• Title/Summary/Keyword: leakage, separation

Search Result 94, Processing Time 0.02 seconds

Numerical Analysis of a Tip Leakage Vortex in an Axial Flow Fan (축류홴 익단누설와류의 수치적 해석)

  • Jang, Choon-Man;Kim, Kwang-Yong
    • 유체기계공업학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.404-411
    • /
    • 2003
  • Three-dimensional vortical flow and separated flow topology near the casing wall in an axial flow fan having two different tip clearances have been investigated by a Reynolds-averaged Wavier-Stokes (RANS) flow simulation. The simulation shows that the tip leakage vortex formed close to the leading edge of the blade tip on suction side grows in the streamwise direction. On the casing wall, a separation line is formed upstream of the leakage vortex center due to the interference between the leakage vortex and main flow. The reverse flow is observed between the separation line and the attachment line generated downstream of the trailing edge, and increased with enlarging tip clearance. The patterns of a leakage velocity vector including a leakage flow rate are also analyzed according to two tip clearances. It is noted that the understanding of the distribution of a limiting streamline on the casing wall is very important to grasp the characteristics of the vortical flow in the axial flow fan.

  • PDF

A Study on the Characteristics of Electric Shock in Water due to the Leakage of Submerged Electric Facility (침수된 전기설비의 누전으로 인한 수중에서의 감전특성에 관한 연구)

  • 김두현;강동규
    • Journal of the Korean Society of Safety
    • /
    • v.17 no.3
    • /
    • pp.61-65
    • /
    • 2002
  • A study on the characteristics of electric shock in fresh water due to the leakage of submerged electric facility is conducted by using a reduced scale model at a scale of 1:10 in laboratory. Electric potential as a function of distance from leakage source, type of the leakage source, magnitude of the source voltage, submerged depth and diameter of a copper rod electrode is measured. On the basis of safety standard, separation for guarantee of safety is determined by the measured potential. Also supposing that body resistance is 500[$\Omega$], the human reaction was estimated by calculating body current for some shock duration. Thus, in this paper, the hazard of the electric shock is assessed by introducing representative safety factors, body voltage and body current due to leakage source.

Numerical Analysis of a Tip Leakage Vortex in an Axial Flow Fan (축류홴 익단누설와류의 수치적 해석)

  • Jang, Choon-Man;Kim, Kwang-Yong
    • The KSFM Journal of Fluid Machinery
    • /
    • v.7 no.1 s.22
    • /
    • pp.36-44
    • /
    • 2004
  • Three-dimensional vortical flow and separated flow topology near the casing wall in an axial flow fan having two different tip clearances have been investigated by a Reynolds-averaged Navier-Stokes (RANS) flow simulation. The simulation shows that the tip leakage vortex formed close to the leading edge of the blade tip on suction side grows in the streamwise direction. On the casing wall, a separation line is formed upstream of the leakage vortex center due to the interference between the leakage vortex and main flow. The reverse flow is observed between the separation line and the attachment line generated downstream of the trailing edge, and increased with enlarging tip clearance. The patterns of a leakage velocity vector including a leakage flow rate are also analyzed according to two tip clearances. It is noted that the understanding of the distribution of a limiting streamline on the casing wall is very important to grasp the characteristics of the vortical flow in the axial flow fan.

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

A Study on Long-Term Seepage Behaviour of Fill Dam by the Monitoring Data Analysis (계측자료 분석에 의한 필댐의 장기 침투거동 연구)

  • Chung, Kyujung;Lee, Song
    • Journal of the Korean GEO-environmental Society
    • /
    • v.11 no.9
    • /
    • pp.15-25
    • /
    • 2010
  • The main objective of this study was to offer informations about long-term seepage behavioral characteristics and to find a leakage safety management method for Juam Dam and Imha Dam, a central cored rockfill dams in Korea by the evaluating the automatically monitored leakage data. In the water leakage monitoring of fill dam, the generation of abnormal water leakage is difficult to directly detect due to the effect of outside factors such as the component of rainfall inherent in the observation value. Therefore, conventionally estimation methods of water leakage quantity were applied by multiple regression analysis considering reservoir water level, rainfall, etc.. However, the estimated error of rainfall component is relatively big in these method. This paper identifies the seepage characteristic of each dams which is not directly affected by rainfall through the hydrograph separation analysis and 3 dimensional analytical method, and thinks a leakage management method. It was noticed that two dams had site specific seepage behaviour features and were in stable state with the decreasing leakage quantity. It was also found that hydrograph separation method might be applicable to leakage safety management method.

The Construction of Logical, Physical Network Separation by Virtualization (가상화를 이용한 논리적, 물리적 망분리 구축)

  • Lee, YongHui;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.

A Study on the Effect of Damages on the Conditions of Dike in the Leakage of Hydrochloric Acid Storage Tank (염산 저장탱크 누출 시 방류벽 조건에 따른 피해영향 연구)

  • Kang, Jungchun;Kim, Seungha;Kim, KyuHwan;Kim, YeonSoo;Kwon, Donguk
    • Korean Journal of Hazardous Materials
    • /
    • v.6 no.2
    • /
    • pp.7-12
    • /
    • 2018
  • Hydrochloric acid is a highly corrosive toxic substance and requires proper safety to minimize damage in case of leakage. Among the various risk-reduction facilities, the dike is a typical safety facility installed to protect the surrounding buildings and facilities by preventing the external spread of hazardous materials from the storage tank. In this study, the KORA program was used to assume leakage accident of hydrochloric acid storage tank. At this time, the extent of the damage effects of ERPG-2 were assessed for each of the three separation distance between the storage tank and the dike. The study found that the smaller the separation distance between the dike and the storage tank, the smaller the extent of damage caused by hydrochloric acid leakage, and the greater the impact of indoor conditions under the same conditions. Through this process, we are going to assist in selecting locations and installing facilities for new and existing businesses.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

A Study on the Separation of Electrolyte from Amino Acid Solution through Electrodialysis (전기투석법을 이용한 아미노산으로부터 전해질 분리정제에 관한 연구)

  • 김석곤;한정우;김한성;전경용;조영일
    • Membrane Journal
    • /
    • v.4 no.3
    • /
    • pp.163-170
    • /
    • 1994
  • The separation of inorganic salt from amino acid solution using was performed electrodialysis. In order to review the availability of electrodialysis using isoelectric point of amino acid as a bio-separation technique, electrodialysis stacks were designed using ion exchange membrane. Separation of NaCl from amino acid solution was performed in the condition similar to amino acid fermentation process. To obtain otimum conditions of separation, leakage of amino acid depending of pH and limiting current density were measured. On the basis of optimum condition, removal of NaCl and leakage of amino acid were investigated quantitatively in batch and continuous process, and current efficiencies were also obtained. As a result of batch experiment for 11 hours each amino acid solution, removal efficiencies of NaCl were in the ranges of 96.1~96.2%. Amino acid leakage rate of glycine, methionine, alanine were 2.5, 1.7, 2.0% respectively. Current efficiencies were in the ranges of 44.5~44.6%. As a result of continuous experiment in various flow rate of each amino acid solution, it took 120 ~ 150 min to reach to steady state. Removal efficiency of NaCl was increased as the flow rate was decreased, but current efficiency was decreased. At the steady states, there were no leakage of amino acid.

  • PDF

Numerical Study of Leakage Flow Characteristics by Tip Clearance of Turbine Cascades (터빈익렬 말단간극에 따른 누설유동특성에 대한 수치해석적 연구)

  • Yang S. Y.;Myong H. K.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2002.05a
    • /
    • pp.102-108
    • /
    • 2002
  • Numerical analysis has been conducted in order to simulate the flow characteristics by tip clearance of turbine cascades. A 3-D Navier-Stokes CFD code based on body-fitted coordinate system, pressure-correction and finite volume method has been used along with a commercial CFD code. The present results have showed that the development and generation of leakage vortex, vortex within tip clearance, etc. are clearly simulated, consistent with the generally known tendency. The leakage vortex occurs mainly by a separation of leakage flow that arises due to a pressure difference between two surfaces of the blade at the tip.

  • PDF