• Title/Summary/Keyword: Attack Flow

Search Result 613, Processing Time 0.028 seconds

Development of KD-Propeller Series Using a New Blade Section

  • Lee, Jin-Tae;Kim, Moon-Chan;Ahn, Jong-Woo;Kim, Ho-Chung
    • Selected Papers of The Society of Naval Architects of Korea
    • /
    • v.1 no.1
    • /
    • pp.76-90
    • /
    • 1993
  • A new propeller series is developed using the newly developed blade section (KH 18 section) which has better cavitation characteristics and higher lift-drag ratio at wade angle-of-attack range than a conventional section. The radial patch distribution of the new series propellers is variable stance they were designed adaptively to a typical wake distribution. Basic geometric particulars of the series propellers. such as chord length, thickness, skew and rake distributions, are determined on the basis of recent full scale propeller geometric data. The series is developed for propellers having 4 blades, and blade area ratios of 0.3, 0.45, 0.6 and 0.75. Mean pitch ratios are varied as 0.5, 0.6, 0.7, 0.95 and 1.1 for each blade area ratio. The new propeller series consists of 20 propellers and is named as the KD(KRISO-DAEWOO)-propeller series. Propeller open-water tests are performed at the towing tank, and cavitation observation tests and fluctuating pressure tests are carried out at the cavitation tunnel of KRISO. $B_{p}-\delta$ curves, which can be used to select the optimum propeller diameter at the preliminary design stage, are derived from a regression analysis of the propeller open-water test results. The KD-cavitation chart is derived from the cavitation observation test results by choosing the local maximum lift coefficient and the local cavitation number as parameters. The cavity extent predicted by the KD-cavitation chart would be more accurate compared to that by an existing cavitation charts, such as the Burrll's cavitation chart, since the former is derived from the cavitation observation test results in a typical ship's wake, while the lather is derived from the test results in a uniform flow.

  • PDF

Yearly Report on CVA patients (IV) (뇌졸중환자(腦卒中患者)에 대한 연례보고(年例報告)(IV))

  • Shim, Mun-Ki;Jun, Chan-Yong;Park, Chong-Hyeong
    • The Journal of Korean Medicine
    • /
    • v.19 no.2
    • /
    • pp.59-74
    • /
    • 1998
  • Clinical observation was done on 272 cases of patients who were diagnosed as CVA with brain CT, TCD, MRI scan and clinical observation. They were hospitalized in the oriental medical hospital of Kyung-Won University from 1st January to 31st December in 1997. 1. The cases were classified into the following kinds: cerebral infarction, cerebral hemorrhage. and transient ischemic attack. The most case of them was the cerebral infarction. 2. There is no significant difference in the frequency of strokes in male and female. And the frequency of strokes was highest in the aged over 50. 3. In cerebral infarction the most frequent lesion was the territory of middle cerebral artery, and in cerebral hemorrhage the most frequent lesion was the basal ganglia. 4. The most ordinary preceding disease was hypertension. and the next was diabetes. 5. The rate of recurrence was high in cerebral infarction. 6. The cerebral infarction occurred usually in resting and sleeping, and the cerebral hemorrhage in acting. 7. The common symptoms were motor disability and verbal disturbance. 8 The average time to start physical therapy was 1l.3rd day after stroke in cerebral infarction and it was 15.2th day after stroke in cerebral hemorrhage. 9. The common complications were urinary tract infection, pneumonia, myocardial infarction. 10. Hypercholesterolemia and hypertriglyceridemia are usually found more frequently in cerebral infarction than in hemorrhage. 11. In acute or subacute stage, the methods of smoothening the flow of ki(順氣), dispelling phlegm(祛痰), clearing away heat(淸熱) or purgation(瀉下) were frequently used. and in recovering stage, the methods of replenishing ki(補氣), tonifying the blood(補血) or tranquilization(安神) were frequently used.

  • PDF

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

The Literary study on Chongmai (충맥(衝脈)에 대(對)한 문헌적(文獻的) 고찰(考察))

  • Kim, Seong-Il;Song, Choon-Ho
    • Journal of Acupuncture Research
    • /
    • v.17 no.2
    • /
    • pp.85-93
    • /
    • 2000
  • We came to the conclusion after considering all the information from many kinds of books on the circulation courses, cross-link points, functions and the symptoms of disease of Chongmai. The results were as follows : 1. The Chongmai that starts from a Uterus flows to Dazhu through the inside of vertebra after joining Renmai and Duimai at Huiyin. The Chongmais up-line that comes out from Qichong into a surface of body arrives and is scattered at a chest through an abdomen. One strand of them goes upward again and is connected to a throat and lips area. After coming out from Qichong, separated down-line is divided into two parts when it arrives a inner part of a heel through the inner part of a leg. One is for an instep, the other is for the sole of a foot. 2. We call it "Sea of Twelve Meridians" or "Meridian's Sea". Because Chongmai controls all of Meridian by acquired "Basic energy" as getting Stomach's energy, Kidney's energy and air-energy, and there are responsible of physiological phenomenon control. And also we name it "Sea of Blood", because it starts from and provides a nutrition to Uterus. 3. All of these four Meridian such as Renmai, Kidney Meridian, Stomach Meridian and Spleen Meridian are ones that flow around the part of a chest and an abdomen. Chongmai makes energy and blood circulation of a chest and an abdomen be stronger and be controlled. Therefore it makes viscera, bowels and body surface be warm and given a nutrition. So Chongmai becomes "Sea of Viscera and Bowels". 4. Chongmai provides a nutrition for ligament and muscle and makes legs get warm as making energy and blood circulate from head to foot. If Chongmai is energetic, hair is completely easy to grow. 5. To see in pathological phase, Chongmais failure or weakness causes like a chest pain, stomachache, heart attack, a menstrual irregularity and sterility and so on. And also if Chongmai is damaged, it happens that giving a nutrition for lips area is stopped, and then mustache doesn't grow any more.

  • PDF

High Lift Device Design Optimization and Wind Tunnel Tests (고양력장치 설계 최적화 및 풍동시험)

  • Lee, Yung-Gyo;Kim, Cheol-Wan;Cho, Tae-Hwan
    • Aerospace Engineering and Technology
    • /
    • v.9 no.1
    • /
    • pp.78-83
    • /
    • 2010
  • In the present paper, a flap was optimized to maximize the lift. A 2-element fowler flap system was utilized for optimization with an initial shape of general aviation airfoil and a flap shape designed by Wentz. Response surface method and Hicks-Henne shape function were implemented for optimization. 2-D Navier-Stokes method was used to solve flow field around aGA(W)-1 airfoil with a fowler flap. Commercial programs including Visual-Doc, Gambit/Tgridand Fluent were used. Upper surface shape and the flap gap were optimized and lift for landing condition was improved considerably. The original and optimized flaps were tested in the KARI's 1-m low speed wind tunnel to examine changes in aerodynamic characteristics. For optimized flap tests, the similar trend to prediction could be seen but stall angle of attack was lower than what was expected. Also, less gap than optimized design delayed stall and produced better lift characteristics. This is believed to be the effect of turbulence model.

Aerodynamic characteristics investigation of Megane multi-box bridge deck by CFD-LES simulations and experimental tests

  • Dragomirescu, Elena;Wang, Zhida;Hoftyzer, Michael S.
    • Wind and Structures
    • /
    • v.22 no.2
    • /
    • pp.161-184
    • /
    • 2016
  • Long-span suspension bridges have evolved through the years and with them, the bridge girder decks improved as well, changing their shapes from standard box-deck girders to twin box and multi-box decks sections. The aerodynamic characteristics of the new generation of twin and multiple-decks are investigated nowadays, to provide the best design wind speeds and the optimum dimensions such bridges could achieve. The multi-box Megane bridge deck is one of the new generation bridge decks, consisting of two side decks for traffic lanes and two middle decks for railways, linked between them with connecting beams. Three-dimensional CFD simulations were performed by employing the Large Eddy Simulation (LES) algorithm with a standard Smagorinsky subgrid-scale model, for $Re=9.3{\times}10^7$ and angles of attack ${\alpha}=-4^{\circ}$, $-2^{\circ}$, $0^{\circ}$, $2^{\circ}$ and $4^{\circ}$. Also, a wind tunnel experiment was performed for a scaled model, 1:80 of the Megane bridge deck section, for $Re=5.1{\times}10^5$ and the aerodynamic static coefficients were found to be in good agreement with the results obtained from the CFD-LES model. However the aerodynamic coefficients determined individually, from the CFD-LES model, for each of the traffic and railway decks of the Megane bridge, varied significantly, especially for the downstream traffic deck. Also the pressure distribution and the effect of the spacing between the connecting beams, on the wind speed profiles showed a slight increase in turbulence above the downstream traffic and railway decks.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

An Experimental Study on Transonic Airfoil Flows in a Shock Tube (충격파관 내 천음속 날개 유동에 관한 실험적 연구)

  • Lee, Dong-Won;Gwon, Sun-Beom;;Kim, Byeong-Ji;Kim, Tae-Uk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.2
    • /
    • pp.11-16
    • /
    • 2006
  • An experimental study of the transonic flows over NACA and double wedge airfoils was conducted with a shock tube. The configuration of test section with a slotted wall and chamber was designed and tested to minimize wall and reflected shock wave effects and use the shock tube as simple and less costly wind tunnel generating the relatively high Reynolds numbers transonic flow. Transonic airfoil flows at hot gas Mach numbers of 0.80~0.84, Reynolds number of about $1.2{\times}10^6$ on airfoil chord length and angles of attack of $0^{\circ}$ and $2^{\circ}$ were visualized with the shadowgraph method. The shock wave profiles on the airfoils were compared with the corresponding results from the conventional transonic wind tunnel tests. The experimental results showed that present shock tube exhibited the proper performance characteristics as transonic wind tunnel for tested Mach number range and airfoils.

XML Encryption System on WIPI Environment (WIPI환경에서 XML문서 암호화시스템)

  • Hong, Hyeon-Woo;Lee, Jae-Seung;Lee, Seoung-Hyeon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1694-1701
    • /
    • 2007
  • Recently The biggest three mobile telecommunication companies of our country still using independence wireless internet platform. And, It can so many difficulties to the phone company and content provide company. Such as the timing of the development or the fee of the development. Because even they develop one product and Hey must make it prepare for some platform of every mobile telecommunication companies. And this make the development more longer and more expensive. For this reason, SKT, LG telecom and KTF develop the new wireless internet platform named WIPI with ETRI. and the working is still go on and go ahead with propulsion. And if it come to reality, the WIPI will attached from much of attack such as hacking or virus. But some data exchange between mobile phone is so important as to flow. Thus, in this paper, we consideration the XML using in the wireless environment and we are design and implementation the XML encryption system working at the WIPI in order to protect the data, we want to protect.

A Numerical Study on the Geometry of Jet Injection Nozzle of a Coanda Control Surface

  • Seo, Dae-Won;Kim, Jong-Hyun;Kim, Hyo-Chul;Lee, Seung-Hee
    • Journal of Ship and Ocean Technology
    • /
    • v.12 no.3
    • /
    • pp.36-54
    • /
    • 2008
  • A jet stream applied tangential to a curved surface in fluid increases lift force by strengthening circulation around the surface and this phenomenon is known as the Coanda effect. Many experimental and numerical studies have been performed on the Coanda effect and the results found to be useful in various fields of aerodynamics. Recently, preliminary studies on Coanda control surface are in progress to look for practical application in marine hydrodynamics since various control surfaces are used to control behaviors of ships and offshore structures. In the present study, the performance of a Coanda control surface with different geometries of the jet injection nozzle was surveyed to assess applicability to ship rudders. A numerical simulation was carried out to study flow characteristics around a section of a horn type rudder subjected to a tangential jet stream. The RANS equations, discretized by a cell-centered finite volume method were used for this computation after verification by comparing to the experimental data available. Special attentions have been given to the sensitivity of the lift performance of a Coanda rudder to the location of the slit (outlet) and intake of the gap between the horn and rudder surface at the various angles of attack. It is found that the location of the water intake is important in enhancing the lift because the gap functions as a conduit of nozzle generating a jet sheet on the rudder surface.