• Title/Summary/Keyword: Protection of trace

Search Result 61, Processing Time 0.025 seconds

Flood analysis for agriculture area using SWMM model: case study on Sindae drainage basin

  • Inhyeok Song;Hyunuk An;Mikyoung Choi;Heesung Lim
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.4
    • /
    • pp.799-808
    • /
    • 2023
  • Globally, abnormal climate phenomena have led to an increase in rainfall intensity, consequently causing a rise in flooding-related damages. Agricultural areas, in particular, experience significant annual losses every year due to a lack of research on flooding in these regions. This study presents a comprehensive analysis of the flood event that occurred on July 16, 2017, in the agricultural area situated in Sindaedong, Heungdeok-gu, Cheongju-si. To achieve this, the EPA (United States Environmental Protection Agency) Storm Water Management Model (SWMM) was employed to generate runoff data by rainfall information. The produced runoff data facilitated the identification of flood occurrence points, and the analysis results exhibited a strong correlation with inundation trace maps provided by the Ministry of the Interior and Safety (MOIS). The detailed output of the SWMM model enabled the extraction of time-specific runoff information at each inundation point, allowing for a detailed understanding of the inundation status in the agricultural area over different time frames. This research underscores the significance of utilizing the SWMM model to simulate inundation in agricultural areas, thereby validating the efficacy of flood alerts and risk management plans. In particular, the integration of rainfall data and the SWMM model in flood prediction methodologies is expected to enhance the formulation of preventative measures and response strategies against flood damages in agricultural areas.

Dissipative Replaceable Bracing Connections (DRBrC) for earthquake protection of steel and composite structures

  • Jorge M. Proenca;Luis Calado;Alper Kanyilmaz
    • Steel and Composite Structures
    • /
    • v.46 no.2
    • /
    • pp.237-252
    • /
    • 2023
  • The article describes the development of a novel dissipative bracing connection device (identified by the acronym DRBrC) for concentrically braced frames in steel and composite structures. The origins of the device trace back to the seminal work of Kelly, Skinner and Heine (1972), and, more directly related, to the PIN-INERD device, overcoming some of its limitations and greatly improving the replaceability characteristics. The connection device is composed of a rigid housing, connected to both the brace and the beam-column connection (or just the column), in which the axial force transfer is achieved by four-point bending of a dissipative pin. The experimental validation stages, presented in detail, consisted of a preliminary testing campaign, resulting in successive improvements of the original device design, followed by a systematic parametric testing campaign. That final campaign was devised to study the influence of the constituent materials (S235 and Stainless Steel, for the pin, and S355 and High Strength Steel, for the housing), of the geometry (four-point bending intermediate spans) and of the loading history (constant amplitude or increasing cyclic alternate). The main conclusions point to the most promising DRBrC device configurations, also presenting some suggestions in terms of the replaceability requirements.

Combustion Generated Fine Particles, Trace Metal Speciation, and Health Effects

  • Linak, William P.
    • Proceedings of the Korea Air Pollution Research Association Conference
    • /
    • 2003.11a
    • /
    • pp.195-195
    • /
    • 2003
  • Combustion generated fine particles, defined as those with aerodynamic diameters less than 2.5 m, have come under increased regulatory scrutiny because of suspected links to adverse human health effects. Transition metals are of particular interest due to the results of a number of studies that have shown cardiopulmonary damage associated with exposure to these elements and their presence in coal, residual fuel oils, sewage sludge, and other combusted fuels and wastes. This lecture will review results from multi-di sciplinary studies being conducted at EPA and elsewhere examining the physical, chemical, and toxicological characteristics of combustion generated particles. The research describes how collaborative work between combustion engineers and health scientists can provide insight on how combustion processes affect particle properties and subsequent health effects as measured by a combination of in-vitro and in-vivo studies using a variety of animal models. The focus of this lecture is on the interdisciplinary approach required to address the problem. Difficulties are discussed. Engineering aspects involved in this approach are described in detail. Physical and chemical characterizations are performed using a variety of analytical approaches including new techniques of x-ray absorption fine structure (XAFS) spectroscopy and x-ray absorption near-edge structure (XANES) deconvolution of these spectra to gather metal speciation information.

  • PDF

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.

A Study of Trace for Data Wiping Tools (완전삭제 도구 사용 흔적에 관한 연구)

  • Kim, Yeon-Soo;Bang, Je-Wan;Kim, Jin-Kook;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.159-164
    • /
    • 2010
  • The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used intentionally destruction of evidence. This intentionally destruction of evidence is important clues of forensic investigation. This paper demonstrates the methods for detecting the usage of wiping tools in digital forensic investigation.

A Meta-data Generation Technique for Efficient and Secure Code Reuse Attack Detection with a Consideration on Two Types of Instruction Set (안전하고 효율적인 Code Reuse Attack 탐지를 위한 ARM 프로세서의 두 가지 명령어 세트를 고려한 Meta-data 생성 기술)

  • Heo, Ingeo;Han, Sangjun;Lee, Jinyong;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.443-446
    • /
    • 2014
  • Code reuse attack (CRA)는 기존의 코드 내에서 필요한 코드 조각들 (gadgets)을 모아 indirect branch 명령어들로 잇는 방식으로 공격자가 원하는 악성 프로그램을 구성할 수 있는 강력한 공격 방법이다. 공격자는 자신의 코드를 대상 시스템에 심는 대신 기존의 코드를 이용하기 때문에, 대부분의 범용 운영체제 (OS)가 강제하는 W^X protection 을 무력화할 수 있다. 이러한 CRA 에 대응하기 위하여 다수의 연구들에서 branch 의 trace 를 분석하여 CRA 고유의 특성을 찾아내는 Signature 기반 탐지 기술을 제안하였다. 본 논문에서는 ARM 프로세서 상에서의 CRA 를 대응하기 위한 Signature 기반 탐지 기술을 효율적으로 도울 수 있는 binary 분석 및 meta-data 생성 기술을 제안한다. 특히, 본 논문은 우리의 이전 논문에서 고려 되지 못했던 ARM 의 두 가지 명령어 세트의 특성을 고려하여, 공격자가 어느 명령어 세트를 이용하여 CRA 를 시도하더라도 막아낼 수 있도록 meta-data 를 두 가지 mode 에 대해서 생성하였다. 실험 결과, meta-data 는 본래 바이너리 코드 대비 20.8% 정도의 크기 증가를 일으키는 것으로 나타났다.

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF

The engineering merit of the "Effective Period" of bilinear isolation systems

  • Makris, Nicos;Kampas, Georgios
    • Earthquakes and Structures
    • /
    • v.4 no.4
    • /
    • pp.397-428
    • /
    • 2013
  • This paper examines whether the "effective period" of bilinear isolation systems, as defined invariably in most current design codes, expresses in reality the period of vibration that appears in the horizontal axis of the design response spectrum. Starting with the free vibration response, the study proceeds with a comprehensive parametric analysis of the forced vibration response of a wide collection of bilinear isolation systems subjected to pulse and seismic excitations. The study employs Fourier and Wavelet analysis together with a powerful time domain identification method for linear systems known as the Prediction Error Method. When the response history of the bilinear system exhibits a coherent oscillatory trace with a narrow frequency band as in the case of free vibration or forced vibration response from most pulselike excitations, the paper shows that the "effective period" = $T_{eff}$ of the bilinear isolation system is a dependable estimate of its vibration period; nevertheless, the period associated with the second slope of the bilinear system = $T_2$ is an even better approximation regardless the value of the dimensionless strength,$Q/(K_2u_y)=1/{\alpha}-1$, of the system. As the frequency content of the excitation widens and the intensity of the acceleration response history fluctuates more randomly, the paper reveals that the computed vibration period of the systems exhibits appreciably scattering from the computed mean value. This suggests that for several earthquake excitations the mild nonlinearities of the bilinear isolation system dominate the response and the expectation of the design codes to identify a "linear" vibration period has a marginal engineering merit.

Development of a Laser Absorption NO/$NO_2$ Measuring System for Gas Turbine Exhaust Jets

  • Zhu, Y.;Yamada, H.;Hayashi, S.
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2004.03a
    • /
    • pp.802-806
    • /
    • 2004
  • For the protection of the local air quality and the global atmosphere, the emissions of trace species including nitric oxides (NO and NO$_2$) from gas turbines are regulated by local governments and by the International Civil Aviation Organization. In-situ measurements of such species are needed not only for the development of advanced low-emission combustion concepts but also for providing emissions data required for the sound assessment of the effects of the emissions on environment. We have been developing a laser absorption system that has a capability of simultaneous determination of NO and NO$_2$concentrations in the exhaust jets from aero gas turbines. A diode laser operating near 1.8 micrometer is used for the detection of NO while a separated visible tunable diode laser operating near 676 nanometers is used for NO$_2$. The sensitivities at elevated temperature conditions were determined for simulated gas mixtures heated up to 500K in a heated cell of a straight 0.5 m optical path. Sensitivity limits estimated as were 30 ppmv-m and 3.7 ppmv-m for NO and NO$_2$, respectively, at a typical exhaust gas temperature of 800K. Experiments using the simulated exhaust flows have proven that $CO_2$ and $H_2O$ vapor - both major combustion products - do not show any interference in the NO or NO$_2$ measurements. The measurement system has been applied to the NO/NO$_2$ measurements in NO and NO$_2$ doped real combustion gas jets issuing from a rectangular nozzle having 0.4 m optical path. The lower detection limits of the system were considerably decreased by using a multipass optical cell. A pair of off-axis parabola mirrors successfully suppressed the beam steering in the combustion gas jets by centralizing the fluctuating beam in sensor area of the detectors.

  • PDF

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.