• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.033 seconds

Numerical Analysis for Wave Propagation with Vegetated Coastal Area (연안해역에서의 수변식생에 의한 파란변형에 관한 수치해석)

  • LEE SEONG-DAE
    • Journal of Ocean Engineering and Technology
    • /
    • v.20 no.1 s.68
    • /
    • pp.63-68
    • /
    • 2006
  • Recently, it has been widely recognized that coastal vegetations may have great value in supporting fisheries, protecting from wave attack, stabilizing the sea bed and maintaining good scenery. Hydrodynamic factors play a major role in the functions of water quality and ecosystems. However, the studies on physical and numerical process of wave propagation are few and far behind compared to those on the hydrodynamic roles of coastal vegetations. In general, Vegetation flourishing along the coastal areas attenuates the incident waves, through momentum exchange between stagnated water mass in the vegetated area and rapid mass in the un-vegetated area. This study develops a numerical model for describing the wave attenuation rate in the complex topography with the vegetation area. Based on the numerical results, the physical properties of the wave attenuation are examined under various wave, geometric and vegetation conditions. Through the comparisons of these results, the effects of the vegetation properties, wave properties and model parameters such ac the momentum exchange coefficient have been clarified.

Elastic Motion of the Blood Vessel and Wall Shear Stress in Carotid Artery with Stenosis (협착된 경동맥 내의 벽전단응력 및 혈관의 탄성적 거동)

  • Kim Chang Nyung;Oh Taek Yeol;Choi Myung Jin;Jung Sam Doo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.9 s.174
    • /
    • pp.179-187
    • /
    • 2005
  • The characteristics of blood flow and the interaction between the blood vessel and blood flow play important roles in plaque cap rupture and the growth of atherosclerosis which may lead directly to a heart attack or a stroke. In this study, carotid arteries with different stenoses have been numerically simulated to investigate the wall shear stress(WSS) and the elastic motion of the vessel. Blood flow has been treated as physiological, laminar and incompressible flow. To model the shear thining behavior of the blood, the Carreau-Yasuda model has been employed but the viscoelasticity of blood has not been considered. The results show that the WSS of $severe(75\%)$ stenosis is much higher than those of $25\%\;and\;50\%$ stenosis in the region of stenosis. With the increase in the stenosis thickness, the expansion ratio of the center of the stenosis decreases while the expansion ratio of the upstream region of the stenosis increases.

Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN (CNN을 이용한 소비 전력 파형 기반 명령어 수준 역어셈블러 구현)

  • Bae, Daehyeon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.527-536
    • /
    • 2020
  • It has been found that an attacker can extract the secret key embedded in a security device and recover the operation instruction using power consumption traces which are some kind of side channel information. Many profiling-based side channel attacks based on a deep learning model such as MLP(Multi-Layer Perceptron) method are recently researched. In this paper, we implemented a disassembler for operation instruction set used in the micro-controller AVR XMEGA128-D4. After measuring the template traces on each instruction, we automatically made the pre-processing process and classified the operation instruction set using a deep learning model CNN. As an experimental result, we showed that all instructions are classified with 87.5% accuracy and some core instructions used frequently in device operation are with 99.6% respectively.

A Systems Engineering Approach to Implementing Hardware Cybersecurity Controls for Non-Safety Data Network

  • Ibrahim, Ahmad Salah;Jung, Jaecheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2016
  • A model-based systems engineering (MBSE) approach to implementing hardware-based network cybersecurity controls for APR1400 non-safety data network is presented in this work. The proposed design was developed by implementing packet filtering and deep packet inspection functions to control the unauthorized traffic and malicious contents. Denial-of-Service (DoS) attack was considered as a potential cybersecurity issue that may threaten the data availability and integrity of DCS gateway servers. Logical design architecture was developed to simulate the behavior of functions flow. HDL-based physical architecture was modelled and simulated using Xilinx ISE software to verify the design functionality. For effective modelling process, enhanced function flow block diagrams (EFFBDs) and schematic design based on FPGA technology were together developed and simulated to verify the performance and functional requirements of network security controls. Both logical and physical design architectures verified that hardware-based cybersecurity controls are capable to maintain the data availability and integrity. Further works focus on implementing the schematic design to an FPGA platform to accomplish the design verification and validation processes.

Digital Watermarking for Copyright Protection of 3-D CAD Design Drawing Based on Vector Data Using Digital Watermarking

  • Kwon, Ki-Ryong;Lee, Suk-Hwan;Park, Seung-Seob;Jeong, Tai-Il
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1596-1606
    • /
    • 2006
  • There has been more increased the development of 3D technique since many 3D contents of 3D graphic model, 3D mobile/computer game, and 3D CAD have been serviced in Web or industry fields. Therefore, the watermarking system is more required to protect the copyright for 3D contents. Currently there has been researched about the watermarking for 3D graphic model of mesh or NURBS. However, watermarking technique based on CAD design drawing leaves something to be desired yet. This paper proposed the watermarking technique for 3D CAD design drawing using Line and Arc components. After drawing out Line and Arc components from designed drawing, we embed the watermark into both the length of Line component and the radius of Arc component. Experimental results verified that the proposed algorithm satisfies the transparency about watermarked drawing and also has the robustness against several attacks by using public CAD tool.

  • PDF

Analysis of Hierarchical Competition Structure and Pricing Strategy in the Hotel Industry

  • BAEK, Unji;SIM, Youngseok;LEE, Seul-Ki
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.4
    • /
    • pp.179-187
    • /
    • 2019
  • This study aims to investigate the effects of market commonality and resource similarity on price competition and the recursive consequences in the Korean lodging market. Price comparison among hotels in the same geographic market has been facilitated through the development of information technology, rendering little search cost of consumers. While the literature implies the heterogeneous price attack and response among hotels, a limited number of empirical researches focus on the asymmetric and recursive pattern in the competitive dynamics. This study empirically examines the price interactions in the Korean lodging market based on the theoretical framework of competitive price interactions and countervailing power. Demonstrating superiority to the spatial lag model and the ordinary least squares in the estimation, the results from spatial error model suggest that the hotels with longer operational history pose an asymmetric impact on the price of the newer hotels. The asymmetry is also found in chain hotels over the independent, further implying the possibility of predatory pricing. The findings of this study provide the evidence of a hierarchical structure in the price competition, with different countervailing power by the resources of the hotels. Theoretical and managerial implications are discussed, with suggestions for future study.

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

The Influence of Group Characteristics on Effectiveness of Online Game : Focuses on MMOG (집단특성이 온라인 게임의 유효성에 미치는 영향 : MMOG를 중심으로)

  • Lee, Woong-Kyu;Kwon, Jeong-Il
    • The Journal of Information Systems
    • /
    • v.20 no.2
    • /
    • pp.81-107
    • /
    • 2011
  • Group features such as group cohesion and consistency on appropriation(COA), which have been constructed through social interactions, should be noted for characterizing online game, especially, clan based massively multi-players online game (MMOG). This study attempted to identify the relationship between group characteristics and users' effectiveness of MMOG considering group experience. For this purpose, a research model was suggested: group cohesion and COA are variables for explaining group features, perceived use control is a variable for individual competency of playing MMOG, and perceived winning and perceived enjoyment are dependent variables. Moreover, group experience was included as a moderating variables for two relationships, group cohesion-preceived winning and COA-perceived winning. For the validation of this research model, 100 users for Sudden Attack which is one of very well known MMOG games were surveyed by questionnaires. Before survey, they were grouped into 10 teams and were played over ten times by team for perceiving group consciousness. In result, most hypotheses were statistically supported except the relationship between group cohesion and perceived winning.

Numerical simulation for unsteady flow over marine current turbine rotors

  • Hassanzadeh, A. Reza;Yaakob, Omar bin;Ahmed, Yasser M.;Ismail, M. Arif
    • Wind and Structures
    • /
    • v.23 no.4
    • /
    • pp.301-311
    • /
    • 2016
  • The numerous benefits of Savonius turbine such as simple in structure, has appropriate self-start ability, relatively low operating velocity, water acceptance from any direction and low environmental impact have generated interests among researchers. However, it suffers from a lower efficiency compared to other types of water turbine. To improve its performance, parameters such flow pattern, pressure and velocity in different conditions must be analyzed. For this purpose, a detailed description on the flow field of various types of Savonius rotors is required. This article presents a numerical study on a nonlinear two-dimensional flow over a classic Savonius type rotor and a Benesh type rotor. In this experiment, sliding mesh was used for solving the motion of the bucket. The unsteady Reynolds averaged Navier-Stokes equations were solved for velocity and pressure coupling by using the SIMPLE (Semi-Implicit Method for Pressure linked Equations) algorithm. Other than that, the turbulence model using $k-{\varepsilon}$ standard obtained good results. This simulation demonstrated the method of the flow field characteristics, the behavior of velocity vectors and pressure distribution contours in and around the areas of the bucket.

Aerostatic load on the deck of cable-stayed bridge in erection stage under skew wind

  • Li, Shaopeng;Li, Mingshui;Zeng, Jiadong;Liao, Haili
    • Wind and Structures
    • /
    • v.22 no.1
    • /
    • pp.43-63
    • /
    • 2016
  • In conventional buffeting theory, it is assumed that the aerostatic coefficients along a bridge deck follow the strip assumption. The validity of this assumption is suspect for a cable-stayed bridge in the construction stages, due to the effect of significant aerodynamic interference from the pylon. This situation may be aggravated in skew winds. Therefore, the most adverse buffeting usually occurs when the wind is not normal to bridge axis, which indicates the invalidity of the traditional "cosine rule". In order to refine the studies of static wind load on the deck of cable-stayed bridge under skew wind during its most adverse construction stage, a full bridge 'aero-stiff' model technique was used to identify the aerostatic loads on each deck segment, in smooth oncoming flow, with various yaw angles. The results show that the shelter effect of the pylon may not be ignored, and can amplify the aerostatic loading on the bridge deck under skew winds ($10^{\circ}-30^{\circ}$) with certain wind attack angles, and consequently results in the "cosine rule" becoming invalid for the buffeting estimation of cable-stayed bridge during erection for these wind directions.