• 제목/요약/키워드: Attack Model

Search Result 1,005, Processing Time 0.027 seconds

Damage prediction of RC containment shell under impact and blast loading

  • Pandey, A.K.
    • Structural Engineering and Mechanics
    • /
    • v.36 no.6
    • /
    • pp.729-744
    • /
    • 2010
  • There is world wide concern for safety of nuclear power installations after the terrorist attack on World Trade Center in 2001 and several other civilian structures in the last decade. The nuclear containment structure in many countries is a double shell structure (outer shell a RCC and inner a prestressed concrete). The outer reinforced concrete shell protects the inner shell and is designed for external loading like impact and blast. A comparative study of non-linear response of reinforced concrete nuclear containment cylindrical shell subjected to impact of an aircraft (Phantom) and explosion of different amounts of blast charges have been presented here. A material model which takes into account the strain rate sensitivity in dynamic loading situations, plastic and visco-plastic behavior in three dimensional stress state and cracking in tension has been developed earlier and implemented into a finite element code which has been validated with published literature. The analysis has been made using the developed software. Significant conclusions have been drawn for dissimilarity in response (deflections, stresses, cracks etc.) of the shell for impact and blast loading.

Armed Vehicle BAttle Group Simulation : BAGSim (기갑 전투그룹 교전 시뮬레이션 모델)

  • 최상영
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.1
    • /
    • pp.73-83
    • /
    • 2003
  • This paper presents armed vehicle BAttle Group Simulation model(called BAGSim) which is an object-oriented simulation system for representing battle group engagement consisting of tanks and helicopters. BAGSim is designed in the evolutionary software life cycle approach with the Unified Software Development Process, and implemented with C++ language. BAGSim consists of a preprocessor for engagement scenario definition and simulation data set up, a main processor for triggering engagement event and advancing simulation clock, and a post processor to record simulation histories. Application scenario covers several type of engagement among command tanks, fight tanks, scout helicopters, attack helicopters, anti-tank guided missiles, and decoys. Thus, BAGSim can be effectively used as an analytic tool to examine some operational concepts and tactics, further experimentally fine tune tank design options.

  • PDF

A Study on the Performance of Waterjet Propulsion System for Small Naval Ship (소형 Waterjet 추진성능 검증에 관한 연구)

  • Kim, Kyoung-Bae;Cho, Dong-Joo;Park, Myung-Ku
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.6
    • /
    • pp.787-791
    • /
    • 2010
  • This paper describes the performance of small waterjet propulsion system and show the influence of performance for nozzle shape and area. The installed engine sets a limit on maximum power in below 1800 rpm for fuel saving. Our designated target is reached by redesign of the impeller considering engine characteristics and extention of nozzle pararell part. The results of the full-scale ships are compared with thoes of the model test. In the future, those experimental data will be applied to the relation study between engine characteristics and powering performance prediction.

Analyses of Privacy and Vulnerability with Light-weight RFID System (저용량 RFID 시스템에서의 보안 및 취약성 분석)

  • Ahn, Byung-Jun;Park, Young-Bum;Nam, Jun-Woo;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.773-775
    • /
    • 2011
  • We analysed privacy, attack model and vulnerability with light-weight RFID System. A specific system's vulnerability depends on its implementation and the applied countermeasures. We can build an RFID system with a satisfactory security level even in a high-risk application area. To do so, however, we must pay attention to the implementation of proportional security measures.

  • PDF

Ad hoc Software Rejuvenation for Survivability

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.141-145
    • /
    • 2003
  • We propose the model of Software Rejuvenation methodology, which is applicable for survivability. Software rejuvenation is a proactive fault management technique and being used in fault tolerant systems as a cost effective technique for dealing with software faults. Survivability focuses on delivery of essential services and preservation of essential assets, even systems are penetrated and compromised. Thus, our objective is to detect the intrusions in a real time and survive in face of such attacks. As we deterrent against an attack in a system level, the Intrusion tolerance could be maximized at the target environment. We address the optimal time to execute ad hoc software rejuvenation and we compute it by using the semi Markov process. This is one way that could be really frustrated and deterred the attacks, as the attacker can't make their progress. This Software Rejuvenation method can be very effective under the assumption of unknown attacks. In this paper, we compute the optimum time to perform an ad hoc Software Rejuvenation through intrusions.

  • PDF

DDoS attack Detection based on Web Browsing Patterns (웹 브라우징 패턴기반의 DDoS 공격탐지)

  • Yoo, Seong-Min;Jung, Woo-Tak;Jung, Gwang-Un;Park, Pyung-Ku;Ryou, Jae-Cheol
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.283-285
    • /
    • 2012
  • 2009년 7.7 DDoS 공격을 기점으로 DDOS 공격에 HTTP-GET 프로토콜이 공격에 주로 사용되고 있다. 본 논문에서는 클라이언트에서 개인사용자의 웹 브라우징 패턴을 분석함으로써 HTTP-GET 공격을 탐지하는 방법을 제안한다. 웹 브라우징 패턴 분석에는 Markov Model을 사용하여 사용자의 정상적인 행동패턴을 계산하고, 공격을 탐지하는데 사용한다. 제안한 방법은 클라이언트에서 개인사용자에 대한 개별적인 웹 브라우징 패턴을 분석하기 때문에 서버에서보다 계산량이 적으며, 클라이언트 레벨에서 DDoS 공격을 조기에 탐지/차단함으로써 서버에서의 DDoS 공격 탐지에 의한 부하를 줄일 수 있다.

Generating adversarial examples on toxic comment detection (악성 댓글 탐지기에 대한 대항 예제 생성)

  • Son, Soohyun;Lee, Sangkyun
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.795-797
    • /
    • 2019
  • In this paper, we propose a method to generate adversarial examples for toxicity detection neural networks. Our dataset is represented by a one-hot vector and we constrain that only one character is allowed to be modified. The location to be changed is founded by the maximum area of input gradient, which represents the most affecting character the model to make decisions. Despite the fact that we have strong constraint compared to the image-based adversarial attack, we have achieved about 49% successful rate.

A New Synthetic Route to Poly(benzimidazole) and the Related Model Reactions to Imidazoline and Benzimidazole

  • Shin, G. I.;Kim, Ji Heung
    • Bulletin of the Korean Chemical Society
    • /
    • v.17 no.1
    • /
    • pp.29-33
    • /
    • 1996
  • Mono-, or di-substituted chlorodicyanovinyl benzene compound was reacted with an excess amount of ethylenediamine to give corresponding imidazoline product with high reaction yield. This reaction occurs by stable imidazoline ring-forming process through nucleophilic attack of terminal amine on the enaminonitrile adduct, the reaction intermediate, toward electropositive enamine carbon, which is accompanied by the release of neutral malononitrile moiety. The similar reaction with 1,2-phenylenediamine produced stable enaminonitrile-amine adduct at lower temperature which could be cyclized intramolecularly to thermally stable benzimidazole at elevated temperature in solution or in solid state. From the difunctional compound of both reactants, poly(enaminonitrile-amine) could be prepared as a new soluble precursor polymer for well-known polybenzimidazole (PBI). The thermal cyclization reaction accompanying the release of malononitrile molecules was studied using thermalanalysis and infrared spectroscopy.

Hydroxy-Substituted Polyenaminonitrile as a Soluble Precursor for Rigid-Rod Polybenzoxazole

  • Kim, Ji Heung;Lee, Jae Gwan
    • Bulletin of the Korean Chemical Society
    • /
    • v.22 no.9
    • /
    • pp.999-1004
    • /
    • 2001
  • (1-Chloro-2,2-dicyanovinyl)benzene or 1,4-bis(1-chloro-2,2-dicyanovinyl)benzene was reacted with 2-amino-phenol to give the model compound, hydroxy enaminonitrile, which was found to undergo thermal cyclization reaction to form the corresponding benzoxazole. This intramolecular cyclization reaction is expected to occur through nucleophilic attack to electropositive enamine carbon by ortho-hydroxy group on the phenyl ring, which is accompanied by the release of neutral malononitrile through rearrangement. From each bifunctional monomer, o-hydroxy substituted polyenaminonitrile was prepared and characterized as a new precursor polymer for well-known aromatic polybenzoxazole. Also the unusual macrocyclic dimer formation from the 1,4-bis(1-chloro-2,2-dicyanovinyl)benzene and 2,2-bis(3-amino-4-hydroxyphenyl)hexafluoropropane polymerization reaction system was discussed. The thermal cyclization reactions and the properties of polymers were investigated using FT-IR and thermal analysis (DSC & TGA).

Semiempirical Molecular Orbital Calculations of the Substituent Effects on Acylations of 3-Cephem Analogues

  • Chang Moon-Ho;Koh Hun-Yeong;Lee Jung-Chull;Lee Yoon Sup
    • Bulletin of the Korean Chemical Society
    • /
    • v.15 no.6
    • /
    • pp.453-455
    • /
    • 1994
  • Semiempirical MO calculations are applied to estimate the substituent effects on acylations of the nonfused N-vinyl-2-amino $\beta-lactams$ having frameworks analogous to 3-cephems. The stabilization energy for the reaction intermediate of the nucleophilic attack by the hydroxide ion is selected as the reactivity index and calculated by AM1 and PM3 methods for the model $\beta-lactams$ with substituents at the C1 and N-vinyl terminal positions. The reactivities are larger for -SH connected to the C1 and strong $\pi-acceptors$ at the N-vinyl terminal implying the large reactivity for known active cephalosporins. Quantum chemical calculation of stabilization energy could be useful in correlating antibiotic activities of many compounds obtained as derivatives of a lead compound.