• Title/Summary/Keyword: 물리적취약성

Search Result 242, Processing Time 0.022 seconds

Conservation Treatment and Material Analysis of Amber Relics Found in the Huryeongtong of Geumsansa Temple (금산사 후령통(候鈴筒) 내 발견 호박유물의 과학적 분석과 보존처리)

  • Ham, Chul-hee;Kang, So-yeong
    • Korean Journal of Heritage: History & Science
    • /
    • v.46 no.4
    • /
    • pp.78-89
    • /
    • 2013
  • For safe conservation treatment of damaged accessory relics that were unearthed, the quality of the material should be accurately identified through a nondestructive analysis and failure analysis. This study provides the basic conservational scientific data regarding material analyses and conservation treatment that were conducted for 11 relics, including amber and agate that were discovered during the repair of Geumsansa Temple's Hall of Maitreya Buddha and Left Attendant Buddhas in June 2008. An ultraviolet analysis, SEM-EDS analysis and FT-IR microscope analysis revealed that the physical and chemical characteristics of the 11 relics are the same as those of amber. It is inferred that the cracks and exfoliation of the surface of most amber relics is attributable to darkening of the color due to C=C bond oxidation. It is also assumed that cracks and exfoliation occurred from the weathered layer on the amber surface. As such, it is appropriate to engage in conservation treatment of the damaged amber relics by using $Paraloid^{(R)}$ B67 reinforcing agent that is diluted in nonpolar solvent. The greatest care is needed for future handling of organic artifacts.

Approximate Lost Data Recovery Scheme for Data Centric Storage Environments in Wireless Sensor Networks (무선 센서 네트워크 데이터 중심 저장 환경을 위한 소실 데이터 근사 복구 기법)

  • Seong, Dong-Ook;Park, Jun-Ho;Hong, Seung-Wan;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.21-28
    • /
    • 2012
  • The data centric storage (DCS) scheme is one of representative methods to efficiently store and maintain data generated in wireless sensor networks. In the DCS schemes, each node has the specified data range for storing data. This feature is highly vulnerable to the faults of nodes. In this paper, we propose a new recovery scheme for the lost data caused by the faults of nodes in DCS environments. The proposed scheme improves the accuracy of query results by recovering the lost data using the spatial continuity of physical data. To show the superiority of our proposed scheme, we simulate it in the DCS environments with the faults of nodes. In the result, our proposed scheme improves the accuracy by about 28% through about 2.5% additional energy consumption over the existing scheme.

A Study on a Diagnosis System for HSR Turnout Systems (I) (고속철도 분기기 시스템 진단 시스템에 관한 연구(I))

  • Kim, Youngseok;Yoon, Yeonjoo;Back, Inchul;Ryu, Youngtae;Han, Hyunsu;Hwang, Ankyu;Kang, Hyungseok;Lee, Jongwoo
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.2
    • /
    • pp.210-222
    • /
    • 2017
  • Railway turnout systems play a key role in railway systems that change train directions. The turnout systems are one of the weakest systems in railway systems, and consecutive maintenance is required. A turnout diagnostic system can automatically measure the turnout status and its deterioration. To diagnose the turnout systems, we follow conventional maintenance procedures and need to identify their physical characteristics to coincide the procedures and the characteristics. According to the physical characteristics, we should choose and install adequate sensors on the turnout systems to measure their physical characteristics. We studied the phenomenon of the turnout system responses for point moving and train running on the turnout systems. We installed sensors on the turnout system in a revenue line to measure the identified physical quantities and to reveal the robustness of the sensors under the turnout system environment.

Dismantling and Restoration of the Celadon Stool Treasure with an Openwork Ring Design (보물 청자 투각고리문 의자의 해체 및 복원)

  • KWON, Ohyoung;LEE, Sunmyung;LEE, Jangjon;PARK, Younghwan
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.2
    • /
    • pp.200-211
    • /
    • 2022
  • The celadon stools with an openwork ring design which consist of four items as one collection were excavated from Gaeseong, Gyeonggi-do Province. The celadon stools were designated and managed as treasures due to their high arthistorical value in the form of demonstrating the excellence of celadon manufacturing techniques and the fanciful lifestyles during the Goryeo Dynasty. However, one of the items, which appeared to have been repaired and restored in the past, suffered a decline in aesthetic value due to the aging of the treatment materials and the lack of skill on the part of the conservator, raising the need for re-treatment as a result of structural instability. An examination of the conservation condition prior to conservation treatment found structural vulnerabilities because physical damage had been artificially inflicted throughout the area that was rendered defective at the time of manufacturing. The bonded surfaces for the cracked areas and detached fragments did not fit, and these areas and fragments had deteriorated because the adhesive trickled down onto the celadon surface or secondary contaminants, such as dust, were on the adhesive surface. The study identified the position, scope, and conditions of the bonded areas at the cracks UV rays and microscopy in order to investigate the condition of repair and restoration. By conducting Fourier-transform infrared spectroscopy(FT-IR) and portable x-ray fluorescence spectroscopy on the materials used for the former conservation treatment, the study confirmed the use of cellulose resins and epoxy resins as adhesives. Furthermore, the analysis revealed the addition of gypsum(CaSO4·2H2O) and bone meal(Ca10 (PO4)6(OH)2) to the adhesive to increase the bonding strength of some of the bonded areas that sustained force. Based on the results of the investigation, the conservation treatment for the artifact would focus on completely dismantling the existing bonded areas and then consolidating vulnerable areas through bonding and restoration. After removing and dismantling the prior adhesive used, the celadon stool was separated into 6 large fragments including the top and bottom, the curved legs, and some of the ring design. After dismantling, the remaining adhesive and contaminants were chemically and physically removed, and a steam cleaner was used to clean the fractured surfaces to increase the bonding efficacy of the re-bonding. The bonding of the artifact involved applying the adhesive differently depending on the bonding area and size. The cyanoacrylate resin Loctite 401 was used on the bonding area that held the positions of the fragments, while the acrylic resin Paraloid B-72 20%(in xylene) was treated on cross sections for reversibility in the areas that provided structural stability before bonding the fragments using the epoxy resin Epo-tek 301-2. For areas that would sustain force, as in the top and bottom, kaolin was added to Epo-tek 301-2 in order to reinforce the bonding strength. For the missing parts of the ring design where a continuous pattern could be assumed, a frame was made using SN-sheets, and the ring design was then modeled and restored by connecting the damaged cross section with Wood epos. Other restoration areas that occurred during bonding were treated by being filled with Wood epos for aesthetic and structural stabilization. Restored and filled areas were color-matched to avoid the feeling of disharmony from differences of texture in case of exhibitions in the future. The investigation and treatment process involving a variety of scientific technology was systematically documented so as to be utilized as basic data for the conservation and maintenance.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

The Study on the Fragment Ejection Velocity and Spray Angle from a High Explosive Cylindrical Warhead (실린더형 HE 탄두 폭발 시 파편의 속도 및 발사각 추정방법 연구)

  • Hwang, Changsu;Park, Younghyun;Park, Seikwon;Jung, Daehan;Lee, Moonsik;Kang, Sunbu;Kim, Deuksu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.12
    • /
    • pp.904-912
    • /
    • 2019
  • We have studied the numerical analysis about the fragment ejection velocity and spray angle when the High Explosive warhead detonated at proximity distance at an aircraft. To study the physical quantities about the warhead components is very important to assessment the vulnerability of aircraft. Generally, the physical quantities about the components of a warhead such as the mass, length, diameter and charge to mass ratio are unknown. Therefore, it is required to estimate the physical quantities by using physical continuities of similar threats. The empirical formulas to understand the dependence among charge to mass ratio, length and diameter ratio were driven by using the physical parameters of similar threatening such as terrier, sparrow. As a result, we confirmed that the dead mass ratio was closed to 20% of warhead mass since the metal case of the proximity threat acts as a simple carrier. This implies that the effective length and diameter of High Explosive Compound is smaller than the length and diameter of warhead, and become a key to understand the large ejection gradient velocity and small spray angle of fragments within 6 degree.

A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node (무선 센서 노드의 강한 보안 강도를 위해 이중 해쉬 체인을 적용한 키 사전 분배 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8C
    • /
    • pp.633-641
    • /
    • 2008
  • Since WSNs encounter attacks, such as jamming or eavesdropping without physical access occurs, security is one of the important requirements for WSNs. The key pre-distribution scheme that was recently researched for advance of security in WSNs distributes the keys and probability with the use of q-composite random key pre-distribution method, but there is a high probability that no key shared between sensor nodes, and it takes a lot of time and energy to find out the shared key. Therefore, it is not suitable for WSNs. In order to enhance stability of a node that plays a role of gateway without depending on probabilistic key, this paper proposesa key pre-distribution scheme combined with random key pre-distribution scheme and double hash chain. Since the proposed scheme can maintain a small storage place and strong security strengths, it is more efficient than the existing schemes with the same security strengths. In addition, since it uses a small size of key generation key set, it can reduce a great deal of storage overhead.

Influences of Timber Harvesting Methods on Soil Disturbance (임목생산방법에 따른 토양교란 영향 평가)

  • Lee, Eunjai;Li, Qiwen;Eu, Song;Han, Sang-Kyun;Im, Sangjun
    • Journal of Korean Society of Forest Science
    • /
    • v.106 no.2
    • /
    • pp.204-212
    • /
    • 2017
  • Soil disturbance caused by timber harvesting is widely recognized as a potential threat to forest utilization. The degree and extent of soil disturbance is believed to vary with respect to harvesting methods and logging machines. This study has conducted to assess the degree of soil disturbance associated with ground-based cut-to-length (GC) and cable yarding with whole tree (CW) harvesting methods. Soil disturbance was classified using a visual assessment of harvest unit. The properties of soils in different disturbance levels were also evaluated to understand the influence of timber harvesting on soil structure with soil core sampling method. The deep disturbance and soil compaction were observed in sites by 48% and 23% through harvesting areas for GC and CW logging methods, respectively. The results showed that logging machine and number of machine passage had significant influences on soil bulk density and porosity. Soil disturbance types such as rutted, slash cover, and compact were influenced by equipment travel trends in a GC method.

A Case Study on the UK Park and Green Space Policies for Inclusive Urban Regeneration (영국의 포용적 도시재생을 위한 공원녹지 정책 사례 연구)

  • Kim, Jung-Hwa;Kim, Yong-Gook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.5
    • /
    • pp.78-90
    • /
    • 2019
  • The purpose of this study is to explore the direction of developing policies for parks and green spaces for inclusive urban planning and regeneration. By reviewing the status, budget, and laws pertaining to urban parks in Korea, as well as assessing the inclusivity of urban parks, this study revealed the problems and limitations in Korea as follows. First, the urban park system, which takes into account indicators such as park area per capita and green space ratio, is focused only on quantitative expansion. Second, the distribution of urban parks is unequal; hence, the higher the number of vulnerable residents, the lower the quality of urban parks and green spaces. Moreover, this study focused on the UK central government, along with the five local governments, including London, Edinburgh, Cardiff, Belfast, and Liverpool. Through an analysis of the contexts and contents establishing UK park and green space policies that can reduce socioeconomic inequalities while at the same time increase inclusiveness. This study discovered the following. The government's awareness of the necessity of tackling socioeconomic inequalities to make an inclusive society, the change in the urban regeneration policies from physical redevelopment to neighborhood renewal, and the survey and research on the correlation of parks and green spaces, inequality, health, and well-being provided the background for policy establishment. As a result, the creation of an inclusive society has been reflected in the stated goals of the UK's national plan and the strategies for park and green space supply and qualitative improvement. Deprived areas and vulnerable groups have been included in many local governments' park and green space policies. Also, tools for analyzing deficiencies in parks and methods for examining the qualitative evaluation of parks were developed. Besides, for the sustainability of each project, various funding programs have been set up, such as raising funds and fund-matching schemes. Different ways of supporting partnerships have been arranged, such as the establishment of collaborative bodies for government organizations, allowing for the participation of private organizations. The study results suggested five policy schemes, including conducting research on inequality and inclusiveness for parks and green spaces, developing strategies for improving the quality of park services, identifying tools for analyzing policy areas, developing park project models for urban regeneration, and building partnerships and establishing support systems.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF