• 제목/요약/키워드: Breach Process

검색결과 55건 처리시간 0.024초

Problems of Distance Learning in Specialists Training in Modern Terms of The Informative Society During COVID-19

  • Kuchai, Oleksandr;Yakovenko, Serhii;Zorochkina, Tetiana;Оkolnycha, Tetiana;Demchenko, Iryna;Kuchaі, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.143-148
    • /
    • 2021
  • The article considers the training of specialists in education in the conditions of distance learning. It is lights up the advantages of distance learning and determined the characteristic features of distance learning of students training in the implementation of these technologies in the educational process. The article focuses on the main aspects of computerization of studies as a technological breach in methodology, organization and practical realization of educational process and informative culture of a teacher. Information technologies are intensive involved in life of humanity, educational process of schools and higher educational establishments. Intercommunication is examined between the processes of informatization of the society and education.

Feasibility Study on the Development of Alternative Methods for the Treatment of TRISO Fuels

  • Lee Jong-Hyeon;Shim Joon-Bo;Ahn Byung-Gil;Kwon Sang-Woon;Kim Eung-Ho
    • 한국방사성폐기물학회:학술대회논문집
    • /
    • 한국방사성폐기물학회 2005년도 춘계 학술대회
    • /
    • pp.352-361
    • /
    • 2005
  • In this study, conventional head-end processes of spent TRISO fuel have been reviewed to develope more effective treatment methods. The main concerns in the TRISO treatment are to effectively separate the carbon and SiC contained in the TRISO particles. The crush-burn scheme which was considered in the early stages of the development has been replaced by the crush-leach process because of $^{14}C$ problems as a second waste during the process. However there are still many obstacles to overcome in the reported processes. Hence, innovative thermomechanical concepts to breach the coating layers of the TRISO particle with a minimized amount of second waste are proposed in this paper and their principles are described in detail.

  • PDF

Prediction of Outflow Hydrograph caused by Landslide Dam Failure by Overtopping

  • Do, XuanKhanh;Kim, Minseok;Nguyen, H.P.T;Jung, Kwansue
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2016년도 학술발표회
    • /
    • pp.196-196
    • /
    • 2016
  • Landslide dam failure presents as a severe natural disaster due to its adverse impact to people and property. If the landslide dams failed, the discharge of a huge volume of both water and sediment could result in a catastrophic flood in the downstream area. In most of previous studies, breaching process used to be considered as a constructed dam, rather than as a landslide dam. Their erosion rate was assumed to relate to discharge by a sediment transport equation. However, during surface erosion of landslide dam, the sediment transportation regime is greatly dependent on the slope surface and the sediment concentration in the flow. This study aims to accurately simulate the outflow hydrograph caused by landslide dam by overtopping through a 2D surface flow erosion/deposition model. The lateral erosion velocity in this model was presented as a function of the shear stress on the side wall. The simulated results were then compared and it was coherent with the results obtained from the experiments.

  • PDF

The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle

  • Syed Zain ul Hassan;Saleem Zubair Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.169-175
    • /
    • 2023
  • Ethical hackers are using different tools and techniques to encounter malicious cyber-attacks generated by bad hackers. During the software development process, development teams typically bypass or ignore the security parameters of the software. Whereas, with the advent of online web-based software, security is an essential part of the software development process for implementing secure software. Security features cannot be added as additional at the end of the software deployment process, but they need to be paid attention throughout the SDLC. In that view, this paper presents a new, Ethical Hacking - Software Development Life Cycle (EH-SDLC) introducing ethical hacking processes and phases to be followed during the SDLC. Adopting these techniques in SDLC ensures that consumers find the end-product safe, secure and stable. Having a team of penetration testers as part of the SDLC process will help you avoid incurring unnecessary costs that come up after the data breach. This research work aims to discuss different operating systems and tools in order to facilitate the secure execution of the penetration tests during SDLC. Thus, it helps to improve the confidentiality, integrity, and availability of the software products.

제방붕괴조건에 따른 도시하천의 홍수범람 특성 및 홍수지도 작성 - 중랑천 시험유역을 중심으로 - (Characteristics of the Inundation and Process of Making a Flood Map According to the Levee Break Conditions in Urban Stream - Jungrang Experimental Basin -)

  • 이종태;허성철;김정회;한건연
    • 한국수자원학회논문집
    • /
    • 제39권5호
    • /
    • pp.383-394
    • /
    • 2006
  • 도시하천유역에서 집중호우에 따른 제방 범람과 이에 따른 침수 피해규모를 해석하기 위하여 우리나라의 대표적 도시하천인 중랑천의 홍수 및 제방붕괴 특성을 시 공간적으로 다양한 조건에서 연구하였으며 실용적인 GIS 기법의 적용방법에 대하여 비교 분석하였다. 이를 위하여 '98년 실제 홍수상황에 대하여 적용분석하였으며, 100년, 200년, PMP의 빈도별 강우 조건에서 홍수량을 각각 산정하였다. 또한, 제방붕괴 조건별 하천의 부정류 해석 및 제내지의 홍수범람해석을 실시하였다. 제방붕괴의 조건으로서 붕괴시간(10, 30, 60분), 붕괴폭(10, 20, 30m) 및 제방붕괴위치(중상류부, 중류부, 중하류부) 등에 따른 홍수위, 월류량 및 제내지 침수 수위 변화 등을 검토한 결과, 제방붕괴의 위치 및 붕괴폭이 홍수범람규모와 침수피해에 큰 영향을 주는 것으로 분석되었다. 또한 FLDWAV에 의한 산정결과를 이용한 홍수범람지도 작성과정에서 WS와 ArcView 모형의 두 모형을 적용하는 과정을 비교하였다 WMS 모형은 비교적 간략한 절차를 통하여 작성할 수 있었으나 지형자료의 부정확성으로 말미암아 침수면적에 상당한 차이를 나타내었다. ArcView모형은 보다 정밀한 범람도를 형성하여 도시유역 등의 적용에 유용할 것으로 판단되나 WMS 모형을 통한 전처리 과정이 필요하여 처리시간이 보다 긴 단점이 있다. 본 연구에서 제시한 분석절차는 도시하천유역의 EAP(Emergency Action Plan, 비상대처계획)수립을 위한 실용적 수문 수리 및 GIS 분석에 기여할 수 있을 것으로 판단된다.

백두산 화산분화로 인해 천지에서 발생 가능한 화산홍수 (Probable Volcanic Flood of the Cheonji Caldera Lake Triggered by Volcanic Eruption of Mt. Baekdusan)

  • 이길하;김성욱;유순영;김상현
    • 한국지구과학회지
    • /
    • 제34권6호
    • /
    • pp.492-506
    • /
    • 2013
  • 최근 백두산의 재분화 문제가 하나의 중요한 지구과학적 문제로 부상하고 있다. 백두산과 같이 대규모 칼데라 호수를 갖고 있는 화산의 폭발은 단순히 화산분출뿐만 아니라 칼테라 호수에 저장된 물의 유출로 인해 큰 재해를 유발할 수 있어 연구가 필요하다. 대형 화산성 홍수는 모든 종류의 인공 구조물을 파괴할 수 있는 에너지를 가지고 있고, 유속이 100 km $hr^{-1}$에 달하며, 도달거리가 수 백 km까지 이르기 때문에 치명적인 피해를 가져올 수 있다. 연구의 최종목표는 백두산의 지질과 지반 조건에서 분화 시 예상되는 화산성 홍수의 피해를 예측하는 것이다. 하나의 사전 연구로서 백두산 화산이 분출되면서 천지에 저장된 물이 방류될 경우를 가정한 유량곡선 시나리오에 근거하여 수치해석을 실시하였다. 각각의 시나리오 별(림 붕괴, 단순융기, 림 붕괴와 융기의 조합, 강우형성 등)로 시간의 함수로서 유량변화를 이끌어내기 위해 선행 연구를 바탕으로 백두산 천지 유출 모형을 전개하였다. 천지에서 마그마 융기와 림 붕괴가 동시에 발생하면 최고 유량이 25,000 $m^3s^{-1}$에 이르러 백두산 천지의 화산홍수가 주변 지역에 심각한 자연재해를 가져올 수 있는 것으로 보인다. 이 연구에서는 저수지의 물이 방류되는 순간유량곡선에 치중하였으며 천지 유량 방출 후 하류 하천 하도 추적은 다루지 않았다.

우리나라 기업의 CISG 적용사례에 관한 고찰 (A Study on the CISG Cases of Korean Firms)

  • 하강헌
    • 무역상무연구
    • /
    • 제69권
    • /
    • pp.107-126
    • /
    • 2016
  • The parties in International Sale of Goods including Korean Firms Should note ; The buyer must pay the price for the goods and take delivery of them as required by the contract and CISG. The obligations mentioned in Article 53 are primary obligations which are to be fulfilled in the normal performance of the contract. The buyer has to take delivery at the respective place within a reasonable period after this communication since he cannot be required to take delivery immediately. Refusing to take delivery in case of delay not constituting a ground for avoiding the contract makes no sense, since this would lead to even later delivery. The buyer's obligation to pay the price includes taking such steps and complying with such formalities as may be required under the contract or any laws and regulations to enable payment to be made. International sales contracts frequently prescribe that the buyer has to act in advance, that is before the seller starts the process of delivery. Such acts may be either advance payments or the procurement of securities for payment as letters of credit guarantees. On the other hand, The seller deliver the goods hand over any documents relating to them and transfer the property in the goods, as required by the contract and CISG. The seller must deliver goods which are of the quantity, quality and description required by the contract and which are contained or packaged in the manner required by the contract. Except where the parties have agreed otherwise, the goods do not conform with the contract unless they are fit for the purposes for which goods of the same description would ordinarily be used are fit for any particular purpose expressly or impliedly made known to the seller at the time of the conclusion of the contract, except where the circumstances show that the buyer did not rely, or that it was unreasonable for him to rely, on the seller's skill and judgement. The buyer may declare the contract avoided if the failure by the seller to perform any of his obligations under the contract or CISG amounts to a fundamental breach of contract. The seller may declare the contract avoided if the failure by the buyer to perform any of his obligations under the contract or CISG amounts to a fundamental breach of contract.

  • PDF

조선시대 의금부(義禁府) 청사(廳舍)의 변화 과정과 건축 공간 구성 (Transition process and Architectural composition of Prime Jurisdiction office in Joseon Dynasty)

  • 배창현
    • 건축역사연구
    • /
    • 제29권5호
    • /
    • pp.29-40
    • /
    • 2020
  • Ui-Gum-Bu(義禁府) is regarded as a key organization that reflects the power of the royal authority, mainly because it directly obeys the king's command and retains the power to punish or pardon government officials for severe crimes such as treason or significant breach of Confucian ethics. For this reason, Ui-Gum-Bu held a higher place in the organizational hierarchy of the government than other similar offices such as Hyung-Jo(刑曹), Sa-Heon-Bu(司憲府) and P o-Do-Cheong(捕盜廳). This characteristic of Ui-Gum-Bu is also evident in the architectural style and composition of the office building. The figures of the Ui-Gum-Bu office is depicted in detail in the paintings listed in 『Gum-Oh-Gye-Cheop(金吾契帖』, a record of Ui-Gum-Bu office meetings, and descriptions in the code book 『Gum-Oh-Hun-Rog(金吾契帖)』, both written in 18th century. The purpose of this study is to reveal the overall transition process of the Ui-Gum-Bu office building from the beginning until its demolition in the early 20th century. Based on research materials of 18th century, its architectural composition and characteristics will be dealt in detail.

해양사고조사를 위한 인적 오류 분석사례 (A Case Study of Marine Accident Investigation and Analysis with Focus on Human Error)

  • 김홍태;나성;하욱현
    • 대한인간공학회지
    • /
    • 제30권1호
    • /
    • pp.137-150
    • /
    • 2011
  • Nationally and internationally reported statistics on marine accidents show that 80% or more of all marine accidents are caused fully or in part by human error. According to the statistics of marine accident causes from Korean Maritime Safety Tribunal(KMST), operating errors are implicated in 78.7% of all marine accidents that occurred from 2002 to 2006. In the case of the collision accidents, about 95% of all collision accidents are caused by operating errors, and those human error related collision accidents are mostly caused by failure of maintaining proper lookout and breach of the regulations for preventing collision. One way of reducing the probability of occurrence of the human error related marine accidents effectively is by investigating and understanding the role of the human elements in accident causation. In this paper, causal factors/root causes classification systems for marine accident investigation were reviewed and some typical human error analysis methods used in shipping industry were described in detail. This paper also proposed a human error analysis method that contains a cognitive process model, a human error analysis technique(Maritime HFACS) and a marine accident causal chains, and then its application to the actual marine accident was provided as a case study in order to demonstrate the framework of the method.

악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현 (Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes)

  • 윤종문
    • 융합보안논문지
    • /
    • 제15권1호
    • /
    • pp.69-82
    • /
    • 2015
  • 고도화되고 지능화가 예상되는 사이버 침해대응에 대해 효율적으로 대응키 위해서는 악성코드의 공격에 대해 기존 방어적 대응형태에서 공격적 전환개념이 요구되기에 이러한 환경을 근간으로 연구한 결과 기존의 OS, APPLICATION SYSTEM 등의 각 영역별 SINGLE-MODE 체계의 구조대비 Real-time에 의한 공통 전수 취약점 탐지 분석 개념으로 다단계기반의 탐지 및 분석개념(MPSM)을 연구하였다. 동시에 필요시 해당 정보자산과 직접적인 단독접속형태의 취약점 탐지 및 분석을 위해 API 기반의 전용하드웨어 플랫폼형태의 방안이 요구되어 짐과 동시에 이를 위해서는 H/W 및 S/W의 분리된 현재와 같은 2중화된 형태가 아닌 일체형의 H/W 타입의 플랫폼구조 기반 형태로 설계됨과 동시에 병행되어 빅데이타 분석에 의한 정보보안의 포렌직 측면을 고려할 시 항시 모니터링 되고 관리할 수 있는 구조로 연동 설계 등에 대해 제안하였다.