• Title/Summary/Keyword: energy simulation

Search Result 8,092, Processing Time 0.041 seconds

A Case Study of Different Configurations for the Performance Analysis of Solid Oxide Fuel Cells with External Reformers (외부 개질형 평판형 고체 산화물 연료전지 시스템 구성법에 따른 효율특성)

  • Lee, Kang-Hun;Woo, Hyun-Tak;Lee, Sang-Min;Lee, Young-Duk;Kang, Sang-Gyu;Ahn, Kook-Young;Yu, Sang-Seok
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.36 no.3
    • /
    • pp.343-350
    • /
    • 2012
  • A planar solid oxide fuel cell (PSOFC) is studied in its application in a high-temperature stationary power plant. Even though PSOFCs with external reformers are designed for application from the distributed power source to the central power plant, such PSOFCs may sacrifice more system efficiency than internally reformed SOFCs. In this study, modeling of the PSOFC with an external reformer was developed to analyze the feasibility of thermal energy utilization for the external reformer. The PSOFC system model includes the stack, reformer, burner, heat exchanger, blower, pump, PID controller, 3-way valve, reactor, mixer, and steam separator. The model was developed under the Matlab/Simulink environment with Thermolib$^{(R)}$ modules. The model was used to study the system performance according to its configuration. Three configurations of the SOFC system were selected for the comparison of the system performance. The system configuration considered the cathode recirculation, thermal sources for the external reformer, heat-up of operating gases, and condensate anode off-gas for the enhancement of the fuel concentration. The simulation results show that the magnitude of the electric efficiency of the PSOFC system for Case 2 is 12.13% higher than that for Case 1 (reference case), and the thermal efficiency of the PSOFC system for Case 3 is 76.12%, which is the highest of all the cases investigated.

Analysis of Capillary Flow in Open-Top Rectangular Microchannel (상판이 없는 직사각형 단면의 미세채널에서 모세관 유동 분석)

  • Park, Eun-Jung;Cho, Ji-Yong;Kim, Jeong-Chul;Hur, Dae-Sung;Chung, Chan-Il;Kim, Jung-Kyung
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.34 no.1
    • /
    • pp.77-82
    • /
    • 2010
  • Our study aims to understand the flow of liquid in an open-top rectangular microchannel that can be used in micro total analysis systems ($\mu$-TAS) because it has advantages in terms of light transmission and energy efficiency. We measured the liquid velocity using particle tracking technique and conducted a simulation with computational fluid dynamics by altering the area of channel cross section and channel length for the capillary-driven flow in the open-top rectangular microchannel. When liquid water drops to an entrance of the fabricated microchannel with a height of 20 μm and a width of 20 ${\mu}m$, it flows along the microchannel by only capillary force. In the wetting behavior of the liquid, important parameters of this flow are channel size, contact angle and liquid properties such as surface tension and viscosity, which are used to control the flow of liquid in the microchannel.

Health and environmental risk assesment of air pollutants in Gyeongju and its vicinities(I) (경주 주변지역 대기오염물질의 보건.환경 위해성 평가(I))

  • Jung, Jong-Hyeon;Choi, Won-Joon;Leem, Heon-Ho;Park, Tong-So;Shon, Byung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3740-3747
    • /
    • 2009
  • To protect the citizens' health of Gyeongju and to secure basic data for the assessment of health and environmental risk, distribution characteristics of meteorological elements were investigated and numerical simulation of wind field using RAMS model was carried out. In addition, measurement and analysis of air pollutants, forecasting the behavior air pollutants using ISC-AEROMOD view, and health and environmental risk-influenced zones were defined through managing air polluting materials to prevent health damage and property damage. According to the survey results of air pollution in Gyeongju and surroundings, average annual concentration of air pollutants in Gyeongju was slightly lower than that in Pohang and Ulsan areas, but concentration of particulate matters and nitrogen dioxide at Gyeongju Station Square and Yonggang Crossing were sometimes higher than that in Pohang and Ulsan areas. Results of the modeling of moving and diffusion of air pollutants that affect citizens' health showed that parts of the 1st through 4th industrial complexes together with POSCO were included in particulate matters and sulfur dioxide influenced areas in Pohang Steel Complex area, and that Haedo-dong, Sangdae-dong, Jecheol-dong and Jangheung-dong in Pohangnam-gu represented locally worsened air quality due to a quantity of air pollutant emission from dense steel industries and large scale industrial facilities.

A Sludge Collector Selection Model by Life Cycle Cost Analysis (LCC분석에 의한 슬러지수집기 선정 모델)

  • Lee, Seung-Hoon;Woo, Yu-Mi;Lee, Sung-Rak;Koo, Kyo-Jin;Hyun, Chang-Taek;Hong, Tae-Hoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.6
    • /
    • pp.175-184
    • /
    • 2006
  • This study focused on developing Life Cycle Cost(LCC) analysis model for selecting sludge collectors in wastewater treatment system and applying the model to a case study. Cost items are examined through literature review and historical data of a facility. Analysis period, discount rate, energy cost escalation ratio are assumed to reasonable level. Monetary evaluation is performed using historical data and estimations from vendors. Sensitive analysis is executed using Monte Carlo Simulation for assumed factors. Interviews with operators, vendors, constructors, managers are conducted to define factors which indicates ease of maintenance, ease of delivery, technical performance, efficiency, environmental friendship. Factors are representing technical and social factors. Results from LCC analysis and qualitative analysis are evaluate together with Weighted Matrix Evaluation Methods for optimum alternative of sludge collectors.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

A Study on Enhancement Method of Hosting Capacity for PV System Based on Primary Feeder Reconfiguration (배전선로 절체에 의한 태양광전원의 수용성 향상방안에 관한 연구)

  • Lee, Myung-Geun;Lee, Hu-Dong;Ferreira, Marito;Park, Ji-Hyun;Tae, Dong-Hyun;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.239-249
    • /
    • 2019
  • Recently, the Korean government has implemented a policy to expand renewable energy sources. Large-scale PV systems are being actively interconnected with the distribution system. On the other hand, when a large-scale PV system is installed and operated, the customer voltages could violate the allowable voltage limit due to reverse power flow of the PV system. To overcome these problems, an enhancement method for hosting the capacity of the PV system in a distribution system is being actively conducted. Therefore, to improve the hosting capacity of the PV system, this paper proposes a model of a reconfiguration of the distribution system, which is composed of three sections and three connections based on PSCAD/EMTDC S/W, and proposes an evaluation algorithm for the feeder reconfiguration to maximize an adaption of the PV system. In addition, this paper presents the optimal method of the feeder reconfiguration section to evaluate the maximum capacity of the PV system to keep customer voltages within the allowable voltage limits based on various operation scenarios, such as the capacity of a PV system and section of feeder reconfiguration. From the simulation results based on the PSCAD/EMTDC modeling and evaluation algorithm, it was confirmed that they are a useful and practical tool to enhance hosting the capacity of a PV system in a distribution system.

Mutual Authentication Mechanism for Secure Group Communications in Sensor Network (센서 네트워크에서의 안전한 그룹통신을 위한 상호 인증 기법)

  • Ko, Hye-Young;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.441-450
    • /
    • 2010
  • Recently, a lot of interest is increased in sensor network which gathers various data through many sensor nodes deployed in wired and wireless network environment. However, because of the limitation in memory, computation, and energy of the sensor nodes, security problem is very important issue. In sensor network, not only the security problem, but also computing power should be seriously considered. In this paper, considering these characteristics, we make the sensor network consist of normal sensor nodes and clusterheaders with enough space and computing power, and propose a group key rekeying scheme adopting PCGR(Predistribution and local Collaborationbased Group Rekeying) for secure group communication. In our proposal, we enhance the security by minimizing the risk to safety of the entire network through verifying the new key value from clusterheader by sensor nodes. That is, to update the group keys, clusterheaders confirm sensor nodes through verifying the information from sensor nodes and send the new group keys back to authentic member nodes. The group keys sent back by the clusterheaders are verified again by sensor nodes. Through this mutual authentication, we can check if clusterheaders are compromised or not. Qualnet simulation result shows that our scheme not only guarantees secure group key rekeying but also decreasesstorage and communication overhead.

A Multi-objective Ant Colony Optimization Algorithm for Real Time Intrusion Detection Routing in Sensor Network (센서 네트워크에서 실시간 침입탐지 라우팅을 위한 다목적 개미 군집 최적화 알고리즘)

  • Kang, Seung-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.191-198
    • /
    • 2013
  • It is required to transmit data through shorter path between sensor and base node for real time intrusion detection in wireless sensor networks (WSN) with a mobile base node. Because minimum Wiener index spanning tree (MWST) based routing approach guarantees lower average hop count than that of minimum spanning tree (MST) based routing method in WSN, it is known that MWST based routing is appropriate for real time intrusion detection. However, the minimum Wiener index spanning tree problem which aims to find a spanning tree which has the minimum Wiener index from a given weighted graph was proved to be a NP-hard. And owing to its high dependency on certain nodes, minimum Wiener index tree based routing method has a shorter network lifetime than that of minimum spanning tree based routing method. In this paper, we propose a multi-objective ant colony optimization algorithm to tackle these problems, so that it can be used to detect intrusion in real time in wireless sensor networks with a mobile base node. And we compare the results of our proposed method with MST based routing and MWST based routing in respect to average hop count, network energy consumption and network lifetime by simulation.

Icing Wind Tunnel Tests to Improve the Surface Roughness Model for Icing Simulations (착빙 해석의 표면 거칠기 모델 개선을 위한 착빙 풍동시험 연구)

  • Son, Chankyu;Min, Seungin;Kim, Taeseong;Kim, Sun-Tae;Yee, Kwanjung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.8
    • /
    • pp.611-620
    • /
    • 2018
  • For the past decades, the analytic model for distributed surface roughness has been developed to improve the accuracy of the icing simulation code. However, it remains limitations to validate the developed model and determine the empirical parameters due to the absence of the quantitative experimental data which were focused on the surface state. To this end, the experimental study conducted to analyze the ice covered surface state from a micro-perspective. Above all, the tendency of the smooth zone width which occurs near the stagnation point has been quantitatively analyzed. It is observed that the smooth zone width is increased as growing the ambient temperature and freestream velocity. Next, the characteristics of the ice covered surface under rime and glaze ice have been analyzed. For rime ice conditions, ice elements are developed as the opaque circular corn in the opposite direction of freestream. The height and interval of each circular corn are increased as rising the ambient temperature. For glaze ice conditions, numerous lumps of translucent ice can be observed. This is because the beads formed by gravity concentrate and froze on the lower surface.

Hardware Architecture of High Performance Cipher for Security of Digital Hologram (디지털 홀로그램의 보안을 위한 고성능 암호화기의 하드웨어 구조)

  • Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.374-387
    • /
    • 2012
  • In this paper, we implement a new hardware for finding the significant coefficients of a digital hologram and ciphering them using discrete wavelet packet transform (DWPT). Discrete wavelet transform (DWT) and packetization of subbands is used, and the adopted ciphering technique can encrypt the subbands with various robustness based on the level of the wavelet transform and the threshold of subband energy. The hologram encryption consists of two parts; the first is to process DWPT, and the second is to encrypt the coefficients. We propose a lifting based hardware architecture for fast DWPT and block ciphering system with multi-mode for the various types of encryption. The unit cell which calculates the repeated arithmetic with the same structure is proposed and then it is expanded to the lifting kernel hardware. The block ciphering system is configured with three block cipher, AES, SEED and 3DES and encrypt and decrypt data with minimal latency time(minimum 128 clocks, maximum 256 clock) in real time. The information of a digital hologram can be hided by encrypting 0.032% data of all. The implemented hardware used about 200K gates in $0.25{\mu}m$ CMOS library and was stably operated with 165MHz clock frequency in timing simulation.