• Title/Summary/Keyword: 확산 취약성

Search Result 191, Processing Time 0.026 seconds

Analysis of Propagation Environment for Selecting R-Mode Reference and Integrity Station (R-Mode 보정국과 감시국 선정을 위한 전파환경 분석에 관한 연구)

  • Jeon, Joong-Sung;Jeong, Hae-Sang;Gug, Seung-Gi
    • Journal of Navigation and Port Research
    • /
    • v.45 no.1
    • /
    • pp.26-32
    • /
    • 2021
  • In ocean field, the spread of the Fourth Industrial Revolution based on information and communication technology requires high precision and stable PNT&D (Position, Navigation, Timing and Data). As the IMO (International Maritime Organization) and IALA (The International Association of Marine Aids to Navigation and Lighthouse Authorities) are requiring backup systems due to mitigate vulnerabilities and the increase of dependency on GNSS (Global Navigation Satellite System), Korea is conducting a research & development of R-Mode. An DGPS (Differentiate Global Positioning System) reference station that uses MF, an existing maritime infrastructure, and AIS (Automatic Identification System) base stations that use 34 integrity station and VHF will be utilized in this study to avoid redundant investment. Because there are radio shadow areas that display low signal levels in the west sea, the establishment of new R-Mode reference and integrity station will be intended to resolve problems regrading the radio shadow area. Because the frequency has a characteristic in that radio wave transmits well along the ground (water surface) in low frequency band, simulation and measurement were conducted therefore this paper to propose candidate sites for R-Mode reference and integrity station resulted through p wave's propagation characteristics analysis. Using this paper, R-Mode reference and integrity station can be established at appropriate locations to resolve radio shadow areas in other regions.

An Analysis Model Study on the Vulnerability in the Infectious Disease Spread of Public-use Facilities neighboring Senior Leisure Welfare Facilities (노인여가복지시설 주변 다중이용시설에서의 감염병 확산 취약성 분석 모델에 관한 연구)

  • Kim, Mijung;Kweon, Jihoon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.28 no.4
    • /
    • pp.41-50
    • /
    • 2022
  • Purpose: This study aims to suggest an analysis model finding the relationship between building scale characteristics of Public-use facilities and infectious disease outbreaks around senior leisure welfare facilities and the features and their scopes where quarantine resources are to be concentrated. Methods: Reviewing previous studies found the user characteristics of senior leisure welfare facilities and scale characteristics of urban architectures. The data preprocessing was performed after collecting building data and infectious disease outbreak data in the analysis area. This study derived data for attributes of building size and frequency of infectious disease outbreaks in Public-use facilities around senior leisure welfare facilities. A computing algorithm was implemented to analyze the correlation between the building size characteristics and the infectious disease outbreak frequency as per the change of the spatial scope. Results: The results of this study are as follows: First, the suggested model was to analyze the correlation between the infection frequency and the number of senior leisure welfare facilities, the number of Public-use facilities, building area, total floor area, site area, height, building-to-land ratio, and floor area ratio varied as per the change of spatial scope. Second, correlation results varied between the infection frequency and the number of senior leisure welfare facilities, the number of Public-use facilities, building area, total floor area, site area, height, building-to-land ratio, and floor area ratio. Third, a negative correlation appeared in the analysis between the number of senior leisure welfare facilities and infection frequency. And positive correlations appeared noticeably in the study between the number of Public-use facilities, building area, total floor area, height, building-to-land ratio, and floor area ratio. Implications: This study can be used as primary data on the utilization of limited quarantine resources by analyzing the relationship between the Public-use facilities around the senior leisure welfare facilities and the spread of infectious diseases. In addition, it suggests that infectious disease prevention measures are necessary considering the spatial scope of the analysis area and the size of buildings.

A Study on the Frictional Characteristics of Fiber Reinforced Composites under Corrosive Environment (부식 환경 하에서의 섬유강화복합재료의 마찰 및 마모 특성 연구)

  • Choong-Yong Park;Dong-Hyun Park;Soo-Jeong Park;Yun-Hae Kim
    • Composites Research
    • /
    • v.36 no.1
    • /
    • pp.37-41
    • /
    • 2023
  • The treated water inside the ballast electrolytic cell creates a highly alkaline atmosphere due to hydroxide generated at the DSA(Dimension Stable Anode) electrode during electrolysis. In this study, a composite material that can replace the weakness of the PE-coated steel pipe used in the existing ballast pipe was prepared. The test samples are BRE(Basalt fiber reinforced epoxy), BRP(Basalt fiber reinforced unsaturated polyester), GRE(Glass fiber reinforced epoxy), and GRP(Glass fiber reinforced unsaturated polyester). And then it was immersed in NaOH for 720 hours. The friction test of each specimen was conducted. The Friction coefficient analysis according to material friction depth and interfacial adhesion behavior between resin and fiber were analyzed. As a result, the mechanism of interfacial separation between resin and fiber could be analyzed. In the case of the unsaturated polyester resin with low interfacial bonding strength the longer the immersion time in the alkaline solution, the faster the internal deterioration caused by the deterioration that started from the surface, resulting in a decrease in the friction coefficient. It is hoped that this study will help to understand the degradation behavior of composite materials immersed in various chemical solutions such as NaOH, acid, and sodium hypochlorite in the future.

Analysis of Homogenized Laser Beam Display by a Polymeric Stretchable Diffuser (스트레쳐블 폴리머 디퓨저를 이용한 균질 레이저 디스플레이 해석)

  • Lee, Jae-Won;Lee, Seon-Bong;Choi, Hae-Woon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.1-7
    • /
    • 2014
  • A stretchable polymeric membrane shaped diffuser was used to homogenize the coherent laser beam. The developed RGB module was used to focus and defocus test by beam combiners. Average oscillation frequency was set at 180Hz~300Hz and it resulted in the best homogenization effect in visual range. The blue laser module turned out to be the worst case for the transmission and primary reason is believed to be the short length of irradiated laser beam. The developed system removed the speckling and the brightness was decreased by 10 ~ 20% for the RGB laser. Overall the brightness was decreased by 13% and homogenity with respect to the temporal axis was improved from 30fs to 110fs.

Analysis on Security Vulnerabilities of a Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks (계층적 무선 센서 네트워크를 위한 패스워드 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.63-70
    • /
    • 2015
  • The numerous improved schemes of user authentication based on password have been proposed in order to prevent the data access from the unauthorized person. The importance of user authentication has been remarkably growing in the expanding application areas of wireless sensor networks. Recently, emerging wireless sensor networks possesses a hierarchy among the nodes which are divided into cluster heads and sensor nodes. Such hierarchical wireless sensor networks have more operational advantages by reducing the energy consumption and traffic load. In 2012, Das et al. proposed a user authentication scheme to be applicable for the hierarchical wireless sensor networks. Das et al. claimed that their scheme is effectively secure against the various security flaws. In this paper, author will prove that Das et al.'s scheme is still vulnerable to man-in-the-middle attack, password guessing/change attack and does not support mutual authentication between the user and the cluster heads.

A Study on the Social Welfare Library Policy for the Information Alienated Groups (정보소외계층을 위한 도서관의 문화복지 정책에 관한 연구)

  • Lee, Jung-Yeoun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.2
    • /
    • pp.27-39
    • /
    • 2011
  • This study analyzed the policy of culture welfare in libraries for the information alienated groups. This study suggested several improvements as a conclusion. Research analyzed organizational tasks and policies for Ministry of Culture, Sports and Tourism, Planning Group for Library and Information Policy and the policies for libraries. First, library service for alienated class was centered in short term period projects. Second, it is hardware oriented such as building small libraries, places for disabled person, multi-cultural libraries. Due to the decentralization of policies for the groups with alienated information, and lack of public supportive policies for private library for the disabled, developing cooperative system is difficult. Third, we revealed that policies for quantitative production of alternative material were achieved. So, this study suggested professional policy in integrative cooperation in accordance with each domain and creation of a separate welfare library policy department and its activity.

A Big Data Application for Anomaly Detection in VANETs (VANETs에서 비정상 행위 탐지를 위한 빅 데이터 응용)

  • Kim, Sik;Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.175-181
    • /
    • 2014
  • With rapid growth of the wireless mobile computing network technologies, various mobile ad hoc network applications converged with other related technologies are rapidly disseminated nowadays. Vehicular Ad Hoc Networks are self-organizing mobile ad hoc networks that typically have moving vehicle nodes with high speeds and maintaining its topology very short with unstable communication links. Therefore, VANETs are very vulnerable for the malicious noise of sensors and anomalies of the nodes in the network system. In this paper, we propose an anomaly detection method by using big data techniques that efficiently identify malicious behaviors or noises of sensors and anomalies of vehicle node activities in these VANETs, and the performance of the proposed scheme is evaluated by a simulation study in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

BSC Based Measurement of Satisfaction Degree For Based BIM Construction Projets (BSC를 기반으로 한 BIM프로젝트의 만족도 측정에 관한 연구)

  • Song, Mi-Rim;Yoon, Su-Won;Chin, Sang-Yoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.4
    • /
    • pp.117-129
    • /
    • 2011
  • Building Information Modeling technology (BIM) is one of the most effective solutions to deal with the trend that buildings are getting more and more complicated, large-scaled, and multiple-purposed. BIM in the construction industry is increasingly adopted since the Korea Public Procurement Service announced that BIM would be obligated in a construction project whose total cost is over 50 billion won from 2012. This fact has boosted BIM related research projects as well. However, the majority of the studies have been focusing on the solutions with technological points of view and there has been lack of research on how much degree project stakeholders are satisfied with the BIM adoption in their projects. Therefore, the objective of this study is to investigate the current status and satisfaction degree of stakeholders in a synthesized point of view in BIM-based projects in order to identify critical factors and weak points in the BIM adoption process. The results of this study would greatly help to improve the strategies and processes in BIM-based projects as well as to increase the satisfaction degree of BIM utilization in a project.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.