• Title/Summary/Keyword: edge attack

Search Result 149, Processing Time 0.034 seconds

앞전에서의 팽창파를 이용한 양항비의 개선에 대한 연구

  • Yun, Yeong-Jun
    • Proceeding of EDISON Challenge
    • /
    • 2016.11a
    • /
    • pp.19-22
    • /
    • 2016
  • Leading edge thrust is generally caused by passing air flow from lower to upper surface and it is required to have sufficient angle of attack for notable leading edge thrust. To produce leading edge thrust at low angle of attack, utilizing expansion wave accompanying low pressure is able to be a solution. Fore structure changes the direction of flow, and this flow passes the projected edge. As a result, from a perspective of the edge, it is able to have high angle of attack, and artificial expansion wave is generated. This concept shows 9.48% increase of L/D in inviscid flow, at Mach number 1.3 and angle of attack $1^{\circ}$ in maximum, and this model shows the 3.98% of increasement at angle of attack $2^{\circ}$. Although advantage of the artificial expansion wave decreased as angle of attack increase, it shows the possibility of aerodynamical improvement with artificial expansion wave.

  • PDF

Research on security technology to respond to edge router-based network attacks (Edge 라우터 기반 네트워크 공격에 대응하는 보안기술 연구)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1374-1381
    • /
    • 2022
  • Existing research on security technology related to network attack response has focused on research using hardware network security technology, network attacks that wiretap and wiretap network packets, denial of service attack that consumes server resources to bring down the system, and network by identifying vulnerabilities before attack. It is classified as a scanning attack. In addition, methods for increasing network security, antivirus vaccines and antivirus systems have been mainly proposed and designed. In particular, many users do not fully utilize the security function of the router. In order to overcome this problem, it is classified according to the network security level to block external attacks through layered security management through layer-by-layer experiments. The scope of the study was presented by examining the security technology trends of edge routers, and suggested methods and implementation examples to protect from threats related to edge router-based network attacks.

Vortical Flows over a LEX-Delta Wing at High Angles of Attack

  • Lee, Young-Ki;Kim, Heuy-Dong
    • Journal of Mechanical Science and Technology
    • /
    • v.18 no.12
    • /
    • pp.2273-2283
    • /
    • 2004
  • The vortical flows over sharp-edged delta wings with and without a leading edge extension have been investigated using a computational method. Three-dimensional compressible Reynolds-averaged Navier-Stokes equations are solved to provide an understanding of the effects of the angle of attack and the angle of yaw on the development and interaction of vortices and the aerodynamic characteristics of the delta wing at a freestream velocity of 20 m/s. The present computations provide qualitatively reasonable predictions of vortical flow characteristics, compared with past wind tunnel measurements. In the presence of a leading edge extension, a significant change in the suction pressure peak in the chordwise direction is much reduced at a given angle of attack. The leading edge extension can also stabilize the wing vortex on the windward side at angles of yaw, which dominates the vortical flows over yawed delta wings.

The Vortical Flow Field of Delta Wing with Leading Edge Extension

  • Lee, Ki-Young;Sohn, Myong-Hwan
    • Journal of Mechanical Science and Technology
    • /
    • v.17 no.6
    • /
    • pp.914-924
    • /
    • 2003
  • The interaction and breakdown of vortices over the Leading Edge Extension (LEX) - Delta wing configuration has been investigated through wing-surface pressure measurements, the off-surface flow visualization, and 5-hole probe measurements of the wing wake section. The description focused on analyzing the interaction and the breakdown of vortices depending on the angle of attack and the sideslip angle. The Effect of angle of attack and sideslip angle on the aerodynamic load characteristics of the model is also presented. The sideslip angle was found to be a very influential parameter of the vortex flow over the LEX-delta wing configuration. The introduction of LEX vortex stabilized the vortex flow, and delayed the vortex breakdown up to a higher angle of attack. The vortex interaction and breakdown was promoted on the windward side, whereas it was suppressed on the leeward side.

Vortical Flows over a Delta Wing at High Angles of Attack

  • Lee, Young-Ki;Kim, Heuy-Dong
    • Journal of Mechanical Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.1042-1051
    • /
    • 2004
  • The vortex flow characteristics of a sharp-edged delta wing at high angles of attack were studied using a computational technique. Three dimensional, compressible Reynolds-averaged Navier-Stokes equations were solved to understand the effects of the angle of yaw, angle of attack, and free stream velocity on the development and interaction of vortices and the relationship between suction pressure distributions and vortex flow characteristics. The present computations gave qualitatively reasonable predictions of vortical flows over a delta wing, compared with past wind tunnel measurements. With an increase in the angle of yaw, the symmetry of the pair of leading edge vortices was broken and the vortex strength was decreased on both windward and leeward sides. An increase in the free stream velocity resulted in stronger leading edge vortices with an outboard movement.

Assessing the performance of extraction methods for OSN-based Sybil-resistant trust values (OSN 기반 Sybil-resistant trust value 추출 기법들에 대한 성능평가)

  • Kim, Kyungbaek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.534-537
    • /
    • 2013
  • 인터넷상에서 다양한 사용자 및 구성요소로 이루어진 분산시스템은 Sybil Attack 에 취약하다. 최근 온라인 소셜 네트워크(Online Social Network)의 그래프 정보를 사용해, Sybil Attack 에 대응하기 위한 Sybil-resistant value 추출 기법들이 제안되었다. 이 논문에서는 이러한 OSN 기반의 Sybil-resistant value 추출 기법들에 대한 성능을 평가한다. 특히 OSN 그래프의 각 노드들의 이웃 노드 개수 정보에 따른 성능과 Sybil 노드들의 Attack Edge 에 따른 성능을 평가한다. Facebook 에서 추출한 샘플 OSN 그래프를 사용한 성능 평가 분석을 통해, 실제 사용자를 위한 Sybil-resistant value 를 정상적으로 추출하기 위해서는 OSN 그래프 상에서 이웃 노드의 개수가 10 개 이상이어야 한다는 점과, Random Route Tail Intersection 기법이 Sybil 사용자 그룹의 Attack Edge 의 영향을 가장 적게 받는 다는점을 확인 하였다.

Experimental Study on the Vortical Flow Behind 2-D Blade with the Variation of Trailing Edge Shape (2차원 날개 끝단 형상에 따른 후류 보오텍스 유동 변화에 대한 실험 연구)

  • Paik, Bu-Geun;Kim, Ki-Sup;Moon, Il-Sung;Ahn, Jong-Woo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.48 no.3
    • /
    • pp.233-237
    • /
    • 2011
  • In the present experiments, vortical structures behind the hydrofoil trailing edge are visualized and analyzed as an elementary study for propeller singing phenomena. Two sorts of hydrofoil are selected for the measurement of shedding vortices. One was KH45 hydrofoil section and the other is KH45 with the truncated trailing edge that is positioned at X/C = 0.9523(C=chord length). Assuming the Strouhal number of 0.23, the shedding frequencies of vortices are extracted by analyzing the boundary layer thickness and the flow speed. The frequency distribution of shedding vortices is obtained with the variation of angle-of-attack while the flow speed is fixed to 8m/s. The truncation of the trailing edge makes the frequency of shedding vortices about 120Hz lower than that of original trailing edge and makes the vorticity value higher than the original trailing edge.

PIV Measurements of Rudder Inflow Induced by Propeller Revolution in Hull Wake (선체반류 중에서 작동하는 프로펠러에 의한 방향타 유입유동 PIV 계측)

  • Paik, Bu-Geun;Kim, Ki-Sup;Kim, Kyung-Youl;Kim, Gun-Do;Park, Young-Ha
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.48 no.2
    • /
    • pp.128-133
    • /
    • 2011
  • In the present study, the flow fields in between the propeller and the semi-spade rudder are investigated by using PIV technique to find out the influences of both simulated hull wake and propeller wake on the incident flow to the rudder. The velocity fields are measured at the propeller rotation angle of $180^{\circ}$ and the rudder deflection angles of $0^{\circ}$. Flow fields measured at each rudder deflection angle are analyzed in terms of angle-of-attack against the rudder leading edge. The hull wake increases the angle-of-attack more than that in the uniform inflow condition, forming the angle-of-attack of about $20^{\circ}$ at 0.7R(R=propeller radius) position. The distribution of the angle-of-attack is strongly affected by the stagnation point around the leading edge and camber effect of the rudder. These effects provide asymmetric distribution of angle-of-attack with respect to the leading edge of the rudder.

A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing (5G 모바일 에지 컴퓨팅에서 빅데이터 분석 기능에 대한 데이터 오염 공격 탐지 성능 향상을 위한 연구)

  • Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.549-559
    • /
    • 2023
  • As mobile edge computing (MEC) is gaining attention as a core technology of 5G networks, edge AI technology of 5G network environment based on mobile user data is recently being used in various fields. However, as in traditional AI security, there is a possibility of adversarial interference of standard 5G network functions within the core network responsible for edge AI core functions. In addition, research on data poisoning attacks that can occur in the MEC environment of standalone mode defined in 5G standards by 3GPP is currently insufficient compared to existing LTE networks. In this study, we explore the threat model for the MEC environment using NWDAF, a network function that is responsible for the core function of edge AI in 5G, and propose a feature selection method to improve the performance of detecting data poisoning attacks for Leaf NWDAF as some proof of concept. Through the proposed methodology, we achieved a maximum detection rate of 94.9% for Slowloris attack-based data poisoning attacks in NWDAF.

Flow Characteristics of a Paraglider Canopy with Leading-edge Tubercles (선단돌기가 적용된 패러글라이더 캐노피의 유동특성 연구)

  • Shin, Jeonghan;Chae, Seokbong;Shin, Yisu;Park, Jungmok;Song, Ginseok;Kim, Jooha
    • Journal of the Korean Society of Visualization
    • /
    • v.19 no.3
    • /
    • pp.106-114
    • /
    • 2021
  • In the present study, we investigate the flow characteristics of a paraglider canopy with leading-edge tubercles by performing force measurement and surface flow visualizations. The experiment is conducted at Re = 3.3×105 in a wind tunnel, where Re is the Reynolds number based on the mean chord length and the free-stream velocity. The canopy model with leading-edge tubercles has flow characteristics of a two-step stall, showing an earlier onset of the first stall than the canopy model without leading-edge tubercles. However, the main stall angle of the tubercled model is much larger than that of the canopy model without tubercles, resulting in a higher aerodynamic performance at high angles of attack. The delay in the main stall is ascribed to the suppression of separation bubble collapse around the wingtip at high angles of attack.