• Title/Summary/Keyword: Lock-on

Search Result 886, Processing Time 0.029 seconds

Lock-on Characteristics of wake behind a Rotationally Oscillating Circular Cylinder (주기적으로 회전진동하는 원주 후류의 공진특성)

  • Lee Jung Yeop;Lee Sang Joon
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.18-21
    • /
    • 2004
  • Lock-on characteristics of the flow around a circular cylinder performing a rotationally oscillation with a relatively high forcing frequency have been investigated experimentally using flow visualization and hot-wire measurements. Dominant parameters are Reynolds number (Re), amplitude of oscillation $(\theta_A)$, and frequency ratio $F_R=f_f\;/\;f_n$, where $f_f$ is the forcing frequency and if is the natural frequency of vortex shedding. Experiments were carried out under the conditions of $Re=4.14\times10^3,\;\pi/15\leq\theta_A\leq\pi/3$, and $F_R=1.0$. The effects of this active control technique on the lock-on flow regime of the cylinder wake were evaluated through wake velocity measurements and spectral analysis of hot-wire signals. The rotary oscillation modified the flow structure of near wake significantly. The lock-on phenomenon was found to occur in the range of frequency encompassing the natural vortex shedding frequency. In addition, when the amplitude of oscillation is less than a certain value, the lock-on phenomenon was occurred only at $F_R=1.0$. The lock-on range expanded and vortex formation length decreased as the amplitude of oscillation increases. The rotary oscillation generated small-scale vortex structure just near the cylinder surface.

  • PDF

User Expectations and Preferences of Door Lock Control Devices (문 잠금 조정장치에 관한 사용자 기대 및 선호도)

  • Jung, Hwa S.;Jung, Hyung-shik
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.4
    • /
    • pp.283-291
    • /
    • 2003
  • The purposes of this study are to investigate the stereotype of position and direction that users expect door lock control devices in different orientations, and to collect information regarding preferred door lock design and orientations. Six hundred subjects aged from lOs to 60s were surveyed under the operating conditions of three different door locks(cylindrical, circular-type, and lever-type auxiliary locks) mounted on the miniature door in two different orientations(right and left side). The door locks presented to the subjects were the most widely used door locks in our living environment. The results indicated that if the door locks were seen from the inside, 59~67% of the subjects expected 'vertical' position locking depending on the door lock control types, cylinder or auxiliary lock. When the door locks were seen from the outside, the locking direction of door lock control was not consistent either 'clockwise' or 'counterclockwise'. It was rather dependent on the orientation of the door lock positions. As a concluding remark, it is better to design and install door lock control devices in the way that users expect them to work.

A Study on the Wireless Door Lock System with Advanced Encryption Standard(AES) in Design (암호화기술을 적용한 무선 도어락시스템 디자인에 대한 연구)

  • 유보현
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.179-190
    • /
    • 2004
  • The human effort to make personal privacy and safety from outer environment has brought the improvement of security system through the technological development. Especially as a apartment dwelling and lifestyle is general, the role and function of door lock system is more important than ever. The research for user-centered approach and design on the door lock system should be implemented under the circumstances. This study has focused on the development of making safety as well as easy interface to design door lock system. The price also is competitive as compared with other door lock products. The goal of this study is to propose the alternatives not only to develop door lock design but also to search the innovative way of locking system design.

  • PDF

A Study on the Operational Utilization Levels of Lock Gates in Inchon Port (인천항 갑문의 운영 수준에 관한 연구)

  • 구자윤
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2002.03a
    • /
    • pp.13-19
    • /
    • 2002
  • In inner harbour of Inchon Port, there are two lock gates (50KT, 10KT) which have two gates per lock gate in inner/outer sides except a gate in inner harbour side 7f 10KT. Due to the lack of the fore-mentioned gate, the use of 10KT lock gate Is suspended in every 3 years for regular maintenance. Now an additional gate is under construction in order to improve the efficiency of the 10KT lock gate. This paper will be aimed to evaluate the operational utilization levels of lock gates in present and future. The present operational utilization levels of lock gates are 0.2119 in 10KT lock gate, 0.2051 in 50KT lock gate which were considered the 46.5 closed days every 3 years for 10KT regular maintenance. The levels are estimated to 0.2246(10KT), 0.2539(50KT) in 2006 and 0.2241(10KT), 0.2560(50KT) in 2011. The levels of 50KT lock gate are evaluated to be more rapidly increased up to 24.5% in 2011.

  • PDF

A proposal of Circular Lock Pattern Method on Smart phone (원형 스마트폰 잠금 패턴 방식 제안)

  • Im, Ji-woo;Lee, Seung-jay;Jang, Won-jun;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1471-1477
    • /
    • 2019
  • Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users' smart phones don't support biometric security. The most convenient security method for devices that don't support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It's expected to solve vulnerability.

A NUMERICAL STUDY ON THE ROLL LOCK-IN OF A CANARD-CONTROLLED MISSILE WITH FREELY SPINNING TAILFINS (자유회전 테일핀을 갖는 미사일에 대한 Roll Lock-in 현상의 수치적 연구)

  • Yang, Y.R.;Kim, M.S.;Myong, R.S.;Cho, T.H.
    • Journal of computational fluids engineering
    • /
    • v.14 no.4
    • /
    • pp.48-55
    • /
    • 2009
  • In this study, roll lock-in phenomena of freely spinning tailfins were investigated by a CFD code. To analyze a motion of freely spinning tailfins, this research use a Chimera method, an Euler code and a 6 degrees of freedom analysis. The numerical results of aerodynamic characteristics and roll rates of a canard-controlled missile with freely spinning tailfins show a good agreement with wind tunnel test results. Using the roll rates calculation result of freely spinning tailfins, roll lock-in phenomena is confirmed. Roll lock-in phenomena and Roll lock-in states can be predicted through effects of the induced vortex of the canards control and the analysis of the rolling moments of tailfins due to the bank angle.

A Fast lock-on time Delay Locked Loop with selective starting point (빠른 lock-on time을 위한 선택적 시작점을 갖는 DLL)

  • 김신호;장일권;곽계달
    • Proceedings of the IEEK Conference
    • /
    • 2000.11b
    • /
    • pp.79-82
    • /
    • 2000
  • This paper describes a delay locked loop with selective starting point for use in a high-frequency systems. SSRDLL (selective starting point RDLL) has been simulated in a 0.25$\mu\textrm{m}$ standard n-well CMOS process parameter to realize a fast lock-on time. This DLL is shown to be insensitive to variations in PVTL. The simulated lock time of the proposed SSRDLL is within 4 clock cycles at 333㎒ clock input.

  • PDF

A study on the second edition of Koryo Dae-Jang-Mock-Lock (고려재조대장목록고)

  • Jeong Pil-mo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.17
    • /
    • pp.11-47
    • /
    • 1989
  • This study intends to examine the background and the procedure of the carving of the tablets of the second edition of Dae-Jang-Mock­Lock(재조대장목록). the time and the route of the moving of the tablets. into Haein-sa, and the contents and the system of it. This study is mainly based on the second edition of Dae-Jang-Mock-Lock. But the other closely related materials such as restored first. edition of the Dae- Jang-Mock-Lock, Koryo Sin-Jo-Dae-Jang-Byeol-Lock (고려신조대장교정별록). Kae-Won-Seok-Kyo-Lock (개원석교록). Sok-Kae­Won-Seok-Kyo-Lock (속개원석교록). Jeong-Won-Sin-Jeong-Seok-Kyo­Lock(정원신정석교록), Sok-Jeong-Won-Seok-Kyo-Lock(속정원석교록), Dea-Jung-Sang-Bu-Beob-Bo-Lock(대중상부법보록), and Kyeong-Woo-Sin-Su-Beob-Bo-Lock(경우신수법보록), are also analysed and closely examined. The results of this study can be summarized as follows: 1. The second edition of Tripitaka Koreana(고려대장경) was carved for the purpose of defending the country from Mongolia with the power of Buddhism, after the tablets of the first edition in Buin-sa(부이사) was destroyed by fire. 2. In 1236. Dae-Jang-Do-Gam(대장도감) was established, and the preparation for the recarving of the tablets such as comparison between the content, of the first edition of Tripitalk Koreana, Gal-Bo-Chik-Pan-Dae­Jang-Kyeong and Kitan Dae- Jang-Kyeong, transcription of the original copy and the preparation of the wood, etc. was started. 3. In 1237 after the announcement of Dae-Jang-Gyeong-Gak-Pan-Gun­Sin-Gi-Go-Mun(대장경핵판군신석고문), the carving was started on a full scale. And seven years later (1243), Bun-Sa-Dae-Jang-Do-Gam(분사대장도감) was established in the area of the South to expand and hasten the work. And a large number of the tablets were carved in there. 4. It took 16 years to carve the main text and the supplements of the second edition of Tripitaka Koreana, the main text being carved from 1237 to 1248 and the supplement from 1244 to 1251. 5. It can be supposed that the tablets of the second edition of Tripitaka Koreana, stored in Seon-Won-Sa(선원사), Kang-Wha(강화), for about 140 years, was moved to Ji-Cheon-Sa(지천사), Yong-San(용산), and to Hae-In-Sa(해인사) again, through the west and the south sea and Jang-Gyeong-Po(장경포), Go-Ryeong(고령), in the autumn of the same year. 6. The second edition of Tripitaka Koreana was carved mainly based on the first edition, comparing with Gae-Bo-Chik-Pan-Dae-Jang-Kyeong(개보판대장경) and Kitan Dae-Jang-Kyeong(계단대장경). And the second edition of Dae-Jang-Mock-Lock also compiled mainly based on the first edition with the reference to Kae-Won-Seok-Kyo-Lock and Sok-Jeong-Won-Seok-Kyo-Lock. 7. Comparing with the first edition of Dae-Jang-Mock-Lock, in the second edition 7 items of 9 volumes of Kitan text such as Weol-Deung­Sam-Mae-Gyeong-Ron(월증삼매경론) are added and 3 items of 60 volumes such as Dae-Jong-Ji-Hyeon-Mun-Ron(대종지현문논) are substituted into others from Cheon chest(천함) to Kaeng chest(경함), and 92 items of 601 volumes such as Beob-Won-Ju-Rim-Jeon(법원주임전) are added after Kaeng chest. And 4 items of 50 volumes such as Yuk-Ja-Sin-Ju-Wang-Kyeong(육자신주왕경) are ommitted in the second edition. 8. Comparing with Kae-Won-Seok-Kyo-Lock, Cheon chest to Young chest (영함) of the second edition is compiled according to Ib-Jang-Lock(입장록) of Kae-Won-Seok-Kyo-Lock. But 15 items of 43 vol­umes such as Bul-Seol-Ban-Ju-Sam-Mae-Kyeong(불설반주삼매경) are ;added and 7 items of 35 volumes such as Dae-Bang-Deung-Dae-Jib-Il­Jang-Kyeong(대방등대집일장경) are ommitted. 9. Comparing with Sok-Jeong-Won-Seok-Kyo-Lock, 3 items of the 47 volumes (or 49 volumes) are ommitted and 4 items of 96 volumes are ;added in Caek chest(책함) to Mil chest(밀함) of the second edition. But the items are arranged in the same order. 10. Comparing with Dae- Jung-Sang-Bo-Beob-Bo-Lock, the arrangement of the second edition is entirely different from it. But 170 items of 329 volumes are also included in Doo chest(두함) to Kyeong chest(경함) of the second edition, and 53 items of 125 volumes in Jun chest(존함) to Jeong chest(정함). And 10 items of 108 volumes in the last part of Dae-Jung-Sang-Bo-Beob-Bo-Lock are ommitted and 3 items of 131 volumes such as Beob-Won-Ju-Rim-Jeon(법원주임전) are added in the second edition. 11. Comparing with Kyeong-Woo-Sin-Su-Beob-Bo-Lock, all of the items (21 items of 161 volumes) are included in the second edition without ;any classificatory system. And 22 items of 172 volumes in the Seong­Hyeon-Jib-Jeon(성현집전) part such as Myo-Gak-Bi-Cheon(묘각비전) are ommitted. 12. The last part of the second edition, Joo chest(주함) to Dong chest (동함), includes 14 items of 237 volumes. But these items cannot be found in any other former Buddhist catalog. So it might be supposed as the Kitan texts. 13. Besides including almost all items in Kae-Won-Seok-Kyo-Lock and all items in Sok-Jeong-Won-Seok-Kyo-Lock, Dae-Jung-Sang-Bo­Beob-Bo-Lock, and Kyeong-Woo-Sin-Su-Beob-Bo-Lock, the second edition of Dae-Jang-Mock-Lock includes more items, at least 20 items of about 300 volumes of Kitan Tripitaka and 15 items of 43 volumes of traditional Korean Tripitake that cannot be found any others. Therefore, Tripitaka Koreana can be said as a comprehensive Tripitaka covering all items of Tripitakas translated in Chinese character.

  • PDF

Development of Real Time Information Service Model Using Smart Phone Lock Screen (스마트 폰 잠금 화면을 통한 실시간 정보제공 서비스 모델의 개발)

  • Oh, Sung-Jin;Jang, Jin-Wook
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.323-331
    • /
    • 2014
  • This research is based on real-time service model that uses lock screen of smart devices which is mostly exposed to device users. The potential for lock screen space is immense due to their exposing time for user. The effect can be maximized by offering useful information contents on lock screen. This service model offers real-time keyword with abridged sentence. They match real-time keyword with news by using text matching algorithm and extracts kernel sentence from news to provide short sentence to user. News from the lock screen to match real-time query sentence, and then only to the original core of the ability to move a user evaluation was conducted after adding. The report provided a key statement users feel the lack of original Not if you go to an average of 5.71%. Most algorithms allow only real-time zoom key sentence extracted keywords can accurately determine the reason for that was confirmed.

The Implementation of Non-contact Door-lock System for Preventing Fingerprint (비접촉식 지문방지 도어락 시스템 구현)

  • Kim, Hyun Ok;Moon, Kwang Soo;Kim, Seung Gyu;Kim, Doo Yong;Kim, Kiwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.13 no.4
    • /
    • pp.77-81
    • /
    • 2014
  • There have been developed in authentication systems for information using biometric information approaches such as fingerprint, face, and iris. In general, a door-lock system is operated by touching keypads, which remains fingerprints on the keypads. Such door-lock systems do not protect personal information from others due to the exposure of fingerprints to keypads. In this paper, we propose the new door-lock system that does not leave fingerprints on the keypads. Without touching keypad the system works because the system accepts authentication information by using illuminance sensor and LED. The experiment shows that the implemented door-lock system works well under any circumstance.