• Title/Summary/Keyword: intercepted

Search Result 124, Processing Time 0.026 seconds

Flux Density Distribution of the Dish Solar Concentrator (KIERDISH II) (KIERDISH II 태양열 집광시스템의 플럭스밀도 분포)

  • Kang, Myeong-Cheol;Kang, Yong-Heack;Yoo, Seong-Yeon
    • Journal of the Korean Solar Energy Society
    • /
    • v.24 no.4
    • /
    • pp.11-18
    • /
    • 2004
  • A solar concentrator, named KIERDISH II, was built at KIER in order to investigate the feasibility of high temperature solar energy application system. The constructed concentrator is a dish type solar concentrator with a focal length of 4.68m and a diameter of 7.9m. To successfully operate KIERDISH II, optimal design of the absorber is very important and flux density distribution has to be known. The focal flux density distribution on the receiver was measured. We have observed the shape and size of flux images and evaluated percent power within radius. Flux density distribution is usually measured by a CCD(charge coupled device) camera and a radiometer. In this paper we present a flux mapping method to estimate the characteristic features of the flux density distribution in the focal region of solar concentrator. The minimum radius of receiver is found to be 0.15m and approximately 90% of the incident radiation is intercepted by receiver aperture.

On Securing Web-based Educational Online Game Using SSL Protocol (SSL 프로토콜을 이용한 안전한 웹기반 교육용 온라인 게임)

  • Yani, Kadek Restu;Priyana, Yoga;Rusmin, Pranoto H.;RHEE, Kyung-Hyune
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.3
    • /
    • pp.790-798
    • /
    • 2016
  • Currently, web-based online games is becoming popular in supporting learning process due to their effective and efficient tool. However, online games have lack of security aspect, in particular due to increase in the number of personal information leakage. Since the data are transmitted over insecure channel, it will be vulnerable of being intercepted by attackers who want to exploit user's identity. This paper aims to propose an online web-based educational game, Vidyanusa which allows the students to register their personal information using a unique code, a user name and a password. It manages the users according to their schools, subject teachers and class levels. In addition, by adopting a unique code, the confidentiality of the user identity can be kept away from attackers. Moreover, in order to provide a secure data communication between client and server, Secure Socket Layer (SSL) protocol is adopted. The performance of the system after implementing SSL protocol is examined by loading a number of requests for various users. From the experiment result, it can be concluded that the SSL protocol can be applied to web-based educational system in order to offer security services and reliable connection.

Response of Filefish to the Colored Lights (색광에 대한 쥐치의 반응)

  • 양용림
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.17 no.1
    • /
    • pp.7-11
    • /
    • 1981
  • The author carried out an experiment to find out the responsing patterns of filefish, Stepha nolepis cirrhifer (Temminck et Schlegel) to the color lights. The experimental tank (360LX50WX55H cm) was set up in a dark room. Six Longitudinal sections each being 60 em intervals are marked in the tank to observe the location of the fish. Water depth in the tank was kept 50 em level. Light bulbs of 20W were placed at the both ends of the tank to be projected the light horizontally into the tank. Two different colored filters were selected in combination from four' colors-red, blue, yellow, and white, and were placed in front of the light bulbs to make\ulcorner different light of color. Light intensity were controlled by use of auxiliary filters intercepted between the bulb and the filter. The fish were acclimatized in the dark for 40 minutes prior to employ in the experiment. Upon turning on the light, the number of fish in each section was counted 40 times in every 30 seconds, and the mean of the number of fish in each section was given as the gathering rate of the fish. The results obtained are as follows: 1. Color of light, to which the fish gathered abundantly was found in the named order of blue, white, green, and red. 2. The differences of gathering rate upon arbitary combined two color lights were shown significant, and the differences increased remarkably in accordance with the lapse of illuminating period.

  • PDF

Shear strengthening of reinforced concrete beams with rectangular web openings by FRP Composites

  • Abdel-Kareem, Ahmed H.
    • Advances in concrete construction
    • /
    • v.2 no.4
    • /
    • pp.281-300
    • /
    • 2014
  • This study presents the experimental results of twenty three reinforced concrete beams with rectangular web openings externally strengthened with Fiber Reinforced Polymers (FRP) composites bonded around openings. All tested beams had the same geometry and reinforcement details. At openings locations, the stirrups intercepted the openings were cut during fabrication of reinforcement cage to simulate the condition of inclusion of an opening in an existing beam. Several design parameters are considered including the opening dimensions and location in the shear zone, the wrapping configurations, and the amount and the type of the FRP composites in the vicinity of the openings. The wrapping configurations of FRP included: sheets, strips, U-shape strips, and U-shape strips with bundles of FRP strands placed at the top and sides of the beam forming a fan under the strips to achieve closed wrapping. The effect of these parameters on the failure modes, the ultimate load, and the beam stiffness were investigated. The shear contribution of FRP on the shear capacity of tested beams with web openings was estimated according to ACI Committee 440-08, Canadian Standards S6-06, and Khalifa et al. model and examined against the test results. A modification factor to account for the dimensions of opening chords was applied to the predicted gain in the shear capacity according to ACI 440-08 and CSA S6-06 for bonded Glass Fiber Reinforced Polymers (GFRP) around openings. The analytical results after incorporating the modification factor into the codes guidelines showed good agreement with the test results.

Design on Authentication System Based Multicast DRM for Protection of IPTV Contents (IPTV 콘텐츠 보호를 위한 멀티캐스트 DRM 기반의 인증 시스템 설계)

  • Kim, Jae-Woo;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.713-720
    • /
    • 2010
  • Lately, IPTV is in the limelight using a broadband information service to provide video content and broadcast services. Current IPTV system is combining CAS and DRM system for VOD contents to protect transmitting contents and authentication, but it has drawbacks such as system's complexity and high construction costs. Multicast DRM system emerged as a method to improve them, but, in the multicast DRM system, if the key is intercepted by a malicious user, it can be viewed by an unauthorized user of illegal broadcasting which can be a problem. In this paper, we suggest to protect content from a malicious user by applying the techniques using user authentication in the multicast DRM system.

Unsteady Flow Analysis on Flood Characteristics in KEUM River Downstream (금강 하류 홍수의 부정류 해석)

  • 김현영;박승우
    • Water for future
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 1989
  • KEUM River downstream has some characteristics in which the dowunstream is affected with tidal motion, the several tributaries are forming a dendritic river system, and the channel cross-sections are irregular. The flood in this downstream can now be analyzed by the hydrological flood routing methods and under the assumption regarding the dendritic river system as a single reach. In this study the river system was used for the flood routing. The flood records which were measured in 1978 and 1987 were applied for calibration and verification of the unsteady flow model respectively. The results show that the flood at KANG-KYONG station was not affected with the tidal motion when the discharge at KONG-JU station exceeded about 5, 000$m^3$/sec, and that the bottle neck at IP-PO station intercepted the tidal influences.

  • PDF

A Study about Preventing Improper Working of Equipment on ATS System by Signaling Equipment (신호장치에 의한 ATS 신호장치 오동작 방지에 대한 연구)

  • Ko, Young-Hwan;Choi, Kyu-Hyoung
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.579-587
    • /
    • 2008
  • Promotion of the line no.2 in Seoul Metro was changing from the existing signaling facilities for ATS(Automatic Train Stop) vehicles to the up-to-date signaling facilities for ATO(Automatic Train Operation). But, in consequence of conducting a trial run after being equipped with the ATO signaling facilities, the matter related to mix-operation with the existing ATS signaling facilities appeared. The operation of the existing ATS signaling system in combination with the ATO signaling system has made improper working related to frequency recognition of the ATS On-board Computerized Equipment. This obstructs operation of a working ATS vehicle. That is, as barring operation of an ATS vehicle that should proceed, it may make the proceeding ATS vehicle stop suddenly and after all, it will cause safety concerns. In this paper, we designed a wayside track occupancy detector that previously prevents improper working related to frequency recognition of the ATS On-board Computerized Equipment by gripping classification and working processes of operating trains throughout transmission of local signaling information from the existing facilities, which does not need to change or replace the existing signaling facilities. Furthermore, we described general characteristics of the wayside track occupancy detector and modeled the IFC(InterFace Contrivance) device and the logical circuit recognizing signal information. Then, we made an application program of PLC(programmable Logic Computer) based on the stated model. We, in relation to data transfer method, used the frame in TCP/IP transfer mode as the standard, and we demonstrated that ATO transmission frequency is intercepted.

  • PDF

Estimation of Evapotranspiration in a Forest Watershed in Central Korea (중부(中部) 산림(山林) 지역(地域)의 증발산량(蒸發散量) 추정(推定))

  • Kim, Jesu
    • Journal of Korean Society of Forest Science
    • /
    • v.88 no.1
    • /
    • pp.86-92
    • /
    • 1999
  • Evapotranspiration is one of important variables affecting ecosystem processes such as vegetation distribution and growth. It acts as a limiting factor for natural water resource management. The transpiration of vegetation is mainly determined by climatic factors. The lower slope of the study area was densely forested with Pinus densiflora S. et Z. of 8 m height, and the upper slope was covered with poorly grown Pinus densiflora S. et Z. and Quercus trees. The amount of evapotranspiration was estimated to 590.3 mm/yr by annual water budget method. The canopy resistance of Penman-Monteith model was determined as 99 s/m. Seasonal evapotranspiration can be estimated with the calculated evaporation and the canopy resistance. The amount of evapotranspiration peaked in May. That is considered from both the direct evaporation of intercepted rainfall and the transpiration of vegetation during the dry spring season.

  • PDF

The Design of Secret Multi-Paths on MRNS(Mixed Radix Numbers System) Network for Secure Transmission (안전한 전송을 위한 MRNS(Mixed Radix Number System)네트워크에서의 비밀 다중 경로의 설계)

  • Kim, Seong-Yeol;Jeong, Il-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1534-1541
    • /
    • 1996
  • Routing security is the confidentiality of route taken by the data transmitted over communication networks. If the route is detected by an adversary, the probability is high that the data lost or the data can be intercepted by the adversary. Therefore, the route must be protected. To accomplish this, we select an intermediate node secretly and transmit the data using this intermediate node, instead of sending the data to a destination node using the shortest direct path. Furthermore, if we use a number of secret routes from a node to a destination node, data security is much stronger since we can transmit partial data rather than entire data along a secret route. Finally, the idea above is implemented on MRNS Network.

  • PDF

Trophic Structure and Energy Flow of a Pond Ecosystem (연못 생태계의 영양구조와 에너지 유전)

  • 정연숙
    • Journal of Plant Biology
    • /
    • v.25 no.3
    • /
    • pp.123-133
    • /
    • 1982
  • The tropic structure and the function of a small pone ecosystem under the tree stand were studied in terms of energy flow. About 28% of total solar radiation was intercepted by the tree canopy over the pond. Primary producers converted 1.1%(3,382 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$) of solar radiation (320,000 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$) into gross primary production. The amount of energy availble to the pond snail was 1,683 kcal.m-2.y-1 of the net production by primary producers and 1,033 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$ of the litter fallen into the pond. The amount of gross secondary production by the pond snail was 245 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$. Judging from these, supply of both net primary production and the litter was indispensable for the maintenance of the pond ecosystem. The total amont of energy as gross primary production plus litter was 4,415 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$(100%). Since the total respiration loss was calculated to be 1,917 kcal$\cdot$$m^{-2}$$\cdot$$y^{-1}$(43.4%), the rate of energy accumulation in the pond estimated to 56.6%.

  • PDF