• Title/Summary/Keyword: Countermeasure System

Search Result 659, Processing Time 0.03 seconds

A Study on the Topology Optimization of Nail Arrangement using Stiffened Shape Density (보강 형상밀도를 이용한 네일 배치의 위상최적화 연구)

  • Cho, Chung-Sik;Song, Young-Su;Lee, Su-Gon;Woo, Jae-Gyung;Choi, Woo-Il
    • The Journal of Engineering Geology
    • /
    • v.28 no.4
    • /
    • pp.605-618
    • /
    • 2018
  • Korea follows the slope design criteria during construction. It was enacted by the Ministry of Land, Transport and Maritime Affairs. There are cases where the Soil-nail is designed as a measure to secure slope stability. The arrangement of the soil-nail may be arranged at equal intervals or may be arranged differently depending on the soil failure model. The optimum design of the countermeasure method is determined by securing stability of the slope through optimization of dimensions and shape. However, when uniform nails are placed at low elevations in slopes, the standard safety factor is exceeded, which may hinder economic design. It is preferable to arrange the reinforcement of the nails over the entire slope. When the horizontal spacing of the nails was topology optimized according to the slope height, it was possible to minimize the amount of reinforcement while satisfying the standard safety factor. Since the active load is reduced in the section where the slope height is lowered, the safety factor after reinforcement may be excessively increased. Therefore, the phase optimization method is proposed as an economical optimal design method using the reinforcing shape density. In addition, a relational expression was designed to optimize the horizontal spacing by slope height.

Analysis of the Change in the Area of Haeundae Beach Based on Wave Characteristics (파랑특성을 고려한 해운대 해수욕장의 해빈면적 변화에 관한 연구)

  • Kim, Jong-Beom;Kim, Jong-Kyu;Kang, Tae-Soon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.2
    • /
    • pp.324-339
    • /
    • 2021
  • In this study, we determined the correlation between the wave characteristics and the change in the area of Haeundae Beach, conducted regression analysis between the wave characteristics and the change in beach area, and derived a formula for calculating the change in beach area. The change in beach area was calculated by applying the derived formula to wave observation data corresponding to a period of approximately 10 months, and the formula was subsequently validated by comparing the obtained results with the observed area. It is found that the error associated with the formula for calculating the change in beach area ranges from 1.5 m to 2.7 m based on the average beach width, and the correlation coefficient corresponding to the observed area ranges from 0.91 to 0.94. Furthermore, it is observed that the change in beach area is af ected by the wave direction in the western zone, wave height in the central zone, and wave height and wave period in the eastern zone. These results can contribute to understanding the impact of a coastal improvement project on the beach area fluctuation characteristics of Haeundae Beach and the ef ectiveness of such a coastal improvement project. By applying the aforementioned derived formula to highly accurate wave prediction data, the change in beach area can be calculated and incorporated for predicting significant long-term changes in beach areas. Furthermore, such a prediction can be considered as the basis for making decisions while establishing preemptive countermeasure policies to prevent coastal erosion.

A Study on the Activation Measures of Library's Online Services to Overcome COVID-19 (코로나 19 극복을 위한 도서관 온라인서비스 활성화 방안에 관한 연구)

  • Noh, Younghee;Kang, Pil Soo;Kim, Yoon-Jeong
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.4
    • /
    • pp.185-210
    • /
    • 2020
  • The library faced an unexpected crisis of COVID-19, and as a countermeasure strategy, non-face-to-face online service has been reinforced. Therefore, this study attempted to present a plan to overcome the challenges arising from rapidly changing external environment and current crisis. To this end, data search, electronic library, library service, cultural event and open space management status of 288 public libraries serviced as an integrated site were investigated. Based on this, the meaning of online services in the post-COVID-19 era and the implication of it were examined. As a result, first, the increase in the use rate of online data search services with the spread of non-face-to-face culture, second, the expansion of the services of the electronic library, third, the diversification of non-face-to-face, online services, fourth, expansion of online cultural event services, fifth, the diversification of open space services were proposed, sixth, Introduced an artificial intelligence system for unattended loan return based on access and the Seventh, expansion of experiential cultural support services and educational contents through VR, AR and MR. It is deemed necessary for the research on the future direction of the library's non-face-to-face services to be conducted by investigating the current status of online services in various types of libraries and the types and case studies of library services in the era of COVID-19.

A Study on North Korea's UAV Threat and Response Stance (북한의 무인기 위협과 대응 자세)

  • Hyeonsik Kim;Chanyoung Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.227-233
    • /
    • 2023
  • Along with the 4th Industrial Revolution, the impact of "unmanned" is affecting all fields around the world, and in particular, in the military sector, "unmanned" is so important that it occupies a part of the main combat system. Recently, the South Korean military is facing a crisis due to the North Korea's UAV incident that invaded our airspace and descended to Seoul. In response, the South Korea military declared its willingness and countermeasures to capture and destroy North Korea's UAV. However, as the technological development of UAV continues and the utilization plan is expanding, the countermeasures for UAV at the current level can be useless. Also, the threat from North Korea is not just UAV. North Korea has practically a nuclear power and is set to conduct its seventh nuclear test, and its missile technology is also being advanced, with 38 arounds of 67 missile tests conducted in 2022 alone. It is also developing five key strategic weapons that can pose a fatal threat to Korea, and North Korea's strong conventional forces are located around the NLL(Northern Limit Line), and the port of Long Range Artillery is facing the Seoul metropolitan area. It is important to respond to North Korea's UAV threats, which are now receiving much attention, but it will be necessary to comprehensively analyze and clearly prioritize North Korea's threats and use a limited budget to respond to them.

Evolution and Changes of Coastal Topography due to Jetty Construction at Namdae River Mouth (도류제 건설 후 남대천 하구의 해안선 생성 및 변화)

  • Kim, In Ho;Lee, Seong Dae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.3B
    • /
    • pp.315-321
    • /
    • 2008
  • Recently, in the light of environments and utilization, countermeasures to preserve beaches in coastal area are required without depending on such as jetties and breakwaters. The necessity of integrated sand management including not only coastal sediment but also sediment discharge from hinterland rivers is increased so as to establish long-term counterplan for sediment transport. In this regard, the following subjects are examined in this study; efficient ways for discharged sand to be transported from a river to the neighboring coast, the river terrace occurrence and its growth at the river delta, measures to improve storage efficiency of the discharged sand and measures to prevent the sand resources from being discharged into the deep sea during flooding. In recent, A jetty of 260 m length was constructed at Namdae River mouth in the year of 2005 as a countermeasure against the occurrence of sand-bar at river mouth and its close. In this study, a series of numerical experiments were carried out to investigate the characteristics of sediment transport and morphological change due to the construction of jetty at the entrance of Namdae River mouth. Firstly, The sand discharge from Namdae River is quantified by one-dimensional numerical analysis assuming the mixed sand of three different particle diameters. Then, in order to understand the transport behavior of the sand discharge from river and river mouth phenomena the numerical experiments were then conducted to examine the flow behaviors of river efflux and wind generated circulations in coastal area. And, after establishing the numerical model system, which predicts the sea bed changes obtained from the flux model combining with the wave propagation, wave-induced currents and sediment transport models, the sediment transport in the vicinity of Namdae River mouth is analyzed.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Development of Three-Dimensional Trajectory Model for Detecting Source Region of the Radioactive Materials Released into the Atmosphere (대기 누출 방사성물질 선원 위치 추적을 위한 3차원 궤적모델 개발)

  • Suh, Kyung-Suk;Park, Kihyun;Min, Byung-Il;Kim, Sora;Yang, Byung-Mo
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.1
    • /
    • pp.31-39
    • /
    • 2016
  • Background: It is necessary to consider the overall countermeasure for analysis of nuclear activities according to the increase of the nuclear facilities like nuclear power and reprocessing plants in the neighboring countries including China, Taiwan, North Korea, Japan and South Korea. South Korea and comprehensive nuclear-test-ban treaty organization (CTBTO) are now operating the monitoring instruments to detect radionuclides released into the air. It is important to estimate the origin of radionuclides measured using the detection technology as well as the monitoring analysis in aspects of investigation and security of the nuclear activities in neighboring countries. Materials and methods: A three-dimensional forward/backward trajectory model has been developed to estimate the origin of radionuclides for a covert nuclear activity. The developed trajectory model was composed of forward and backward modules to track the particle positions using finite difference method. Results and discussion: A three-dimensional trajectory model was validated using the measured data at Chernobyl accident. The calculated results showed a good agreement by using the high concentration measurements and the locations where was near a release point. The three-dimensional trajectory model had some uncertainty according to the release time, release height and time interval of the trajectory at each release points. An atmospheric dispersion model called long-range accident dose assessment system (LADAS), based on the fields of regards (FOR) technique, was applied to reduce the uncertainties of the trajectory model and to improve the detective technology for estimating the radioisotopes emission area. Conclusion: The detective technology developed in this study can evaluate in release area and origin for covert nuclear activities based on measured radioisotopes at monitoring stations, and it might play critical tool to improve the ability of the nuclear safety field.

A study on the effect of air velocity through a damper on smoke extraction performance in case of fire in road tunnels (도로터널 화재 시 집중배기방식의 배기포트 통과풍속이 배연성능에 미치는 영향에 관한 연구)

  • Ryu, Ji-Oh;Na, Kwang-Hoon
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.22 no.4
    • /
    • pp.347-365
    • /
    • 2020
  • In order to resolve traffic problems in urban areas and to increase the area of green spaces, tunnels in downtown areas are being increased. Additionally, the application of large port smoke extraction ventilation systems is increasing as a countermeasure to smoke extraction ventilation for tunnels with high potential for traffic congestion. It is known that the smoke extraction performance of the large port smoke extraction system is influenced not only by the amount of the extraction flow rate, but also by various factors such as the shape of the extraction port (damper) and the extraction air velocity through a damper. Therefore, in this study, the design standards and installation status of each country were investigated. When the extraction air flow rate was the same, the smoke extraction performance according to the size of the damper was numerically simulated in terms of smoke propagation distance, compared and evaluated, and the following results were obtained. As the cross-sectional area of the smoke damper increases, the extraction flow rate is concentrated in the damper close to the extraction fan, and the smoke extraction rate of the damper in downstream decreases, thereby increasing the smoke propagation distance on the downstream side. In order to prevent such a phenomenon, it is necessary to reduce the cross-sectional area of the smoke damper and increase the velocity of passing air through the damper so that the pressure loss passing through the damper increases, thereby reducing the non-uniformity of smoke extraction flow rate in the extraction section. In this analysis, it was found that when the interval distance of the extraction damper was 50 m, the air velocity passing through damper was 4.4 m/s or more, and when the interval distance of the extraction dampers was 100 m, the air velocity passing through damper was greater than 4.84 m/s, it was found to be advantageous to ensure smoke extraction performance.

Qualitative Study on Experiences of Responding to COVID-19 of Therapists in Long-term Care Hospitals (요양병원 치료사의 코로나19 대응 경험에 대한 질적 연구)

  • Bae, Won-Jin;Park, Ju-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.337-347
    • /
    • 2021
  • This study is a qualitative study conducted to provide basic data for therapists working in long-term care hospitals to improve their countermeasure strategies for new infectious diseases and improvement of the treatment room infection management system, and to help therapists understand their infection management work. Colaizzi's phenomenological research method was applied as the research method. Telephone interviews were conducted with nine occupational therapists and physical therapists working in nursing hospitals. The contents of the interview were recorded with the consent of the study subjects, and additional confirmation was received by email. The recorded content was analyzed after transcription, and the meaning and nature of the experience coping with COVID-19 were described. The content was organized into 6 themes, 17 main meaning and 49 meaning units. In accordance with the COVID-19 situation, the infection control system has been strengthened by reinforcing infection control education in nursing hospitals, practicing infection control, and supervising infection control outside business hours. It was found that the treatment environment was changed due to the restriction of treatment activities by practicing distancing in the treatment room, adjusting rest and meal times during working hours, and strengthening infection control. In addition, the therapist's role has been expanded and the paradigm of treatment has changed, such as considering the untact intervention, and they have experienced cohort quarantine, pre-tested for COVID-19, vaccinations, and side effects from COVID-19. However, due to the infection work, the therapist's work burden is increased, and the person is experiencing fear, depression, and work stress from the spread of COVID-19. They were also aware of the need for nursing hospital care personnel support, such as guaranteeing rest after vaccination and providing infection control tools and equipment. The results of this study are expected to be used as basic data for human and physical support for the development of infectious disease response strategy programs in nursing hospital treatment rooms and for infection control in nursing hospitals.