• Title/Summary/Keyword: countermeasure method

Search Result 501, Processing Time 0.027 seconds

Development of Countermeasure Expert System for Tunneling Failure (터널 붕락특성과 시공 중 보강공법 선정방법 개발)

  • 김창용;박치현;배규진;홍성완;오명렬
    • Proceedings of the Korean Society for Rock Mechanics Conference
    • /
    • 2000.09a
    • /
    • pp.171-181
    • /
    • 2000
  • Many Studies of tunnel and tunnelling safety have been developed continuously based on the increasing social interests in underground space since 1990's in Korea. Because the growth of population in metropolitan has been accelerated at a faster pace than the development of the cities, underground facilities have been created as a great extent in view of less land space available. In this study, a lot of types of tunnel failure were surveyed and the detail causes were studied after many cases of tunnel failure were collected. There were suggested brief countermeasure of tunnel failure through case study. An expert system was developed to predict the safety of tunnel and choose proper tunnel reinforcement system using fuzzy quantification theory and fuzzy inference rule based on tunnel information database. The comparison result between the predicted reinforcement system level and measured ones was very similar. In-situ data were obtained in three tunnel sites including subway tunnel under Han river. This system will be very helpful to make the most of in-situ data and suggest proper applicability of tunnel reinforcement system developing more resonable tunnel support method from dependance of some experienced experts for the absent of guide.

  • PDF

Development of Countermeasure Expert System for Tunneling Failure (터널 붕락특성과 시공 중 보강공법 선정방법 개발)

  • 김창용;박치현;배규진;홍성완;오명렬
    • Tunnel and Underground Space
    • /
    • v.10 no.3
    • /
    • pp.418-429
    • /
    • 2000
  • Many Studies of tunnel and tunnelling safety have been developed continuously based on the increasing social interests in underground space since 1990's in Korea. Because the growth of population in metropolitan has been accelerated at a faster pace than the development of the cities, underground facilities have been created as a great extent in view of less land space available. In this study, a lot of types of tunnel failure were surveyed and the detail causes were studied after many cases of tunnel failure were collected. There were suggested brief countermeasure of tunnel failure through case study. An expert system was developed to predict the safety of tunnel and choose proper tunnel reinforcement system using fuzzy quantification theory and fuzzy inference rule based on tunnel information database. The comparison result between the predicted reinforcement system level and measured ones was very similar. In-situ data were obtained in three tunnel sites including subway tunnel under Han river. This system will be very helpful to make the most of in-situ data and suggest proper applicability of tunnel reinforcement system developing more resonable tunnel support method from dependance of some experienced experts for the absent of guide.

  • PDF

A Study on the Re-establishment of Selection Criterion on the Frequency of Foggy Area in Highway (고속도로 안개 잦은 구간 선정 기준 재정립에 관한 연구)

  • Jung, Sung-Hwa;Lee, Soo-Beom;Park, Jun-Tae;Lee, Soo-Il;Hong, Ji-Yeon
    • Journal of the Korean Society of Safety
    • /
    • v.26 no.2
    • /
    • pp.99-106
    • /
    • 2011
  • There is a high potentiality of large traffic accident due to the dense fog when road is developed along the coast or river. The establishment of national level control system against the fog is necessary because the accident due to the creation of fog has a high fatality ratio than other weather conditions. The selection method for the frequent foggy area on highway was suggested to control the fog on the highway effectively because the establishment of the countermeasure against the fog in every range in highway is difficult practically. 44 ranges where the fog control is necessary throughout the year and the 45 ranges where the control is necessary in specific months were selected from the result of application of the weighted value on each visible distance data except the fog with beyond 250 m visible distance which does not affect on the safe driving out of the surveyedjsh fog visible distances. The preferential fog control countermeasure shall be provided to prevent the traffic accident and to reduce the severeness of the accident in case of fog creation for 89 ranges which were selected for frequent foggy area in highway.

A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform (안드로이드 플랫폼 기반에서 스미싱 탐지 및 차단을 위한 기술적 대응체계 연구)

  • Seo, Gil-Won;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.569-575
    • /
    • 2014
  • Since 2009 the number of users of smart phones and tablet PC is growing exponentially. In particular Apple's iOS and Google's Android OS are the heart of this remarkable growth, most of smart phone and tablet PC are designed to operate based on these two OS. Such increasing use of smart devices has led to changes in the social environment that allows, without the constraints of time and place. However, such development does not supply only ease to do something, even compared to past, financial fraud and information leakage are easier than before by variety of new types of attack for example phishing, pharming, smishing and qshing. So according to this paper, analyzes for smishing attack, propose a countermeasure system of the technical way and proved its higher performance compare to the existing method.

The Awareness and Countermeasures against Harmful Effect of Passive Smoking in Korean Adult (일부 성인의 간접흡연에 대한 인식도 및 대책)

  • Sim, Hong-Seok;Hong, Hyun-Sook;Meng, Kwang-Ho;Lee, Kang-Sook
    • Journal of Preventive Medicine and Public Health
    • /
    • v.33 no.1
    • /
    • pp.91-98
    • /
    • 2000
  • Objectives : This study is to evaluate the awareness, attitude, practice and the countermeasures against passive smoking in Korean adults. Methods : By self-administered questionnaires, we assessed the knowledge, attitude, behavior for passive smoking and the countermeasure for reduction of it's harmful effects in 289 men and 238 women. Results : The subjects that have heard about passive smoking were 96.8% in total and well known were 26.4% of current smoker, 56.6% of ex-smoker, and 14.8% of non-smoker(p=0.001). The irritative symptom from passive smoking was the most frequent in non-smokers and the most common place where exposed to passive smoking was public place. For attitude against passive smoking in 'no smoking allowed area', ex-smokers were the most active to recommend to stop smoking. And for opinion about establishment of 'no smoking allowed area', the restriction by law was the best acceptable method in smokers, exsmokers, and nonsmokers. In marking of 'no smoking allowed area', 69.9% of smokers answered no smoking, but in non-marking area only 6.3% stop smoking. When smokers were recommended to stop smoking, the more subjects stop smoking with good feeling in marking area, but the less in non-marking area. The factor associated the high awareness of passive smoking were aged(OR=1.07, 1.03-1.12), men(OR=4.34, 2.32-8.46). The persons who have known well about passive smoking had good attitude and behavior to prevent of harmful effect of passive smoking. Conclusions : This study suggested that education program would be necessary to reduce the passive smoking.

  • PDF

An Off-line Dictionary Attack on Command Authorization in TPM and its Countermeasure (TPM에서 명령어 인가에 대한 오프라인 사전 공격과 대응책)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1876-1883
    • /
    • 2011
  • The TPM is a hardware chip for making a trusted environment on computing system. We previously need a command authorization process to use principal TPM commands. The command authorization is used to verify an user who knows a usage secret to TPM chip. Since the user uses a simple password to compute usage secret, an attacker can retrieve the password by evasdropping messages between user and TPM chip and applying off-line dictionary attack. In this paper, we simulate the off-line dictionary attack in real PC environment adopted a TPM chip and propose a novel countermeasure to defeat this attack. Our proposed method is very efficient due to its simplicity and adaptability without any modification of TPM command structures.

A Study on Countermeasure against Trauma and PTSD of Police Officers -Focused on In-depth Interview with Targets- (경찰공무원의 심리적 외상(Trauma)과 외상후 스트레스 장애(PTSD) 대응 방안에 관한 연구 -대상자 심층면접을 중심으로-)

  • Kang, Gil-Ju;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.31-54
    • /
    • 2018
  • The objective of this study is to provide psychological welfare promotion method of police officers who experience trauma and PTSD due to police activity in local community while handling various accidents and protecting civil life and safety at the forefront of the national disaster accident site. For this objective, following countermeasure was presented through trauma/PTSD-related literature and in-depth interview with police officers who experienced trauma and PTSD. First, psychological examination is required to be performed positively and realistically for the police officers. As police officers have high emotional labor stress not only by physical burden but also by civil service, a regular psychological examination shall be established systematically together with physical rest. Second, proper action for the regular psychological examination result of the police officers is required. Third, a psychological support system for the police officers is required to be established and for this objective, expansion of police-operated mindful accompanying center and its devoted operation are required to be performed. Fourth, an opportunity of getting rid of stress of police officers shall be provided and for this objective, required budget for activating club activity is required to be allocated and activity condition should be created.

An Experimental Study on Characteristics of Beach Erosion Considering Armoring Effect of Gabions (개비온의 피복효과를 고려한 해빈침식특성에 관한 실험적 연구)

  • Lee, Seong Dae;Lee, Sang Young;Choi, Hyuk Jin;Shin, Young Seop
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.31 no.5
    • /
    • pp.305-313
    • /
    • 2019
  • Number of coastal protection structures have been increased rapidly due to rising sea levels and deteriorated sea conditions. Coastal structures should be designed to meet coastal engineering requirements and ecosystem conditions, while they are not lost or removed. In this study, trapezoidal gabion block was developed for the purpose, and two-dimensional laboratory experiments were conducted to validate applicability of the block. The experiments were carried out with eight types of erosive and accretive wave conditions. As a result, it was confirmed that the gabion blocks have a feature of preventing erosion of beach. The newly designed gabion blocks could be an alternative as a countermeasure method for beach erosion.

A Countermeasure Technique for Attack of Reflection SSDP in Home IoT (홈 IoT에서 SSDP 반사체 공격에 대한 대응기법)

  • Park, Kwang-ok;Lee, Jong-Kun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the DDoS attack using the amplifier method makes it difficult to distinguish the normal traffic from the normal server and it is difficult to detect even the attack detection. Since the SSDP protocol is a common protocol widely used in IoT devices, it is used as a DDoS amplification attack. In this paper, we analyze the reflector attack of SSDP which is one of the DDoS and suggest a technical proposal to detect and defend against the attack by managing the Mac address of each device. Also, we propose a control structure to protect the reflection attack of SSDP in Home IoT. The efficiency of the proposed system has been verified by performing an experimental attack on the virtual environment.

New Simple Power Analysis on scalar multiplication based on sABS recoding (sABS 형태의 스칼라 곱셈 연산에 대한 새로운 단순전력 공격)

  • Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.115-123
    • /
    • 2007
  • In cryptographic devices like a smart-card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. Scalar multiplication is very important operation in Elliptic Curve Cryptosystems, and so must be constructed in safety against side channel attack(SCA). But several countermeasures proposed against SCA are exposed weaknesses by new un-dreamed analysis. 'Double-and-add always scalar multiplication' algorithm adding dummy operation being known to secure against SPA is exposed weakness by Doubling Attack. But Doubling Attack cannot apply to sABS receding proposed by Hedabou, that is another countermeasure against SPA. Our paper proposes new strengthened Doubling Attacks that can break sABS receding SPA-countermeasure and a detailed method of our attacks through experimental result.