Abstract: Design of membership function ranges in fuzzy logic control (FLC) is presented for robust control of a variable speed refrigeration system (VSRS). The criterion values of the membership function ranges can be carried out from the static experimental data, and two different values are offered to compare control performance. Some simulations and real experiments for the VSRS were conducted to verify the validity of the designed membership functions. The experimental results showed good agreement with the simulation results, and the error change rate and its sampling time strongly affected the control performance at transient state of the VSRS.
Abstract: The commercial nuclear power reactor in South Korea, Kori Unit 1, which was a 587 MWe pressurized water reactor that started operation since 1978, was permanently shut down in June 2017 without an additional operating license extension. The Kori 1 Unit is scheduled to become the nuclear power unit to enter the decommissioning phase. In this study, the preliminary evaluation of the decommissioning wastes for the Kori Unit 1 was performed based on the following series of process: firstly, the plant inventory is investigated based on various documents (i.e., equipment/ component list, construction records, general arrangement drawings). Secondly, the radiological conditions of systems, structures and components (SSCs) are established to estimate the amount of radioactive waste by waste classification. Third, the waste management strategies for Kori Unit 1 including waste packaging are established. Forth, selection of the proper decontamination and dismantling (D&D) technologies is made considering the various factors. Finally, the amount of decommissioning waste by classification for Kori 1 is estimated using the DeCAT program, which was developed by KEPCO-E&C for a decommissioning cost estimation. The preliminary evaluation results have shown that the expected amounts of decommissioning wastes were less than about 2% and 8% of the total wastes generated (i.e., sum of clean wastes and radwastes) before/after waste processing, respectively, and it was found that the majority of contaminated material was carbon or alloy steel and stainless steel. In addition, within the range of availability of information, the results of the evaluation were compared with the results from the various decommissioning experiences data or international/national decommissioning study. The comparison results have shown that the radioactive waste amount from Kori Unit 1 decommissioning were much less than those from the plants decommissioned in U.S. and were comparable to those from the plants in Europe. This result comes from the difference of disposal cost and clearance criteria (i.e., free release level) between U.S. and non-U.S. The preliminary evaluation performed using the methodology established in this study will be useful as a important information in establishing the decommissioning planning for the decommissioning schedule and waste management strategy establishment including the transportation, packaging, handling, and disposal of radioactive wastes.
Abstract: The matrix cooling channel was used for gas turbine blade cooling passage. The matrix cooling structure is useful for the structure stability however the cooling performance of internal cooling channel was not enough for cooling. Therefore, we designed the rib configurations in the matrix cooling channel to enhance the cooling performance. The numerical simulation was conducted to analyze cooling performance of rib configured matrix cooling channel. Three different rib configurations were used which are vertical rib, angled rib and c-type rib. Three configurations were adopted in two positions of matrix cooling channel which is one fourth and three fourth of channel. The result shows that downstream rib has much higher cooling performance than upstream rib. Furthermore, the angled rib in the channel has much higher cooling performance than vertical rib. This is because; the angled rib improves the swirl effect of matrix cooling channel more effectively. The friction factor was increased with the installation of rib. However, the thermal performance was increased with the installation of rib in the matrix cooling channel.
Abstract: Ball joints support and guide certain automotive parts that move relative to the frame of the vehicle. Such ball joints are covered and protected from dust, mud, and other interfering materials by ball-joint boots made of rubber—a flexible and near-incompressible material. The boots may experience twisting and bending deformations because of the motion of the joint arm. Thus, environmental and endurance tests of ball-joint boots apply both bending and twisting deformations. In this study, environmental and endurance testing was simulated via the finite element method performed by using a commercial software package. The ranges of principal stress and principal strain values that are known to directly affect the fatigue lives of the parts were sought. By defining these ranges, the number of iterative tests and modifications of the materials and dimensions of the boot can be decreased. Therefore, instead of performing actual part tests, manufacturers can perform standard fatigue tests in trials of different materials by applying only the defined range of stress or strain values.
Abstract: The Markov decision process (MDP) based
methodology is implemented in order to establish the optimal
schedule which minimizes the cost. Formulation of MDP problem
is presented using the information about the current state of pipe,
improvement cost, failure cost and pipe deterioration model. The
objective function and detailed algorithm of dynamic programming
(DP) are modified due to the difficulty of implementing the
conventional DP approaches. The optimal schedule derived from
suggested model is compared to several policies via Monte
Carlo simulation. Validity of the solution and improvement in
computational time are proved.
Abstract: A feeding experiment was conducted to determine the
optimum dietary protein and lipid levels for juvenile fancy carp. Eight
experimental diets were formulated to contain four protein levels (200,
300, 400 and 500 g kg-1) with two lipid levels (70 and 140 g kg-1).
Triplicate groups of fish (initial weight, 12.1±0.2 g fish-1) were
hand-fed the diets to apparent satiation for 8 weeks. Fish growth
performance, feed utilization and feed intake were significantly
(P0.05). Weight gain and feed efficiency ratio tended to
increase as dietary protein level increased up to 400 and 500 g kg-1,
respectively. Daily feed intake of fish decreased with increasing
dietary protein level and that of fish fed diet contained 500 g kg-1
protein was significantly lower than other fish groups. The protein
efficiency ratio of fish fed 400 and 500 g kg-1 protein was lower than
that of fish fed 200 and 300 g kg-1 protein. Moisture, crude protein and
crude lipid contents of muscle and liver were significantly affected by
dietary protein, but not by dietary lipid level (P>0.05). The increase in
dietary lipid level resulted in an increase in linoleic acid in liver and
muscle paralleled with a decrease in n-3 highly unsaturated fatty acids
content in muscle of fish. In considering these results, it was concluded
that the diet containing 400 g kg-1 protein with 70 g kg-1 lipid level is
optimal for growth and efficient feed utilization of juvenile fancy carp.
Abstract: In this paper, a sliding mode control method based on the passivity approach is proposed to control the position of surface-mounted permanent magnet synchronous motors (PMSMs). Firstly, the dynamics of a PMSM was proved to be strictly passive. The position controller with an adaptive law was used to estimate the load torque to eliminate the chattering effects associated with the conventional sliding mode controller. The stability analysis of the overall position control system was carried out by adopting the passivity theorem instead of Lyapunov-type arguments. Finally, experimental results were provided to show that the good position tracking can be obtained, and exhibit robustness in the variations of the motor parameters and load torque disturbances.
Abstract: Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.
Abstract: CO2 capture and storage/sequestration (CCS) is a key technology for addressing the global warming issue. This paper proposes an integrated model for the whole chain of CCS, from a power plant to a reservoir. The integrated model is further utilized to determine optimal operating conditions and study responses to various changes in input variables.
Abstract: A SCADA (Supervisory Control And Data
Acquisition) system is an industrial control and monitoring system for
national infrastructures. The SCADA systems were used in a closed
environment without considering about security functionality in the
past. As communication technology develops, they try to connect the
SCADA systems to an open network. Therefore, the security of the
SCADA systems has been an issue. The study of key management for
SCADA system also has been performed. However, existing key
management schemes for SCADA system such as SKE(Key
establishment for SCADA systems) and SKMA(Key management
scheme for SCADA systems) cannot support broadcasting
communication. To solve this problem, an Advanced Key
Management Architecture for Secure SCADA Communication has
been proposed by Choi et al.. Choi et al.-s scheme also has a problem
that it requires lots of computational cost for multicasting
communication. In this paper, we propose an enhanced scheme which
improving computational cost for multicasting communication with
considering the number of keys to be stored in a low power
communication device (RTU).
Abstract: As the information age matures, major social
infrastructures such as communication, finance, military and energy,
have become ever more dependent on information communication
systems. And since these infrastructures are connected to the Internet,
electronic intrusions such as hacking and viruses have become a new
security threat. Especially, disturbance or neutralization of a major
social infrastructure can result in extensive material damage and social
disorder. To address this issue, many nations around the world are
researching and developing various techniques and information
security policies as a government-wide effort to protect their
infrastructures from newly emerging threats. This paper proposes an
evaluation method for information security levels of CIIP (Critical
Information Infrastructure Protection), which can enhance the security
level of critical information infrastructure by checking the current
security status and establish security measures accordingly to protect
infrastructures effectively.
Abstract: Water pipe network is installed underground and once equipped, it is difficult to recognize the state of pipes when the leak or burst happens. Accordingly, post management is often delayed
after the fault occurs. Therefore, the systematic fault management system of water pipe network is required to prevent the accident and
minimize the loss. In this work, we develop online fault detection system of water pipe network using data of pipes such as flow rate
or pressure. The transient model describing water flow in pipelines
is presented and simulated using MATLAB. The fault situations such
as the leak or burst can be also simulated and flow rate or pressure data when the fault happens are collected. Faults are detected using
statistical methods of fast Fourier transform and discrete wavelet transform, and they are compared to find which method shows the
better fault detection performance.
Abstract: Previous the 3D model texture generation from multi-view images and mapping algorithms has issues in the texture chart generation which are the self-intersection and the concentration of the texture in texture space. Also we may suffer from some problems due to the occluded areas, such as inside parts of thighs. In this paper we propose a texture mapping technique for 3D models using multi-view images on the GPU. We do texture mapping directly on the GPU fragment shader per pixel without generation of the texture map. And we solve for the occluded area using the 3D model depth information. Our method needs more calculation on the GPU than previous works, but it has shown real-time performance and previously mentioned problems do not occur.
Abstract: Employee-s task performance has been recognized as a
core contributor to overall organizational effectiveness. Hence,
verifying the determinants of task performance is one of the most
important research issues. This study tests the influence of perceived
organizational support, abusive supervision, and exchange ideology
on employee-s task performance. We examined our hypotheses by
collecting self-reported data from 413 Korean employees in different
organizations. Our all hypotheses gained support from the results.
Implications for research and directions for future research are
discussed.
Abstract: An ontology is widely used in many kinds of applications as a knowledge representation tool for domain knowledge. However, even though an ontology schema is well prepared by domain experts, it is tedious and cost-intensive to add instances into the ontology. The most confident and trust-worthy way to add instances into the ontology is to gather instances from tables in the related Web pages. In automatic populating of instances, the primary task is to find the most proper concept among all possible concepts within the ontology for a given table. This paper proposes a novel method for this problem by defining the similarity between the table and the concept using the overlap of their properties. According to a series of experiments, the proposed method achieves 76.98% of accuracy. This implies that the proposed method is a plausible way for automatic ontology population from Web tables.
Abstract: The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
Abstract: Classification is one of the primary themes in
computational biology. The accuracy of classification strongly
depends on quality of a dataset, and we need some method to
evaluate this quality. In this paper, we propose a new graphical
analysis method using 'Membership-Deviation Graph (MDG)' for
analyzing quality of a dataset. MDG represents degree of
membership and deviations for instances of a class in the dataset. The
result of MDG analysis is used for understanding specific feature and
for selecting best feature for classification.
Abstract: We present a white LED-based optical wireless
communication systems for indoor ubiquitous sensor networks. Each
sensor node could access to the server through the PLC (Power Line
Communication)-Ethernet interface. The proposed system offers a
full-duplex wireless link by using different wavelengths to reduce the
inter-symbol interference between uplink and downlink. Through the
1-to-n optical wireless sensor network and PLC modem, the mobile
terminals send a temperature data to server. The data transmission
speed and distance are 115.2kbps and about 60cm, respectively.
Abstract: As the disfunctions of the information society and
social development progress, intrusion problems such as malicious
replies, spam mail, private information leakage, phishing, and
pharming, and side effects such as the spread of unwholesome
information and privacy invasion are becoming serious social
problems. Illegal access to information is also becoming a problem as
the exchange and sharing of information increases on the basis of the
extension of the communication network. On the other hand, as the
communication network has been constructed as an international,
global system, the legal response against invasion and cyber-attack
from abroad is facing its limit. In addition, in an environment where
the important infrastructures are managed and controlled on the basis
of the information communication network, such problems pose a
threat to national security. Countermeasures to such threats are
developed and implemented on a yearly basis to protect the major
infrastructures of information communication. As a part of such
measures, we have developed a methodology for assessing the
information protection level which can be used to establish the
quantitative object setting method required for the improvement of the
information protection level.
Abstract: This paper deals with a novel technique for the
fabrication of Spiral grooves in a dynamic thrust bearing. The main
scheme proposed in this paper is to fabricate the microgrooves using
desktop forming system. This process has advantages compared to the
conventional electro-chemical machining in the viewpoint of a higher
productivity. For this reason, a new testing apparatus is designed and
built for press forming microgrooves on a surface of the thrust bearing.
The material used in this study is sintered Cu-Fe alloy. The effects of
the forming load on the performance of micro press forming are
experimentally investigated. From the experimental results, formed
depths are closed to the target ones with increasing the forming load.