• Title/Summary/Keyword: Mechanism simulation

Search Result 2,657, Processing Time 0.034 seconds

A Sudden Increase in Combustion Pressure of Gas Generator of Ducted Rocket by Thermal Choking (열 질식에 의한 덕티드 로켓 가스 발생기의 연소 압력 상승)

  • Kim, Doyeong;Shin, Kyung-Hoon;Lee, Changjin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.8
    • /
    • pp.684-691
    • /
    • 2015
  • A sudden increase in combustion pressure is observed in the ducted rocket combustion test equipped with pipe shaped and converging nozzle exhaust tubes. This study aims to understand the physical mechanism of abrupt change in combustion pressure using thermal choking in the exhaust tube. Results confirmed that the thermal choking of the flow inside the exhaust tube was responsible for the sudden increase in combustion pressure. Also, high pressure exponent of solid propellants is critical sensitive to the occurrence of thermal choking exhaust pipe. Additionally, numerical simulation showed that the sudden increase in combustion pressure was less possible in diverging pipe because thermal choking is more reluctant to occur.

On Providing Anonymity in Ad Hoc Networks (Ad Hoc Network에서 익명성 제공에 관한 연구)

  • Kang, Seung-Seok
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.93-103
    • /
    • 2007
  • Networking environments are exposed to outside attacks and privacy threats. Due to broadcast nature of radio transmissions, wireless devices experience more vulnerable situations than those of wired network devices. This paper assumes that a wireless device has two network interfaces, one for accessing internet using 3G services, and the other for constructing an ad hoc network. To deal with privacy threats, this paper introduces an approach in which wireless devices form a special ad hoc network in order to exchange data using anonymous communications. One or more intermediate peers should be involved in the construction of an anonymous path. The proposed anonymous communication mechanism discourages traffic analysis and improves user privacy. According to simulation results, the anonymous connection in an ad hoc network prefers the intermediate peer(s) which is located near the source and/or the destination peer, rather than randomly-selected peers.

  • PDF

Real-Time Hybrid Broadcasting Algorithm Considering Data Property in Mobile Computing Environments (이동 컴퓨팅 환경에서 데이타 특성을 고려한 실시간 혼성 방송 알고리즘)

  • Yoon Hyesook;Kim Young-Kuk
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.339-349
    • /
    • 2005
  • For recent years, data broadcast technology has been recognized as a very effective data delivery mechanism in mobile computing environment with a large number of cli;ents. Especially, a hybrid broadcast algorithm in real-time environment, which integrates one-way broadcast and on-demand broadcast, has an advantage of adapting the requests of clients to a limited up-link bandwidth and following the change of data access pattern. However, previous hybrid broadcasting algorithms has a problem in the methods to get a grip on the change of data access Pattern. It is caused by the diminution of requests for the data items which are contained in periodic broadcasting schedule because they are already broadcasted. To solve this problem, existing researches may remove data items in periodic broadcasting schedule over a few cycles multiplying cooling factor or find out the requests of data items with extracting them on purpose. Both of them are the artificial methods not considering the property of data. In this paper, we propose a real-time adaptive hybrid broadcasting based on data type(RTAHB-DT) to broadcast considering data property and analysis the performance of our aigorithm through simulation study.

Performance Improvement of TCP SACK using Retransmission Fiailure Recovery in Wireless Networks (무선 네트워크에서 재전송 손실 복구를 통한 TCP SACK 성능 향상 방안)

  • Park, Cun-Young;Kim, Beom-Joon;Kim, Dong-Min;Han, Je-Chan;Lee, Jai-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.382-390
    • /
    • 2005
  • As today's networks evolve towards an If-based integrated network, the role of transmission control protocol(TCP) has been increasing as well. As a well-known issue, the performance of TCP is affected by its loss recovery mechanism that is comprised of two algorithms; fast retransmit and fast recovery. Although retransmission timeout(RTO) caused by multiple packet losses can be avoided by using selective acknowledgement(SACK) option, RTO cannot be avoided if a retransmitted packet is lost. Therefore, we propose a simple modification to make it possible for a TCP sender using SACK option to detect a lost retransmission. In order to evaluate the proposed algorithm, simulations have been performed for two scenarios where packet losses are random and correlated. Simulation results show that the proposed algorithm can improve TCP performance significantly.

Aerodynamic Design of a Canard Controlled 2D Course Correction Fuze for Smart Munition (카나드 기반의 지능탄 조종 장치 공력설계)

  • Park, Ji-Hwan;Bae, Ju-Hyeon;Song, Min-Sup;Myong, Rho-Shin;Cho, Tae-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.3
    • /
    • pp.187-194
    • /
    • 2015
  • Course correction munition is a smart projectile which improves its accuracy by the control mechanism equipped in the fuze section with canard. In this paper, various aerodynamic configurations of the fuze section were analysed by utilizing a semi-empirical method and a CFD method. A final canard configuration showing the least drag was then determined. During the CFD simulation, it was found that the k-${\omega}$ SST turbulence model combined with O-type grid base is suitable for the prediction of the base drag. Finally, the aerodynamic characteristics of the smart munition and the change of drag due to the canard installation were analysed.

A Range-Free Localization Algorithm for Sensor Networks with a Helicopter-based Mobile Anchor Node (센서 네트워크에서 모바일 앵커 노드(헬기)를 이용한 위치인식 알고리즘)

  • Lee, Byoung-Hwa
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.8
    • /
    • pp.750-757
    • /
    • 2011
  • Wireless Sensor Network is composed of a lot of sensor nodes that are densely deployed in a field. So generally this sensor nodes are spreaded using Helicopter or Fixed wing. Each node delivers own location and acquired information to user when it detects specific events. In this paper, we propose localization algorithm without range information in wireless sensor network using helicopter. Helicopter broadcasts periodically beacon signal for sensor nodes. Sensor nodes stored own memory this beacon signal until to find another beacon point(satisfied special condition). This paper develops a localization mechanism using the geometry conjecture(perpendicular bisector of a chord) to know own location. And the simulation results demonstrate that our localization scheme outperforms Centroid, APIT in terms of a higher location accuracy.

A Case Study of Heavy Snowfall with Thunder and Lightning in Youngdong Area (뇌전을 동반한 영동지역 대설 사례연구)

  • Kim, Hae-Min;Jung, Sueng-Pill;In, So-Ra;Choi, Byoung-Choel
    • Atmosphere
    • /
    • v.28 no.2
    • /
    • pp.187-200
    • /
    • 2018
  • The heavy snowfall phenomenon with thunder and lightning occurred in Yeongdong coastal region on 20 January 2017. Amount of snow on that day was a maximum of 47 cm and was concentrated in a short time (2 hours) at the Yeongdong coastal area. The mechanism of thundersnow was investigated to describe in detail using observational data and numerical simulation (Weather Research and Forecast, WRF) applied lightning option. The results show that a convective cloud occurred at the Yeongdong coastal area. The east wind flow was generated and the pressure gradient force was maximized by the rapidly developed cyclone. The cold and dry air in the upper atmosphere has descended (so called tropopause folding) atmospheric lower layer at precipitation peak time (1200 LST). In addition, latent heat in the lower atmosphere layer and warm sea surface temperature caused thermal instability. The convective cloud caused by the strong thermal instability was developed up to 6 km at that time. And the backdoor cold front was determined by the change characteristics of meteorological elements and shear line in the east sea. Instability indexes such as Total totals Index (TT) and Lightning Potential Index (LPI) are also confirmed as one of good predictability indicates for the explosive precipitation of convective rainfall.

An Energy-Efficient Sensor Network Clustering Using the Bridge Cluster (브리지 클러스터를 이용한 에너지 효율적 센서 네트워크 클러스터링)

  • Nam, Do-Hyun;Min, Hong-Ki
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.4
    • /
    • pp.279-284
    • /
    • 2007
  • There ate various studies being conducted regarding efficient routing schemes to reduce energy consumption in the wireless sensor network, for which energy transformation is difficult. In terms of routing, many believe that the dynamic clustering technique is most efficient. The dynamic clustering technique consists of cluster construction and data transmission. Energy consumption for data transmission is proportional to $d^2$ and $d^4$ around the crossover area. This paper proposed algorithms for reducing energy consumption by improving efficiency of the cluster construction process that in the dynamic cluster mechanism and minimizing long-distance data transmission outside the crossover area. The proposed algorithms reduced energy consumption by implementing bridge clusters in the crossover area and decreasing the data transmission distance. The benefits of the proposed algorithms were confirmed through simulation experiments.

  • PDF

WDMA protocol with collision avidance for high speed optical networks (고속 광통신망에서 충돌 회피를 위한 파장 분할 다중 액세스 프로토콜)

  • 이호숙;최형원;박성우;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.664-674
    • /
    • 1996
  • In high speed multi-wavelength networks, retransmission overhead due to desination conflict or control packet collision is one factor of performance degration because signal prpagation delay is much larger than the transmission time of data packet. In this paper, an efficient WDMA protocol with a collision avoidance mechanism is proposed for high speed WDM single-hop network with a passive star topology. In proposed protocol, each node has cource queues and routing table to store souting informatio. This architecture makes is possible to avoid any kind of collision when a node reserves the channel to transmit a data packet. High system thoughput and channel utilization can be achieved by proposed protocol since there are no discarded packets caused by any collision at transmission time. The performance of proposed protocol is evaluated in term of throughput and delay with variations in offered load. Simulation results show that the proposed protocol has superior performance to convertional protocols under nonuniform traffic as well as uniform traffic.

  • PDF

A Performance Evaluation of CF-Poll Piggyback Algorithm for HCCA (HCCA의 CF-Poll 피기백 알고리즘의 성능평가)

  • Lee Hyun-Jin;Kim Jae-Hyun;Cho Sung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.785-791
    • /
    • 2006
  • A CF-Poll frame which contains the channel reservation time can be piggybacked in QoS-Data frame to increase the channel efficiency in HCCA. However, if any QSTA in the network uses the low physical transmission rate, the QoS-Data frame which includes the CF-Poll frame must be transmitted by the minimum transmission rate. Therefore, it can cause the decrease of the channel efficiency and the increase of the frame transmission delay for other traffic streams when any QSTA has the low physical transmission rate. In this paper, we define this phenomenon as the piggyback problem at the low physical transmission rate and evaluate the effect of this problem. In the simulation results, when a CF-Poll piggyback is used, the delay is increased about 25% if any QSTA has the low physical transmission rate, while the delay is decreased about 7.8% if all QSTA has the high physical transmission rate. We also found that the gain of the CF-Poll piggyback mechanism is achieved when all QSTA has higher physical transmission rate than 24 or 36Mbps.