• Title/Summary/Keyword: base defense

Search Result 207, Processing Time 0.031 seconds

Investigation of Effect of Shape of Pintle on Drag and Thrust Variation (핀틀 형상에 따른 추력 및 항력 변화 연구)

  • Park, Jong-Ho;Kang, Min-Ho;Kim, Joung-Keun
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.34 no.3
    • /
    • pp.237-243
    • /
    • 2010
  • In this study, the effect of the shape of a pintle(obstacle) on thrust-modulation performance and drag in a pintle rocket was investigated by a cold flow test and by computational fluid dynamics. Pintle movement caused a monotonic increase in the chamber pressure. Thrust generated by the pressure distribution on the pintle body was linearly changed to the chamber pressure, and this thrust was greater than that generated by the nozzle-wall pressure distribution. Because the shock pattern in the nozzle changes with the shape of the pintle body and pressure ratio, the thrust generated by the nozzle-wall pressure is not directly affected by chamber pressure. The drag due to the pintle(obstacle) can be minimized for a fully linear pintle shape, regardless of chamber pressure.

LIGHT WATER REACTOR (LWR) SAFETY

  • Sehgal Bal Raj
    • Nuclear Engineering and Technology
    • /
    • v.38 no.8
    • /
    • pp.697-732
    • /
    • 2006
  • In this paper, a historical review of the developments in the safety of LWR power plants is presented. The paper reviews the developments prior to the TMI-2 accident, i.e. the concept of the defense in depth, the design basis, the large LOCA technical controversies and the LWR safety research programs. The TMI-2 accident, which became a turning point in the history of the development of nuclear power is described briefly. The Chernobyl accident, which terrified the world and almost completely curtailed the development of nuclear power is also described briefly. The great international effort of research in the LWR design-base and severe accidents, which was, respectively, conducted prior to and following the TMI-2 and Chernobyl accidents is described next. We conclude that with the knowledge gained and the improvements in plant organisation/management and in the training of the staff at the presently-installed nuclear power stations, the LWR plants have achieved very high standards of safety and performance. The Generation 3+LWR power plants, next to be installed, may claim to have reached the goal of assuring the safety of the public to a very large extent. This review is based on the historical developments in LWR safety that occurred primarily in USA, however, they are valid for the rest of the Western World. This review can not do justice to the many fine contributions that have been made over the last fifty years to the cause of LWR safety. We apologize if we have not mentioned them. We also apologize for not providing references to many of the fine investigations, which have contributed towards LWR safety earning the conclusions that we describe just above.

An Interpretation of Archetypal Form of Byungyoung Castle in Ulsan City

  • Hong, Kwang-Pyo;Kim, Hyun-Sook
    • Journal of the Korean Institute of Landscape Architecture International Edition
    • /
    • no.1
    • /
    • pp.89-101
    • /
    • 2001
  • The purpose of this study ins to verify the characteristic location of Byungyoung Castle, physical type, inside spatial organization, and the scheme of Byungyoung Castle. The study utilizes historic literature, ancient maps related to Byungyoung Castle, topographical and cadastral maps which were published under the rule of Japanese Imperialism Castle, topographical and cadastral maps which were published under the rule of Japanese Imperialism and the topographical maps which were made recently by National Geographic Institute with various scales. The methodology of the study is to interpret the contents from the historic literature on the site map. The methodology of the study is to interpret the contents from the historic literature on the site map. The result of the study is as follows; Byungyoung Castle does duty as a defensive base for the entire country and has a specific character of location that has the dual function of a mountain fortress for national defense and of a village fortress for the town. Byungyoung Castle has four gates on four sides and has a oval shape very close to a circular form. The road construction inside the castle is composed basically of a cross shape. Byungyoung is located in the northwest area of this major road system. The private houses that lie along the north-south road are build up at the core area of the lower level and the town market built up around the south gate becomes the heart of life for the people. Schematically, it has the same pattern as regular village fortress, in that the houses for the guests and the houses for the public office are arranged to the east and the west. It is considered that there is certain functional parallel between Byungyoug Castle and Ulsan castle because there are no facilities for sacrificial rites no institutional budding.

  • PDF

A Study of Registration Hijacking Attack Analysis for Wi-Fi AP and FMC (Wi-Fi AP와 FMC에 대한 무선 호 가로채기 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.261-264
    • /
    • 2011
  • Corded telephone to the phone using a wireless phone as the trend to switch, free Wi-Fi-enabled mobile phones, netbooks, and mobile devices, are spreading rapidly. But wireless Internet phone calls using your existing Internet network to deliver Internet services because it has a vulnerability that will occur. Government agencies are using Voice over Internet Protocol(VoIP) calls from the current wired and wireless connection and usage is increasing. In this paper, we have discovered that the vulnerability of wireless internet Wi-Fi AP and the FMC administrative agencies, such as VoIP on your wireless device to study the vulnerability. Wi-Fi AP and the FMC is to analyze the vulnerability. VoIP call interception, attack, attack on the base of the experiment is the analysis. Security-enhanced VoIP call for a Wi-Fi AP and the FMC's defense against man-in-the-middle attacks and is the study of security measures.

  • PDF

Association with Genetic Polymorphism of rs117033348 and Allergic Disease in Korean Population

  • Kong, Yoonji;Kim, Mingyeong;Jin, Hyun-Seok;Park, Sangjung
    • Biomedical Science Letters
    • /
    • v.27 no.3
    • /
    • pp.177-181
    • /
    • 2021
  • Allergy is an immune response that appears in certain people, and reactions such as coughing, shortness of breath, and hives occur. The immune system plays an important role in homeostasis and host defense, and allergies cause hypersensitivity reactions when an imbalance of immunity occurs. Mutations in the TLR genes are associated with autoimmune conditions such as allergies and asthma. It has been reported that a locus in the TLR1-TLR6-TLR10 region may be associated with atopic sensitization or allergy. Therefore, the purpose of this study was to select an allergy patient group and a healthy control group to determine how the genetic mutation of TLR1 affects the onset of disease. This study was conducted in 709 patients and 5,025 control groups out of 10,956 patients with data from KARE and HEXA cohorts. As a result of logistic regression analysis of 6 SNPs selected from the TLR1 gene, only rs117033348 showed a statistically significant correlation (P = 0.002356). The influence of rs117033348 was examined using PolyPhen-2, and a significant result was shown. Therefore, it can be predicted that the G base in rs117033348 will have an influence on the human body. In addition, Geography of Genetic Variants browser was used to confirm the geographical distribution of allele frequencies for the TLR1 gene. Although it was found that there was a large racial difference in the prevalence of TLR1 SNP, it could be confirmed that the polymorphism of rs117033348 conducted in this study was only specific in East Asia when compared with each race.

Object Recognition Using Convolutional Neural Network in military CCTV (합성곱 신경망을 활용한 군사용 CCTV 객체 인식)

  • Ahn, Jin Woo;Kim, Dohyung;Kim, Jaeoh
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.2
    • /
    • pp.11-20
    • /
    • 2022
  • There is a critical need for AI assistance in guard operations of Army base perimeters, which is exacerbated by changes in the national defense and security environment such as force reduction. In addition, the possibility for human error inherent to perimeter guard operations attests to the need for an innovative revamp of current systems. The purpose of this study is to propose a real-time object detection AI tailored to military CCTV surveillance with three unique characteristics. First, training data suitable for situations in which relatively small objects must be recognized is used due to the characteristics of military CCTV. Second, we utilize a data augmentation algorithm suited for military context applied in the data preparation step. Third, a noise reduction algorithm is applied to account for military-specific situations, such as camouflaged targets and unfavorable weather conditions. The proposed system has been field-tested in a real-world setting, and its performance has been verified.

Standard Representation of Simulation Data Based on SEDRIS (SEDRIS기반의 모의자료 표현 표준화)

  • Kim, Hyung-Ki;Kang, Yun-A;Han, Soon-Hung
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.249-259
    • /
    • 2010
  • Synthetic environment data used in defense M&S fields, which came from various organization and source, are consumed and managed by their own native database system in distributed environment. But to manage these diverse data while interoperation in HLA/RTI environment, neutral synthetic environment data model is necessary to transmit the data between native database. By the support of DMSO, SEDRIS was developed to achieve this requirement and this specification guarantees loss-less data representation, interchange and interoperability. In this research, to use SEDRIS as a standard simulation database, base research, visualization for validation, data interchange experiment through test-bed was done. This paper shows each research case, result and future research direction, to propose standardized SEDRIS usage process.

Ieodo Issue and the evolution of People's Liberation Army Navy Strategy (이어도 쟁점과 중국 해군전략의 변화)

  • Kang, Byeong-Cheol
    • Strategy21
    • /
    • s.31
    • /
    • pp.142-163
    • /
    • 2013
  • Ieodo is a submerged rock within a Korea's Exclusive Economic Zone(EEZ) in the East China Sea with its most shallow part about 4.6m below the sea level which has no specific rights for the EEZ delimitation. The United Nations Convention on the Law of the Sea (UNCLOS) stipulates that any coastal state has the rights to claim an EEZ that stretches up to 200 nautical miles from its shore, except where there is an overlap with a neighboring country's claims. Korea claims that Ieodo is within its EEZ as it sits on the Korean side of the equidistant line and the reef is located on the Korea section of the continental shelf. China does not recognize Korea's application of the equidistance principle and insists that Ieodo lies on its continental shelf. According to UNCLOS, Ieodo is located in international waters, rather than one country's EEZ as the two countries have failed to reach a final agreement over the delimitation of the maritime border. This study seeks to understand the evolution of the People's Liberation Army Navy(PLAN) strategy as main obstacles for the EEZ delimitation between Korea and China. PLAN's Strategy evolves from "coastal defense" to "offshore defence", since the late 1980s from a "coastal defence" strategy to an "offshore defence" strategy which would extend the perimeter of defence to between 200 nm and 400 nm from the coast. China's economic power has increased It's dependence on open trade routes for energy supplies and for its own imports and exports. China want secure Sea Lane. PLAN's "offshore defence" strategy combines the concept of active defence with the deployment of its military forces beyond its borders. China's navy try to forward base its units and to achieve an ocean going capability. China's navy expects to have a 'Blue Water' capability by 2050. China insists that coastal states do have a right under UNCLOS to regulate the activities of foreign military forces in their EEZs. China protests several times against US military forces operating within It's EEZ. The U.S. position is that EEZs should be consistent with customary international law of the sea, as reflected in UNCLOS. U.S. has a national interest in the preservation of freedom of navigation as recognized in customary international law of the sea and reflected in UNCLOS. U.S. insists that coastal states under UNCLOS do not have the right to regulate foreign military activities in their EEZs. To be consistent with its demand that the U.S. cease performing military operations in china's EEZ, China would not be able to undertake any military operations in the waters of South Korea's EEZ. As such, to preserve its own security interests, China prefers a status quo policy and used strategic ambiguity on the Ieodo issue. PLAN's strategy of coastal defence has been transformed into offensive defence, Korea's EEZ can be a serious limitation to PLAN's operational plan of activities. Considering China'a view of EEZs, China do not want make EEZ delimitation agreement between Korea and China. China argues that the overlapping areas between EEZs should be handled through negotiations and neither side can take unilateral actions before an agreement is reached. China would prefer Ieodo sea zone as a international waters, rather than one country's EEZ.

  • PDF

Implementation of Rule Management System for Validating Spatial Object Integrity (공간 객체 무결성 검증을 위한 규칙 관리 시스템의 구현)

  • Go, Goeng-Uk;Yu, Sang-Bong;Kim, Gi-Chang;Cha, Sang-Gyun
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.12
    • /
    • pp.1393-1403
    • /
    • 1999
  • 공간 데이타베이스 시스템을 통하여 공유되는 공간 데이타는 무결성이 적절하게 유지되지 않는 한 전체 응용 시스템의 행위를 예측할 수 없게 되므로 데이타의 무결성 확인 및 유지는 필수적이다. 특히 공공 GIS에 저장된 공간 데이타는 토지 이용도 평가, 도시 계획, 자원 관리, 시설물 관리, 안전 관리, 국방 등 국가 전체 및 지역의 중요한 정책 결정을 위한 다양한 응용 시스템들에 의해 이용되므로 적절한 공간 객체의 무결성 확인이 더욱 더 필요하다. 본 논문에서는 능동(active) DBMS의 능동 규칙(active rule) 기법을 이용하여 공간 객체의 무결성 확인을 지원하기 위한 규칙 관리 시스템을 제시한다. 능동 규칙을 이용한 공간 객체의 무결성 확인은 응용 프로그래머를 무결성 확인에 대한 부담으로부터 자유롭게 할 수 있다. 본 시스템은 특정 DBMS에 종속되지 않는 독립적인 외부 시스템으로 존재하며, 능동 규칙 관리기, 규칙 베이스, 그리고 활성규칙 생성기의 3 부분으로 구성된다. 사용자가 공간 데이타베이스 응용 프로그램을 통해 공간 객체를 조작하고자 할 때, 본 시스템은 데이타베이스 트랜잭션을 단위로 조작되는 모든 공간 객체의 무결성 확인을 위해 응용 프로그램에 삽입될 무결성 제약조건 규칙들을 효율적으로 관리하는 역할을 한다.Abstract It is necessary that the integrity of spatial data shared through the spatial database system is validated and appropriately maintained, otherwise the activity of whole application system is unpredictable. Specially, the integrity of spatial data stored in public GIS has to be validated, because those data are used by various applications which make a decision on an important policy of the region and/or whole nation such as evaluation of land use, city planning, resource management, facility management, risk management/safety supervision, national defense. In this paper, we propose rule management system to support validating the integrity of spatial object, using the technique of active rule technique from active DBMS. Validating data integrity using active rules allows database application programmer to be free from a burden on validation of the data integrity. This system is an independent, external system that is not subject to specific DBMS and consists of three parts, which are the active rule manager, the rule base, and the triggered rule generator. When an user tries to manipulate spatial objects through a spatial database application program, this system serves to efficiently manage integrity rules to be inserted into the application program to validate the integrity constraints of all the spatial objects manipulated by database transactions.

A Study on the Responsibility Judgment and Mental Disorder of Criminal Psychology (책임능력판단에 관한 범죄심리학적 이론과 정신장애 항변 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.293-322
    • /
    • 2005
  • The culpability of a person, as determined by due process of law, for any of his actions that are defined as criminal. Determination of such responsibility is a legal function, not a psychiatric one, although a psychiatrist may be called upon to present evidence to the court in order to aid the judge or jury in reaching a decision as to responsibility. Determination of responsibility varies with the laws of the state in which the accused is being tried, but in general all states base their laws on three famous judicial decisions concerning criminal responsibility. 1. the M'Naghten(McNaughton) rule(a. to establish such a defense the accused, at the time the act was committed, must be shown to have been laboring under such defect of reason as not to know the nature and quality of the act he was doing, b. if he did know it, he did or know that what he was doing was wrong). 2. the irresistible impulse test. 3. the Durham decision. Under the Durham test, however, the psychiatrist may give any relevant testmony concerning the mental illness at issue. The psychological and behavioral appearance of a person, in clinical psychiatry this term is commonly used to refer to the results of the mental examination of a patient. The written report of the mental status usually contains specific references to the following areas: I. Attitude and General Behavior (1)General health and appearance. (2)General habits of dress. (3)Personal habits. (4)General mood. (5)Use of leisure time. (6)Degree of sociability. (7)Speech. II. Attitude and Behavior during interview (1)Co-operativeness. (2)Poise. (3)Facial expression. (4)Motor activity. (5)Mental activity. (6)Emotional reactions. (7)Trend of thought. III. Sensorium, mental grasp, and capacity (1)Orientation. (2)Memory and retention. (3)Estimate of intelligence. (4)Abstraction ability. (5)Tests of absurdity, interpretation of proverbs. (6)Judgment.

  • PDF