• Title/Summary/Keyword: Bloom

Search Result 1,086, Processing Time 0.024 seconds

BDM Rolling of Middle Sized H-beams from a Bloom (블룸을 이용한 중형 H 형강 BDM 압연 공정 연구)

  • Kim, J.M.;Kim, K.W.;Kim, B.M.
    • Transactions of Materials Processing
    • /
    • v.25 no.1
    • /
    • pp.43-48
    • /
    • 2016
  • H-beams are generally produced by hot rolling composed of a Break Down Mill (BDM) and a Finishing Mill (FM). The goal of the current study was to develop BDM rolling of H300x300 beams from blooms slit from slabs. In order to manufacture H300x300 beams, the caliber design and the pass schedule of BDM rolling were proposed for a bloom instead of a beam blank. The proposed BDM caliber design and pass schedule were tested using FE-simulation and pilot tests. For the major shape dimensions, such as flange width, web height, web thickness, as well as BDM rolling loads, a comparative analysis between the FE-simulation and the pilot rolling tests was conducted. The results of FEM analysis and pilot rolling tests showed good consistency. Moreover, BDM rolling loads were predicted to be in the range of allowable rolling loads. It was concluded that the designed BDM rolling is suitable for implementation within current manufacturing capacity.

Monitoring the 2007 Florida east coast Karenia brevis (Dinophyceae) red tide and neurotoxic shellfish poisoning (NSP) event

  • Wolny, Jennifer L.;Scott, Paula S.;Tustison, Jacob;Brooks, Christopher R.
    • ALGAE
    • /
    • v.30 no.1
    • /
    • pp.49-58
    • /
    • 2015
  • In September 2007, reports of respiratory irritation and fish kills were received by the Florida Fish and Wildlife Conservation Commission (FWC) from the Jacksonville, Florida area. Water samples collected in this area indicated a bloom of Karenia brevis, the dinoflagellate that produces brevetoxin, which can cause neurotoxic shellfish poisoning. For the next four months, K. brevis was found along approximately 400 km of coastal and Intracoastal waterways from Jacksonville to Jupiter Inlet. This event represents the longest and most extensive red tide the east coast of Florida has experienced and the first time Karenia species other than K. brevis have been reported in this area. This extensive red tide influenced commercial and recreational shellfish harvesting activities along Florida's east coast. Fourteen shellfish harvesting areas (SHAs) were monitored weekly during this event and 10 SHAs were closed for an average of 53 days due to this red tide. The length of SHA closure was dependent on the shellfish species present. Interagency cooperation in monitoring this K. brevis bloom was successful in mitigating any human health impacts. Kernel density estimation was used to create geographic extent maps to help extrapolate discreet sample data points into $5km^2$ radius values for better visualization of the bloom.

Spatial Distribution Mapping of Cyanobacteria in Daecheong Reservoir Using the Satellite Imagery (위성영상을 이용한 대청호 남조류의 공간 분포 맵핑)

  • Back, Shin Cheol;Park, Jin Ki;Park, Jong Hwa
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.58 no.2
    • /
    • pp.53-63
    • /
    • 2016
  • Monitoring of cyanobacteria bloom in reservoir systems is important for water managers responsible of water supply system. Cyanobacteria affect the taste and smell of water and pose considerable filtration problems at water use places. Harmful cyanobacteria bloom in reservoir have significant economic impacts. We develop a new method for estimating the cyanobacteria bloom using Landsat TM and ETM+ data. Developed model was calibrated and cross-validated with existing in situ measurements from Daecheong Reservoir's Water Quality Monitoring Program and Algae Alarm System. Measurements data of three stations taken from 2004 to 2012 were matched with radiometrically converted reflectance data from the Landsat TM and ETM+ sensor. Stepwise multiple linear regression was used to select wavelengths in the Landsat TM and ETM+ bands 1, 2 and 4 that were most significant for predicting cyanobacteria cell number and bio-volume. Based on statistical analysis, the linear models were that included visible band ratios slightly outperformed single band models. The final monitoring models captured the extents of cyanobacteria blooms throughout the 2004-2012 study period. The results serve as an added broad area monitoring tool for water resource managers and present new insight into the initiation and propagation of cyanobacteria blooms in Daecheong reservoir.

Study on Outbound Traffic Monitoring with Bloom Filter (블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구)

  • Kang, Seong-Jung;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.327-334
    • /
    • 2018
  • When a PC is infected with a malicious code, it communicates with the control and command (C&C) server and, by the attacker's instructions, spreads to the internal network and acquires information. The company focuses on preventing attacks from the outside in advance, but malicious codes aiming at APT attacks are infiltrated into the inside somehow. In order to prevent the spread of the damage, it is necessary to perform internal monitoring to detect a PC that is infected with malicious code and attempts to communicate with the C&C server. In this paper, a destination IP monitoring method is proposed in this paper using Bloom filter to quickly and effectively check whether the destination IP of many packets is in the blacklist.

The Secure Algorithm on the Sensitive data using Bloom filter and bucket method (버킷과 블룸필터를 혼합한 민감한 데이터 보안)

  • Yu, Choun-Young;Kim, Ji-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.939-946
    • /
    • 2012
  • Recently privacy breaches has been an social issues. If we should encrypt the sensitive information in order to protect the database, the leakage of the personal sensitive data will be reduced for sure. In this paper, we analyzed the existing protection algorithms to protect the personal sensitive data and proposed the combined method using the bucket index method and the bloom filters. Bucket index method applied on tuples data encryption method is the most widely used algorithm. But this method has the disadvantages of the data exposure because of the bucket index value presented. So we proposed the combined data encryption method using bucket index and the bloom filter. Features of the proposed scheme are the improved search performance of data as well as the protection of the data exposure.

Property of Water Environment and Evaluation of Zooplankton as Predators for the Control of Algal Bloom in the Agricultural Reservoir (농업용저수지의 녹조제어를 위한 수환경 특성과 포식성 천적생물의 분리 및 효과분석)

  • Nam, Gui-Sook;Song, Young-Hee;Lee, Eui-Haeng;Hong, Dae-Byuk;Han, Myung-Soo
    • KCID journal
    • /
    • v.18 no.1
    • /
    • pp.33-43
    • /
    • 2011
  • Jundae reservoir has basin area of 234ha, average depth of 3.77m and total storage of $619{\times}10^3m^3$, and is located in Dangin-gun, Chungcheongnam-do. The water quality of Jundae reservoir exceeded the IV grade of water quality standard as available for irrigation water in COD, TN, TP, Chl-a. COD and Chl-a were higher in spring season, because the algal bloom by phytoplankton increased. And the algal blooms in October by inflow non-point pollution during summer rainy season. The most dominant zooplankton was rotifers during study period at all stations. Dominant species were Keratella cochlearis, Polyarthra spp., and Trichocerca spp. We successfully established 2 isolated clone cultures as predator. One is Rotifer, Euchlanis sp. and another is cladocerans, Bosmina sp. To test the removal rate of 2 cultures against Microcystis aeruginosa, we inoculated Euchlanis sp. and Bosmina sp. separately when the abundance reached at $1.0{\times}10^6$cells/ml. Euchlanis sp. removed M. aeruginosa around 98.9% and Bosmina sp. removed it around 98.4%. They are useful grazers for controling algae blooms, Euchlanis sp. and Bosmina sp. feeding on M. aeruginosa highly.

  • PDF

Monitoring algal bloom in river using unmanned aerial vehicle(UAV) imagery technique (UAV(Unmanned aerial vehicle)를 활용한 하천 녹조 모니터링 평가)

  • Kim, Eun-Ju;Nam, Sook-Hyun;Koo, Jae-Wuk;Hwang, Tae-Mun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.6
    • /
    • pp.573-581
    • /
    • 2018
  • The purpose of this study is to evaluate the fixed wing type domestic UAV for monitoring of algae bloom in aquatic environment. The UAV used in this study is operated automatically in-flight using an automatic navigation device, and flies along a path targeting preconfigured GPS coordinates of desired measurement sites input by a flight path controller. The sensors used in this study were Sequoia multi-spectral cameras. The photographed images were processed using orthomosaics, georeferenced digital surface models, and 3D mapping software such as Pix4D. In this study, NDVI(Normalized distribution vegetation index) was used for estimating the concentration of chlorophyll-a in river. Based on the NDVI analysis, the distribution areas of chlorophyll-a could be analyzed. The UAV image was compared with a airborne image at a similar time and place. UAV images were found to be effective for monitoring of chlorophyll-a in river.

The Selective Inhibitory Activity of a Fusaricidin Derivative on a Bloom-Forming Cyanobacterium, Microcystis sp.

  • Ko, So-Ra;Lee, Young-Ki;Srivastava, Ankita;Park, Seung-Hwan;Ahn, Chi-Yong;Oh, Hee-Mock
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.1
    • /
    • pp.59-65
    • /
    • 2019
  • Fusaricidin analogs, produced by Paenibacillus polymyxa, were tested for selective control of a major bloom-forming cyanobacterium, Microcystis sp. Fusaricidin (A and B mixtures) and four analogs were isolated from P. polymyxa E681 and investigated for their inhibition of cyanobacterial cell growth. Among the four fusaricidin analogs, fraction 915 Da (designated as Fus901) showed growth inhibition activity for Microcystis aeruginosa but not for Anabaena variabilis and Scenedesmus acutus. Microcystin concentration decreased up to 70% and its content per cell also decreased over 50% after 3 days. Fusaricidin exhibited growth inhibition against Gram-positive bacteria but Fus901 did not. Molecular weights of fusaricidin A and B were 883 Da and 897 Da, whereas that of Fus901 was 915 Da. Structure analysis by a ring-opening method revealed a linear form for Fus901. Expression of the pod gene related to oxidative stress was increased 2.1-fold by Fus901 and that of mcyD decreased up to 40%. These results indicate that Fus901 exerts oxidative stress against M. aeruginosa. Thus, Fus901 can be used as a selective cyanobactericide without disturbing the ecological system and could help in decreasing the microcystin concentration.

Efficient Authentication Protocol for Low-Cost RFID System (저비용 RFID 시스템에 적합한 효율적인 인증 방법)

  • Kim, Jin-Ho;Seo, Jae-Woo;Lee, Pil-Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.117-128
    • /
    • 2008
  • Compared with the existing bar code system, RFID system has lots of advantages such as it identifies automatically massive objects. We might anticipate RFID technology will be a substitution for an optical bar code system in the near future. However, their feature that uses radio waves may cause various security problems. Many kinds of solutions have been researched to overcome these security problems. In this paper, we analyze the previous proposed protocols. And then, we categorize RFID authentication into two types according to the synchronization requirement between a Back-end Database and a Tag. In addition, we introduce the previous proposed approaches to tag search problem in RFID authentication. And we propose an efficient method which provides fast tag search by using membership test algorithm, a Bloom filter.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.