• Title/Summary/Keyword: direct attack

Search Result 136, Processing Time 0.03 seconds

Anaerobic Direct Seeder Engineering Component of the Rice Anaerobic Seeding Technology

  • Borlagdan, Paterno C.
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1996.06c
    • /
    • pp.1009-1020
    • /
    • 1996
  • Direct-seeded rice can have comparable yield with transplanted rice if its inherent problems can be solved. It is a labor-saving technology and can significantly reduce production cost because seedling nursery , pulling , and transplanting are omitted. Turnaround time between cropping is reduced hence the possibility of a third annual crop. But direct-seeded rice is very vulnerable to pest attack (by birds, rats, and golden snails), desiccation, weed infestation, and prone to lodging resulting to unstable crop establishment and inconsistent yield. These problems can be solved by anaerobic seeding (sowing pre-germinated seeds under the soil). It requires precise seed placement into the soil to optimize its benefits. We developed a four-row anaerobic direct seeder (US $ 200 commercial price) for this purpose . It consist of a structural framework mounted with a drum -hopper metering device, flotation type drivewheels, spring-loaded and adjustable furrow closers, and furrow open rs, and a plastic rainguard. It can sow in line pre-germinated seeds into the soil thus permitting the use of mechanical weeders for a chemical-free weed control. Its performance was comparable with the Japanese two-row anaerobic seeder (costing US$400) in terms of seed placement and crop establishment. It was tested with five cultivars. Seeding rate varied from 38 kg/ha to 80kg/ha. Crop establishment ranged from 64 to 99 percent while grain yield varied from 3.0 t/ha to 5.4t/ha. A six-row anaerobic seeder was also developed and adapted to a powertiller for increased capacity , field efficiency , and easier operation. The anaerobic seeder is useful to farmers shifting to direct seeding to reduce rice production cost and to researchers conducting agronomic studies in direct-seeded rice. Blueprint of the machine is available free of charge from IRRI.

  • PDF

Investigation of Vortex Interactions over a Delta Wing with the Leading Edge Extension (연장된 앞전을 갖는 델타형 날개에서의 와류 상호작용에 관한 연구)

  • 이기영;손명환;장영일
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.4 no.2
    • /
    • pp.215-224
    • /
    • 2001
  • An experimental investigation was conducted on the interaction of vortices over a delta wing with the leading edge extension for three angles of attack($16^{\circ},\; 24^{\circ} \;and\; 28^{\circ}$) at Reynolds number of $1.76{\times}10^6.$ The experimental data included total pressure contours and velocity vectors using 5-hole probe measurements. Constant total pressure coefficient contours show the LEX vortex moves downward and outboard, while the wing vortex exhibited an inboard and upward migration. At near the trailing edge, these vortices reveal a direct interaction between the wing and LEX vortex, featuring a coiling of vortex cores about each other. The combined effect of the interaction of these two vortices and proximity to the wing surface results in the increase of the suction peak. This is in contrast to the result obtained on the delta wing alone configuration, where the effect of the vortex breakdown was manifested. The interaction of the wing and LEX vortices is more pronounced at higher AOA.

  • PDF

Study of Hacking Attacks Secure Payment(ISP) with Smishing (스미싱을 이용한 안전결제(ISP) 해킹 공격 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.267-270
    • /
    • 2013
  • Hacking damage is increasing year by year in the Internet payment service credit card applying the digital signature method of PKI-based first domestic, secure payment, was 180 million won in 2012. Revenues have soared for phishing that Smishing using smartphone after entering 2013. Hacking accident to the secure payment system using Smishing has occurred took over personal information and financial direct damage. In this paper, we analyzed for Smishing, to prevent the damage of secure payment using Smishing to study the hacking attack of secure payment. In addition, it would be studies to allow through the smartphone, online payment safer and more convenient.

  • PDF

Tracking Analysis of User Privacy Damage using Smartphone (스마트폰 사용으로 인한 사용자 프라이버시 피해 현황 분석)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.13-18
    • /
    • 2014
  • The usage rate of user due to advances in smartphone development is higher than the usage rate to use a PC. However, smartphone usage popularized research to protect sensitive information, such as smart phone users personal information, financial information is a small state. In this paper, we analyzed the various vulnerabilities in smartphone studies to date have been looking into the corresponding port smart consumer dispute resolution methods and criteria for smartphone security attack methods and analysis. In particular, the threat of such a network, malware, Peep attack of the security threats arising from the smartphone they can avoid or mitigate threats to minimize the smartphone security damage is done to the disclosure of personal information, such as direct damage or financial loss the analysis of that method.

  • PDF

Telemedicine Security Risk Evaluation Using Attack Tree (공격트리(Attack Tree)를 활용한 원격의료 보안위험 평가)

  • Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.951-960
    • /
    • 2015
  • The smart screening in the medical field as diffusion of smart devices and development of communication technologies is emerging some medical security concerns. Among of them its necessary to taking risk management measures to identify, evaluate and control of the security risks that can occur in Telemedicine because of the Medical information interchanges as Doctor to Doctor (D2D), Doctor to Patient (D2P). This research paper studies and suggests the risk analysis and evaluation methods of risk security that can occur in Telemedicine based on the verified results of Telemedicine system and equipment from the direct site which operating in primary clinics, public health centers and it's branches, etc.

Distribution Properties of Airborne Chlorides in Korea (우리나라의 비래염분 분포 특성)

  • Lee, Jong-Suk;Ahn, Ki-Hong;Kim, Do-Gyeum;Park, Jung-Jun
    • Journal of the Korea Concrete Institute
    • /
    • v.22 no.6
    • /
    • pp.769-776
    • /
    • 2010
  • Concrete structures immersed in seawater are exposed to uniform chloride concentration. However, seashore concrete structures are subjected to various airborne chlorides concentration depending on areas, distance from seashore, orientation of structures and wind direction etc. Therefore, structures which is not coming into direct contact with seawater are greatly affected by salt attack and those cases have been reported. This study intends to investigate salt attack by airborne chlorides in terms of the distance from the seashore based on the measurements conducted at 73 spots and 27 areas during 3 years in the Eastern, Western and Southern coasts of South Korea. Results revealed large regional variations of the salinity in coastal regions along with significant seasonal effects caused by seasonal winds. Moreover, the salinity is seen to diminish as the distance from the seashore increases at a rate corresponding to the function $y=ax^{-b}$. These results will be helpful to do the durability design and management of seashore structures.

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

The framework to develop main criteria for a DDoS correspondence (DDoS 대응 지표 프레임워크 개발)

  • Lee, Yeon-Ho;Kim, Beom-Jae;Lee, Nam-Yong;Kim, Jong-Bae
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.79-89
    • /
    • 2010
  • The government and companies build a DDoS correspondence system hastily to protect assets from cyber threats. It has become more and more intelligent and advanced such as DDoS attack. However, when outbreaks of the social incidents such as 7.7 DDoS attack(2009.7.7) or cases of the direct damage occurred, information security systems(ISS) only become the issue in the short term. As usual, sustained investment about ISS is a negative recognition. Since the characteristic of ISS is hard to recognize the effectiveness of them before incidents occurs. Also, results of incidents occurred classify attack and detection. Detailed and objective measurement criterion to measure effectiveness and efficiency of ISS is not existed. Recently, it is progress that evaluation and certification about for the information security management system(ISMS). Since these works propose only a general guideline, it is difficult to utilize as a result of ISMS improvement for organization. Therefore, this paper proposes a framework to develop main criteria by a correspondence strategy and process. It is able to detailed and objective measurements.

Analysis on Mobile Forensic of Smishing Hacking Attack (Smishing 사고에 대한 Mobile Forensic 분석)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2878-2884
    • /
    • 2014
  • The Smishing attacks are caused using smartphone since 2013. Smishing hacking attacks are increasing due to the approximately 104 million private information leakage incidents by the 3 domestic credit card companies occurred in January 2014. The Smishing attack occurred in conjunction with hacking illegal leakage of personal information and direct financial damage. In this paper, i am analyze real-world case studies in the lab and study accident on Smishing Mobile Forensic analysis. I am study of a real case Smishing hacking attacks. And studying evidence for a Mobile Forensic analysis of the technical principles of Smishing attacks. The study for the Mobile Forensic evidence proved the Smishing hacking attacks using Mobile Forensic technic and create Mobile Forensic reports. Through this paper, the research will be safe for the people living in the smartphone can be used safely and conveniently, with the development of Mobile Forensic technology, to study the extraction of Smishing accident evidences from the court.

New Byzantine Resilient Multi-Path Key Establishment Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 비잔틴 공격에 강인한 새로운 다중 패스 키 설정 방법)

  • Kim, Young-Sik;Jang, Ji-Woong;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9C
    • /
    • pp.855-862
    • /
    • 2009
  • The path key establishment phase in the wireless sensor network is vulnerable to Byzantine attack. Huang and Hedhi proposed a Byzantine resilient multi-key establishment scheme using a systematic RS code, which has shortcomings of exposing a part of message symbols and inefficient transmission. In this paper, we propose a new Byzantine resilient multi-path key establishment scheme in which direct message symbols are not exposed to an adversary and are more efficiently transmitted the RS-encoded symbols to the destination node. In the Proposed scheme, a non-systematic RS code is used to transmit a generated indirect secret key and each encoded symbol is relayed through available paths between two sensor nodes. If enough symbols are collected at the destination node, it is possible to reconstruct the secret message through RS decoding.