• Title/Summary/Keyword: 페어링 기법

Search Result 32, Processing Time 0.015 seconds

Numerical Analysis of Stall Characteristics for Turboprop Aircraft (터보프롭 항공기의 실속 특성 수치해석)

  • Park, Young Min;Chung, Jin Deog
    • Aerospace Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.65-72
    • /
    • 2012
  • Numerical simulations were performed to study the stall characteristics of turboprop aircraft. Stall characteristics were qualitatively investigated using the computational results of various configurations based on the combinations of propeller and high lift device. For the analysis of stall characteristics, three-dimensional Navier-Stokes solver with Spalart-Allmaras turbulence model was used and the relative motion between propeller and wing was simulated using sliding mesh technique. For the cruise configurations, major flow separation was occurred at the fuselage/wing fairing and the separation was reduced under propeller slipstream condition. For the high lift device configuration without propeller, major flow separation was occurred at the outboard side of nacelle. With rotating propeller, early stall onset due to low relative velocity and high effective angle of attack was observed on the outboard wing section. Regarding rotating direction of propeller, inboard-down direction was preferred due to the stall delay effect of propeller slipstream.

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.