• Title/Summary/Keyword: Intrusion Direction

Search Result 64, Processing Time 0.021 seconds

COMS METEOROLOGICAL IMAGER SPACE LOOK SIDE SELECTION ALGORITHM

  • Park, Bong-Kyu;Lee, Sang-Cherl;Yang, Koon-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.100-103
    • /
    • 2008
  • COMS(Communication, Ocean and Meteorological Satellite) has multiple payloads; Meteorological Image(MI), Ocean Color Imager(GOCI) and Ka-band communication payloads. MI has 4 IR and 1 visible channel. In order to improve the quality of IR image, two calibration sources are used; black body image and cold space look data. In case of COMS, the space look is performed at 10.4 degree away from the nadir in east/west direction. During space look, SUN or moon intrusions are strictly forbidden, because it would degrade the quality of collected IR channel calibration data. Therefore we shall pay attention to select space look side depending on SUN and moon location. This paper proposes and discusses a simple and complete space look side selection logic based on SUN and moon intrusion event file. Computer simulation has been performed to analyze the performance of the proposed algorithm in term of east/west angular distance between space look position and hazardous intrusion sources; SUN and moon.

  • PDF

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

A Study on the Structural Deformations in the Sedimentary Layer Resulted from Magma Intrusion (마그마관입에 의한 상부퇴적층의 변형에 관한연구)

  • Min, Kyung Duck;Kim, Won Young
    • Economic and Environmental Geology
    • /
    • v.10 no.1
    • /
    • pp.37-48
    • /
    • 1977
  • The earth's crust is unceasingly undergoing deformations because of the forces acting upon it. The relationship between the tectonic forces and the resulting deformations are found from the states of stresses in the earth's crust induced by these forces. The study has been attempted to analyze the deformations of the overlying sedimentary layers, which are deformed by the magma intrusion along its lower boundary. The elastic model is constructed to analyze the geologic structures, by means of the theory of elasticity, and then the appropriate boundary conditions are given. The solution of the Airy stress function which satisfies the given boundary conditions is derived from the analytic method. The internal stress distributions of the deformed elastic model layer are portrayed by principal stress trajetories, and then the corresponding potential faults and joints systems are predicted from the Coulomb-Mohr failure criterion. The internal displacement distributions are shown by the calculated displacement components vectors, namely horizontal, vertical and net components. Results of the numerical calculations show the developments of some geologic structures as follows; (1) one set of shear joints and or two sets of shear joints which are oppisite directions, and one set of extension joints parallel to the ${\sigma}_1$ direction, (2) one set of high angle thrusts and normal faults, (3) symmetric fold; both limbs are dipping in opposite direction with low angle. The field work at the Wall-A San area, located near Jinju City, in southern Korea, had accomplished to compare the field structures with the predicted ones. The results of the comparison exhibits the developments of joint and fault systems satisfactorily consistent with each others. But the area does not show any type of folding, in spite of the intrusion of a granodiorite massif, this fact is one of the important features of the whole Kyungsang sedimentary basins of Mesozoic age distributed at the south-eastern parts of Korea. For this reason, it is thought that the magma intrusion had occurred with extremly low pressure. The geologic structures have been modified by the erosion and weathering throughout the geologic time, and the conditions of the sedimentary layers (width, thickness and radius of magma) are not the same as before, being intruded by the magma. To enlighten this, it is preferable to study these geologic structures with analyses of various types of rheological models.

  • PDF

Palatal en-masse retraction of segmented maxillary anterior teeth: A finite element study

  • Park, Jae Hyun;Kook, Yoon-Ah;Kojima, Yukio;Yun, Sunock;Chae, Jong-Moon
    • The korean journal of orthodontics
    • /
    • v.49 no.3
    • /
    • pp.188-193
    • /
    • 2019
  • Objective: The aim of this finite element study was to clarify the mechanics of tooth movement in palatal en-masse retraction of segmented maxillary anterior teeth by using anchor screws and lever arms. Methods: A three-dimensional finite element method was used to simulate overall orthodontic tooth movements. The line of action of the force was varied by changing both the lever arm height and anchor screw position. Results: When the line of action of the force passed through the center of resistance (CR), the anterior teeth showed translation. However, when the line of action was not perpendicular to the long axis of the anterior teeth, the anterior teeth moved bodily with an unexpected intrusion even though the force was transmitted horizontally. To move the anterior teeth bodily without intrusion and extrusion, a downward force passing through the CR was necessary. When the line of action of the force passed apical to the CR, the anterior teeth tipped counterclockwise during retraction, and when the line of action of the force passed coronal to the CR, the anterior teeth tipped clockwise during retraction. Conclusions: The movement pattern of the anterior teeth changed depending on the combination of lever arm height and anchor screw position. However, this pattern may be unpredictable in clinical settings because the movement direction is not always equal to the force direction.

Development of a Visual-Basic based Two-Dimensional Finite-Difference Density-Coupled Flow Numerical Code for Simulating Saltwater Intrusion (해수침투 모의를 위한 Visual Basic 기반 2차원 유한차분 밀도 결합 흐름 모델 개발)

  • Chang, Sun Woo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.6
    • /
    • pp.973-980
    • /
    • 2017
  • The purpose of this study is to develop VDFT (Visual Basic based Density-coupled Flow and Transport), a numerical modeling code used to simulate density coupled flow equations used to simulate seawater intrusion in a two dimensional finite difference method. The VDFT code has the advantage of being intuitive and simple to use and has the advantage of utilizing the EXCEL Visual Basic platform, which is widely used for general business purposes. Generally, code developed for numerical simulation can be verified through representative example models called benchmark problem. In this study, we verified the VDFT code using benchmark problem called Henry Problem and Modified Henry Problem as well as two laboratory test data. The results of this study are analyzed the importance of each benchmark problems, validated VDFT code compared to those problems. In conclusion, the possibility of using VDFT code is diagnosed and the direction of future research is suggested.

Petrological Study on the Jongam granite in the Ogcheon Geosynclinal Zone (옥천지향사대내(沃川地向斜帶內)에 분포(分布)하는 종암화강암(鍾岩花崗岩)의 암석학적(岩石學的) 연구(硏究))

  • Cho, Seon Hyeong
    • Economic and Environmental Geology
    • /
    • v.10 no.4
    • /
    • pp.185-198
    • /
    • 1977
  • This paper is the result of a petrochemical study on the Jongam granite mass which intruded metasediments of Ogcheon zone, locating about 10km northwest from Miweon town, and the mass is $2.5km^2$ in area. In this study, the granite was petrographically analysed in such ways, modal analysis, myrmekite analysis, petrochemical study analysis and tectonic analysis of joint system. The findings are as follows: 1) The area of the granite distributed is a basin surrounded by metasediments. The granite is magma origin. 2) The major mineral composition of the granite are quartz, plagioclase, microcline orthoclase and biotite, and accessaries are muscovite, sericite, magnetite, zircon and sphene. 3) In triangles of $Qu-K{\cdot}fp-PI$, Bi-Or-Hb+Mt and Qu-Ab-Or, the data point areas are similar to those of the NW zone of D.S. Lee (1971) 4) The granite mass can be divided into three granites; quartz monzonite, granodiorite and biotite granite, by petrological aspect in detail. 5) It shows inverse ratio of content between quartz and plagioclase. 6) The myrmekite-texture of the granite are stem type and dominating in northern part. 7) In the tectonic analysis of joint, the strikes are almost constant in direction, N-S direction of dominant joints 8) The geological age of the granites estimated to be Jurassic in age. 9) According to the mineralogical distribution and joint systen, the intrusion direction of the granite magma was infered as from north to south.

  • PDF

제주도 동부 해안대수층에서의 수평 유향.유속 검층자료 해석

  • Kim Gu-Yeong;Seong Hyeon-Jeong;Kim Tae-Hui;Park Gi-Hwa;Park Yun-Seok;Go Gi-Won;Park Won-Bae;U Nam-Chil
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2005.04a
    • /
    • pp.271-275
    • /
    • 2005
  • The horizontal heat-pulse flowmeter was used to measure grounwater flow in volcanic rocks at sites in eastern part of Jeju Island, Korea. Three boreholes, Handong-1, Jongdal-1, and Susan-1, which are located at close distance from the coastline, were selected from the sea water intrusion monitoring wells. To evaluate the direction and velocity of the groundwater flow, 6 to 8 measuring points for each borehole were chosen. There are two major flow directions at Handong-1, which are toward north-east and south-east directions and velocity ranges from $2.2{\sim}3.0cm/hr\;and\;0.6{\sim}1.0cm/hr$, respectively. For Jongdal-1, two major flow directions were detected that are east and north-west and velocity ranges from $1.2{\sim}2.0cm/hr$. For Susan-1, major flow is toward east direction and the ,velocity ranges from $2.2{\sim}2.7cm/hr$ at depth $60{\sim}70m$,\;and\;0.8{\sim}0.9cm/hr$ at depth $70{\sim}80m$. In order to evaluate the tidal effect on groundwater flow, direction and velocity were measured at specific depth with time, At depth 57m of Susan-1, the velocity increased during the tidal variation, The flow direction and velocity varies with different depths, and they are also affected by tidal fluctuation. Thereafter, care must be taken when flow direction and velociy is estimated indirectly by using hydraulic head at monitoring wells.

  • PDF

Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly

  • Kim, Sung-Hyun;Lee, Hee-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.671-690
    • /
    • 2010
  • The continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in security devices create security holes and prevent the system from determining quickly whether allow or deny a packet. Policy anomalies exist among the rules in multiple security devices as well as in a single security device. The solution for policy anomalies requires complex and complicated algorithms. In this paper, we propose a new method to remove policy anomalies in a single security device and avoid policy anomalies among the rules in distributed security devices. The proposed method classifies rules according to traffic direction and checks policy anomalies in each device. It is unnecessary to compare the rules for outgoing traffic with the rules for incoming traffic. Therefore, classifying rules by in-out traffic, the proposed method can reduce the number of rules to be compared up to a half. Instead of detecting policy anomalies in distributed security devices, one adopts the rules from others for avoiding anomaly. After removing policy anomalies in each device, other firewalls can keep the policy consistency without anomalies by adopting the rules of a trusted firewall. In addition, it blocks unnecessary traffic because a source side sends as much traffic as the destination side accepts. Also we explain another policy anomaly which can be found under a connection-oriented communication protocol.

Three Dimensional Structure of the Ullung Warm Lens

  • CHO Kyu-Dae;BANG Tae-Jin;SHIM Tae-Bo;YU Hong-Sun
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.23 no.4
    • /
    • pp.323-333
    • /
    • 1990
  • We studied the existence, form, size, variation and formation of warm lenses in the East Sea(Japan Sea) during $1979\~1988$ based on annual reports of oceanographic observations published by the National Fisheries Research and Development Agency of Korea and data of the Hydrographic Office of Republic of Korea. The warm lenses were formed in August, 1981, 1982, 1986 during study periods. The ranges of warm lenses were 50, 60, 90 km in the east-west(EW) direction and 100, 150, 120 km in the north-south(NS) direction in 1981, 1982, 1986, respectively. Because of the intrusion of cold water near 103 line, they shrink in horizontal scale in 1981. Most warm lenses were found at station 8 of 104 line in the vicinity of Ullung Island but centers of the lenses moved to the north in 1986. The form and position of warm lenses were related with the intensity of the Tsushima Warm Current and the formation of warm lenses were related with the bottom topography.

  • PDF

Detection of Sea-water Intrusion Caused by Tidal Action Using DC Resistivity Monitoring (전기비저항 모니터링을 이용한 해수침투 파악)

  • Hwang, Hak-Soo;Lee, Sang-Kyu;Ko, Dong-Chan;Kim, Yang-Soo;Park, In-Hwa
    • Geophysics and Geophysical Exploration
    • /
    • v.3 no.1
    • /
    • pp.1-6
    • /
    • 2000
  • The 1 $km^2$ area studied is located in Sukchun-ri, Hwasung-koon, the southern part of Kyeonggi-do. Even though this site has been known as a contaminated area caused by seawater intrusions, geophysical and geochemical surveys have never been carried out at the site to determine the extent of the seawater contamination and to investigate whether the seawater intrusion is in progress. The purpose of this study is to determine the extent of seawater contamination and a preferred channel of the seawater intrusion using geophysical methods such as DC resistivity surveys with Schlumberger array and a dipole-dipole array. In order to determine whether the seawater intrusion is in progress in the area, DC resistivity monitoring with Schlumberger array was performed. According to the resistivity map obtained from the inversion of the resistivity data measured with Schlumberger array, the study area is divided into two districts as relatively lowly resistive (less than 30 ohm-m) and highly resistive (more than 30 ohm-m) areas. The distribution of the lowly resistive area is consistent with the distribution of the layer composed of clay minerals, and the resistivity of this layer decreases slowly as approaching to the old seashore. Hydrogeological analysis shows that the clay layer within a distance of about 200 m from the seashore has been already contaminated by sea-water and its electric conductivity is 8 times higher than that of the sand layer covered by the clay layer. According to the results of the 2-dimensional DC resistivity surveys with a dipole-dipole array, there are two preferred channels of the seawater intrusion in the site, and both the channels are in the NW-SE direction from the old seashore. The lowly resistive zone in the southern channel extends to a depth of 80 m. The DC resistivity monitoring with Schlumberger array was carried out along the preferred channel which has the low resistivity Bone (fracture zone) that extended to a depth of 80 m. The time series of apparent resistivity, measured at a distance of 260 m from the old coast line, fluctuates with a period of 12 hours. From these observations, it can be concluded that the seawater intrusion caused by tidal action is still in progress along the fractured zone interpreted by the DC resistivity surveys with a dipole-dipole array.

  • PDF