• Title/Summary/Keyword: direct attack

Search Result 136, Processing Time 0.026 seconds

CORIUM COOLABILITY UNDER EX-VESSEL ACCIDENT CONDITIONS FOR LWRs

  • Farmer, Mitchell T.;Kilsdonk, Dennis J.;Aeschlimann, Robert W.
    • Nuclear Engineering and Technology
    • /
    • v.41 no.5
    • /
    • pp.575-602
    • /
    • 2009
  • In the wake of the Three Mile Island accident, vigorous research efforts were initiated to acquire a basic knowledge of the progression and consequences of accidents that involve a substantial degree of core degradation and melting. The primary emphasis of this research was placed on containment integrity, with: i) hydrogen combustion-detonation, ii) steam explosion, iii) direct containment heating (DCH), and iv) melt attack on the BWR Mark-I containment shell identified as energetic processes that could lead to early containment failure (i.e., within the first 24 hours of the accident). Should the core melt fail the reactor vessel, then non-condensable gas production from Molten Core-Concrete Interaction (MCCI) was identified as a mechanism that could fail the containment by pressurization over the long term. One signification question that arose as part of this investigation was the effectiveness of water in terminating an MCCI by flooding the interacting masses from above, thereby quenching the molten core debris and rendering it permanently coolable. Successful quenching of the core melt would prevent basemat melt through, as well as continued containment pressurization by non-condensable gas production, and so the accident progression would be successfully terminated without release of radioactivity to the environment. Based on these potential merits, ex-vessel corium coolability has been the focus of extensive research over the last 20 years as a potential accident management strategy for current plants. In addition, outcomes from this research have impacted the accident management strategies for the Gen III+LWR plant designs that are currently being deployed around the world. This paper provides: i) an historical overview of corium coolability research, ii) summarizes the current status of research in this area, and iii) highlights trends in severe accident management strategies that have evolved based on the findings from this work.

A Study on the Trade-Economic Effects and Utilization of AEO Mutual Recognition Agreements

  • LEE, Chul-Hun;HUH, Moo-Yul
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.25-31
    • /
    • 2020
  • Purpose: The AEO (Authorized Economic Operator) program, created in 2001 in the United States due to 9.11 terrorist's attack, fundamentally changed the trade environment. Korea, which introduced AEO program in 2009, has become one of the world's top countries in the program by ranking 6th in the number of AEO certified companies and the world's No. 1 in MRA (Mutual Recognition Agreement) conclusions. In this paper, we examined what trade-economic and non-economic effects the AEO program and its MRA have in Korea. Research design, data and methodology: In this study we developed a model to verify the impact between utilization of AEO and trade-economic effects of the AEO and its MRA. After analyzing the validity and reliability of the model through Structural Equation Model we conducted a survey to request AEO companies to respond their experience on the effects of AEO program and MRA. As a result, 196 responses were received from 176 AEO companies and utilized in the analysis. Results: With regard to economic effects, the AEO program and the MRA have not been directly linked to financial performance, such as increased sales, increased export and import volumes, reduced management costs, and increased operating profit margins. However, it was analyzed that the positive effects of supply chain management were evident, such as strengthening self-security, monitoring and evaluating risks regularly, strengthening cooperation with trading companies, enhancing cargo tracking capabilities, and reducing the time required for export and import. Conclusions: When it comes to the trade-economic effects of AEO program and its MRA, AEO companies did not satisfy with direct effects, such as increased sales and volume of imports and exports, reduced logistics costs. However, non-economic effects, such as reduced time in customs clearance, freight tracking capability, enhanced security in supply chain are still appears to be big for them. In a rapidly changing trade environment the AEO and MRA are still useful. Therefore the government needs to encourage non-AEO companies to join the AEO program, expand MRA conclusion with AEO adopted countries especially developing ones and help AEO companies make good use of AEO and MRA.

Sampling, Surveillance and Forecasting of Insect Population for Integrated Pest Management in Sericulture

  • Singh, R.N.;Maheshwari, M.;Saratchandra, B.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.8 no.1
    • /
    • pp.17-26
    • /
    • 2004
  • Pest monitoring through field surveys and surveillance helps in forecasting the population build up of pest. It reduces the load of pesticides application and forms the basis of Integrated Pest Management in sericulture. Common sampling techniques for quantifying pest populations and damage caused by them are reviewed emphasizing the need for quick and simple sampling methods. Various direct and indirect sampling methods for establishing pest populations are discussed and methods have been discussed to use indirect sampling method under IPM programme in sericulture. The use of pheromone lures and traps forms one of the important ingredients of integrated pest management, which calls for integration of all available methods in a cost effective and environmental friendly manner offering consistent efficacy. Silk-worms feed on the variety of silk host plants and spin cocoons. Each silk host plant is attacked in the field by number of insect pest species. Several pests are common to mulberry, tasar, oak tasar, muga and eri host plant but pest status and seasonal abundance differs from each crop. The key pests are serious perennially occurring persistent species which cause considerable yield loss every year on large areas and require control measure. Regular occurrence of minor pest is noticed but sudden increase in its population is not known. The occasional pests are sporadic but potential causing sufficient damage. Silk losses due to attack of all the pests have not been calculated. However, information on pest biology and ecology, and control practices being practiced is available but the period of outbreak of major pests and predators on silkworms and its host plant needs to be reinvestigated. Pest and predators forecasting based on surveillance information may provide an opportunity to minimize the losses, particularly to reduce expenditure involved in pest management.

NUMERICAL STUDY ON THE UNSTEADY FLOW PHYSICS OF INSTECTS' FLAPPING FLIGHT USING FLUID-STRUCTURE INTERACTION (FSI를 활용한 2차원 곤충날개 주위 유동장 해석)

  • Lee, K.B.;Kim, J.H.;Kim, C.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.151-158
    • /
    • 2009
  • To implement the insects' flapping flight for developing flapping MAVs(micro air vehicles), the unsteady flow characteristics of the insects' forward flight is investigated. In this paper, two-dimensional FSI(Fluid-Structure Interaction) simulations are conducted to examine realistic flow features of insects' flapping flight and to examine the flexibility effects of the insect's wing. The unsteady incompressible Navier-Stokes equations with an artificial compressibility method are implemented as the fluid module while the dynamic finite element equations using a direct integration method are employed as the solid module. In order to exchange physical information to each module, the common refinement method is employed as the data transfer method. Also, a simple and efficient dynamic grid deformation technique based on Delaunay graph mapping is used to deform computational grids. Compared to the earlier researches of two-dimensional rigid wing simulations, key physical phenomena and flow patterns such as vortex pairing and vortex staying can still be observed. For example, lift is mainly generated during downstroke motion by high effective angle of attack caused by translation and lagging motion. A large amount of thrust is generated abruptly at the end of upstroke motion. However, the quantitative aspect of flow field is somewhat different. A flexible wing generates more thrust but less lift than a rigid wing. This is because the net force acting on wing surface is split into two directions due to structural flexibility. As a consequence, thrust and propulsive efficiency was enhanced considerably compared to a rigid wing. From these numerical simulations, it is seen that the wing flexibility yields a significant impact on aerodynamic characteristics.

  • PDF

The Effects of the Commercial Aircraft Pilot's Leadership and Self-Efficacy to their Safety Behaviors (상업항공기 조종사의 리더십 및 자기효능감이 안전행동에 미치는 영향)

  • Lee, Jong Sung;Kim, Kee Wong;Park, Sung Sik;Kang, Woo Jung
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.1
    • /
    • pp.114-123
    • /
    • 2014
  • Due to the recent aircraft accidents both in Ethiopian airline and Malaysian airline, almost all the media are focusing the importance of the airline safety. Especially, media's eyes and ears are interested in the reasons why Malaysia airline's missing presumed as by either terrorist attack or pilot's mistake. Safety Behaviors of pilot are viewed as the most important human factor issues among researchers. This is because, if it were the case of a commercial airline, pilot's safety behavior would be directly related to the lives of couple of hundreds passengers. This paper considers the antecedents of this safety behaviors as pilot's leadership, pilot's leadership and self-efficacy. This paper has tried to find out which human factors of a pilot would have significant impact on their safety behaviors. According to the empirical research result from SEM (Structural Equation Model), it was found out both the leadership and self-efficacy of a pilot had direct impact on their safety behaviors through safety motivation. Thus it could be concluded that flight crew must follow the instruction of a pilot who had the authority of the flight operation. The managerial implication are discussed in the conclusion part of this paper. As an implication, this paper concluded that it would be necessary to do further research on pilot's leadership and self-efficacy.

A Study of the Flow Pattern and the PIV Analysis around a Flapped Foil (플랩을 갖는 날개 주위의 유동 특성과 PIV 해석에 관한 연구)

  • Lee Gyoung-Woo;Choi Hee-Jong;Lee Seung-keon
    • Journal of Navigation and Port Research
    • /
    • v.29 no.6 s.102
    • /
    • pp.509-513
    • /
    • 2005
  • Ship maneuverability is mainly determined according to hull-propeller-rudder system of a ship and directly related to the ship safety during the operation in the ocean. Among hull-propeller-rudder system the rudder system had direct concern with the ship maneuverability and a special rudder has been recommended to improve the ship maneuverability. In this paper the study of flapped rudder's 2-dimensional section was accomplished Model tests had been carried out with different angles of attack of a main foil and flap's deflection angles to predict the performance of the flapped rudder and the 2 frame particle tracking method had been used to obtain the velocity distribution in the flow field during model tests. $Re=1.027{\times}10^4$ had been used during the whole experiments and measured results had been compared with each other.

A Hybrid Vulnerability of NFC Technology in Smart Phone (스마트폰에서 NFC를 이용한 융.복합 하이브리드 취약점)

  • Park, Chang Min;Park, Neo;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.3-8
    • /
    • 2012
  • Smartphones have all the recent technology integration and NFC (Near Field Communication) Technology is one of them and become an essential these days. Despite using smartphones with NFC technology widely, not many security vulnerabilities have been discovered. This paper attempts to identify characteristics and various services in NFC technology, and to present a wide range of security vulnerabilities, prevention, and policies especially in NFC Contactless technology. We describe a security vulnerability and an possible threat based on human vulnerability and traditional malware distribution technic using Peer-to-Peer network on NFC-Enabled smartphones. The vulnerability is as follows: An attacker creates a NFC tag for distributing his or her malicious code to unspecified individuals and apply to hidden spot near by NFC reader in public transport like subway system. The tag will direct smartphone users to a certain website and automatically downloads malicious codes into their smartphones. The infected devices actually help to spread malicious code using P2P mode and finally as traditional DDoS attack, a certain target will be attacked by them at scheduled time.

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

Implementation of JDAM virtual training function using machine learning

  • You, Eun-Kyung;Bae, Chan-Gyu;Kim, Hyeock-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.9-16
    • /
    • 2020
  • The TA-50 aircraft is conducting simulated training on various situations, including air-to-air and air-to-ground fire training, in preparation for air warfare. It is also used for pilot training before actual deployment. However, the TA-50 does not have the ability to operate smart weapon forces, limiting training. Therefore, the purpose of this study is to implement the TA-50 aircraft to enable virtual training of one of the smart weapons, the Point Direct Attack Munition (JDAM). First, JDAM functions implemented in FA-50 aircraft, a model similar to TA-50 aircraft, were analyzed. In addition, since functions implemented in FA-50 aircraft cannot be directly utilized by source code, algorithms were extracted using machine learning techniques(TensorFlow). The implementation of this function is expected to enable realistic training without actually having to be armed. Finally, based on the results of this study, we would like to propose ways to supplement the limitations of the research so that it can be implemented in the same way as it is.

A Study on the Design and Implementation of a DSSS-based MODEM for a Right Termination System(FTS) (대역확산방식 비행종단시스템의 모뎀설계와 구현에 관한 연구)

  • Lim Keumsang;Kim Jaehwan;Cho Hyangduck;Kim Wooshik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.175-183
    • /
    • 2006
  • This letter proposes a Direct Sequence Spread Spectrum (DS-SS)-based Flight Termination System(FTS) and show the simulation results and implements the system using FRGAs. The DS-SS FTS has immunity interference signals and the influence of jamming signal. Moreover, a DS-SS FTS can provides effects on an authentication and encryption with spread codes. And the system uses more less power than an analog FM system. We used Reed-Solomon (32, 28) code and triple Data Encryption Standard(3DES) for error correction and data encryption. Also we used counter algorithm for unauthenticated device's attack The spread codes of In-phase channel and Quadrature channel were generated by Gold sequence generators. The system was implemented in Altera APEX20K100E FPGA for the ground system and EPF10K100ARC240-3 for the airborne system.