• Title/Summary/Keyword: bypassing

Search Result 155, Processing Time 0.022 seconds

Comparative Analysis of Cosmic Radiation Exposure Dose Due to the Russian Detour Route

  • Hee-Bok Ahn;Jaeyoung Kwak;Junga Hwang
    • Journal of Astronomy and Space Sciences
    • /
    • v.40 no.2
    • /
    • pp.59-66
    • /
    • 2023
  • Since the World Health Organization (WHO) officially announced a global pandemic on March 12, 2020, the aviation industry in the world has been experiencing difficulties for a long time. Meanwhile, the Ukraine war broke out in February, and from March 15, domestic airlines must operate air routes bypassing Russian airspace despite the longer flight time. Therefore, as the flight time increases, the cosmic radiation exposure dose of the crew members is also expected to increase. Here we compare the radiation exposure dose between the route doses for the eastern United States and Europe before and after the detour route usage. Through the comparison analysis, we tried to understand how cosmic radiation changes depending on the flight time and the latitude and which one contributes more. We expect that this study can be used for the policy update for the safety management of cosmic radiation for aircrews in Korea.

Effect of Cyclic Injection on Migration and Trapping of Immiscible Fluids in Porous Media (공극 구조 내 교차 주입이 비혼성 유체의 포획 및 거동에 미치는 영향)

  • Ahn, Hyejin;Kim, Seon-ok;Lee, Minhee;Wang, Sookyun
    • Economic and Environmental Geology
    • /
    • v.52 no.1
    • /
    • pp.37-48
    • /
    • 2019
  • In geological $CO_2$ sequestration, the behavior of $CO_2$ within a reservoir can be characterized as two-phase flow in a porous media. For two phase flow, these processes include drainage, when a wetting fluid is displaced by a non-wetting fluid and imbibition, when a non-wetting fluid is displaced by a wetting fluid. In $CO_2$ sequestration, an understanding of drainage and imbibition processes and the resulting NW phase residual trapping are of critical importance to evaluate the impacts and efficiencies of these displacement process. This study aimed to observe migration and residual trapping of immiscible fluids in porous media via cyclic injection of drainage-imbibition. For this purpose, cyclic injection experiments by applying n-hexane and deionized water used as proxy fluid of $scCO_2$ and pore water were conducted in the two dimensional micromodel. The images from experiment were used to estimate the saturation and observed distribution of n-hexane and deionized water over the course drainage-imbibition cycles. Experimental results showed that n-hexane and deionized water are trapped by wettability, capillarity, dead end zone, entrapment and bypassing during $1^{st}$ drainage-imbibition cycle. Also, as cyclic injection proceeds, the flow path is simplified around the main flow path in the micromodel, and the saturation of injection fluid converges to remain constant. Experimental observation results can be used to predict the migration and distribution of $CO_2$ and pore water by reservoir environmental conditions and drainage-imbibition cycles.

Analysis of Flooding DoS Attacks Utilizing DNS Name Error Queries

  • Wang, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2750-2763
    • /
    • 2012
  • The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past decade, Denial-of-Service (DoS) attacks have targeted the DNS infrastructure and threaten to disrupt this critical service. While the flooding DoS attacks may be alleviated by the DNS caching mechanism, we show in this paper that flooding DoS attacks utilizing name error queries is capable of bypassing the cache of resolvers and thereby impose overwhelming flooding attacks on the name servers. We analyze the impacts of such DoS attacks on both name servers and resolvers, which are further illustrated by May 19 China's DNS Collapse. We also propose the detection and defense approaches for protecting DNS servers from such DoS attacks. In the proposal, the victim zones and attacking clients are detected through monitoring the number of corresponding responses maintained in the negative cache. And the attacking queries can be mitigated by the resolvers with a sample proportion adaptive to the percent of queries for the existent domain names. We assess risks of the DoS attacks by experimental results. Measurements on the request rate of DNS name server show that this kind of attacks poses a substantial threat to the current DNS service.

Restoration of Tactility of Architectural Glass: Perceptual & Sensible Tactility - Focused on the Analysis of Laminata Glass House -

  • Kim, Sung-Wook;Kim, Do-Sik
    • Architectural research
    • /
    • v.12 no.2
    • /
    • pp.23-30
    • /
    • 2010
  • The study of the expression of architectural glass has recently expanded due to various factors such as the development of architectural technology, the reinforcement of environmental standards, an increased interest in energy saving, and the commercialism of the exterior of buildings. The background for restoring the tactile capability of the sense of sight has been prepared by agitating oculocentricism pertaining to the Renaissance era. The restoration of tactility can be considered in two ways. One is the tactility 'perceived' through complex experiences and the other is the tactility 'sensed' from the challenges on the materiality of the glass itself. Perceptual tactility is achieved from compound visual experiences and connecting these complex experiences in the brain. Sensible tactility, in contrast to perceptual tactility, is a more direct tactility which works within the nervous system, bypassing the brain. This is attained by reversion of the materiality, tectonics and connection method of the glass. Among rare examples, Laminata House built in Leerdam, Netherlands is a fine example of direct and sensible tactility. In this paper, the process of restoring tactility in architecture is studied at each stage based on the restoration of tactility in painterly aesthetics.

An Approach to Global Path Replanning Method Considering 4D Environmental Information (4D 환경정보를 반영한 광역 경로수정계획 기법에 관한 연구)

  • Kwak, Dong Jun;Shin, Jongho;Kim, Chong Hui
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.779-788
    • /
    • 2016
  • In this paper, a global path replanning method is proposed in order to plan a global path minimizing the risk of the unmanned vehicle on the battlefield. We first introduce 4D environmental information consisting of mobility, visibility, kill, and hit attributes, and a unified threat map and a mobility map are defined by the four attributes. Using the mobility map, the unmanned vehicle can find the shortest path on the traversable area. And then taking into account the deterrent according to the type of the unmanned vehicle on the integrated threat map, the vehicle can generate a route to suppress or avoid the threat of enemy as well. Moreover, we present a waypoints bypassing method to exclude unnecessary waypoints rather than the mission point when planning paths for the multiple waypoints.

Alternatives for The Stable Operation of Wastewater Treatment Plant in Combined Sewer System during Wet Weather (합류식 하수관거 지역에서 강우시 하수처리장 적정운영방안에 관한 연구)

  • Lee, Doo-jin;Shin, Eung-Bai;Hong, Chul-ui;Ahn, Se-young
    • Journal of Korean Society on Water Environment
    • /
    • v.20 no.2
    • /
    • pp.132-144
    • /
    • 2004
  • The purpose of this study was to evaluate alternatives for stable operation of WWTP(Wastewater Treatment Plant) with a higher rate of inflows and a higher concentration of pollutants during wet weather to minimize the pollution loads being discharged into receiving waters. 3Q(Q: dry weather flow) of a base flow is normally intercepted and flows into WWTP as it was current practice. It is revealed by simulation that the bypassing alternative of 1Q through secondary treatment and 2Q into the stream after primary treatment was as good as it is expected. The bypass pollution loads were in the range of 23.9 ~ 38.5 % of the total loads flowing into the WWTP indicating that the bypassed flows need an extra treatment such as stormwater detention reservoir, high-rate coagulation with sedimentation, and step-feed. The high-rate coagulation with sedimentation was the most effective with respect to removal of the pollution loads.

Evidence for the Ras-Independent Signaling Pathway Regulating Insulin-Induced DNA Synthesis

  • Jhun, Byung-H.
    • BMB Reports
    • /
    • v.32 no.2
    • /
    • pp.196-202
    • /
    • 1999
  • The existence of the Ras-independent signal transduction pathway of insulin leading to DNA synthesis was investigated in Rat-1 fibroblasts overexpressing human insulin receptor (HIRc-B) using the single-cell microinjection technique. Microinjection of a dominant-negative mutant $Ras^{N17}$ protein into quiescent HIRc-B cells inhibited the DNA synthesis stimulated by insulin. Microinjection of oncogenic H-$Ras^{V12}$ protein ($H-Ras^{V12}$) (0.1 mg/ml) induced DNA synthesis by 35%, whereas that of control-injected IgG was induced by 20%. When the marginal amount of oncogenic H-$Ras^{V12}$ protein was coinjected with a dominant-negative mutant of the H-Ras protein ($Ras^{N17}$), DNA synthesis was 35% and 74% in the absence and presence of insulin, respectively. This full recovery of DNA synthesis by insulin suggests the existence of the Ras-independent pathway. The same recovery was observed in the cells coinjected with either H-$Ras^{V12}$ plus H-$Ras^{N17}$ plus SH2 domain of the p85 subunit of PI3-kinase ($p85^{SH2-N}$) or H-$Ras^{V12}$ plus H-$Ras^{N17}$ plus interfering anti-Shc antibody. When co-injected with a dominant-negative H-$Ras^{N17}$, the DNA synthesis induced by the Ras-independent pathway was blocked. These results indicate that the Ras-independent pathway of insulin leading to DNA synthesis exists, bypassing the p85 of PI3-kinase and Shc protein, and requires Rac1 protein.

  • PDF

A Study on the Deformation Induced Microstructure $L1_2$-ordered $Ni_3Al$ Containing Fine Precipitates (미세석출상을 포함하는 $L1_2$형 규칙 $Ni_3Al$의 변형조직에 관한 연구)

  • Han, Chang-Suk;Lee, Joon
    • Journal of the Korean Society for Heat Treatment
    • /
    • v.21 no.5
    • /
    • pp.251-258
    • /
    • 2008
  • A transmission electron microscope investigation has been performed on the morphology of dislocations in deformed ${\gamma}^{\prime}-Ni_3(Al,Ti)$ alloys containing fine dispersion of disordered ${\gamma}$ particles. Superlattice dislocations dissociate into fourfold Shockley partial dislocations in a uniform supersaturated solid solution of the ${\gamma}^{\prime}$ phase. Dislocations are attracted into the disordered ${\gamma}$ phase and dissociate further in the particles. At any stage of aging, dislocations cut through the particles and the Orowan bypassing process does not occur even in the over-aged stage of this alloy system. The work necessary to pull the dislocation away from the disordered particles into the ordered matrix should mainly contribute to increase the strength of the ${\gamma}^{\prime}$ phase containing fine dispersion of the disordered ${\gamma}$ phase.

Protecting Memory of Process Using Mandatory Access Control (강제적 접근제어를 통한 프로세스 메모리 보호)

  • Shim, Jong-Ik;Park, Tae-Kyou;Kim, Jin-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1947-1954
    • /
    • 2011
  • There are various attacks such as tampering, bypassing and spoofing which are caused with system-wide vulnerabilities of Windows operating system. The underlying operating system is responsible for protecting application-space mechanisms against such attacks. This paper provides the implementation of mandatory access control known as multi-level security (MLS) rating with TCSEC-B1 level on th kernel of Windows$^{TM}$. By adding especially the protection feature against tampering memory of processes to the security kernel, this implementation meets the responsibility against system-wide vulnerabilities.

A Study on Countermeasures against Messenger Phishing using ARIT Technique (ARIT 기법을 이용한 메신저 피싱 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.223-230
    • /
    • 2013
  • With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.