• Title/Summary/Keyword: 공격 분석

Search Result 3,036, Processing Time 0.028 seconds

A Study on the Applicability of Water-soluble Decontaminant to the Contaminated Aircraft Using SEM/EDS analysis (SEM/EDS 분석을 통한 수용성 제독제의 오염 항공기 적용 가능성 연구)

  • Kim, Jae-Kyun;Kim, Ik-Sik;Shin, Ki-Su
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.6
    • /
    • pp.48-54
    • /
    • 2008
  • Biochemical weapons, called as a poor nation's nuclear-weapon, are most favorable Weapons of Mass Destruction(WMD). At the beginning of war, these biochemical weapons, which can threaten the operations of our forces and cause the anxiety and chaos of people, should be used to attack our principle facilities. And these attacks might be conducted as a long term scenario over the war. Consequentially, our military training as well as civilian-military joint training have been focused on these circumstances to improve defense capability against the invasion of biochemical weapons. Add to these efforts, there have been a lot of researches to develop advanced decontaminations that can secure our troops and equipments. In this study, applicability of the water-soluble decontaminant for the contaminated aircraft was evaluated. The water-soluble decontaminant has been applied to the military stations and ground weapon systems only. According to the theoretical analyses and published papers, the water-soluble decontaminant has been shown better decontamination capability than commercial cleaner by roughly 50%. Furthermore, as a result of experiment efforts in this study, it was showed that the water-soluble decontaminant can reduce corrosion risk which is primary concern for the aircraft structures.

Antitumor and immunomodulatory effects of a hot water extract of Phellinus baumii using Sarcoma-180 in the mouse (Pheflinus baumii 자실체 추출물의 Sarcoma-180 에 대한 항암 및 면역효과)

  • Ha, Hyo-Cheol;Kim, Hyun-Pyo;Sim, Ji Young;Chang, Yun-Hee;Kim, Hyun Su
    • Journal of Mushroom
    • /
    • v.2 no.4
    • /
    • pp.169-174
    • /
    • 2004
  • A hot water extract(HWE-P4) was separated from the fruit bodies of PMO-P4, and its antitumor and immunomodulatory activities against sarcoma-180 in ICR mice were investigated. The internal transcribed spacer(ITS) regions from PMO-P4 were amplified using polymerase chain reaction(PCR) and sequenced. The results revealed that PMO-P4 was belong to the Phellinus baumii. When oral administration at the dose of 160mg/kg/day in the mice until the end of the experiment with 2 week's pre-feeding of the HWE-P4, the survival rate of the mice was 152% for 50days after the inoculation of sarcoma-180 and the suppression rate of the tumor growth was 35.3%(p<0.05) for 28 days after inoculation of sarcoma-180. The HWE-P4 increased 71.4% of the CD4/CD8 ratio and 5-fold of the expression of CD25(IL-2 receptor chain) compared with the control. From these results, the antitumor activity of HWE-P4 is exerted through its immunomodulating activity on the host's immune system.

  • PDF

Socio-Economic Effects on Brain Functions and Symptoms of Child Behavioral Problems (사회경제적 차이가 아동의 뇌기능과 문제행동증후에 미치는 영향)

  • Park, Hee-Rae;Park, Pyongwoon;Song, Giwon;Lim, Giyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.462-470
    • /
    • 2015
  • This study examined for which socio-economic difference effects on brain function and Problem behavior syndrome in children. About a children with no disorders, diseases or cognitive dysfunction-30 were from LIC children and another 30, from MC ones, the study was conducted by measuring and analyzing the data using brain function analysis and K-CBCL from January to April, 2013. The results of the study are as follows. First, it was found that the ratio of LIC's theta(${\Theta}$) and SMR waves and that of delta(${\delta}$), high beta(${\beta}h$), alpha(${\alpha}$) and low beta(${\beta}l$) waves showed significantly higher values than MC children. Second, concerning the symptoms of child behavioral problems, LIC showed significantly higher values than MC children in symptoms of the body, depression and anxiety, social immaturity, thinking problems, attention problems, aggression, internalization, externalization, overall behavioral problems, and emotional instability. MC children showed significantly higher values than LIC chidren in symptoms of social, academic-performance, total social skills. In conclusion, the significant difference of the brain functions and the symptoms of child behavioral problems between LIC and MC children showed that the socio-ecnomic difference has an influence on the same functions and symptoms above.

Study of Open Innovation and Performance of New Product Development (조직의 개방형 혁신과 신제품개발 성과에 관한 연구)

  • Um, Hyemi;Kang, Sora;Kim, Min Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.274-281
    • /
    • 2015
  • Firms are becoming increasingly dependent on external resources for a competitive advantage in environmental turbulence, the requisite speed of organizational change. Therefore, they focused on an 'Open Innovation'. This study examined the relationships among entrepreneurial orientation, learning orientation, open innovation, and new product development. The results provide broad support for the following: (1) entrepreneurial orientation and learning orientation strongly drive open innovation, (2) open innovation has a significant effect on new product development, and (3) learning orientation has a positive effect on open innovation and new product development. These results provide unique insight into how firms develop new product through open innovation. This study also addresses the implications of these results and the possible limitations of the research.

A Study on the Accuracy Enhancement Using the Direction Finding Process Improvement of Ground-Based Electronic Warfare System (지상용 전자전장비의 방향 탐지 프로세스 개선을 통한 정확도 향상에 관한 연구)

  • Chin, Huicheol;Kim, Seung-Woo;Choi, Jae-In;Lee, Jae-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.627-635
    • /
    • 2017
  • Modern warfare is gradually changing into a network war, and information electronic warfare is also progressing. In modern war, electronic warfare is all military activity concerned with electromagnetic field use, such as signal collecting, communication monitoring, information analysis, and electronic attack. The one key function of signal collecting for enemy signal analysis, direction finding, collects the signal radiated from enemy area and then calculates the enemy direction. This paper examined the Watson-Watt algorithm for an amplitude direction finding system and CVDF algorithm for phase direction finding system and analyzed the difference in the direction finding accuracy between in the clean electromagnetic field environment and in the real operating field environment of electronic warfare system. In the real field, the direction finding accuracy was affected by the reflected field from the surrounding obstacles. Therefore, this paper proposesan enhanced direction finding process for reducing the effect. The result of direction finding by applying the proposed process was enhanced above $1.24^{\circ}$ compared to the result for the existing process.

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

Production and Characterization of a Recombinant Antibody Neutralizing Botulinum Neurotoxin A (보툴리눔 신경독소 A를 중화하는 재조합 항체의 제조와 특성 분석)

  • Park, Hong-Gyu;Choi, Mieyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.295-301
    • /
    • 2017
  • Botulinum neurotoxin (BoNT/A) is a neurotoxin that selectively attacks the peripheral cholinergic nerve endings. It is produced by Gram -positive, endospore-forming strict anaerobic bacteria, Clostridium botulinum. Since BoNT/A could be a biothreat agent, as well as a contaminator of food and water supplies, the development of sensitive assays for toxin detection and potent antitoxin for the treatment of intoxication is necessary. In this study, for the purpose of producing monoclonal antibodies (mAbs) that are capable of neutralizing Botulinum neurotoxin type A (BoNT/A), scFv (single-chain variable domain fragment) libraries from the rabbit antisera against BoNT/A was fused to a human IgG. The resulting recombinant scFvIgG antibody protein was expressed in stable cell lines and was purified using a protein A affinity chromatography. The efficacy of scFvIgG mAb was confirmed by ELISA and was evaluated for the neutralization of BoNT/A in vivo. Such an in vivo toxin neutralization assay was performed using mice. Although scFvIgG antibody proteins (10 ug) failed to fully protect the mice challenged with BoNT/A (100,000 $LD_{50}$), it significantly prolonged the survival time. These results suggest that scFvIgG mAb may be capable of neutralizing BoNT/A single-chain variable domain fragment.

A Efficient Network Security Management Model in Industrial Control System Environments (산업제어시스템 환경에서 효과적인 네트워크 보안 관리 모델)

  • Kim, Il-Yong;Lim, Hee-Teag;Ji, Dae-Bum;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.664-673
    • /
    • 2018
  • The industrial control system (ICS) has operated as a closed network in the past, but it has recently been linked to information and communications services and has been causing damage due to cyber attacks. As a countermeasure, the Information Communication Infrastructure Protection Act was enacted, but it cannot be applied to various real control environments because there is only a one-way policy-from a control network to a business network. In addition, IEC62443 defines an industrial control system reference model as an international standard, and suggests an area security model using a firewall. However, there is a limit to linking an industrial control network, operating as a closed network, to an external network only through a firewall. In this paper, we analyze the security model and research trends of the industrial control system at home and abroad, and propose an industrial control system security model that can be applied to the actual interworking environments of various domestic industrial control networks. Also, we analyze the security of firewalls, industrial firewalls, network connection equipment, and one-way transmission systems. Through a domestic case and policy comparison, it is confirmed that security is improved. In the era of the fourth industrial revolution, the proposed security model can be applied to security management measures for various industrial control fields, such as smart factories, smart cars, and smart plants.

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States (유비쿼터스 서비스 상태지속을 지원하는 안전한 Jini 서비스 구조)

  • Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.157-166
    • /
    • 2008
  • The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.

A Research on the Health a Condition by T.H.I. at Security Guards and Dept. Security Guard College Students (T.H.I.에 의한 민간 경호경비원과 경호학과 대학생의 건강상태 조사연구)

  • Kim, Jin-Hwan
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.73-87
    • /
    • 2006
  • This research is for examining the effect on personal health and differences between men and women by health care program in security guards and students, who are specializing security in college, appealing consciousness state physically and mentally. The following results are attained by conducting a questionnaire survey(T.H.I) of 358 men engaged in security guard services and 220 students specializing security (The data analysis is operated by Analysis of Variance(ANOVA) to make a comparative study of health care program, sex distinction and security careers. The implication of the study are as follows. 1. Generally students show less average rate than security guards in appealing the consciousness state especially in Mental Irritability, Irregular Life, Depression, Respiratory, Eyes and Skin, Aggressiveness. 2. In comparing men with women of consciousness state after the step of health care program, men show lower average rate than women except Life Scale and Respiratory. 3. In differences of consciousness state by security career, the more respondents have careers, the less the average rate of Mental Irritability and Depresaion is. But in Life Scale, the result is reverse.

  • PDF