• Title/Summary/Keyword: Bounded

Search Result 2,235, Processing Time 0.024 seconds

Process of Hairpin Vortex Packet Generation in Channel Flows (채널 유동 내에서 헤어핀 보텍스 패킷의 형성 과정)

  • Kim, Kyoung-Youn
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.36 no.8
    • /
    • pp.839-847
    • /
    • 2012
  • Numerical simulations for channel flows with $Re_{\tau}$ = 180, 395 and 590 have been performed to investigate the hairpin packet formation process in wall-bounded turbulent flows. Using direct numerical simulation databases, the initial flow fields are given by the conditionally averaged flow field with the second quadrant event specified at the buffer layer. By tracking the initial vortex development, the change in the initial vortex to an ${\Omega}$-shaped vortex and th generation of a secondary hairpin vortex were found to occur with time scales based on the wall units. In addition, at the time when the initial vortex has grown to the channel center, the inclination angle of the hairpin vortex packet is approximately $12{\sim}14^{\circ}$, which is similar for all three Reynolds numbers. Finally, numerical simulations of the evolution of two adjacent hairpin vortices have been performed to examine the interaction between the adjacent vortex packets.

A Statistic-based Response System against DDoS Using Legitimated IP Table (검증된 IP 테이블을 사용한 통계 기반 DDoS 대응 시스템)

  • Park, Pilyong;Hong, Choong-Seon;Choi, Sanghyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.827-838
    • /
    • 2005
  • DDoS (Distributed Denial of Service) attack is a critical threat to current Internet. To solve the detection and response of DDoS attack on BcN, we have investigated detection algorithms of DDoS and Implemented anomaly detection modules. Recently too many technologies of the detection and prevention have developed, but it is difficult that the IDS distinguishes normal traffic from the DDoS attack Therefore, when the DDoS attack is detected by the IDS, the firewall just discards all over-bounded traffic for a victim or absolutely decreases the threshold of the router. That is just only a method for preventing the DDoS attack. This paper proposed the mechanism of response for the legitimated clients to be protected Then, we have designed and implemented the statistic based system that has the automated detection and response functionality against DDoS on Linux Zebra router environment.

Adaptive Fuzzy Sliding Mode Control for Nonlinear Systems without Parameter Projection Method (파라미터 투영 기법이 필요 없는 비선형 시스템의 적응 퍼지 슬라이딩 모드 제어)

  • Seo, Sam-Jun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.4
    • /
    • pp.499-505
    • /
    • 2011
  • In this paper, we proposed an adaptive fuzzy sliding mode control for nonlinear systems without parameter projection method. By modifying the controller structure, the parameters of the estimated input gain function are guaranteed not being identically zero and it is shown that the control scheme will not cause any implementation problem even if the estimated value of input gain function is zero at any moment during on-line operations. Except for the input gain function which an approximate estimate for its lower bound is needed, the proposed control scheme does not assume a priori the exact values of the bounding parameters. Based on Lyapunov synthesis methods, the overall control system guarantees that the tracking error asymptotically converges to zero and that all signals involved in controller are uniformly bounded. This can be illustrated by the simulation results for an inverted pendulum system.

Using One and One-Half Bounded Dichotomous Choice Contingent Valuation Methods to Estimate Non-market Value of Otters in Cheongju·Cheongwon Area (일점오양분선택모형을 이용한 청주·청원 지역의 수달 서식지 보호의 비시장적 가치추정)

  • Yoo, Jin-Chae;Kim, Jeong-Eun
    • Environmental and Resource Economics Review
    • /
    • v.17 no.2
    • /
    • pp.349-379
    • /
    • 2008
  • Otters which are the nearly extinct feral animal as well as indicator species of ecological balance of river have a wide variety of public value. The objective of this paper is to estimate non-market value of preservation of otters' habitats in Cheongju Si and Cheong won Gun. In this research, the one-and-one-half bound dichotomize choice method as a contingent valuation methods is used to derive willingness to pay for the preservation of otters' habitats. 311 residents were surveyed to determine their recognition and willingness to pay for preservation of otters' habitats. The results show that the value of preservation of otters' habitats is 5,904 won per house and month.

  • PDF

Optimum Operating Conditions of a Vacuum Nozzle Seeder (진공노즐식 파종기의 최적 작동조건)

  • 민영봉;김성태;정태상
    • Journal of Biosystems Engineering
    • /
    • v.25 no.6
    • /
    • pp.463-470
    • /
    • 2000
  • For maximum seeding efficiency of a nozzle type seeder, the performance of the nozzle should be considered sufficiently. This study was carried out to investigate the optimum operating conditions of a seeder attached the vacuum nozzle which was modified syringe needle acting on the plug seedling tray and the seed plate. Such operating factors as the hole diameter of the nozzle (d), the distance from the nozzle tip to the bottom plate of seed hopper(D) the absorbing air pressure of the nozzle tip(P) the bounding height of seed from the vibrated bottom plate of seed hopper and the seeding speed were selected based on the weight of a grain of seed(W). The treated materials were pepper seed as the flat type, cucumber seed as the oval type and radish seed as the spherical type. The optimum operating conditions of the experimental seeder were revealed as follows: 1. The height of the seed bounding from the bottom plate of seed hopper and the distance from nozzle tip to bounded seed were 5 mm and 0.5 mm at all seeds. The hole diameter of the nozzle and the absorbing pressure for pepper seed, cucumber seed and radish seed was 0.45 mm, 0.65 mm. 0.65mm and 39.2 kPa, 88.3 kPa, 58.8 kPa, respectively. 2. The absorbing pressure P was represented as P=η.4W/$\pi$d$^2$ where η was 100. The seeding speed using a 128 cell tray was 2.4 cm/s which was same transfer as 2.5 trays per minute. 3. The maximum seeding rate in case of the pepper seed was 97% the cucumber seed was 95% and the radish seed was 100% under the optimum operating conditions of the seeder.

  • PDF

Alpha 1,3-Galactosyltransferase Deficiency in Miniature Pigs Increases Non-Gal Xenoantigens

  • Min, Gye-Sik;Park, Jong-Yi
    • Reproductive and Developmental Biology
    • /
    • v.35 no.4
    • /
    • pp.511-518
    • /
    • 2011
  • To avoid hyperacute rejection of xenografts, ${\alpha}1,3$-galactosyltransferase knock-out (GalT KO) pigs have been produced. In this study, we examined whether Sia-containing glycoconjugates are important as an immunogenic non-Gal epitope in the pig liver with disruption of ${\alpha}1,3$-galactosyltransferase gene. The target cells were then used as donor cells for somatic cell nuclear transfer (scNT). A total of 1,800 scNT embryos were transferred to 10 recipients. One recipient developed to term and naturally delivered two piglets. Real-time RT-PCR and glycosyltransferase activity showed that ${\alpha}2,3$-sialyltransferase (${\alpha}2,3ST$) and ${\alpha}2,6$-sialyltransferase (${\alpha}2,6ST$) in the heterozygote GalT KO liver have higher expression levels and activities compared to controls, respectively. According to lectin blotting, sialic acidcontaining glycoconjugate epitopes were also increased due to the decreasing of ${\alpha}$-Gal in heterozygote GalT KO liver, whereas GalNAc-containing glycoconjugate epitopes were decreased in heterozygote GalT KO liver compare to the control. Furthermore, the heterozygote GalT KO liver showed a higher Neu5Gc content than control. Taken together, these finding suggested that the deficiency of GalT gene in pigs resulted in increased production of Neu5Gc-bounded epitopes (H-D antigen) due to increase of ${\alpha}2,6$-sialyltransferase. Thus, this finding suggested that the deletion of CMAH gene to the GalT KO background is expected to further prolong xenograft survival.

Estimation of Willingness to Pay for Smart Home Service by Contingent Valuation Method (조건부가치측정법을 이용한 스마트 홈 서비스의 지불의사액 추정)

  • Kim, Yonghee;Lim, Sung Eun;Choi, Jeongil
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.4
    • /
    • pp.833-843
    • /
    • 2016
  • Purpose: The purpose of this study is to evaluate the value of smart home service using contingent valuation method that is the method evaluating the value of service which will be provided in the future. Using this method, this study suggests proper price and market value of smart home service through figuring out customer's willingness to pay. Methods: To estimate willingness to pay for smart home service, this study uses double bounded dichotomous choice question. The survey was conducted for 2 months from December in 2015 to February in 2016. A total of 269 copies were used to estimate through R-programming. Results: The results of this study are as follows; Gender(especially woman), income, proposed price are the factors which affecting willingness to pay. As the result of this study, average price of willingness to pay for smart home service estimates as \29,653. Comparing with high-speed internet bundling service fee, this estimated price for smart home service is appropriate level for customers to accept. Conclusion: This study estimates consumer's willingness to pay for smart home service which is in the market entry stage. In corporate side, this study might be meaningful for estimating investment scale and profit. Also it could provide basis for establishing strategic policy to develop smart home service market in government side.

Performance of MAC frame Fragmentation and Efficient Flow Control Schemes for Synchronous Ethernet Systems (동기식 이더넷 시스템용 MAC 프레임 분할 방식과 효율적인 흐름제어 방식의 성능 분석)

  • Choi Hee-Kyoung;Yoon Chong-Ho;Cho Jae-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.838-846
    • /
    • 2005
  • In this paper, we consider the following two issues for implementing the synchronous Ethernet systems. First, a synchronous Ethernet system employs a fixed size superframe which is divided into a synchronous period and an asynchronous one. We note that the starting point of a superframe is not deterministic when an ordinary data frame's transmission is overlapped the superframe boundary. This overlap may be a fatal drawback for strict jitter bounded applications. Circumventing the problem, we propose a frame fragmentation scheme to provide a zero jitter, and compare its delay performance with the hold scheme which also provides the zero jitter. We next concern that IEEE 802.3x pause frames cannot be promptly transmitted in a synchronous period, and thus asynchronous traffics may be dramatically get dropped at the input buffer of a switch. To handle the problem, we propose an efficient flow control by allowing the transmission of the pause frame in a synchronous period, and investigate the blocking probability of the asynchronous traffics by the simulation.

Vibration control of a single-link flexible manipulator using fuzzy- sliding modes (퍼지-슬라이딩 모드를 이용한 단일링크 유연 매니퓰레이터의 진동제어)

  • Choi, Seung-Bok
    • Journal of KSNVE
    • /
    • v.6 no.1
    • /
    • pp.35-44
    • /
    • 1996
  • This paper presents a new type of fuzzy-sliding mode controller for robust tip position control of a single-link flexible manipulator subjected to parameter variations. A sliding mode controller is formulated with an assumption that imposed parameter variations are bounded so that certain deterministic performance can be guaranted. In the design of the sliding mode controller, so called moving sliding surface is adopted to minimize the reaching phase and thus mitigate system sensitivity to the variations. The sliding mode controller is then incorporated with a fuzzy technique to reduce inherently ever-existing chattering which is impediment in position control of flexible manipulators. A set of fuzzy parameters and control rules are obtained from a relation between predetermined sliding surface and representative points in the state space. Computer simulations are undertaken in order to demonstrate superior control performance of the proposed methodology.

  • PDF

Using One and One-half Bounded Dichotomous Choice Model to Measure the Economic Benefits of Urban Noise Reduction (1.5경계 양분선택형 모형을 이용한 도시소음 저감의 편익 추정)

  • Yoo, Seung-Hoon
    • Environmental and Resource Economics Review
    • /
    • v.16 no.3
    • /
    • pp.451-483
    • /
    • 2007
  • Recently, the problem of noise has received much attention in the urban environment. This paper attempts to measure the economic benefits of urban noise reduction in the metropolitan area. To this end, the dichotomous choice contingent valuation method is applied. In particular, recently proposed one and one-half bound model that reduces the potential for response bias in the double bound model while maintaining much of its efficiency. We surveyed a randomly selected sample of 800 households in the metropolitan area and asked respondents questions in person-to-person interviews about how they would willing to pay for the noise reduction. Respondents overall accepted the contingent market and were willing to contribute a significant amount (997 to 1,778 won), on average, per household per month. This willingness varies according to individual characteristics such as concerns about noise, dwelling area, and income. The aggregate value of the noise reduction in the sampled metropolitan area amounts to approximately 79.26 to 141.35 billion won per year.

  • PDF