• Title/Summary/Keyword: 총격

Search Result 18, Processing Time 0.04 seconds

A study on the Impact damages and residual strength of CFRP laminates to impact under high temperature (고온에서 총격을 받는 CFRP 적층재의 총격손상과 잔류강도에 관한 연구)

  • 정종안;이상호;양인영
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.3
    • /
    • pp.44-52
    • /
    • 1996
  • An experimental study on the effects of temperature change on the impact damages of CFRP aminates was made through an observation of the interrelations between the Impact energy vs. delamination area, the impact energy vs. residual bending strength, and the delamination area vs. the decreasing of the residual bending strength for CF/EPOXY and CF/PEEK composite laminates subjected to FOD (Foreign Object Damage) under high temperatures.

  • PDF

NIDS for IP Fragmentation Attack Detection (IP 단편화 공걸 탐지를 위한 NIDS)

  • 김성환;조성제;정승익;김현종;정태일;최영복
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.295-298
    • /
    • 2003
  • IP 단편화는 서로 다른 네트워크 환경에서 IP 패킷의 효율적인 전송을 보장해 주고 있다. 하지만 시스템이 비정상적인 IP 단편을 적절히 재조합하지 못함으로써 시스템에 심각한 문제를 일으킬 수 있다. 그래서 본 논문에서는 네트워크 상에서 IP 단편화 공격을 탐지할 수 있는 방법을 제안한다. 제안한 방법은 IP 단편화 총격에 대해서 TCP 패킷을 NIDS가 미리 재조합을 함으로써 IP 단편화 공격에 대해 효율적인 탐지가 가능하다

  • PDF

Treatment of Open Proximal Humerus Fracture by Gunshot (총격에 의한 개방성 근위 상완골 골절의 치료 - 증례 보고 -)

  • Kim, Sung-Jae;Lee, Jae-Hoo;Chun, Yong-Min
    • Clinics in Shoulder and Elbow
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2012
  • Purpose: To consider the proper management of proximal humerus fracture on gunshot wounds. Materials and Methods: A 28-year-old male patient, who sustained a gunshot injury on the left arm 5 days ago, was admitted through the emergency department. Although he underwent an emergency surgery (bullet fragment removal and debridement), there remained bullet fragments around the proximal humerus fracture site. The wound seemed to be infected and a partial dehiscence occurred. No neurologic deficit was noted. Immediate exploration and debridement were performed, and an external fixator was applied to restore the anatomical alignment and manage the wounds. Intravenous antibiotics were administered. On the 9th postoperative day, wound debridement was done again, and cement beads mixed with antibiotics were inserted. After two weeks, the external fixator was removed, and the pin sites were closed after debridement. One week later, the open reduction and internal fixation with locking compression plate and screws were done. Result: At 3 months after the internal fixation, the bone union was obtained with satisfactory alignment of the humerus. Conclusion: The severity of the soft tissue injury influences the fracture management plan. Further, the risk on lead toxicity should be considered.

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

The intruder traceback mechanism based on active networks (액티브 네트워크 기반 침입자 역추적 메커니즘)

  • Lee Young-seok
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2005
  • Recently, the patterns of cyber attack through internet have been various and have become more complicated and thus it is difficult to detect a network intruder effectively and to response the intrusion quickly. Therefore, It is almost not possible to chase the real location of a network intruder and to isolate the Intruder from network in UDP based DoS or DDoS attacks spoofing source IP address and in TCP based detour connection attacks. In this paper, we propose active security architecture on active network to correspond to various cyber attacks promptly. Security management framework is designed using active technology, and security control mechanism to chase and isolate a network intruder is implemented. We also test the operation of the active security mechanism implemented on test_bed according to several attack scenarios and analyze the experiment results.

  • PDF

Learning Multi-Character Competition in Markov Games (마르코프 게임 학습에 기초한 다수 캐릭터의 경쟁적 상호작용 애니메이션 합성)

  • Lee, Kang-Hoon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.15 no.2
    • /
    • pp.9-17
    • /
    • 2009
  • Animating multiple characters to compete with each other is an important problem in computer games and animation films. However, it remains difficult to simulate strategic competition among characters because of its inherent complex decision process that should be able to cope with often unpredictable behavior of opponents. We adopt a reinforcement learning method in Markov games to action models built from captured motion data. This enables two characters to perform globally optimal counter-strategies with respect to each other. We also extend this method to simulate competition between two teams, each of which can consist of an arbitrary number of characters. We demonstrate the usefulness of our approach through various competitive scenarios, including playing-tag, keeping-distance, and shooting.

  • PDF

A Watermarking System using Adaptive Thresholds (적응 임계값을 사용한 워터마킹 시스템)

  • Sang-Heun Oh;Sung-Wook Park;Bvyung-Jun Kim
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.30-37
    • /
    • 2003
  • In this paper, a discrete wavelet transform (DWT)-based watermarking system is proposed. The main feature of proposed system is that the embedding system uses adaptive thresholds to control the trade-off between the qualify of the watermarked image and the capacity of the watermark, and the trade-off between the quality and robustness of the watermarked image. Also, the extracting system rebuilds threshold according to various attacks and decides a watermark bit from the least distorted coefficient after measuring the distortion of coefficient. Finally, a new measure to detect the uniqueness of watermark is proposed. The experimental result shows that the proposed watermarking system is robust against conventional signal processing and intentional attacks.

Primary Repair of Boerhaave's Syndrome (Boerhaave 증훈군에 대한 일차 봉합술)

  • 김재현;김삼현;박성식;임수빈;서필원
    • Journal of Chest Surgery
    • /
    • v.34 no.11
    • /
    • pp.879-882
    • /
    • 2001
  • advancement in the treatment of esophageal perforation due to the development of ICU care and antibiotics. There were controversies in the treatment of esophageal perforation when diagnosed after 24hrs. From 1995 to 2000, we performed a buttressed primary repair and mediastinal drainage in 6 Boerhaave\`s syndrome patients among 13 esophageal perforation patients. Two patients died(33%). They died because of pneumonia, ARDS and sepsis on 38th, 39th post-operative day respectively. Two patients had leak at the site of repair which was treated completely with conservative treatment. We report on the result of a buttressed primary repair and mediastinal drainage for 6 Boerhavve\`s syndrome patients.

  • PDF