• Title/Summary/Keyword: realistic threat

Search Result 34, Processing Time 0.02 seconds

Potentials of and Threats to Traditional Institutions for Community Based Biodiversity Management in Dryland Areas of Lower Moshi, Tanzania

  • Woiso, Dino Andrew;Shemdoe, Riziki Silas;Kayeye, Heri
    • Journal of Forest and Environmental Science
    • /
    • v.25 no.3
    • /
    • pp.177-185
    • /
    • 2009
  • Dryland species and ecosystems have developed unique strategies to cope with low and sporadic rainfall. They are highly resilient and recover quickly from prevailing disturbances such as fires, herbivore pressure and drought. Dryland people have engineered pastoral and farming systems, which are adapted to these conditions and have sustained the livelihoods of dryland people for centuries. In this article, we present the status of potentials and threats to dryland biodiversity and explore options for its conservation and sustainable use. Findings of the research can be summarized as follows: (i) The ecosystem goods and services are highly valued by the community but mechanism for wise use of the resources has disappeared, (ii) forests are under the ownership of the government but the local community is the realistic custodian of the forests through village leaderships and environmental committees; (iii) the immediate major threat to dryland biodiversity held in the forests appears to be the degradation of ecosystems and habitats caused by new and powerful forces of environmental degradation such as large scale irrigation of rice farms, poverty-induced overexploitation of natural resources, and disappearance and ignorance of traditional institutions for management of dryland biodiversity. These new forms of disturbances often overpower the legendary resilience of dryland ecosystems and constitute potentially serious threats to dryland biodiversity. Forests, wetlands and oases all of which are micro hot spots of dryland biodiversity, appear to be particularly vulnerable hence the need to set up some rules and regulations for sustainable utilization of these resources.

  • PDF

Safe Speed Estimation of Arctic Ships considering Structural Safety (구조적 안전성을 고려한 빙해선박의 안전 운항속도 평가)

  • Nho, In Sik;Lim, Seung Jae;Kang, Kuk Jin
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.3
    • /
    • pp.236-242
    • /
    • 2018
  • Damage due to ice collision is the most serious threat for the structural safety of ships operating in arctic region. Since such hull damages are usually caused by the collision of floating ice at excessive voyage speed of ships, the authorities responsible for the shipping at arctic sea are required to provide the speed limit for safe voyage, so-called safe speed. In countries near arctic ocean, such as Canada and Russia, empirical methods to determine the safe speed of ships based on their long experience of arctic voyage have been established and applied them in the real arctic navigation. However, in Korea, it is not easy to accumulate the arctic voyage experience and related technical database, so it seems to be a realistic approach to adopt a safe voyage speed estimating method in arctic sea based on the ice collision simulation technology using the nonlinear finite element analysis. The aim of this study is to develop a technique for estimating the safe voyage speed of vessels operating at arctic sea through the ice collision analysis, In order to achieve this goal, the standard procedure of the ice collision analysis is dealt with and example analysis was carried out and the results were considered. To investigate the validity of developed method, POLARIS system proposed by IMO was studied for comparison.

Design and Implementation of Cyber Warfare Training Data Set Generation Method based on Traffic Distribution Plan (트래픽 유통계획 기반 사이버전 훈련데이터셋 생성방법 설계 및 구현)

  • Kim, Yong Hyun;Ahn, Myung Kil
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.71-80
    • /
    • 2020
  • In order to provide realistic traffic to the cyber warfare training system, it is necessary to prepare a traffic distribution plan in advance and to create a training data set using normal/threat data sets. This paper presents the design and implementation results of a method for creating a traffic distribution plan and a training data set to provide background traffic like a real environment to a cyber warfare training system. We propose a method of a traffic distribution plan by using the network topology of the training environment to distribute traffic and the traffic attribute information collected in real and simulated environments. We propose a method of generating a training data set according to a traffic distribution plan using a unit traffic and a mixed traffic method using the ratio of the protocol. Using the implemented tool, a traffic distribution plan was created, and the training data set creation result according to the distribution plan was confirmed.

Application of Lagrangian approach to generate P-I diagrams for RC columns exposed to extreme dynamic loading

  • Zhang, Chunwei;Abedini, Masoud
    • Advances in concrete construction
    • /
    • v.14 no.3
    • /
    • pp.153-167
    • /
    • 2022
  • The interaction between blast load and structures, as well as the interaction among structural members may well affect the structural response and damages. Therefore, it is necessary to analyse more realistic reinforced concrete structures in order to gain an extensive knowledge on the possible structural response under blast load effect. Among all the civilian structures, columns are considered to be the most vulnerable to terrorist threat and hence detailed investigation in the dynamic response of these structures is essential. Therefore, current research examines the effect of blast loads on the reinforced concrete columns via development of Pressure- Impulse (P-I) diagrams. In the finite element analysis, the level of damage on each of the aforementioned RC column will be assessed and the response of the RC columns when subjected to explosive loads will also be identified. Numerical models carried out using LS-DYNA were compared with experimental results. It was shown that the model yields a reliable prediction of damage on all RC columns. Validation study is conducted based on the experimental test to investigate the accuracy of finite element models to represent the behaviour of the models. The blast load application in the current research is determined based on the Lagrangian approach. To develop the designated P-I curves, damage assessment criteria are used based on the residual capacity of column. Intensive investigations are implemented to assess the effect of column dimension, concrete and steel properties and reinforcement ratio on the P-I diagram of RC columns. The produced P-I models can be applied by designers to predict the damage of new columns and to assess existing columns subjected to different blast load conditions.

Analysis of Genie Music's Strategy for Strengthening Customer Interactive : Focus on SWOT and TOWS Analysis (고객 인터렉티브 강화를 위한 지니뮤직의 전략 도입과 현황분석 : SWOT과 TOWS 분석을 중심으로)

  • Kwon, Boa;Park, Sang-hyeon
    • Journal of Venture Innovation
    • /
    • v.4 no.1
    • /
    • pp.87-99
    • /
    • 2021
  • The importance of "personalization technology" has recently been highlighted due to the Covid-19 and the development of IT technology such as AI and big data, which is soon coming beyond personalization into the "super-personalization era." Therefore, in terms of the music streaming service market, it has formed a service supply trend in which individual tastes are respected and companies are seeking to establish a realistic analysis and development direction considering the external market environment. From this perspective, this paper sought to analyze the strengths and weaknesses of the Genie Music's and provide a direction for development based on Genie Music's customer interactive strategy. In particular, it was intended to analyze the advantages and disadvantages of customer interactive strategies with the 'live music service platform' that moves with customers and to provide directions for future corporate development. As an analysis method, we looked at strengths and weaknesses, opportunities and threat requirements based on SWOT analysis. Afterwards, the company attempted to present specific corporate development strategies through TOWS analysis.

Fall detection based on acceleration sensor attached to wrist using feature data in frequency space (주파수 공간상의 특징 데이터를 활용한 손목에 부착된 가속도 센서 기반의 낙상 감지)

  • Roh, Jeong Hyun;Kim, Jin Heon
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.31-38
    • /
    • 2021
  • It is hard to predict when and where a fall accident will happen. Also, if rapid follow-up measures on it are not performed, a fall accident leads to a threat of life, so studies that can automatically detect a fall accident have become necessary. Among automatic fall-accident detection techniques, a fall detection scheme using an IMU (inertial measurement unit) sensor attached to a wrist is difficult to detect a fall accident due to its movement, but it is recognized as a technique that is easy to wear and has excellent accessibility. To overcome the difficulty in obtaining fall data, this study proposes an algorithm that efficiently learns less data through machine learning such as KNN (k-nearest neighbors) and SVM (support vector machine). In addition, to improve the performance of these mathematical classifiers, this study utilized feature data aquired in the frequency space. The proposed algorithm analyzed the effect by diversifying the parameters of the model and the parameters of the frequency feature extractor through experiments using standard datasets. The proposed algorithm could adequately cope with a realistic problem that fall data are difficult to obtain. Because it is lighter than other classifiers, this algorithm was also easy to implement in small embedded systems where SIMD (single instruction multiple data) processing devices were difficult to mount.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

Toegye and Yulgok's Theory of Human Mind·Moral Mind - The Korean Development of Chutzu's Theory of Mind (퇴계와 율곡의 인심도심설 - 주자 심론의 한국적 전개 -)

  • Cheon, Hyunhee
    • The Journal of Korean Philosophical History
    • /
    • no.41
    • /
    • pp.93-127
    • /
    • 2014
  • Toegye and Yulgok both tried to obtain the extent of goodness from the emotion they feel in reality. Toegye thought the extent of goodness is being obtained by Li[理], Yulgok thought it by Chi[氣]. But Four Bases[四端] as goodness from Li[理] would possibly threat the human identity, and the emotion of appropriateness as goodness from Chi[氣] doesn't even prove itself that it is appropriate. They explain the problems and answers through Theory of Human Mind?Moral Mind. Toegye explains that Moral Mind is meaningful as it make people identify themselves as moral existence, Yulgok explains Moral Mind is meaningful that it satisfies standard of appropriateness. While Toegye and Yulgok define Moral Mind and Human Mind as emotion of Yi-fa[已發], Chutzu defines Moral Mind and Human Mind as consciousness. and he defines consciousness as 'preparing Li(理) and practicing the emotion'. So according to Chutzu, Moral Mind and Human Mind derives the reaction from the Li(理) in order to respond to the external stimulation. Supervision of mind is completed by consciousness of Moral Mind. It means that mind not limited to Yi-fa[已發]. Then we should think that Toegye and Yulgok's Theory of Human Mind?Moral Mind is something newly resulted from their own philosophic problem. Toegye and Yulgok's Theory of Human Mind?Moral Mind is commonly explaining human mind in experiential aspect, and it will be esteemed as definite and realistic theory of Mind because it emphasizes willingness which motivates an essential activity.

Ballistic Protection Effectiveness Analysis of Armor Plates with Various Incident angles using Small Caliber Live Fire Test (소화기 실사격 실험 기반의 장갑 재질에 따른 입사각도별 방호성능 효과분석)

  • Lee, Gun-woo;Baek, Jang-Woon;Lee, Byoung-hwak;Kim, Jin-young;Kim, Jong-Hwan
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.1
    • /
    • pp.55-63
    • /
    • 2021
  • As a study on ballistic protection performance of a weapon system that is used in combat simulation, this paper aims to propose an improvement effect of the ballistic protection performance varying with incident angle of a bullet. For this, live-fire ballistic tests were performed to determine either complete penetration(CP) and partial penetration(PP) of three types of general armor plates made of uniformly rolled steel plates against a small caliber threat using 5.45 mm bullets with various speed. The major test parameter was the material of the weapon system and incident angle of the bullet with the target. Further, to quantitatively analyze the ballistic protection performance, three existing measurement methods were used for ballistic limit velocity. The test results showed that the ballistic protection performance with the incident angle of 30 degrees was 4% to 14% varying with the material of the armor plates greater than that of 0 degrees, which was approximately 1.1 times the performance improvement on average when compared to the conventional angle of incidence of the 0 degree. Those test results are expected to contribute to developing a more realistic combat simulation addressing the parameter improving the ballistic protection performance of an armor plate.

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.