• Title/Summary/Keyword: attack surface

Search Result 425, Processing Time 0.025 seconds

Performance Analysis of Stabilizer Fin Applied Coanda System (코안다 시스템이 장착된 안정기용 핀의 성능해석)

  • Seo, Dae-Won;Lee, Se-Jin;Oh, Jungkeun
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.1
    • /
    • pp.18-24
    • /
    • 2016
  • Stabilizer fins are installed on each side of a ship to control its roll motion. The most common stabilizer fin is a rolling control system that uses the lift force on the fin surface. If the angle of attack of a stabilizer fin is zero or the speed is zero, it cannot control the roll motion. The Coanda effect is well known to generate lift force in marine field. The performance of stabilizer fin that applies the Coanda effect has been verified by model tests and numerical simulations. It was found that a stabilizer fin that applied the Coanda effect at Cj = 0.085 and a zero angle of attack exactly coincided with that of the original fin at α = 26°. In addition, the power needed to generate the Coanda effect was not high compared to the motor power of the original stabilizer fin.

A study on the boundary layer characteristics of TP620 hydrofoil in the steady state (정상상태인 박용 TP620 익형의 경계층 특성 연구)

  • 서봉록;김시영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.50-56
    • /
    • 1986
  • This report deals with a study on the boundary layer characteristics of TP620 hydrofoil in the steady state by using two dimensional boundary layer theory. On the basis of complex velocity and laminar and turbulent boundary layer theory, the author attempts to know some tendency by evaluating the performance characteristic values of TP620 hydrofoil working in a uniform flow. In deriving characteristic values, he calculates numerically velocity, momentum thickness, skin friction coefficient, shape factor, and displacement thickness on the TP620 hydrofoil working at each attack angle in a uniform flow. Applying this present numerical calculation using Thwaites' and Head's method, the results of boundary layer on the hydrofoil are shown to be influenced by surface velocity and attack angle.

  • PDF

A Study of Heat Transfer in Supersonic Flow Field on a Sharp Fin Shape (Sharp Fin에 의한 초음속 유동장내 열전달 변화 연구)

  • Song, Ji-Woon;Yu, Man-Sun;Cho, Hyung-Hee
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.371-374
    • /
    • 2006
  • Heat transfer characteristic near a sharp fin in a supersonic flow was studied. Infra-red thermography was used to obtain the variation of surface heat transfer coefficient distribution. The attack angle of fin is ranged from $10^{\circ}\;to\;20^{\circ}$ and the oil flow method was also conducted to understand a flow field near a sharp fin.

  • PDF

NUMERICAL STUDY ON THE WAKE OF A SINGLE MICRO VORTEX GENERATOR (Single micro Vortex Generator의 후류에 대한 수치적 연구)

  • Kim, G.H.;Park, S.O.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.494-499
    • /
    • 2011
  • One of the devices to prevent separated flow over a wing or a flap at high angle of attack is a vortex generator. In the present work, we numerically study the flow around a low-profile or micro vortex generator whose height is less than local boundary layer thickness which can delay separation with a minimum drag penalty owing to its very small wetted surface area. As a first step toward a parametric study to efficiently design this MVG flow control system, we simulate the flow around a single MVG on a flat plate. For the simulation, we employ OpenFOAM with Launder-Sharma ${\kappa}$-epsilon model. The analysis results are validated by comparing with experimental results of a rectangular MVG at an angle of attack of 10 degrees whose height is 20% of local boundary layer. Important results and aspects of this numerical study are discussed. We also simulate the flow around rectangular, triangular and trapezoidal MVGs and the results are compared

  • PDF

An Experimental Study on the Engineering Properties of Concrete Spread with Liquefied Antibiotics (액상 항균제를 도포한 하수시설용 콘크리트의 공학적 특성에 관한 실험적 연구)

  • Lee Eui-Bae;Kim Yong-Duk;Cho Bong-Suk;Kim Jae-Hwan;Khil Bae-Su;Kim Moo-Han
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2005.05b
    • /
    • pp.233-236
    • /
    • 2005
  • Sewage facilities are positively necessary for environment improvement such as rainwater removal, sewage disposal, preservation of the quality of water and health of the citizens in present-day. Meanwhile, a deterioration of the concrete sewer facilities is increasing rapidly due to the chemical and physical attack and especially biochemical attack that is to say biodeterioration. In this study, to prevent biochemical corrosion of the sewer concrete, surface of the concrete was spread with liquefied organic and inorganic complex antibiotics and then its engineering properties were experimentally investigated

  • PDF

An Experimental Study on Measurement of Corrosion Initiation in Reinforced Concrete Exposed to Chloride Using EIS Method (EIS를 이용한 염해에 노출된 철근콘크리트의 부식개시 측정에 관한 실험적 연구)

  • Park, Dong-Jin;Park, Jang-Hyun;Lee, Kwang-Soo;Lee, Han-Seung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2017.11a
    • /
    • pp.61-62
    • /
    • 2017
  • In this study, the initiation of steel corrosion was monitored due to chloride attack using embedded sensor. In general, Steel bars embedded in concrete are protected from corrosion by being forming a passive film on the surface. However, the passive film is destroyed by chemical erosion such as concrete carbonation and chloride penetration, and the rebar is exposed to the deteriorating factor and corrosion proceeds. In order to realize the initiation of steel corrosion, OCP and change of Impedance parameter were observed by using Half-cell and EIS method depending on cover depth. As result, 10mm cover showed the impedence increased in 6weeks.

  • PDF

Smart Airport and Next Generation Security Screening Technology (스마트공항과 차세대 보안검색 기술)

  • Hong, J.W.;Oh, J.H.;Lee, H.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.2
    • /
    • pp.73-82
    • /
    • 2019
  • Airport is shifted airport 1.0 to airport 4.0 called smart airport and services paradigm is changed into direction to point the customer targeted benefits. Smart airports make use of integrated Internet of Things components to provide added-value services. By integrating smart components, airports are being exposed to a larger attack surface and new attack vectors. Self-services such as web or mobile check-in, self check-in/tagging/back drop/boarding, etc. should be strengthened to make airport processes smarter, and technologies such as automatic immigration, smart security search, and automatic AI-based baggage search should be applied. In this paper, we describe the necessity and importance of smart airports and next generation security screening technology. Further, we describe a walk through-type smart security screening system.

Influence of Carbonation and Freezing-thawing on the Chloride Diffusion in Concrete (탄산화 및 동결융해 현상이 콘크리트 중의 염소이온 확산에 미치는 영향 연구)

  • Kim, Dong-Baek;Kwon, Ki-Jun;Jung, Sang-Hwa;Bok, Hoon
    • Journal of the Korean Society of Safety
    • /
    • v.22 no.3 s.81
    • /
    • pp.57-64
    • /
    • 2007
  • Recently, the corrosion of concrete structures has received great attention related with the deterioration of sea-side structures, such as new airport, bridges, and nuclear power plants. In this regards, many studies have been done on the chloride attack in concrete structures. However, those studies were confined mostly to the single deterioration due to chloride only, although actual environment is rather of combined type. The purpose of the present study is, therefore, to explore the influences of carbonation and freezing-thawing action to chloride attack in concrete structures. The test results indicate that the chloride penetration is more pronounced than the case of single chloride attack when the carbonation process is combined with the chloride attack. It is supposed that the chloride ion concentration of carbonation region is higher than the sound region because of the separation of fixed salts. Though the use of fly ash pronounces the chloride ion concentration in surface, amounts of chloride ion penetration into deep region decreases with the use of fly ash. The small reduction of relative dynamic elastic modulus induced from freezing-thawing increases the chloride ion penetration depths much. The present study allows more realistic assessment of durability for such concrete structures which are subjected to combined attacks of both chlorides and carbonation or freezing-thawing but the future studies for combined environment will assure the precise assessment.

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.