• Title/Summary/Keyword: 방어 모델

Search Result 367, Processing Time 0.035 seconds

Analysis of Flight Trajectory Characteristics of Ballistic Missiles Considering Effects of Drag Forces (항력을 고려한 탄도미사일 비행궤적 특성 해석)

  • Kim, Jiwon;Kwon, Yong Soo
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.2
    • /
    • pp.134-140
    • /
    • 2016
  • This paper analyzed flight trajectory characteristics of ballistic missiles considering effects of drag forces. It is difficult to intercept ballistic missiles which fly over atmosphere with supersonic speeds and small radar cross section (RCS). In particular, the velocities in the phases of boost and terminal are changed significantly due to the steep variation of the drag force. Therefore, in order to build up a successful ballistic missile defense systems, the effects of the drag forces should be considered in the analysis of ballistic missile trajectory characteristics. In this point of view, this work analyzed the effects of drag forces and derived the flight trajectory characteristics of Scud B, C and Nodong missiles. Model of the ballistic missile flight trajectory is considered the effects of Coriolis and centrifugal forces, and specifications of the missiles are open sources.

Prelinimary Engagement Effect Analysis of Isotropic Kinetic Energy Warhead (등방성 운동에너지 탄두의 교전 효과 예비 분석)

  • Shim, Sang-Wook;Hong, Seong-Min;Seo, Min-Guk;Tahk, Min-Jea
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.5
    • /
    • pp.440-448
    • /
    • 2015
  • Kinetic energy(KE) rod warhead system is a new interceptor which combines advantages of existing ones. This system is less dependant on a precision guidance than direct hit type warhead and gives high penetration rates than blast fragmentation type warhead. In this paper, isotropic KE rod warhead system is introduced with detonation/deployment model. A penetration effects of the deployed rods are calculated using TATE penetration equation. Also, an engagement performance analysis method is suggested. Finally, an optimal detonation time and engagement geometry is derived by Monte-Carlo simulation in various engagement situation using the performance analysis factor.

A Study on Effectiveness Analysis Methods for V-C System: Applying Effective Based Operation (EBO) Methodology (효과기반 작전 방법론을 적용한 V-C 연동체계에서 전투효과 분석방법 연구)

  • Kim, Young-In;Hong, Yoon-Gee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.3
    • /
    • pp.1337-1345
    • /
    • 2012
  • The principle of Effective Based Operation applied to the Korean Theater resulted in measurable effects to win the minimum battle. Based on the finding, this study recommends the effect analysis methodology under the V-C interoperability system to acquire a weapon system. This method is followed as below; to confirm the effect data on the organized weapon system, to set MOE, MOP and effect considering the purpose of the analysis, to apply the appropriate operational concept and scenario on the weapon system, and then the available C Model is after action reviewed, adjusted, and given feedback. The V-C interoperability system enables to perform the real-time combat experiment under the virtual synthesized battlefield circumstances. The defensive battle organization and displacement of the future anti-tank guided weapon system was considered in the modeling process. Scenario was written, which encompasses company-level units and the battalion-level operation. Then the available AWAM was embodied and effect-analyzed, which formed the foundation of SBA.

Cryptanalysis using Fault Injection and Countermeasures on DSA (오류주입을 이용한 DSA 서명 알고리즘 공격 및 대응책)

  • Jung, Chul-Jo;Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Hwan-Koo;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3045-3052
    • /
    • 2010
  • The international standard signature algorithm DSA has been guaranteed its security based on discrete logarithm problem. Recently, the DSA was known to be vulnerable to some fault analysis attacks in which the secret key stored inside of the device can be extracted by occurring some faults when the device performs signature algorithm. After analyzing an existing fault attack presented by Bao et al., this paper proposed a new fault analysis attack by disturbing the random number. Furthermore, we presented a countermeasure to compute DSA signature that has its immunity in the two types of fault attacks. The security and efficiency of the proposed countermeasure were verified by computer simulations.

Enhancing Effect of the Combined Preparation Containing Antacid and Aceglutamide Aluminium on Defensive Factors in Chronic Ulcer Model of the Rat (흰쥐의 만성궤양모델에서 Aceglutamide aluminium를 함유한 복합제산제의 점막방어인자 증강작용)

  • Jang, Byeong-Su;Yoo, Eun-Ju;Park, Joon-Woo;Yu, Young-Hyo;Park, Myung-Hwan
    • YAKHAK HOEJI
    • /
    • v.38 no.6
    • /
    • pp.800-805
    • /
    • 1994
  • Antacid(AM, 600 mg/kg=aluminium hydroxide, magnesium hydroxide, and simethicone with a ratio of 1 : 1 : 0.1) and aceglutamide aluminium(AGA, 263 mg/kg)-Effect of the combined preparation containing on the gastric mucosal hexosamine, sialic acid, and aluminium contents adhered to the gastric wall of the rat was investigated. Severe ulcers were produced in rats by injecting of $30\;{\mu}l$ acetic acid(30%) into the subserosal layer of one position in the corpus. When given orally for 15 consecutive days, AM(1,200 mg/kg), AGA(525, 1,050 mg/kg), and the combined preparation significantly decreased the ulcer area. AGA(525, 1,050 mg/kg) and the combined preparation also increased the amount of hexosamine and sialic acid in the intact and ulcerated areas. On the other hand, the contents of hexosamine and sialic acid were not affected by AM (600, 1,200 mg/kg). The amount of aluminium adhered to the gastric wall of the rat was higher in the combined preparation when compared to the AM(600 mg/kg) and AGA(263 mg/kg). The aluminium contents adhered may play an important role protecting mucosa from aggresive action of gastric juice and potenting defensive factors through the increase of mucosa-forming components by AGA.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

An Approach to Urban Planning System for Disaster Prevention through Location/Allocation of EMS(Emergency Medical Service) - Focused on Optimum Location of Safety Centers in Jinju - (응급의료서비스 입지/배분을 통한 도시방재시스템의 도시계획적 접근 - 진주시 안전센터의 최적입지를 중심으로 -)

  • Choi, Jin Do;Kim, Yeong;Kim, Sung Duk
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.112-112
    • /
    • 2011
  • 오늘날 우리 사회의 생활과 문화의 질이 향상됨에 따라 공공 및 개인의 안전과 건강에 대한 관심이 증대되고 있다. 특히, 재난과 비상사태는 생명에 대한 희생뿐만 아니라 훨씬 더 심각한 경제적인 결과를 초래한다. 이러한 응급사태에 개비하여 적절히 준비되지 않았거나 재난의 예방 및 완화시킬 방법을 가지고 있지 못한다면 도시의 발전적인 프로젝트는 예고 없이 도시를 강타하는 재난 및 비상사태에 의해 무산되고 만다. 이러한 여건 하에 재난과 응급사고를 효율적으로 대처하는 응급처치와 서비스에 대한 급격한 관심과 함께 일정한 결정적 대응시간 내에 각종사고와 재해로부터 방어할 수 있는 공공서비스에 대한 필요성이 크게 증가되었다. 본 연구에서는 신고, 응급구조, 환자이송 등 도시의 병원 전 단계 의료환경에 대해서 조사하였다. 본 연구의 목적은 반응시간과 출동거리를 분석함으로써, 응급사고에 즉시 응급구조서비스를 제공하기 위해 안전센터(119센터)의 최적 입지를 확인하는 것이다. 이를 위해서 사고발생, 반응시간, 출동거리 등을 응급의료 활동과 관련된 연구논문, 대상지 전역의 소방기록물과 출동일지 등의 통계자료를 활용하여 신속한 응급의료 서비스를 위한 패턴을 분석 하였다. 또한 응급구조대의 조직과 활동의 분석을 통해 응급의료시설의 최적 입지설정을 위한 제도적 개선대안을 마련해 보았다. 대상지 연구를 위해, 구조활동 및 소방서비스의 최근 통계자료의 조사를 통해 진주시의 모든 119센터의 입지와 응급의료서비스 및 사고발생 현황을 나타내었다. 자료 분석을 위해서 SPSS14.0을 사용하였으며, 지역의 특성 분포, 안전센터별 대응시간, 이송시간 등을 소방 GPS시스템과 입지할당모형 중 Center Point Model(CPM)을 적용하였다. 결과적으로 본 연구를 통해 대상지역의 119안전센터의 서비스 질이 나쁜 지역을 지리학적인 관점에서 최적 입지/배분 패턴의 설정을 통해 확인할 수 있었으며, 이를 통해 미래 응급의료서비스의 효율적인 입지/배분을 통해 공공 및 개인의 안전과 건강에 기여할 수 있을 것으로 기대된다.

  • PDF

Assessment of Post-LOCA Radiation Fields in Service Building Areas for Wolsong 2, 3, and 4 Nuclear Power Plants (월성 원자력 발전소 2,3,4호기에서의 LOCA 사고후 보조건물의 방사선장 평가)

  • Jin, Yung-Kwon;Kim, Yong-Il
    • Journal of Radiation Protection and Research
    • /
    • v.20 no.1
    • /
    • pp.53-64
    • /
    • 1995
  • The radiation fields following the large loss of coolant accident (LOCA) have been assessed for the vital areas in the service building of Wolsong 2, 3, and 4 nuclear power plants. The ORIGEN2 code was used in calculating the fission product inventories in the fuel. The source terms were based upon the activity released following the dual failure accident scenario, i.e., a LOCA followed by impaired emergency core cooling (ECC). Configurations of the reactor building, the service building, and the ECC system were constructed for the QAD-CG calculations. The dose rates and the time-integrated doses were calculated for the time period of upto 90 days after the accident. The results showed that the radiation fields in the vital access areas were found to be sufficiently low. Some areas however showed relatively high radiation fields that may require limited access.

  • PDF

Anomaly Detection Model based on Network using the Session Patterns (세션 패턴을 이용한 네트워크기반의 비정상 탐지 모델)

  • Park Soo-Jin;Choi Yong-Rak
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.719-724
    • /
    • 2004
  • Recently, since the number of internet users is increasing rapidly and, by using the public hacking tools, general network users can intrude computer systems easily, the hacking problem is getting more serious. In order to prevent the intrusion, it is needed to detect the sign in advance of intrusion in a positive prevention by detecting the various foms of hackers' intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port- scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various forms of abnormal accesses for intrusion regardless of the intrusion methods. In this paper, SPAD(Session Pattern Anomaly Detector) is presented, which detects the abnormal service patterns by comparing them with the ordinary normal service patterns.

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF