• Title/Summary/Keyword: intrusion

Search Result 2,140, Processing Time 0.027 seconds

Study on Physical and Chemical Properties of CaO-Al2O3 System Melting Compound (CaO-Al2O3계 용융화합물의 물리·화학적 특성에 관한 연구)

  • Lee, Keun-Jae;Koo, Ja-Sul;Kim, Jin-Man;Oh, Sang-Yoon
    • Journal of the Korea Concrete Institute
    • /
    • v.25 no.2
    • /
    • pp.209-215
    • /
    • 2013
  • This study is aimed to identify the method to use the CaO-$Al_2O_3$ system of rapidly cooled steel making slag (RCSS) as the environment-friendly inorganic accelerating agent by analyzing its physical and chemical properties. The fraction of rapidly cooled steel making slag is distinguished from its fibrous, and the contents of CaO and $Fe_2O_3$ are inversely proportional across different fractions. In addition, as the content of CaO decreased and the content of $Fe_2O_3$ increased, the loss ignition tended to become negative (-) and the density increased. The pore distribution by mercury intrusion porosimetry is very low as compared to the slowly cooled steel-making slag, which indicates that the internal defect and the microspore rate are remarkably lowered by the rapid cooling. To analyze the major minerals the rapidly cooled steel-making slag, XRD, f-CaO quantification and SEM-EDAX analysis have been performed. The results shows that f-CaO does not exist, and the components are mainly consisted of $C_{12}A_7$ and reactive ${\beta}-C_2S$.

Generation of Efficient Fuzzy Classification Rules Using Evolutionary Algorithm with Data Partition Evaluation (데이터 분할 평가 진화알고리즘을 이용한 효율적인 퍼지 분류규칙의 생성)

  • Ryu, Joung-Woo;Kim, Sung-Eun;Kim, Myung-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.32-40
    • /
    • 2008
  • Fuzzy rules are very useful and efficient to describe classification rules especially when the attribute values are continuous and fuzzy in nature. However, it is generally difficult to determine membership functions for generating efficient fuzzy classification rules. In this paper, we propose a method of automatic generation of efficient fuzzy classification rules using evolutionary algorithm. In our method we generate a set of initial membership functions for evolutionary algorithm by supervised clustering the training data set and we evolve the set of initial membership functions in order to generate fuzzy classification rules taking into consideration both classification accuracy and rule comprehensibility. To reduce time to evaluate an individual we also propose an evolutionary algorithm with data partition evaluation in which the training data set is partitioned into a number of subsets and individuals are evaluated using a randomly selected subset of data at a time instead of the whole training data set. We experimented our algorithm with the UCI learning data sets, the experiment results showed that our method was more efficient at average compared with the existing algorithms. For the evolutionary algorithm with data partition evaluation, we experimented with our method over the intrusion detection data of KDD'99 Cup, and confirmed that evaluation time was reduced by about 70%. Compared with the KDD'99 Cup winner, the accuracy was increased by 1.54% while the cost was reduced by 20.8%.

Basic Study on the Characteristics of Wooden Sidewalk Pavement Material using Wood Waste Chip (폐목재 칩을 활용한 목질계 보도포장재의 특성에 대한 기초연구)

  • Choi, Jae Jin;Song, Jin Woo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.3D
    • /
    • pp.413-420
    • /
    • 2011
  • An experiment was conducted to suggest the road pavement material combining wooden chip crushed from little useful roots and branches from logging sites or wood waste from construction sites with urethane resin. For the specimen, the mass ratio of urethane resin to construction wood waste chip/lumber waster chip was set to three different levels of 0.5, 0.75, and 1.0, which was measured, mixed with mixer, and molded; 7 days after, tensile strength test, elasticity test using golf balls and steel balls, permeability coefficient measurement, and flammability test were executed. As the result, the tensile strength of the specimen at the dry state in the air exhibited the range of 0.2-1.1MPa, and there was no change after 7 days of aging. When submerged in water, however, the strength was partially diminished; the diminishing rate was greater for less urethane resin usage, and therefore it appears desirable to set the mass ratio of resin to the wood waste chip over 0.75 to consider the moisture intrusion by precipitation and such. As the result of elasticity test, the GB and SB coefficients of the specimen using wood waste chips and urethane resin were measured to be low at below 20%, exhibiting excellent elasticity as road pavement material. Also, the permeability coefficient was over 0.5mm/sec for specimens of all combinations, exceeding the standard value required after construction for permeable pavement material, and the flammability of wood-type pavement material was evaluated to have no practical issues.

Real-scale Accelerated Testing to Evaluate Long-term Performance for Bridge/Earthwork Transition Structure Reinforced by Geosynthetics and Cement Treated Materials (토목섬유와 시멘트처리채움재로 보강한 교량/토공 접속구조의 장기공용성 평가를 위한 실물가속시험)

  • Lee, Il-Wha;Choi, Won-Il;Cho, Kook-Hwan;Lee, Kang-Myung;Min, Kyung-Chan
    • Journal of the Korean Society for Railway
    • /
    • v.17 no.4
    • /
    • pp.251-259
    • /
    • 2014
  • The transition zone between an earthwork and a bridge effect to the vehicle's running stability because support stiffness of the roadbed is suddenly changed. The design criteria for the transition structure on ballast track were not particular in the past. However with the introduction of concrete track is introduced, it requires there is a higher performance level required because of maintenance and running stability. In this present paper, a transition structure reinforced with geosynthetics is suggested to improve the performance of existing bridge-earthwork transition structures. The suggested transition structure, in which there is reinforcing of the approach block using high-tension geosynthetics, has a structure similar to that of earth reinforced abutments. The utilized backfill materials are cement treated soil and gravel. These materials are used to reduce water intrusion into the approach block and to increase the recycling of surplus earth materials. An experiment was performed under the same conditions in order to allow a comparison of this new structure with the existing transition structure. Evaluation items are elastic displacement, cumulative settlement, and earth pressure. As for the results of the real-scale accelerated testing, the suggested transition structure has excellent performance for the reduction of earth pressure and settlement. Above all, it has high resistance the variation of the water content.

Petrochemical Characteristics of the Granites in the Jeomchon area (점촌일대에 분포하는 화강암류에 대한 암석화학적 연구)

  • 최원희;좌용주
    • The Journal of the Petrological Society of Korea
    • /
    • v.7 no.1
    • /
    • pp.37-52
    • /
    • 1998
  • The granites in the Jeomchon area can be divided into hornblende biotite granite (Hbgr), deformed biotite granite (Dbgr), deformed pinkish biotite granite(Dpbgr), biotite granite (Btgr), and granite porphyry(Gp). These granites show metaluminous, 1-type and calc-alkaine characteristics from their whole-rock chemistry. Hbgr and Dbgr belong to ilmenite-series granitoids, but Gp to magnetite-series. Dpbgr and Btgr show the intermediate nature between ilmenite- and magnetite-series. Tectonic discriminations indicate that Hbgr and Dbgr were formed in active continental margin environment, whereas Dpbgr, Btgr, and Gp in post-orogenic and/or anorogenic rift-related environment. From the Harker diagrams major oxide contents of Hbgr and Dbgr show a continuous variation with $SiO_2$, indicating that they are genetically correlated with each other. On the other hand, any correlation of major oxides variation cannot be recognized among Dpbgr, Btgr and Gp. It seems like that Hbgr and Dbgr were derived from a same parent granitic magma, judging from their occurrence of outcrop, mineral composition as well as whole-rock chemistry. Variation trends of major oxide contents between Hbgr and Baegnok granodiorite are very similar and continuous. If the two granites were derived from a cogenetic magma, there exists a possibility that the granitic bodies had been separated by Btgr and Gp of Cretaceous age. Three stages of the granitic intrusions are understood in the Jeomchon area. After the intrusion of Hbgr and Dbgr during middle to late Paleozoic time, Dpbgr emplaced into the area next, and finally Btgr and Gp intruded during Cretaceous time. Tectonic movement accompanying shear and/or thrust deformation seems likely to have occurred bewteen the intrusions of Dpbgr and Btgr.

  • PDF

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Occurrence of Clay Minerals from the Bobae Pottery Stone Mine in Pusan (부산 보배도석광산에서 산출하는 점토광물의산상)

  • Hwang, Jin-Yeon;Kim, Kwang-Hye;Jeong, Yoon-Yeong
    • Journal of the Mineralogical Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.27-37
    • /
    • 1993
  • The clay minerals such as sericite, pyrophyllite, chlorite and smectite abundantly occur in the Bobae pottery stone mine in Pusan. In this study, the processes which are responsible for the formation of these minerals were studied by examing their occurrence and mineralogical properties. The so-called pottery stone of this mine is characterized by the predominance of sericite and quartz. The sericite of the pottery stone is mostly $2M-{1}$ type. And many of quartz particles are smaller than a few micron in diameter. The pottery stone also contained a small amount of pyrophyllite and muscovite. The pottery stone deposit occurs within the Cretaceous rhyodacite and is particularly well developed near the contact with the quartz porphyry which intrudes the rhyodacite. The fact implies that the pottery stone is the product of hydrothermal alteration of the rhyodacite by the intrusion of quartz porphyry. The pottery stone was formed by the alteration that accompanies the dissociation of feldspar and chlorite in parent rocks and subsequent formation of sericte and quartz. Smectite, laumontite and kaolinite occur locally within the altered rocks. These minerals were formed after formation of pottery stone. It is noteworthy that beidellite occurs as a pink-colored clay from the altered rocks in the mine.

  • PDF

Occurrence of the Pb-Zn Skarn Deposits in Gukjeon Mine, Korea (국전 Pb-Zn 스카른 광상의 산출상태)

  • Yang, Chang-Moon;Choi, Jin-Beom
    • Journal of the Mineralogical Society of Korea
    • /
    • v.23 no.4
    • /
    • pp.413-428
    • /
    • 2010
  • The Gukjeon Pb-Zn mine was recognized as skarn deposits which replaced the limestone layer of the Jeongkansan Formation by intrusion of biotite granite in late Cretaceous. The Jeongkansan Formation is mainly composed of tuffaceous shale, and interlayers of sandstone, andesitic tuff, limestone, and conglomerate. The limestone layer is located in the lower part of the Jeongkansan Formation with 6~8 m in thickness and about 500 m in length. The Gukjeon deposits are divided into the Jukgang ore bodies once mined underground and the eastern ore bodies. Main ores are sphalerite and galena, in association with small amounts of chalcopyrite, arsenopyrite, pyrite, and pyrrhotite, etc. Skarns mainly consist of clinopyroxenes and Ca-garnets, associated with actinolite, chlorite, axinite, and calcite, etc. The Jukgang ore bodies show symmetrical distribution of zoning outward, representing clinopyroxene (hedenbergite) zone, clinopyroxene-garnet (grossular) zone, garnet (andradite) zone, and alteration zone of hornfels. $Fe^{2+}$ contents in clinopyroxenes increase with decreasing sphalerite grade. Sphalerite ores are found in all zones and $Fe^{2+}$ contents in sphalerite increase in the same way as those in clinopyroxenes, implying that clinopyroxene and sphalerite are closely related each other. It is concluded that the Gukjeon ores occurred in the ore rich zone of high grade sphalerite with less pyrite in assoication with clinopyroxene.

Function of Environmental Flows for Sustainable Water Resources Management (지속가능한 물 관리를 위한 환경유량의 기능정립에 관한 연구)

  • Choi, Ji-Yong
    • Journal of Environmental Policy
    • /
    • v.6 no.2
    • /
    • pp.47-70
    • /
    • 2007
  • In recent days, people's requests about water resources have been developed from managing quality and quantity of water resources to forming a river environment by restoring normal function of river. To meet these requests, it is necessary to establish the concept of environmental flows. In Korea, the environmental flows was introduced as a concept of river maintenance flows in a sense of river management. The function of river maintenance flows has been changed according to what the major issue is in that age such as navigation, water quality, and prevention of saline water intrusion. As the assesment of river maintenance flows in Korea focused mainly on the function of water usage oriented in human, it could not be defined and emphasized in a sense of ecosystem as a pure meaning of environmental flows. And while the existing river maintenance flows are included the assesment of flows, there is not a practical procedure to supply them and the efficient management in a sense of environment is not performed. The environmental flows should be further developed from the river maintenance flows and changed to a new concept focused on maintaining the health of ecosystem. In other words, the environmental flows should be defined as a necessary flows for maintaining the function of river and its original value, and be considered on the same or higher value of flows for maintenance of economic activity, recreation, and power generation.

  • PDF

A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System (정보보호관리체계(ISMS) 항목의 중요도 인식과 투자의 우선순위 비교 연구)

  • Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.919-929
    • /
    • 2014
  • Recently, organizational efforts to adopt ISMS(Information Security Management System) have been increasingly mandated and demanded due to the rising threat and the heavier cost of security failure. However there is a serious gap between awareness and investment of information security in a company, hence it is very important for the company to control effectively a variety of information security threats within a tight budget. To phase the ISMS, this study suggests the priorities based on evaluating the Importance of 13 areas for the ISMS by the information security experts and then we attempt to see the difference between importance and investment through the assessment of the actual investment in each area. The research findings show that intrusion incident handling is most important and IT disaster recovery is the area that is invested the most. Then, information security areas with the considerable difference between priorities of importance and investment are cryptography control, information security policies, education and training on information security and personnel security. The study results are expected to be used in making a decision for the effective investment of information security when companies with a limited budget are considering to introduce ISMS or operating it.