• Title/Summary/Keyword: leakage point

Search Result 333, Processing Time 0.023 seconds

Simulation of Radiation Imaging based on the Scanning of Pin-hole Stereo Vision Sensors (핀홀 스테레오 비전 센서의 공간 스캔을 통한 방사선의 영상화 시뮬레이션)

  • Park, Soon-Yong;Baek, Seung-Hae;Choi, Chang-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1671-1680
    • /
    • 2014
  • There are always much concern about the leakage of radiation materials in the event of dismantle or unexpected accident of nuclear power plant. In order to remove the leakage of radiation materials, appropriate dispersion detection techniques for radiation materials are necessary. However, because direct handling of radiation materials is highly restricted and risky, developing radiation-related techniques needs computer simulation in advance to evaluate the feasibility. In this paper, we propose a radiation imaging technique which can acquire 3D dispersion information of radiation materials and tested by simulation. Using two virtual 1D radiation sensors, we obtain stereo radiation images and acquire the 3D depth to virtual radiation materials using stereo disparity. For point and plane type virtual radiation materials, the possibility of the acquisition of stereo radiation image and 3D information are simulated.

Effect of Scatter ray in Outside Telecobalt-60 Field Size (코발트-60 조사야 밖의 장기에 미치는 2차선의 영향)

  • Kim, You-Hyun;Kim, Young-Whan
    • Journal of radiological science and technology
    • /
    • v.11 no.2
    • /
    • pp.65-71
    • /
    • 1988
  • Radiation dose outside the radiotherapy treatment field can be significant and therefore is of clinical interest estimating organ dose. We have made measurements of dose at distances up to 70 cm from the central axis of $5{\times}5$, $10{\times}10$, $15{\times}15$, and $25{\times}25$ cm radiation fields of Co-60 ${\gamma}-ray$, at 5 cm depth in water. Contributions to the total secondary radiation dose from water scatter, machine (collimator) scatter and leakage radiation have been seperated. We have found that the component of dose from water scatter can be described by simple exponential function of distance from the central axis of the radiation field for all field sizes. Machine scatter contributes 20 to 60% of the total secondary dose depending on field size and distance from the field. Leakage radiation contributes very little dose, but becomes the dominant componant at distance beyond 40 cm from the central axis. Then, wedges can cause a factor 2 to 3 increase in dose at any point outside the field compared with the dose when no wedge is used. Adding blocks to a treatment field can cause an increase in dose at points outside the field, but the effect is much smaller than the effect of a wedge. From the results of these measurements, doses to selected organs outside the field for specified treatment geometries were estimated, and the potential for reducing these organ doses by additional shielding was assessed.

  • PDF

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

Dispersion Model of Initial Consequence Analysis for Instantaneous Chemical Release (순간적인 화학물질 누출에 따른 초기 피해영향 범위 산정을 위한 분산모델 연구)

  • Son, Tai Eun;Lee, Eui Ju
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.2
    • /
    • pp.1-9
    • /
    • 2022
  • Most factories deal with toxic or flammable chemicals in their industrial processes. These hazardous substances pose a risk of leakage due to accidents, such as fire and explosion. In the event of chemical release, massive casualties and property damage can result; hence, quantitative risk prediction and assessment are necessary. Several methods are available for evaluating chemical dispersion in the atmosphere, and most analyses are considered neutral in dispersion models and under far-field wind condition. The foregoing assumption renders a model valid only after a considerable time has elapsed from the moment chemicals are released or dispersed from a source. Hence, an initial dispersion model is required to assess risk quantitatively and predict the extent of damage because the most dangerous locations are those near a leak source. In this study, the dispersion model for initial consequence analysis was developed with three-dimensional unsteady advective diffusion equation. In this expression, instantaneous leakage is assumed as a puff, and wind velocity is considered as a coordinate transform in the solution. To minimize the buoyant force, ethane is used as leaked fuel, and two different diffusion coefficients are introduced. The calculated concentration field with a molecular diffusion coefficient shows a moving circular iso-line in the horizontal plane. The maximum concentration decreases as time progresses and distance increases. In the case of using a coefficient for turbulent diffusion, the dispersion along the wind velocity direction is enhanced, and an elliptic iso-contour line is found. The result yielded by a widely used commercial program, ALOHA, was compared with the end point of the lower explosion limit. In the future, we plan to build a more accurate and general initial risk assessment model by considering the turbulence diffusion and buoyancy effect on dispersion.

Fabrication of IMT-2000 Linear Power Amplifier using Current Control Adaptation Method in Signal Cancelling Loop (신호 제거 궤환부의 전류 제어 적응형 알고리즘을 이용한 IMT-2000용 선형화 증폭기 제작)

  • 오인열;이창희;정기혁;조진용;라극한
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.1
    • /
    • pp.24-36
    • /
    • 2003
  • The digital mobile communication will be developed till getting multimedia service in anyone, any where, any time. Theses requiring items are going to be come true via IMT-2000 system. Transmitting signal bandwidth of IMT-2000 system is 3 times as large as IS-95 system. That is mean peak to average of signal is higher than IS-95A system. So we have to design it carefully not to effect in adjacent channel. HPA(High Power Amplifier) located in the end point of system is operated in 1-㏈ compression point(Pl㏈), then it generates 3rd and 5th inter modulation signals. Theses signals affect at adjacent channel and RF signal is distorted by compressed signal which is operated near by Pl㏈ point. Then the most important design factor is how we make HPA having high linearity. Feedback, Pre-distorter and Feed-forward methods are presented to solve theses problems. Feed-forward of these methods is having excellent improving capacity, but composed with complex structure. Generally, Linearity and Efficiency in power amplifier operate in the contrary, then it is difficult for us to find optimal operating point. In this paper we applied algorithm which searches optimal point of linear characteristics, which is key in Power Amplifier, using minimum current point of error amplifier in 1st loop. And we made 2nd loop compose with new structure. We confirmed fabricated LPA is operated by having high linearity and minimum current condition with ACPR of -26 ㏈m max. @ 30㎑ BW in 3.515㎒ and ACLR of 48 ㏈c max@${\pm}$㎒ from 1W to 40W.

High Efficiency GaN HEMT Power Amplifier Using Harmonic Matching Technique (고조파 정합 기법을 이용한 고효율 GaN HEMT 전력 증폭기)

  • Jin, Tae-Hoon;Kwon, Tae-Yeop;Jeong, Jinho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.1
    • /
    • pp.53-61
    • /
    • 2014
  • In this paper, we present the design, fabrication and measurement of high efficiency GaN HEMT power amplifier using harmonic matching technique. In order to achieve high efficiency, harmonic load-pull simulation is performed, that is, the optimum load impedances are determined at $2^{nd}$ and $3^{rd}$ harmonic frequencies as well as at the fundamental. Then, the output matching circuit is designed based on harmonic load-pull simulation. The measurement of the fabricated power amplifier shows the linear gain of 20 dB and $P_{1dB}$(1 dB gain compression point) of 33.7 dBm at 1.85 GHz. The maximum power added efficiency(PAE) of 80.9 % is achieved at the output power of 38.6 dBm, which belongs to best efficiency performance among the reported high efficiency power amplifiers. For W-CDMA input signal, the power amplifier shows a PAE of 27.8 % at the average output power of 28.4 dBm, where an ACLR (Adjacent Channel Leakage Ratio) is measured to be -38.8 dBc. Digital predistortion using polynomial fitting was implemented to linearize the power amplifiers, which allowed about 6.2 dB improvement of an ACLR performance.

EFFECTS OF CONDENSATION TECHNIQUES AND CANAL SIZES ON THE MICROLEAKAGE OF ORTHOGRADE MTA APICAL PLUG IN SIMULATED CANALS (모조 근관의 크기와 충전 방법이 orthograde MTA apical plug의 미세누출에 미치는 영향)

  • Nam, Deuk-Lim;Park, Jeong-Kil;Hur, Bock;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.34 no.3
    • /
    • pp.208-214
    • /
    • 2009
  • The purpose of this study was to compare the dye leakage of MTA (mineral trioxide aggregate) apical plug produced by two orthograde placement techniques (hand condensation technique and ultrasonically assisted hand condensation technique). To simulate straight canal, 60 transparent acrylic blocks with straight canal were fabricated. These transparent acrylic blocks were divided into 2 groups (Group C; hand condensation technique (HC) and Group U; ultrasonically assisted hand condensation technique (UAHC)) of 30 blocks with each MTA application method. Each group was divided into 2 subgroups (n=15) with different canal size of #70 (subgroup C70 and subgroup U70) and #120 (subgroup C120 and subgroup U120). After apical plug was created, a wet paper point was placed over the MTA plug and specimen was kept in a humid condition at room temperature to allow MTA to set. After 24 hours, remaining canal space was backfilled using Obtura II. All specimens were transferred to floral form socked by 0.2% rhodamine B solution and stored in 100% humidity at room temperature. After 48 hours, resin block specimens were washed and scanned using a scanner. The maximum length of micro leakage was measured from the scanned images of four surfaces of each resin block using Photoshop 6.0. Statistical analysis was performed with Mann-Whitney U test. Group U of UAHC had significantly lower leakage than Group C of HC in #70-size canal (subgroup U70) (p<0.05).

BACTERIOLOGIC IN VITRO CORONAL LEAKAGE STUDY OF BEFORE AND AFTER POST SPACE PREPARATION (Streptococcus mutans를 이용한 근관 치료 후 포스트 와동 형성 전후의 치관부 누출에 관한 연구)

  • Lee, Hyo-An;Kim, Eui-Seong
    • Restorative Dentistry and Endodontics
    • /
    • v.30 no.1
    • /
    • pp.16-21
    • /
    • 2005
  • The purpose of present study was to compare the speed of coronal leakage before and after post space preparation using Streptococcus mutans. Forty straight extracted human teeth were selected. The crowns were removed to a uniform remaining root length 14 mm. Canals were enlarged by 06 taper $Profiles^{(R)}$ to a size $\#40$ as a master apical file. And these were filled with gutta percha point and $Tubuliseal^{(R)}$ sealer, using continuous wave technique. Groupings are as follows. Group 1 - These teeth were obturated without sealer. Group 2 - These teeth were obturated and covered the surface of the root completely with sticky wax. Group 3 - These teeth were obturated. Group 4 - These teeth were obturated and prepared for post space remaining 5 mm of gutta percha. The teeth were suspended in plastic tubes. The upper chamber received the bacterial suspension everyday to simulate clinical situation. The lower chamber consisted of BHI added Andrade's indicator. All roots in the positive control group (Group 1) turned yellow within 24 h and those of negative control group (Group 2) remained red throughout the experimental period (70 days) The samples of group 3 were contaminated within an average of 27.2 days. The samples of group 4 were contaminated within an average of 15.7 days, ranging from 9 to 22 days. There was significant difference between group 3 and group 4 statistically (p < 0.05).

(A Study on the Annealing Methods for the Formation of Shallow Junctions) (박막 접합 형성을 위한 열처리 방법에 관한 연구)

  • 한명석;김재영;이충근;홍신남
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.1
    • /
    • pp.31-36
    • /
    • 2002
  • Low energy boron ions were implanted into the preamorphized and crystalline silicon substrates to form 0.2${\mu}m$ $p^+-n$ junctions. The rapid thermal annealing(RTA) was used to annihilate the crystal defects due to implantation and to activate the implanted boron ions, and the furnace annealing was employed to reflow the BPSG(bolo-phosphosilicate glass). The implantation conditions for Gepreamorphization were the energy of 45keV and the dose of 3$\times$1014cm-2. BF2 ions employed as a p-type dopant were implanted with the energy of 20keV and the dose of 2$\times$1015cm-2. The thermal conditions of RTA and furnace annealing were $1000^{\circ}C$/10sec and $850^{\circ}C$/40min, respectively. The junction depths were measured by SIMS and ASR techniques, and the 4-point probe was used to measure the sheet resistances. The electrical characteristics were analyzed via the leakage currents of the fabricated diodes. The single thermal processing with RTA produced shallow junctions of good qualities, and the thermal treatment sequence of furnace anneal and RTA yielded better junction characteristics than that of RTA and furnace anneal.

Implementing a Dedicated WIPS Sensor Using Raspberry Pi (라즈베리파이를 이용한 전용 WIPS 센서 구현)

  • Yun, Kwang-Wook;Choi, Suck-Hwan;An, Sang-Un;Kim, Jeong-Goo;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.397-407
    • /
    • 2017
  • Wireless networks make the users' work more convenient and efficient, but such networks can impair the availability of network resources and can cause leakage of important corporate information when there are security threats. In particular, damage has increased because of security attacks that take advantage of the vulnerabilities created by a wireless AP (Access Point). Public organizations and companies have gradually selected the WIPS (Wireless Intrusion Prevention System) to block wireless security threats and protect the internal network. However, it is very costly for other organizations and companies to introduce the WIPS solution. This paper proposes implementing a WIPS Sensor by using Raspberry Pi to reduce these costs and to block the various wireless LAN security threats. This implementation would protect corporate information and provide consistent services at a relatively reasonable price.