• Title/Summary/Keyword: discard

Search Result 201, Processing Time 0.023 seconds

Recycling of Sludgewater containing Set-retarder (지연제 첨가에 의한 회수수의 재이용)

  • Song, Young-Jin;Daiki, Atarashi
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2008.11a
    • /
    • pp.761-764
    • /
    • 2008
  • Most of ready-mixed concrete plants have the problem of construction waste sludge, which pollutes environment and causes economic loss due to the discard and increasing the cost of concrete. Thus, a recycling of the cement sludge has been strongly desired as one of their solution. This research is to the study on the recycling of the cement sludge, especially the study on the hydration control by the sodium gluconate as a set-retarder. The set-retarder can delay the hydration of the cement included in the sludge water, so that the sludge water can be substituted with some of new cement without the property of the cement. And it invests the effect of the sodium gluconate to the hydration of the cement in suspension. The degree of hydration of cement may be controlled by adding the sodium gliconate. The hydration delay time is observed that depends on the concentration of residual sodium gloconate, not how long the cement has been hydrated before the addition of the sodium gluconate.

  • PDF

A Performance Analysis of the MAC Protocol Considering the Cell Structures and the QOS in Wireless ATM Networks (무선 ATM 망에서 셀 구조 및 QOS를 고려한 매체 접근 제어 프로토콜의 성능 분석)

  • 안계현;박혁규;이동은;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.8A
    • /
    • pp.1195-1207
    • /
    • 1999
  • Wireless channel has high error rate and limited bandwidth. In order to guarantee the quality of service for multimedia through wireless channel, wireless ATM network requires the cell structure with error control schemes and an efficient medium access control protocol. In this paprt, an efficient medium access control protocol, which is considered of cell structure and the QOS, is proposed for wireless ATM networks. Many kinds of ATM cell structures are analyzed in terms of cell error rate and cell loss rate to choose the proper cell structures for this proposed MAC protocol. And a bandwidth allocation algorithm is also designed to satisfy the priority of services. The performance of proposed MAC protocol are evaluated in terms of channel utilization, call blocking and packet discard probability accotding to different kinds of cell structure through simulation.

  • PDF

A Study on Design and Implementation of a VC-Merge Capable LSR on MPLS over ATM (ATM기반 MPLS망에서 확장성을 고려한 VC-Merge 가능한 LSR 설계에 관한 연구)

  • Kim, Young-Chul;Lee, Tae-Won;Lee, Dong-Won;Choi, Deok-Jae;Lee, Guee-Sang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.12
    • /
    • pp.29-38
    • /
    • 2001
  • Recently, as Internet and its services grow rapidly, IETF(Internet Engineering Task Force) introduced a new switching mechanism, MPLS(Multi-Protocol Label Switching), to solve the problem of the scalability in Internet backbone. In this paper, we implemented the LSR loaded with VC-merging function, which causes LSR's management cost to be significantly reduced. We propose a new VC-merge function which supports differentiated services. In case of network congestion in the output buffer of each core LSR, appling link polices to the output modules of the LSR using the EPD algorithm can prevent the buffer from being overflowed. Simulation was performed for Diffserv by using multiple traffic models and investigated the impact of VC-merge method compared to non VC-merge method. The proposed switch is modeled in VHDL and fabricated using the SAMSUNG $0.5{\mu}m$ SOG process.

  • PDF

Examination of the effect on the surrounding marine environment by disposing of a squid by-product (오징어 가공 부산물의 해양투기에 따르는 주변해양환경의 영향에 대한 검토)

  • Hwang, Bo-Kyu;Shin, Hyeon-Ok;Kim, Min-Son;Kang, Kyoung-Mi;Nam, Taek-Jeong
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.47 no.1
    • /
    • pp.27-36
    • /
    • 2011
  • Squid by-product like viscera has just been recognized as one of the serious pollutants on the surrounding marine environment in Ulleung island of Korea. The effect as a marine pollutant, however, has not been examined and evaluated properly. It was carried out the comprehensive examination of the marine pollution by disposing squid by-products. The sediments and water qualities were investigated in several positions, including the dumping position around Ulleung island. It is also estimated a spreading of by-product in terms of estimating the sinking speed and evaluating the attracting characteristics as a feed. As a result, There were no significant pollutions of the sediment and water quality. The spreading of by-product by the local current was 2-2.5 times of the depth, and it will become longer in spring tide. It was confirmed that the squid by-product has attracting ability for local fish by acoustical survey. Furthermore, it can be useful for the local fish species as feeds.

Characteristics on bycatch in Korean tuna purse seine fishery associated with FAD in the Indian Ocean by scientific observer programs (과학옵서버 조사에 의한 인도양 수역 한국 다랑어 선망선 FAD 조업의 부수어획실태)

  • LEE, Sung Il;KIM, Doo Nam;LEE, Kyounghoon
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.56 no.4
    • /
    • pp.277-291
    • /
    • 2020
  • In order to understand characteristics on bycatch of Korean tuna purse seine fishery, especially operations associated with Fish Aggregating Device (FAD) in the Indian Ocean, we conducted analyses related to bycatch by school association type (unassociated school, FAD associated school and log associated school) using the data collected by scientific observers from 2016 to 2018. The FAD used by Korean tuna purse seine fishery in the Indian Ocean was a drifting FAD, which belongs to non-entangling FADs according to the category proposed by the International Seafood Sustainability Foundation (ISSF). The target species of Korean tuna purse seine fishery are skipjack, yellowfin and bigeye tunas, accounting for 99% of the total catch. The ratio of bycatch was 0.97% in total catch and the discard accounted for less than 1%, indicating that most catch was retained on board. In terms of bycatch ratio by school association type, it accounted for 0.12% for unassociated school, 1.09% for FAD associated school and 1.25% for log associated school. As for the catch proportion of shark species by school association type, it accounted for 0.01% for unassociated school, 0.11% for FAD associated school and 0.10% for log associated school, which showed that unassociated school type was the lowest to affect bycatch of non-target and shark species. Given the proportion of bycatch compositions, however, it is considered that FAD associated school of Korean tuna purse seine fishery has less caught bycatch species of non-target and shark, compared to other fleets operating in the Indian Ocean.

A Study on Attack Detection Technique based on n-hop Node Certification in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 n-hop 노드 인증 기반 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.3-8
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

OSL Age Determination of the Hearths in a Bronze Age Dwelling Site by using Bayesian Statistics (베이지안 통계학을 이용한 청동기시대 주거지내 화덕자리들의 광자극발광(OSL) 연대 결정)

  • Kim, Myung-Jin;Yang, Hye-Jin;Hong, Duk-Geun
    • Journal of Radiation Protection and Research
    • /
    • v.36 no.2
    • /
    • pp.52-58
    • /
    • 2011
  • OSL dating for three hearths having the sequence of use and discard in No. 29 and 29-1 dwelling sites at Sogol cultural site was carried out. Resulting from the deconvolution of natural CW-OSL decay curve and thermal zeroing test, it was turned out that OSL signal was entirely composed of the heat- and light-sensitive fast component with high photoionization cross-section and all quartz OSL signals were thermally bleached under $300^{\circ}C$ which is the minimum temperature related to heating and cooking in Bronze age. After dose recovery test and plateau test, paleodose of each hearth sample was evaluated by using SAR method, and OSL age was determined from the ratio of paleodose to annual dose rate. For the purpose of the precision improvement of OSL age, Bayesian statistics was applied to each hearth's age and the archaeological sequence information. Finally, it could be concluded to the accurate use period of each hearth from the resultant OSL ages.

A study to identify an occupational hazards for hospital working health care providers from needle stick injury as an occupational hazards of health care providers in hospital and prevention (의료요원의 주사바늘 상해 실태와 예방대책을 위한 일 연구)

  • Han, Jung-Suk;Kang, Kyu-Sook;Kim, Hea-Sook
    • The Korean Nurse
    • /
    • v.34 no.2
    • /
    • pp.45-57
    • /
    • 1995
  • A study .to identify an occupational hazards for hospital working health care providers from needle stick injury as an occupational hazards of health care providers in hospital and prevention A survey of 2430 health professionals (2184 nurses, 182 doctors, and 64 Lab technicians) was conducted to describe and provide information about 1) the experience of needle stick. 2) the number of needle stick, 3) the treatment after needle stick. 3) the situation of needle stick, 4) the report of needle stick, 5) the cause of needle stick, 6) the discard method of used needles, and 7) how to worry about getting infection disease after needle stick. Data were collected using questionnarires constructed by the authors and tested by a pilot study. Results of the study showed that 96.7% of the sample had an experience of needle stick (96.8% of the nurses, 96.7% of the doctors, and 92.2% of Lab technicians). Seventy seven percent of the sample experienced less than 10 needle sticks, 19% of the sample experienced 11 to 20 needle sticks, and the rest of the sample experienced more than 20 needle sticks. The situations where needle sticks occurred include intrvenous injection (36.5%), intramuscular injection (21.6%), blood withdraw (17.8%), and preparation(11.8%). The study showed that needle sticks (67.5%) usually occurred after client treatment. Health professionals used recapping method (55%) after they used needles. Needle sticks were predominantly caused by the carelessness of health professionals (61%), After needle sticks, 88.2% of the sample subjects treated needle sticks using disinfection technique by themselves. Most of health professionals (92.6%) did not report the accident. and 95.6% of them did not receive any test or further treatment. After needle sticks, 87.8% of nurses, 83.6% of doctors, and 96.6% of lab technicians worried about hepatitis infection. 'Health professionals also worried about AIDS infection, tetanus, venereal infection, and skin injury. These findings suggest that health professionals are at high-risk of needle stick and fail to report needle stick accidents. They should pay more attention to needle stick in order to avoid unwanted infection.

  • PDF

Sigma Hub for Efficiently Integrating USB Storages (USB 저장장치의 효율적인 통합을 위한 시그마 허브)

  • Choi, O-Hoon;Lim, Jung-Eun;Na, Hong-Seok;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.35 no.6
    • /
    • pp.533-543
    • /
    • 2008
  • With technological advances for storage volume size of a semiconductor memory, USB storage is made as products to support a high capacity storage. Hereby, consumers discard pint-sized USB storages which they already had, or do not use them efficiently. To integrate and unify these pint-sized USB storages as one big USB storage, we proposed Sigma Hub. It can be grouping multiple USB storages, which have each different volume size of memory storage, as logical unity Storage through USB Hub. The proposed Sigma Hub includes Sigma Controller as a core management module to unify the multiple USB storages in transaction level layer. Sigma controller can efficiently control transaction packet in Sigma Hub through a USB Storage-Integration algorithms which ensure an integrity for data read and write processes. Consequently, Sigma Hub enables the use of USB storage that is logical unity.