• Title/Summary/Keyword: 유출계산

Search Result 817, Processing Time 0.032 seconds

Analysis of Stream Characteristics at Tangential Intake Structure of Deep Underground Strom Water Tunnel (대심도 빗물배수터널의 접선식 유입구 흐름특성 분석)

  • Kim, Jung-Soo;Kim, So-Young;Choi, Tea-Soon;Yoon, Sei-Eui
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.604-604
    • /
    • 2012
  • 국지성 집중호우에 따른 도심지 내수 침수 피해의 주원인으로 하수관거의 설계기준을 초과하는 강우가 침수피해의 주요 원인이며, 도심화로 인해 불투수 면적이 증가함에 따라 유출되는 시간이 짧아 저지대의 피해는 불가피하다. 2010년과 2011년에 100년 이상의 강우사상이 서울시에 연이어 나타나면서 집중호우로 인한 피해지역이 유사하게 나타났으며, 광화문 거리의 연이은 침수는 현재 서울시의 하수관거의 용량과 빗물펌프장 및 저류조 시설로 구성된 기존 수방대책의 한계점을 보이고 있다. 이에 서울시는 광화문 일대의 배수능력을 향상시키기 위하여 효자배수분구 빗물배수터널을 계획하고 있다. 일본, 미국 및 유럽 등지에서는 대심도 지하수로 시설에 대한 수리실험 및 수치 연구를 바탕으로 다양한 지하방수로가 건설되어 국지성 집중 강우에 대해 적절히 대응하고 있으나, 국내의 경우에는 대심도 지하방수로 시설에 대한 연구가 미비하여 지하방수로 설계 지침 및 기술적 자료가 부족한 실정이다. 그러므로 대심도 빗물배수터널 시설에서의 흐름특성 분석에 관한 수리실험 및 수치해석 등의 구체적인 연구가 필요하다고 판단된다. 본 연구에서는 수리모형 실험의 물질적 및 시간적 한계를 극복하기 위하여 일반적으로 3차원 유체거동의 특성분석에 많이 사용되는 Fluent 6.3 모형을 이용하여 대심도 빗물배수터널 시설의 접선식 유입구에 대한 흐름특성을 수치모의 하였다. 접선식 유입구 및 수직갱(drop shaft)에 대한 기하 모형의 격자망은 수치해석의 안정성 확보를 위하여 그림 1과 같이 6면체 격자로 구성하였다. 맨홀 내의 다상유동을 고려하기 위하여 VOF(Volume of Fluid) Scheme을 적용하였으며, 수치해석 방법으로는 비정상류, 1st order implicit method를 사용하였다. Fluent에서의 난류 흐름을 계산하는 방법에는 난류 운동에너지와 난류 에너지 소산율 $\epsilon$의 전달 방정식을 도입한 k-$\epsilon$ 난류 모형을 채택하였다.

  • PDF

Capacity Estimation Models for Work-zones Under Traffic Signal Influence and the Empirical Validation (신호영향권 하 도로공사구간에서의 용량산정모형 개발과 실증)

  • Shin, Chi-Hyun
    • Journal of Korean Society of Transportation
    • /
    • v.31 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • This paper focuses on the development of analytical models for estimating the changes in saturation flow rates (SFR) at the stop-lines of a signalized intersection due to the existence of nearby work-zones, and thereby calculating the prevailing capacity values for specific lane groups. Major changes were incorporated in the logics of previous models and significant revisions have been made to secure the accuracy and simplicity. Furthermore, much attention was paid to model validation by making comparisons to both extensive simulation results and empirical data from various sites. It was found that SFRs are highly sensitive to the location of work-zones, the distance to each work-zone from the stop-line of a concerned approach, the number of lanes open and closed, and the effective green time. Using such geometric and operating conditions that constitute work-zone environment, the proposed models successfully estimated SFR values with a miniscule margin of error.

Groundwater flow Analysis Using MODFLOW in the Tunnel (MODFLOW를 이용한 터널의 지하수 유동해석)

  • Hue, Chang-Hwan
    • Journal of Korea Water Resources Association
    • /
    • v.36 no.1
    • /
    • pp.129-142
    • /
    • 2003
  • In this study, the conduct of underground water flow system with 3 dimensions is interpreted in order to examine closely the actual condition regarding the flow of the underground water which is forecast from the tunnel segment and the interpretation result which selects the design and the construction technique of the tunnel segment was applied. Also, an obstacle to construct that relates with the underground water flow in construction duration in advance will be able to apply with information that is necessary in order to establish the countermeasure. The objective tunnel is the BEOPGI tunnel segment that is 2 parallel tunnels that are a one-way 2 lane and the parameters of the MODFLOW model executing the boring investigation and the permeability examination were presumed. The underground water flow of the excavation tunnel inside was interpreted by the MODFLOW model using the parameters which is presumed and two values which compared with calculated value and observed value are the same almost. Also, when the underground water discharge quantify that followed in tunnel excavation tries to compare, the underground water total discharge quantity from tunnel point of start until destination was presumed as 0.0269㎥/day/$m^2$.

Development of a Flood Runoff and Inundation Analysis System Associated With 2-D Rainfall Data Generated Using Radar I. Quality Control and CAPPI Composite Calculation (레이더 정량강우와 연계한 홍수유출 및 범람해석 시스템 확립 I. 품질검사와 합성 CAPPI 산출)

  • Choi, Kyu-Hyun;Han, Kun-Yeun;Kim, Kyung-Eak;Lee, Chang-Hee
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.4 s.165
    • /
    • pp.321-334
    • /
    • 2006
  • The need for economical and accurate presentations of equivalent radar reflectivity( $Z_e$) data in an orthogonal coordinate system has existed for some time. So, in this study, a fast and efficient procedure has been developed which allows the systematic interpolation of digital reflectivity data from radar space into Cartesian space. At first, QC(Quality Control) of radar data has been executed for extracting uncontaminated Constant Altitude Plan Position Indicator(CAPPI) data. The algorithm is designed so that only one ordered pass through the original Plan Position Indicator(PPI) scan data is necessary to complete the interpolation process. The model can calculate various resolution and altitude reflectivity data for many kinds of hydrological usage.

Development of Stochastic Real-Time Forecast System by Storage Function Method (저류함수법을 이용한 추계학적 실시간 홍수예측모형 개발)

  • Bae, Deok-Hyo
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.5
    • /
    • pp.449-457
    • /
    • 1997
  • This study attempts to develop a stochastic-dynamic real-time flow forecasting model for an event-orient watershed storage function model (SFM), which has been used as an official flood computation model in Korea, and to evaluate its performance for real-time flow forecast. The study area is the 747.5$\textrm{km}^2$ Hwecheon basin with outlet at Gaejin and the 8 single flow events during 1983-1986 are selected for comparison and verification of model parameter and model performance. The used model parameters in this study are the same values on field work. It is shown that results from the existing model highly depend on the events, but those from the developed model are stable and well predict the flows for the selected flood events. The coefficient of model efficiency between observed and predicted flows for the events was above 0.90. It is concluded that the developed model that can consider model and observation uncertainties during a flood event is feasible and produces reliable real-time flow forecasts on the area.

  • PDF

A Study to Develop Monthly C Factor Database for Monthly Soil Loss Estimation (월단위 토양유실량 산정을 위한 식생피복인자 산정 방안 연구)

  • Sung, Yunsoo;Kum, Donghyuk;Lim, kyoung Jae;Kim, Jonggun;Park, Youn Shik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.279-279
    • /
    • 2017
  • 토양유실로 인해 발생된 토사는 강우 유출수와 함께 하류로 흘러들어 하천 및 호소의 탁수문제를 야기시킨다. 토양유실에 관한 현황을 파악하기 위해서는 유역 내 토지이용현황과 피복되어 있는 작물 등의 현황조사와 더불어 유역 내 발생되는 토양유실량에 대한 장기모니터링을 수행할 필요가 있다. 하지만 유역 내 발생되는 토양유실량에 대한 장기모니터링을 수행하기에는 많은 시간과 인력이 필요하므로 토양유실량 산정 및 유사거동특성을 계산하는 모형을 활용한 연구가 국내외 많은 연구자들에 의해 수행되고 있다. 토양유실량을 산정하는 모형 중 가장 많이 사용되고 있는 범용토양유실량산정공식(Universal Soil Loss Equation, USLE)은 5개의 인자를 사용하여 연평균 토양유실량을 산정한다. 국내의 경우 환경부에서 제정한 '표토의 침식 현황 조사에 관한 고시'에 표토침식현황을 조사하는 방법으로 USLE 공식을 사용한다. USLE 모형을 구성하는 인자 중 식생피복인자는 작물의 생육과정에 따른 변화를 고려하지 않고 작물에 대한 획일적인 값을 제시하고 있어 밭에서 발생되는 정확한 토양유실현황을 예측하는데 한계가 있다, 따라서 본 연구에서는 국내에서 사용하는 USLE 모형의 구성인자인 식생피복인자의 한계점을 인식하고 이를 유역별 월단위 인자값으로 산정하는 방법을 제시하기 위해 국내의 4대상 유역 중 대청호 유역, 소양호 유역, 주암호 유역, 임하호 유역을 선정하여 각 유역의 기후 및 지역특성을 고려한 식생피복인자를 제안하였다. 월단위 식생피복인자를 제안하기 위해 SWAT모형을 사용하여 일단위 식생피복인자를 출력하도록 모형을 구성하였으며, 구축된 인자의 지역적 한계를 보완하기 위해 4대강 유역에 대한 작물 재배일정을 조사하여 모형에 반영하여 모의하였다. 모의 결과 산정된 월단위 식생피복 인자는 모든 작물에 대해 작물이 파종되는 시점에서 수확되기까지 점차 감소하는 경향을 보였으며, 작물에 따라서 그리고 동일한 작물일지라도 유역에 따라 다소 차이가 있는 것으로 확인되었다. 따라서 본 연구를 통해 제안된 월단위 식생피복인자는 토양유실에 직접적인 영향을 주는 지표피복변화를 고려한 식생피복인자로써 정확한 토양유실량을 산정하는데 기여할 것으로 판단된다.

  • PDF

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

A Study on the Cryptography Technology for Computing Stored and Encrypted Information without Key Leakage (키 유출 없이 저장되고 암호화된 정보를 계산할 수 있는 암호기술에 관한 연구)

  • Mun, Hyung-Jin;Hwang, Yoon-Cheol
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Various cryptographic technologies have been proposed from ancient times and are developing in various ways to ensure the confidentiality of information. Due to exponentially increasing computer power, the encryption key is gradually increasing for security. Technology are being developed; however, security is guaranteed only in a short period of time. With the advent of the 4th Industrial Revolution, encryption technology is required in various fields. Recently, encryption technology using homomorphic encryption has attracted attention. Security threats arise due to the exposure of keys and plain texts used in the decryption processing for the operation of encrypted information. The homomorphic encryption can compute the data of the cipher text and secure process the information without exposing the plain text. When using the homomorphic encryption in processing big data like stored personal information in various services, security threats can be avoided because there is no exposure to key usage and decrypted information.

Performance Analysis for Privacy-preserving Data Collection Protocols (개인정보보호를 위한 데이터 수집 프로토콜의 성능 분석)

  • Lee, Jongdeog;Jeong, Myoungin;Yoo, Jincheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1904-1913
    • /
    • 2021
  • With the proliferation of smart phones and the development of IoT technology, it has become possible to collect personal data for public purposes. However, users are afraid of voluntarily providing their private data due to privacy issues. To remedy this problem, mainly three techniques have been studied: data disturbance, traditional encryption, and homomorphic encryption. In this work, we perform simulations to compare them in terms of accuracy, message length, and computation delay. Experiment results show that the data disturbance method is fast and inaccurate while the traditional encryption method is accurate and slow. Similar to traditional encryption algorithms, the homomorphic encryption algorithm is relatively effective in privacy preserving because it allows computing encrypted data without decryption, but it requires high computation costs as well. However, its main cost, arithmetic operations, can be processed in parallel. Also, data analysis using the homomorphic encryption needs to do decryption only once at any number of data.

Image Steganography for Hiding Hangul Messages in Hybrid Technique using Variable ShiftRows (가변 ShiftRows를 이용한 하이브리드 기법에서 한글 메시지 은닉을 위한 이미지 스테가노그래피)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.217-222
    • /
    • 2022
  • Information plays an important role in modern society. Most of the information is processed and moved in the digital space. In cyberspace, confidential communication based on resistance and security is fundamental. It is essential to protect the information sent and received over the network. However, information may be leaked and forged by unauthorized users. The effectiveness of the existing protection system decreases as an innovative technique is applied to identify the communication contents by a third party. Steganography is a technique for inserting secret information into a specific area of a medium. Stegganography and steganalysis techniques are at odds with each other. A new and sophisticatedly implemented system is needed to cope with the advanced steganalysis. To enhance step-by-step diffusion and irregularity, I propose a hybrid implementation technique of image steganography for Hangul messages based on layered encryption and variable ShiftRows. PSNR was calculated to measure the proposed steganography efficiency and performance. Compared to the basic LSB technique, it was shown that the diffusion and randomness can be increased even though the PSNR decreased by 1.45%.