• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.031 seconds

An Experimental Study of Squeal Noise Characteristics for Railway Using a Scale Model Test Rig (축소 모델 실험장치를 이용한 철도 스킬소음의 특성에 대한 실험적 연구)

  • Kim, Jiyong;Hwang, Donghyeon;Lee, Junheon;Kim, Kwanju;Kim, Jaechul
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.25 no.5
    • /
    • pp.352-360
    • /
    • 2015
  • Squeal noise is a harsh, high-pitched sound that occurs when railways are running at sharp curve tracks. The cause of squeal noise is known to be the transient lateral traction force between wheel and rail. Field measurements are too difficult to control the parameters. Thus, the scaled test rig should have been made in order to investigate the generating mechanism of squeal noise. The unique feature of our test rig, HSTR(Hongik Squeal Testing Rig), is that DOFs of its wheelset are as close to as those of the real railway. The attack angle and running speed of the rail roller are controlled in real time for simulating a transient characteristic of driving curve. The environment conditions, such as given axle load, running speed, and wheel's yaw angle have been identified for generating squeal noise and the squeal noise itself has been measured. The relation between wheel creepage and creep force in lateral direction and the criteria for squeal noise have been investigated, which results has been verified by finite element method.

Aerodynamic Characteristics of an Insect-type Flapping Wings (곤충 모방 플래핑 날개의 공력 특성)

  • Han, Jong-Seob;Chang, Jo-Won;Choi, Hae-Cheon;Kang, In-Mo;Kim, Sun-Tae
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2007.11a
    • /
    • pp.311-314
    • /
    • 2007
  • Aerodynamic characteristics of an insect-type flapping wings were carried out to obtain the design parameters of Micro Hovering Air Vehicle. A pair of wing model was scaled up about 200 times and applied two pairs of 4-bar linkage mechanism to mimic the wing motion of a fruit fly(Drosophila). To verify the Weis-Fogh mechanism, a pair of wings revolved on the 'Delayed Rotation'. Lift and drag were measured in conditions of the Reynolds number based on wing tip velocity of about 1,200 and the maximum angle of attack of 40$40^{\circ}$. Inertia forces of a wing model were also measured by using a 99.98% vacuum chamber and subtracted on measured data in air. In the present study, high lift effect of Weis-Fogh mechanism was appeared in the middle of upstroke motion.

  • PDF

Pasteur Brand Storytelling Campaign (파스퇴르의 브랜드 스토리텔링 캠페인)

  • Lee, Yong-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.142-149
    • /
    • 2011
  • This study analyzed the brand storytelling campaign of Pasteur drink-type yogurt 'Quebyon'. The basic idea of research comes from how unique brand name is able to success in Korean yogurt market. Pasteur storytelling campaign has focused on the product's branding and positioning. For analyzing the research, Brand Stewardship Model(BSM) which based on consumers' perspectives has been used. For successful storytelling campaign of Pasteur, strong brand name is needed. Pasteur has decided the brand name 'Quebyon' which means good movement of the bowels in accordance with the research results. And the positioning has been decided 'attack inside (the body) if it does not evacuate'. For powerful positioning, three criterions are decided. They are including harmony with the brand name, differentiation with competitors and easiness with memory. Finally, the Pasteur product dominates the Korean Bulgarian-style yogurt market. The success comes from the harmonizing of Quebyon yogurt's branding and positioning. In other words, the branding and positioning strategies were working effectively to the consumers. In conclusion, this study has proved why branding and positioning strategies are so important in brand storytelling campaign.

A Scalable Distributed Worm Detection and Prevention Model using Lightweight Agent (경량화 에이전트를 이용한 확장성 있는 분산 웜 탐지 및 방지 모델)

  • Park, Yeon-Hee;Kim, Jong-Uk;Lee, Seong-Uck;Kim, Chol-Min;Tariq, Usman;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.517-521
    • /
    • 2008
  • A worm is a malware that propagates quickly from host to host without any human intervention. Need of early worm detection has changed research paradigm from signature based worm detection to the behavioral based detection. To increase effectiveness of proposed solution, in this paper we present mechanism of detection and prevention of worm in distributed fashion. Furthermore, to minimize the worm destruction; upon worm detection we propagate the possible attack aleγt to neighboring nodes in secure and organized manner. Considering worm behavior, our proposed mechanism detects worm cycles and infection chains to detect the sudden change in network performance. And our model neither needs to maintain a huge database of signatures nor needs to have too much computing power, that is why it is very light and simple. So, our proposed scheme is suitable for the ubiquitous environment. Simulation results illustrate better detection and prevention which leads to the reduction of infection rate.

A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique (머신러닝을 이용한 사용자 행동 인식 기반의 PIN 입력 기법 연구)

  • Jung, Changhun;Dagvatur, Zayabaatar;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.127-136
    • /
    • 2018
  • In this paper, we propose a PIN entry method that combines with machine learning technique on smartphone. We use not only a PIN but also touch time intervals and locations as factors to identify whether the user is correct or not. In the user registration phase, a remote server was used to train/create a machine learning model using data that collected from end-user device (i.e. smartphone). In the user authentication phase, the pre-trained model and the saved PIN was used to decide the authentication success or failure. We examined that there is no big inconvenience to use this technique (FRR: 0%) and more secure than the previous PIN entry techniques (FAR : 0%), through usability and security experiments, as a result we could confirm that this technique can be used sufficiently. In addition, we examined that a security incident is unlikely to occur (FAR: 5%) even if the PIN is leaked through the shoulder surfing attack experiments.

Estimation of the Virtual Mass of Conical Nets using Circulating Water Channel (회류수조를 이요한 자루그물의 가상질량 추정)

  • 김현영
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.36 no.1
    • /
    • pp.60-65
    • /
    • 2000
  • The virtual mass of net is an important parameter in the analysis and control of net movement in the water. This experiment was performed with the purpose of getting a relation on the quantity of netting and virtual mass of trawl nets using the circulating water channel that can control flow speed. Twelve types of conical nets were examined. Resistance of the conical net at the steady and acceleration state was recorded as text on the personal computer through the tension meter and current meter. The results were obtained as follows ;1. Resistance(R) of the conical net is proportional to the degree of attack angle in the sam e amount of twine material.2. Coefficient of the resistance(Cd)could be defined by the following regression model as a function of Reynolds Number(Re). Cd=0.039Re-0.14743. Resistance(R) is proportional to TSA(Twine surface area) and defined as follows; R=21.398TSA-0.12194. Coefficient of virtual mass(CM) could be calculated by the following first order regression model. CM=37.557U-8.96845. Virtual mass is directly proportional to Volume of net(V) or d/l.

  • PDF

Design and Control of Security Ticket Based CERT/CC System for Quantified Incident Management (정량적 침해사고 관리를 위한 Security Ticket 기반의 CERT/CC 설계 및 관리)

  • Kim, Sun-Tae;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.239-248
    • /
    • 2007
  • There's been a difficulty for general corporate to adopt recent incident response study because those studies focus on nation wide CERT Coordination Center or large organization aspect. This study is focus on study and design on security ticket based CERT system through analysis Security management's threat element, attack element, response element and it also help general corporate establish incident response process that is adjusted on IT operation. Confirmed CERT model's effectiveness and effect of quantitative Security incident management way that propose executing Security incident response experiment on the basis of this way. This study which provides general corporate oriented CERT model can be used to improve corporate's capability of responding incident by quantified management technique and select incident response SLA indicator. Already, formation which operate CERT can heighten corporation's information protection level by measure Security incident response result as metrical and analyze and improve problem continuously.

  • PDF

Experiment and Analysis of Mooring System for Floating Fish Cage (해상 양식시설의 계류시스템 실험 및 해석)

  • KIM Jin-Ha;KIM Hyeon-Ju;HONG Sup
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.34 no.6
    • /
    • pp.661-665
    • /
    • 2001
  • This paper deals with optimal mooring system to secure fish cage in a desired location, Through field investigation and paper works, we surveyed disasters by breakdown of cage frame and mooring system due to higher wave attack and selected compliant buoy mooring method for shallow water mooring system against severe coastal external forces. To analyze interaction between external forces and compliant buoy mooring system, theoretical model has developed as quasi-static nonlinear analysis. After verifying the feasibility of the numerical model compared with experiment, static analysis has tried for various mooring systems with different angle of array, number of mooring points, length of horizontal and inclined rope. Optimal mooring method using compliant buoy has selected for fish cage through numerical simulation. This results can apply for preliminary design for cage mooring system.

  • PDF

Assessment of vertical wind loads on lattice framework with application to thunderstorm winds

  • Mara, T.G.;Galsworthy, J.K.;Savory, E.
    • Wind and Structures
    • /
    • v.13 no.5
    • /
    • pp.413-431
    • /
    • 2010
  • The focus of this article is on the assessment of vertical wind vector components and their aerodynamic impact on lattice framework, specifically two distinct sections of a guyed transmission tower. Thunderstorm winds, notably very localized events such as convective downdrafts (including downbursts) and tornadoes, result in a different load on a tower's structural system in terms of magnitude and spatial distribution when compared to horizontal synoptic winds. Findings of previous model-scale experiments are outlined and their results considered for the development of a testing rig that allows for rotation about multiple body axes through a series of wind tunnel tests. Experimental results for the wind loads on two unique experimental models are presented and the difference in behaviour discussed. For a model cross arm with a solidity ratio of approximately 30%, the drag load was increased by 14% when at a pitch angle of $20^{\circ}$. Although the effects of rotation about the vertical body axis, or the traditional 'angle of attack', are recognized by design codes as being significant, provisions for vertical winds are absent from each set of wind loading specifications examined. The inclusion of a factor to relate winds with a vertical component to the horizontal speed is evaluated as a vertical wind factor applicable to load calculations. Member complexity and asymmetric geometry often complicate the use of lattice wind loading provisions, which is a challenge that extends to future studies and codification. Nevertheless, the present work is intended to establish a basis for such studies.

A Study and Design on security ticket based CERT system for quantified incident management (정량적 침해사고 관리를 위한 Security Ticket 기반의 침해사고 관리시스템(CERT) 설계 및 관리방안 연구)

  • Kim, Sun-Tae;Jun, Moon-Seog;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.141-150
    • /
    • 2007
  • There's been a difficulty for general corporate to adopt recent incident response study because those studies focus on nation wide CERT Coordination Center or large organization aspect. This study is focus on study and design on security ticket based CERT system through analysis Security management's threat element, attack element. response element and it also help general corporate establish incident response process that is adjusted on IT operation. Confirmed CERT model's effectiveness and effect of quantitative Security incident management wav that propose executing Security incident response experiment on the basis of this way. This study which Provides general corporate oriented CERT model can be used to improve corporate's capability of responding incident by quantified management technique and select incident response SLA indicator. Already, formation which operate CERT can heighten corporation's information protection level by measure Security incident response result as metrical and analyze and improve problem continuously.

  • PDF