• Title/Summary/Keyword: Defense behavior

Search Result 380, Processing Time 0.022 seconds

Measurement-based LEEFI Modeling and Experimental Verification for Predicting Firing Waveform of an ESAD (ESAD의 기폭 파형 예측을 위한 측정기반 LEEFI 모델링 및 검증)

  • Kang, Hyungmin;Kim, Joungho;Hwang, Sukhyun;Jung, Myung-suk;Jo, Seyoung;Son, Joongtak
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.1
    • /
    • pp.20-26
    • /
    • 2019
  • In this paper, we propose measurement based numerical resistivity model for low energy exploding foil initiator (LEEFI) of electronic safety and arming device(ESAD). A resistivity model describes a behavior of variable resistance in LEEFI by firing current. The previous resistivity model was based on high energy detonator applications as explosive bridge wire and exploding foil initiator. Therefore, to estimate the voltage, current, and burst time of LEEFI, a resistivity model suitable for LEEFI is needed. For the modeling of resistivity of LEEFI, we propose a specific action based equation which represents a behavior of LEEFI when firing current is applied. To verify the proposed model, we analyze a firing current transmission path to obtain parasitic impedance. We experimentally verify that the proposed resistivity model offers precise estimation for the behavior of variable resistance in LEEFI.

The Development and Validation of the Workplace Bullying Bystander Behavior Scale (직장 내 괴롭힘 주변인 행동 척도 개발 및 타당화 연구)

  • Choi, Soyeong;Lee, Seung-yeon
    • Korean Journal of Culture and Social Issue
    • /
    • v.28 no.2
    • /
    • pp.107-131
    • /
    • 2022
  • This study was conducted with the aim of developing and validating a measure of the workplace bullying bystander behavior. For the purpose, items were developed by referring to previous studies related to workplace bullying, and behavior subtypes were defined as pro-bullying, defending, and bystander behaviors. After confirming the content validity with the help of experts, a total of 31 preliminary items were composed. The final 26 items were selected by conducting an exploratory factor analysis and verifying the validity and reliability of the scale with a survey of 288 office workers who have directly or indirectly witnessed workplace bullying over the past three years. In this process, it was confirmed that defense behavior was distinguished into two types: Active and supportive. Confirmatory factor analysis was conducted with data from 518 office workers who have directly or indirectly witnessed workplace bullying over the past year, and the validity and reliability of the developed scale were confirmed. As a result of comparing the competing models to reconfirm the subtypes, it was confirmed again that active defense behavior and supportive defense behavior were distinguished. The criterion-related validity of all subtypes was confirmed by setting the criterion variables for workplace bullying behavior, altruistic behavior, pro-social behavior, fear of intervention, moral disengagement, guilt, and moral identity. Based on the result of this study, follow-up research tasks related to workplace bullying bystander behavior scale were suggested and the methods to prevent and intervene in workplace bullying while utilizing workplace bullying bystander behaviors were discussed.

A Comparison Study of Ego Defense Mechanisms between Conduct Adolescents and Normal Adolescents (품행장애 청소년과 정상 청소년의 자아방어기제에 관한 비교 연구)

  • Song, Jae-Ho;Jhin, Hea-Kyung;Kim, Bong-Seog
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.20 no.3
    • /
    • pp.140-145
    • /
    • 2009
  • Objectives : This study explored the differences in their ego defense mechanisms between adolescents with conduct disorder and normal adolescents. Methods : Subjects were 35 adolescents with conduct disorder and 44 normal adolescents. The Ewha Defense Mechanism Test (EDMT), consisting of 200 items and 20 scales, was administered, to examine the defense mechanisms of both groups of adolescents. Results : Normal adolescents presented statistically significantly higher scores on the reaction formation, controlling, suppression, anticipation, dissociation, and distortion scales than did adolescents with conduct disorder. Zn addition, adolescents with conduct disorder used neurotic defense mechanisms of both neurotic and mature levels less frequently than normal adolescents did. Factor analysis revealed that, normal adolescents had higher scores on ego-expansive factor scales and behavior control factor scales thanadolescents with conduct disorder did. Conclusion : The results suggest adolescents with conduct disorder use mature and ego-expansive defense mechanisms less frequently than do normal adolescents.

  • PDF

The Effect of High Current Pulse against Shaped Charge Jet by Flash X-Ray and Residual Penetration Depth (섬광 X선과 잔류관통깊이 분석을 통한 성형작약탄 제트에 대한 펄스전류 효과)

  • Joo, Jaehyun;Choi, Joonhong;Kim, Dongkyu;Kim, Siwoo;Kim, Jeongtae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.574-581
    • /
    • 2015
  • In this paper, the effect of high voltage current pulse against shaped charge jet was analyzed through the visualization of jet behavior using flash X-ray and comparison of depth of penetration(DOP) into RHA(Rolled Homogeneous Armor) witness plates. The behavior of jet particles has been acquired using a flash X-ray equipment when current pulse was applied into the metal jet of a shaped charge(SC) warhead. Typical results such as jet breakup and radial jet dispersion, which are due to electromagnetic pressure by current pulse, have been obtained. Dozens of penetration experiments using a shaped charge with 55 mm diameter were performed according to various combinations of major parametric variables such as electrode spacing, standoff distance from SC warhead to electrode, and charge voltage. Subsequently, interrelations between major parametric variables and DOPs into RHA were analyzed.

Territory Defense Strategy of the Wrinkled Frog, Rana rugosa

  • Park, Shi-Ryong;Cheong, Seokwan
    • The Korean Journal of Ecology
    • /
    • v.25 no.1
    • /
    • pp.25-28
    • /
    • 2002
  • The advertisement call of anurans functions to attract potential mates. The dominant frequency of an advertisement call is generally getting lower with increased snout-vent length (SVL) of the caller Rana rugosa has an advertisement call tilth a particularly high frequency modulation. We conducted a playback experiment to verify the function of frequency modulation, and investigated the territorial behavior of the frog. The frog has five types of territory defense strategy. Strategy choice depended on the caller's SVL. Small males became satellites or lowered the dominant frequency of their advertisement call, whereas large males actively defended their territory with encounter calls. In response to high frequency (1107 Hz) playback, the frogs lowered their advertisement call frequency, and towered them further in response to the low frequency (1028 Hz) playback. In addition, the number of pulses in a call was increased in response to the playback. These results indicate that the frog avoids physical conflict with competitors by selecting a territory defense strategy suitable for the caller's size, and by lowering its call frequency to disguise its SVL.

Deformation of the PDMS Membrane for a Liquid Lens Under Hydraulic Pressure

  • Gu, Haipeng;Gan, Zihao;Hong, Huajie;He, Keyan
    • Current Optics and Photonics
    • /
    • v.5 no.4
    • /
    • pp.391-401
    • /
    • 2021
  • In the present study, a hyperelastic constitutive model is built by complying with a simplified hyperelastic strain energy function, which yields the numerical solution for a deformed polydimethylsiloxane (PDMS) membrane in the case of axisymmetric hydraulic pressure. Moreover, a nonlinear equilibrium model is deduced to accurately express the deformation of the membrane, laying a basis for precise analysis of the optical transfer function. Comparison to experimental and simulated data suggests that the model is capable of accurately characterizing the deformation behavior of the membrane. Furthermore, the stretch ratio derived from the model applies to the geometrical optimization of the deformed membrane.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

Dynamic plastic deformation behavior of Fe-X%Mn alloys (Fe-X%Mn 합금의 동적 소성변형거동)

  • Park, Hong Lae;Lee, Jeong Min;Sung, Wan;Kim, Won Baek;Choi, Chong Sool
    • Journal of the Korean Society for Heat Treatment
    • /
    • v.8 no.4
    • /
    • pp.266-278
    • /
    • 1995
  • The high strain-rate dynamic plastic behavior of Fe-X%Mn alloys was investigated. The strain rate did not have an effect when tested under quasi-static strain rates($2{\times}10^{-3}/sec$ and $2{\times}10^{-1}/sec$). However, the true stress increased at all strain levels when the strain rate increased to $6{\times}10^3/sec$. Based on the experimental results, an constitution equation to calculate the dynamic strength for strain rates over $10^4/sec$ was determined. The Fe-5%Mn alloy containing athermal ${\alpha}^{\prime}$ martensite initially did not show work hardening. The work hardening increased with Mn content showing a maximum at 20% Mn. The high work hardening of Fe-20%Mn and Fe-30%Mn alloys appears to be closely related not only to the initial amounts of ${\varepsilon}$ martensite but to the strain induced transformation (${\gamma}{\rightarrow}{\varepsilon}$ and ${\varepsilon}{\rightarrow}{\alpha}^{\prime}$) occurring during each stages of deformation.

  • PDF

Optimal Control Of Two-Hop Routing In Dtns With Time-Varying Selfish Behavior

  • Wu, Yahui;Deng, Su;Huang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2202-2217
    • /
    • 2012
  • The transmission opportunities between nodes in Delay Tolerant Network (DTNs) are uncertain, and routing algorithms in DTNs often need nodes serving as relays for others to carry and forward messages. Due to selfishness, nodes may ask the source to pay a certain reward, and the reward may be varying with time. Moreover, the reward that the source obtains from the destination may also be varying with time. For example, the sooner the destination gets the message, the more rewards the source may obtain. The goal of this paper is to explore efficient ways for the source to maximize its total reward in such complex applications when it uses the probabilistic two-hop routing policy. We first propose a theoretical framework, which can be used to evaluate the total reward that the source can obtain. Then based on the model, we prove that the optimal forwarding policy confirms to the threshold form by the Pontryagin's Maximum Principle. Simulations based on both synthetic and real motion traces show the accuracy of our theoretical framework. Furthermore, we demonstrate that the performance of the optimal forwarding policy with threshold form is better through extensive numerical results, which conforms to the result obtained by the Maximum Principle.

Simulation for Propagation Behavior of a Gaussian Beam in Water Medium by Monte Carlo Method

  • Kim, Jae-Ihn;Jeong, Woong-Ji;Cho, Joon-Yong;Jo, Min-Sik;Kim, Hyung-Rok
    • Journal of the Optical Society of Korea
    • /
    • v.19 no.5
    • /
    • pp.444-448
    • /
    • 2015
  • We describe the radiative transfer of a Gaussian beam in a water medium using the Monte Carlo method offering basic propagation behaviors. The simulation shows how the energy of the initial Gaussian beam is redistributed as it propagates in coastal water, and also depicts the dependence of the propagation behavior on inherent optical properties of the ocean water such as the single scattering albedo as well as on laser beam parameters, e.g. the M squared. Our results may widen the applicability of LIDARs by providing a couple of design considerations for a bathymetric LIDAR.