• Title/Summary/Keyword: Data flooding

Search Result 473, Processing Time 0.026 seconds

Filmwise Reflux Condensation Length and Flooding Phenomena in Vertical U-Tubes (수직U-자관 속에서의 액체막 역류 응축 길이와 Flooding현상)

  • Moon-Hyun Chun;Jee-Won Park
    • Nuclear Engineering and Technology
    • /
    • v.17 no.1
    • /
    • pp.45-52
    • /
    • 1985
  • A two inverted U-tubes condenser was constructed from transparent materials to study the heat removal capability of steam generators under filmwise reflux condensation mode. Essentially, two sets of experiments were performed: (1) the first dealt with the reflux condensation length, and (2) the second dealt with the flooding points with and without the presence of a noncondensible gas in the steam flow, and the effect of the flooding time. In addition, experimental results are compared with the predictions of analytical models.

  • PDF

The Analysis of Flooding by Virtual Flood Scenario (가상 홍수시나리오에 의한 홍수범람 해석)

  • 윤희천;엄대용;이용욱;김정우
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.21 no.2
    • /
    • pp.181-189
    • /
    • 2003
  • A virtual flood scenario has been constructed to investigate the overflowing process in the flooding area. The topography is constructed using the airborne LIDAR data. In addition, the frequency and scale of the flooding and the destruction condition of the flooding defensive structure are used as input to the scenarios. Through the scenario, the inundation depth with respect to time and maximum depth has been analyzed. This analysis shows the water level variation with time which show the flooding process. Moreover, a flooding map is drawn using the results from the scenario, distribution of the defensive structure, vulnerable area, and expected destruction points in the study area. It is expected that this study can be effectively used to examine the flooding process and flood disaster management. Furthermore, it could provide important basic information for the land development and the city planning of a possible flooding area.

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

Dynamic Adaptation Query Flooding Considering Neighbor Topology in Ad Hoc Networks (Ad Hoc Network에서 Neighbor Topology을 고려한 Dynamic Adaptation Query Flooding)

  • 이학후;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.691-693
    • /
    • 2004
  • Mobile Ad hoc network은 stationary infrastructure의 도움 없이 이동 노드들이 필요 시 multi-hop wireless links network 형태를 구성하여 통신이 이루어지게 하는 network이다. 따라서 효율적인 라우팅 프로토콜의 개발이 중요한 issue인데 최근에는 routing overhead가 적은 on-demand 프로토콜이 주목을 받고 있다. On-demand 프로토콜은 새로운 route을 구성하기 위해서 query packet을 broadcasting하게 되는데, 특히 노드들의 mobility가 많은 mobile ad hoc network(MANET)의 경우에는 더욱더 자주 발생하게 되는데, blind broadcasting은 neighbor 노드들 간의 radio transmission region overlap에 의해 redundancy, contention, collision 같은 broadcast storm 문제를 발생시키게 된다. 본 논문은 on-demand 프로토콜의 broadcast storm 문제를 해결하기 위해 Neighbor Topology을 고려 한 Dynamic Adaptation Query flooding scheme을 제시한다. 또한 Dynamic Adaptive Query flooding scheme은 broadcast storm 문제 해결뿐만 아니라 network의 congestion을 감소시켜 data packet의 성능 향상에도 기여 할 것이다.

  • PDF

Performance Evaluation of On-Demand Routing Protocol using Look-ahead Selective Flooding in Ad-hoc Network (Ad-hoc 네트워크에서 Look-ahead Selective Flooding을 이용한 On-Demand 라우팅 프로토콜 성능 개선)

  • Yo-chan Ahn
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.2
    • /
    • pp.61-71
    • /
    • 2003
  • Ad-hoc networks are characterized by multi-hop wireless links, frequently changing network topology and the need for efficient dynamic routing protocols. In an Ad-hoc network, each host assumes the role of a router and relays packets toward final destinations Because a packet is broadcast to all neighboring nodes, the optimality criteria of wireless network routing is different from that of wired network routing. tn this paper 1 point out the more important cost factor than the number of links in the Ad-hoc network. A class routing protocols called on-demand protocols has recently found attention because of their low routing overhead since it performs a blind flooding to look for a path. In this paper, 1 propose the method which reduces overhead by using the information of neighboring nodes and doing a selective flooding. Simulation results demonstrate better reduction of routing overheads with this scheme.

  • PDF

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.

Analysis of the Crop Damage Area Related to Flood by Climate Change Using a Constrained Multiple Linear Regression Model (구속 다중선형회귀 모형을 이용한 기후변화에 따른 농작물 홍수 피해 면적 분석)

  • Kim, Myojeong;Kim, Gwangseob
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.62 no.2
    • /
    • pp.1-15
    • /
    • 2020
  • In this study, the characteristics of crop damage area by flooding for 113 middle range watersheds during 2000-2016 were analyzed and future crop damage area by flooding were analyzed using 13 GCM outputs such as hourly maximum rainfall, 10-min maximum rainfall, number of days of 80 mm/day, daily rainfall maximum, annual rainfall amount associated with RCP 4.5 and RCP 8.5 scenarios and watershed characteristic data such as DEM, urbanization ratio, population density, asset density, road improvement ratio, river improvement ratio, drainage system improvement ratio, pumping capacity, detention basin capacity, and crop damage area by flooding. A constrained multiple linear regression model was used to construct the relationships between the crop damage area by flooding and other variables. Future flood index related to crop damage may mainly increase in the Mankyung watershed, Southwest part of Youngsan and Sumjin river basin and Southern part of Nackdong river basin. Results are useful to identify watersheds which need to establish strategies for responding to future flood damage.

Climate change effect on storm drainage networks by storm water management model

  • Hassan, Waqed Hammed;Nile, Basim Khalil;Al-Masody, Batul Abdullah
    • Environmental Engineering Research
    • /
    • v.22 no.4
    • /
    • pp.393-400
    • /
    • 2017
  • One of the big problems facing municipalities is the management and control of urban flooding where urban drainage systems are under growing pressure due to increases in urbanization, population and changes in the climate. Urban flooding causes environmental and infrastructure damage, especially to roads, this damage increasing maintenance costs. The aim of the present study is to develop a decision support tool to identify the performance of storm networks to address future risks associated with climate change in the Middle East region and specifically, illegal sewer connections in the storm networks of Karbala city, Iraq. The storm water management model has been used to simulate Karbala's storm drainage network using continuous hourly rainfall intensity data from 2008 to 2016. The results indicate that the system is sufficient as designed before consideration of extra sewage due to an illegal sewer connection. Due to climate changes in recent years, rainfall intensity has increased reaching 33.54 mm/h, this change led to flooding in 47% of manholes. Illegal sewage will increase flooding in the storm system at this rainfall intensity from between 39% to 52%.

Sewerage rehabilitation strategy based on sewer capacity evaluation (하수관거 통수능 검토를 통한 관거 개선방안 연구)

  • Ryu, Jaena;Oh, Jeill;Oh, Sukho
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.23 no.1
    • /
    • pp.47-55
    • /
    • 2009
  • Sewers are important national infrastructure and play an essential part by handling both wastewater and stormwater to minimise problems caused to human life and the environment. However, they can cause urban flooding when rainfall exceeds the system capacity. Sewer flooding is an unwelcome and increasingly frequent problem in many urban areas, and its frequency will increase over time with urbanisation and climate change. Under current standards, sewers are designed to drain stormwater generated by up to 10 year return period storms, but data suggests that many in practice have been experienced flooding with exceeding system capacity under increased storm events. A large number of studies has considered upgrading or increasing the design standard but there are still lack of information to propose a suitable return period with the corresponding system quantity to achieve. A methodology is required to suggest a proper level of standard within a suitable sewerage rehabilitation planning that can avoid the exceedance problem. This study aimed to develop a methodology to support effective sewer rehabilitation that could prevent urban flooding mainly resulted from the exceedance of existing storm sewer system capacity. Selected sewerage rehabilitation methods were examined under different storm return periods and compared to achieve the best value for money.