• Title/Summary/Keyword: Influence attack

Search Result 203, Processing Time 0.022 seconds

Power Process: The Interrelationships of Marital Power, Influence Strategies, and Negative Conflict Resolution Styles(Attack vs. Avoidance) (권력의 과정: 부부권력, 영향력전략, 부정적 갈등해결방식(공격 vs. 회피)의 관계)

  • Lee, Myung Shin;Yang, Nan Mee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.262-277
    • /
    • 2021
  • In order to explore the power process, a hypothetical model which explains the interrelationships among 3 marital power(traditional, egalitarian, personal), 3 influence strategies(reward, coercion, emotional), and 2 negative conflict resolution styles(attack vs. avoidance) was developed. In order to examine the gender differences, male model and female model were developed separately and compared. Using the data collected from 182 males and 196 females, the hypothetical model was tested. For data analysis, SEM was used. As a result, 3 common paths were found: Greater use of emotional influence strategy increased attack as well as avoidance. Greater egalitarian power increased reward. Egalitalian power affected the use of coercion, but the direction was opposed: male's egalitarian power decreased coercion, while female's egalitarian power increased it. Except these, the analyses revealed the substantial differences between male and female. Based on the findings, the ways to reduce attack and avoidance, and theoretical implications were discussed.

Robustness of RED in Mitigating LDoS Attack

  • Zhang, Jing;Hu, Huaping;Liu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.1085-1100
    • /
    • 2011
  • The Random Early Detection algorithm is widely used in the queue management mechanism of the router. We find that the parameters of the RED algorithm have a significant influence on the defense performance of the random early detection algorithm and discuss the robust of the algorithm in mitigating Low-rate Denial-of-Service attack in details. Simulation results show that the defense performance can be effectively improved by adjusting the parameters of $Q_{min}$ and $Q_{max}$. Some suggestions are given for mitigating the LDoS attack at the end of this paper.

Remote System User Authentication Scheme using Smartcards (스마트카드를 이용한 원격 시스템 사용자 인증 프로토콜)

  • Jeong, Min-Kyoung;Shin, Seung-Soo;Han, Kun-Hee;Oh, Sang-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.572-578
    • /
    • 2009
  • Bindu et al. pointed out that Chein et al. scheme is insecure insider attack and man-in-middle attack. And then they proposed new one. In the paper, However, Bindu et al's scheme also have some problems; It is strong masquerading server/user attack and restricted reply attack. Hence we proposed improved scheme. finally, we completely had evaluated the one's security on strong masquerading server/user attack, Insider attack, Restricted attack, Stolen-verifier attack and forward secrecy. In this paper, although proposed scheme includes more operation than Bindu et al. scheme, our scheme overcomes problems of Bindu et al. scheme by the operation that is light as not to influence on modern computing technology.

An Experimental Study on Effect of Angle of Attack on Elevator Control Force for Underwater Vehicle with Separate Fixed Fins (별도의 고정타를 갖는 수중운동체 승강타의 제어력에 미치는 받음각의 영향에 대한 실험적 연구)

  • Park, CJeong-Hoon;Shin, Myung-Sub;Choi, Jae-Yeop;Hwang, Jong-Hyun;Shin, Young-Hun;Kim, Yeon-Gyu
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.4
    • /
    • pp.243-252
    • /
    • 2016
  • Conventionally, the static angle of attack and static elevator tests are carried out separately to estimate hydrodynamic stability derivatives of underwater vehicles. However, it is difficult to verify the interaction between the angle of attack and elevator angle in such cases. In this study, we perform a static elevator with angle of attack test where both the angle of attack and elevator angle are varied simultaneously. The experimental results show that the angle of attack has an influence on the elevator control force and that this tendency is dependent on the sense in which the angle of attack and elevator angle are varied. We predict level flight performance using hydrodynamic derivatives estimated through this experiment. The predictions considering the effect of angle of attack show good agreement with trials conducted in the open sea.

Adversarial Machine Learning: A Survey on the Influence Axis

  • Alzahrani, Shahad;Almalki, Taghreed;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.193-203
    • /
    • 2022
  • After the everyday use of systems and applications of artificial intelligence in our world. Consequently, machine learning technologies have become characterized by exceptional capabilities and unique and distinguished performance in many areas. However, these applications and systems are vulnerable to adversaries who can be a reason to confer the wrong classification by introducing distorted samples. Precisely, it has been perceived that adversarial examples designed throughout the training and test phases can include industrious Ruin the performance of the machine learning. This paper provides a comprehensive review of the recent research on adversarial machine learning. It's also worth noting that the paper only examines recent techniques that were released between 2018 and 2021. The diverse systems models have been investigated and discussed regarding the type of attacks, and some possible security suggestions for these attacks to highlight the risks of adversarial machine learning.

The Influence of Carbonation on Physical and Chemical Property in Mortar (모르터의 물리.화학적 특성에 미치는 중성화의 영향)

  • 문소현;소승영;소양섭
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1995.10a
    • /
    • pp.30-34
    • /
    • 1995
  • There are carbonatiion, salt attack, freezing & thawing and alkali-aggregate reactions as the cautions of durability lowering of concret structure. Generally, these cautions complicatedly lower the durability of structure and among these cautions the most serious problem is salt attack and carbonation. This study is intending to get the carbonation phenominon, that among cement calcium hydroxides change into calcium carbonate by responding to carbon mitrogen in the air.

  • PDF

Modeling of time-varying stress in concrete under axial loading and sulfate attack

  • Yin, Guang-Ji;Zuo, Xiao-Bao;Tang, Yu-Juan;Ayinde, Olawale;Ding, Dong-Nan
    • Computers and Concrete
    • /
    • v.19 no.2
    • /
    • pp.143-152
    • /
    • 2017
  • This paper has numerically investigated the changes of loading-induced stress in concrete with the corrosion time in the sulfate-containing environment. Firstly, based on Fick's law and reaction kinetics, a diffusion-reaction equation of sulfate ion in concrete is proposed, and it is numerically solved to obtain the spatial and temporal distribution of sulfate ion concentration in concrete by the finite difference method. Secondly, by fitting the existed experimental data of concrete in sodium sulfate solutions, the chemical damage of concrete associated with sulfate ion concentration and corrosion time is quantitatively presented. Thirdly, depending on the plastic-damage mechanics, while considering the influence of sulfate attack on concrete properties, a simplified chemo-mechanical damage model, with stress-based plasticity and strain-driven damage, for concrete under axial loading and sulfate attack is determined by introducing the chemical damage degree. Finally, an axially compressed concrete prism immersed into the sodium sulfate solution is regarded as an object to investigate the time-varying stress in concrete subjected to the couplings of axial loading and sulfate attack.

Chosen Plaintext Collision Attack Using the Blacklist (Blacklist를 활용한 선택적 평문 충돌 쌍 공격)

  • Kim, Eun-Hee;Kim, Tae-Won;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1103-1116
    • /
    • 2014
  • Collision attacks using side channel analysis confirm same intermediate value and restore sensitive data of algorithm using this point. In CHES 2011 Clavier and other authors implemented the improved attack using Blacklist so they carried out the attack successfully using less plaintext than before. However they did not refer the details of Blacklist method and just performed algorithms with the number of used plaintext. Therefore in this paper, we propose the specific method to carry out efficient collision attack. At first we define basic concepts, terms, and notations. And using these, we propose various methods. Also we describe facts that greatly influence on attack performance in priority, and then we try to improve the performance of this attack by analyzing the algorithm and structuring more efficient one.

A Study on Improvement of Submarine Attack Periscope Operation Performance using Installing Protector on Sail (잠수함 공격잠망경 함교 보호구조물 설치를 통한 장비 운용성능 향상에 관한 연구)

  • Choi, Woo-Seok;Chang, Ho-Seong;Lee, Young-Suk;Kim, Sang-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.199-206
    • /
    • 2021
  • This paper describes the feasibility and reliability verification of installing a protective structure to protect attack periscopes. The attack periscope is the critical equipment of a submarine to enable the user to monitor surface and air activity, collect navigational data, and detect and identify targets. The attack periscope provides target information acquired through TV, IR camera, and laser range finder to the combat system. In the product improvement program, the upper part of the masts was exposed to the outside of the sail because the existing attack periscope was replaced with a new one. On the other hand, the head sensor can be damaged by floating objects, such as fishing nets, during sea navigation. Therefore, the installation of a protective structure for an attack periscope improved the equipment operation performance. The feasibility and reliability of the installation of the protective structure were verified by examining the influence of URN.

Coupling effects of vortex-induced vibration for a square cylinder at various angles of attack

  • Zheng, Deqian;Ma, Wenyong;Zhang, Xiaobin;Chen, Wei;Wu, Junhao
    • Wind and Structures
    • /
    • v.34 no.5
    • /
    • pp.437-450
    • /
    • 2022
  • Vortex-induced vibration (VIV) is a significant concern when designing slender structures with square cross sections. VIV strongly depends on structural dynamics and flow states, which depend on the conditions of the approaching flow and shape of a structure. Therefore, the effects of the angle of attack on the coupling effects of VIV for a square cylinder are expected to be significant in practice. In this study, the aerodynamic forces for a fixed and elastically mounted square cylinder were measured using wind pressure tests. Aerodynamic forces on the stationary cylinder are firstly discussed by comparisons of variation of statistical aerodynamic force and wind pressure coefficient with wind angle of attack. The coupling effect between the aerodynamic forces and the motion of the oscillating square cylinder by VIV is subsequently investigated in detail at typical wind angels of attack with occurrence of three typical flow regimes, i.e., leading-edge separation, separation bubble (reattachment), and attached flow. The coupling effect are illustrated by discussing the onset of VIV, characteristics of aerodynamic forces during VIV, and interaction between motion and aerodynamic forces. The results demonstrate that flow states can be classified based on final separation points or the occurrence of reattachment. These states significantly influence coupling effects of the oscillating cylinder. Vibration enhances vortex shedding, which creates strong fluctuations in aerodynamic forces. However, differences in the lock-in range, aerodynamic force, and interaction process for angles of attack smaller and larger than the critical angle of attack revealed noteworthy characteristics in the VIV of a square cylinder.