• Title/Summary/Keyword: 전파의 장애

Search Result 86, Processing Time 0.114 seconds

Characteristics of the Progressive Brittle Failure around Circular Opening by Scaled Model Test and Discrete Element Analysis (축소 모형시험과 개별 요소 해석에 의한 원형 공동 주변의 점진적 취성파괴 특성에 관한 연구)

  • Jeon Seok-Won;Park Eui-Seob;Bae Seong-Ho
    • Tunnel and Underground Space
    • /
    • v.15 no.4 s.57
    • /
    • pp.250-263
    • /
    • 2005
  • Progressive and localized brittle failures around an excavated opening by the overstressed condition can act as a serious obstacle to ensure the stability and the economical efficiency of construction work. In this paper, the characteristics of the brittle failure around an circular opening with stress level was studied by the biaxial compressive test using sealed specimen and by the numerical simulation with $PFC^{2D}$, one of the discrete element codes. The occurring pattern and shape of the brittle failure around a circular opening monitored during the biaxial loading were well coincided with those of the stress induced failures around the excavated openings observed in the brittle rock masses. The crack development stages with stress level were evaluated by the detailed analysis on the acoustic emission event properties. The microcrack development process around a circular opening was successfully visualized by the particle flow analysis. It indicated that the scaled test had a good feasibility in understanding the mechanism of the brittle failure around an opening with a high reliability.

A Macroscopic Framework for Internet Worm Containments (인터넷 웜 확산 억제를 위한 거시적 관점의 프레임워크)

  • Kim, Chol-Min;Kang, Suk-In;Lee, Seong-Uck;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.9
    • /
    • pp.675-684
    • /
    • 2009
  • Internet worm can cause a traffic problem through DDoS(Distributed Denial of Services) or other kind of attacks. In those manners, it can compromise the internet infrastructure. In addition to this, it can intrude to important server and expose personal information to attacker. However, current detection and response mechanisms to worm have many vulnerabilities, because they only use local characteristic of worm or can treat known worms. In this paper, we propose a new framework to detect unknown worms. It uses macroscopic characteristic of worm to detect unknown worm early. In proposed idea, we define the macroscopic behavior of worm, propose a worm detection method to detect worm flow directly in IP packet networks, and show the performance of our system with simulations. In IP based method, we implement the proposed system and measure the time overhead to execute our system. The measurement shows our system is not too heavy to normal host users.

Recursive Probability Estimation of Decision Feedback Equalizers based on Constant Modulus Errors (상수 모듈러스 오차의 반복적 확률추정에 기반한 결정궤환 등화)

  • Kim, Namyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.2172-2177
    • /
    • 2015
  • The DF-MZEP-CME (decision feedback - maximum zero-error probability for constant modulus errors) algorithm that makes the probability for constant modulus error (CME) close to zero and employs decision feedback (DF) structures shows more improved performance in channel distortion compensation. However the DF-MZEP-CME algorithm has a computational complexity proportional to a sample size for probability estimation and this property plays a role of an obstacle in practical implementation. In this paper, the gradient of DF-MZEP-CME is proposed to be estimated recursively and shown to solve the computational problem by making the algorithm independent of the sample size. For a sample size N, the conventional method has 10N multiplications but the proposed has only 20 regardless of N. Also the recursive gradient estimation for weight update is kept in continuity from the initial state to the steady state without any error propagation.

The Underwater Environment Monitoring System based on Ocean Oriented WSN(Wireless Sensor Network) (해양 적응형 무선센서네트워크 기반의 수중 환경 모니터링 시스템)

  • Yun, Nam-Yeol;NamGung, Jung-Il;Park, Hyun-Moon;Park, Su-Hyeon;Kim, Chang-Hwa
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.122-132
    • /
    • 2010
  • The analysis of ocean environment offers us essential information for ocean exploration. But ocean environment has a lot of environmental variables such as the movements of nodes by an ocean current, corrosion by salt water, attenuation of radio wave, occurrences of multi-path and difficulty of sensor nodes' deployment. It is accordingly difficult and complex to gather and process the environmental information through ocean data communication due to these constraints of ocean environment unlike the terrestrial wireless networks. To overcome these problems, we organized ocean communication network for monitoring underwater environment by real experiment in Gyeongpoho similar to ocean environment. Therefore, this paper aims at overcoming major obstacles in ocean environment, effectively deploying sensor nodes for ocean environment monitoring and defining an efficient structure suitable for communication environment by the implementation of ocean environment monitoring system in Gyeongpoho.

A Study on the Electromagnetic Wave Absorption Properties by the Composition Ratio and Sintering Condition of NiCuZn Ferrite (NiCuZn 페라이트의 조성 및 소결조건에 따른 전자파흡수 특성에 관한 연구)

  • 이영구;박찬규;이문수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.994-1000
    • /
    • 2001
  • With the development of electromagnetic communication technology and increased use of electromagnetic wave, the countermeasure of EMI(Electromagnetic Interference) becomes more important socially, and interest for the electromagnetic wave absorber has also increased. In this paper, we have studied characteristics of frequency dependency on complex permittivity and complex permeability according to the changes of composition rate and sintering temperature of NiCuZn ferrite also known as electromagnetic wave absorber and further looked into effect of electromagnetic wave absorption properties. From the measurement where the composition of $Fe_2O_3$ and ZnO of NiCuZn ferrite was fixed at 49 and 34 mol% respectively while composition of NiO and CuO has been varied at each test, we found out that Initial permeability and permittivity were high and the absorbing ability of electromagnetic wave recorded best with $loss tangent(=\mur"/\mur')$ displays more than 1 within the frequency band of 2MHz~9.5MHz when the composition ratio of NiO was ranged around 8.5~9.5 mol% and the sintering temperature was $1080^{\circ}C$.TEX>.

  • PDF

A Recovery Scheme of Mobile Transaction Based on Updates Propagation for Updating Spatial Data (공간데이터를 변경하는 모바일 트랜잭션의 변경 전파 회복 기법)

  • Kim, Dong-Hyun;Kang, Ju-Ho;Hong, Bong-Hee
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.2 s.10
    • /
    • pp.69-82
    • /
    • 2003
  • Mobile transactions updating spatial objects are long transactions that update local objects of mobile clients during disconnection. Since a recovered transaction cannot read the write sets of other transactions committed before the recovery due to disconnection, the recovered transaction may conflicts with them. However, aborting of the recovered long transaction leads to the cancellation of all updates including the recovered updates. It is definitely unsuitable to cancel the recovered updates due to the conflicts. In this paper, we propose the recovery scheme to retrieve foreign conflictive objects from the write sets of other transactions for reducing aborting of a recovered transaction. The foreign conflictive objects are part of the data committed by other transactions and may conflict with the objects updated by the recovered transaction. In the scheme, since the recovered transaction can read both the foreign conflictive objects and the recently checkpoint read set, it is possible to reupdate properly the potentially conflicted objects.

  • PDF

A Design and Implementation of Method for Positioning Vehicle Using Sensing Data (센싱 데이터를 이용한 차량 측위 기법의 설계 및 구현)

  • Moon, Hye-Young;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.422-424
    • /
    • 2010
  • Recently the car attached many ECUs and entertainment devices to provide the easiness maintenance and driver's convenience. CAN and MOST networks have been used to manage and control those devices in the car. Wireless network also has been established to receive information from external. These days a car navigation system with GPS is being integrated with CAN, MOST and Wireless network. In these circumstances, the car navigation system can have HMI function to integrate and control the car networks' devices. To solve the GPS problems such as positioning errors or losing signals from satellites in the tunnels and urban canyons, this paper designs and implements a method for positioning vehicle by using the sensing data of sensors and Wi-Fi devices based on this integrated environment.

  • PDF

An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone (스마트 폰의 소프트웨어 보안성 분석을 위한 FTA와 FMEA의 통합적 방법)

  • Kim, Myong-Hee;Toyib, Wildan;Park, Man-Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.541-552
    • /
    • 2013
  • Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart phone as the security critical systems which are utilizing in terminal systems of the banking, ubiquitous home management, airline passengers screening, and so on are related to the risk of costs, risk of loss, risk of availability, and risk by usage. For the security issues, software hazard analysis of smart phone is the key approaching method by use of observed failures. In this paper, we propose an efficient integrative framework for software security analysis of the smart phone using Fault Tree Analysis (FTA) and Failure Mode Effect Analysis (FMEA) to gain a convergence security and reliability analysis technique on hand handle devices. And we discuss about that if a failure mode effect analysis performs simpler, not only for improving security but also reducing failure effects on this smart device, the proposed integrative framework is a key solution.

Countermeasure of Uumanned Aerial Vehicle (UAV) against terrorist's attacks in South Korea for the public crowded places (국내 소프트 타깃 대상 드론테러의 법제도 개선방안 연구)

  • Oh, Hangil
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.49-66
    • /
    • 2019
  • Purpose: This study aims to apply the counter terrorism policy in pertain to malicious drone abuse and the croweded public places in South Korea. And, to improve counter terrorism protection measure, this study suggests an adoptation of Anti UAV technology into counter terrorism related regulation. Method: Compared to nations' operations of counter terrorism prevention and protection activities with the South Korean gov, problems and limitations are suggested. Results: Anti UAV technology could not be applied for Multi-user facilities by any law due to the limitation, so that it is required to amend counte terrporism related policies and law. Conclusion: This study intends to identify various protection methods against UAV threats. To reduce the risk of UAV, the law of public safety and counter terrorism should be promoted and reinforced for the first.

Childhood Tuberculosis Contact Investigation and Treatment of Latent Tuberculosis Infection: a Single Center Study, 2014-2017 (소아청소년 결핵 접촉자 검진 및 잠복결핵감염의 치료 현황: 2014-2017 단일 기관 연구)

  • Hwang, Woo Jin;Lee, Go Un;Kim, So Hyun;Cho, Eun Young
    • Pediatric Infection and Vaccine
    • /
    • v.26 no.1
    • /
    • pp.32-41
    • /
    • 2019
  • Purpose: In order to prevent tuberculosis transmission early, it is important to diagnose and treat tuberculosis infection by investigating people who have contact with patients with active tuberculosis. Methods: From July 2014 to June 2017, the intrafamilial childhood contacts of the patients who were diagnosed with active tuberculosis at Chungnam National University Hospital were investigated for the presence of tuberculosis infection. We also retrospectively analyzed the treatment status of children treated with latent tuberculosis infection (LTBI) during the same period. Results: Among the 269 children who had intrafamilial contact with active tuberculosis patient, 20 (7.4%) did not receive any screening. At the first screening, one (0.4%) was diagnosed with pulmonary tuberculosis, seven (2.8%) had a previous history of tuberculosis infection, and 42 patients (16.9%) were diagnosed with LTBI. At the second screening, 29 patients (11.6%) were diagnosed with LTBI, and 61 patients did not finish the investigation. Only 188 (69.9%) out of 269 patients completed the investigation. Ninety patients received treatment for LTBI and 83 patients (92.2%) completed the treatment, of which 18 patients had side effects such as rash, fatigue, and gastrointestinal symptoms. However, there were no serious side effects requiring treatment discontinuation. Conclusions: The completion rate of childhood tuberculosis contact investigation was low, but the completion rate of LTBI treatment was high in children without serious side effects. In order to prevent and manage the spread of tuberculosis, active private-public partnership efforts and education of the patient and guardian are needed.