• Title/Summary/Keyword: Cyber range

Search Result 100, Processing Time 0.028 seconds

An Experimental Study on the Heave Characteristics of DCM Heaving Soil (DCM 부상토의 융기 특성에 대한 실험적 연구)

  • Eonsang Park;Seungdo Park
    • Journal of the Korean GEO-environmental Society
    • /
    • v.24 no.2
    • /
    • pp.5-12
    • /
    • 2023
  • In this study, the amount of heaving soil and the heave characteristics of the heaving soil generated at the actual site were quantitatively analyzed through DCM laboratory test construction. By reproducing a series of construction processes of the DCM method in a large-scale soil tank close to the actual site, the amount of heaving soil was predicted and the elevation characteristics such as elevation, diffusion range, diffusion angle and amount of elevation of the heaving soil were evaluated. As a result of the laboratory test construction, the actual elevation in terms of similarity within the DCM improvement section is 0~8.18m, and an average of 3.50m is observed. The actual diffusion range of the heaving soil converted to the similarity ratio is distributed from 28.0 to 38.0m on the left and right sides of the improvement section. The total amount of heaving soil calculated by the SUFFER program based on the results of the laboratory test construction is 19,901m3. Compared with the injected slurry amount of 16,992m3, the amount of heave compared to the injected amount is analyzed as 85.4%. The diffusion angle of DCM heaving soil, which analyzed the results of DCM laboratory test construction with the SUFFER program, is measured to be 30.0~38.0° at a depth of 50.0m, and is evaluated as an average of 34.0°. On the other hand, based on the DCM laboratory test construction and the analysis results using the program performed in this study, the amount of heaving soil at the DCM depths of 40.0m and 60.0m is predicted.

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.

Locally Advanced, Unresectable Pancreatic Cancer Treated by Stereotactic Radiation Therapy (국소적으로 진행된, 절제 불가능한 췌장암에서 정위 방사선 치료)

  • Choi Chul-Won;Kim Mi-Sook;Cho Chul-Koo;Yoo Seong-Yul;Yang Kwang-Mo;Yoo Hyung-Jun;Lee Dong-Han;Ji Young-Hoon;Han Chul-Ju;Kim Jin;Kim Young-Han
    • Radiation Oncology Journal
    • /
    • v.24 no.1
    • /
    • pp.11-20
    • /
    • 2006
  • Puroose: In order to find out whether stereotactic radiation therapy (RT) using CyberKnife (CK) could improve survival rate and lower acute toxicity compared to conventional RT. Materials and Methods: From April 2003 through April 2004, 19 patients with Eastern Cooperative Oncology Group (ECOG) performance status ${\leq}3$ and locally advanced pancreas cancer without distant metastasis, evaluated by CT or PET/CT, were included. We administered stereotactic RT consisting of either 33 Gy, 36 Gy or 39 Gy in 3 fractions to 6, 4 and 9 patients, respectively, in an effort to increase the radiation dose step by step, and analyzed the survival rate and gastrointestinal toxicities by the acute radiation morbidity criteria of Radiation Therapeutic Oncology Group (RTOG). Prognostic factors of age, sex, ECOG performance score, chemotherapy, bypass surgery, radiation dose, CA 19-9, planning target volume (PTV), and adjacent organ and vessel invasion on CT scan were evaluated by Log Rank test. Results: The median survival time was 11 months with 1-year survival rate of 36.8%. During follow-up period (range $3{\sim}20$ months, median 10 months), no significant gastrointestinal acute toxicity (RTOG grade 3) was observed. In univariate analysis, age, sex, ECOG performance score, chemotherapy, bypass surgery, radiation dose, CA 19-9 level, and adjacent organ and vessel invasion did not show any significant changes of survival rate, however, patients with PTV (80 cc showed more favorable survival rate than those with PTV>80 cc (p-value<0.05). In multivariate analysis, age younger than 65 years and PTV>80 cc showed better survival rate. Conclusion: In terms of survival, the efficacy of stereotactic radiation therapy using CK was found to be superior or similar to other recent studies achieved with conventional RT with intensive chemotherapy, high dose conformal RT, intraoperative RT (IORT), or intensity modulated RT (IMRT). Furthermore, severe toxicity was not observed. Short treatment time in relation to the short life expectancy gave patients more convenience and, finally, quality of life would be increased. Consequently, this could be regarded as an effective novel treatment modality for locally advanced, unresectable pancreas cancer. PTV would be a helpful prognostic factor for CK.

Laboratory and Full-scale Testing to Investigate the Performance of Rock Fall Protection System with Hexagonal Wire Net (육각 낙석방지망의 성능평가를 위한 실내 및 실대형실험)

  • Youn, Ilro;Oh, Sewook;Kwon, Youngcheul
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.9
    • /
    • pp.69-75
    • /
    • 2014
  • Rock fall protection system installed against rock slope is one of the most conventional way to protect nearby infra structures. Despite of wide application of typical rectangular nets, virtually installed to protect rock slope face, several problems have also been pointed out up to date. Rectangular draped nets are vulnerable to a sudden external shock such as rock fall, because it doesn't have any systematical buffers or shock absorbers. Furthermore, it has been widely recognized from the some cases of rock fall accident in Korea that rock fall protection nets cause wide range of failure in the rock slope faces due to insufficient pullout bearing capacity of fixing parts. Therefore, in this study, we tried to make a consideration about the problems of existing standard rock fall protection nets in Korea, and develop a new type of hexagonal net with a shock absorber based on design rock fall energy. In this paper, laboratory and full scale test procedure is described to analysis the performance of newly developed hexagonal rock fall net, and the key results are presented and discussed.

A Study on the Explosion Hazardous Area in the Secondary Leakage of Vapor Phase Materials Based on the Test Results and the Leak Rate According to SEMI S6 in the Semiconductor Industry (반도체 산업의 SEMI S6에 따른 실험결과 및 누출률을 기준으로 한 증기 상 물질의 2차 누출 시 폭발위험장소에 관한 연구)

  • Kim, Sang Ryung;Lim, Keun Young;Yang, Won Baek;Rhim, Jong Guk
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.2
    • /
    • pp.15-21
    • /
    • 2020
  • Currently, in KS C IEC 60079-10-1, the leakage hole radius of secondary leakage is expressed as a recommendation. Underestimation of leak hole size can lead to underestimation of the calculated values for leak rates, and conservative calculations of leak hole sizes, which are considered for safety reasons, can be overestimated, resulting in an overestimated risk range. This too should be avoided. Therefore, a careful and balanced approach is necessary when estimating the size of leaking holes.Based on this logic, this study examines the stability by grasping the concentration inside the gas box when leaking dangerous substances as a result of experiments based on SEMI S6, an international safety standard applied in the semiconductor industry and The scope of explosion hazardous area was determined by applying the formula of KS C IEC 60079-10-1 according to SEMI F15 leak rate criteria and SEMI S6 leak rate criteria. Based on this, we will examine whether the exhaust performance needs to be improved as an alternative to FAB facilities that are difficult to apply to explosion hazards such as semiconductor industry.

Durability Characteristics of Ternary Cement Matrix Using Ferronickel Slag According to the Alkali-Activators (알칼리 활성화제 종류별 페로니켈슬래그를 사용한 3성분계 시멘트 경화체의 내구특성)

  • Cho, Won-Jung;Park, Eon-Sang;Jung, Ho-Seop;Ann, Ki-Yong
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.8 no.2
    • /
    • pp.190-197
    • /
    • 2020
  • This paper evaluates the mechanical properties and durability of cement matrix blended with mineral admixtures and ferronickel slag(FNS) powder which is an industrial b y-product during ferronickel smelting process. The hydration heat, pore structure, compressive strength, length change, rapid chloride penetration test(RCPT), and freezing and thawing resistance of ternary blended cement matrix were investigated and compared with ordinary portland cement matrix. The result showed that the compressive strength of ternary blended cement matrix using ferronickel slag powder and mineral mixture was low in strength compared to the reference concrete, but recovered to a certain extent by using alkali activator. Length change of cement mortar using FNS powder have shown less shrinkage occurs than the reference specimen. In addition, irrespective of using the alkali-activators, all ternary mix are indicative of the 'very low' range for chloride ion penetrability according to the ASTM C 1202, and the freeze-thaw resistance also showed excellent results.

Effects of Respiratory Rehabilitation Training Using a Harmonica for Patients With Spinal Cord Injuries (하모니카를 활용한 호흡재활 훈련이 척수손상환자의 호흡기능에 미치는 영향)

  • Kim, Hyuk Gun;Kim, Min Seo;Lim, Han Mil;Joeng, So;Shin, Uk Ju
    • Journal of Music and Human Behavior
    • /
    • v.15 no.2
    • /
    • pp.23-39
    • /
    • 2018
  • The purpose of this research was to investigate the effects of respiratory rehabilitation using a wind instrument for patients suffering from spinal cord injuries. From January 15, 2018 to April 15, 2018, we conducted ten 1-hour sessions of a harmonica program with eight patients with spinal cord injuries with average age of 37 years who could not perform abdominal breathing by themselves. We measured and compared patients' breathing capacity before and after the 10 sessions. Designed particularly for patients with spinal cord injuries resulting in a limited range of neck movement, the study used a 10-hole diatonic harmonica whose length was relatively short. For those patients who had difficulty using their hands, a harmonica holder was provided. Participants were trained to play simple tunes. They were guided to use abdominal breathing to make sounds, with emphasis on those parts requiring long and strong breathing. The results showed that for all eight patients both their breathing volume and their inspiratory volume increased following participation in the harmonica program. Also, the program had psychological benefits (e.g., more life satisfaction and less sadness) and additional physical benefits (e.g., less dizziness due to low blood pressure and better phlegm spitting). This study offers a unique way to help patients with spinal cord injuries to improve their breathing capacity, which may also be associated with a greater quality of life.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

Abnormal Water Temperature Prediction Model Near the Korean Peninsula Using LSTM (LSTM을 이용한 한반도 근해 이상수온 예측모델)

  • Choi, Hey Min;Kim, Min-Kyu;Yang, Hyun
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.3
    • /
    • pp.265-282
    • /
    • 2022
  • Sea surface temperature (SST) is a factor that greatly influences ocean circulation and ecosystems in the Earth system. As global warming causes changes in the SST near the Korean Peninsula, abnormal water temperature phenomena (high water temperature, low water temperature) occurs, causing continuous damage to the marine ecosystem and the fishery industry. Therefore, this study proposes a methodology to predict the SST near the Korean Peninsula and prevent damage by predicting abnormal water temperature phenomena. The study area was set near the Korean Peninsula, and ERA5 data from the European Center for Medium-Range Weather Forecasts (ECMWF) was used to utilize SST data at the same time period. As a research method, Long Short-Term Memory (LSTM) algorithm specialized for time series data prediction among deep learning models was used in consideration of the time series characteristics of SST data. The prediction model predicts the SST near the Korean Peninsula after 1- to 7-days and predicts the high water temperature or low water temperature phenomenon. To evaluate the accuracy of SST prediction, Coefficient of determination (R2), Root Mean Squared Error (RMSE), and Mean Absolute Percentage Error (MAPE) indicators were used. The summer (JAS) 1-day prediction result of the prediction model, R2=0.996, RMSE=0.119℃, MAPE=0.352% and the winter (JFM) 1-day prediction result is R2=0.999, RMSE=0.063℃, MAPE=0.646%. Using the predicted SST, the accuracy of abnormal sea surface temperature prediction was evaluated with an F1 Score (F1 Score=0.98 for high water temperature prediction in summer (2021/08/05), F1 Score=1.0 for low water temperature prediction in winter (2021/02/19)). As the prediction period increased, the prediction model showed a tendency to underestimate the SST, which also reduced the accuracy of the abnormal water temperature prediction. Therefore, it is judged that it is necessary to analyze the cause of underestimation of the predictive model in the future and study to improve the prediction accuracy.