• Title/Summary/Keyword: 우회 경로

Search Result 230, Processing Time 0.027 seconds

Effect of Cyclic Injection on Migration and Trapping of Immiscible Fluids in Porous Media (공극 구조 내 교차 주입이 비혼성 유체의 포획 및 거동에 미치는 영향)

  • Ahn, Hyejin;Kim, Seon-ok;Lee, Minhee;Wang, Sookyun
    • Economic and Environmental Geology
    • /
    • v.52 no.1
    • /
    • pp.37-48
    • /
    • 2019
  • In geological $CO_2$ sequestration, the behavior of $CO_2$ within a reservoir can be characterized as two-phase flow in a porous media. For two phase flow, these processes include drainage, when a wetting fluid is displaced by a non-wetting fluid and imbibition, when a non-wetting fluid is displaced by a wetting fluid. In $CO_2$ sequestration, an understanding of drainage and imbibition processes and the resulting NW phase residual trapping are of critical importance to evaluate the impacts and efficiencies of these displacement process. This study aimed to observe migration and residual trapping of immiscible fluids in porous media via cyclic injection of drainage-imbibition. For this purpose, cyclic injection experiments by applying n-hexane and deionized water used as proxy fluid of $scCO_2$ and pore water were conducted in the two dimensional micromodel. The images from experiment were used to estimate the saturation and observed distribution of n-hexane and deionized water over the course drainage-imbibition cycles. Experimental results showed that n-hexane and deionized water are trapped by wettability, capillarity, dead end zone, entrapment and bypassing during $1^{st}$ drainage-imbibition cycle. Also, as cyclic injection proceeds, the flow path is simplified around the main flow path in the micromodel, and the saturation of injection fluid converges to remain constant. Experimental observation results can be used to predict the migration and distribution of $CO_2$ and pore water by reservoir environmental conditions and drainage-imbibition cycles.

Label Assignment Schemes for MPLS Traffic Engineering (MPLS 트래픽 엔지니어링을 위한 레이블 할당 방법)

  • 이영석;이영석;옥도민;최양희;전병천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1169-1176
    • /
    • 2000
  • In this paper, label assignment schemes considering the IP flow model for the efficient MPLS traffic engineering are proposed and evaluated. Based on the IP flow model, the IP flows are classified into transient flows and base flows. Base flows, which last for a long time, transmit data in high bit rate, and be composed of many packets, have good implications for the MPLS traffic engineering, because they usually cause network congestion. To make use of base flows for the MPLS traffic engineering, we propose two base flow classifiers and label assignment schemes where transient flows are allocated to the default LSPs and base flows to explicit LSPs. Proposed schemes are based on the traffic-driven label triggering method combined with a routing tabel. The first base flow classifier uses both flow size in packet counts and routing entries, and the other one, extending the dynamic X/Y flow classifier, is based on a cut-through ratio. Proposed schemes are shown to minimize the number of labels, not degrading the total cut-through ratio.

  • PDF

Anonymity of Tor Users on Unsecured Applications (비 암호화 프로그램 사용자의 토르망 익명성 보장 분석)

  • Shin, Seok-Joo;Dahal, Saurav;Pudasaini, Amod;Kang, Moon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.805-816
    • /
    • 2017
  • Tor is a popular, low-latency open network that offers online anonymity to users by concealing their information from anyone conducting traffic analysis. At the same time, a number of conventional passive and active attacking schemes have been proposed to compromise the anonymity provided by the Tor network. In addition to attacks on the network through traffic analysis, interacting with an unsecured application can reveal a Tor user's IP address. Specific traffic from such applications bypasses Tor proxy settings in the user's machine and forms connections outside the Tor network. This paper presents such applications and shows how they can be used to deanonymize Tor users. Extensive test studies performed in the paper show that applications such as Flash and BitTorrent can reveal the IP addresses of Tor users.

A Pointer Forwarding Scheme for Fault-tolerant Location Management in Mobile Networks (이동망에서 결함 허용 위치 관리를 위한 포인터 포워밍 방법)

  • Lee, Kyung-Sook;Ha, Sook-Jeong;Chun, Sung-Kwang;Bae, Ihn-Han
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.387-394
    • /
    • 2004
  • One of the main challenges in personal communication services(PCS ) Is to locate many mobile terminals that nay move from place to place frequently. This kind of system operation is called location management. This task entails sophisticated signaling traffic and database queries. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current locations of mobile terminals, and are vulnerable to failure of the location register databases. In this paper, we propose a fault-tolerant pointer forwarding scheme with distributed home location register in order to tolerate the failure of location registers. The performance of the proposed scheme is evaluated analytically by simulation, and Is compared with Biaz's bypass forwarding strategy and two-path forwarding strategy.

Design and Evaluation of a Fault-Tolerant Distributed Location Management Method in Mobile Environments (이동 환경에서 결함 포용 분산 위치 관리 방법의 설계 및 평가)

  • Bae, Ihn-Han;Oh, Sun-Jin
    • Journal of Internet Computing and Services
    • /
    • v.1 no.1
    • /
    • pp.35-46
    • /
    • 2000
  • One of the main chalenges in personal communication services (PCS) is to locate many mobile terminals that may move frequently from place to place. Such a system operation is called location management. Many network signaling traffic, and database queries are required to achieve such a task. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current location on mobile terminals, and are vulnerable to failure of the location registers. In this paper, we propose a fault-tolerant pointer forwarding with distributed home location register (FT-RFDHLR) to tolerate the failure of location registers. The performance of the proposed method is evaluated by an analytical model, and is compared with thew pointer forwarding with the single home location register (PFSHLR), the pointer forwarding with distributed home location register (PFDHLR), Biaz's bypass forwarding strategy (BFS) and two-path forwarding strategy (TPFS).

  • PDF

Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP (GeoIP를 이용한 익명 네트워크에서 통신 속도 향상을 위한 성능 개선)

  • Park, Kwang-Cheol;Lim, Young-Hwan;Lim, Jong-In;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.75-85
    • /
    • 2011
  • Although progress in information technology has made our life prosperous. But it accompanied a number of adverse effects in various aspects. Especially, internet according to the increasing requirements for privacy and security, IP concealment network technologies to ensure the anonymity are constantly being developed. IP concealment network technologies is aiding the user to bypass the blocked sites can be used to access for information gathering, and they could be used for a malicious hacker to hide his attacks. However, due to complex routing path, local communication bandwidth sangyiham, and internode encryption there are also disadvantages that communication speed is significantly less. In this paper, the research for improving the performance of anonymous networks is to proceed by the communication speed measurement that using GeoIP the particular country with high-bandwidth is Specified or path length is limited.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

Improved Thermal Resistance of an LED Package Interfaced with an Epoxy Composite of Diamond Powder Suspended in H2O2 (과산화수소 적용 TIM의 LED 패키지 열특성 개선효과)

  • Choi, Bong-Man;Hong, Seong-Hun;Jeong, Yong-Beom;Kim, Ki-Bo;Lee, Seung-Gol;Park, Se-Geun;O, Beom-Hoan
    • Korean Journal of Optics and Photonics
    • /
    • v.25 no.4
    • /
    • pp.221-224
    • /
    • 2014
  • We present a method for manufacturing a TIM used for packaging a high-power LED. In this method a mixture of diamond powder and hydrogen peroxide is used as a filler epoxy. The thermal resistance of the TIM with hydrogen peroxide was improved by about 30% over the thermal resistance of the TIM without hydrogen peroxide. We demonstrate that as a result the heat generated from the chip is easily dissipated through the TIM.

The Collision Prevention System between Vehicles based on Fuzzy on a urban environment (도심환경에서 퍼지 기반 차량간 충돌 예방 시스템)

  • Jeong, Yi-Na;Lee, Byung-Kwan;Ahn, Heui-Hak
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.69-79
    • /
    • 2014
  • This paper proposes the Collision Prevention System based on Fuzzy which reasons a risk with the location information of vehicles and pedestrians and prevents collision between vehicles, and between a vehicle and a pedestrian with the reasoned risk. The proposed system provides three functions. First, it identifies a pedestrian's location with his smart phone and a vehicle's location with the GPS equipped in the vehicle. and transfers the identified information to their neighbors. Second, it makes a vehicle and a pedestrian reason a risk by considering a moving direction, a moving speed and road information. Third, it provides a vehicle and a pedestrian with the reasoned information such as route detour, speed reduction, etc. Therefore, the proposed collision prevention system based on Fuzzy not only prevents collision accidents beforehand by reasoning a risk, but also reduces a variety of losses by protecting traffic accident and congestion.

A Study on a Scenario-based Information Leakage Risk Response Model Associated with the PC Event Detection Function and Security Control Procedures (PC 이벤트 탐지 기능과 보안 통제 절차를 연계시킨 시나리오 기반 금융정보유출 위험 대응 모델에 관한 연구)

  • Lee, Ig Jun;Youm, Heung Youl
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.137-152
    • /
    • 2018
  • It is a measure to overcome limitations that occur in the activity of detecting and blocking abnormal information leakage activity by collecting the activity log generated by the security solution to detect the leakage of existing financial information and analyzing it by pattern analysis. First, it monitors real-time execution programs in PC that are used as information leakage path (read from the outside, save to the outside, transfer to the outside, etc.) in the PC. Second, it determines whether it is a normal controlled exception control circumvention by interacting with the related security control process at the time the program is executed. Finally, we propose a risk management model that can control the risk of financial information leakage through the process procedure created on the basis of scenario.