• Title/Summary/Keyword: Sink hole

Search Result 46, Processing Time 0.025 seconds

Heat Flow Analysis in the Newly Developed Wave Heat Sink by Computational Simulation (전산모사에 의한 웨이브 히트싱크의 열유동 특성 해석)

  • Lee In-Gyu;Lee Sang-Woong;Kang Kae-Myung;Chang Si-Young
    • Korean Journal of Materials Research
    • /
    • v.14 no.12
    • /
    • pp.870-875
    • /
    • 2004
  • Heat flow characteristics in the newly developed Wave Heat Sink were analyzed under natural and forced convections by Icepak program using the finite volume method. Temperature distribution and thermal resistance of Wave Heat Sink with/without air vent hole on the top of fin were compared with those of a commercial Al extruded heat sink(Intel Heat Sink). Under the natural convection, the maximum temperature was $45.1^{\circ}C$ in the air vent hole typed Wave Heat Sink, which was superior to that of Intel Heat Sink. The thermal resistance was $2.51^{\circ}C/W$ in the air vent hole typed Wave Heat Sink, and it changed to $2.65^{\circ}C/W\;and\;2.16^{\circ}C/W$ with changes of gravity direction and fin height, respectively. Under the forced convection, the maximum temperature became lower than that under the natural convection. In addition, the thermal resistance lowered in the air vent hole typed Wave Heat Sink with higher fin height and it decreased with increasing the air flux.

Multiple Sink Nodes to Improve Performance in WSN

  • Dick, Mugerwa;Alwabel, Mohammed;Kwon, Youngmi
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.6
    • /
    • pp.676-683
    • /
    • 2019
  • Wireless Sensor Networks (WSNs) consist of multiple tiny and power constrained sensors which use radio frequencies to carry out sensing in a designated sensor area. To effectively design and implement reliable WSN, it is critical to consider models, protocols, and algorithms that can optimize energy consumption of all the sensor nodes with optimal amount of packet delivery. It has been observed that deploying a single sink node comes with numerous challenges especially in a situation with high node density and congestion. Sensor nodes close to a single sink node receive more transmission traffic load compared to other sensors, thus causing quick depletion of energy which finally leads to an energy hole and sink hole problems. In this paper, we proposed the use of multiple energy efficient sink nodes with brute force technique under optimized parameters to improve on the number of packets delivered within a given time. Simulation results not only depict that, deploying N sink nodes in a sensor area has a maximum limit to offer a justifiable improvement in terms of packet delivery ratio but also offers a reduction in End to End delay and reliability in case of failure of a single sink node, and an improvement in the network lifetime rather than deploying a single static sink node.

Theoretical and Numerical Analysis of Sink Flows under a Background Rotation (배경회전이 있는 싱크 유동의 이론 및 수치해석)

  • Suh Yong Kweon;Yeo Chang Ho
    • Journal of the Korean Society of Visualization
    • /
    • v.2 no.2
    • /
    • pp.38-44
    • /
    • 2004
  • Theoretical and numerical studies are given to the sink flows within a rotating circular tank driven by the fluid withdrawal from a bottom circular hole. It was found that, when the upper free surface was set with no-slip boundary conditions, the Ekman boundary-layer develops not only above the bottom surface but under the top surface. The sink fluid is coming from the two Ekman layers, and the mass transfer from the bulk, inviscid region is dependent on the rotational speed. It is also remarkable to see that all the fluid gathered along the axis flows in a form of rapidly rotating fluid column haying almost the same diameter as the bottom hole.

  • PDF

A Case Study for Construction Hazard Zonation Maps and its Application (석회암 지역 재해 등급도 작성 및 응용에 관한 사례 연구)

  • 정의진;윤운상;김중휘;마상준;김정환;이근병
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2002.03a
    • /
    • pp.165-172
    • /
    • 2002
  • We presents an hazard zonation mapping technique in karst terrain and its assessment. From the detailed engineering geological mapping. Controlling factors of sink hole and limestone cave formation were discussed and 4 main hazard factors affecting hazard potential are identified as follows: prerequisite hazard factor(distributions of pre-existing sink holes and cavities), geomorphological hazard factors(slope gradient, vegetation, and drainage pattern etc.) geological hazard factors(lithology, fracture patterns and geological structures etc.) and hydraulic conditions(hydraulic head, annual fluctuation of ground water table and composition of g/w water). From the construction of hazard zonation map along the Jecheon-Maepo area, and vertical cross-sectional hazard zonations specific tunnel site we suggest hazard zonation rating systems.

  • PDF

Operating Characteristics of LED Package Heat-sink with Multi-Pin's (멀티-핀을 갖는 LED 패키지 방열장치의 동작특성)

  • Choi, Hoon;Han, Sang-Bo;Park, Jae-Youn
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.7
    • /
    • pp.1-12
    • /
    • 2014
  • This paper is proposed to design the new heat-sink apparatus for improving the heat transfer characteristics in the power LED chip, and results of the operation characteristics were discussed. The core design is that the soldering through-hole on the FR-4 PCB board is formed to the effective heat transfer. That is directly filled with Ag-nano materials, which shows the high thermal conductivity. The heat transfer medium consisting of Ag-nano materials is classified into two structures. Mediums are called as the heat slug and the multi-pin in this work. The heat of the high temperature generated from the LED chip was directly transferred to the heat slug of the one large size. And the accumulated heat from the heat slug was quickly dissipated by the medium of the multi-pin, which is the same body with the heat slug. This multi-pin was designed for the multi-dissipation of heat by increasing the surface areas with a little pins. Subsequently, the speed of the heat transfer with this new heat-sink apparatus is three times faster than the conventional heat-sink. Therefore, the efficiency of the illuminating light will be improved by adapting this new heat-sink apparatus in the large area's LED.

A Sink Flow from a Rotating Tank (회전원통으로부터의 싱크 유동)

  • Suh Yong Kweon;Yeo Chang Ho
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.36-39
    • /
    • 2004
  • In this study, we present the theoretical, numerical and experimental results of the sink flow from a rotating, circular tank Strikingly enough, when the upper free surface was set with no-slip boundary conditions, the Ekman boundary-layer develops not only above the bottom surface but under the free surface. The sink fluid is coming from the two Ekman layers, and the mass transfer from the bulk, inviscid region is dependent on the rotational speed. It is also remarkable to see that all the fluid gathered along the axis flows through a rapidly rotating fluid column with almost the same size as the hole.

  • PDF

A Congestion Control Scheme Considering Traffic in Large-Scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 트래픽을 고려한 혼잡제어)

  • Kwak, Moon-Sang;Hong, Young Sik
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.114-121
    • /
    • 2015
  • Large-scale wireless sensor networks are constructed by using a large number of sensor nodes that are non-uniformly deployed over a wide area. As a result, the data collected by the sensor nodes are similar to that from one another since a high density of the sensor nodes may cause an overlap. As a result of the characteristics of the traffic, data is collected from a plurality of sensor nodes by a sink node, and when the sensor nodes transmit their collected data to the sink node, the sensor nodes around the sink node have a higher amount of traffic than the sensor nodes far away from the sink node. Thus, the former sensor encounter bottlenecks due to traffic congestion and have an energy hole problem more often than the latter ones, increasing energy consumption. This paper proposes a congestion control scheme that considers traffic flows in order to control traffic congestion of the sensor nodes that are non-uniformly deployed over a large-scale wireless sensor network.

FE Analysis of Extrusion Process for Heat sink (방열판 직접압출 공정의 유한요소해석)

  • 이정민;김병민;조형호
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2003.10a
    • /
    • pp.313-317
    • /
    • 2003
  • Porthole die extrusion is the method which put the billet in the container and push it between die hole by ram. This method make it possible that product manufacture which have complex shape of area with excellent induction of area, in addition that this is economical. So this method is used as the basic manufacturing method of many industrial materials. The subject of this research is the forming technology development of heat sink which is being produced by extrusion process in my country. Flow condition of extrusion for heat sink, and metal flow of billet in the die are estimated by the means of rigid-plasticity finite element method.

  • PDF

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF