• Title/Summary/Keyword: countermeasure method

Search Result 501, Processing Time 0.023 seconds

Study on Wave Reduction and Beach sand Capture Performance of Artificial Coral Reefs for In-situ Application (해안침식 현장 적용을 위한 인공산호초 연성공법의 파고 감쇠 및 침식해빈사 포집성능 분석)

  • Hong, Sung-Hoon;Kim, Tae-Yoon;Choi, Yun-Shik;Kim, Jeong-Ho;Kwon, Yong-Ju;Lee, Si-Hyeon;Lee, Gwang-Soo;Kwon, Soon-Chul
    • Journal of Ocean Engineering and Technology
    • /
    • v.32 no.6
    • /
    • pp.485-491
    • /
    • 2018
  • Because of the increase in coastal erosion problems, many studies have been conducted to prevent coastline retreat by developing low-cost, highly effective countermeasures. We developed the artificial coral reefs (ACRs) method as part of this research trend. To verify its coastal protection performance, we carried out performance tests on its wave attenuation and beach sand capture ability, which are the key barometers for this newly developed technology. In this study, three different types of methods, including natural beach, TTP, and ACRs, were used to determine the coastal protection efficiency under both ordinary and storm wave conditions. Based on the results of this study, ACRs were found to have the best wave attenuation performance and captured more than 20% of the total erosion area. This means the ACR method can be applied as a reliable countermeasure to protect a coastal zone.

Evaluation of Applicability of APEX-Paddy Model based on Seasonal Forecast (계절예측 정보 기반 APEX-Paddy 모형 적용성 평가)

  • Cho, Jaepil;Choi, Soon-Kun;Hwang, Syewoon;Park, Jihoon
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.4
    • /
    • pp.99-119
    • /
    • 2018
  • Unit load factor, which is used for the quantification of non-point pollution in watersheds, has the limitation that it does not reflect spatial characteristics of soil, topography and temporal change due to the interannual or seasonal variability of precipitation. Therefore, we developed the method to estimate a watershed-scale non-point pollutant load using seasonal forecast data that forecast changes of precipitation up to 6 months from present time for watershed-scale water quality management. To establish a preemptive countermeasure against non-point pollution sources, it is possible to consider the unstructured management plan which is possible over several months timescale. Notably, it is possible to apply various management methods such as control of sowing and irrigation timing, control of irrigation through water management, and control of fertilizer through fertilization management. In this study, APEX-Paddy model, which can consider the farming method in field scale, was applied to evaluate the applicability of seasonal forecast data. It was confirmed that the rainfall amount during the growing season is an essential factor in the non-point pollution pollutant load. The APEX-Paddy model for quantifying non-point pollution according to various farming methods in paddy fields simulated similarly the annual variation tendency of TN and TP pollutant loads in rice paddies but showed a tendency to underestimate load quantitatively.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

Risk Assessment of a Drone Under the Gust and its Precise Flight Simulation (드론의 외풍 환경 비행 안전성 평가 및 정밀 시뮬레이션)

  • Lee, DongYeol;Park, SunHoo;Shin, SangJoon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.3
    • /
    • pp.173-180
    • /
    • 2022
  • The operation and transportation environment for an unmanned aerial vehicle will be completely different from those for the conventional air and ground transportation. The requirement for a traffic management system for its safe operation has been emerging. Accordingly, investigation is being conducted to analyze the danger that unmanned aerial vehicle may encounter during the flight and to provide the countermeasure by the simulation. When the drones operate in an urban environment, they may be affected by the wind around the building. Thus it is essential to predict the influence of the gust and analyze the resulting risk. In this paper, a method for evaluating the safety for a flight mission under the gust is suggested. By using the precise 6-degree-of-freedom flight simulation that is capable of simulating the gust condition, possible deviation from the pre-planned flight path in terms of the attitude orientation will be predicted. A method of quantifying the probability of the flight mission failure will also be presented.

A Case Report of Imports Morphological Variation of Pinelliae Tuber Based on the Genetic Analysis (유전자 분석 기반 수입산 형태 변이 반하 유통 사례 보고)

  • Kim, Wook Jin;Choi, Goya;Noh, Sumin;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.37 no.5
    • /
    • pp.9-16
    • /
    • 2022
  • Objectives : The purpose of this study is to report that applying the genetic discrimination method to Pinelliae Tuber is suitable as a countermeasure for the limitations of morphological identification announced publicly in the Ministry of Food and Drug Safety(MFDS). Methods : Randomly selected fifty samples in Pinelliae Tuber imported from China were used for morphological and genetic identification. The morphological identification was applied method announced publicly by the MFDS. The traits of morphological identification were classified as Pinellia ternata, P. tripartita, Pinellia pedatisecta, and Typhonium flagelliforme, according to the formation of tuberous root and tuber morphology. The genetic identifications were conducted by Sequence Characterized Amplified Region(SCAR) marker and DNA barcoding analysis for cross-validation, respectively. SCAR marker was verified according to the presence or absence of amplicon through PCR amplification using species-specific primers. DNA barcoding analysis used sequence information of the matK region. Results : As a result of the morphological identification, 27 out of 50 samples were identified as original species 'P. ternata' of genuine 'Pinelliae Tuber', and 23 were identified as adulterant species 'P. pedatisecta'. Unlike this, the genetic identification was identified as the original species 'P. ternata' in all 50 samples in the SCAR marker and matK regional sequence analysis. Conclusions : Pinelliae Tuber of morphological mutant that can not be classified by morphological identification is imported from China. The SCAR marker would be used as accurate and efficient assays for species identification of the morphological mutant.

Weight Recovery Attacks for DNN-Based MNIST Classifier Using Side Channel Analysis and Implementation of Countermeasures (부채널 분석을 이용한 DNN 기반 MNIST 분류기 가중치 복구 공격 및 대응책 구현)

  • Youngju Lee;Seungyeol Lee;Jeacheol Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.919-928
    • /
    • 2023
  • Deep learning technology is used in various fields such as self-driving cars, image creation, and virtual voice implementation, and deep learning accelerators have been developed for high-speed operation in hardware devices. However, several side channel attacks that recover secret information inside the accelerator using side-channel information generated when the deep learning accelerator operates have been recently researched. In this paper, we implemented a DNN(Deep Neural Network)-based MNIST digit classifier on a microprocessor and attempted a correlation power analysis attack to confirm that the weights of deep learning accelerator could be sufficiently recovered. In addition, to counter these power analysis attacks, we proposed a Node-CUT shuffling method that applies the principle of misalignment at the time of power measurement. It was confirmed through experiments that the proposed countermeasure can effectively defend against side-channel attacks, and that the additional calculation amount is reduced by more than 1/3 compared to using the Fisher-Yates shuffling method.

Economic Evaluation Algorithm of Energy Storage System using the Secondary Battery (이차전지를 이용한 전기저장장치(BESS)의 경제성 평가 알고리즘)

  • Song, Seok-Hwan;Kim, Byung-Ki;Oh, Seung-Teak;Lee, Kye-Ho;Rho, Daeseok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3813-3820
    • /
    • 2014
  • Recently, with the increase in electrical consumption and the unbalanced power demand and supply, the power reserve rate is becoming smaller and the reliability of the power supply is deteriorating. Under this circumstance, a Battery Energy Storage System (BESS) is considered to be an essential countermeasure for demand side management. On the other hand, an economic evaluation is a critical issue for the introduction of a power system because the cost of BESS is quite high. Therefore, this paper presents economic evaluation method for utility use by considering the best mix method and successive approximation method, and an economic evaluation method for customer use by considering the peak shaving function based on the real time price. From a case study on a model power system and educational customer, it was confirmed that the proposed method is a practical tool for the economic analysis of BESS.

The DEVS-based Detailed Implementation Method of the Command and Fire Control System for the Underwater Vehicle DEVS-HLA Simulation in the Engagement Level (교전급 수중운동체 DEVS-HLA 시뮬레이션을 위한 전술통제체계의 DEVS 기반 상세 구현 방법)

  • Son, Myeong-Jo;Cha, Ju-Hwan;Kim, Tae-Wan;Lee, Kyu-Yeul;Nah, Young-In
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.4
    • /
    • pp.628-645
    • /
    • 2010
  • To perform the engagement level simulation between the underwater vehicle model and the surface model those are constituted with various systems/ sub-systems, we implemented four different federates as a federation according to the IEEE 1516 HLA (High Level Architecture) protocol that is the international standard in the distributed simulation. Those are CFCS (Command and Fire Control System) federate, motion federate, external entities (torpedos, countermeasure and surfaceship) federate, and visualization federate that interacts with OSG (Open Scene Graph)-based visualization rendering module. In this paper, we present the detailed method about the model constitution for discrete event simulation in the distributed environment. For the sake of this purpose, we introduce the DEVS (Discrete Event System Specification)-HLA-based modeling method of the CFCS federate that reflects not only the interations between models, but also commands from user and tactics manager that is separated from the model. The CFCS federate makes decisions in various missions such as the normal diving, the barrier misision, the target motion analysis, the torpedo launch, and the torpedo evasion. In the perspective of DEVS modeling, the CFCS federate is the coupled model that has the tactical data process model, command model and fire control model as an atomic model. The message passing and time synchronization with other three federates are settled by the $m\ddot{a}k$ RTI (Runtime Infrastructure) that supports IEEE 1516. In this paper, we provides the detailed modeling method of the complicated model that has hierarchical relationship such as the CFCS system in the submarine and that satisfies both of DEVS modeling method for the discrete event simulation and HLA modeling method for the distributed simulation.

A Study on Monitoring of Mitigation of Rail Corrosion using Sacrificial Anode Cathodic Protection Method (희생양극법을 적용한 철도 레일의 방식효과 모니터링 연구)

  • Choi, Jung-Youl;Park, Jong-Yoon;Lee, Kyu-Yong;Chung, Jee-Seung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.367-371
    • /
    • 2019
  • In this study, we proposed the sacrificial anode cathodic protection method as a countermeasure to reduce the corrosion of railway rails under oceanic climatic conditions and proved the anticorrosive effect experimentally. In addition, the proposed sacrificial anode cathodic protection method were tested on site to examine long-term rail corrosion monitoring and field applicability for more than 26 months and to prove the effectiveness of rail corrosion. As a result of monitoring the corrosion state using the cellophane tape method, the appearance of the applied sections with sacrificial anode cathodic protection method was good at the present time about 26 months after the field test laying, and no abnormalities and other abnormalities of the rail welded section and the rail web were found. Hence, in places where no sacrificial anodes were installed, rust progressed rapidly. In addition, the proper spacing of sacrificial anodes was found to form the most stable corrosion coating at 1.0 ~ 1.5m. After about 26 months of monitoring, the installation of sacrificial anodes could help stabilize the overall rail corrosion level, even if the spacing was somewhat wider.

A new Clustering Algorithm for the Scanned Infrared Image of the Rosette Seeker (로젯 탐색기의 적외선 주사 영상을 위한 새로운 클러스터링 알고리즘)

  • Jahng, Surng-Gabb;Hong, Hyun-Ki;Doo, Kyung-Su;Oh, Jeong-Su;Choi, Jong-Soo;Seo, Dong-Sun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.2
    • /
    • pp.1-14
    • /
    • 2000
  • The rosette-scan seeker, mounted on the infrared guided missile, is a device that tracks the target It can acquire the 2D image of the target by scanning a space about target in rosette pattern with a single detector Since the detected image is changed according to the position of the object in the field of view and the number of the object is not fixed, the unsupervised methods are employed in clustering it The conventional ISODATA method clusters the objects by using the distance between the seed points and pixels So, the clustering result varies in accordance with the shape of the object or the values of the merging and splitting parameters In this paper, we propose an Array Linkage Clustering Algorithm (ALCA) as a new clustering algorithm improving the conventional method The ALCA has no need for the initial seed points and the merging and splitting parameters since it clusters the object using the connectivity of the array number of the memory stored the pixel Therefore, the ALCA can cluster the object regardless of its shape With the clustering results using the conventional method and the proposed one, we confirm that our method is better than the conventional one in terms of the clustering performance We simulate the rosette scanning infrared seeker (RSIS) using the proposed ALCA as an infrared counter countermeasure The simulation results show that the RSIS using our method is better than the conventional one in terms of the tracking performance.

  • PDF