• Title/Summary/Keyword: Overflow

Search Result 785, Processing Time 0.031 seconds

Flow Analysis of Urban Combined Sewer by Personal Computer (개인 전산기를 이용한 도시합류관거의 흐름해석)

  • Jun, Byung Ho;Lee, Hyung Gee;Koo, Ja Kong;Shin, Hang Sik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.8 no.1
    • /
    • pp.127-140
    • /
    • 1988
  • The management of sewage and rainfall runoff becomes an emerging problem with the growth of urban communities. From the uncontrollable excess intensity or amount of rainfall, the conditions of sewer surcharge or manhole overflow could be generated in the combined sewer network where municipal or industrial wastewaters and rainfall runoff flow. The predictive model far the prevention of property and human life losses from this inundation was studied in this research. In the development of a mathematical flow model for the combined sewer surcharge and overflow, the Preissmann Slot concept and the four-point implicit method of finite difference were utilized. For the usage in personal computer, the overlapping segment method that required less memory storage was adopted. Through the simulation of hypothetical sewer network, the conservation of discharge volume was checked, and the usefulness of the Preissmann Slot was assured from the temporal distribution of discharge and depth along the sewer network. Also the possible field application for the correction of sewer diameters and slopes in the design of sewer network which has no surcharge/overflow condition was suggested.

  • PDF

A Study on Flood Discharge Capacity and Hydraulic Characteristic of Labyrinth Weir as a Side-Channel Spillway (래버린스 웨어를 적용한 측수로형 여수로의 홍수배제능력 및 수리학적 특성 연구)

  • Park, Sae-Hoon;Moon, Young-Il
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.1
    • /
    • pp.65-74
    • /
    • 2008
  • The small and medium sized dams have the fill dam type of a lot of occasions, which are often weak in cases of major floods. For this reason, although a countermeasure is in great need, due to the importance of the facilities and financial situations, no direct safety measures have been taken. In this study, in order to minimize construction expenditure for practical safety measures in cases of major floods, the overflow section of spillway has been analyzed focusing on how the overflow capacity will increase in the case of partially rebuilding a part of the overflow section of spillway favorable for hydraulic conditions. The Labyrinth weir and movable weir was chosen for reconstruction models of the overflow section. Moreover, for analyzing the after-effects of the reconstruction, a small scale dam was temporarily chosen for various experiments such as the hydraulic model testing and the three dimension numerical evaluation through the use of Flow-3D.

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.

Determination of Optimal Operation Water Level of Rain Water Pump Station using Optimization Technique (최적화 기법을 이용한 빗물펌프장 최적 운영수위 결정)

  • Sim, Kyu-Bum;Yoo, Do-Guen;Kim, Eung-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.7
    • /
    • pp.337-342
    • /
    • 2018
  • A rain water pumping station is a structural countermeasure to inland flooding of domestic water generated in a urban watershed. In this study, the optimal operation water level of the pump with the minimum overflow was determined based on the opinions of the person in charge of the operation of the rain water pump station. A GA (Genetic Algorithm), which is an optimization technique, was used to estimate the optimal operation water level of the rain water pump station and was linked with SWMM (Ver.5.1) DLL, which is a rainfall-runoff model of an urban watershed. Considering the time required to maximize the efficiency of the pump, the optimal operating water level was estimated. As a result, the overall water level decreased at a lower operating water level than the existing water level. For most pumps, the lowest operating water level was selected for the operating range of each pump unit. The operation of the initial pump could reduce the amount of overflow, and there was no change in the overflow reduction, even after changing the operation condition of the pump. Internal water flooding reduction was calculated to be 1%~2%, and the overflow occurring in the downstream area was reduced. The operating point of the pump was judged to be an effective operation from a mechanical and practical point of view. A consideration of the operating conditions of the pump in future, will be helpful for improving the efficiency of the pump and to reducing inland flooding.

Set up Reduction Goals of Combined Sewer Overflow Pollutant Load Using Long-Term Rainfall-Runoff Model Simulation (장기간 강우-유출 모의를 통한 합류식하수관로시스템의 월류부하량 저감목표 설정 연구)

  • Lee, Gunyoung;Na, Yongun;Ryu, Jaena;Oh, Jeill
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.35 no.11
    • /
    • pp.785-794
    • /
    • 2013
  • Combined sewer overflows during rainfall events contain sewer sediments and surface pollutants. This can cause significant chemical, physical and biological problems to receiving watershed. However, there are no method that can commonly apply to decide criteria for controlling the pollutant load. In this study, it sets up the reduction goals of combined sewer overflow through long-term simulation using the rainfall-runoff model. From a review of domestic and foreign management standard of combined sewer overflow for this, it makes decision that 60% (phase 1), 85% (phase 2) of total pollutant load and frequency per year for reduction goals is more proper. Also, the result of analyzing long-term simulation (minimum 10 years) applied to research basin indicates that reduction goals of BOD pollutant load are 1,123 kg (phase 1) and 2,374 kg (phase 2), and overflow volumes for research objective achievement are $11,685m^3$ (phase 1) and $24,701m^3$ (phase 2).

An ABR Rate-based Control Scheme Avoiding Access Point Buffer Overflow and Underflow during Handoffs in Wireless ATM Networks (무선 ATM망에서 핸드오프시 접속점 버퍼 오버플로우와 언더플로우를 방지하는 ABR 전송률 기반 제어 방안)

  • Ha, In-Dae;Oh, Jung-Ki;Park, Sang-Joon;Choi, Myung-Whan
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.527-539
    • /
    • 2001
  • The wireless asynchronous transfer mode (ATM) system has the advantage of providing the broadband services with various quality-of-service requirements to the mobile terminal efficiently by utilizing the ATM technology developed for the wired ATM system. The available bit rate (ABR) service among various ATM services utilizes the available bandwidth remaining in the ATM link, which allows the efficient bandwidth usage. During the handoff of the mobile terminal, however, the queue length in the access point (AP) which resides in the boundary of the wired ATM network and the wireless ATM network may increase abruptly. In this paper, we propose a scheme which prevents the buffer-overflow and buffer-underflow in the AP during the handoff of the wireless ABR connection in the wireless ATM system using binary feedback rate-based ABR traffic control. This scheme controls the source's cell generation rate during both handoff period and some time interval after the completion of the handoff procedure. The simulation results show that the proposed scheme prevents the buffer-overflow and buffer-underflow. The proposed scheme can contribute to increasing the throughput of the wireless ABR service during handoff by preventing the buffer overflow and underflow during handoff period.

  • PDF

A Study on Estimation of Levee Safety Map for Determining the Priority of River Maintenance (하천 유지관리 우선순위 결정을 위한 제방안전도맵 산정방법 연구)

  • Yoon, Kwang Seok;Kim, Sooyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.17-25
    • /
    • 2017
  • Owing to recent climate change, the scale of rainfall tends to increase gradually and the risk of flooding has increased. Therefore, the importance of improving the levee management and disaster response is increasing. Levee management in Korea is carried out at the level of damage recovery after the occurrence of damage. Therefore, it is necessary to develop a technology for predicting and managing the levee safety with proactive river management. In this study, a method to estimate the safety against erosion and overflow was suggested. A map of levee safety that can be used as basic data is presented by displaying the levee safety on the map. The levee erosion safety was calculated as the ratio of the internal and external force for each shore type. The levee overflow safety was calculated as the ratio of the maximum conveyance and design flood. The maximum conveyance was a discharge when the level of the river was equal to the level of the levee crown. The levee safety was classified into 5 grades: very safe, safe, normal, dangerous, and very dangerous. As a research area from downstream of Nam River Dam to Nakdong River Junction, the levee safety against erosion and overflow was estimated for all levees and all cross-sections of the river. The levee safety was displayed on a map using GIS. Through the levee safety map as a result of this study, the levee safety can be observed intuitively. Using the levee safety map, a maintenance plan for a river can be easy to build. This levee safety map can be used to help determine the priority of investment for efficient budget used.

Analysis and solution to the phase concentration and DC-like component of correlation result in Daejeon correlator (대전 상관기의 상관 결과에 나타난 유사 DC 성분과 위상 집중 현상에 대한 원인 분석과 해결 방법)

  • Roh, Duk-Gyoo;Oh, Se-Jin;Yeom, Jae-Hwan;Oh, Chung-Sik;Jung, Jin-Seung;Chung, Dong-Kyu;Yun, Young-Joo;Oyama, Tomoaki;Ozeki, Kensuke;Onuki, Hirofumi
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.3
    • /
    • pp.191-204
    • /
    • 2013
  • In this paper, we investigated the correlation outputs of Daejeon correlator at the viewpoints of the buffer memory setting related to the fine delay tracking and the under/overflow issue in FFT modules, in order to eliminate DC-like component and phase concentration to 0 degree. As the ring buffer memory is being used for the fine delay tracking, the DC-like component in correlation outputs is generated by improper setting of data read/write address, and then that address setting method is modified to exclude a polluted FFT segment in correlation processing when crossing the port/stream boundary. The phase concentration to 0 degree at beginning of bandpass is caused by inadequate scaling factors, which may be the origins of under/overflow occurred at internal computation of FFT stage. With the revised method of the ring buffer memory setting and the scaling factors in FFT, we could obtain higher signal-to-noise ratio and flux density, compared to the previous method, through the correlation processing of true observational data.

Video Streaming Receiver with Token Bucket Automatic Parameter Setting Scheme by Video Information File needing Successful Acknowledge Character (성공적인 확인응답이 필요한 비디오 정보 파일에 의한 토큰버킷 자동 파라메타 설정 기법을 가진 비디오 스트리밍 수신기)

  • Lee, Hyun-no;Kim, Dong-hoi;Nam, Boo-hee;Park, Seung-young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1976-1985
    • /
    • 2015
  • The amount of packets in palyout buffer of video streaming receiver can be changed by network condition, and saturated and exhausted by the delay and jitter. Especially, if the amount of incoming video traffic exceeds the maximum allowed playout buffer, buffer overflow problem can be generated. It makes the deterioration of video image and the discontinuity of playout by skip phenomenon. Also, if the incoming packets are delayed by network confusion, the stop phenomenon of video image is made by buffering due to buffer underflow problem. To solve these problems, this paper proposes the video streaming receiver with token bucket scheme which automatically establishes the important parameters like token generation rate r and bucket maximum capacity c adapting to the pattern of video packets. The simulation results using network simulator-2 (NS-2) and joint scalable video model (JSVM) show that the proposed token bucket scheme with automatic establishment parameter provides better performance than the existing token bucket scheme with manual establishment parameter in terms of the generation number of overflow and underflow, packer loss rate, and peak signal to noise ratio (PSNR) in three test video sequences.

Application of 3D point cloud modeling for performance analysis of reinforced levee with biopolymer (3차원 포인트 클라우드 모델링 기법을 활용한 바이오폴리머 기반 제방 보강공법의 성능 평가)

  • Ko, Dongwoo;Kang, Joongu;Kang, Woochul
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.3
    • /
    • pp.181-190
    • /
    • 2021
  • In this study, a large-scale levee breach experiment from lateral overflow was conducted to verify the effect of the new reinforcement method applied to the levee's surface. The new method could prevent levee failure and minimize damage caused by overflow in rivers. The levee was designed at the height of 2.5 m, a length of 12 m, and a slope of 1:2. A new material mixed with biopolymer powder, water, weathered granite, and loess in an appropriate ratio was sprayed on the levee body's surface at a thickness of about 5 cm, and vegetation recruitment was also monitored. At the Andong River Experiment Center, a flow (4 ㎥/s) was introduced from the upstream of the A3 channel to induce the lateral overflow. The change of lateral overflow was measured using an acoustic doppler current profiler in the upstream and downstream. Additionally, cameras and drones were used to analyze the process of the levee breach. Also, a new method using 3D point cloud for calculating the surface loss rate of the levee over time was suggested to evaluate the performance of the levee reinforcement method. It was compared to existing method based on image analysis and the result was reasonable. The proposed 3D point cloud methodology could be a solution for evaluating the performance of levee reinforcement methods.