• Title/Summary/Keyword: 작동순서

Search Result 50, Processing Time 0.024 seconds

The Development of DURUMI-II for Control Surface Fault Detection and Identification and Flight Test (조종면 고장진단을 위한 두루미-II 개발 및 비행시험)

  • Park, Wook-Je;Chang, Jae-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.299-305
    • /
    • 2006
  • DURUMI-II is developed into test bed airplane for the multi-purpose flight test. It satisfied the civil aeronautics law. DURUMI-II is equipped with Airborne System for acquiring of flight test data and can fly by oneself. In this paper, the redundancy of DURUMI-II control system is operated sequentially is explained. The divided control surface and the requiring program method for flight test are described. Also, it is described that the exact control input is applied using the new method. Finally, the results of flight test for new method are analyzed.

  • PDF

A study on Construction of Crime Prevention System using Computer Interface (컴퓨터 인터페이스를 이용한 방법시스템 구축에 관한 연구)

  • Oh, Seong-Jin;Lee, Young-Dae;Kim, Kee-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2781-2783
    • /
    • 2000
  • 방범에 사용되는 여러 종류의 센서를 컴퓨터를 이용하여 사용할 수 있는 방안을 연구하고 기술적인 문제를 파악하여 해결하고, Protocol을 정하여 방범 시스템 프로그램을 작성하고 컴퓨터 상에서 효율적인 방범이 이루어질 수 있도록 했다. 본 연구의 보안 시스템의 동작 순서는 다음과 같다. 사용자는 외출할 때 출입문 근처에 설치되어 있는 키패드를 이용하마 방범시스템을 작동시킨다. 침입자가 있으면 여러 장소에 설치된 센서가 감지되어 이 신호를 인터페이스를 통해 컴퓨터로 보낸다. 컴퓨터는 신호가 감지된 위치, 감지 시간을 기록하고 USB 포트에 연결된 CCD 카메라를 통하여 영상을 저장하고. 보안 책임자의 전화기로 침입자가 있다는 사실을 통보해 주도록 설계된 시스템이다. 방범시스템의 해제는 키패드를 이용하여 비밀번호를 입력하여 저장되어 있는 번호와 동일할 경우에만 해제가 될 수 있도록 구성하였다.

  • PDF

Study on the Combustion Performance Estimation of Hydrazine Mono Propellant Thruster (하이드라진 단일 추진제 추력기의 연소 성능예측에 관한 연구)

  • 정인석;윤영빈;최정열;김철중;명대근;정기훈
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 1998.04a
    • /
    • pp.30-30
    • /
    • 1998
  • 다목적 실용위성의 자세 제어용으로 장착되는 하이드라진 단일 추진제 추력기의 연소성능 특성을 살펴보았다. 일차적으로, 연소기내의 화학 평형 계산을 통하여 하이드라진 연소 생성물인 암모니아의 분해율과 초기 엔탈피 수준에 따른 추력기의 성능 특성을 살펴보았다. 다음 순서로, 연소기 내의 비평형 화학 반응 계산을 통하여 연소진행 시간에 화학 조성 및 성능 특성을 살펴 볼 수 있었으며, 최종적으로, 점성 및 비점성, 동결 및 비평형 화학 반응 해석에 따른 성능 특성 변화를 살펴보았다. 본 연구 결과로부터 각 작동 변수에 따른 추격기 성능 특성의 변화를 이해할 수 있었으며, 이는 단일 추진제 추력기 연소실의 구성, 설계 및 추력기의 운용 조건 설정에 중요한 자료로 이용될 수 있을 것으로 기대된다.

  • PDF

Effect of Height Variation of Recirculating Casing Treatment on the Performance of a Turbocharger Compressor (재순환케이싱처리 높이변화가 터보차저 압축기의 성능에 미치는 영향)

  • Nguyen, Van Hap;Zhou, Tianjun;Lee, Geun Sik
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.39 no.8
    • /
    • pp.669-675
    • /
    • 2015
  • In this study, we investigate the performance variations of an automotive turbocharger compressor with respect to the height variation of the recirculating casing treatment (RCT). We use three RCT heights, namely 1.2 mm, 1.5 mm, and 1.8 mm. We vary the compressor speed from 90,000 to 150,000 rpm, and the flow rate from 0.015 kg/s to 0.08 kg/s. The calculation results of the total pressure ratio and isentropic efficiency showed good agreement with the performance data provided by the manufacturer within a 0.7 percent error. The results showed that the RCT heights of 1.2 mm, 1.8 mm, and 1.5 mm, in that order, exhibited a more uniform pressure distribution, higher pressure ratio, and wider operational range. As the number of revolutions per minute increased, we obtained typical characteristics of a compressor map having a narrower operational range in the region of higher pressure ratio.

Development of Miniaturized Automatic Chromatography System for validation Study of Chromatographic Resin lifetime (크로마토그래피 담체의 수멍을 검증하기 위한 자동화 미니 크로마토그래피 시스템 개발)

  • 박재하;서창우
    • KSBB Journal
    • /
    • v.17 no.4
    • /
    • pp.326-332
    • /
    • 2002
  • The quality of biopharmaceutical proteins is strongly affected by a manufacturing process employed to produce Et, and thus validation of the manufacturing bioprocess is a very important issue. Chromatography is probably the most widely used bioprocess unit operation for protein purification. In this study, a miniaturized automatic chromatography system was designed and constructed for scale-down studies for process chromatography validation. This system, named MiniValChrom, has the following features: automatic and repeated operation, flexible sequences and intervals among the steps, on-line and real-time monitoring and control, method files savings, etc. Using the MiniValChrom, we peformed a case study of an abbreviated experiment to estimate chromatographic resin lifetime. BSA (bovine serum albumin) and Cibacron Blue 3G-A were used as the model protein and the resin, respectively. The resin deterioration was evaluated by determining and monitoring the HETP and NTP values from the chromatograms every 5 cycles. It was observed that the HETP and the NTP values were changed by 9% after 15 cycles. The resin lifetime validation could be completed by repeating this experiment until the HETP value reached a predetermined value. The MiniValChrom's concept and the protocol suggested in this study can serve as a rapid and economical tool for the validation studies of bioprocess chromatography system.

An R-lambda Model based Rate Control Scheme to Support Parallel GOP Coding for Real-Time HEVC Software Encoders (HEVC 실시간 소프트웨어 인코더를 위한 GOP 병렬 부호화를 지원하는 R-lambda 모델 기반의 율 제어 방법)

  • Kim, Dae Eun;Chang, Yongjun;Kim, Munchurl;Lim, Woong;Kim, Huiyong;Seok, Jinwuk
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2016.11a
    • /
    • pp.107-109
    • /
    • 2016
  • 본 논문에서는 4K UHD 입력 영상을 실시간으로 부호화하기 위해 적용되는 GOP 단위 또는 IDR 주기 단위의 병렬 부호화 구조를 지원하도록 R-${\lambda}$ 모델 기반의 율 제어 방법을 개선하는 비트 분배(bit allocation) 방법을 제안한다. GOP 단위 또는 IDR 주기 단위의 병렬 부호화기 내에서 율 제어기를 작동시키는 경우, 계층적 B 구조에서 같은 계층에 있는 프레임 간에는 상호간에 얼마만큼의 비트를 소모 하였는지에 대한 정보를 공유 할 수 없기 때문에 기존의 비트 분배 방식으로는 비트 예산(bit budget) 관리가 불가능하다. 이를 해결하기 위해 본 논문에서는, 기존의 R-${\lambda}$ 모델 기반 율 제어 방법을 개선하여 부호화 순서에 의한 시간 순서 방향의 비트 예산 갱신 기반 비트 분배하던 방식으로부터, GOP 마다 비트를 할당한 후 계층적 B 구조에서의 계층이 깊어지는 방향으로 비트 예산을 갱신하여 비트를 분배하는 방식으로 율 배분 방식을 개선하였다. 실험 결과를 통해 R-${\lambda}$ 모델 기반 율 제어의 기존 비트 분배 방식보다 제안 방법에 의한 목표 비트 율 달성 오차가 감소함을 확인하였다.

  • PDF

A Study on the Properties Analysis and Estimation of Odor Detection System (향 검지 시스템의 특성 해석 및 평가에 관한 연구)

  • Choi, Chung-Seog
    • Fire Science and Engineering
    • /
    • v.23 no.2
    • /
    • pp.1-5
    • /
    • 2009
  • We studies wish to investigated establishment form of cabinet board, and confirm possibility of electrical disaster prevention through reappearance experiment of odor detection system. Established breaker consists of MCCB, RCD order in cabinet board for house, but industry is used together with. When imposed shock using shaker to terminal block that contact becomes in appropriate, flame was made sure. According to result that experiment attaching odor capsule in terminal block, capsule commissioned exactly by occurred heat. According to establishment position of sensor, difference of inspection time was about 10 seconds. Estimate odor inspection system by thing which electrical device accident prevention is available. When there is abnormal generated heat in connection of electric wire, accident prevention estimates that is possible by giving an alarm state of overheat to administrator.

A Designing Method of Digital Forensic Snort Application Model (Snort 침입탐지 구조를 활용한 디지털 Forensic 응용모델 설계방법)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.

Thermal Stability Analysis of a Flexible Beam Spacecraft Appendage (위성체 유연 보 구조물의 열 안정성 해석)

  • 윤일성;송오섭
    • Composites Research
    • /
    • v.15 no.3
    • /
    • pp.18-29
    • /
    • 2002
  • The bending vibration and thermal flutter instability of spacecraft booms modeled as circular thin-walled beams of closed cross-section and subjected to thermal radiation loading is investigated in this paper. The thin-walled beam model incorporates a number of nonclassical effects of transverse shear, primary and secondary warping, rotary inertia and anisotropy of constituent materials. Thermally induced vibration response characteristics of a composite thin walled beam exhibiting the circumferantially uniform system(CUS) configuration are exploited in connection with the structural flapwise bending-lagwise bending coupling resulting from directional properties of fiber reinforced composite materials and from ply stacking sequence. The numerical simulations display deflection time-history as a function of the ply-angle of fibers of the composite materials, damping factor, incident angle of solar heat flux, as well as the boundary of the thermal flutter instability domain. The adaptive control are provided by a system of piezoelectric devices whose sensing and actuating functions are combined and that are bonded or embedded into the host structure.

Countermeasure of Sniffing Attack: Survey (효율적인 Sniffing 공격 대응방안 연구)

  • Hong, Sunghyuck;Seo, Yujeong
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2016
  • Sniffing attack is a passive attack which is reassembling packets to collect personal information, bank accounting number, and other important information. Sniffing attack happens in LAN and uses promiscuous mode which is opening filtering by pass all packets in LAN, attackers could catch any packets in LAN, so they can manipulate packets. They are Switch Jamming, Port mirroring, ARP Redirect, and ICMP Redirect attack. To defend these attacks, I proposed to use SSL packet encryption, reconfiguration of switching environment, DNS, and decoy method for defending all kinds of Sniffing attacks.