• Title/Summary/Keyword: 교류 전자기장

Search Result 8, Processing Time 0.022 seconds

The ship electromagnetic signatures and their countermeasures (선체 전자기 신호원 및 감소 대책)

  • Chung, Hyun-Ju;Yang, Chang-Seob
    • Proceedings of the KIEE Conference
    • /
    • 2003.07c
    • /
    • pp.1961-1963
    • /
    • 2003
  • 수중에는 대기중에서와는 달리 음향, 압력, 전자기장 등이 주 탐지원이 된다. 이중 선체에서 발생되는 전자기장은 강자성체로부터 발생되는 정 자기장 이외에 선체 자체의 부식과 부식 방지 장치에서 발생되는 정전 자기장 및 ELFE대역의 교류 전 자기장으로 나눌수가 있다. 이처럼 수중에서 탐지 가능한 비음향 전자기 신호원이 교류 전자기장 등으로 다양화됨에 따라 선체 건조시 이러한 신호 발생원들의 종합적인 관리 및 감소 대책이 요구된다. 따라서, 본 논문에서는 선체에서 발생되는 전자기장 신호원의 종류와 발생원인을 기술하고, 이러한 신호원들을 감소시키기 위한 대책을 소개하였다.

  • PDF

테슬라 코일의 설계와 제작

  • Yang, So-Hui;An, Seong-Jung;Park, So-Jeong;Mun, Jin-Pyeong;Jo, Jeong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.08a
    • /
    • pp.168.2-168.2
    • /
    • 2013
  • 테슬라 코일은 니콜라 테슬라가 고안한 변압기로, 교류 아크 방전을 통한 플라즈마의 발생을 관찰할 수 있는 기기이다. 고전압 트랜스를 사용해 저전압을 고전압으로 변환하고, 변환된 에너지를 콘덴서에 충전시켜 스파크 갭 사이에 절연파괴를 일으켜 아크 방전을 통한 플라즈마를 발생시킨다. 이 때 콘덴서와 1차코일 사이에 폐회로가 형성되고, 1차 코일과 2차 코일 사이에 전자기장이 생긴다. 공진주파수가 맞을 때 만들어진 전자기장으로 에너지가 전달되고, 2차 코일에서 증폭된 에너지는 충전된 탑로드 끝에서 아크 방전을 통하여 플라즈마의 형태로 방출된다. 본 프레젠테이션에서는 한동글로벌 학교 고등학생들이 50시간에 걸쳐 직접 제작한 테슬라 코일의 자세한 스펙, 만든 부품들과 그를 만드는 데 사용한 물품들, 설계도들, 날짜별로 기록한 테슬라 코일의 자세한 제작 과정과 후기, 만든 테슬라 코일의 작동과 이를 이용한 추가적인 실험 내용을 발표하고자 한다.

  • PDF

Characteristics and Measurement Method of the Underwater Electromagnetic Signature Emitted from a Naval Ship (함정 발생 수중 전자기장 신호의 특성 및 측정 기법)

  • Yang, Chang-Seob;Chung, Hyun-Ju;Shin, Seung-Je
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.2 s.25
    • /
    • pp.11-19
    • /
    • 2006
  • The underwater electromagnetic signatures of a naval ship are mainly generated from three sources which are the permanent and induced magnetic field in the ship's hull and other ferrous components, the cathodic current electromagnetic field established by the Impressed Current Cathodic Protection(ICCP) system or the Sacrificial Anode and the stray electromagnetic fields generated by onboard equipment. These signatures can be minimized by certain design methods or installation of signature reduction equipment. In this paper, we represented the characteristic of the underwater electromagnetic signature and the signature reduction techniques for a naval ship. Also, we measured the electromagnetic field changes emitted from the real ship using the Electric and Magnetic field Measurement System(EMMS). We found that the underwater electromagnetic signature for a naval ship can be used as input or trigger signal in a surveillance system and an influence mine.

A Study on the Efficient Germination of Barley Seed using Electrostatic Field (정전기장을 이용한 보리종자의 효율적 발아에 관한 연구)

  • Dong-Hee Park
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.68-75
    • /
    • 2023
  • This paper discusses methods for increasing the germination rate of barley seeds using low direct and alternating current power below 110V. The experimental apparatus used here is a parallel plate, with the bottom surface of the plate designed to be wider than the top surface to increase the size of the electrostatic field. As a result, three different magnitudes of electrostatic fields were created on the plates: the first ranging from 400V/cm to 600V/cm, the second from 600V/cm to 900V/cm, and the third from 2200V/cm to 2400V/cm. The finite difference method was applied to analyze the electrostatic field inside the parallel plate. The plant seeds used in the experiments were barley seeds produced domestically. The average germination rate of barley seeds using the presented electrostatic field in this paper was 57%, while it was 65% when using a microwave of 2.45GHz, compared to a control group with a result of 31%. An important difference between using the electrostatic field and the 2.45GHz microwave is the dry method and wet method. When applying these two methods to practical seed germination, it is necessary to consider the advantages and disadvantages of each experimental approach and choose the appropriate method accordingly.

  • PDF

The Development of Electromagnetic Field Analysis Software for Virtual Training (가상 교육용 전자장 해석 프로그램 개발)

  • Wee, Sang Bong;Kim, Ki Beom
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.2
    • /
    • pp.55-60
    • /
    • 2010
  • We usually encounter Electro-magnetics phenomenons and only feel some part of that, but it is hard to feel it visually. Moreover understanding physically and quantitatively is not a easy work. These electrostatic field theory, magnetostatic field theory and interchange magnetic field theory combined with electromagnetic field are formulated experimentally and theoretically by James Clerk Maxwell in 1873. Electromagnetic field takes electro-magnetic phenomenons as a expansion of formula originated in Maxwell equations. Since this is based on expansion of formula, it is hard to understand for many students not only middle school and high school students learning it at the first time but also college students studying physics as a elementary class and even majors in electromagnetic field. The program is developed as a visual aid to cope with these problems, and even to deal with complex problem to estimate solution using numerical method.

  • PDF

A Study on the Non-Contact Detection Technique of Defects Using AC Current - The Influence of Frequency and lift-off - (교류전류를 이용한 비접촉결함탐상법에 관한 연구 - 주파수 lift-off의 영향 -)

  • Kim, Hoon;Na, Eu-Gyun
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.22 no.1
    • /
    • pp.53-58
    • /
    • 2002
  • New nondestructive inspection (NDI) technique to detect the defect in metal was developed in which an electromagnetic field is induced in a metal by AC current flowing in the magnetic coil and the leak magnetic-flux disturbed by defects is measured using a tape-recorder head with air gap. This technique can be applied in evaluating the location and sizing of surface defects in components of the ferromagnetic body by means of the non-contacting measurement. In this paper, we have applied this technique to the evaluation of two-dimensional surface cracks in ferromagnetic metal, and also investigated the influence of the various frequencies and lift-off. Defects were detected with maximum values in the distribution of voltage and it was found that the maximum values tend to increase with the defect depth. Although the maximum values for defects are affected by the frequency and lift-off, the depth of small defects can be estimated from the linear relationship between the depth and voltage rate$(V_0/V_{ave})$.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A study on the growth mechanism of rutile single crystal by skull melting method and conditions of RF generator (스컬용융법에 의한 루틸 단결정 성장메커니즘과 RE generator 조건에 관한 연구)

  • Seok jeong-Won;Choi Jong-Koen
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.15 no.5
    • /
    • pp.175-181
    • /
    • 2005
  • Ingots of rutile single crystals were grown by the skull melting method, and their characteristics were compared in terms of melt-dwelling time for each melt. The method is based on direct inductive heating of an electrically conducted melt by an alternating RF field, and the heating is performed by absorption of RF energy. $TiO_2$ is an insulator at room temperature but its electric conductivity increases elevated temperature. Therefore, titanium metal ring(outside diameter : 6cm, inside diameter : 4cm, thickness 0.2cm) was embedded into $TiO_2$, powder (anatase phase, CERAC, 3N) for initial RF induction heating. Important factors of the skull melting method are electric resistivity of materials at their melting point, working frequency of RF generator and cold crucible size. In this study, electric resitivity of $TiO_2$, $(10^{-2}\~10^{-1}\;{\Omega}{\cdot}m)$ at its melting point was estimated by compairing the electric resitivities of alumina and zirconia. Inner diameter and height of the cold crucible was 11 and 14cm, respectively, which were determined by considering of the Penetration depth $(0.36\~1.13cm)$ and the frequency of RF generator.