• Title/Summary/Keyword: IP2

Search Result 2,044, Processing Time 0.028 seconds

A Preliminary Drop Test of a Type IP-2 Transport Package with a Bolted Lid Type (볼트체결방식의 IP-2형 운반용기의 낙하예비시험)

  • Kim Dong-Hak;Seo Ki-seog;Park Hong Yun;Lee Kyung Ho;Yoon Jeong-Hyoun;Lee Heung-Young
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2005.11a
    • /
    • pp.339-347
    • /
    • 2005
  • A type IP-2 transport package should prevent a loss or dispersal of the radioactive contents and a more than $20\%$ increase in the maximum radiation level at any external surface of the package when it were subjected to the drop test under the normal conditions of transport. If a shielding thickness of IP-2 transport package is thick, a bolted lid type may prevent a loss or dispersal of the radioactive contents than the door type of ISO containers which are generally used as a type IP-2 transport package. In this paper, to evaluate the effect of drop directions on the bolt tension and the coherence of a bolt, the drop tests of preliminary small model are tested and evaluated for seven directions before the drop test of a type IP-2 transport package with a bolted lid type under the normal conditions of transport. Seven drop directions which are a bottom-vertical drop, a lid-vortical drop. a horizontal drop and four corner drops have been carried out. Using a force sensor, the bolt tension during the drop impact is measured. The coherence of bolt is evaluated by the difference between the fastening torque of bolt before a drop test and the unfastening torque of bolt after a drop impact.

  • PDF

A Study of IP QoS(Quality of Service) Metric Sizing Based on the Connection and Transmission Quality (접속품질과 전송품질을 기반으로 한 IP QoS(Quality of Service) 측정 메트릭스 정립)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.57-62
    • /
    • 2015
  • IP QoS is not required to overcome the limitations of the existing Best Effort Service to connect to the explosion of the Internet traffic revenue. To IP QoS requirements of next-generation communication network, Metric Sizing Methodology is very important. However, IP networks have been developed with a focus gender flexibility and scalability than the QoS. Therefore, it is necessary to secure the quality measures for different existing IP technology to apply QoS in IP networks. When establishing the connection quality and transmission quality, based on the IP QoS(Quality of Service) objective data quality metrics can be obtained by analyzing the communication quality hindrance. Understanding the communication quality level may evaluate quality sensitive area and quality hindrance. Establish effective quality metrics can be expected to promote effective and customer satisfaction through improved quality, improved call quality for this issue.

Effect of Route of Trihalomethanes (THM) Administration on Renal Toxicity in Male Rat

  • Chung, Jin-Ho;Lee, Soo-Hwan
    • Archives of Pharmacal Research
    • /
    • v.14 no.2
    • /
    • pp.188-192
    • /
    • 1991
  • Single non-lethal doses of chloroform $(CHCL_3)$ dichlorobromomethane $(CHCL_2Br)$, dibromochloromethane $(CHCIBr_2)$, or bromoform $(CHBr_3)$ were administered to male rats. Routes of exposure including single intraperitional (ip) and subcutaneous (sc) injection were used in order to permit comparison of severity of THM effects and renal toxicity was assessed at varied times following treatment. On an equimolar basis, sc administration of $CHBr_3$ (either 12 or 3 mmoles/kg) is more effective at increasing KW/BW than ip $CHCI_3$ treatment. Plasma urea nitrogen (BUN) following ip THM injections are markedly increased with all four THM at 24 hours post treatment. BUN response to $CHCL_2Br$ and $CHCIBr_3$-effected BUN levels have essentially returned to those of vehicle control. THM sc treatment results in a BUN response similar to that seen following ip treatment, with only the time course being different. With the exception of $CHCL_3$, sc and ip-treatments appear to be equally effective in evoking absolute BUN elevations. These results suggest that THM administration induce renal toxicity dependent upon the route or exposure.

  • PDF

Evaluation of VoIP Capacity for IEEE802.11b WiFi Environment under Voice Coding Methods (IEEE802.11b WiFi 환경에서 음성코딩 방식에 따른 VoIP 용량분석)

  • Choi, Dae-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.243-248
    • /
    • 2012
  • In this paper we simulate the capacity of VOIP calls through WiFi network by computer simulations using OPNET modeler. The results show that sudden quality degradations occur on all VoIP calls when the number of call of an AP(Access Point) increases beyond a specific value. The reason of the quality degradation was turned out to be the queueing delay at the down link of AP. Under the IEEE 802.11b environments, the maximum number of VoIP calls of an AP maintaining the required voice quality (MOS > 2.5), was evaluated as 5, 12, and 27 when we use G.711, G.729a, and G.729a VAD codec, respectively.

Protection of Windows Media Video Providing Selective Encryption (선택적 암호화가 가능한 윈도우 미디어 보호 방법)

  • Park, Ji-Hyun;Ryou, Jae-Cheol
    • The KIPS Transactions:PartB
    • /
    • v.16B no.2
    • /
    • pp.101-108
    • /
    • 2009
  • As content serviced for IP set-top boxes is streamed over IP network, the existing hacking tools for IP network can be used to capture the streamed content. Until recently, most of the content serviced on IP set-top boxes has been MPEG-2 TS. However, this content will be gradually moved to WMV, MPEG-4 or H.264 because of the relatively low compression efficiency and overhead of the TS packet. In this paper, we propose a DRM scheme other than WMRM for streamed WMV content. Our approach is to design a DRM scheme independent to the existing WMV streaming system. We also design this scheme in order to provide the feature for controlling the DRM processing time considering device performance. We verified it through the experiment.

Patch loading resistance prediction of steel plate girders using a deep artificial neural network and an interior-point algorithm

  • Mai, Sy Hung;Tran, Viet-Linh;Nguyen, Duy-Duan;Nguyen, Viet Tiep;Thai, Duc-Kien
    • Steel and Composite Structures
    • /
    • v.45 no.2
    • /
    • pp.159-173
    • /
    • 2022
  • This paper proposes a hybrid machine-learning model, which is called DANN-IP, that combines a deep artificial neural network (DANN) and an interior-point (IP) algorithm in order to improve the prediction capacity on the patch loading resistance of steel plate girders. For this purpose, 394 steel plate girders that were subjected to patch loading were tested in order to construct the DANN-IP model. Firstly, several DANN models were developed in order to establish the relationship between the patch loading resistance and the web panel length, the web height, the web thickness, the flange width, the flange thickness, the applied load length, the web yield strength, and the flange yield strength of steel plate girders. Accordingly, the best DANN model was chosen based on three performance indices, which included the R^2, RMSE, and a20-index. The IP algorithm was then adopted to optimize the weights and biases of the DANN model in order to establish the hybrid DANN-IP model. The results obtained from the proposed DANN-IP model were compared with of the results from the DANN model and the existing empirical formulas. The comparison showed that the proposed DANN-IP model achieved the best accuracy with an R^2 of 0.996, an RMSE of 23.260 kN, and an a20-index of 0.891. Finally, a Graphical User Interface (GUI) tool was developed in order to effectively use the proposed DANN-IP model for practical applications.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

A Security method and Performance evaluation of preventing DoS attack against DAD in MANET (MANET 환경에서 중복 주소 탐지에 대한 DoS 공격을 방지하는 보안 기법과 성능 평가)

  • Lim, Jeong-Mi;Park, Chang-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1099-1108
    • /
    • 2009
  • The study of IP address allocation in MANET can be categories into Stateful and Stateless. The one, special node monitors other nodes' IP address and allocates IF address. And the other, node generates IP address by itself. Nodes in MANET have mobility and restricted resource, so Stateless is more suitable than Stateful. But, in Stateless, node requires DAD process because of unique IP address allocation. And Dos attack can be happened in DAD precess. In this paper, we propose a security method on preventing DoS attack against DAD in MANET using one-way hash function. Since, Computation of one-way hash function is suitable for nodes' restricted resource character in MANET. And we evaluate performance using NS2 and compare with other security method which is CGA using signature.

  • PDF

IP Mobility Supporting System in Heterogeneous Network (블루투스와 무선 LAN 환경을 위한 IP 이동성 지원 시스템)

  • Kang, Byoung-Hoon;Kim, Man-Bae;Choi, Chang-Yeol
    • Journal of Industrial Technology
    • /
    • v.28 no.B
    • /
    • pp.245-250
    • /
    • 2008
  • Recently, mobile devices have supported wireless LAN as well as bluetooth, where the services such as heterogeneous network access and seamless mobility connection are important. Even though the mobility and physical network might be varied, an efficient communication mechanism for the network access and a robust mobility management of mobile devices are needed. In this paper, we design and implement a Bluetooth system with mobile LAN access capability. The proposed system has the following features; 1) IP connection is enabled by BENP in the link layer, 2) The networks devices of heterogeneous mobile devices are integrated into a single virtual network interface, 3) IP mobility between the bluetooth and wireless LAN is supported by mobile IP. The experimented results show that the packet loss and delay time during the handover duration is reduced by predicting the handover among different networks followed by the setup of any required parameters in advance.

  • PDF