• Title/Summary/Keyword: Physical Protection

Search Result 698, Processing Time 0.032 seconds

Surface Protection Obtained by Anodic Oxidation of New Ti-Ta-Zr Alloy

  • Vasilescu, C.;Drob, S.I.;Calderon Moreno, J.M.;Drob, P.;Popa, M.;Vasilescu, E.
    • Corrosion Science and Technology
    • /
    • v.17 no.2
    • /
    • pp.45-53
    • /
    • 2018
  • A new 80Ti-15Ta-5Zr wt% alloy surface was protected by anodic oxidation in phosphoric acid solution. The protective oxide layer (TiO2, ZrO2 and Ta suboxides and thickness of 15.5 nm) incorporated $PO{_4}^{3-}$ ions from the solution, according to high resolution XPS spectra. The AFM analysis determined a high roughness with SEM detected pores (20 - 50 nm). The electrochemical studies of bare and anodically oxidized Ti-15Ta-5Zr alloy in Carter-Brugirard saliva of different pH values and saliva with 0.05M NaF, pointed to a nobler surface for the protected alloy, with a thicker electrodeposited oxide layer acting as a barrier against aggressive ions. The oxidized alloy significantly decreased corrosion current densities and total quantity of ions released into the oral environment in comparison with the bare one, at higher polarisation resistance and protective capacity of the electrodeposited layer. The impedance data revealed a bi-layered oxidation film formed by: a dense, compact, barrier layer in contact with the metallic substrate, decreasing the potential gradient across the metal/oxide layer/solution interface, reducing the anodic dissolution and a more permissive, porous layer in contact with the electrolyte. The open circuit potential for protected alloy shifted to nobler values, with thickening of the oxidation film signifying long-term protection.

The Aesthetics of Hooded Garments after the Mid-20th Century (20세기 중반 이후 후드 복식에 나타난 복식미)

  • Choi, Sun-Young;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.62 no.3
    • /
    • pp.1-16
    • /
    • 2012
  • The purpose of this dissertation is to examine the various types of hooded garments that have been worn after the $20^{th}$ century, and to analyze the aesthetic values of them. The study examined various types of hooded garments with diverse significances based on literature and case studies on the history of garments, news paper articles and the Internet. Since the $20^{th}$ century, there has been a variety of hooded garments, such as monk dresses, hoodies, anoraks, duffle coats, some protective clothing, and designers' hooded clothes. Through this research, the study found that the aesthetics of hooded garments after the mid-20th century were as follows: physical protection, anonymity, psychological refuge, fashionability and high-functionality.

Inelastic two-degree-of-freedom model for roof frame under airblast loading

  • Park, Jong Yil;Krauthammer, Theodor
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.321-335
    • /
    • 2009
  • When a roof frame is subjected to the airblast loading, the conventional way to analyze the damage of the frame or design the frame is to use single degree of freedom (SDOF) model. Although a roof frame consists of beams and girders, a typical SDOF analysis can be conducted only separately for each component. Thus, the rigid body motion of beams by deflections of supporting girders can not be easily considered. Neglecting the beam-girder interaction in the SDOF analysis may cause serious inaccuracies in the response values in both Pressure-Impulse curve (P-I) and Charge Weight-Standoff Diagrams (CWSD). In this paper, an inelastic two degrees of freedom (TDOF) model is developed, based on force equilibrium equations, to consider beam-girder interaction, and to assess if the modified SDOF analysis can be a reasonable design approach.

The Trends of Next Generation Cyber Security (차세대 사이버 보안 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

Comparison & Analysis of Intrusion Detection System System Protection Profile of NSA and MIC (NSA IDS System PP와 국가기관용 IDS PP 가정사항 비교분석)

  • 김남기;박종오;김지영
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.57-65
    • /
    • 2003
  • A protection profile is the required specification document by consumer groups to specify what security purpose they would like to have in their specialized products. A protection profile assumption is the document that specifies consumer environment in the physical, artificial, network perspective and the contents of intended usage which include usage limitation, the value of latent asset, and additional applications for a TOE (Target of Evaluation). In this paper, we compare the assumptions of the NSA IDS PP and the IDS PP for government.

  • PDF

Routing and Wavelength Assignment in Survivable WDM Networks without Wavelength Conversion

  • Lee, Tae-Han;Park, Sung-Soo;Lee, Kyung-Sik
    • Management Science and Financial Engineering
    • /
    • v.11 no.2
    • /
    • pp.85-103
    • /
    • 2005
  • In this paper, we consider the routing and wavelength assignment problem in survivable WDM transport network without wavelength conversion. We assume the single-link failure and a path protection scheme in optical layer. When a physical network and a set of working paths are given, the problem is to select a link-disjoint protection path for each working path and assign a wavelength for each working and protection path. We give an integer programming formulation of the problem and propose an algorithm to solve it. Though the formulation has exponentially many variables, we solve the linear programming relaxation of it by using column generation technique. We devise a branch-and price algorithm to solve the column generation problem. After solving the linear programming relaxation, we apply a variable fixing procedure combined with the column generation to get an integral solution. We test the proposed algorithm on some randomly generated data and test results show that the algorithm gives very good solutions.

A Study on Fire Protection in Nuclear Power Plants and Application of the Code and Standards for Fire Protection Systems (원자력발전소 화재방호와 소방시설 기술기준 적용에 대한 고찰)

  • Kim, Wee-Kyong;Jeong, Kee-Sin
    • Fire Science and Engineering
    • /
    • v.26 no.6
    • /
    • pp.38-44
    • /
    • 2012
  • The purpose of fire protection for the nuclear power plants (NPPs) is to ensure safe shutdown state of the reactor, to minimize the release of radioactive materials to the environment, to provide physical safety of the on-site personnel, and to limit the property damage. Fire protection and extinguishing equipments are one of the important protection measures based on the defense-in-depth concept, which can promptly detect and control and extinguish those fires that do occur, thereby limiting fire damage. However, a separate evaluation process might be additionally necessary for the construction permit and operating license because the fire protection laws of the NEMA for installation standards of the fire protection systems is not fully characterized for the NPPs. It is also not easy to implement the regulations such as the performance based design concept for fire protection system of the NPPs which are characterized for a relatively low density of employee. This study suggests a guideline for the improvement of the technical standards for fire protection systems of the NPPs by evaluating the fundamental problems drawn by reviewing laws and regulatory guides relevant to fire protection and by evaluating the applicability of the KEPIC FPN in domestic nuclear power plants.