• Title/Summary/Keyword: Attack Flow

Search Result 613, Processing Time 0.027 seconds

Solar concentrator optimization against wind effect

  • Sayyed Hossein Mostafavi;Amir Torabi;Behzad Ghasemi
    • Wind and Structures
    • /
    • v.38 no.2
    • /
    • pp.109-118
    • /
    • 2024
  • A solar concentrator is a reflective surface in the shape of a parabola that collects solar rays in a focal area. This concentrator follows the path of the sun during the day with the help of a tracking system. One of the most important issues in the design and construction of these reflectors is the force exerted by the wind. This force can sometimes disrupt the stability of the concentrator and overturn the entire system. One of the ways to estimate the force is to use the numerical solution of the air flow in three dimensions around the dish. Ansys Fluent simulation software has been used for modeling several angles of attack between 0 and 180 with respect to the horizon. From the comparison of the velocity vector lines on the dish at angles of 90 to - 90 degrees, it was found that the flow lines are more concentrated inside the dish and there is a tendency for the flow to escape around in the radial direction, which indicates the presence of more pressure distribution inside the dish. It was observed that the pressure on the concave surface was higher than the convex one. Then, the effect of adding a hole with various diameter of 200, 300, 400, 500, and 600 mm on the dish was investigated. By increasing the diameter up to the optimized size of 400 mm, a decrease in the maximum pressure value in the pressure distribution was shown inside the dish. This pressure drop decreased the drag coefficient. The effect of the hole on the dish was also investigated for the 30-degree angled dish, and it was found that the results of the 90-degree case should be considered as the basis of the design.

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.

DDoS Attack Analysis Using the Improved ATMSim (개선된 ATMSim을 이용한 DDoS 공격 분석)

  • Jeong, Hae-Duck J.;Ryu, Myeong-Un;Ji, Min-Jun;Cho, You-Been;Ye, Sang-Kug;Lee, Jong-Suk R.
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.19-28
    • /
    • 2016
  • Internet traffic has been significantly increasing due to the development of information and communication networks and the growing numbers of cell phone users that access networks. This paper connects to this issue by presenting a way to detect and analyze a typical DDoS attack that results in Internet breaches and network attacks, which are on the increase. To achieve this goal, we improve features and GUI of the existing ATMSim analysis package and use it. This package operates on a network flow-based analysis method, which means that normal traffic collected through an internal LAN at the Korean Bible University campus as well as anomaly traffic with DDoS attacks are generated. Self-similarity processes are used to analyze normal and anomaly traffic that are collected and generated from the improved ATMSim. Our numerical results obtained from three Hurst parameter estimate techniques show that there is quantitatively a significant difference between normal traffic and anomaly traffic from a self-similarity perspective.

Simulation on the shape of tuna longline gear (다랑어 연승어구의 형상에 관한 시뮬레이션)

  • 이지훈;이춘우
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.39 no.4
    • /
    • pp.305-317
    • /
    • 2003
  • Underwater shape and hook depth in tuna longline gear are important factors to decide fishing performance. It also should be considered that management and analysis of hooked rate data from hooked fish species and sizes, and each fishing would be used as a reference data in the future fishing. In this research, after analyzing underwater shape of tuna longline gear by current direction and speed using simulation, experiments were executed in flume tank to verify accuracy of the analysis. Also using the depth of each hook from the simulation, a database system was setup to process the data of bait and hooked fish species. The results were as follows;1. When the attack angle and the shortening rate are fixed, a decrease of the hook depth is proportion to an increase of current speed. 2. When the shortening rate and current speed are fixed, a decrease of hook depth is proportion to an increase of attack angle. 3. When the attack angle and velocity of flow are fixed, a decrease of hook depth is proportion to an increase of shortening rate 4. As a result of comparison between the underwater shape by simulation and that by model gear, the result of the simulation was very close to that of model gear within $$ {\pm}3%$$ 3% error range. 5. In this research, hooked rate database system using hook depth of simulation can analyze the species and size of fish by the parameter; bait. hook depth, so It could be helpful to manage and analyze the hooked data on the field.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Optimal Active-Control & Development of Optimization Algorithm for Reduction of Drag in Flow Problems(3) -Construction of the Formulation for True Newton Method and Application to Viscous Drag Reduction of Three-Dimensional Flow (드래그 감소를 위한 유체의 최적 엑티브 제어 및 최적화 알고리즘의 개발(3) - 트루 뉴턴법을 위한 정식화 개발 및 유체의 3차원 최적 엑티브 제어)

  • Bark, Jai-Hyeong
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.20 no.6
    • /
    • pp.751-759
    • /
    • 2007
  • We have developed several methods for the optimization problem having large-scale and highly nonlinear system. First, step by step method in optimization process was employed to improve the convergence. In addition, techniques of furnishing good initial guesses for analysis using sensitivity information acquired from optimization iteration, and of manipulating analysis/optimization convergency criterion motivated from simultaneous technique were used. We applied them to flow control problem and verified their efficiency and robustness. However, they are based on quasi-Newton method that approximate the Hessian matrix using exact first derivatives. However solution of the Navier-Stokes equations are very cost, so we want to improve the efficiency of the optimization algorithm as much as possible. Thus we develop a true Newton method that uses exact Hessian matrix. And we apply that to the three-dimensional problem of flow around a sphere. This problem is certainly intractable with existing methods for optimal flow control. However, we can attack such problems with the methods that we developed previously and true Newton method.

Study on the Aerodynamic Characteristics of an Wing Depending on the Propeller Mounting Position (프로펠러 장착 위치에 따른 날개의 공력 특성 변화 연구)

  • Inseo, Choi;Cheolheui, Han
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.6
    • /
    • pp.54-63
    • /
    • 2022
  • Recently, electric propulsion aircraft with various propeller mounting positions have been under construction. The position of the propeller relative to the wing can significantly affect the aerodynamic performance of the aircraft. Placing the propeller in front of the wing produces a complex swirl flow behind or around the propeller. The up/downwash induced by the swirl flow can alter the wing's local effective angle of attack, causing a change in the aerodynamic load distribution across the wing's spanwise direction. This study investigated the influence of the distance between a propeller and a wing on the aerodynamic loads on the wing. The swirl flow generated by the propeller was modelled using an actuator disk theory, and the wing's aerodynamics were analysed with the VSPAERO tool. Results of the study were compared to wind tunnel test data and established that both axial and spanwise distance between the propeller and the wing positively affect the wing's lift-to-drag ratio. Specifically, it was observed that the lift-to-drag ratio increases when the propeller is positioned higher than the wing.

Control effects of the hydrodynamic force of twin rudder in a uniform stream (균일 흐름중에 놓인 쌍동타의 간격변화가 유체력 제어효과에 미치는 영향)

  • Shon, Chang-Bae;Oh, Woo-Jun;Ku, Youn-Kyoung;Gim, Ok-Sok;Lee, Gyoung-Woo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2010.04a
    • /
    • pp.387-388
    • /
    • 2010
  • An open water rudder test was carried out to figure out the flow characteristics around a twin rudder at $Re=1.5\times10^4$. In the analysis, the unique characteristics of a twin rudder, which effects rudder farces, were explained. The analysis is included varying angles of attack fram 10 to 30 degree. In this paper, the measured results has been compared with each other to predict the performance characteristics of a twin rudder's 2-dimensional section by 2-frame grey level cross correlation PIV method. The side force of the rudder could be mainly improved at 0.75L.

  • PDF

Seepage Behavior of Sea Dyke Final Closure with Installation of Bottom Protection Filter Mat (근고공 필터매트 설치에 따른 방조제 끝막이구간의 침투거동)

  • Oh, Young-In;Yoo, Jeon-Yong;Kim, Hyun-Tae
    • Journal of the Korean Geosynthetics Society
    • /
    • v.5 no.1
    • /
    • pp.25-32
    • /
    • 2006
  • Sea dyke construction is simply defined as a cutting procedure of sea water flow. Sea dyke construction is more difficult than in-land construction because it is placed on deep seabed and exposed sea wave attack. Especially, the final closure of sea dyke is most dangerous due to the fast velocity of tidal flow. The final closure is consisted with vast rubble and heavy stone gabion, therefore the discharge velocity at land side of final close section is irregularly and sometime occur the fast discharge velocity. In this paper, the seepage model test performed to evaluate seepage behavior of final closure and continuous sea dyke section such as discharge velocity, hydraulic gradient, and phreatic line with installation of bottom protection filter mat. Based on the seepage model test results, the maximum discharge velocity of final closure section is 1.7m/sec and the discharge velocity is decreased maximum 23.7% with installation of bottom protection filter mat.

  • PDF

Papers : Vortex Flow and Aerodynamic Load Characteristics of the Delta Wing / LEX Configuration in Sideslip (논문 : 옆미끄럼이 있는 삼각 날개 / LEX 형상의 와류와 공력 특성)

  • Son,Myeong-Hwan;Lee,Gi-Yeong;Baek,Seung-Uk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.3
    • /
    • pp.37-45
    • /
    • 2002
  • The vortex flow and aerodynamic load characteristics of a $65^{\circ}$ sweep delta wing with the leading edge extension in sideslip condition is investigated experimentally. The freestream velocity is 40 m/sec, which corresponds to a Reynolds number per meter of $1.76{\times}10^6$ based on the wing root chord. The angles of attack range from $12^{\circ}$ to $28^{\circ}$, and the sideslip angles treated are $0^{\circ}$ , $-10^{\circ}$, $-20^{\circ}$. The LEX vortex of the leeward side. The LEX and wing vortics coalesce to to become a concentrated strong vortex or to break down at down at downstream position. Due to the interation of the LEX and wing vortices, a high suction pressure is maintained on the windward wing surface, and a low suction pressure is formed on the leeward wing surface