• Title/Summary/Keyword: interception

Search Result 339, Processing Time 0.024 seconds

TEMPORAL VARIATIONS OF IO'S MAGNETIC FOOTPRINT BRIGHTNESS

  • WANNAWICHIAN, SUWICHA;PROMFU, TATPHICHA
    • Publications of The Korean Astronomical Society
    • /
    • v.30 no.2
    • /
    • pp.61-64
    • /
    • 2015
  • The brightness of Io's magnetic footprint, an indicator of electromagnetic interaction at the satellite, appears to be strongly connected to the satellite's distance from the plasma equator. As a result, the brightest footprints were detected when Io is near the interception location between the satellite's orbital plane and the plasma equator. However, volcanic activities on Io show strong correlation with the equatorward shift of Jupiter's main auroral oval, consequently causing the disappearance of Io's footprint. The same conclusion was suggested via the observation of Jupiter's hectometric radio emission, called HOM, which closely corresponds to Jupiter's auroral activity. The plasma environment near the Jovian satellites was found to vary significantly at different observational epochs. The electron density increased by approximately a factor of three from the Voyager epoch (1979) to the Galileo epoch (1995), while the electron density was found to be significantly higher (~ 5 times) in the Cassini epoch (2001). In this current study, the magnetic footprints were clearly brighter ten years ago (from peak brightness in 1998-2001) than the footprints detected in 2007. For volcanic activities on Io in 2007, there are two clear activities in February and late May. The magnetic footprint appeared to be dimmer in March 2007, expected to be the result of volcano activities in Feb 2007. However, the magnetic footprint brightness in June appeared to be slightly brighter than the footprints observed in May. The reason could be the time delay between the brightening of the sodium nebula on approximately May 31st and, a while later, the enhancement of flux tube content peaking on approximately June 5th. On the other hand, Io's magnetic footprints were observed during June 1st - 10th when they may not yet have been affected by the increase in mass outflow due to the increase of plasma density.

The Micrometeorological Requirements for the Culture of Ginseng (Panax sp.) (인삼 (Panax sp.) 재배를 위한 미세기상조건)

  • Proctor John T. A.
    • Proceedings of the Ginseng society Conference
    • /
    • 1988.08a
    • /
    • pp.129-132
    • /
    • 1988
  • Ginseng is cultivated in Korea. Japan. China. the Soviet Union and North America. Studies of the macroclimate of each of these producing areas shows that ginseng has certain requirements for production. In each producing area the microclimate is modified in different ways. Comparisons of recent research data from North America. Korea and China is presented in order to define. more precisely. the various microclimate requirements for ginseng production. These include studies of light interception as influenced by different shade materials. In North America. wood. woven black polypropylene and knitted polyethylene shade are used. whereas in China. dried grasses are bound together in layers with wire and polyvinylchloride is inserted between the layers. The influence of these various shade materials in terms of crop grow1h and root yield are presented. The major effect of temperature seems to be on root growth. During much of the growing season optimum temperatures for root grow1h are not reached. Growth analysis data for different age plants are being used to show the effects of different soil temperature regimes on distribution of dry matter between the shoot and root.

  • PDF

Evaluation of the Uncertainties in Rainfall-Runoff Model Using Meta-Gaussian Approach (Meta-Gaussian 방법을 이용한 강우-유출 모형에서의 불확실성 산정)

  • Kim, Byung-Sik;Kim, Bo-Kyung;Kwon, Hyun-Han
    • Journal of Wetlands Research
    • /
    • v.11 no.1
    • /
    • pp.49-64
    • /
    • 2009
  • Rainfall-runoff models are used for efficient management, distribution, planning, and design of water resources in accordance with the process of hydrologic cycle. The models simplify the transition of rainfall to runoff as rainfall through different processes including evaporation, transpiration, interception, and infiltration. As the models simplify complex physical processes, gaps between the models and actual rainfall events exist. For more accurate simulation, appropriate models that suit analysis goals are selected and reliable long-term hydrological data are collected. However, uncertainty is inherent in models. It is therefore necessary to evaluate reliability of simulation results from models. A number of studies have evaluated uncertainty ingrained in rainfall-runoff models. In this paper, Meta-Gaussian method proposed by Montanari and Brath(2004) was used to assess uncertainty of simulation outputs from rainfall-runoff models. The model, which estimates upper and lower bounds of the confidence interval from probabilistic distribution of a model's error, can quantify global uncertainty of hydrological models. In this paper, Meta-Gaussian method was applied to analyze uncertainty of simulated runoff outputs from $Vflo^{TM}$, a physically-based distribution model and HEC-HMS model, a conceptual lumped model.

  • PDF

A Study on Voice over Internet Protocol Security Response Model for Administrative Agency (행정기관 인터넷전화 보안 대응 모델 개발 연구)

  • Park, Dea-Woo;Yang, Jong-Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.237-240
    • /
    • 2011
  • Voice over Internet Protocol calls using administrative agency to build a national information and communication service, 'C' group, providers, the KT, SK Broadband, LG U+, Samsung SDS, as there are four operators. To prepare for an attack on Voice over Internet Protocol for administrative agency, security is a need for research to support the model. In this paper, the Internet telephone business of Administrative Agency to investigate and analyze the specific security measures to respond. Should set priorities around confidentiality about five security threats from NIS to Study of Voice over Internet Protocol Security Response Model for Administrative Agency. (1) Illegal wiretapping, (2) call interception, (3) service misuse, (4) denial of service attacks, (5) spam attacks, write about and analyze attack scenarios. In this paper, an analysis of protection by security threats and security breaches through a step-by-step system to address the research study is a step-by-step development of the corresponding model.

  • PDF

A Study of Registration Hijacking Attack Analysis for Wi-Fi AP and FMC (Wi-Fi AP와 FMC에 대한 무선 호 가로채기 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.261-264
    • /
    • 2011
  • Corded telephone to the phone using a wireless phone as the trend to switch, free Wi-Fi-enabled mobile phones, netbooks, and mobile devices, are spreading rapidly. But wireless Internet phone calls using your existing Internet network to deliver Internet services because it has a vulnerability that will occur. Government agencies are using Voice over Internet Protocol(VoIP) calls from the current wired and wireless connection and usage is increasing. In this paper, we have discovered that the vulnerability of wireless internet Wi-Fi AP and the FMC administrative agencies, such as VoIP on your wireless device to study the vulnerability. Wi-Fi AP and the FMC is to analyze the vulnerability. VoIP call interception, attack, attack on the base of the experiment is the analysis. Security-enhanced VoIP call for a Wi-Fi AP and the FMC's defense against man-in-the-middle attacks and is the study of security measures.

  • PDF

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF

Experimental Study on the Wake Characteristics of a Perforated Vertical Wall with Gap in the 2-Dimensional Flow (2차원 흐름 중에 놓인 틈새를 갖는 수직벽 후류 특성에 관한 실험적 연구)

  • Jo Dae-Hwan;Oh Kyoung-Gun;Lee Gyoung-Woo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2005.10a
    • /
    • pp.135-140
    • /
    • 2005
  • There are cofferdam and watertight wall to prevent of circulation or pollution during building of ocean structures like a dam and bridge in the harbors area and the sea. Inflow fluid and base of structure is important thing as one of the structural design factors for this interception wall like a cofferdam and watertight wall. In this study, it is revealed that at least 500 instantaneous velocity field data are required for ensemble average to get reliable turbulence statistics. The turbulent shear flow around a surface-mounted vertical wall was investigated by using the two-frame PIV(CACTUS 3.1) system and Mean velocity distributions have also been measured in the whole flow field.

  • PDF

The Influence of K-ratio and Seepage Velocity on Piping Occurrence (Piping현상 발생에 미치는 투수계수비와 침투유속의 영향에 대한 연구)

  • Huh, Kyung-Han;Chang, Ock-Sung
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.8 no.2
    • /
    • pp.129-138
    • /
    • 2008
  • In case of judging the stability of dike or dam structures which need hydraulic interception, the first thing to do is to examine whether a piping phenomenon occurred or not. Generally, dike or dam structures are constructed while layer compacting is executed, so permeability is likely to be anisotropic- different from each other in hydraulic conductivity in the horizontal direction [$k_x$] and hydraulic conductivity in the vertical direction[$k_y$]. This study looked into exit hydraulic gradient and Seepage velocity by conducting an Seepage analysis subsequent to various hydraulic conductivity ratios[k-ratio = ky / kx] and examined the influence on piping by comparing & examining critical Seepage Velocity based on critical hydraulic gradient in theoretical equation and critical Seepage Velocity in empirical equation. As the research result, it was found that hydraulic conductivity ratio operates as a very important factor in case the stability against piping occurrence is considered with the concept of critical hydraulic gradient, but relatively the hydraulic conductivity ratio is very low in its importance in relation to the concept of critical Seepage Velocity.

Performance Analysis of Spread Spectrum Underwater Communication Method Based on Multiband (다중 밴드 기반 대역 확산 수중통신 기법 성능분석)

  • Shin, Ji-Eun;Jeong, Hyun-Woo;Jung, Ji-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.344-352
    • /
    • 2020
  • Covertness and performance are very important design goals in the underwater communications. To satisfy both of them, we proposed efficient underwater communication model which combined multiband and direct sequence spread spectrum method in order to improve performance and covertness simultaneously. Turbo coding method with 1/3 coding rates is used for channel coding algorithm, and turbo equalization method which iterately exchange probabilistic information between equalizer and decoder is used for receiver side. After optimal threshold value was set in Rake processing, this paper analyzed the performance by varying the number of chips were 8, 16, 32 and the number of bands were from 1 to 4. Through the simulation results, we confirmed that the performance improvement was obtained by increasing the number of bands and chips. 2~3 dB of performance gain was obtained when the number of chips were increased in same number of bands.

A Study on Accuracy Improvement for Range and Velocity Estimates in a FM-CW Radar (FM-CW 레이다에서의 거리 및 속도 추정 정확도 향상에 관한 연구)

  • Lee, Jong-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1752-1758
    • /
    • 2010
  • A FM-CW radar is used for the various purposes as a remote sensing device since it has the advantages of the relatively simple implementation and the low probability of signal interception. A FM-CW radar uses the same frequency modulated continuous wave for both transmission and demodulation. Therefore, the received beat frequency represents the range and Doppler information of targets. However, using the conventional FFT method, the degree of accuracy and resolution in the spectrum estimation can be seriously degraded in the detection and tracking of fast moving targets because of the short dwell time. Therefore, in this paper, the model parameter estimation methods called as an autoregressive method is applied to overcome these problems and showed that the improved accuracy and resolution can be obtained for the target range and velocity estimation.