• Title/Summary/Keyword: Simulation Based Control

Search Result 6,304, Processing Time 0.036 seconds

Three-dimensional Simulation of Wave Reflection and Pressure Acting on Circular Perforated Caisson Breakwater by OLAFOAM (OLAFOAM에 기초한 원형유공케이슨 방파제의 반사율 및 작용파압에 관한 3차원시뮬레이션)

  • Lee, Kwang-Ho;Bae, Ju-Hyun;Kim, Sang-Gi;Kim, Do-Sam
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.29 no.6
    • /
    • pp.286-304
    • /
    • 2017
  • In this study, we proposed a new-type of circular perforated caisson breakwater consisting of a bundle of latticed blocks that can be applied to a small port such as a fishing port, and numerically investigated the hydraulic characteristics of the breakwater. The numerical method used in this study is OLAFOAM which newly added wave generation module, porous media analysis module and reflected wave control module based on OpenFOAM that is open source CFD software published under the GPL license. To investigate the applicability of OLAFOAM, the variations of wave pressure acting on the three-dimensional slit caisson were compared to the previous experimental results under the regular wave conditions, and then the performance for irregular waves was examined from the reproducibility of the target irregular waves and frequency spectrum analysis. As a result, a series of numerical simulations for the new-type of circular perforated caisson breakwaters, which is similar to slit caisson breakwater, was carried out under the irregular wave actions. The hydraulic characteristics of the breakwater such as wave overtopping, reflection, and wave pressure distribution were carefully investigated respect to the significant wave height and period, the wave chamber width, and the interconnectivity between them. The numerical results revealed that the wave pressure acting on the new-type of circular perforated caisson breakwaters was considerably smaller than the result of the impermeable vertical wall computed by the Goda equation. Also, the reflection of the new-type caisson breakwater was similar to the variation range of the reflection coefficient of the existing slit caisson breakwater.

Augmented Reality Based Tangible Interface For Digital Lighting of CAID System (CAID 시스템의 디지털 라이팅을 위한 증강 현실 기반의 실체적 인터페이스에 관한 연구)

  • Hwang, Jung-Ah;Nam, Tek-Jin
    • Archives of design research
    • /
    • v.20 no.3 s.71
    • /
    • pp.119-128
    • /
    • 2007
  • With the development of digital technologies, CAID became an essential part in the industrial design process. Creating photo-realistic images from a virtual scene with 3D models is one of the specialized task for CAID users. This task requires a complex interface of setting the positions and the parameters of camera and lights for optimal rendering results. However, the user interface of existing CAID tools are not simple for designers because the task is mostly accomplished in a parameter setting dialogue window. This research address this interface issues, in particular the issues related to lighting, by developing and evaluating TLS(Tangible Lighting Studio) that uses Augmented Reality and Tangible User Interface. The interface of positioning objects and setting parameters become tangible and distributed in the workspace to support more intuitive rendering task. TLS consists of markers, and physical controller, and a see-through HMD(Head Mounted Display). The user can directly control the lighting parameters in the AR workspace. In the evaluation experiment, TLS provide higher effectiveness, efficiency and user satisfaction compared to existing GUI(Graphic User Interface) method. It is expected that the application of TLS can be expanded to photography education and architecture simulation.

  • PDF

Scalable Ordered Broadcast Protocol in the Distributed System (분산 시스템에서 확장성 있는 순서화 방송통신 프로토콜)

  • Han, In;Hong, Young-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.125-133
    • /
    • 2002
  • In this paper, we present an efficient broadcast protocol, called Btoken, that ensures total ordering of messages and atomicity of delivery in the large scaled distributed systems. Unlike the existing token-passing based protocol, Btoken does not circulate a token around the ring, instead, it uses three kinds of control messages for token transmission. The token has a sequence number field for broadcasting message, and the only site having the token can broadcast a message. When a site wishes to broadcast, It must send a message to the token site requesting the token. The token site sends a message with the token to the requester When the requester receives the token, it becomes the current token site and broadcasts a new message after setting sequence number derived from a field of the token into its message. Upon reception of it, any operating member is informed the position of the token site and will send token requesting message to the new token site. However, the other site may request the token to the old token site prior to receiving the broadcast message from the new token site. To resolve this problem, Btoken uses a message which is sent to the current token site by the old token site notifying who is the next token requester. Results of our simulation of the protocol show that Btoken is more efficient in the large scaled distributed system compared to existing broadcast protocols.

A Study on Hierarchical Overlay Multicast Architecture in Mobile Ad Hoc Networks (Mobile Ad Hoc 네트워크를 위한 계층적 오버레이 멀티캐스트 구조 연구)

  • Kim, Kap-Dong;Park, Jun-Hee;Lee, Kwang-Il;Kim, Hag-Young;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.627-634
    • /
    • 2006
  • Overlay network eliminates the need to change the application-layer tree when the underlying network changes and enables the overlay network to survive in environments where nonmember nodes do not support multicast functionality. An overlay protocol monitors group dynamics, while underlying unicast protocols track network dynamics, resulting in more stable protocol operation and low control overhead even in a highly dynamic environment. But, if overlay multicast protocols does not know the location information of node, this makes it very difficult to build an efficient multicasting tree. So, we propose a Hierarchical Overlay Multicast Architecture (HOMA) with the location information. Because proposed architecture makes static region-based dynamic group by multicast members, it is 2-tired overlay multicasts of application layer that higher layer forms overlay multicast network between members that represent group, and support multicast between multicast members belonging to region at lower layer. This use GPS, take advantage of geographical region, and realizes a region-sensitive higher layer overlay multicast tree which is impervious to the movements of nodes. The simulation results show that our approach solves the efficiency problem effectively.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Assessment of Water Distribution and Irrigation Efficiency in Agricultural Reservoirs using SWMM Model (SWMM 모형을 이용한 농업용 저수지 용수분배 모의 및 관개효율 평가)

  • Shin, Ji-Hyeon;Nam, Won-Ho;Bang, Na-Kyoung;Kim, Han-Joong;An, Hyun-Uk;Do, Jong-Won;Lee, Kwang-Ya
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.62 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • The management of agricultural water can be divided into management of agricultural infrastructure and operation to determine the timing and quantity of water supply. The target of water management is classified as water-supply facilities, such as reservoirs, irrigation water supply, sluice gate control, and farmland. In the case of agricultural drought, there is a need for water supply capacity in reservoirs and for drought assessment in paddy fields that receive water from reservoirs. Therefore, it is necessary to analyze the water supply amount from intake capacity to irrigation canal network. The analysis of the irrigation canal network should be considered for efficient operation and planning concerning optimized irrigation and water allocation. In this study, we applied a hydraulic analysis model for agricultural irrigation networks by adding the functions of irrigation canal network analysis using the SWMM (Storm Water Management Model) module and actual irrigation water supply log data from May to August during 2015-2019 years in Sinsong reservoir. The irrigation satisfaction of ponding depth in paddy fields was analyzed through the ratio of the number of days the target ponding depth was reached for each fields. This hydraulic model can assist with accurate irrigation scheduling based on its simulation results. The results of evaluating the irrigation efficiency of water supply can be used for efficient water distribution and management during the drought events.

Groundwater Flow Modeling and Suggestion for Pumping Rate Restriction around K-1 Oil Stockpiling Base with Geological Consideration (지질조건을 고려한 K-1 비축기지 주변의 지하수 모델링과 양수량 제한구역 제안)

  • Moon, Sang-Ho;Kim, Kue-Young;Ha, Kyoo-Chul;Kim, Young-Seog;Won, Chong-Ho;Lee, Jin-Yong
    • The Journal of Engineering Geology
    • /
    • v.20 no.2
    • /
    • pp.169-181
    • /
    • 2010
  • This study aimed at simulating several responses to stresses caused by the ground water level variations around the K-1 oil stockpile. For this simulation, we considered the characteristic hydrogeological condition including the special occurrence of long and thick acidic dyke, which is regarded as the main geological structure dominating the ground water flow system at this study area. We activated twenty-four imaginary wells which are located in northern and southern area around central K-1 site. Each neighboring distance is altogether 300 m and whole distance between K-1 site and remote wells is 1,200 m. Through the modeling, we operated the long-term and continuous pumping tests and finally categorized five zones based on maximum pumping rates for the imaginary wells; zone I within 300 meter distance from K-1 site with a pumping rate of 50 $m^3/day$; zone II between 300 to 600 meter distance from K-1 site with a pumping rate of 75 $m^3/day$; zone III between 600 to 900 meter distance from K-1 site with 150 $m^3/day$; zone IV between 900 to 1,200 meter distance from K-1 site with 300 $m^3/day$; and zone V of acidic dyke area. At zone V, especially because of their possibility of high transmissivity for groundwater flow, it is necessary to control and restrict groundwater discharge.

Operation Method of Power Supply System for Eco-friendly Movable-weir Based on Natural Energy Sources (자연에너지를 이용한 친환경 가동보용 전원공급시스템의 운용방안)

  • Kwon, Pil-June;Lee, Hu-Dong;Tae, Dong-Hyun;Park, Ji-Hyun;Ferreira, Marito;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.601-610
    • /
    • 2020
  • Recently, damage caused by drought is becoming worse and worse due to the global climate change. To overcome these problems, movable-weir to control the water level has been installed instead of a fixed-weir made from concrete. On the other hand, it is difficult to operate an existing moveable-weir because of the high cost of facility management and manpower consumption. In addition, because most moveable-weirs are installed in power systems, the operating cost and the cost of connection for power systems increase when they are located in remote areas. Therefore, this paper proposes an optimal design algorithm and the evaluation algorithm of the SOC (state of charge) of a lithium-ion battery to replace an existing power supply with eco-friendly movable-power with a power supply system using PV modules and lithium-ion batteries. In addition, this study modeled a 50kW power supply system of a movable-weir using PSCAD/EMTDC S/W. The simulation results confirmed that the proposed algorithm has stable operation characteristics in an independent operation mode and interconnection operation mode and that there is the possibility of commercialization with a benefits evaluation of the eco-friendly power supply system of a movable-weir.

Uncertainty Management on Human Intrusion Scenario Assessment of the Near Surface Disposal Facility for Low and Intermediate-Level Radioactive Waste: Comparative Analysis of RESRAD and GENII (중저준위방사성폐기물 표층처분시설의 인간침입 시나리오 평가에 대한 불확실성 관리: RESRAD와 GENII의 비교분석)

  • Kim, Minseong;Hong, Sung-Wook;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.15 no.4
    • /
    • pp.369-380
    • /
    • 2017
  • In order to manage the uncertainty about the evaluation and analysis of the human intrusion scenario of the Gyeongju Low and Intermediate Level Radioactive Waste(LILW) disposal facility, the calculation result by the GENII code was assessed using the RESRAD code, which was developed to evaluate the radiation effects of contaminated soil. The post-drilling scenario was selected as a human intrusion scenario into the near-surface disposal facility to analyze the uncertainty of the modeling by identifying any limitations in the simulation of each code and comparing the evaluation results under the same input data conditions. The results revealed a difference in the migration of some nuclides between the codes, but confirmed that the dose trends at the end of the post-closure control period were similar for all exposure pathways. Based on the results of the dose evaluation predicted by RESRAD, sensitivity analysis on the input factors was performed and major input factors were derived. The uncertainty of the modeling results and the input factors were analyzed and the reliability of the safety evaluation results was confirmed. The results of this study can be applied to the implementation 'Safety Case Program' for the Gyeongju LILW disposal facility.