• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.027 seconds

High Lift Device Design Optimization and Wind Tunnel Tests (고양력장치 설계 최적화 및 풍동시험)

  • Lee, Yung-Gyo;Kim, Cheol-Wan;Cho, Tae-Hwan
    • Aerospace Engineering and Technology
    • /
    • v.9 no.1
    • /
    • pp.78-83
    • /
    • 2010
  • In the present paper, a flap was optimized to maximize the lift. A 2-element fowler flap system was utilized for optimization with an initial shape of general aviation airfoil and a flap shape designed by Wentz. Response surface method and Hicks-Henne shape function were implemented for optimization. 2-D Navier-Stokes method was used to solve flow field around aGA(W)-1 airfoil with a fowler flap. Commercial programs including Visual-Doc, Gambit/Tgridand Fluent were used. Upper surface shape and the flap gap were optimized and lift for landing condition was improved considerably. The original and optimized flaps were tested in the KARI's 1-m low speed wind tunnel to examine changes in aerodynamic characteristics. For optimized flap tests, the similar trend to prediction could be seen but stall angle of attack was lower than what was expected. Also, less gap than optimized design delayed stall and produced better lift characteristics. This is believed to be the effect of turbulence model.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Upregulation of Dendritic Arborization by N-acetyl-D-Glucosamine Kinase Is Not Dependent on Its Kinase Activity

  • Lee, HyunSook;Dutta, Samikshan;Moon, Il Soo
    • Molecules and Cells
    • /
    • v.37 no.4
    • /
    • pp.322-329
    • /
    • 2014
  • N-acetylglucosamine kinase (GlcNAc kinase or NAGK; EC 2.7.1.59) is highly expressed and plays a critical role in the development of dendrites in brain neurons. In this study, the authors conducted structure-function analysis to verify the previously proposed 3D model structure of GlcNAc/ATP-bound NAGK. Three point NAGK mutants with different substrate binding capacities and reaction velocities were produced. Wild-type (WT) NAGK showed strong substrate preference for GlcNAc. Conversion of Cys143, which does not make direct hydrogen bonds with GlcNAc, to Ser (i.e., C143S) had the least affect on the enzymatic activity of NAGK. Conversion of Asn36, which plays a role in domain closure by making a hydrogen bond with GlcNAc, to Ala (i.e., N36A) mildly reduced NAGK enzyme activity. Conversion of Asp107, which makes hydrogen bonds with GlcNAc and would act as a proton acceptor during nucleophilic attack on the ${\gamma}$-phosphate of ATP, to Ala (i.e., D107A), caused a total loss in enzyme activity. The overexpression of EGFP-tagged WT or any of the mutant NAGKs in rat hippocampal neurons (DIV 5-9) increased dendritic architectural complexity. Finally, the overexpression of the small, but not of the large, domain of NAGK resulted in dendrite degeneration. Our data show the effect of structure on the functional aspects of NAGK, and in particular, that the small domain of NAGK, and not its NAGK kinase activity, plays a critical role in the upregulation of dendritogenesis.

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism (자가치유 메커니즘을 활용한 침입감내시스템의 취약성 분석)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.333-340
    • /
    • 2005
  • One of the most important core technologies required for the design of the ITS (Intrusion Tolerance System) that performs continuously minimal essential services even when the network-based computer system is partially compromised because of the external or internal intrusions is the quantitative dependability analysis of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to secure the protection power of the ITS. We analyzed a state transition diagram of the ITS composed of a Primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and calculated the availability of ITS through simulation experiments and also performed studies on two cases of vulnerability attack.

Near Real-time Immediate Forecasting of Storm Surge Based on Typhoon Advisories (태풍 예경보에 근거한 폭풍해일 준실시간 즉각 예보)

  • Suh, SeungWon;Lee, HwaYoung;Kim, HyeonJeong;Park, JinSoo
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.24 no.5
    • /
    • pp.352-365
    • /
    • 2012
  • A primary study on the rapid modeling of storm surge, which is one of typical coastal disasters, for immediate forecasting in conjunction with typhoon advisories is done and tested for the typhoons Bolaven, Tembin and Sanba which attacked to Korean Peninsula on August and September in this year 2012. Semi automatic rapid computations according to JTWC typhoon advisories were performed and uploaded to the web by models SLOSH in PC and ADCIRC in parallel clusters with 64 cores having 57k nodes encompassing the North-Western Pacific region. It only takes 1 and 2 hours from taking advisory to web uploading, respectively. By comparison with observed water surface elevations for the major tidal stations after Bolaven attack it shows within RMS error of 0.17~0.19 m for surge heights and only deviates 1 hour of peak surge time in ADCIRC model. Thus it is concluded that this approach provides a frame of near real-time immediate forecasting of storm surges with satisfactions.

Effects of Air Pollution on Asthma in Seoul: Comparisons across Subject Characteristics (서울지역 대기오염이 천식에 미치는 급성영향: 연구대상의 특성에 따른 비교)

  • Kim, Sun-Young;Kim, Jai-Yong;Kim, Ho
    • Journal of Preventive Medicine and Public Health
    • /
    • v.39 no.4
    • /
    • pp.309-316
    • /
    • 2006
  • Objectives: Korean epidemiological studies have used reduced samples according to the subject's characteristics, such as the health services provided, the historical note with asthma, and age, to examine the acute effect of air pollution on asthma using the Korean National Health Insurance records. However, there have been few studies on whether the effects shown in these reduced samples are different from those of all samples. This study compared the effects of air pollution on asthma attacks in three reduced samples with those of entire samples. Methods: The air pollution data for $PM_{10},\;CO,\;SO_2,\;NO_2,\;and\;O_3$, and weather conditions including temperature, relative humidity, and air pressure in Seoul, 2002, were obtained from outdoor monitoring stations in Seoul. The emergency hospital visits with an asthma attack in Seoul, 2002 were extracted from the Korean National Health Insurance records. From these, the reduced samples were created by health service, historical notes with asthma, and age. A case-crossover design was adopted and the acute effects of air pollution on asthma were estimated after adjusting for weather, time trend, and seasonality. The model was applied to each reduced sample and the entire sample. Results: With respect to the health service, the effects on outpatients were similar to those for the total sample but were different for inpatients. These similar effect sizes were also observed in the reduced samples according to the historical note with asthma and age. The relative risks of $PM_{10},\;CO,\;SO_2,\;NO_2,\;and\;O_3$, among the reduced and entire samples were 1.03, 1.04-1.05, 1.02-1.03, 1.04-1.06, and 1.10-1.17, respectively. Conclusions: There was no clear evidence to show a difference between the reduced samples and the entire samples.

Tactile Sensing for Virtual Interaction as a Part of Ubiquitous Game Development (유비쿼터스게임의 상호작용 구성요소 개발을 위한 촉각응용)

  • Lee, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1062-1068
    • /
    • 2007
  • In order to design and develop a ubiquitous game, it is necessary to develop a natural and flexible interface between the real world and the virtual world, based on social and physical context awareness. We design user interface model and the tactile sensing system that performs virtual interaction and collection of the sensor data. It is sensitive so the collected data should be filtered, rearranged and analyzed. This information is quite different from stylus input, keyboard, button or mouse for interaction. We detect kicked 3D force position of a ball, moment of area, moment of inertia and modified ball shape using tactile sensing system and analyzed data. The results demonstrate that the proposed approach is desirable and robust as well as the results can be used realistic actions and reactions considering attack force and to make interesting environments for ubiquitous game.

Pharmacolgocial Characterization of LB50016, N-(4-Amino)Butyl 3-Phenylpyrrolidine Derivative, as a New 5-HT_{1A}Receptor Agonist

  • Lee, Chang-Ho;Oh, Jeong-In;Park, Hee-Dong;Kim, Hee-Jin;Park, Tae-Kyo;Kim, Jae-Soon;Hong, Chang-Yong;Lee, Seok-Jong;Ahn, Kyo-Han;Kim, Yong-Zu
    • Archives of Pharmacal Research
    • /
    • v.22 no.2
    • /
    • pp.157-164
    • /
    • 1999
  • LB50016 was characterized as a selective and potent$ 5-HT_{1A}$ receptor agonist and evaluate it anxiolytic and antidepressant activities. It shows high affinity for $ 5-HT_{1A}$receptor, moderate affinity for $\alpha$2 adrenergic and $ 5-HT_{2A}$receptors and no significant affinity for other receptors tested. Hypothermia and increased serum corticosterone level were observed in LB50016-treated rats, which are mediated mostly by post synaptic $ 5-HT_{1A}$ receptor activation. In the mouse forced swim model for depression, LB50016-elicited dose-dependent reductions in immobility time, showing $ED_{50}$ of approximately 3 mg/kg i.p., which was blocked by pretreatment of NAN-190, $ 5-HT_{1A}$antagonist. In face-to-face test for anxiolytic activity in mice, estimated $ED_{50}$ was 2 mg/kg, i.p.. In isolation-induced aggression test with mice, fifty-fold increases in latency to attack were observed at 30 min and last up to 4 h after LB50016 treatment (3 mg/kg, i.p.). Taken together, LB50016-induced pharmacological activities are mediated by activation of $ 5-HT_{1A}$receptors, offering an effective therapeutic candidate in the management of anxiety and depression in humans.

  • PDF

Graph Database based Malware Behavior Detection Techniques (그래프 데이터베이스 기반 악성코드 행위 탐지 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.55-63
    • /
    • 2021
  • Recently, the incidence rate of malicious codes is over tens of thousands of cases, and it is known that it is almost impossible to detect/respond all of them. This study proposes a method for detecting multiple behavior patterns based on a graph database as a new method for dealing with malicious codes. Traditional dynamic analysis techniques and has applied a method to design and analyze graphs of representative associations malware pattern(process, PE, registry, etc.), another new graph model. As a result of the pattern verification, it was confirmed that the behavior of the basic malicious pattern was detected and the variant attack behavior(at least 5 steps), which was difficult to analyze in the past. In addition, as a result of the performance analysis, it was confirmed that the performance was improved by about 9.84 times or more compared to the relational database for complex patterns of 5 or more steps.