• Title/Summary/Keyword: Intercepted

Search Result 124, Processing Time 0.03 seconds

Analysis of Intercepted Flow Characteristics by Accumulated Debris (부유잡목에 의한 흐름차단이 하천에 미치는 영향 분석)

  • Choi, Gye-Woon;Kim, Young-Gyu;Hwang, Young-Man;Cho, Sang-Wook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.846-850
    • /
    • 2007
  • In this study debris like branch or trash are washed and flowed from land to stream by rainfall runoff at mountain or urban stream specially rainy season. These kinds of debris are accumulated at hydraulic construct on the way of flow along the stream. The shape or ratio of like these accumulated debris are various according to the location where it is accumulated and the material what it is, so that it is influenced to be varied to flow characteristics. To be simple of accumulated debris shape, it was made experiments though the variation of open ratio and the shape of accumulated debris by lab experiment using straight channel with two piers. From the result, the water level is inverse proportion to open ratio, and the water level more sensitive to the debris‘ width than length at the same area of accumulated debris.

  • PDF

Classification of the Scolytidae and Platypodidae Intercepted from Imported Timbers III (수입재해충 나무좀류의 분류 III 나무좀과와 긴나무좀과)

  • Choo H.Y.;Woo K.S.
    • Korean journal of applied entomology
    • /
    • v.22 no.1 s.54
    • /
    • pp.34-41
    • /
    • 1983
  • The twelve species of Scolytidae and six species of Platypodidae were recognized from imported logs at Incheon, Gunsan and Busan ports. One species, Hypothenemus hampei (Ferrari) of Scolytidae was identified from coffee bean. These species were not reported before from imported logs and seeds. Scolytidae Platypodidae Scolytus frontalis Blandford Crossotarsus nitens Chapuis Hylurgopsl gabratus Zetterstedt P. lepidus Chapuis Gnathotricus sulcatus (Leconte) Diapus quinquespinatus Chapuis Hypothenemus hampei (Ferrari) Genyocerus abdominalis Schedi Ips concinuus (Mannerheim) G. compactus Schedl Poecilips subcribrosus (Blandford) G. sexporus (Schedl) xyleborus agnatus Eggers X. cognatus Blandford X. emarginatus Eichnoff X. mascarensis Eichhoff X. pseudomajor Schedl X. pseudopilifer Schedl.

  • PDF

A Study on Energy Distributions Produced by Dish Solar Concentrating System (접시형 태양열 집광 시스템의 에너지 분포 특성에 관한 연구)

  • 현성택;강용혁;천원기
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.14 no.11
    • /
    • pp.907-913
    • /
    • 2002
  • An experimental study on energy density distributions produced by dish solar concentrating system was performed to optimally design and rightly position a cavity receiver. This deemed also very useful to find and correct various errors associated with a concentrator. It is observed that the actual focal length is 2.17 m with a maximum energy density of 1.89 MW/$m^2$. By evaluating the position of flux centroid, it was found that there are errors within 2 cm from the target center. As a result of the percent power within radius, approximately 90% of the incident radiation is intercepted by about 0.06 m radius. The area concentration ratio normalized to 800 W/$m^2$ insolation and 90% mirror reflectivity was 347 suns. The total integrated power of 2467 W was measured under focal flux distributions, which corresponds to the intercept rate of 85.8%.

The TOR Data Communication System

  • Haraty, Ramzi A.;Zantout, Bassam
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.415-420
    • /
    • 2014
  • Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.

Evaluating Online Courses in light of Quality Matters (QM) Standards at Umm Al-Qura University

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.165-174
    • /
    • 2021
  • This study aimed to ascertain whether electronic courses at the deanship of electronic learning and distance education at Umm Al-Qura University meet the quality standards developed by the Quality Matters (QM) organization. This endeavor adopted a mixed method of an explanatory sequential research design for an in-depth understanding of the topic under scrutiny. The sample of the study consisted of ten courses designed at the deanship and reviewed using an evaluation form. The results showed that the courses in focus did not meet the criteria of QM. Based on this finding, a semi-structured interview was designed to collect relevant data from the syllabus designers at the deanship. The interviews yielded information on the difficulties the course designers faced when designing QM-criteria-based courses. The results obtained from the interviews showed that the designers experienced administrative, technical, and faculty-member-related challenges that, when producing online courses, intercepted their way to achieving the QM standards. The study closed with some recommendations, the most important of which is a call for re-developing online courses in alignment with the well-recognized QM standards.

A study on the risk of taking out specific information by VoIP sniffing technique (VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구)

  • Lee, Donggeon;Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

Intercepted flow equation at grate inlet on road (도로 빗물받이 유입구의 차집유량 산정식)

  • Kim, Jung Soo;Kwak, Sang Ho;Ryu, Taek Hee;Yoon, Sei Eui
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.6
    • /
    • pp.537-549
    • /
    • 2016
  • The grate inlets generally were installed to intercept surface runoff on the roads and intercepted flow was drained to the underground sewer system. The equation of interception flow was used to determine the size and spacing of grate inlet on the roads. Therefore, it is necessary to analyze the interception capacity of grate inlet. Hydraulic experimental apparatus which can be changed with the longitudinal slopes(2, 4, 6, 8, 10%) of street, the transverse slopes(2, 4, 7, 10%), and the lengths(50, 100, 150cm) of grate inlet was installed for this study. The range of the experimental discharges were calculated with change of road lanes(2, 3, 4) and design frequencies(5, 10, 20, 30year). As the transverse slope increased, it led to the increase of interception capacity at grate inlets. The long lengths of grate inlet with direction of flow increased the interception capacity by the increase of side inflow. On the basis of the hydraulic model experiment results, the empirical equations for calculation of the interception capacity were derived with regression analysis. As a result of comparison with equations, the suggested equation of this study was estimated reasonable one for increased design frequency. Therefore, this study can suggest the basic data for design of drainage facility at road.

A STUDY ON THE AIR SCREEN IN WATER 1. Experiments on the Air Screen Effects for Driving and Intercepting Fish School (어업용 수중 기포막에 관한 연구 1. 기포막에 의한 어군의 차단 및 구집 실험)

  • PARK Jung-Heui
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.5 no.2
    • /
    • pp.50-56
    • /
    • 1972
  • This study has been carried out to observe the driving and the intercepting effects of air screen on some sea-water fishes ; Chrysophrys major, Mylio macrocephalus, Fugu pardalis. 1. By perforating fine holes on the compressed air pipes, air screen was formed in the water, and this screen was set at $45^{\circ}$, and $90^{\circ}$ against the fish passage to observe the reactions on the part of the fish. 2. Changes were given to the location of the air screen in the water to observe how the air screen drived the fish to its direction. 3. The effective distance between holes on the air piprs was determined by a series of experiments of setting up two air screens of various types in hole distance, by moving a screen to-ward the other, and of observing the distance between two screens when fish eseape through the space. The results of the above experiments observed as follows were : 1. The passage of fish was effectively intercepted by setting up the air screens at 45 degrees against the fish passage and it was also intercepted when the screen was set at 90 degrees against the passage. 2. Fish could be driven by moving the air screen toward the fish. 3. The air screen formed from the pipe above than 0.3mm in diameter was effective, but less than 0.2mm was not sufficiently effective. 4. The strength of the air pressure in the pipe should be higher than $0.087kg/cm^2$. 5. The fish holding ability to obtain effective air screen was ranged as following when the air pressure was $0.160kg/cm^2$. and the hole diameter was 0.3mm on the 12.6mm pipe, depending upon the intervals of the holes on the pipe: The shortest distance which could hold fish between two screens was 59.4cm when the holes were perforated at every 40cm; 33.5cm when at every 30cm; 28.75cm when at every 10cm: and 27.25cm when at every 5cm. Thus, no significant change was at served when the holes were perforated more densely than 30cm intervals. Therefor the hole intervals should be 30cm in designing fishing gear employing air screen.

  • PDF

Rotated Video Detection using Multi Region Binary Patterns (이중 영역 이진 패턴을 이용한 회전된 비디오 검출)

  • Kim, Semin;Lee, Seungho;Ro, Yong Man
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.9
    • /
    • pp.1070-1075
    • /
    • 2014
  • Due to a number of illegal copied videos, many video content markets have been threatened. Since this copied videos have intercepted the profits of the content holders, content developers lose the will to generate new contents. Therefore, video copy detection approaches have been developed to protect the copyrights of video contents. However, many illegal uploader who generate copied videos used video transformations to avoid video copy detection systems. Among of the video transformations, rotation and flipping did not distorted the quality of video contents. Thus, these two video transformations were adopt to generate copied video. In order to detect rotated or flipping copy videos, rotation and flipping robust region binary pattern (RFR) recently was proposed. But, this RFR has a weakness according to rotated angles. Therefore, in order to overcome this problem, multi region binary patterns are proposed in this paper. The proposed method has the similar performance with the original RFR. But, it showed much higher efficiency for memory spaces.

A Study on the Principles of Regional Perspirations (부위별(部位別) 한출(汗出)의 기전(機轉)에 대한 연구(硏究))

  • Lyu, Jeong-Ah;Jeong, Chang-Hyun
    • Journal of Korean Medical classics
    • /
    • v.22 no.1
    • /
    • pp.71-85
    • /
    • 2009
  • For having good therapeutic value, putting the ideal of diagnosis and treatment based on overall analysis of symptoms and signs[辨證施治] into practice is very important, so the Eastern Medicine's peculiar diagnosis without interference by the western medical diagnosis is very important. The peculiar method of Eastern Medicine's diagnosis is four methods of diagnosis(四診法), a joint term for inspection, auscultation and olfaction, interrogation, pulse feeling and palpation. In the process of interrogation[問診], from analyzing the perspiration phase, doctor can get various physical information. Especially perspiration from particular region can be a clue for founding focus or cause of disease. This thesis divide the phase of perspiration into eight bodily region, perspiration from all body, head, face, back, chest and armpit, stomach, pubic region and lower part, hands and feet, and inquire the possible causes and principles of these perspirations. In conclusion, the regional perspiration can be a clue point out the origin of fever and condition of Gi(氣) flow. Perspiration from head, back, chest and armpit, hands and feet means that certain fever cannot extend to the outside of body, and at the same time, means the Gi(氣) flow of outside is being intercepted. So the perspirations from that region become an object of medical treatment.

  • PDF