• Title/Summary/Keyword: Attack Flow

Search Result 613, Processing Time 0.028 seconds

Hemorrhagic Moyamoya Disease : A Recent Update

  • Fujimura, Miki;Tominaga, Teiji
    • Journal of Korean Neurosurgical Society
    • /
    • v.62 no.2
    • /
    • pp.136-143
    • /
    • 2019
  • Moyamoya disease (MMD) is a progressive cerebrovascular disease with unknown etiology, characterized by bilateral steno-occlusive changes at the terminal portion of the internal carotid artery and an abnormal vascular network formation at the base of the brain. MMD has an intrinsic nature to convert the vascular supply for the brain from internal carotid (IC) system to the external carotid (EC) system, as indicated by Suzuki's angiographic staging. Insufficiency of this 'IC-EC conversion system' could result not only in cerebral ischemia, but also in intracranial hemorrhage from inadequate collateral anastomosis, both of which represent the clinical manifestation of MMD. Surgical revascularization prevents cerebral ischemic attack by improving cerebral blood flow, and recent evidence further suggests that extracranial-intracranial bypass could powerfully reduce the risk of re-bleeding in MMD patients with posterior hemorrhage, who were known to have extremely high re-bleeding risk. Although the exact mechanism underlying the hemorrhagic presentation in MMD is undetermined, most recent angiographic analysis revealed the characteristic angio-architecture related to high re-bleeding risk, such as the extension and dilatation of choroidal collaterals and posterior cerebral artery involvement. We sought to update the current management strategy for hemorrhagic MMD, including the outcome of surgical revascularization for hemorrhagic MMD in our institute. Further investigations will clarify the optimal surgical strategy to prevent hemorrhagic manifestation in patients with MMD.

A Study on Security Requirements of Shipboard Combat System based on Threat Modelling (위협 모델링 기반 함정 전투체계 보안 요구사항에 관한 연구)

  • Seong-cheol Yun;Tae-shik Shon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.281-301
    • /
    • 2023
  • The shipboard combat system is a key system for naval combat that supports a command and control process cycle consisting of Detect - Control - Engage in real time to ensure ship viability and conduct combat missions. Modern combat systems were developed on the basis of Open Architecture(OA) to maximize acceptance of latest technology and interoperability between systems, and actively introduced the COTS(Commercial-of-the-shelf). However, as a result of that, vulnerabilities inherent in COTS SW and HW also occurred in the combat system. The importance of combat system cybersecurity is being emphasized but cybersecurity research reflecting the characteristics of the combat system is still lacking in Korea. Therefore, in this paper, we systematically identify combat system threats by applying Data Flow Diagram, Microsoft STRIDE threat modelling methodology. The threats were analyzed using the Attack Tree & Misuse case. Finally we derived the applicable security requirements which can be used at stages of planning and designing combat system and verified security requirements through NIST 800-53 security control items.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Atmospheric Pressure Plasma Treatment of Aqueous Bisphenol A Solution (비스페놀 A 수용액의 대기압 플라즈마 처리)

  • Jo, Jin-Oh;Choi, Kyeong Yun;Gim, Suji;Mok, Young Sun
    • Applied Chemistry for Engineering
    • /
    • v.26 no.3
    • /
    • pp.311-318
    • /
    • 2015
  • This work investigated the plasma treatment of aqueous bisphenol A (BPA) solution and mineralization pathways. For the effective contact between plasmatic gas and aqueous BPA solution, the plasma was created inside a porous ceramic tube, which was uniformly dispersed into the aqueous solution through micro-pores of the ceramic tube. Effects of the gas flow rate, applied voltage and treatment time on the decomposition of BPA were examined, and analyses using ultraviolet (UV) spectroscopy, ion chromatography and gas chromatography-mass spectrometry were also performed to elucidate mineralization mechanisms. The appropriate gas flow rate was around $1.0L\;min^{-1}$; when the gas flow rate was too high or too low, the BPA decomposition performance at a given electric power decreased. The increase in the voltage improves the BPA decomposition due to the increased electric power, but the energy required to remove BPA was similar, regardless of the voltage. Under the condition of $1.0L\;min^{-1}$ and 20.8 kV, BPA at an initial concentration of $10L\;min^{-1}$ (volume : 1 L) was successfully treated within 30 min. The intermediates produced by the attack of ozone and hydroxyl radicals on BPA were further oxidized to stable compounds such as acetate, formate and oxalate.

Numerical Study on the Effect of Non-Equilibrium Condensation on Drag Divergence Mach Number in a Transonic Moist Air Flow (천음속 익형 유동에서 비평형 응축이 Drag Divergence Mach Number에 미치는 영향에 관한 수치 해석적 연구)

  • Choi, Seung Min;Kang, Hui Bo;Kwon, Young Doo;Kwon, Soon Bum
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.40 no.12
    • /
    • pp.785-792
    • /
    • 2016
  • In the present study, the effects of non-equilibrium condensation on the drag divergence Mach number with the angle of attack in a transonic 2D moist air flow of NACA0012 are investigated using the TVD finite difference scheme. For the same ${\alpha}$, the maximum upstream Mach number of the shock wave, Mmax, and the size of supersonic bubble decrease with the increase in ${\Phi}_0$. For the same $M_{\infty}$, ${\Phi}_0$, and $T_0$, the length of the non-equilibrium condensation zone ${\Delta}_z$ decreases with increasing ${\Phi}_0$. On the other hand, because of the attenuating effect of non-equilibrium condensation on wave drag, which is related to the interaction between the shock wave and the boundary layer, the drag coefficient $C_D$ decreases with an increase in ${\Phi}_0$ for the same $M_{\infty}$ and ${\alpha}$. For the same ${\alpha}$, $M_D$ increases with increasing ${\Phi}_0$, while $M_D$ decreases with an increase in ${\alpha}$.

A Numerical Study of the Effect of Non-equilibrium Condensation on the Oscillation of Shock Wave in a Transonic Airfoil Flow (비평형 응축이 충격파 진동에 미치는 영향에 관한 수치 해석적 연구)

  • Jeon, Heung Kyun;Kim, In Won;Kwon, Young Doo;Kwon, Soon Bum
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.38 no.3
    • /
    • pp.219-225
    • /
    • 2014
  • In this study, to find the characteristics of the oscillation of a terminating shock wave in a transonic airfoil flow with non-equilibrium condensation, a NACA00-12,14,15 airfoil flow with non-equilibrium condensation is investigated through numerical analysis of TVD scheme. Transonic free stream Mach number of 0.81-0.90 with the variation of stagnation relative humidity and airfoil thickness is tested. For the free stream Mach number 0.87 and attack angle of ${\alpha}=0^{\circ}$, the increase in stagnation relative humidity attenuates the strength of the terminating shock wave and inactivates the oscillation of the terminating shock wave. For the case of $M_{\infty}=0.87$ and ${\phi}_0=60%$, the decreasing rate in the frequency of the shock oscillation caused by non-equilibrium condensation to that of ${\phi}_0=30%$ amounts to 5%. Also, as the stagnation relative humidity gets larger, the maximum coefficient of drag and the difference between the maximum and minimum in $C_D$ become smaller. On the other hand, as the thickness of the airfoil gets larger, the supersonic bubble size becomes bigger and the oscillation of the shock wave becomes higher.

A Potential-Based Panel Method for the Analysis of A Two-Dimensional Super-Cavitating Hydrofoil (양력판(揚力板) 이론(理論)에 의(依)한 2차원(次元) 수중익(水中翼)의 초월(超越) 공동(空洞) 문제(問題) 해석(解析))

  • Y.G. Kim;C.S. Lee;J.T. Lee
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.28 no.2
    • /
    • pp.159-173
    • /
    • 1991
  • This paper describes a potential-based panel method formulated for the analysis of a super-cavitating two-dimensional hydrofoil. The method employs normal dipoles and sources distributed on the foil and cavity surfaces to represent the potential flow around the cavitating hydrofoil. The kinematic boundary condition on the wetted portion of the foil surface is satisfied by requiring that the total potential vanish in the fictitious inner flow region of the foil, and the dynamic boundary condition on the cavity surface is satisfied by requiring thats the potential vary linearly, i.e., the tangential velocity be constant. Green's theorem then results in a potential-based integral equation rather than the usual velocity-based formulation of Hess & Smith type. With the singularities distributed on the exact hydrofoil surface, the pressure distributions are predicted with improved accuracy compared to those of the linearized lilting surface theory, especially near the leading edge. The theory then predicts the cavity shape and cavitation number for an assumed cavity length. To improve the accuracy, the sources and dipoles on the cavity surface are moved to the newly computed cavity surface, where the boundary conditions are satisfied again. This iteration process is repeated until the results are converged. Characteristics of iteration and discretization of the present numerical method are much faster and more stable than the existing nonlinear theories. The theory shows good correlations with the existing theories and experimental results for the super-cavitating flow. In the region of small angles of attack, the present prediction shows and excellent comparison with the Geurst's linear theory. For the long cavity, the method recovers the trends of the Wu's nonlinear theory. In the intermediate regions of the short super-cavitation, the method compares very well with the experimental results of Parkin and also those of Silberman.

  • PDF

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Evaluation of Chloride Attack Resistibility of Heavyweight Concrete Using Copper Slag and Magnetite as Aggregate (동슬래그 및 자철석을 골재로 사용한 중량 콘크리트의 회파블록 적용을 위한 염해저항성 평가)

  • Moon, Hoon;Kim, Ji-Hyun;Lee, Jae-Yong;Chung, Chul-Woo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.17 no.6
    • /
    • pp.483-492
    • /
    • 2017
  • Recently, the coastal area has become the popular place for infrastructure development. To provide a beautiful scenary of costal area to nearby facilities without any hinderance, and also to protect those facilities from the sea water overflow, it is necessary to develop a new type of wave dissipating block, which is a turning wave block. It is noticeable that the top of the turning wave block is flat and thus can provide spaces for various purposes. However, the unit weight of the block decreases due to the presence of pipeline that is installed for turning the direction of the waves. In order to mitigate such problem, a heavyweight concrete needs to be used to increase the resistance against tidal waves. The copper slag and magnetite were used as a source of fine and coarse aggregate, respectively. The 28 day compressive strength of concrete incorporating ordinary and heavyweight aggregate did not show significant differences. It should be noted that the chloride ion penetration resistance was evaluated using NT-BUILD 492 rather than ASTM C 1202 method because concrete incorporating magnetite as a coarse aggregate showed excessive current flow by ASTM C 1202 method. According to the results from NT Build 492 method, which uses the penetration depth of chlorine ions to obtain chloride ion diffusivity, the heavyweight concrete incorporating the copper slag and the magnetite showed the best resistance against the chloride ion penetration. Therefore, it is reasonable to say that heavyweight concrete made with copper slag and magnetite can be used for production of turning wave block.

Free surface effects on 2-D airfoils and 3-D wings moving over water

  • Bal, Sakir
    • Ocean Systems Engineering
    • /
    • v.6 no.3
    • /
    • pp.245-264
    • /
    • 2016
  • The iterative boundary element method (IBEM) developed originally before for cavitating two-dimensional (2-D) and three-dimensional (3-D) hydrofoils moving under free surface is modified and applied to the case of 2-D (two-dimensional) airfoils and 3-D (three-dimensional) wings over water. The calculation of the steady-state flow characteristics of an inviscid, incompressible fluid past 2-D airfoils and 3-D wings above free water surface is of practical importance for air-assisted marine vehicles such as some racing boats including catamarans with hydrofoils and WIG (Wing-In-Ground) effect crafts. In the present paper, the effects of free surface both on 2-D airfoils and 3-D wings moving steadily over free water surface are investigated in detail. The iterative numerical method (IBEM) based on the Green's theorem allows separating the airfoil or wing problems and the free surface problem. Both the 2-D airfoil surface (or 3-D wing surface) and the free surface are modeled with constant strength dipole and constant strength source panels. While the kinematic boundary condition is applied on the airfoil surface or on the wing surface, the linearized kinematic-dynamic combined condition is applied on the free surface. The source strengths on the free surface are expressed in terms of perturbation potential by applying the linearized free surface conditions. No radiation condition is enforced for downstream boundary in 2-D airfoil and 3-D wing cases and transverse boundaries in only 3-D wing case. The method is first applied to 2-D NACA0004 airfoil with angle of attack of four degrees to validate the method. The effects of height of 2-D airfoil from free surface and Froude number on lift and drag coefficients are investigated. The method is also applied to NACA0015 airfoil for another validation with experiments in case of ground effect. The lift coefficient with different clearance values are compared with those of experiments. The numerical method is then applied to NACA0012 airfoil with the angle of attack of five degrees and the effects of Froude number and clearance on the lift and drag coefficients are discussed. The method is lastly applied to a rectangular 3-D wing and the effects of Froude number on wing performance have been investigated. The numerical results for wing moving under free surface have also been compared with those of the same wing moving above free surface. It has been found that the free surface can affect the wing performance significantly.