• Title/Summary/Keyword: countermeasure methods

Search Result 217, Processing Time 0.024 seconds

Slope Stability for Bridge Access Road on Sedimentary Rocks using Geological Cross Sections (지질단면을 이용한 교량 접속도로 퇴적암 비탈면의 안정성 검토 연구)

  • Ihm, Myeong Hyeok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.507-512
    • /
    • 2022
  • The subjects of the study are the sedimentary rock slope of the Mesozoic Gyeongsang Supergroup, which has a high risk of failure. The rocks of the slope shall be sandstone, siltstone and dacite, and discontinuities shall develop beddings, shear joints, extension joints, and dacite dyke boundary planes. The type and scale of failure varies depending on the type of rock and the strike/dip of the discontinuities, but the planar failure prevails. Based on the face-mapping data, SMR, physical and mechanical testing of rocks, the critical equilibrium analysis, all representative sections required a countermeasure method because the acceptable safety factor during dry and rainy seasons were far below Fs=1.5 and Fs=1.2. After applying the countermeasure method, both the dry and wet conditions of the slope exceeded the allowable safety factor. In particular, the face-mapping data of the slope-face, the geological cross-sections of several representative sections perpendicular to the slope-face, and the critical equilibrium analysis and the presentation of countermeasure methods that have been reviewed based on them are expected to be reasonable tools for the slope stability.

An Algorithm for Switching from Arithmetic to Boolean Masking with Low Memory (저메모리 기반의 산술 마스킹에서 불 마스킹 변환 알고리즘)

  • Kim, HanBit;Kim, HeeSeok;Kim, TaeWon;Hong, SeokHie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.5-15
    • /
    • 2016
  • Power analysis attacks are techniques to analyze power signals to find out the secrets when cryptographic algorithm is performed. One of the most famous countermeasure against power analysis attacks is masking methods. Masking types are largely classified into two types which are boolean masking and arithmetic masking. For the cryptographic algorithm to be used with boolean and arithmetic masking at the same time, the converting algorithm can switch between boolean and arithmetic masking. In this paper we propose an algorithm for switching from boolean to arithmetic masking using storage size at less cost than ones. The proposed algorithm is configured to convert using the look-up table without the least significant bit(LSB), because of equal the bit of boolean and arithmetic masking. This makes it possible to design a converting algorithm compared to the previous algorithm at a lower cost without sacrificing performance. In addition, by applying the technique at the LEA it showed up to 26 percent performance improvement over existing techniques.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

Analysis for the Effect of Channel Contraction for Sedimentation Reduction on the Flood Level and Bed Changes in the Lower Nakdong River (낙동강 하류의 퇴사저감을 위한 하폭축소방법이 홍수위변화 및 하상변동에 미치는 영향 분석)

  • Jang, Eun-Kyung;Ji, Un
    • Journal of Environmental Science International
    • /
    • v.22 no.3
    • /
    • pp.291-301
    • /
    • 2013
  • Sediment from the upstream channel has been deposited near the Nakdong River Estuary Barrage (NREB) due to the mild slope and decreased velocity. The annual mechanical dredging to ensure the flood capacity has been performed to remove the deposited sediment. However, the dredging method is not considered as an effective countermeasure due to high cost and long time to operate. Therefore, many methods for sedimentation reduction have been proposed for NREB. Especially, the channel contraction method to mitigate sedimentation problem by changing the channel geometry from 2 km to 3 km upstream of NREB has been recently suggested as an effective countermeasure. However, there is the possibility that the channel contraction method induces flood level increase compared to original condition. Therefore, it is necessary to investigate quantitatively the flood level changes in the upstream and downstream section due to the channel contraction method for NREB. In this study, water level changes by 10% channel contraction of whole width has been evaluated using the HEC-RAS model and simulated with and without channel contraction for various flood discharge. As a result, water level in the section where the channel was contracted was decreased by 0.02 m and flood level at the upstream of channel contracted was increased up to 0.015 m for the 500-year flood.

Performance Enhancement and Countermeasure for GPS Failure of GPS/INS Navigation System of UAV Through Integration of 3D Magnetic Vector

  • No, Heekwon;Song, Junesol;Kim, Jungbeom;Bae, Yonghwan;Kee, Changdon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.3
    • /
    • pp.155-163
    • /
    • 2018
  • This study examined methods to enhance navigation performance and reduce the divergence of navigation solutions that may occur in the event of global positioning system (GPS) failure by integrating the GPS/inertial navigation system (INS) with the three-dimensional (3D) magnetic vector measurements of a magnetometer. A magnetic heading aiding method that employs a magnetometer has been widely used to enhance the heading performance in low-cost GPS/INS navigation systems with insufficient observability. However, in the case of GPS failure, wrong heading information may further accelerate the divergence of the navigation solution. In this study, a method of integrating the 3D magnetic vector measurements of a magnetometer is proposed as a countermeasure for the case where the GPS fails. As the proposed method does not require attitude information for integration unlike the existing magnetic heading aiding method, it is applicable even in case of GPS failure. In addition, the existing magnetic heading aiding method utilizes only one-dimensional information in the heading direction, whereas the proposed method uses the two-dimensional attitude information of the magnetic vector, thus improving the observability of the system. To confirm the effect of the proposed method, simulation was performed for the normal operation and failure situation of GPS. The result confirmed that the proposed method improved the accuracy of the navigation solution and reduced the divergence speed of the navigation solution in the case of GPS failure, as compared with that of the existing method.

The Awareness and Countermeasures against Harmful Effect of Passive Smoking in Korean Adult (일부 성인의 간접흡연에 대한 인식도 및 대책)

  • Sim, Hong-Seok;Hong, Hyun-Sook;Meng, Kwang-Ho;Lee, Kang-Sook
    • Journal of Preventive Medicine and Public Health
    • /
    • v.33 no.1
    • /
    • pp.91-98
    • /
    • 2000
  • Objectives : This study is to evaluate the awareness, attitude, practice and the countermeasures against passive smoking in Korean adults. Methods : By self-administered questionnaires, we assessed the knowledge, attitude, behavior for passive smoking and the countermeasure for reduction of it's harmful effects in 289 men and 238 women. Results : The subjects that have heard about passive smoking were 96.8% in total and well known were 26.4% of current smoker, 56.6% of ex-smoker, and 14.8% of non-smoker(p=0.001). The irritative symptom from passive smoking was the most frequent in non-smokers and the most common place where exposed to passive smoking was public place. For attitude against passive smoking in 'no smoking allowed area', ex-smokers were the most active to recommend to stop smoking. And for opinion about establishment of 'no smoking allowed area', the restriction by law was the best acceptable method in smokers, exsmokers, and nonsmokers. In marking of 'no smoking allowed area', 69.9% of smokers answered no smoking, but in non-marking area only 6.3% stop smoking. When smokers were recommended to stop smoking, the more subjects stop smoking with good feeling in marking area, but the less in non-marking area. The factor associated the high awareness of passive smoking were aged(OR=1.07, 1.03-1.12), men(OR=4.34, 2.32-8.46). The persons who have known well about passive smoking had good attitude and behavior to prevent of harmful effect of passive smoking. Conclusions : This study suggested that education program would be necessary to reduce the passive smoking.

  • PDF

Development of a Risk Assessment Program for Chemical Terrorism (화학적 테러에 대한 위험성 평가 프로그램 개발)

  • Lee, Younghee;Kim, Eunyong;Kim, Jinkyung;Moon, Il
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2008
  • This study focuses on assessing the security ri sk or the terrorism in chemical process industries. This research modifies conventional method for assessing the terrorism risk. The risk assessment method is developed and it is implemented as software to analyze the possibility of terrorism and sabotage. This program includes five steps; asset characterization, threat assessment, vulnerability analysis, risk assessment and new countermeasures. It is a systematic, risk based approach in which risk is a function of the severity of consequences of an undesired event, the likelihood of adversary attack, and the likelihood of adversary success in causing the undesired event. The reliability of the program is verified using a dock zone case. The case dock zone includes a storage farm, a manufacturing plant, an electrical supply utility, a hydrotreater unit, many containers, and administration buildings. This study represents chemical terrorism response technology, the prevention plan, and new countermeasure to mitigate by using risk assessment methods in the chemical industry and public sector. This study suggests an effective approach to the chemical terrorism response management.

  • PDF

A Study on the Present Condition and Countermeasure Plan for the Disaster Protection in Public Library of Korea (한국 공공도서관의 재난대비 실태와 대응방안 연구)

  • Kim, Po-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.4
    • /
    • pp.85-110
    • /
    • 2006
  • Recently, there have been a number of news reports on natural disasters, like earthquakes. typhoons, floods and tsunami, all over the world. Korea does not seem to be safe from such disasters or terror threats. As places with high numbers of visitors. libraries need to take preventive measures to be prepared for such disasters and threats. This paper analyzes the current status of emergency measures adopted by 75 public libraries in Seoul. Daejeon and Jeonbuk in Korea. For each library surveyed. the causes of and ways to recover from disasters were reviewed and detailed analyses were carried out in low areas: Implementation of preventive measures disaster management and equipment, status of human resources and assignment of people to disaster recovery, safety courses offered to library users and training methods. In addition, each area was analyzed in regard to possible solutions and ideas for improvement, as well as suggestions to upgrade disaster recovery systems in the future.

Effect of Agricultural Countermeasures on Ingestion Dose Following a Nuclear Accident

  • Keum, Dong-Kwon;Jeong, Hyojoon;Jun, In;Lim, Kwang-Muk;Choi, Yong-Ho;Lee, So-Hyeon;Jung, Tae-Jong
    • Journal of Radiation Protection and Research
    • /
    • v.44 no.1
    • /
    • pp.8-14
    • /
    • 2019
  • Background: Management of an agricultural food product system following a nuclear accident is indispensable for reducing radiation exposure due to ingestion of contaminated food. The present study analyzes the effect of agricultural countermeasures on ingestion dose following a nuclear accident. Materials and Methods: Agricultural countermeasures suitable for domestic farming environments were selected by referring to the countermeasures applied after the Fukushima accident in Japan. The avertable ingestion doses that could be obtained by implementing the selected countermeasures were calculated using the Korean Agricultural Countermeasure Analysis Program (K-ACAP) to investigate the efficiency of each countermeasure. Results and Discussion: Of the selected countermeasures, the management of crops was effective when radionuclide deposition occurred during the growing season of plants. Treatment by soil additive and topsoil removal was effective when deposition occurred during the nongrowing season of plants. The disposal of milk was not effective owing to the small contribution of milk to the overall ingestion dose. Clean feeding of livestock was effective when deposition occurred during the growing season of fodder plants such as pasture and rice-straw. Finally, the effect of food restriction increased with the soil deposition density of radionuclide. The practical effect of countermeasures was very small when the avertable ingestion dose was absolutely low. Conclusion: The agricultural countermeasures selected to reduce the radionuclide ingestion dose after a nuclear accident must be made appropriate by considering the accident situation, such as the soil deposition density of the radionuclide and the deposition date in relation to farming cycles.

Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem

  • Darem, Abdulbasit;Alhashmi, Asma A.;Jemal, H.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.303-311
    • /
    • 2022
  • The tremendous growth of the Internet of things is unbelievable. Many IoT devices have emerged on the market over the last decade. This has made our everyday life easier inside our homes. The technology used at home has changed significantly over the past several decades, leading to what is known today as the smart home. However, this growth has also brought new challenges to our home security and privacy. With the smart home becoming more mainstream, cybersecurity issues have become a fundamental concern. The smart home is an environment where heterogeneous devices and appliances are interconnected through the Internet of Things (IoT) to provide smart services to residents. These services include home climate control, energy management, video on demand, music on-demand, remote healthcare, remote control, and other similar services in a ubiquitous manner. Smart home devices can be controlled via the Internet using smartphones. However, connecting smart home appliances to wireless networks and the Internet makes individuals vulnerable to malicious attacks. Remote access within the same environment or over the Internet requires an effective access control mechanism. This paper intends to shed light on how smart home devices are working as well as the type of security and privacy threats of the smart home. It also illustrated the types of authentication methods that can be used with smart home devices. In addition, a comparison of Smart home IoT-based security protocols was presented along with a security countermeasure that can be used in a smart home environment. Finally, a few open problems were mentioned as future research directions for researchers.