• Title/Summary/Keyword: Attack behavior analysis

Search Result 93, Processing Time 0.03 seconds

Behavior of Column-Foundation Joint under Vehicle Impact (차량 충돌에 의한 기둥의 콘크리트 기초 접합부 거동 평가)

  • Kang, Hyun-Goo;Kim, Jin-Koo
    • Journal of the Korea Concrete Institute
    • /
    • v.26 no.3
    • /
    • pp.393-400
    • /
    • 2014
  • Structures are often subject to vehicle collision which can be accidental or terrorist attack. Previous research shows that the damage in major columns may result in progressive collapse of a whole building. This study investigates the performance of a steel column standing on a reinforced concrete footing subjected to a vehicle collision. The size and the axial load of the steel column are determined based on the assumption that it is the first story corner column in a typical three-story building with six meter span length. The finite element model of a eight-ton single unit truck provided by the NCAC (National Crash Analysis Center) is used in the numerical analysis. The finite element analysis is performed using the LS-DYNA, and the results show that the behavior of the column subjected to car impact depends largely on the column-foundation connection detail.

A Study of Numerical Analysis for Stage Separation Behavior of Two-body Vehicle (비행체 단분리 거동 예측에 대한 수치 연구)

  • Park, Geunhong
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.22 no.4
    • /
    • pp.91-98
    • /
    • 2018
  • A numerical investigation of stage separation behavior of a two-body vehicle focusing on its flow characteristics is carried out. For this simulation, the separation of a booster from a vehicle is modeled using a chimera grid system and calculated with commercial code, $CFD-FASTRAN^{TM}$. Consideration of spring force, gravity and relative acceleration of a booster is the essential factor of a realistic simulation. In this study, it is validated that the booster separation time decreases with an increase in flight Mach number and angle of attack. In view of results thus far achieved, it is expected that the dynamics modeling and boundary condition set-up applied in this study will be useful for estimating safe stage separation and event sequencing of flight tests.

Study of Corrosion and Post Analysis for the Separator Channel of MCFC Stack after Cell Operation for 1200 hours (용융탄산염연료전지(MCFC) 스택의 1200시간 운전 후 분리판 채널부 표면 열화 분석 및 연구)

  • Cho, Kye-Hyun
    • Journal of the Korean institute of surface engineering
    • /
    • v.40 no.3
    • /
    • pp.149-158
    • /
    • 2007
  • Of all components of MCFC(molten carbonate fuel cell), corrosion of separator is one of the most decisive factor for commercializing of MCFC. In order to provide better understanding of corrosion behavior and morphology for gas channel of separator plate, post-analysis after cell operation for 1200 hours at $650^{\circ}C$ was performed by optical microscope, SEM and EPMA. Intergranular corrosion was observed on gas channel of separator plate. Corrosion product layer was identified as Fe-oxide, Cr-oxide and Ni-oxide by EPMA, and oxide thickness was measured with a $60{\mu}m-150{\mu}m$. Also, gas channel of separator was damaged by severe intergrannular attack with post analysis in consistent with immersion test. Moreover, pitting on the channel plate was observed with a depth of $18{\sim}24{\mu}m$. The results of immersion method are well agreement with post analysis measurements.

Mechanisms of sulfate ionic diffusion in porous cement based composites

  • Gospodinov, P.;Mironova, M.;Kazandjiev, R.
    • Computers and Concrete
    • /
    • v.4 no.4
    • /
    • pp.273-284
    • /
    • 2007
  • The paper considers a theoretical model for the study of the process of transfer of sulfate ions in saturated porous media - mineral composites. In its turn, the model treats diffusion of sulfate ions into cement based composites, accounting for simultaneous effects such as filling of micro-capillaries with ions and chemical products and liquid push out of them. The proposed numerical algorithm enables one to account for those simultaneous effects, as well as to model the diffusive behavior of separate sections of the considered volume, such as inert fillers. The cases studied illustrate the capabilities of the proposed model and those of the algorithm developed to study diffusion, considering the specimen complex configuration. Computations show that the theoretical assumptions enable one to qualitatively estimate the experimental evidence and the capabilities of the studied composite. The results found can be used to both assess the sulfate corrosion in saturated systems and predict and estimate damage of structures built of cement-based mineral composites.

Damage prediction of RC containment shell under impact and blast loading

  • Pandey, A.K.
    • Structural Engineering and Mechanics
    • /
    • v.36 no.6
    • /
    • pp.729-744
    • /
    • 2010
  • There is world wide concern for safety of nuclear power installations after the terrorist attack on World Trade Center in 2001 and several other civilian structures in the last decade. The nuclear containment structure in many countries is a double shell structure (outer shell a RCC and inner a prestressed concrete). The outer reinforced concrete shell protects the inner shell and is designed for external loading like impact and blast. A comparative study of non-linear response of reinforced concrete nuclear containment cylindrical shell subjected to impact of an aircraft (Phantom) and explosion of different amounts of blast charges have been presented here. A material model which takes into account the strain rate sensitivity in dynamic loading situations, plastic and visco-plastic behavior in three dimensional stress state and cracking in tension has been developed earlier and implemented into a finite element code which has been validated with published literature. The analysis has been made using the developed software. Significant conclusions have been drawn for dissimilarity in response (deflections, stresses, cracks etc.) of the shell for impact and blast loading.

PRaCto: Pseudo Random bit generator for Cryptographic application

  • Raza, Saiyma Fatima;Satpute, Vishal R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6161-6176
    • /
    • 2018
  • Pseudorandom numbers are useful in cryptographic operations for using as nonce, initial vector, secret key, etc. Security of the cryptosystem relies on the secret key parameters, so a good pseudorandom number is needed. In this paper, we have proposed a new approach for generation of pseudorandom number. This method uses the three dimensional combinational puzzle Rubik Cube for generation of random numbers. The number of possible combinations of the cube approximates to 43 quintillion. The large possible combination of the cube increases the complexity of brute force attack on the generator. The generator uses cryptographic hash function. Chaotic map is being employed for increasing random behavior. The pseudorandom sequence generated can be used for cryptographic applications. The generated sequences are tested for randomness using NIST Statistical Test Suite and other testing methods. The result of the tests and analysis proves that the generated sequences are random.

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

Analysis on Changes in Strength, Chloride Diffusion, and Passed Charges in Normal Concrete Considering Ages and Mix Proportions (재령 및 배합특성을 고려한 보통 콘크리트의 강도, 염화물 확산계수, 통과전하량 변화 분석)

  • Lee, Hack-Soo;Kwon, Seung-Jun
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.5 no.1
    • /
    • pp.1-7
    • /
    • 2017
  • Concrete behavior in early-age is changing due to hydration reaction with time, and a resistance to chloride attack and strength development are different characterized. In the present work, changing strength and resistance to chloride attack are evaluated with ages from 28 days to 6 months. For the purpose, strength, diffusion coefficient, and passed charge are evaluated for normal concrete with 3 different mix proportions considering 28-day and 6-month curing conditions. With increasing concrete age, the changing ratio of strength falls on the level of 135.3~138.3%, while diffusion coefficient and passed charge shows 41.8%~51.1% and 53.6%~70.0%, respectively. The results of chloride diffusion coefficient and passed charge show relatively similar changing ratios since they are much dependent on the chloride migration velocity in electrical field. The changing ratios in chloride behaviors are evaluated to be much larger than those in compressive strength since the ion transport mechanism is proportional to not porosity but square of porosity.

Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis (이상 탐지 분석에서 알려지지 않는 공격을 식별하기 위한 이산 웨이블릿 변환 적용 연구)

  • Kim, Dong-Wook;Shin, Gun-Yoon;Yun, Ji-Young;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2021
  • Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categories: first, there are factors that generate variant attacks, and second, studies that classify them into new types. We have conducted outlier studies that can identify similar data, such as variants, in the category of studies that generate variant attacks. The big problem of identifying anomalies in the intrusion detection system is that normal and aggressive behavior share the same space. For this, we applied a technique that can be divided into clear types for normal and attack by discrete wavelet transformation and detected anomalies. As a result, we confirmed that the outliers can be identified through One-Class SVM in the data reconstructed by discrete wavelet transform.

Enhanced mass balance Tafel slope model for computer based FEM computation of corrosion rate of steel reinforced concrete coupled with CO2 transport

  • Hussain, Raja Rizwan
    • Computers and Concrete
    • /
    • v.8 no.2
    • /
    • pp.177-192
    • /
    • 2011
  • This research paper aims at computer based modeling of carbonation induced corrosion under extreme conditions and its experimental verification by incorporating enhanced electrochemical and mass balance equations based on thermo-hygro physics with strong coupling of mass transport and equilibrium in micro-pore structure of carbonated concrete for which the previous research data is limited. In this paper the carbonation induced electrochemical corrosion model is developed and coupled with carbon dioxide transport computational model by the use of a concrete durability computer based model DuCOM developed by our research group at concrete laboratory in the University of Tokyo and its reliability is checked in the light of experiment results of carbonation induced corrosion mass loss obtained in this research. The comparison of model analysis and experiment results shows a fair agreement. The carbonation induced corrosion model computation reasonably predicts the quantitative behavior of corrosion rate for normal air dry relative humidity conditions. The computational model developed also shows fair qualitative corrosion rate simulation and analysis for various pH levels and coupled environmental actions of chloride and carbonation. Detailed verification of the model for the quantitative carbonation induced corrosion rate computation under varying relative conditions, different pH levels and combined effects of carbonation and chloride attack remain as scope for future research.