• Title/Summary/Keyword: ATTACK AREA

Search Result 352, Processing Time 0.029 seconds

An Application of k-Means Clustering to Vehicle Routing Problems (K-Means Clustering의 차량경로문제 적용연구)

  • Ha, Je-Min;Moon, Geeju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.1-7
    • /
    • 2015
  • This research is to develop a possible process to apply k-means clustering to an efficient vehicle routing process under time varying vehicle moving speeds. Time varying vehicle moving speeds are easy to find in metropolitan area. There is a big difference between the moving time requirements of two specific delivery points. Less delivery times are necessary if a delivery vehicle moves after or before rush hours. Various vehicle moving speeds make the efficient vehicle route search process extremely difficult to find even for near optimum routes due to the changes of required time between delivery points. Delivery area division is designed to simplify this complicated VRPs due to time various vehicle speeds. Certain divided area can be grouped into few adjacent divisions to assume that no vehicle speed change in each division. The vehicle speeds moving between two delivery points within this adjacent division can be assumed to be same. This indicates that it is possible to search optimum routes based upon the distance between two points as regular traveling salesman problems. This makes the complicated search process simple to attack since few local optimum routes can be found and then connects them to make a complete route. A possible method to divide area using k-means clustering is suggested and detailed examples are given with explanations in this paper. It is clear that the results obtained using the suggested process are more reasonable than other methods. The suggested area division process can be used to generate better area division promising improved vehicle route generations.

Performance Evaluation of Transmitting Brainwave Signals for Driver's Safety in Urban Area Vehicular Ad-Hoc Network (운전자의 안전을 위한 도심지역 자동차 애드혹 통신망의 뇌파전송 성능평가)

  • Jo, Jun-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.26-32
    • /
    • 2011
  • Recently, in the U-health area, there are research related on monitoring brainwaves in real-time for coping with emergent situations like the fatigue driving, cerebral infarction or the heart attack of not only the patients but also the normal elderly folks by transmitting of the EEG(Electroencephalograph). This system could be applied to hospitals or sanatoriums. In this paper, it is applied for the vehicular ad-hoc network to prevent the car accident in advance by monitoring the brainwaves of a driver in real-time. In order to do this, I used mobile ad-hoc nodes supported in the Opnet simulator for the efficient EEG brainwave transmission in the VANET environment. The vehicular ad-hoc networks transmitting the brainwaves to the nearest road-side unit are designed and simulated to draw an efficient and proper vehicular ad-hoc network environment.

Corrosion Behavior of Cr-bearing Corrosion Resistant Rebar in Concrete with Chloride Ion Content

  • Tae, Sung Ho
    • Architectural research
    • /
    • v.7 no.1
    • /
    • pp.49-54
    • /
    • 2005
  • Conventional studies have focused on the reduction in the water-cement ratio, the use of various admixtures, etc., to ensure the durability of reinforced concrete structures against such deterioration factors as carbonation and chloride attack. However, improvement in the concrete quality alone is not considered sufficient or realistic for meeting the recent demand for a service life of over 100 years. This study intends to improve the durability of reinforced concrete structures by improvement in the reinforcing steel, which has remained untouched due to cost problems, through subtle adjustment of the steel components to keep the cost low. As a fundamental study on the performance of Cr-bearing rebars in steel reinforced concrete structures exposed to corrosive environments, The test specimens were made by installing 8 types of rebars in concretes with a chloride ion content of 0.3, 0.6, 1.2, 2.4 and $24kg/m^3$. Corrosion accelerated curing were then conducted with them. The corrosion resistance of Cr-bearing rebars was examined by measuring crack widths, half-cell potential, corrosion area and weight loss after 155 cycles of corrosion-accelerating curing. The results of the study showed that the corrosion resistance increased as the Cr content increased regardless of the content of chloride ions, and that the Cr-bearing rebars with a Cr content of 5% and 9% showed high corrosion resistance in concretes with a chloride ion content of 1.2 and $2.4kg/m^3$, respectively.

Evaluation of Effective Jamming/Deception Area of Active Decoy against Ground Tracking Radars on Dynamic Combat Scenarios (동적 교전 시나리오에서 지상 추적 레이다에 대한 이탈방사체의 효과적 재밍/기만 영역 분석)

  • Rim, Jae-Won;Lee, Sangyeob;Koh, Il-Suek;Baek, Chung;Lee, Seungsoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.4
    • /
    • pp.269-278
    • /
    • 2017
  • We analyze the jamming/deception performance of an active decoy against ground tracking radars on dynamic combat scenarios. Based on the movement and the interference flow of an airborne platform, the trajectories of the active decoy is accurately calculated by solving 6-degree of freedom equations of motion. On realistic combat scenarios, numerical simulations are examined to analyze the jamming performance of the decoy for various movements of the platform and RF specifications of the active decoy. Effective jamming/deception area against the ground tracking radars is estimated from the simulation.

The Effects of Acid Treatment of Bentonite on Its Crystal Structure (산처리 과정에 따른 벤토나이트의 결정구조 변화)

  • Yoon, Soh-Joung;Moon, Hi-Soo
    • Economic and Environmental Geology
    • /
    • v.27 no.6
    • /
    • pp.507-521
    • /
    • 1994
  • Bentonite occurs in the Janggi Conglomerate of Tertiary age and consists mainly of montmorillonite with Mg as predominant interlayer cations. The bentonite was reacted with various concentrations of sulfuric acid (0.8~1.5M) for various reaction time (1-10h) at $103^{\circ}C$. Cation exchange capacity, exchangeable cations, surface area and solid acidity of the original bulk and acid activated bentonites were measured. Chemical analysis, X-ray diffraction, differential thermal analysis and infrared spectroscopy were used to characterize the changes in structure and properties of the acid activated bentonite. The dissolution of octahedral cations occurs not only from the edge of the clay platelets but also throughout the whole clay structure creating vacant octahedral sites. These lattice defects are created by $H^+$ diffused into the smectite layers. The cations leached possibly from the octahedral sheets are adsorbed on the interlayer exchange sites. They are exchanged with hydronium ions again by stronger acid attack. These reactions create wedge-shaped pores resulting in the increase of the surface area and the changes the morphology in the lattice structure.

  • PDF

Design of a Kerberos Authentication Mechanism based on Password (패스워드 기반의 커버로스 인증 메커니즘 설계)

  • 조경옥;김종우;하태진;한승조
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.733-738
    • /
    • 2004
  • In a distributed network system, Kerberos certification mechanism is operated by a user in local area on the premise reliability of Kerberos server in another area. But it has a demerit. If security information of certification server between Kerberos servers is released, Kerberos server can not guarantee the reliability. To solve this problem, the proposed mechanism prevents password speculating attack by increasing the random of password certifier through use of distributed password in stead of certification center and certification which was presented by existing Kerberos mechanism. Besides, it used password based certification method which uses secret distributed technique

  • PDF

Digital Watermarking of Medical Images (의료영상의 디지털 워터마킹)

  • Lee, Sang-Bock;Lee, Sam-Yol;Lee, Jun-Haeng
    • Journal of radiological science and technology
    • /
    • v.27 no.2
    • /
    • pp.13-19
    • /
    • 2004
  • This study proposes how to insert a strong watermark creating a big change in the areas of edge and texture. While conversion by existing Fourier transformation can acquire information for all ranges of frequency domain from the image, Wavelet transformation can manipulate edge and texture area selectively. Therefore, through wavelet transformation concerned area may be selected and watermarks in copyright formation are inserted. Our proposed algorithm was compared to Xia's watermarking technique using wavelet transformation. Its fidelity and robustness were tested with attack methods used in existing papers and it turns out that the proposed algorithm using HVS properties is more superior to Xia's techniques.

  • PDF

Digital Watermarking Algorithm of Still Image Using Human Visual System Characteristics (인간시각체계 특성을 이용한 정지영상 디지털 워터마킹 알고리즘)

  • 지남현;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.31-38
    • /
    • 2003
  • This paper proposes method to insert soong Watermark considering dull HVS properties to big change of Edge and Texture area. While conversion of existent Fourier form can acquire information for whole frequency ingredient of image, but Wavelet transform can look for Edge and Texture area locally. Therefore, use Wavelet transform to use HVS properites, and compare with Xia's Watermarking techniques to use Wavelet transform simply arid experimented these proposal algorithm. Experimented about fidelity and robusthness by attack method that is used in existing paper, and as a result, confirmed that proposal algorithm that use HVS properties is more superior than Xia's techniques.

  • PDF

Numerical simulation approach for structural capacity of corroded reinforced concrete bridge

  • Zhou, Xuhong;Tu, Xi;Chen, Airong;Wang, Yuqian
    • Advances in concrete construction
    • /
    • v.7 no.1
    • /
    • pp.11-22
    • /
    • 2019
  • A comprehensive assessing approach for durability of reinforced concrete structures dealing with the corrosion process of rebar subjected to the attack of aggressive agent from environment was proposed in this paper. Corrosion of rebar was suggested in the form of combination of global corrosion and pitting. Firstly, for the purposed of considering the influence of rebar's radius, a type of Plane Corrosion Model (PCM) based on uniform corrosion of rebar was introduced. By means of FE simulation approach, global corrosion process of rebar regarding PCM and LCM (Linear Corrosion Model) was regressed and compared according to the data from Laboratoire $Mat{\acute{e}}riaux$ et $Durabilit{\acute{e}}$ des Constructions (LMDC). Secondly, pitting factor model of rebar in general descend law with corrosion degree was introduced in terms of existing experimental data. Finally, with the comprehensive numerical simulation, the durability of an existing arch bridge was studied in depth in deterministic way, including diffusion process and sectional strength of typical cross section of arch, crossbeam and deck slab. Evolution of structural capacity considering life-cycle rehabilitation strategy indicated the degradation law of durability of reinforced arch bridges.

A Study on WB(Water-Bubble) Based Highly Secure Flexible Network Section (WB(Water-Bubble) 기반의 강한 보안성을 갖는 탄력적 네트워크 구간에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.737-746
    • /
    • 2017
  • In 2017, amid changes in the security market such as integrated security (IS) and convergence security (CS), a variety of security paradigms in terms of operation and management have been suggested. Rather than changing existing network infrastructure and bringing about fluid, multi-dimensional changes, these solutions and technologies focus entire security capacity on a primary protection, leading to network infrastructure suffering from unexpected inherent violations and problems in a continued manner. Therefore, it is time to propose and develop a flexible network section that can protect from attacks of similar pattern and concentrated traffic attacks by applying a new concept of WB (Water-Bubble) to network infrastructure and analyzing on the basis of experiment and installation. Methodology of the WB-based highly secure flexible network section proposed in this study is expected to provide materials for studies on how to achieve network section security taking into account three major limitations and security standards: fluidity, unpredictability, and non-area scalability by contact point ratio, by changing a network area predicted to be the final target of attack into resonant network section (area) with flexible area changes.