• Title/Summary/Keyword: reflection attack

Search Result 17, Processing Time 0.025 seconds

Fabrication of Three-Dimensional Reflective White Pattern using Dry-Film Resist

  • Jun, Hwa Joon;Na, Dae Gil;Kwon, Young Hoon;Kwon, Jin Hyuk
    • Journal of the Optical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.80-83
    • /
    • 2015
  • White reflective patterns are very difficult to fabricate, due to the scattering and reflection of light, especially when the pattern size goes down to micron size. A reflective white barrier structure of height $50{\mu}m$ and width $80{\mu}m$ was fabricated using dry-film resist as an intermediate reverse pattern. The reverse dry-film resist pattern was coated with an $SiO_2$ layer by sputtering, to protect the resist from chemical attack by the radical molecules in UV white resin. The UV white resin was applied on the dry-film resist pattern and then cured with ultraviolet light. The fine three-dimensional reflective patterns were finished by removing the dry-film resist.

Prandtl-Meyer Expansion Through a Small Wavy Wall of Supersonic Flow with Condensation in a Channel (유로내에서 응축을 수반하는 초음속 유동의 미소진폭 파형벽에 의한 Prandtl-Meyer 팽창)

  • 권순범;안형준;선우은
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.6
    • /
    • pp.1582-1589
    • /
    • 1994
  • The characteristics Prandt1-Meyer expansion of supersonic flow with condensation through a wavy wall in a channel are investigated by experiment and numerical direct marching method of characteristics. In the present study, for the case of moist air flow in the type of indraft supersonic wind tunnel, the dependency of location of formation and reflection of the oblique shock wave generated by the wavy wall and the distribution of flow properties, on the specific humidity and temperature at the entrance of wavy wall and the attack angle of the wavy wall to the main stream is clarified by schlieren photograph, distribution of static pressure and Mach number, and plots of numerical results. Also, we confirm that the wavy wall plays an important key role in the formation of oblique shock wave, and that the effect of condensation on the flow field appears apparently.

On the Hydraulic Characteristics of Efficient Long Wave Energy Absorber-Eco-breaker 2 (장파 제어체 Eco-breaker 2의 수리특성)

  • Cho, Yong Jun;Kim, Ho Min
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.5B
    • /
    • pp.547-558
    • /
    • 2008
  • With the advent of super cargo ship due to the explosive increase in the amount of cargo shipped via seas, some mega ports are under construction in South Korea, to accommodate the super cargo ship, and some of them already enter their final phase. To sustain the harbor tranquility, mega ports usually comprise huge vertical type breakwaters which are intrinsically vulnerable to the attack of long waves. In this rationale, we present the chamber type breakwater with a circular curtain wall - Eco-breaker 2, to alleviate the reflection of long waves and numerically investigate the hydraulic characteristics of Eco-breaker 2. As a wave driver, we use the Navier-Stokes eq., the most robust wave driver, using SPH (Smoothed Particle Hydrodynamics) and LES (Large Eddy Simulation). For the verification of numerical results, we also carried out hydraulic model test. It is shown that Eco-breaker 2 can effectively alleviate the reflection of long waves with its inherited large organized eddies encompassing the water chamber and some region off the curtain wall of varying size. It is also shown that the scope and strength of large organized eddies strongly depends on the incident wave period, and the reflection coefficient can be lowered to 0.18 by tuning the size of water chamber such that resident time at the chamber is just short of the half period of incident waves. Based on these results, we present the specification of Eco-breaker 2 to boost its use on the development of water environment friendly harbor worldwide.

Machine Learning-based Detection of DoS and DRDoS Attacks in IoT Networks

  • Yeo, Seung-Yeon;Jo, So-Young;Kim, Jiyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.101-108
    • /
    • 2022
  • We propose an intrusion detection model that detects denial-of-service(DoS) and distributed reflection denial-of-service(DRDoS) attacks, based on the empirical data of each internet of things(IoT) device by training system and network metrics that can be commonly collected from various IoT devices. First, we collect 37 system and network metrics from each IoT device considering IoT attack scenarios; further, we train them using six types of machine learning models to identify the most effective machine learning models as well as important metrics in detecting and distinguishing IoT attacks. Our experimental results show that the Random Forest model has the best performance with accuracy of over 96%, followed by the K-Nearest Neighbor model and Decision Tree model. Of the 37 metrics, we identified five types of CPU, memory, and network metrics that best imply the characteristics of the attacks in all the experimental scenarios. Furthermore, we found out that packets with higher transmission speeds than larger size packets represent the characteristics of DoS and DRDoS attacks more clearly in IoT networks.

Development and Application of the Learning Program for Improving Problem Solving Ability through Stimulation of Reflective Thinking (문제 해결력 향상을 위한 반성적 사고 촉진 교수 학습 프로그램의 개발 및 적용)

  • Choi, Ji Youn;Jhun, Youngseok
    • Journal of Korean Elementary Science Education
    • /
    • v.32 no.1
    • /
    • pp.104-112
    • /
    • 2013
  • We examined the strategies to stimulate the reflective thinking using science notebook for the improvement of problem solving ability which is one of the core skills for the future. The strategies we derived have four steps which are input, output, solving mission and reflection as my own mirror. We applied the strategies to the 6th grade class for autumn semester in order to examine the students learning process and the result. We could observe that students looked into their own learning and had a time to look back their activities in the class. We could also confirmed that science notebook would be effective to improve the problem solving as stimulating the reflective thinking. In addition, we could specify the strategy of using science notebook in the class. At a 'input' stage, students should be able to choose their own learning style as their preference and teacher need to give them proper feedback. Interaction with peers should be emphasized during the activities as 'question attack' and 'question defense' in 'output' stage and 'solving mission' stage. You should suggest the students various method to record their thought from looking back their classroom activities instead of mere writing. We also examine the students achievement from the students' notebook and Meta Cognitive Awareness test. As a result, students who had studied using science notebook showed statistically meaningful higher achievement than controlled students.

Monitoring Network Security Situation Based on Flow Visualization (플로우 시각화 기반의 네트워크 보안 상황 감시)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper we propose a new method of security visualization, VisFlow, using traffic flows to solve the problems of existing traffic flows based visualization techniques that were a loss of end-to-end semantics of communication, reflection problem by symmetrical address coordinates space, and intuitive loss problem in mass of traffic. VisFlow, a simple and effective security visualization interface, can do a real-time analysis and monitoring the situation in the managed network with visualizing a variety of network behavior not seen in the individual traffic data that can be shaped into patterns. This is a way to increase the intuitiveness and usability by identifying the role of nodes and by visualizing the highlighted or simplified information based on their importance in 2D/3D space. In addition, it monitor the network security situation as a way to increase the informational effectively using the asymmetrical connecting line based on IP addresses between pairs of nodes. Administrator can do a real-time analysis and monitoring the situation in the managed network using VisFlow, it makes to effectively investigate the massive traffic data and is easy to intuitively understand the entire network situation.

Interpretation of the Umbrella Clause in Investment Treaties (국제투자조약상 포괄적 보호조항(Umbrella Clauses)의 해석에 관한 연구)

  • Jo, Hee-Moon
    • Journal of Arbitration Studies
    • /
    • v.19 no.2
    • /
    • pp.95-126
    • /
    • 2009
  • One of the controversial issues in investor-state investment arbitration is the interpretation of "umbrella clause" that is found in most BIT and FTAs. This treaty clause requires on Contracting State of treaty to observe all investment obligations entered into with foreign investors from the other Contracting State. This clause did not receive in-depth attention until SGS v. Pakistan and SGS v. Philippines cases produced starkly different conclusions on the relations about treaty-based jurisdiction and contract-based jurisdiction. More recent decisions by other arbitral tribunals continue to show different approaches in their interpretation of umbrella clauses. Following the SGS v. Philippines decision, some recent decisions understand that all contracts are covered by umbrella clause, for example, in Siemens A.G. v. Argentina, LG&E Energy Corp. v. Argentina, Sempra Energy Int'l v. Argentina and Enron Corp. V. Argentina. However, other recent decisions have found a different approach that only certain kinds of public contracts are covered by umbrella clauses, for example, in El Paso Energy Int'l Co. v. Argentina, Pan American Energy LLC v. Argentina and CMS Gas Transmission Co. v. Argentina. With relation to the exhaustion of domestic remedies, most of tribunals have the position that the contractual remedy should not affect the jurisdiction of BIT tribunal. Even some tribunals considered that there is no need to exhaust contract remedies before bringing BIT arbitration, provoking suspicion of the validity of sanctity of contract in front of treaty obligation. The decision of the Annulment Committee In CMS case in 2007 was an extraordinarily surprising one and poured oil on the debate. The Committee composed of the three respected international lawyers, Gilbert Guillaume and Nabil Elaraby, both from the ICJ, and professor James Crawford, the Rapportuer of the International Law Commission on the Draft Articles on the Responsibility of States for Internationally Wrongful Acts, observed that the arbitral tribunal made critical errors of law, however, noting that it has limited power to review and overturn the award. The position of the Committee was a direct attack on ICSID system showing as an internal recognition of ICSID itself that the current system of investor-state arbitration is problematic. States are coming to limit the scope of umbrella clauses. For example, the 2004 U.S. Model BIT detailed definition of the type of contracts for which breach of contract claims may be submitted to arbitration, to increase certainty and predictability. Latin American countries, in particular, Argentina, are feeling collectively victims of these pro-investor interpretations of the ICSID tribunals. In fact, BIT between developed and developing countries are negotiated to protect foreign investment from developing countries. This general characteristic of BIT reflects naturally on the provisions making them extremely protective for foreign investors. Naturally, developing countries seek to interpret restrictively BIT provisions, whereas developed countries try to interpret more expansively. As most of cases arising out of alleged violation of BIT are administered in the ICSID, a forum under the auspices of the World Bank, these Latin American countries have been raising the legitimacy deficit of the ICSID. The Argentine cases have been provoking many legal issues of international law, predicting crisis almost coming in actual investor-state arbitration system. Some Latin American countries, such as Bolivia, Venezuela, Ecuador, Argentina, already showed their dissatisfaction with the ICSID system considering withdrawing from it to minimize the eventual investor-state dispute. Thus the disagreement over umbrella clauses in their interpretation is becoming interpreted as an historical reflection on the continued tension between developing and developed countries on foreign investment. There is an academic and political discussion on the possible return of the Calvo Doctrine in Latin America. The paper will comment on these problems related to the interpretation of umbrella clause. The paper analyses ICSID cases involving principally Latin American countries to identify the critical legal issues arising between developing and developed countries. And the paper discusses alternatives in improving actual investor-State investment arbitration; inter alia, the introduction of an appellate system and treaty interpretation rules.

  • PDF