• Title/Summary/Keyword: Attack Analysis

Search Result 1,704, Processing Time 0.031 seconds

Prediction Equation for Chloride Diffusion in Concrete Containing GGBFS Based on 2-Year Cured Results (2년 양생 실험결과를 이용한 고로슬래그 미분말 콘크리트의 염화물 확산 예측식)

  • Yoon, Yong-Sik;Cho, Sung-Jun;Kwon, Seung-Jun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.23 no.2
    • /
    • pp.1-9
    • /
    • 2019
  • GGBFS(Ground Granulated Blast Furnace Slag), one of the representative concrete mineral admixtures, improves the long-term durability and engineering performance of concrete by latent hydraulic activity. In this study, considering 3 levels of W/B(0.37, 0.42, 0.47) and GGBFS replacement ratio(0 %, 30 %, 50 %), durability performances for chloride attack are evaluated, and equations which predict behavior of accelerated chloride diffusion are proposed. Also, the relationship between accelerated chloride diffusion coefficient and passed charge is evaluated. In target curing day, accelerated chloride diffusion tests(Tang's method, ASTM C 1202) and compressive strength(KS F 2405) are performed. In the 730 day's results of accelerated chloride diffusion coefficient, GGBFS concrete has up to 28 % of decreasing ratio compared to OPC concrete, and in those of passed charge, GGBFS concrete has up to 29 % of decreasing ratio compared to OPC concrete. Also, it is deemed that the impact of variation of W/B is less in GGBFS concrete than in OPC concrete. The equations which predict accelerated chloride diffusion coefficient and passed charge are drawn, based on the characteristics of mixture and test results. The equation which predicts passed charge shows slightly higher coefficient of determination than that which predicts accelerated chloride diffusion coefficient.

Enhanced and Practical Alignment Method for Differential Power Analysis (차분 전력 분석 공격을 위한 향상되고 실제적인 신호 정렬 방법)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.93-101
    • /
    • 2008
  • Side channel attacks are well known as one of the most powerful physical attacks against low-power cryptographic devices and do not take into account of the target's theoretical security. As an important succeeding factor in side channel attacks (specifically in DPAs), exact time-axis alignment methods are used to overcome misalignments caused by trigger jittering, noise and even some countermeasures intentionally applied to defend against side channel attacks such as random clock generation. However, the currently existing alignment methods consider only on the position of signals on time-axis, which is ineffective for certain countermeasures based on time-axis misalignments. This paper proposes a new signal alignment method based on interpolation and decimation techniques. Our proposal can align the size as well as the signals' position on time-axis. The validity of our proposed method is then evaluated experimentally with a smart card chip, and the results demonstrated that the proposed method is more efficient than the existing alignment methods.

Shape and Spacing Effects on Curvy Twin Sail for Autonomous Sailing Drone (무인 해상 드론용 트윈 세일의 형태와 간격에 관한 연구)

  • Pham, Minh-Ngoc;Kim, Bu-Gi;Yang, Changjo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.931-941
    • /
    • 2020
  • There is a growing interest this paper for ocean sensing where autonomous vehicles can play an essential role in assisting engineers, researchers, and scientists with environmental monitoring and collecting oceanographic data. This study was conducted to develop a rigid sail for the autonomous sailing drone. Our study aims to numerically analyze the aerodynamic characteristics of curvy twin sail and compare it with wing sail. Because racing regulations limit the sail shape, only the two-dimensional geometry (2D) was open for an optimization. Therefore, the first objective was to identify the aerodynamic performance of such curvy twin sails. The secondary objective was to estimate the effect of the sail's spacing and shapes. A viscous Navier-Stokes flow solver was used for the numerical aerodynamic analysis. The 2D aerodynamic investigation is a preliminary evaluation. The results indicated that the curvy twin sail designs have improved lift, drag, and driving force coefficient compared to the wing sails. The spacing between the port and starboard sails of curvy twin sail was an important parameter. The spacing is 0.035 L, 0.07 L, and 0.14 L shows the lift coefficient reduction because of dramatically stall effect, while flow separation is improved with spacing is 0.21 L, 0.28 L, and 0.35 L. Significantly, the spacing 0.28 L shows the maximum high pressure at the lower area and the small low pressure area at leading edges. Therefore, the highest lift was generated.

Improving the DIMP Sorption Capacity Durability of Zirconium Based Metal-Organic Frameworks Coated with Polydimethylsiloxane at High Humidity (PDMS 코팅을 통한 지르코늄 기반 금속유기골격체의 고습 환경에서 DIMP 흡착 성능 지속성 개선)

  • Jang, Wonhyeong;Jeong, Sangjo
    • Applied Chemistry for Engineering
    • /
    • v.33 no.3
    • /
    • pp.296-301
    • /
    • 2022
  • Due to the fact that zirconium based metal-organic frameworks (Zr-MOFs), such as UiO-66, have a large specific surface area and excellent selective adsorption capacity, Zr-MOFs are gaining attention as materials that can provide protection from the attack of chemical warfare agents in battleground. However, most of the metal-organic frameworks have an issue of selective adsorption capacity degraded by water molecules when exposed to the atmosphere, because of the weak metal-organic ligand bonds and the presence of voids. Therefore, polydimethylsiloxane (PDMS), a representative hydrophobic polymer material, was coated on the surface of UiO-66 to enhance the sustainability of the diisopropyl methylphosphonate (DIMP) sorption capacity in the battleground condition. Through the analysis of surface structure and organic functional group distribution of PDMS coated UiO-66, silicon was confirmed to be evenly coated. The contact angle increased by over 30° for the PDMS coated UiO-66, indicating that the hydrophobicity was improved. In addition, both the UiO-66 and PDMS coated UiO-66 were used as adsorbents for DIMP, a similar chemical warfare agent, to investigate the durability of adsorption capacity in a high humidity environment. The PDMS coated UiO-66 showed higher durability of adsorption capacity for 20 days than that of pristine UiO-66.

Design Optimization of Multi-element Airfoil Shapes to Minimize Ice Accretion (결빙 증식 최소화를 위한 다중 익형 형상 최적설계)

  • Kang, Min-Je;Lee, Hyeokjin;Jo, Hyeonseung;Myong, Rho-Shin;Lee, Hakjin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.7
    • /
    • pp.445-454
    • /
    • 2022
  • Ice accretion on the aircraft components, such as wings, fuselage, and empennage, can occur when the aircraft encounters a cloud zone with high humidity and low temperature. The prevention of ice accretion is important because it causes a decrease in the aerodynamic performance and flight stability, thus leading to fatal safety problems. In this study, a shape design optimization of a multi-element airfoil is performed to minimize the amount of ice accretion on the high-lift device including leading-edge slat, main element, and trailing-edge flap. The design optimization framework proposed in this paper consists of four major parts: air flow, droplet impingement and ice accretion simulations and gradient-free optimization algorithm. Reynolds-averaged Navier-Stokes (RANS) simulation is used to predict the aerodynamic performance and flow field around the multi-element airfoil at the angle of attack 8°. Droplet impingement and ice accretion simulations are conducted using the multi-physics computational analysis tool. The objective function is to minimize the total mass of ice accretion and the design variables are the deflection angle, gap, and overhang of the flap and slat. Kriging surrogate model is used to construct the response surface, providing rapid approximations of time-consuming function evaluation, and genetic algorithm is employed to find the optimal solution. As a result of optimization, the total mass of ice accretion on the optimized multielement airfoil is reduced by about 8% compared to the baseline configuration.

Evaluation of Stent Apposition in the LVIS Blue Stent-Assisted Coiling of Distal Internal Carotid Artery Aneurysms : Correlation with Clinical and Angiographic Outcomes

  • Kwon, Min-Yong;Ko, Young San;Kwon, Sae Min;Kim, Chang-Hyun;Lee, Chang-Young
    • Journal of Korean Neurosurgical Society
    • /
    • v.65 no.6
    • /
    • pp.801-815
    • /
    • 2022
  • Objective : To evaluate the stent apposition of a low-profile visualized intraluminal support (LVIS) device in distal internal carotid artery (ICA) aneurysms, examine its correlation with clinical and angiographic outcomes, and determine the predictive factors of ischemic adverse events (IAEs) related to stent-assisted coiling. Methods : We retrospectively analyzed a prospectively maintained database of 183 patients between January 2017 and February 2020. The carotid siphon from the cavernous ICA to the ICA terminus was divided into posterior, anterior, and superior bends. The anterior bends were categorized into angled (V) and non-angled (C, U, and S) types depending on the morphology and measured angles. Complete stent apposition (CSA) and incomplete stent apposition (ISA) were evaluated using unsubtracted angiography and flat-panel detector computed tomography. Dual antiplatelet therapy with aspirin 200 mg and clopidogrel 75 mg was administered. Clopidogrel resistance was defined as fewer responders (≥10%, <40%) and non-responders (<10%) based on the percent inhibition (%INH) of the VerifyNow system. These were counteracted by a dose escalation to 150 mg for fewer responders or substitution with cilostazol 200 mg for non-responders. IAEs included intraoperative in-stent thrombosis, transient ischemic attack, cerebral infarction, and delayed in-stent stenosis. A multivariate logistic regression analysis was used to determine the predictive factors for ISA and IAEs. Results : There were 33 ISAs (18.0%) and 27 IAEs (14.8%). The anterior bend angle was narrower in ISA (-4.16°±25.18°) than in CSA (23.52°±23.13°) (p<0.001). The V- and S-types were independently correlated with the ISA (p<0.001). However, treatment outcomes, including IAEs (15.3% vs. 12.1%), aneurysmal complete occlusion (91.3% vs. 88.6%), and recanalization (none of them), did not differ between CSA and ISA (p>0.05). The %INH of 27 IAEs (13.78%±14.78%) was significantly lower than that of 156 non-IAEs (26.82%±20.23%) (p<0.001). Non-responders to clopidogrel were the only significant predictive factor for IAEs (p=0.001). Conclusion : The angled and tortuous anatomical peculiarity of the carotid siphon caused ISA of the LVIS device; however, it did not affect clinical and angiographic outcomes, while the non-responders to clopidogrel affected the IAEs related to stent-assisted coiling.

Multi-fidelity uncertainty quantification of high Reynolds number turbulent flow around a rectangular 5:1 Cylinder

  • Sakuma, Mayu;Pepper, Nick;Warnakulasuriya, Suneth;Montomoli, Francesco;Wuch-ner, Roland;Bletzinger, Kai-Uwe
    • Wind and Structures
    • /
    • v.34 no.1
    • /
    • pp.127-136
    • /
    • 2022
  • In this work a multi-fidelity non-intrusive polynomial chaos (MF-NIPC) has been applied to a structural wind engineering problem in architectural design for the first time. In architectural design it is important to design structures that are safe in a range of wind directions and speeds. For this reason, the computational models used to design buildings and bridges must account for the uncertainties associated with the interaction between the structure and wind. In order to use the numerical simulations for the design, the numerical models must be validated by experi-mental data, and uncertainties contained in the experiments should also be taken into account. Uncertainty Quantifi-cation has been increasingly used for CFD simulations to consider such uncertainties. Typically, CFD simulations are computationally expensive, motivating the increased interest in multi-fidelity methods due to their ability to lev-erage limited data sets of high-fidelity data with evaluations of more computationally inexpensive models. Previous-ly, the multi-fidelity framework has been applied to CFD simulations for the purposes of optimization, rather than for the statistical assessment of candidate design. In this paper MF-NIPC method is applied to flow around a rectan-gular 5:1 cylinder, which has been thoroughly investigated for architectural design. The purpose of UQ is validation of numerical simulation results with experimental data, therefore the radius of curvature of the rectangular cylinder corners and the angle of attack are considered to be random variables, which are known to contain uncertainties when wind tunnel tests are carried out. Computational Fluid Dynamics (CFD) simulations are solved by a solver that employs the Finite Element Method (FEM) for two turbulence modeling approaches of the incompressible Navier-Stokes equations: Unsteady Reynolds Averaged Navier Stokes (URANS) and the Large Eddy simulation (LES). The results of the uncertainty analysis with CFD are compared to experimental data in terms of time-averaged pressure coefficients and bulk parameters. In addition, the accuracy and efficiency of the multi-fidelity framework is demonstrated through a comparison with the results of the high-fidelity model.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Epidemiological Aspects and Trends of the Extensive Eradication Programs for Bovine Brucellosis Outbreaks-Associated Human Brucellosis in Korea, 2002~2013

  • Lee, Won-Chang;Yoon, Hachung;Lee, Myeong-Jin;Kwon, Young Hwan
    • Korean journal of aerospace and environmental medicine
    • /
    • v.29 no.2
    • /
    • pp.72-76
    • /
    • 2019
  • Over the last decade, human brucellosis (HB) has become a principal zoonosis in Korea. The objective of this study was observing the epidemiological trends of the extensive eradication programs for bovine brucellosis (BB) outbreaks-associated HB in Korea from 2002 to 2013. The raw data analysis in this study was obtained from the website of brucellosis outbreaks by Korea Center for Disease Control and Prevention (KCDC) and Animal and Plant Quarantine Agency (QIA), Korea, 2002~2013. The number of cases of BB outbreaks-associated HB in Korea was increased after 2003 and peaked in 2006 before decreasing thereafter. There were a total of 89,240 infected BB in domestic cattle with a cumulative incidence rate (CIR) of 611.8 per 100,000 cattle; during the same period there were a total of 703 cases of HB with a CIR of 0.12 per 100,000 persons. Moreover, the correlation coefficient of brucellosis outbreaks between cattle and human was highly significant (r=+0.985). The attack ratio of HB was 7.88 per 1,000 BB cases. All of the control measures of HB were applied in the extensive eradication programs for brucellosis outbreaks of infection source in domestic animals and contributed significantly to the reduction in the outbreaks of HB in Korea.

A Study on Ransomware Detection Methods in Actual Cases of Public Institutions (공공기관 실제 사례로 보는 랜섬웨어 탐지 방안에 대한 연구)

  • Yong Ju Park;Huy Kang Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.499-510
    • /
    • 2023
  • Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but unknown dynamic and encryption attacks can be detected when existing signature-based or static analysis-based malware and ransomware file detection methods are used. vulnerable to The detection method proposed in this study extracts the detection result data of the system that can detect malicious code and ransomware among the information protection systems actually used by public institutions, derives various attributes by combining them, and uses a machine learning classification algorithm. Results are derived through experiments on how the derived properties are classified and which properties have a significant effect on the classification result and accuracy improvement. In the experimental results of this paper, although it is different for each algorithm when a specific attribute is included or not, the learning with a specific attribute shows an increase in accuracy, and later detects malicious code and ransomware files and abnormal behavior in the information protection system. It is expected that it can be used for property selection when creating algorithms.