• 제목/요약/키워드: Threat Evaluation

검색결과 226건 처리시간 0.027초

시험평가용 레이다 재밍신호 시뮬레이터 설계 연구 (A Study on the Radar Jamming Signal Simulator Design for the Test & Evaluation)

  • 최성린;이상훈;정회인
    • 한국통신학회논문지
    • /
    • 제27권2B호
    • /
    • pp.160-169
    • /
    • 2002
  • 레이다 운용자는 레이다 스코우프를 통해 표적을 인지하고 추적함으로 레이다운용을 방해하는 재밍신호를 극복할 수 있는 훈련과 레이다의 전자보호 신호에 대한 시험평가가 필요하며, 이를 위해 레이다에 거리기만, 속도기만, 방위기만 및 다중허위표적의 기만재밍 신호와 점 잡음, 광대역 잡음, 점 소인 잡음 및 엄폐펄스 형태의 잡음재밍 신호를 발생할 수 있는 레이다 재밍신호 발생 알고리즘과 시뮬레이터를 설계하였다. 본 논문에서 제안한 알고리즘과 디지털회로 설계기술을 적용하여 6조의 구성요소들로 이루어진 시뮬레이터를 제작하였으며 실험을 통해 제작된 시뮬레이터의 유용성을 확인하였다.

Aseismic protection of historical structures using modern retrofitting techniques

  • Syrmakezis, C.A.;Antonopoulos, A.K.;Mavrouli, O.A.
    • Smart Structures and Systems
    • /
    • 제4권2호
    • /
    • pp.233-245
    • /
    • 2008
  • For historical masonry structures existing in the Mediterranean area, structural strengthening is of primary importance due to the continuous earthquake threat that is posed on them. Proper retrofitting of historical structures involves a thorough understanding of their structural pathology, before proceeding with any intervention measures. In this paper, a methodology is presented for the evaluation of the actual state of historical masonry structures, which can provide a useful tool for the seismic response assessment before and after the retrofitting. The methodology is mainly focused on the failure and vulnerability analysis of masonry structures using the finite element method. Using this methodology the retrofitting of historical structures with innovative techniques is investigated. The innovative technique presented here involves the exploitation of Shape Memory Alloy prestressed bars. This type of intervention is proposed because it ensures increased reversibility and minimization of interventions, in comparison with conventional retrofitting methods. In this paper, a case study is investigated for the demonstration of the proposed methodologies and techniques, which comprises a masonry Byzantine church and a masonry Cistern. Prestressed SMA alloy bars are placed into the load-bearing system of the structure. The seismic response of the non-retrofitted and the retrofitted finite element models are compared in terms of seismic energy dissipation and displacements diminution.

수정 RVS와 IRVS시스템의 비교분석을 통한 국내 고층건물 테러위험도 평가 (Risk Assessment of Tall Buildings in Korea by comparative study of Modified RVS and IRVS system)

  • 유영수;윤성원;주영규
    • 한국공간구조학회논문집
    • /
    • 제12권4호
    • /
    • pp.91-98
    • /
    • 2012
  • As the occurrence rate of terror and hazard is increasing throughout the world, GSA, DoD, and FEMA are proceeding a study about mitigating the damage of terror. Korea is no more a safe place from the terrorist's threat, so we need to make measures against them. In this study we developed modified RVS System by revising some items to adjust the system to the domestic condition and conducted a risk assessment on several tall buildings in Korea. By using IRVS system which is developed by DHS, we also carried out the risk assessment. Comparing the results between RVS with IRVS, we performed terror risk evaluation of tall buildings. Through risk assessment of several tall buildings, we analyzed key factors of each scenarios and suggested the mean value of each items, so we would like to help the counter-terrorism in the design phase.

THE APPLICATION OF PSA TECHNIQUES TO THE VITAL AREA IDENTIFICATION OF NUCLEAR POWER PLANTS

  • HA JAEJOO;JUNG WOO SIK;PARK CHANG-KUE
    • Nuclear Engineering and Technology
    • /
    • 제37권3호
    • /
    • pp.259-264
    • /
    • 2005
  • This paper presents a vital area identification (VAI) method based on the current fault tree analysis (FTA) and probabilistic safety assessment (PSA) techniques for the physical protection of nuclear power plants. A structured framework of a top event prevention set analysis (TEPA) application to the VAI of nuclear power plants is also delineated. One of the important processes for physical protection in a nuclear power plant is VAI that is a process for identifying areas containing nuclear materials, structures, systems or components (SSCs) to be protected from sabotage, which could directly or indirectly lead to core damage and unacceptable radiological consequences. A software VIP (Vital area Identification Package based on the PSA method) is being developed by KAERI for the VAI of nuclear power plants. Furthermore, the KAERI fault tree solver FTREX (Fault Tree Reliability Evaluation eXpert) is specialized for the VIP to generate the candidates of the vital areas. FTREX can generate numerous MCSs for a huge fault tree with the lowest truncation limit and all possible prevention sets.

기술 포트폴리오 지도(TPM) 방법론 적용에 관한 연구 (Application of TPM Methodology for Evaluation GIS R&D Project)

  • 이국철;백기철;강병기
    • 한국전자통신학회논문지
    • /
    • 제4권2호
    • /
    • pp.152-161
    • /
    • 2009
  • 최근 국가R&D사업이 대형화 복합화 됨에 따라 기술개발과 관련된 기획 및 관리에서 새로운 기법 및 체계의 도입이 요구되고 있다. 본 연구는 다양한 기술이 포함된 대형 국가R&D사업 중 하나인 지능형국토정보기술혁신사업에 적용된 R&D 관리 기법인 기술 포트폴리오 지도(TPM) 방법론을 소개하고, TPM을 적용한 R&D 관리 적용 사례를 제시하기 위하여 수행되었다. 이에 따라 제2장에서는 TPM 방법론의 의의와 구성, 방법 등에 대하여 설명하였으며, 제3장에서는 TPM 방법론이 적용된 지능형국토정보기술혁신사업의 개략적인 내용과 동 사업에 TPM 방법론을 적용하기 위해 수행된 구체적인 절차와 TPM 방법론 구현 사례, TPM 방법론을 통한 과제관리 내용을 제시하였다. 이와 같은 사례는 향후 유사 대형 R&D사업 관리 기법의 발달에 기여할 수 있을 것으로 생각된다.

  • PDF

Assessment of the Distribution of the Street Trees of Suwon City for Biodiversity

  • Choi, Sun A;Kim, Shin Won
    • KIEAE Journal
    • /
    • 제14권5호
    • /
    • pp.49-57
    • /
    • 2014
  • This research is about analysis and evaluation of biodiversity of Suwon's street tree, then understanding the problem of it and finally finding a solution. Because the increasing damage of the street trees by disease and insects, insecticide is applied to prevent further damage. However, this insecticide is found to be cancer genic and causing hygienic threat to civilians. Therefore, by gathering Suwon's internal statistics about Suwon's street tree, the trees are divided into three categories, tall evergreen trees, deciduous trees, shrubs following Frank's 30-20-10 theory(1990). Also, according to species diversity index, the problem of disease and insect is researched in terms of biodiversity, and here we suggests solutions to counter such problems. According to the results, the trees planted in Suwon was found to be 31 families, 43 genus and 58 species. The most used kinds, almost 85% of the whole species, are found to be Rhododendron indicum (L.) Sweet, Buxus koreana Nakai ex Chung & al, Euonymus japonicus Thunb, Ligustrum obtusifolium Siebold & Zucc. Besides these, the rest of 15% of street trees had little variety. Therefore, it is necessary to plant tree variously and equally in terms of biodiversity. If this Frank's 10-20-30 solution is not enough to completely solve coulure problem, then further research will be done on soil properties, and local features for improvement of Suwon street tress.

Ambient Vibration measurements and finite element modelling for the Hong Kong Ting Kau Bridge

  • Au, F.T.K.;Tham, L.G.;Lee, P.K.K.;Su, C.;Han, D.J.;Yan, Q.S.;Wong, K.Y.
    • Structural Engineering and Mechanics
    • /
    • 제15권1호
    • /
    • pp.115-134
    • /
    • 2003
  • The Ting Kau Bridge in Hong Kong is a cable-stayed bridge comprising two main spans and two side spans. The bridge deck is supported by three towers, an end pier and an abutment. Each of the three towers consists of a single reinforced concrete mast which reduces its section in steps, and it is strengthened by transverse cables and struts in the transverse vertical plane. The bridge deck is supported by four inclined planes of cables emanating from anchorages at the tower tops. In view of the threat from typhoons, the dynamic behaviour of long-span cable-supported bridges in the region is always an important consideration in their design. This paper is devoted to the ambient vibration measurements of the bridge for evaluation of dynamic characteristics including the natural frequencies and mode shapes. It also describes the modelling of the bridge. A few finite element models are developed and calibrated to match with the field data and the results of subsequent structural health monitoring of the bridge.

철도사고 위험분류 및 원인분석에 관한 연구 (A Study on the Analysis and Classification of Types and Causes of Railway Accidents)

  • 박찬우;박주남;왕종배;조연옥
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2005년도 추계학술대회 논문집
    • /
    • pp.599-604
    • /
    • 2005
  • As a public transportation possible to convey a large quantity, the railway is safe and keeps time, but it has hazards to cause a disaster if the accidents such as collision, derailment, and fire occur. So advanced countries carry out System Safety Plan with various program activities which have connected orders to maintain or improve safety level by finding hazards, evaluation, taking measures and practice, and improving problems. Especially they systematically manage hazards to cause railway accidents and the factors which possibly threat safety, using national classification of risk and causes with analysis of the related data such as establishing accident/incident data and safety regulations/standards. As executing railway safety regulations, domestic railway is currently trying to improve railway safety management system. The research of classification system of accidents/incidents is one thing to make railway safety management systems better. In this research, we reviewed hazardous factors of railway systems and classification of the causes as the beginning of system safety management, and we conducted study on development of railway accident classification based on findings of this research. The results are able to be used in identifying hazards and activities of systemic safety management at the step of railway accident report and investigation.

  • PDF

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs

  • Rathore, Shailendra;Sharma, Pradip Kumar;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제13권4호
    • /
    • pp.1014-1028
    • /
    • 2017
  • Social networking services (SNSs) such as Twitter, MySpace, and Facebook have become progressively significant with its billions of users. Still, alongside this increase is an increase in security threats such as cross-site scripting (XSS) threat. Recently, a few approaches have been proposed to detect an XSS attack on SNSs. Due to the certain recent features of SNSs webpages such as JavaScript and AJAX, however, the existing approaches are not efficient in combating XSS attack on SNSs. In this paper, we propose a machine learning-based approach to detecting XSS attack on SNSs. In our approach, the detection of XSS attack is performed based on three features: URLs, webpage, and SNSs. A dataset is prepared by collecting 1,000 SNSs webpages and extracting the features from these webpages. Ten different machine learning classifiers are used on a prepared dataset to classify webpages into two categories: XSS or non-XSS. To validate the efficiency of the proposed approach, we evaluated and compared it with other existing approaches. The evaluation results show that our approach attains better performance in the SNS environment, recording the highest accuracy of 0.972 and lowest false positive rate of 0.87.

A Survey on Passive Image Copy-Move Forgery Detection

  • Zhang, Zhi;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.6-31
    • /
    • 2018
  • With the rapid development of the science and technology, it has been becoming more and more convenient to obtain abundant information via the diverse multimedia medium. However, the contents of the multimedia are easily altered with different editing software, and the authenticity and the integrity of multimedia content are under threat. Forensics technology is developed to solve this problem. We focus on reviewing the blind image forensics technologies for copy-move forgery in this survey. Copy-move forgery is one of the most common manners to manipulate images that usually obscure the objects by flat regions or append the objects within the same image. In this paper, two classical models of copy-move forgery are reviewed, and two frameworks of copy-move forgery detection (CMFD) methods are summarized. Then, massive CMFD methods are mainly divided into two types to retrospect the development process of CMFD technologies, including block-based and keypoint-based. Besides, the performance evaluation criterions and the datasets created for evaluating the performance of CMFD methods are also collected in this review. At last, future research directions and conclusions are given to provide beneficial advice for researchers in this field.