• 제목/요약/키워드: Stream Structure

검색결과 827건 처리시간 0.025초

아음속 횡단류에 수직 분사되는 분무의 액적크기 및 속도 분포 특성 (Droplet Sizes and Velocities from Single-Hole Nozzle in Transversing Subsonic Air-stream)

  • 이인철;조우진;이봉수;김종현;구자예
    • 한국추진공학회:학술대회논문집
    • /
    • 한국추진공학회 2007년도 제28회 춘계학술대회논문집
    • /
    • pp.106-109
    • /
    • 2007
  • The spray plume characteristics of liquid water jet injected into subsonic cross-flow at 42 m/s were experimentally investigated. Nozzle has a 1.0 m diameter and L/D=5. Droplet sizes, velocities, volume flux were measured at each downstream area of the injector exit using phase Doppler particle anemometry. Measuring probe position is moved with 3-way transversing machine. Experimental results indicate that SMD is varied from 75 to $120{\mu}m$ distribution and it is uncertain layer structure. SMD peaks at the top of the spray plume. This phenomenon is related to the momentum exchange between column waves and cross-flow stream. Droplet vector velocities were varied from 11.5 to 33 m/s. A higher-velocity region can be identified in down edge region at Z/D : 40, 70 and 100. Lower-velocity region were observed on bottom position of the spray plume. Volume flux is a criterion to the droplet concentration. All volume flux distribution has a same structure that continuously decreases from the center region to the edge of the plume. Z/D : 20 is spatially less concentrated than in Z/D : 100.

  • PDF

Detection of Malicious PDF based on Document Structure Features and Stream Objects

  • Kang, Ah Reum;Jeong, Young-Seob;Kim, Se Lyeong;Kim, Jonghyun;Woo, Jiyoung;Choi, Sunoh
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권11호
    • /
    • pp.85-93
    • /
    • 2018
  • In recent years, there has been an increasing number of ways to distribute document-based malicious code using vulnerabilities in document files. Because document type malware is not an executable file itself, it is easy to bypass existing security programs, so research on a model to detect it is necessary. In this study, we extract main features from the document structure and the JavaScript contained in the stream object In addition, when JavaScript is inserted, keywords with high occurrence frequency in malicious code such as function name, reserved word and the readable string in the script are extracted. Then, we generate a machine learning model that can distinguish between normal and malicious. In order to make it difficult to bypass, we try to achieve good performance in a black box type algorithm. For an experiment, a large amount of documents compared to previous studies is analyzed. Experimental results show 98.9% detection rate from three different type algorithms. SVM, which is a black box type algorithm and makes obfuscation difficult, shows much higher performance than in previous studies.

플랩 블레이드를 이용한 조류 터빈의 부하 저감에 대한 연구 (Study on Load Reduction of a Tidal Steam Turbine Using a Flapped Blade)

  • 정다솜;고진환
    • Ocean and Polar Research
    • /
    • 제42권4호
    • /
    • pp.293-301
    • /
    • 2020
  • Blades of tidal stream turbines have to sustain many different loads during operation in the underwater environment, so securing their structural safety is a key issue. In this study, we focused on periodic loads due to wave orbital motion and propose a load reduction method with a blade design. The flap of an airplane wing is a well-known structure designed to increase lift, and it can also change the load distribution on the wing through deflection. For this reason, we adopted a passive flap structure for the load reduction and investigated its effectiveness by an analytical method based on the blade element moment theory. Flap torsional stiffness required for the design of the passive flap can be obtained by calculating the flap moment based on the analytic method. Comparison between a flapped and a fixed blade showed the effect of the flap on load reduction in a high amplitude wave condition.

질소로 희석된 대향류 메탄 비예혼합화염에서 CO2에 의한 소화특성 (CO2 Suppression Characteristics of the Nitrogen-diluted Methane Counterflow Non-premixed Flame)

  • 이호현;오창보;황철홍
    • 한국안전학회지
    • /
    • 제28권2호
    • /
    • pp.42-48
    • /
    • 2013
  • The $CO_2$ suppression characteristics and flame structure of nitrogen-diluted methane counterflow non-premixed flame were studied experimentally and numerically. To mimic a situation where combustion product gases are entrained into a compartment fire, fuel stream was diluted with $N_2$. A gas-phase suppression agent, $CO_2$, was diluted in the air-stream to investigate the suppression characteristics by the agent. For numerical simulation, an one-dimensional OPPDIF code was used for comparison with experimental results. An optically-thin radiation model(OTM) was adopted to consider radiation effects on the suppression characteristics. It was confirmed experimentally and numerically that suppression limit decreased with increasing nitrogen mole fraction in the fuel stream. A turning point was found only when a radiation heat loss was considered and the extinguishing concentration for turning point was differently predicted compared to the experiment result. Critical extinguishing concentration when neglecting radiation heat loss was also differently predicted compared with the experimental result.

솔리디티에 따른 H-로터의 공기역학적 특성 및 성능해석 (Numerical Analysis of Aerodynamic Characteristics and Performance Analysis on H-rotor with Various Solidities)

  • 주성준;이주희
    • 한국유체기계학회 논문집
    • /
    • 제19권6호
    • /
    • pp.5-13
    • /
    • 2016
  • Three-dimensional unsteady numerical analysis has been performed to observe aerodynamic characteristics of a H-rotor. Generally, the structure of the H-rotor is simple but the aerodynamic characteristics are exceptionably complicated since the angle of attacks and incident velocities to a blade are considerably varied according to the azimuth angles and solidities. The blade in the upwind revolution between 0 to 180 degree obtains aerodynamic energy from the free stream but the blade in the downwind revolution between 180 to 360 degree does not. When the rotating speed increases, the blade in the downwind revolution accelerates the air around the blade like a fan and it consumes the energy and shows negative torque in the area. On the other hand, the direction of the free stream is bent because of the interaction between blade the free stream. Therefore, the operation point (highest power coefficient) appears at a lower tip-speed-ratio what it is expected.

농촌 유역 상단부의 소하천에서 수질예측모형의 개발 (Development of a Water Quality Model for Streams in an Upland Agricultural Watershed)

  • 최혜숙;오광중;김상현
    • 한국수자원학회논문집
    • /
    • 제33권1호
    • /
    • pp.73-85
    • /
    • 2000
  • 농촌 소하천의 수리학적 및 수질특성을 반영한 모형을 개발하였다. 모형구조 설계시 제어체적 기법을 활용하여 하천 형상, 수질 및 유량의 변화가 심한 농촌 유역의 소하천에 대한 수질의 모의하였다. 개발한 모형에 난수발생기법을 도입하여 최적 반응계수와 모형구조를 추정하였다. 또한 모형 보정기준의 일반화를 위해 동의지표와 효율계수를 도입하여 매개변수추정의 신뢰성 향상을 도모했다. 모형의 적용성을 검증하기 위해 경남 김해시 한림면 용덕천에서 수질을 채취하여 분석하였다. 관측된 자료와 개발된 모형의 비교연구를 통해 대상유역의 소하천에서 일어나는 수질 반응계수들과 그 변동성을 추정하였다.

  • PDF

Design of AT-DMB Baseband Receiver SoC

  • Lee, Joo-Hyun;Kim, Hyuk;Kim, Jin-Kyu;Koo, Bon-Tae;Eum, Nak-Woong;Lee, Hyuck-Jae
    • ETRI Journal
    • /
    • 제31권6호
    • /
    • pp.795-802
    • /
    • 2009
  • This paper presents the design of an advanced terrestrial digital multimedia broadcasting (AT-DMB) baseband receiver SoC. The AT-DMB baseband is incorporated into a hierarchical modulation scheme consisting of high priority (HP) and low priority (LP) stream decoders. The advantages of the hierarchical modulation scheme are backward compatibility and an enhanced data rate. The structure of the HP stream is the same as that of the conventional T-DMB system; therefore, a conventional T-DMB service is possible by decoding multimedia data in an HP stream. An enhanced data rate can be achieved by using both HP and LP streams. In this paper, we also discuss a time deinterleaver that can deinterleave data for a time duration of 384 ms or 768 ms. The interleaving time duration is chosen using the LP symbol mapping scheme. Furthermore, instead of a Viterbi decoder, a turbo decoder is adopted as an inner error correction system to mitigate the performance degradation due to a smaller symbol distance in a hierarchically modulated LP symbol. The AT-DMB baseband receiver SoC is fabricated using 0.13 ${\mu}m$ technology and shows successful operation with a 50 mW power dissipation.

수서곤충 군집분석에 있어서 최적표본크기의 결정 - 방태천 모형 (Determination on the Optimal Sample Size in the Aquatic Insect Community Analysis - Pangtae Creek Model)

  • 윤일병;노태호;이성진;박재홍;배연재
    • The Korean Journal of Ecology
    • /
    • 제21권5_1호
    • /
    • pp.409-418
    • /
    • 1998
  • A molel study was conducted to determine the optimal sample size for the analysis of the aquatic insect community in a stream reach of the Pangtae Creek, Kangwon-do in October 1995 and may 1996. The results showed that the required minimum sample size varied and depended on the purposes of the community analysis. Acoording to the Species: Area Curve method, at least 16 Surber samplings ($30{\times}30cm$) were required in a stream reach in each spring and fall survey. The species diversity index did not vary significantly as the sample size increased. Based on the coefficient of variation analysis, the minimum sample sizes of 10 were required in order to compare seasonal differences of the community in the study area. Considering the static community structure of aquatic insects, including both species numbers and individual numbers of aquatic insects, 11 and 7 samplings were optimal sizes for the fall and spring survey, respectively. We concluded that 12 Surber samplings from 3 riffle-pool sequences (4 samplings at each riffle-pool sequence) would be required in a stream reach (length 1 km) to obtain reliable as well as cost efficient data. Our model showed that the optimal sample size should be determined by interactions between minimum sample size, the degree of data reliability, and cost efficiency.

  • PDF

무선암호시스템에서 전송성능 개선을 위한 동적할당 알고리듬 (Dynamic Allocation Algorithm for enhancement of transmission performance on a radio encryption system)

  • 홍진근;윤장홍;장병화;황찬식
    • 정보보호학회논문지
    • /
    • 제11권1호
    • /
    • pp.3-12
    • /
    • 2001
  • 본 논문은 무선채널에서 안전한 암호통신을 위해 동기식 스트림 암호시스템을 설계하였다 페이딩 채널에서 설계된 스트립 암호를 통해 암호문을 전송할 때 한 주기 동안 발생하는 동기패턴, 세션키, 암호문 정보에 적합한 인터리빙 기 법을 설계하여 전송함으로써 버스트 오류로부터 암호문을 보호하고 전송성능을 개선하여 robust한 암호통신을 가능하도록 하였다. 본 논문에서는 동적인 인터리빙 depth를 갖는 DAA를 적용함으로써 정적인 인터리빙 depth를 갖는 SAA (static allocation algorithm)보다 전송성능 개선을 얻었다.

SENSOR DATA MINING TECHNIQUES AND MIDDLEWARE STRUCTURE FOR USN ENVIRONMENT

  • Jin, Cheng-Hao;Lee, Yong-Mi;Kim, Hi-Seok;Pok, Gou-Chol;Ryu, Keun-Ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2007년도 Proceedings of ISRS 2007
    • /
    • pp.353-356
    • /
    • 2007
  • With advances in sensor technology, current researches on the pertinent techniques are actively directed toward the way which enables the USN computing service. For many applications using sensor networks, the incoming data are by nature characterized as high-speed, continuous, real-time and infinite. Due to such uniqueness of sensor data characteristics, for some instances a finite-sized buffer may not accommodate the entire incoming data, which leads to inevitable loss of data, and requirement for fast processing makes it impossible to conduct a thorough investigation of data. In addition to the potential problem of loss of data, incoming data in its raw form may exhibit high degree of complexity which evades simple query or alerting services for capturing and extracting useful information. Furthermore, as traditional mining techniques are developed to handle fixed, static historical data, they are not useful and directly applicable for analyzing the sensor data. In this paper, (1) describe how three mining techniques (sensor data outlier analysis, sensor pattern analysis, and sensor data prediction analysis) are appropriate for the USN middleware structure, with their application to the stream data in ocean environment. (2) Another proposal is a middleware structure based on USN environment adaptive to above mining techniques. This middleware structure includes sensor nodes, sensor network common interface, sensor data processor, sensor query processor, database, sensor data mining engine, user interface and so on.

  • PDF