• Title/Summary/Keyword: 방식재

Search Result 2,468, Processing Time 0.028 seconds

Variation of abrasive feed rate with abrasive injection waterjet system process parameters (연마재 투입형 워터젯 시스템의 공정 변수에 따른 연마재 투입량 변화)

  • Joo, Gun-Wook;Oh, Tae-Min;Kim, Hak-Sung;Cho, Gye-Chun
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.17 no.2
    • /
    • pp.141-151
    • /
    • 2015
  • A new rock excavation method using an abrasive injection waterjet system has been developed to enhance the efficiency and reduce the vibration of tunnel excavation. The abrasive feed rate is an important factor for the cutting performance and the economical efficiency of waterjet-based excavation. In this study, various experiments were performed to explore the effects of major process parameters for both the abrasive feed rate and the suction pressure occurring inside the mixing chamber when the abrasives are inhaled. Experimental results reveal that the abrasive feed rate is affected by geometry parameters (abrasive pipe height, length, and tortuosity), abrasive parameters (abrasive particle size), and jet energy parameters (water pressure and water flow rate). In addition, the relation between the cutting performance and the abrasive feed rate was discussed on the basis of the results of an experimental study. The cutting performance can be maximized when the abrasive feed rate is controlled appropriately via careful management of major process parameters.

Improved Strong Password Mutual Authentication Protocol to Secure on Replay Attack (재전송 공격에 안전한 개선된 강력한 패스워드 상호인증 프로토콜)

  • Kim, Jun-Sub;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.415-425
    • /
    • 2010
  • In public network, user authentication is important security technology. Especially, password-based authentication method is used the most widely in distributed environments, and there are many authentication methods. Their SPMA protocol indicates vulnerability about problem that NSPA protocol does not offer mutual authentication, and proposed Strong Password Mutual Authentication protocol with mutual authentication. However, SPMA protocol has vulnerability of replay attack. In the paper, we analyzed vulnerability to replay attack of SPMA protocol. And we also proposed Improved Strong Password Mutual Authentication protocol to secure on replay attack with same efficiency.

Strength properties of Cement Mortar by the Nano admixture of dry process and wet process (건식 및 습식 나노 혼화재를 사용한 시멘트 모르타르의 강도 특성)

  • Kim, Yeon-Hee;Choi, Eung-Kyoo;Park, Jong-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1452-1457
    • /
    • 2011
  • Strength properties of cement mortar was carried out silica fume(SF) and Titanium Dioxide($TIO_2$) by nano admixture of dry process and wet process. Experimental parameters were Nano admixture as the dry process and wet process 5, 10, 15 or 20%. As a result, strength properties of cement mortar by silica fume(SF) and Titanium Dioxide($TIO_2$) were similar and in a comparative experiment of the dry process and wet process Nano admixture using wet process Nano admixture showed a greater strength properties.

Yagisawa on Peacocke and van Inwagen

  • Kim, Seahwa
    • Korean Journal of Logic
    • /
    • v.16 no.1
    • /
    • pp.45-59
    • /
    • 2013
  • In his book Worlds and Individuals: Possible and Otherwise, Takashi Yagisawa Yagisawa argues that his own theory is better than Lewis's theory by showing that his own theory can deal with important objections to modal realism more successfully than Lewis's. In particular, Yagisawa claims that by adopting modal tenses, he can respond to many important objections to modal realism in a uniform way. In this paper, I argue that Lewis can also successfully respond to Peacocke's objection in an exactly parallel way to Yagisawa's by distinguishing existence at the actual world from existence at other possible worlds and that Yagisawa's response to van Inwagen's objection does not succeed. I conclude that Yagisawa fails to show that his own theory is better than Lewis's.

  • PDF

Delay characteristics of speech packets in virtual cellular network(VCN) (가상 셀룰라 망(VCN)에서의 음성 패킷 지연 특성)

  • 정명순;김화종
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.9A
    • /
    • pp.2305-2312
    • /
    • 1998
  • This paper analyzed the delay characteristics of speech packets in virtual cellular network(VCN). The probability distribution of packet delay is obtained using the markov chain model when periodic speech packets are transmitted by slotted-ALOHA protocol. The effects of probility of capture and retransmission policy on the performance were also analyzed. At first, the probability cumulative function of packet delay is calculated from the probability of capture as a function of location of mobile terminal. In order to investigate the effects of backoff delay, we defined a parameter NPr, where N is the period (frame size) of the speech packets and Pr is the retransmission probability for each speech packet. We also obtained the 1% outage delay for various frame size N.

  • PDF

Timer-based Buffer Management for Reliable Multicast (신뢰적 멀티캐스트를 위한 타이머 기반 버퍼 관리)

  • 안상현;김영민;권영호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.513-519
    • /
    • 2003
  • In order to deliver multicast traffic efficiently, multicast routing and reliable transmission mechanisms are required. The reliable delivery implies that lost packets must be retransmitted, which in turn requires that transmitted packets be stored in a retransmission buffer. Therefore how to manage a retransmission buffer is important and, in this paper, we try to solve the problem of how many packets should be maintained in the buffer. Our proposed scheme, the timer-based buffer management (TBM), maintains only necessary amount of buffer based on the timer value calculated from the NAKs between the replier and receivers on a multicast tree and can adjust to the dynamic network conditions. By performing simulations, we show that TBM manages the buffer efficiently regardless of the error situation, network size, and so on.

The Study on the Construction Criteria and Dujabee Technique of the Construction of the Cheomseongdae (첨성대축조 규준방식과 드잡이기술에 대한 기술사적 접근 연구)

  • Kim, Derk Moon
    • Korean Journal of Heritage: History & Science
    • /
    • v.45 no.4
    • /
    • pp.92-103
    • /
    • 2012
  • The Cheomsungdae was built in the Silla dynasty during the reign of queen Seondeok. It has a round cylindrical structure with a flowing curved fa ade. The identity of the Cheomsungdae has not been revealed since there is not much historical evidence or documents about the building. This study is trying to investigate the building technique and method from the technical point of view of the past when it was constructed. There have been much work and studies done for the Cheomsungdae, but not much were focusing on the technical aspects of the building. In addition there are many questions and doubts about the hypothesis of the building technique of Cheomsungdae since there aren't any remaining documents or historical evidence supporting it. Among many questions, we think that the discussion on falsework technique is not considering traditional construction method of the Dujabee (a traditional construction technique using various tools and equipment for the stability of the building) technique. Therefore, it is hard to identify them as reliable historical facts. As the result of the study, we want to provide the basic data on the construction techniques of Korean traditional architecture and broaden the study scope of technical history by narrowing the errors. The study could be summarized into three points. 1. The historical architecture Cheomseongdae was constructed by using traditional crane techniques such as a Noklo (pulley ladder). Cheomseongdae was re-evaluated as a high level technology for the history of architecture. 2. The benchmark method on Cheomseongdae construction has been applied with a precise scientific method based on the geometrical principals using the central axis. 3. In terms of the history of Korean traditional architecture technology, as there aren't many studies done we proposed various basic data for the traditional crane techniques and criteria of Korean traditional architecture technology. We could expect various and active studies for the technical approach of the history of architecture.

Study of Fatigue Behavior of Repaired Composites (복합재료의 수리후 피로거동 고찰)

  • 최재원;황운봉;박현철;한경섭
    • Composites Research
    • /
    • v.12 no.3
    • /
    • pp.26-35
    • /
    • 1999
  • The static strength and fatigue life of repaired graphite/epoxy laminates are observed using tensile coupon. The lay-up of investigated laminates was [$0^{\circ}$/$\pm$$45^{\circ}$/$90^{\circ}$]$_s$. Static strength was measured from the specimens prepared by various repair techniques such as precured-single patch, precured-double patch and cure-in-place methods. The strength was recovered to the extent of 60~80 % of unnotched case. Fatigue life was also measured from the laminates repaired with cure-in-place method. Hwang and Han's MFLPE 1(modified fatigue life prediction equation 1), which was based on the fatigue modulus degradation model and reference modulus, was chosen for fatigue life prediction of repaired specimen and compared with the conventional fatigue life equation such as S-N curve and Basquin's relation. The MFLPE 1 has better agreement with experimental data than S-N curve and Basquin's relation.

  • PDF

Checkpoint/Resimulation Overhead Minimization with Sporadic Synchronization in Prediction-Based Parallel Logic Simulation (간헐적 동기화를 통한 예측기반 병렬 로직 시뮬레이션에서의 체크포인트/재실행 오버헤드 최소화)

  • Kwak, Doohwan;Yang, Seiyang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.5
    • /
    • pp.147-152
    • /
    • 2015
  • In general, there are two synchronization methods in parallel event-driven simulation, pessimistic approach and optimistic approach. In this paper, we propose a new approach, sporadic synchronization combining both for prediction-based parallel event-driven logic simulation. We claim this hybrid solution is pretty effective to minimize both checkpoint overhead and restart overhead, which are related problems with frequent false predictions for improving the performance of the prediction-based parallel event-driven logic simulation. The experiment has clearly shown the advantage of the proposed approach.

Design and Evaluation of NACK Based Reliable Multicast Protocol (NACK 기반 신뢰적 멀티캐스트 프로토콜의 설계 및 평가)

  • Jung Sun-Hwa;Park Seok-Cheon
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.47-55
    • /
    • 2003
  • Multicast protocols ore developed in order to support group communications efficiently, However. there still exist some issues to be solved for deploy multicast protocol in the public internet. This paper refers problem of existing Reliable Multicast Protocols and redesigns component function, and proposes enhanced reliable multicast transport protocol, This paper proposed a improved multicast transport scheme in NACK based reliable multicast. This scheme is much faster than by sender-initiated or receiver-initiated recovery and latency is smaller. Designed components are implemented in UNIX environment using C programming longuage. Then the protocol was evaluated performance through simulation. As the result, proposed protocol is better than existing protocols in both of transmission delay and packet loss. Especially, proposed protocol in this paper con be used in multicast services needed high reliability.

  • PDF