• Title/Summary/Keyword: 방어시스템

Search Result 691, Processing Time 0.026 seconds

Analysis of the Changes in Rainfall Quantile according to the Increase of Data Period (자료기간 증가에 따른 확률강우량의 거동특성 분석)

  • An, Jae-Hyeon;Kim, Tae-Ung;Yu, Cheol-Sang;Un, Yong-Nam
    • Journal of Korea Water Resources Association
    • /
    • v.33 no.5
    • /
    • pp.569-580
    • /
    • 2000
  • To account for the influence of heavy storm in Korea by climate change like global warming, the frequency analyses for annual maximum rainfall sequence in 12 rainfall gauge stations are carried out. In order to analyze the temporal change, the rainfall quantile of each station is estimated by the 30-yr data period being moved from 1954 to 1998 with 1-yr lag. Through the analysis for l00-yr rainfall quantile it has been shown that the recent heavy storms increase comparing with storms in the past. From the additional estimating of the rainfall quantile of each station by the 30-yr data period being cumulated from 1954 to 1998 with 1-yr, the change of the probable rainfall by including the heavy storm duration is realized. When the hydraulic structures are determined, it is important to select the data size and necessary to reestimate the flood prevention capacity in existing river systems.ystems.

  • PDF

Strategic Approach for the Promotion of an Active Participation in the IAEA Program in the Field of Occupational Radiation Protection (직업적 방사선방호를 위한 IAEA 프로그램의 신규 참여 증진 및 효율적 수행 방안)

  • Kim, Kyoung-Pyo;Chang, Si-Young;Han, Moon-Hee
    • Journal of Radiation Protection and Research
    • /
    • v.30 no.4
    • /
    • pp.247-252
    • /
    • 2005
  • The main idea of this paper is to present the general attributes of the current IAEA programs and their prospects in the arena of occupational radiation protection, thus responding to a need to attain a consolidated understanding of the Agency's programs for an effective and efficient deployment of the respective national R&D projects in Korea. In addition, the considerable and beneficial benefits from a participation in the IAEA programs have been analyzed and their immediate relevance has been emphasized. A strategy for the enhancement of an active participation in the program and its efficient implementation has also been established. It is expected that the suggested recommendations such as the long term strategy and the relevant guidelines will be helpful in establishing a nuclear policy for the further development of the international cooperative projects in the future.

A study on Forecasting The Operational Continuous Ability in Battalion Defensive Operations using Artificial Neural Network (인공신경망을 이용한 대대전투간 작전지속능력 예측)

  • Shim, Hong-Gi;Kim, Sheung-Kown
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.25-39
    • /
    • 2008
  • The objective of this study is to forecast the operational continuous ability using Artificial Neural Networks in battalion defensive operation for the commander decision making support. The forecasting of the combat result is one of the most complex issue in military science. However, it is difficult to formulate a mathematical model to evaluate the combat power of a battalion in defensive operation since there are so many parameters and high temporal and spatial variability among variables. So in this study, we used company combat power level data in Battalion Command in Battle Training as input data and used Feed-Forward Multilayer Perceptrons(MLP) and General Regression Neural Network (GRNN) to evaluate operational continuous ability. The results show 82.62%, 85.48% of forecasting ability in spite of non-linear interactions among variables. We think that GRNN is a suitable technique for real-time commander's decision making and evaluation of the commitment priority of troops in reserve.

  • PDF

GPS Anti-Jamming Using Beamforming Technique (빔포밍 기법을 이용한 GPS 재밍 대응)

  • Choi, Chang-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.2
    • /
    • pp.451-456
    • /
    • 2016
  • Because GPS signals are weak, system jamming is a real and present danger. This can happen when the receiver is subjected to intentional or unintentional interference by a transmitter. If the jamming signal is strong enough, the receiver can be operated to take corrective action automatically. Current methods to protect GPS receiver from jamming condition are based on spatial filtering. In this paper, the beamforming as referred to in signal processing technique used in arrays for directional signal reception was suggested and analyzed for anti-jamming. In order to change the directionality of the array when receiving a jamming signal, a beamformer can control the signal at each sensor. Therefore, cutoff angle ${\theta}$ was measured in the opposite direction of the jammer. GPS signals are only processed when the antenna element is within inside the cutoff angle. As a result, GPS positioning can be used in condition under cutoff angle $30^{\circ}$.

Analysis of the criticality of the shipping cask(KSC-7) (KSC-7 사용후핵연료 수송용기 핵임계해석)

  • Yoon, Jung-Hyun;Choi, Jong-Rak;Kwak, Eun-Ho;Lee, Heung-Young;Chung, Sung-Whan
    • Journal of Radiation Protection and Research
    • /
    • v.18 no.2
    • /
    • pp.47-59
    • /
    • 1993
  • The criticality of the shipping cask(KSC-7) for transportion of 7PWR spent fuel assemblies has been calculated and analysised on the basis of neutron transport theory. For criticality analysis, effects of the rod pitches, the fixed neutron absorbers(borated sus+boral) were considered. The effective multiplication factor has been calculated by KENO-Va, Mote Carlo method computer code, with the HANSEN-ROACH 16 group cross section set, which was made for personal computer system. The criticality for the KSC-7 cask was calculated in terms of the fresh fuel which was conservative for the aspects of nuclear critility. From the results of criticality analysis, the calculated Keff is proved to be lower than subcritical limit during normal transportation and under hypothetical accident condition. The maximum calculated criticalities of the KSC-7 were lower the safety criticality limit 1.0 recommended by US 10CFR71 both under normal and hypothetical accident condition. Also, to verify the KSC-7 criticality calculation results by using KENO-Va, it was carried out benchmark calculation with experimental data of B & W(Bobcock and Wilcox) company. From the 3s series of calculation of the KSC-7 cask and benchmark calculation, the cask was safely designed in nuclear criticality, respectively.

  • PDF

Nuclide Identification of Gamma Ray Energy Peaks from an Air Sample for the Emergency Radiation Monitoring (비상시 환경방사능 모니터링을 위한 공기부유진 시료의 감마선에너지 스펙트럼에 대한 핵종판별)

  • Byun, Jong-In;Yoon, Seok-Won;Choi, Hee-Yeoul;Yim, Seong-A;Lee, Dong-Myung;Yun, Ju-Yong
    • Journal of Radiation Protection and Research
    • /
    • v.34 no.4
    • /
    • pp.170-175
    • /
    • 2009
  • For the emergency radiation monitoring using gamma spectrometry, we should sufficiently survey the background spectra as environmental samples with systematic nuclide identification method. In this study, we obtained the gamma ray energy spectrum using a HPGe gamma spectrometry system from an air sample. And we identified nuclide of the gamma ray energy peaks in the spectrum using two methods -1) Half life calculation and 2) survey for cascade coincidence summing peaks using nuclear data. As the results, we produced the nuclide identification results for the air sample.

Analysis of the Vulnerable Area about Inundation on the Upriver Basin of Dam by Flood Simulation Using GIS (GIS 홍수 시뮬레이션에 의한 댐 상류 유역의 침수 취약지역 분석)

  • Um, Dae-Yong;Kim, Ji-Hye
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.6
    • /
    • pp.723-731
    • /
    • 2009
  • Recently, it has been strangely increasing rainfall and rainfall meter by global warming. so flood damage is being increase. It has happened there are so many damaged by influence by backwater of dam. However, the alleviative solutions of flood damages are focused on the lower river basin where the density of population is higher than upper river basin. This research proceeds based on design and build 3D topography model and reflects the topographical factors of upper river basin. It also simulated the circumstances of flooding by investigation of factors of outflow, hence, as a result, we would find out the vulnerable area for flooding and scale of damages effectively. This research suggests the solution and method of flooding for vulnerable area of the flooding to reduce the damages by predicting flooding. Thus, the suggestion may support to make a decision efficiently to prevent the damage of flooding.

A Study on Tasks for the Legal Improvement for the Governance System in Cybersecurity (사이버안보 추진체계의 제도적 개선과제 연구)

  • Park, Sangdon;Kim, Injung
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.3-10
    • /
    • 2013
  • Cyber attacks are threats to national security. Today, cybersecurity threats have various types, the theft or spread of privacy and national secret, the realization of direct attacks to infrastructure and the hacktivism with political or social objectives. Furthermore, There are special situations in South Korea because of North Korea's threats. Thus, It is necessary to handle cybersecurity as a kind of national security problem. It is a time to identify problems of governance system in cybersecurity and to improve related Acts and subordinate statutes. There are several tasks for legal improvement for governance system in cybersecurity. They are improving legal bases for the roles of the relevant authorities in cybersecurity, consolidating national joint response to cyber accidents, establishing and vitalizing information sharing system, constructing foundation of cybersecurity through industry promotion and manpower development, and acquiring defensive tools by enhancement research an development. In order to address these challenges, it is necessary to pay much attention to enactment and to revision laws and to practice legislative procedure.

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.