• Title/Summary/Keyword: number of element

Search Result 2,830, Processing Time 0.035 seconds

Field Analysis in the Ferrite Core at 100 kHz Band Magnetic Field (100 kHz 대역의 자계 환경내(內)에서의 페라이트 코어의 계(界) 해석)

  • Koo, Bon-Chul;Yoo, Jae-Sung;Kim, Mi-Ja;Gimm, Yoon-Myoung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.8
    • /
    • pp.977-983
    • /
    • 2007
  • Recently, the number of systems which utilize wireless power transmission to a receiving module in a short distance is increasing. For efficient use of receiving space, coils are wound around the ferrite core to produce electromotive force(emf) in suppling power by wireless transmission. This paper analyzed the magnetic flux density distribution in the ferrite core in magnetic field environment which is uniformly oriented along to a single axis at 125kHz. For numerical analysis, Ansoft Maxwell which is applying the FEM(Finite Element Method) method was used. We studied the variations of the gathered magnetic fluxes to the changes of the relative permeabilities of the ferrite cores. Also we calculated the magnetic flux variation by shaving the ferrite core off for the groove of coil winding. Results showed that using a small ferrite core in magnetic field at 100kHz band can increase the amount of magnetic flux $3{\sim}4 times$ than without the core. The magnetic flux decreased 23% by shaving the core 0.5 mm on the periphery of 4.75 mm radius core with the relative permeability 800.

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

Development of remedial learning program for vocational high school students focused on the area of change and relation (특성화고등학교 학생을 위한 수학과 진단평가 및 보정학습 자료 개발 연구 - '변화와 관계' 영역을 중심으로-)

  • Choe, Seung-Hyun;Hwang, Hye Jeang;Geum Cheon, Nam
    • Journal of the Korean School Mathematics Society
    • /
    • v.16 no.2
    • /
    • pp.409-434
    • /
    • 2013
  • The mathematical ability is an essential element for achieving professional competencies and for enhancing application ability in a vocational world and exploring its experiences. In this aspect, for vocational high school students, it is an important and urgent issue to develop remedial learning programs for developing mathematical basic and application ability. In particular, the program is developed based on the individual achievement level, focused on a mathematical basic ability to be applied efficiently in a vocational world. Because of this reason, in this study, the program is comprised of two phases; one is diagnosis test and the other is remedial teaching and learning materials. Then, diagnosis test includes three test; I) level testing evaluation for selecting the subject of remedial learning, ii) pre-test for deciding on which area and level of the materials when students begin to study, and iii) post-test for confirming the learning status is satisfied and the possibility of next step(level) or the other area of the materials. To accomplish this, this study tried to devise an efficient remedial learning system. Based on the system, this study developed remedial learning programs on the four areas of number and quantity, change and relation, uncertain thing, and figure and shape in the middle school level. In particular, this program is comprised of two types of knowledge. One is K-knowledge which is an essential knowledge to achieve a basic mathematical ability. The other is C-knowledge which is the advanced knowledge required to apply efficiently in a vocational world. This paper deals with the content mentioned above, but examples of the materials is shown focused on the area of change and relation.

  • PDF

Wavelet Series Analysis of Axial Members with Stress Singularities (응력특이를 갖는 축방향 부재의 웨이블렛 급수해석)

  • Woo, Kwang-Sung;Jang, Young-Min;Lee, Dong-Woo;Lee, Sang-Yun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.23 no.1
    • /
    • pp.1-8
    • /
    • 2010
  • The Fourier series uses a vibrating wave that possesses an amplitude that is like the one of the sine curve. Therefore, the functions used in the Fourier series do not change due to the value of the frequency and that set a limit to express irregular signals with rapid oscillations or with discontinuities in localized regions. However, the wavelet series analysis(WSA) method supplements these limits of the Fourier series by a linear combination of a suitable number of wavelets. By using the wavelet that is focused on time, it is able to give changes to the range in the cycle. Also, this enables to express a signal more efficiently that has singular configuration and that is flowing. The main objective of this study is to propose a scheme called wavelet series analysis for the application of wavelet theory to one-dimensional problems represented by the second-order elliptic equation and to evaluate theperformance of proposed scheme comparing with the finite element analysis. After a through evaluation of different types of wavelets, the HAT wavelet system is chosen as a wavelet function as well as a scaling function. It can be stated that the WSA method is as efficient as the FEA method in the case of axial bars with distributed loads, but the WSA method is more accurate than the FEA method at the singular points and its computation time is less.

Estimation of installation spacing by analyzing the lateral behavior of the safety fence fixed to rail bottom (레일저부고정형 안전펜스의 횡 방향 거동 분석을 통한 설치간격 산정)

  • Park, Seonghyeon;Sung, Deokyong;Lee, Changho;Jung, Hyuksang;Youg, Seungkyong
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.249-257
    • /
    • 2018
  • The number of deaths for railway traffic accidents is mainly caused by working close to the track, or when unauthorized passage pass through the track. The safety fences are being used to ensure safety for workers close to the track, and to improve the efficiency of the work, without interfering with the passage of trains. However, a safety fence for railway tracks needs to be examined to see if it will interfere with the passage of trains. The purpose of this study is to analyze the safe distance between train and safety fence developed in Korea. In addition, the lateral load condition of wind pressure by trains is estimated and numerical analysis is carried out according to the installation intervals of railway safety fences. It has been confirmed that the proper spacing between the train and the railway safety fence should be at least 200 mm from the vehicle limit, and that the proper spacing of railway safety fence must be calculated in consideration of the wind pressure by trains.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Flow Characteristics According to Velocity Conditions of Cylinder Boundary Under Low Reynolds Number (저 레이놀즈 수에서 실린더 경계 유속조건에 따른 흐름 특성)

  • Song, Chang Geun;Seo, Il Won;Kim, Tae Won
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.6
    • /
    • pp.2267-2275
    • /
    • 2013
  • Existing conventional model for analysis of shallow water flow just assumed the internal boundary condition as free-slip, which resulted in the wrong prediction about the velocity, vorticity, water level, shear stress distribution, and time variation of drag and lift force around a structure. In this study, a finite element model that can predict flow characteristics around the structure accurately was developed and internal boundary conditions were generalized as partial slip condition using slip length concept. Laminar flow characteristics behind circular cylinder were analyzed by varying the internal boundary conditions. The simulation results of (1) time variations of longitudinal and transverse velocities, and vorticity; (2) wake length; (3) vortex shedding phenomena by slip length; (4) and mass conservation showed that the vortex shedding had never observed and laminar flow like creeping motion was occurred under free-slip condition. Assignment of partial slip condition changed the velocity distribution on the cylinder surface and influenced the magnitude of the shear stress and the occurrence of vorticity so that the period of vortex shedding was reduced compared with the case of no slip condition. The maximum mass conservation error occurred in the case of no slip condition, which had the value of 0.73%, and there was 0.21 % reduction in the maximum mass conservation error by changing the internal boundary condition from no slip to partial slip condition.

Geochemical Exploration for Metallic Mineral Resources on the Pacitan District, East Java, Indonesia (인도네시아 빠찌딴지역 금속광물자원에 대한 지화학탐사)

  • Han, Jin-Kyun;Choi, Sang-Hoon
    • Economic and Environmental Geology
    • /
    • v.44 no.1
    • /
    • pp.1-10
    • /
    • 2011
  • The geology of the Pacitan district which occupies Southern mountain zone in the southwestern margin of East Java, Indonesia, consists of a pile of clastics and pyroclastics grading upwards into a series of sediments of Middle Miocene age which are intruded by a number of quartz porphyries and subvolcanic dacitic to andesitic bodies in after that time. The geochemical exploration in the Pacitan district to find out anomalous areas related with metallic mineral dispersion from the concealed ore deposits had been carried out using traditional exploration techniques of geological mapping, stream sediment, panned concentrate and outcrop sampling. The anomalous zones of each element were detected in the following areas: Gempol for Cu; Jompong for Au; Kasihan for Cu-Pb-Zn. The strongest Cu-Pb-Zn anomalous values are overlapped at the Kasihan area. The geochemical survey of soil was conducted with the geological survey at the Kasihan area. The statistical values were calculated by the statistical analysis method. The patterns for Cu, Pb and Zn are similar to the normal distribution. The anomalous values of copper-lead-zinc and/or copper and zinc are overlapped at five zones surrounding quartz porphyry at the central part of the Kasihan area. The area was interpreted and chosen as an anomalous zone related with stockwork and skam mineralization, extending to approximately NNW-SSE direction.

Ways of Restructuring Key Competencies for a Revision of Science Curriculum (과학과 교육과정 개정에 대비한 핵심역량 재구조화 방안)

  • Kwak, Youngsun
    • Journal of the Korean earth science society
    • /
    • v.34 no.4
    • /
    • pp.368-377
    • /
    • 2013
  • The purpose of this research was to investigate ways of restructuring key competencies (KCs) in preparation for a revision of Korean science curriculum. Recently a number of countries have reformed their curricular using competencies as a key element because they believe that competencies-based curriculum helps students build up the necessary skills to live in the future society. Through literature reviews, in-depth interviews with experts and teachers, expert meetings, Delphi methods, and surveys with teachers, three major categories of KCs emerged as follows: Character competencies, Intellectual competencies, and Social competencies. For each major category, its definition, characteristics and teachers' comments are discussed. The specific components of KCs for each major category and implementing KCs should be determined at the subject- and teacher-level based on teacher professionalism. In the conclusion section, we suggested a couple of important points that deserve readers' attention when we reconstruct science curriculum by incorporating three major categories of KCs. When we develop a science curriculum in the future, we need to include three major categories of KCs, and set up KCs as a minimum set of goals for all students. We need to remember that specific components of KCs for each major category and linkage among KCs may vary depending on science topics and objectives.

Analysis of Patents regarding Stabilization Technology for Steep Slope Hazards (급경사지재해 안정화기술에 대한 특허분석)

  • Song, Young-Suk;Kim, Jae-Gon
    • The Journal of Engineering Geology
    • /
    • v.20 no.3
    • /
    • pp.257-269
    • /
    • 2010
  • We analyzed patent trends regarding stabilization technology for steep slope hazards, focusing on patents applied for and registered in Korea, the USA, Japan, and Europe. The technology was classified into four groups at the second classification step: prediction techniques, instrumentation techniques, countermeasure/reinforcement/mitigation techniques, and laboratory tests. A total of 2,134 patents were selected for the final effective analysis. As a result of portfolio analysis using the correlation between the number of patents and the applicant for each patent, the Korean and USA situations were classified as belonging to the developing period, and the Japanese and European situations were classified as belonging to the ebbing period. In particular, patent activity in Korea has been enlivened by government-led research. As a result of technology analysis at the second classification step, prediction techniques arising from Japan are evaluated as a competitive power technique, and laboratory tests arising from the USA are evaluated as a competitive power technique. However, prediction techniques and laboratory tests arising from Korea are evaluated as a blank technique. According to the prediction results regarding future research and developments, a new finite element analysis method and a numerical model should be established as part of prediction techniques, as well as sensors, and hazard prediction should be developed by integrating information and equipment using IT technology as part of instrumentation techniques. In addition, improvements to existing structures for erosion control and the development of new slope-reinforcement methods are required as part of countermeasure/reinforcement/mitigation techniques, and new laboratory apparatus and methods with an optimizing structure should be developed as part of laboratory tests.