• Title/Summary/Keyword: Air attack

Search Result 251, Processing Time 0.026 seconds

Resistance of concrete made with air- and water-cooled slag exposed to multi-deterioration environments (서냉 및 급냉슬래그를 적용한 콘크리트의 복합열화 저항성)

  • Lee, Seung-Tae;Park, Kwang-Pil;Park, Jung-Hee;Park, Se-Ho
    • International Journal of Highway Engineering
    • /
    • v.20 no.3
    • /
    • pp.11-18
    • /
    • 2018
  • PURPOSES : Durability of concrete is traditionally based on evaluating the effect of a single deterioration mechanism such as freezing & thawing action, chloride attack, carbonation and chemical attack. In reality, however, concrete structures are subjected to varying environmental exposure conditions which often results in multi-deterioration mechanism occurring. This study presents the experimental results on the durability of concrete incorporating air-cooled slag(AS) and/or water-cooled slag(WS) exposed to multi-deterioration environments of chloride attack and freezing & thawing action. METHODS : In order to evaluate durable performance of concretes exposed to single- and multi-deterioration, relative dynamic modulus of elasticity, mass ratio and compressive strength measurements were performed. RESULTS :It was observed that multi-deterioration severely affected durability of concrete compared with single deterioration irrespective of concrete types. Additionally, the replacement of cement by AS and WS showed a beneficial effect on enhancement of concrete durability. CONCLUSIONS : It is concluded that resistance to single- and/or multi-deterioration of concrete is highly dependent on the types of binder used in the concrete. Showing the a good resistance to multi-deterioration with concrete incorporating AS, it is also concluded that the AS possibly is an option for concrete materials, especially under severe environments.

A PIV Study of Flow Patterns Over Stationary and Pitch-Oscillating Airfoils with Blowing Jet

  • Lee, Ki-Young;Chung, Hyoung-Seog;Cho, Dong-Hyun
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.9 no.1
    • /
    • pp.111-120
    • /
    • 2008
  • A particle image velocimetry (PIV) technique was employed to investigate the effects of blowing jet on the flow characteristics over stationary and pitch-oscillating airfoils. The Reynolds number was $7.84{\times}10^5$ based on the chord length. It was found that for stationary airfoil cases, continuous and pulsating blowing jets successfully reduced separated wake region at high angles of attack. A comparison study of two different types of jet blowing indicated that pulsating jet is more effective than continuous jet for flow separation control. Pulsating leading-edge blowing postpones flow separation and increased stall angle of attack by $2^{\circ}{\sim}3^{\circ}$. For pitch-oscillating airfoil cases, the PIV results showed that blowing jet efficiently delays the separation onset point during pitch-up stroke, whereas it does not prevent flow separation during pitch-down stroke, even at angles of attack smaller than static ones.

A Study on the Recognition of Effectiveness and Safety of the Helicopter Aerial Fire Attack (헬기에 의한 산불공중진화 효과 및 안전성 인식 연구)

  • Bae, Taek-Hoon;Lee, Si-Young
    • Fire Science and Engineering
    • /
    • v.26 no.2
    • /
    • pp.97-104
    • /
    • 2012
  • Forest fires were easy to be larger in Korea. So the utilization of aircrafts, especially helicopters, for forest fire attack would be increased gradually. In the forest fire attack process, the improvement of the helicopter aerial fire attack technique and safety were the chief element for efficient forest fire attack. In this study, we surveyed the recognition of pilots who worked in Forest Aviation Office which was responsible for aerial forest fire attack in Korea. Using these survey results, we suggested more efficient and safer method for aerial fire fighting based on actual experience of air attack at the scene of forest fire burning.

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

Stress-Strain Relationship of Alkali-Activated Hwangtoh Concrete under Chemical Attack (화학적 침해를 받은 알칼리활성 황토콘크리트의 응력-변형률 관계)

  • Mun, Ju-Hyun;Yang, Keun-Hyeok
    • Journal of the Korea Institute of Building Construction
    • /
    • v.14 no.2
    • /
    • pp.170-176
    • /
    • 2014
  • This study examined the effect of chemical attack on the stress-strain relationship of alkali-activated Hwangtoh concrete. Water-to-binder ratio and air content were selected as mixture parameters. The stress-strain relationship of concrete was measured at chemical immersion times of 0, 7, 28, 56, and 91 days from an age of 28 days. Based on the test results, the reduction in compressive strength of alkali-activated hwangtoh concrete owing to chemical attack was formulated. In sddition the present study demonstrated that the stress-strain behavior of concrete under chemical attack is significantly dependent on the air content and chemical immersion time, indicating the rate of decrease of modulus of elasticity was greater than that of compressive strength at the same immersion time. As a result, the stress-strain behavior of concrete under chemical attack was significantly inconsistent with the conventional models specified in the CEB-FIP provision.

Location Information Extraction of An Air-to-Ground Target using Helmet Mounted Display Device (Helmet Mounted Display 장비를 사용한 공대지 표적의 위치정보 획득)

  • Bang, Kuk-Ryul;Ha, Seok-Wun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.1-7
    • /
    • 2011
  • An attack aircraft such as a fighter needs an accurate location information of a target for the exact air-to-air or air-to-ground attack. In this paper a method is proposed that generates a location information of an air-to-ground target just in use of HMD without the target tracking sensors such as the radar and the FLIR. HMD is an embedded device to induce the seeker header to indicate the direction of a pilot's head. As a simulation result, it is founded that the target location information is able to be generated with a high degree of precision by using of HMD as a passive sensor.

Construction Plan of Ground Fire Fighter Conduct Manual on Forest Fire Occurrence Site -Case Study on Ground Fire Fighter Team of National Forest Office- (산불현장 지상진화 행동매뉴얼 구축 방안 -국유림관리소 지상진화대원 업무를 중심으로-)

  • Lee, Si-Young;Lee, Myung-Woog
    • Fire Science and Engineering
    • /
    • v.21 no.3
    • /
    • pp.8-14
    • /
    • 2007
  • The manual was proposed for individual role, according to the stages of forest fire suppression at forest fire occurrence site, for forest fire crew who has a responsibility of national forest office. The scopes of this manual are (1) apply to initial attack before arriving helicopter, (2) apply to ground fire fighting support with air attack, (3) apply to mop-up after withdraw air attack, (4) apply to night suppression when air attack is impossible. This manual is arranged for incident commander or ground fire fighter duties from the 1st stage of acceptance of forest fire to the 10th stage of withdraw of helicopter. This was developed for the purpose of every awareness of the crews and therefore of fire reduction of damage of lives, properties and forest through systematic and rapid response to forest fire.

Study on the Flow Characteristics of Supersonic Air Intake at Mach 4 (마하4 초음속 공기 흡입구 유동 특성에 관한 연구)

  • ;;;;Shigeru , Aso
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.10
    • /
    • pp.61-70
    • /
    • 2006
  • A Supersonic air intake model was designed for the high performance ramjet and dual-mode scramjet engine to operate at Mach 4 flight condition. The air intake was tested in the blowdown-type wind tunnel of Kyushu University to identify the internal flow characteristics corresponding to the flight parameters such as the back pressure, angle of attack and angle of yaw. Flow visualization was achieved by the Schlieren and oil flow visualization techniques. The intake performance was analyzed quantitatively based on the surface pressure and total Pressure measurements. The experimental results were compared with the computational fluid dynamics results. The present study exhibits the fundamental but rarely found experimental results of the high Mach number supersonic air intake.

A Study of Eavesdropping and Attack about Smart Phone VoIP Services (Smart Phone VoIP 서비스에 대한 공격과 도청 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yang, Jong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1313-1319
    • /
    • 2011
  • VoIP service by taking advantage of the current PSTN network and internet over the existing telephone network at an affordable price allows you to make voice calls to the service is being expanded. However, the security of public must be maintained for security vulnerabilities in Smart Phone VoIP case problems arise, and is likely to be attacked by hackers. In this paper, the Internet, using wired and Smart Phone VoIP services may occur during analysis of the type of incident and vulnerability analysis, the eavesdropping should conduct an attack. Smart Phone VoIP with institutional administration to analyze the vulnerability OmniPeek, AirPcap the equipment is installed in a lab environment to conduct eavesdropping attack. Packet according to the analysis and eavesdropping attacks, IP confirmed that the incident as an attack by the eavesdropping as to become the test proves. In this paper, as well as Smart Phone VoIP users, the current administration and the introduction of Smart Phone service and VoIP service as a basis for enhanced security will be provided.