• Title/Summary/Keyword: Attack Flow

Search Result 615, Processing Time 0.026 seconds

Study on the application of canvas kite to the fishing gear (캔버스 카이트의 어구 적용에 관한 연구)

  • Bae, Bong-Seong;An, Heui-Chun;Bae, Jae-Hyun;Lee, Ju-Hee;Kwon, Byeong-Guk;Park, Seong-Wook;Jeong, Eui-Cheol
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.42 no.4
    • /
    • pp.217-227
    • /
    • 2006
  • This research aims at establishing the application of canvas kite to the fishing gear through the analysis of the lift/drag tests of the kites have been performed in our previous finding. Now that several methodologies were designed to find the most effective triangular model as a buoyancy device applied to the fishing gear. Comparisons of drag/lift were made by installing the model in an installation frame instead of the prototype. Also, we have considered the application of canvas kite to the prototypic fishing gear by calculation using the result of this test. The results obtained from the above approaches are summarized as follows, where attack angle, lift coefficient, maximum lift coefficient and drag coefficient are denoted as $B,\;C_L,\;C_Lmax\;and\;C_D$ respectively. The camber showed a gradual increase with an increase of fluid velocity. There was a big discrepancy in B=20 unlike B=30. Even if the kite retreats along the fluid flow, there is little relationship with the velocity variation. Lifts calculated with the kites were bigger and drags were smaller than those of the calculations with the float only. The kite as the buoyancy device will be very useful when the appropriate applications and the stability are met.

False Alarm Minimization Technology using SVM in Intrusion Prevention System (SVM을 이용한 침입방지시스템 오경보 최소화 기법)

  • Kim Gill-Han;Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.119-132
    • /
    • 2006
  • The network based security techniques well-known until now have week points to be passive in attacks and susceptible to roundabout attacks so that the misuse detection based intrusion prevention system which enables positive correspondence to the attacks of inline mode are used widely. But because the Misuse detection based Intrusion prevention system is proportional to the detection rules, it causes excessive false alarm and is linked to wrong correspondence which prevents the regular network flow and is insufficient to detect transformed attacks, This study suggests an Intrusion prevention system which uses Support Vector machines(hereinafter referred to as SVM) as one of rule based Intrusion prevention system and Anomaly System in order to supplement these problems, When this compared with existing intrusion prevention system, show performance result that improve about 20% and could through intrusion prevention system that propose false positive minimize and know that can detect effectively about new variant attack.

  • PDF

Aerodynamic control capability of a wing-flap in hypersonic, rarefied regime: Part II

  • Zuppardi, Gennaro;Vangone, Daniele
    • Advances in aircraft and spacecraft science
    • /
    • v.4 no.5
    • /
    • pp.503-514
    • /
    • 2017
  • The attitude control of an aircraft is usually fulfilled by means of thrusters at high altitudes. Therefore, the possibility of using also aerodynamic surfaces would produce the advantage of reducing the amount of fuel for the thrusters to be loaded on board. For this purpose, Zuppardi already considered some aerodynamic problems linked to the use of a wing flap in a previous paper. A NACA 0010 airfoil with a trailing edge flap of 35% of the chord, in the range of angle of attack 0-40 deg and flap deflections up to 30 deg was investigated. Computer tests were carried out in hypersonic, rarefied flow by a direct simulation Monte Carlo code at the altitudes of 65 and 85 km of Earth Atmosphere. The present work continues this subject, considering the same airfoil and free stream conditions but two flap extensions of 45% and 25% of the chord and two flap deflections of 15 and 30 deg. The main purpose is to compare the influence of the flap dimension with that of the flap deflection. The present analysis is carried out in terms of: 1) percentage variation of the global aerodynamic coefficients with respect to the no-flap configuration, 2) increment of pressure and heat flux on the airfoil lower surface due to the Shock Wave-Shock Wave Interaction (SWSWI) with respect to the same quantities with no SWSWI or in no-flap configuration, 3) flap hinge moment. Issues 2) and 3) are important for the design of the mechanical and thermal protection system and of the flap actuator, respectively. Under the above mentioned test and geometrical conditions, the flap deflection is aerodynamically more effective than the flap extension, because it involves higher variation of the aerodynamic coefficients. However, tests verify that a smaller deflection angle involves the advantage of a smaller increment of pressure and heat flux on the airfoil lower surface, due to SWSWI, as well as a smaller hinge moment.

A Model Experiment on the Hydrodynamic Characteristics of the Simple Camber and the Super-V Otter Board (단순만곡형과 슈퍼-V형 전개판의 유체역학적 성능에 관한 모형실험)

  • LEE Byoung-Gee;KO Kwan-Soh;KIM Yong-Hae;PARK Kyoung-Hyun
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.20 no.2
    • /
    • pp.114-118
    • /
    • 1987
  • The authors carried out a model experiment to examine the hydrodynamic charactristics of the simple camber and the super-V otter board. The model otter boards are made of 1 mm thick iron plate. The simple camber otter board is made to have $12\%$ camber ratio and $432\;cm^2$ plane projected area, and the super-V otter board to have the same camber ratio as the former in every latitudinal section and almost the same plane projected area. The experiment had been done in a circular flow tank in the speed range of $0.1\~1.2m/sec$. As a result, it is examined that in the simple camber otter board the most effective angle of attack is about $25^{\circ}$, the shearing coefficient 1.47 and the drag coefficient 0.42, while in the super-V otter board they are about $20^{\circ}$, 1.40 and 0.40 respectively, so that the simple camber otter board performs a little better efficiency than the super-V otter board.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Data Encryption System on WIPI Environment (WIPI 환경에서 데이터 암호화 시스템)

  • Hong, Xian-Yu;Jung, Hoe-Kyung
    • The Journal of Engineering Research
    • /
    • v.8 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • Present time, the mobile telecommunication companies of our country are still using independence wireless internet platform. So, this carry many difficulties to the phone company and content provider company. Because even they develop one product and they must make it prepare for some platform of every mobile telecommunication companies. And this make the development more longer and more expensive. For this reason, SKT, LG telecom and KTF develop the new wireless internet platform named WIPI with ETRI. and the working is still go on and go ahead with propulsion. And if it come to reality, the WIPI will attached from much of attack such as hacking or virus. But some data exchange between mobile phone is so important as to flow. Thus, in this paper, we are design and implementation the data encryption system working at the WIPI in order to protect the data, we want to protect.

  • PDF

The Extension and Validation of OpenFOAM Algorithm for Rotor Inflow Analysis using Actuator Disk Model (Actuator Disk 모델 기반의 로터 유입류 해석을 위한 OpenFOAM 알고리즘 확장)

  • Kim, Tae-Woo;Oh, Se-Jong;Yee, Kwan-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.12
    • /
    • pp.1087-1096
    • /
    • 2011
  • The purpose of current study is to develop and verify the newly developed solver for analyzing rotor flow using the open-source code. The algorithm of standard solver, OpenFOAM, is improved to analyze the rotor inflow with and without fuselage. For the calculation of the rotor thrust, the virtual blade method based on the blade element method is employed. The inflow velocities on the rotor disk used to specify the effective angle of attack, have been included in the solver. The results of the current rotor inflow analysis are verified by comparing with other experimental and numerical results. It was confirmed that the modified solver provides satisfactory results for rotor-fuselage interaction problem.

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

Three Dimensional Vortex Behavior of LEX Delta Wing by Dynamic Stereo PIV (Dynamic Stereo PIV에 의한 델타형 날개에서의 3차원 와류 유동에 관한 연구)

  • Lee Hyun;Kim Mi-Young;Choi Jang-Woon;Choi Min-Seon;Lee Young-Ho
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.39-42
    • /
    • 2003
  • Leading edge extension(LEX) in a highly swept shape applied to a delta wing features the modern air-fighters. The LEX vortices generated upon the upper surface of the wing at high angle of attack enhance the lift force of the delta wing by way of increased negative suction pressure over the surfaces. The present 3-D stereo PIV includes the Identification of 2-D cross-correlation equation, stereo matching of 2-D velocity vectors of two cameras, accurate calculation of 3-D velocity vectors by homogeneous coordinate system, removal of error vectors by a statistical method followed by a continuity equation criterion and so on. A delta wing model with or without LEX was immersed in a circulating water channel. Two high-resolution, high-speed digital cameras$(1280pixel\times1024pixel)$ were used to allow the time-resolved animation work. The present dynamic stereo PIV represents the complicated vortex behavior, especially, in terms of time-dependent characteristics of the vortices at given measuring sections. Quantities such as three velocity vector components, vorticity and other flow information can be easily visualized via the 3D time-resolved post-processing to make the easy understanding of the LEX effect or vortex emerging and collapse which are important phenomena occurring in the field of delta wing aerodynamics.

  • PDF

Aerodynamic Characteristics of the Grid Fins on SpaceX Falcon 9 (SpaceX Falcon 9 그리드핀의 공력 특성)

  • Lee, HyeongJin;Cho, WooSung;Ko, SangHo;Lee, Yeol
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.10
    • /
    • pp.745-752
    • /
    • 2020
  • A numerical study was carried out to evaluate the aerodynamic characteristics of the supersonic grid fins installed on SpaceX Falcon 9. The unit-grid-fin concept was utilized for more efficient and simpler 3-D steady flow calculations. Pre- and post-correction processes that accounted the interference effects by the angle of attack of the missile, the influences of the outer frame of the grid fin and the connecting rods were improved in the study, and it was demonstrated that the present correction method was more accurate as compared to previous studies. Finally, the present approach was applied to evaluate the aerodynamic characteristics in transonic/supersonic flights of SpaceX Falcon 9 with various angle of attacks.