• Title/Summary/Keyword: Expected Attack

Search Result 214, Processing Time 0.029 seconds

Analytical Estimation of the Performance of Marine Concrete with Mineral Admixture (광물질 혼화재를 혼합한 해양 콘크리트의 해석적 성능 평가)

  • Lee, Bang-Yeon;Kwon, Seung-Jun;Kang, Su-Tae
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.3 no.4
    • /
    • pp.301-306
    • /
    • 2015
  • For the purpose of developing high performance marine concrete with improved crack resistance and durability, this analytical study aimed to estimate strength, hydration heat characteristics, and chloride attack resistance of concrete with mineral admixture. Ground granulated furnace slag and fly ash were considered for mineral admixture. The replacement of ground granulated furnace slag and fly ash considered in the analysis was in the range of 0~70% and 0~40 %, respectively. The analysis results indicated that both ground granulated furnace slag and fly ash decreased compressive strength, and the effect of adding ground granulated furnace slag on mitigation of hydration heat was limited whereas fly ash had an noticeable influence on it. It was also found that the replacement with ground granulated furnace slag enhanced the chloride attack resistance but fly ash deteriorated the resistance. From the analytical studies, It could be expected that a ternary blended cement composition with proper amount of ground granulated furnace slag and fly ash might be effective to control crack resistance as well as chloride attack resistance of marine concrete.

A proposal of Circular Lock Pattern Method on Smart phone (원형 스마트폰 잠금 패턴 방식 제안)

  • Im, Ji-woo;Lee, Seung-jay;Jang, Won-jun;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1471-1477
    • /
    • 2019
  • Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users' smart phones don't support biometric security. The most convenient security method for devices that don't support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It's expected to solve vulnerability.

Calculation of Expected Sliding Distance of Wave Dissipating Caisson Breakwater (소파케이슨 방파제의 기대활동량 산정)

  • Kim, Dong-Hyawn
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.17 no.4
    • /
    • pp.213-220
    • /
    • 2005
  • An approach to calculate expected sliding distance of wave dissipating caisson breakwater is proposed. Time history of dynamic wave pressure for the calculation of sliding distance is made by extending conventional static wave pressure developed for the wave dissipating caisson breakwater. Construction of impact wave and standing wave was done by using duration time and maximum wave pressures of themselves. In the numerical analysis, the sliding distance for an attack of single wave and expected sliding distance for 50 years of wave dissipating breakwater by proposed method were compared with those by conventional method for uplift caisson breakwater. It was found that the sliding distance of wave dissipating breakwater by the proposed method is smaller than by conventional method.

Estimation of Optimum Maintenance Cycle for the Chloride Damaged RC Structure (염해를 입은 RC 구조물의 최적 보수주기 산정 기법에 관한 연구)

  • Yun, Sun-Young;Lee, Han-Seung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2010.05a
    • /
    • pp.235-236
    • /
    • 2010
  • Since many structures in the sea environment are damaged by chloride, appropriate repair strategy is required. Therefore in the paper, optimum period for the RC structure's repair is calculated with consideration of economic efficiency. Moreover, when the concrete members are repaired with the other material such as polymer mortar forr section restoration, their expected service life also calculated to predict more accurate repair period during the life span.

  • PDF

Change of Fine Structure of Aliphatic Polyester fiber by strectching

  • 홍기정;박수민
    • Proceedings of the Korean Fiber Society Conference
    • /
    • 1997.04a
    • /
    • pp.328-332
    • /
    • 1997
  • Hot stretching focused on the improvement of properties of poly(L-lactic acid) fiber. Some aliphatic polyesters are biodegradable under microbial attack and the new unique applications are expected. Generally, these materials have a somewhat low melting temperature and low mechanical properties compared with the aromatic polyesters. In this study, melt-spinning of poly(L-lactic acid) was conducted. We investigated effects of the stretching and the molecular orientation of aliphatic polyester fibers on the change of fine-structure. Glass transition temperature, molecular orientation and crystallinity increased according to the increase of stretching ratio.

  • PDF

Synthesis of 5-Fluorouracil by Ring Transformation of s-Triazine (s-Triazine의 Ring Transformation에 의한 5-FU의 합성)

  • 정원근;정진현
    • YAKHAK HOEJI
    • /
    • v.26 no.1
    • /
    • pp.25-27
    • /
    • 1982
  • We had reported that s-triazine can readily be converted into the corresponding 5-substituted pyrimide. In order to develop new synthetic method of 5-fluorouracil, we tried to replace eliminating fragment, 1, 3-dimethylurea, by fluoroacetamide, which was expected to undergo nucleophilic attack by proton extraction of both .alpha.-hydrogen and aminohydrogen by lithium diisopropylamide (LDA). We found that 5-fluorouracil could be transformed from s-triazine under strong base condition like LDA as well as other 5-substituted pyrimidines.

  • PDF

Kinetics and Mechanism of the Reactions of S-Phenyl Dithiobenzoates with Benzylamines in Acetonitrile

  • 오혁근;신철호;이익춘
    • Bulletin of the Korean Chemical Society
    • /
    • v.16 no.7
    • /
    • pp.657-661
    • /
    • 1995
  • Kinetic studies are carried out on the reaction of S-phenyl dithiobenzoates with benzylamines in acetonitrile at 30.0 ℃. Small magnitude of ρX (βX) as well as ρZ (βZ) obtained suggests rate-limiting nucleophilic attack of the thiocarbonyl carbon. This is supported by the unusually small magnitude of ρXY and ρYZ, albeit their signs do not agree with those expected. Moreover, the inverse secondary kinetic isotope effects (kH/kD<1.0) involving deuterated benzylamine nucleophiles are also in line with the proposed mechanism.

Study on the physical vulnerability factors in the convergence IT environment (융합 IT 환경의 물리적 취약요인에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2016
  • Recently, many domestic and foreign industries is increasing gradually in the importance of security such as the emergence of a Convergence Information Technology(internet of things, cloud computing service, big data etc). Among these techniques, the industrial security market is expected to grow gradually and the evolution of security technologies, as well as vulnerabilities are also expected to increase. Therefore, an increase in physical vulnerability factors it is no exaggeration to standards that are determining the security of industrial security. In this paper will be analyzed to the physical security technology and case study, physical vulnerability factor. Thereby this is expected to be utilized as a basis for the countermeasure of physical corresponding infringement and attack in a future.

The Strategies of Manufacturers and Retailers for Customer Acquisition and Retention Using Scanner Panel Data (스캐너 패널 데이터를 이용한 유통업체와 제조업체간의 고객확보 및 유지 전략에 관한 연구)

  • Lee, Seung-yon;Son, Jungmin
    • Knowledge Management Research
    • /
    • v.12 no.3
    • /
    • pp.73-96
    • /
    • 2011
  • Recent market saturation makes the local retailers consider an attempt to innovate the market with the retailer's brand. This is the retailers' efforts to expand the market control through the enhancement of private brands. As the competition among manufacturers extends to the competition between manufacturers and retailers, the marketing knowledges of manufacturers need to be diversified to the ones that can be applied to the manufacturers and retailers due to their bilateral competition. This research concentrates on the customer acquisition strategy (attack strategy) and customer retention strategy (defense strategy) in the place of both sides of manufacturers and retailers. Also this research targets to develop the differential marketing strategies for target market's National Brand(NB)/Private Brand(PB) purchase by analyzing individual customer's purchase probability on repurchase and switch-purchase of NB and PB. This study is based on the data of frequently consumed product, tomato ketchup on scanner panel from the ERIM data of University of Chicago, USA. This study compares and analyzes the NB and PB repurchases and switch-purchase of 4 types. The comparisons provide the informations that which factors should be managed for the attack strategy, the defense strategy, and the differential marketing strategies both for manufacturers and retailers. This research is expected to contribute on cumulating the industrial knowledges of retailers' and manufacturers' survival strategy, expecially focusing on the effect of marketing factors and consumer-characteristic factors.

  • PDF

A Study of the Performance Degradation Factors of An Internal Network (내부 네트워크의 성능저하요인에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.43-50
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network and most of the network through a various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information Assets from External attacks. But, The use of Security Systems and Network deployment inside the network makes a significant impact on Security and Performance. Therefore, In this paper, it will be to analyze the Performance Degradation Factors of the Internal Network according to the Security System's use and placement. In a future, This paper is expected to serve as a valuable information for the Network Performance and Security improvements.