of-things (IoT) scenario in cellular networks. A key feature of our proposed scheme is to enable each of IoT devices to attempt opportunistic transmission of its data packet in Step 3 with randomly selected uplink pilot signal. Both the opportunistic transmission and the pilot randomization in Step 3 are effective to significantly mitigate the occurrence of packet collisions. We mathematically analyze our proposed scheme in terms of packet collision probability and uplink resource efficiency. Through simulations, we verify the validity of our analysis and evaluate the performance of our proposed scheme. Numerical results show that our proposed scheme outperforms other competitive schemes.