• Title/Summary/Keyword: Attack Potential

Search Result 258, Processing Time 0.023 seconds

Study of the Flush Air Data Sensing System for Subsonic and Supersonic Flows (아음속 및 초음속 유동의 플러시 대기자료 측정장치 연구)

  • Lee, Chang-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.12
    • /
    • pp.831-840
    • /
    • 2019
  • Flush Air Data Sensing system (FADS) estimates air data states using pressure data measured at the surface of flight vehicles. The FADS system does not require intrusive probes, so it is suitable for high performance aircrafts, stealth vehicles, and hypersonic flight vehicles. In this study, calibration procedures and solution algorithms of the FADS for a sphere-cone shape vehicle are presented for the prediction of air data from subsonic to supersonic flights. Five flush pressure ports are arranged on the surface of nose section in order to measure surface pressure data. The algorithm selects the concept of separation for the prediction of flow angles and the prediction of pressure related variables, and it uses the pressure model which combines the potential flow solution for a subsonic flow with the modified Newtonian flow theory for a hypersonic flow. The CFD code which solves Euler equations is developed and used for the construction of calibration pressure data in the Mach number range of 0.5~3.0. Tests are conducted with various flight conditions for flight Mach numbers in the range of 0.6~3.0 and flow angles in the range of -10°~+10°. Air data such as angle of attack, angle of sideslip, Mach number, and freestream static pressure are predicted and their accuracies are analyzed by comparing predicted data with reference data.

Synthesis, Structure, and Reactivity of the [Fe4S4(SR)4]2- (R = 2-, 3-, and 4-Pyridinemethane) Clusters

  • Kim, Yu-Jin;Han, Jae-Hong
    • Bulletin of the Korean Chemical Society
    • /
    • v.33 no.1
    • /
    • pp.48-54
    • /
    • 2012
  • The $[Fe_4S_4]^{2+}$ clusters with 2-, 3-, and 4-pyridinemethanethiolate (S2-Pic, S3-Pic, and S4-Pic, respectively) terminal ligands have been synthesized from the ligand substitution reaction of the $(^nBu_4N)_2[Fe_4S_4Cl_4]$ (I) cluster. The new $(^nBu_4N)_2[Fe_4S_4(SR)_4]$ (R = 2-Pic; II, 3-Pic; III, 4-Pic; IV) clusters were characterized by FTIR and UV-Vis spectroscopy. Cluster II was crystallized in the monoclinic space group C2/c with a = 24.530 (5) $\AA$, b = 24.636(4) $\AA$, c = 21.762(4) $\AA$, ${\beta}=103.253(3)^{\circ}$, and Z = 8. The X-ray structure of II showed two unique 2:2 site-differentiated $[Fe_4S_4]^{2+}$ clusters due to the bidentate-mode coordination by 2-pyridinemethanethiolate ligands. Cluster III was crystallized in the same monoclinic space group C2/c with a = 26.0740(18) $\AA$, b = 23.3195(16) $\AA$, c = 22.3720(15) $\AA$, ${\beta}=100.467(2)^{\circ}$, and Z = 8. The 3-pyridinemethanethiolate ligand of III was coordinated to the $[Fe_4S_4]^{2+}$ core as a terminal mode. Cluster IV with 4-pyridinemethanethiolate ligands was found to have a similar structure to the cluster III. Fully reversible $[Fe_4S_4]^{2+}/[Fe_4S_4]^+$ redox waves were observed from all three clusters by cyclic voltammetry measurement. The electrochemical potentials for the $[Fe_4S_4]^{2+}/[Fe_4S_4]^+$ transition decreased in the order of II, III and IV, and the reduction potential changes by the ligands were explained based on the structural differences among the complexes. The complex III was reacted with sulfonium salt of $[PhMeSCH_2-p-C_6H_4CN](BF_4)$ in MeCN to test possible radical-involving reaction as a functional model of the [$Fe_4S_4$]-SAM (S-adenosylmethionine) cofactor. However, the isolated reaction products of 3-pyridinemethanethiolate-p-cyanobenzylsulfide and thioanisole suggested that the reaction followed an ionic mechanism and the products formed from the terminal ligand attack to the sulfonium.

A Study on the Protective Countermeasures through the Assassination Accident Analysis of Israeli Premier Yitzhak Rabin (라빈수상 위해사건 분석을 통한 경호적 대응방안)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.221-242
    • /
    • 2008
  • Protection is to maximize the protectee's physical security by minimizing the threats and minimizing the damages caused by the threats. From this point of view, the assassination case of Israel's former Premier Yitzhak Rabin who devoted himself to proceed peace process in Middle East, on November 4, 1995, gives us a lot of lessons on protection. At that time, Israeli society was chaotic with anti-Rabin and anti-government demonstrations which is against Rabin's peace process, and they openly threatened to assassinate Premier Rabin. However, Shin Bet, Israeli Protective Agency, didn't reacted against the assassination threats effectively. Also they have to try to secure friendly public to widen the width of selection in case of crisis and to secure the credibility of the organization. They have to prevent harmful activities in advance by securing wide intelligence networks to collect and analyze various protective intelligences and preparing proper protective countermeasures. Intelligence is a basic element in protection and any protective measures not supported by intelligence activities are not useful and effective. Potential attackers study their target thoroughly and make an elaborate plan before their attack. Advance team is required to conduct security measures on a basis of analysis of vulnerability and threat factors, and close protection team should be prepared for the changing situations with crisis-consciousness. Is security, 100% perfection is not possible. However, Shin Bet failed to analyze and approach to the existing threats. They forgot the fact that security environment reflects social situations. Protection agents should be conscious of the fact that today is different from yesterday. So we have to expect what is not expected when not expected.

  • PDF

A Study on the Application of Reaction Time and Detailed Security Response (신체반응시간과 근접경호 대응논리 적용에 관한 연구)

  • Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.303-316
    • /
    • 2008
  • One of important protecting skill is securing the minimum safe distance from potential hazard to protect protectee in the emergency situation, that is basic thing for the detailed security in relation to the walking formation and the distance between protectee and crowed. This thesis is to provide the idea on the scientific countermeasure in the gun attack situation, by presenting logic on the reaction time and it's moving distance, on the safe distance between protectee and crowed. Handball goal keeper's reaction time of 0.33seconds is applied, because handball goal keeper's reaction style is very similar to security agent's reaction style. And 4m/sec of record is applied, that is average speed of 'go and return type run of 40m' to calculate it's moving distance. Several researches show that reaction time could be improved by continuing training, similarly security agents could improve their reaction time, providing better reaction skill. The important thing is that it make big difference in the protecting result, although the shortening of reaction time is too slight. Securing safe distance between protectee and crowed and the distance between protectee and security agent could provide effective reaction environment with 'natural protective wall effect' by security agent

  • PDF

Efficacy of Wood Preservatives Formulated with Okara and Its Microscopic Analysis (두부비지 방부제의 방부효능 및 현미경적 분석)

  • Kim, Ho-Yong;Choi, In-Gyu;Ahn, Sye Hee;Oh, Sei Chang;Youn, Young Ho;Yang, In
    • Journal of the Korean Wood Science and Technology
    • /
    • v.37 no.3
    • /
    • pp.245-254
    • /
    • 2009
  • As a substitute for CCA, which is inhibited due to its environmental pollution and human harmfulness, and CuAz and ACQ with a high cost, okara-based wood preservatives were formulated with okara hydrolyzates using copper sulfate and/or borax as a metal salt. The efficacy of the preservatives and X-ray microanalysis of wood specimens treated with the preservatives were examined to confirm the potential of the okara-based wood preservatives. Most of the preservatives showed excellent decay resistance against brown-rot fungi, Postia placenta and Gloeophyllum trabeum. The efficacy was improved when the acid concentration and temperature used for the hydrolysis of okara increased. In addition, when borax was added into copper sulfate/okara hydrolyzates preservative formulations, any decay was not found in the specimens. From the microscopic observation of the specimens treated with okara-based wood preservatives, it seems that okara is contributed to the fixing of metal salts in wood blocks. Therefore, it is speculated that okara-based wood preservatives can effectively protect wood against fungal attack as CuAz, and that the preservatives are sufficient to use as an alternative wood preservative of CCA, ACQ and CuAz.

A Study on the Implications and Trends of Logistics Security Assurance Programs for International Trade Facilitation (국제물류보안 인증제도 동향 및 시사점에 관한 연구)

  • Ko, Hyun-Jeung
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.333-354
    • /
    • 2011
  • After the terrorist attack of 9/11 on the USA, the security concern to global trade has been raised. In particular, the USA has actively promoted a series of initiatives and rules such as CSI, 24 hour rule, C-TPAT, and so on in the area of logistics activities, which aimed to better protect the country against the potential terrorist threats. While implementing such schemes called as a multi-layed logistics security strategy, a large number of countries trading with USA are facing with the issues of additional time and costs for inspecting cargos in their logistics facilities. As a result, most countries all over the world have sought a way to minimize the impacts from such strategy. The Korea also is preparing the several security programs operated by various ministries, which are aiming to not only improve the efficiency of trade flows but also to ensure supply chain security. However, many companies are expressing the inefficiency of operating such programs. Thus, this paper analyzed several global supply chain security programs currently adopted by international organizations(ISO, WCO, and IMO) and major countries(USA, EU, and Singapore) and suggested a guideline for developing the national logistics security system.

Evaluation on the Basic Properties of Phosphate Modified Portland Cement Paste for Potential Application of Geologic CO2 Sequestration (이산화탄소 지중 격리용 인산염 혼입 시멘트 페이스트에 관한 기초물성 평가)

  • Yoon, Ju-Han;Kim, Seong-Geun;Kim, Ji-Hyun;Lee, Jae-Yong;Chung, Chul-Woo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.17 no.3
    • /
    • pp.253-260
    • /
    • 2017
  • As global warming became a worldwide issue, a significant effort has been made on the development of technology related to $CO_2$ capture and storage. Geologic sequestration of $CO_2$ is one of those technologies for safe disposal of $CO_2$. Geologic sequestration stores $CO_2$ in the form of supercritical fluid into the underground site surrounded by solid rock, and concrete is used for prevention of $CO_2$ leakage into the atmosphere. In such case, concrete may experience severe damage by attack of supercritical $CO_2$, and especially in contact with underground water, very aggressive form of carbonation can occur. In this work, to prevent such deterioration in concrete, calcium phosphates were added to the portland cement to produce hydroxyapatite, one of the most stable mineral in the world. Temperature rise, viscosity, set and stiffening, and strength development of cement paste incorporating three different types of calcium phosphates were investigated. According to the results, it was found that the addition of calcium phosphate increased apparent viscosity, but decreased maximum temperature rise and 28 day compressive strength. It was found that monocalcium phosphate was found to be inappropriate for portland cement based material. Applicability of dicalcium and tricalcium phosphates for portland cement needs to be evaluated with further investigation, including the long term compressive strength development.

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

Evaluation of Freeze-Thaw Damage on Concrete Using Nonlinear Ultrasound (초음파의 비선형 특성을 이용한 콘크리트 동결융해 손상 평가)

  • Choi, Ha-Jin;Kim, Ryul-Ri;Lee, Jong-Suk;Min, Ji-Young
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.4
    • /
    • pp.56-64
    • /
    • 2021
  • Leakage due to deterioration and damage is one of the major causes of volume change by freezing and thawing, and it leads micro-cracking and surface scaling in concrete structures. The deterioration of damaged concrete accelerates with the chloride attack. Thus, in the detailed guidelines for facility performance evaluation (2020), the quality of cover concrete and the freeze-thaw (FT) repetition cycle were newly suggested for concrete durability assessment. The quality of cover concrete should be evaluated by the rebound hammer test and the FT repetition cycle should be also considered in the deterioration environmental assessment. This study suggested the application of fast dynamic based nonlinear ultrasound method to monitor initial micro-scale damage under freezing and thawing environment. Concrete specimens were fabricated with different water-cement ratios (40%, 60%) and air contents (1.5% and 3.0%). The compressive strength, rebound number, relative dynamic modulus, and nonlinear ultrasound were measured with different FT cycles. The scanning electron microscopy was also performed to investigate the micro-scale FT damage. As a result, both the rebound number and the relative dynamic modulus had difficulty to detect early damage but the proposed method showed a potential to detect initial micro-scale damage and predict the FT resistance performance of concrete.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).