• 제목/요약/키워드: Intercepted

검색결과 124건 처리시간 0.027초

KIERDISH II 태양열 집광시스템의 플럭스밀도 분포 (Flux Density Distribution of the Dish Solar Concentrator (KIERDISH II))

  • 강명철;강용혁;유성연
    • 한국태양에너지학회 논문집
    • /
    • 제24권4호
    • /
    • pp.11-18
    • /
    • 2004
  • A solar concentrator, named KIERDISH II, was built at KIER in order to investigate the feasibility of high temperature solar energy application system. The constructed concentrator is a dish type solar concentrator with a focal length of 4.68m and a diameter of 7.9m. To successfully operate KIERDISH II, optimal design of the absorber is very important and flux density distribution has to be known. The focal flux density distribution on the receiver was measured. We have observed the shape and size of flux images and evaluated percent power within radius. Flux density distribution is usually measured by a CCD(charge coupled device) camera and a radiometer. In this paper we present a flux mapping method to estimate the characteristic features of the flux density distribution in the focal region of solar concentrator. The minimum radius of receiver is found to be 0.15m and approximately 90% of the incident radiation is intercepted by receiver aperture.

SSL 프로토콜을 이용한 안전한 웹기반 교육용 온라인 게임 (On Securing Web-based Educational Online Game Using SSL Protocol)

  • 카댁 르스투 야니;요가 프리야나;프라노토 루스민;이경현
    • 수산해양교육연구
    • /
    • 제28권3호
    • /
    • pp.790-798
    • /
    • 2016
  • Currently, web-based online games is becoming popular in supporting learning process due to their effective and efficient tool. However, online games have lack of security aspect, in particular due to increase in the number of personal information leakage. Since the data are transmitted over insecure channel, it will be vulnerable of being intercepted by attackers who want to exploit user's identity. This paper aims to propose an online web-based educational game, Vidyanusa which allows the students to register their personal information using a unique code, a user name and a password. It manages the users according to their schools, subject teachers and class levels. In addition, by adopting a unique code, the confidentiality of the user identity can be kept away from attackers. Moreover, in order to provide a secure data communication between client and server, Secure Socket Layer (SSL) protocol is adopted. The performance of the system after implementing SSL protocol is examined by loading a number of requests for various users. From the experiment result, it can be concluded that the SSL protocol can be applied to web-based educational system in order to offer security services and reliable connection.

색광에 대한 쥐치의 반응 (Response of Filefish to the Colored Lights)

  • 양용림
    • 수산해양기술연구
    • /
    • 제17권1호
    • /
    • pp.7-11
    • /
    • 1981
  • The author carried out an experiment to find out the responsing patterns of filefish, Stepha nolepis cirrhifer (Temminck et Schlegel) to the color lights. The experimental tank (360LX50WX55H cm) was set up in a dark room. Six Longitudinal sections each being 60 em intervals are marked in the tank to observe the location of the fish. Water depth in the tank was kept 50 em level. Light bulbs of 20W were placed at the both ends of the tank to be projected the light horizontally into the tank. Two different colored filters were selected in combination from four' colors-red, blue, yellow, and white, and were placed in front of the light bulbs to make\ulcorner different light of color. Light intensity were controlled by use of auxiliary filters intercepted between the bulb and the filter. The fish were acclimatized in the dark for 40 minutes prior to employ in the experiment. Upon turning on the light, the number of fish in each section was counted 40 times in every 30 seconds, and the mean of the number of fish in each section was given as the gathering rate of the fish. The results obtained are as follows: 1. Color of light, to which the fish gathered abundantly was found in the named order of blue, white, green, and red. 2. The differences of gathering rate upon arbitary combined two color lights were shown significant, and the differences increased remarkably in accordance with the lapse of illuminating period.

  • PDF

Shear strengthening of reinforced concrete beams with rectangular web openings by FRP Composites

  • Abdel-Kareem, Ahmed H.
    • Advances in concrete construction
    • /
    • 제2권4호
    • /
    • pp.281-300
    • /
    • 2014
  • This study presents the experimental results of twenty three reinforced concrete beams with rectangular web openings externally strengthened with Fiber Reinforced Polymers (FRP) composites bonded around openings. All tested beams had the same geometry and reinforcement details. At openings locations, the stirrups intercepted the openings were cut during fabrication of reinforcement cage to simulate the condition of inclusion of an opening in an existing beam. Several design parameters are considered including the opening dimensions and location in the shear zone, the wrapping configurations, and the amount and the type of the FRP composites in the vicinity of the openings. The wrapping configurations of FRP included: sheets, strips, U-shape strips, and U-shape strips with bundles of FRP strands placed at the top and sides of the beam forming a fan under the strips to achieve closed wrapping. The effect of these parameters on the failure modes, the ultimate load, and the beam stiffness were investigated. The shear contribution of FRP on the shear capacity of tested beams with web openings was estimated according to ACI Committee 440-08, Canadian Standards S6-06, and Khalifa et al. model and examined against the test results. A modification factor to account for the dimensions of opening chords was applied to the predicted gain in the shear capacity according to ACI 440-08 and CSA S6-06 for bonded Glass Fiber Reinforced Polymers (GFRP) around openings. The analytical results after incorporating the modification factor into the codes guidelines showed good agreement with the test results.

IPTV 콘텐츠 보호를 위한 멀티캐스트 DRM 기반의 인증 시스템 설계 (Design on Authentication System Based Multicast DRM for Protection of IPTV Contents)

  • 김재우;김정재;김현철;전문석
    • 한국통신학회논문지
    • /
    • 제35권4B호
    • /
    • pp.713-720
    • /
    • 2010
  • 최근 IPTV는 초고속 통신망을 이용하여 가입자에게 정보 서비스, 동영상 콘텐츠 및 방송 등을 제공하는 서비스로 상용화 및 활성화되며 각광을 받고 있다. 현재 IPTV 시스템은 전송되는 콘텐츠 보호 및 인증을 위하여 CAS와 VOD 콘텐츠용 DRM 시스템을 결합하여 사용하고 있으나 시스템이 복잡하고 구축비용이 높다는 단점을 가지고 있다. 이를 개선하기 위하여 멀티캐스트 방식의 DRM 시스템이 대두되었으나 이 역시 악의적인 사용자에 의해 키가 유출될 경우 시청권한이 없는 사용자가 불법적인 방송시청을 할 수 있다는 문제점이 존재한다. 본 논문에서는 멀티캐스트 DRM 시스템에 사용자 인증 기법을 적용함으로써 악의적인 사용자로부터 콘텐츠를 보호할수 있는 기법을 제안한다.

금강 하류 홍수의 부정류 해석 (Unsteady Flow Analysis on Flood Characteristics in KEUM River Downstream)

  • 김현영;박승우
    • 물과 미래
    • /
    • 제22권1호
    • /
    • pp.99-107
    • /
    • 1989
  • 금강 하류는 감조 구간이며 여러개의 지류가 수지상을 형성하고 있고, 하천 단면의 지형이 불규칙한 것이 특징이다. 여기에 홍수가 발생할 경우 종래의 단순한 하도 홍수 추적법이나, 단일유로로 가정하는 지법 등으로는 만족할 만한 분석 결과를 얻을 수 없다. 따라서 본 연구에서는 수지상의 하천망으로 모형화하고 양형식의 차분법에 의한 부정류 해석법을 적용하여 1978년과 1987년 홍수를 대상으로 분석한 결과, 공주지점에서 5,000$m^3$/sec 내외가 하류할 경우 강경지점의 홍수에는 조석의 영향이 없었으며, 입포 지점의 협착부가 조석의 영향을 차단시키는 역할을 하고 있었다.

  • PDF

신호장치에 의한 ATS 신호장치 오동작 방지에 대한 연구 (A Study about Preventing Improper Working of Equipment on ATS System by Signaling Equipment)

  • 고영환;최규형
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2008년도 춘계학술대회 논문집
    • /
    • pp.579-587
    • /
    • 2008
  • Promotion of the line no.2 in Seoul Metro was changing from the existing signaling facilities for ATS(Automatic Train Stop) vehicles to the up-to-date signaling facilities for ATO(Automatic Train Operation). But, in consequence of conducting a trial run after being equipped with the ATO signaling facilities, the matter related to mix-operation with the existing ATS signaling facilities appeared. The operation of the existing ATS signaling system in combination with the ATO signaling system has made improper working related to frequency recognition of the ATS On-board Computerized Equipment. This obstructs operation of a working ATS vehicle. That is, as barring operation of an ATS vehicle that should proceed, it may make the proceeding ATS vehicle stop suddenly and after all, it will cause safety concerns. In this paper, we designed a wayside track occupancy detector that previously prevents improper working related to frequency recognition of the ATS On-board Computerized Equipment by gripping classification and working processes of operating trains throughout transmission of local signaling information from the existing facilities, which does not need to change or replace the existing signaling facilities. Furthermore, we described general characteristics of the wayside track occupancy detector and modeled the IFC(InterFace Contrivance) device and the logical circuit recognizing signal information. Then, we made an application program of PLC(programmable Logic Computer) based on the stated model. We, in relation to data transfer method, used the frame in TCP/IP transfer mode as the standard, and we demonstrated that ATO transmission frequency is intercepted.

  • PDF

중부(中部) 산림(山林) 지역(地域)의 증발산량(蒸發散量) 추정(推定) (Estimation of Evapotranspiration in a Forest Watershed in Central Korea)

  • 김재수
    • 한국산림과학회지
    • /
    • 제88권1호
    • /
    • pp.86-92
    • /
    • 1999
  • 증발산량은 산원 수자원의 제한 요인이며, 한편으로는 임목의 생장, 분포에 관여하는 중요한 생태계의 요인으로 인식되고 있다. 식생에 의한 증산은 주로 기상학적 요인에 의하여 좌우된다. 조사 유역의 하부는 수고 8m의 소나무로 밀생되어 있으며, 상부는 생장이 불량한 소나무와 참나무류가 산생하고 있다. 1993년도 강수, 유출 조사 자료를 이용하여 증발산량을 구하고, Penman-Monteith 모델의 수관저항을 정하여, 이 모델에 의한 산림지역의 일 증발산량의 계절적 변이를 추정하고자 하였다. 연간 증발산량은 590.3mm이었으며 수관저항값은 99s/m로 결정되었다. 연간 증발산량 중에서 5월의 증발산량이 106.4mm로 가장 큰 값을 나타내며 이는 식생에 의한 수관차단 및 증산의 영향을 반영하고 있었다.

  • PDF

안전한 전송을 위한 MRNS(Mixed Radix Number System)네트워크에서의 비밀 다중 경로의 설계 (The Design of Secret Multi-Paths on MRNS(Mixed Radix Numbers System) Network for Secure Transmission)

  • 김성열;정일용
    • 한국정보처리학회논문지
    • /
    • 제3권6호
    • /
    • pp.1534-1541
    • /
    • 1996
  • 경로 보안은 데이타의 전송을 위해 선택된 경로의 비밀성에 관한 것이다. 만일 경로의 일부분이라도 알려진다면 이 경로를 통해 전달된 데이타가 유출될 확률은 크 다. 이런 이유때문에 데이타의 전송경로는 보호되어야 하며 이를 위해 우리는 한 개 의 중간노드를 비밀리 선택하여 기존의 최단 거리를 이용하여 데이타를 전송하는 방 법을 선택하지 않고 이 중간 노드를 이용하여 데이타를 전송한다. 더 나아가 우리가 여러 개의 비밀경로를 이용한다면 한 개의 경로에 모든 데이타를 보내는 대신에 각 경로에 partial 데이타를 보낼 수 있기 때문에 데이타의 보안은 좀 더 강해진다. 이 러한 아이디어를 실현하기 위해 데이타는 정보분산 방법을 이용하여 여러개의 partial 데이타로 나누어진다. 본 논문에서는 위에서 제시한 아이디어를 네트워크상 에서 구현한다.

  • PDF

연못 생태계의 영양구조와 에너지 유전 (Trophic Structure and Energy Flow of a Pond Ecosystem)

  • 정연숙
    • Journal of Plant Biology
    • /
    • 제25권3호
    • /
    • pp.123-133
    • /
    • 1982
  • The tropic structure and the function of a small pone ecosystem under the tree stand were studied in terms of energy flow. About 28% of total solar radiation was intercepted by the tree canopy over the pond. Primary producers converted 1.1%(3,382 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$) of solar radiation (320,000 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$) into gross primary production. The amount of energy availble to the pond snail was 1,683 kcal.m-2.y-1 of the net production by primary producers and 1,033 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$ of the litter fallen into the pond. The amount of gross secondary production by the pond snail was 245 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$. Judging from these, supply of both net primary production and the litter was indispensable for the maintenance of the pond ecosystem. The total amont of energy as gross primary production plus litter was 4,415 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$(100%). Since the total respiration loss was calculated to be 1,917 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$(43.4%), the rate of energy accumulation in the pond estimated to 56.6%.

  • PDF