• Title/Summary/Keyword: threat value

Search Result 168, Processing Time 0.034 seconds

Determination of the Shortest Transportation Path in Wartime (전시 최단수송경로 선정)

  • Yun Jong-Ok;Ha Seok-Tae
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.2
    • /
    • pp.72-89
    • /
    • 1991
  • In transportation network problems, it is often desirable to select multiple number of the shortect paths. On problems of finding these paths, algorithms have been developed to choose single shortest path, k-shortest paths and k-shortest paths via p-specified nodes in a network. These problems consider the time as the main factor. In wartime, we must consider availability as well as time to determine the shortest transportation path, since we must take into account enemy's threat. Therefore, this paper addresses the problem of finding the shortest transportation path considering both time and availability. To accomplish the objective of this study, values of k-shortest paths are computed using the algorithm for finding the k-shortest paths. Then availabilties of those paths are computed through simulation considering factors such as rates of suffering attack, damage and repair rates of the paths. An optimal path is selected using any one of the four decision rules that combine the value and availability of a path.

  • PDF

Study on Core Debris Recriticality During Hypothetical Severe Accidents in Three Element Core Design of The Advanced Neutron Source Reactor

  • Shin, Sung-Tack
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.05b
    • /
    • pp.467-472
    • /
    • 1996
  • This study discusses special aspects of severe accident related recriticality modeling and analysis in the Advanced Neutron Source (ANS) reactor.$^{1, 2)}$ The analytical comparison of three elements core to former two elements case is conducted including evaluation of suitable nuclear cross-section sets to account for the effects of system configulation, fuel and moderator mixture temperature, material dispersion and the other thermal-hydraulics. Three elements core ANS reactor is the alternative core design which was proposed as a modified core design, with three fuel elements instead of two, that would allow operation with only 50% enriched uranium (former uranium fuel is the baseline design value of 93%) A comprehensive test matrix of calculations to evaluate the threat of a criticality event in the ANS is described. Strong dependencies still on geometry, material constituents, and thermal-hydraulic conditions are verified. Therefore, the concepts of mitigative design features are qualified.d.

  • PDF

Contribution of Ecological Surveys to Coastal Conservation: A Case in Soft Shore Study

  • Tai, K. K;Cheung, S.-G;Shin, P.-K.-S.
    • The Korean Journal of Ecology
    • /
    • v.27 no.3
    • /
    • pp.127-131
    • /
    • 2004
  • Soft shores are particularly vulnerable to human exploitation; however, they exhibit a variety of habitats which provide refuge for a diversity of flora and fauna. This study describes a survey of 13 soft shores in Hong Kong with information on species diversity, sediment characteristics, shore extent, pollution threat, degree of naturalness, linkage with other ecological habitats, and degree of social/economic importance. Data collected were subjected to multivariate statistical analyses, so as to identify shores that have significant ecological status and conservation value for management purposes.

A Study on the Algorithm for Fault Discrimination in Transmission Lines using Neural Network and the Variation of Fault Currents (신경회로망과 고장전류의 변화를 이용한 고장판별 알고리즘에 관한 연구)

  • Yeo, Sang-Min;Kim, Cheol-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.8
    • /
    • pp.405-411
    • /
    • 2000
  • When faults occur in transmission lines, the classification of faults is very important. If the fault is HIF(High Impedance Fault), it cannot be detected or removed by conventional overcurrent relays (OCRs), and results in fire hazards and causes damages in electrical equipment or personal threat. The fast discrimination of fault needs to effective protection and treatment and is important problem for power system protection. This paper propolsed the fault detection and discrimination algorithm for LIFs(Low Impedance Faults) and HIFs(High Impedance Faults). This algorithm uses artificial neural networks and variation of 3-phase maximum currents per period while faults. A double lines-to-ground and line-to-line faults can be detected using Neural Network. Also, the other faults can be detected using the value of variation of maximum current. Test results show that the proposed algorithms discriminate LIFs and HIFs accurately within a half cycle.

  • PDF

Geometrical Distortion-Resilient Watermarking Based on Image Features

  • Shim, Hiuk-Jae;Byeungwoo Jeon;Kim, Rin-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1268-1271
    • /
    • 2002
  • The major threat of geometric manipulations is that they change the positions of watermarks, therefore the detection process fails to extract watermark properly. Since they cause the same effects on the host image as watermarks simultaneously, evaluating the distorted host image can be helpful to measure the nature of distortions. In this paper, we propose a geometrical distortion-resilient watermarking algorithm based on this property. Firstly we evaluate the orientation of a host image by filtering it with directional Gabor kernels, then we insert embedding pattern aligned to the estimated orientation. In its detection step, we evaluate the orientation again by Gabor filtering, then simply project and average the projected value to obtain a 1-D projection average pattern. Finally, auto-correlation function of the 1-D projection average pattern identifies periodic peaks. Analysed are experimental results against geometrical attacks including aspect ratio changes.

  • PDF

Digital Design Process of Marine Leisure Boat Using Human Sensibility Evaluation (해양 레저선박의 디지털 감성 디자인 프로세스)

  • Choi, Chool-Heon;Jang, Phil-Sik;Seo, Moon-Seog
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.4
    • /
    • pp.693-699
    • /
    • 2010
  • Korea has been took the top ranking in the global shipbuilding industry in terms of new orders, order backlogs and the volume of vessels for several years. However, the domestic small- and medium-scale shipbuilders currently face imminent threat from China and new challenge to focus on development of high value-added ships. So far, the marine leisure industry of Korea has been showed weak global competitiveness and there were few attempts to design and develop leisure boats and yachts. We describe the digital design process of leisure boat exterior that could reflect user's sensibilities and feelings of entire forms of the products. This design process contains stepwise sensibility evaluation via web and provides designers with various and fast feedbacks about their design outputs in each design stage.

Private Key Recovery on Bitcoin with Duplicated Signatures

  • Ko, Ju-Seong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1280-1300
    • /
    • 2020
  • In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.

Effects of the Position of Demographic Questions on Survey Responses

  • Heo, Sun-Yeong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.15 no.4
    • /
    • pp.855-866
    • /
    • 2004
  • In many surveys, one of the most important goals is to obtain reliable and valid responses from respondents. To achieve the goal, a researcher have to make efforts to protect respondents' confidentiality and to reduce the effects of social desirability on answers. The key question of this paper is whether the position of demographic questions have an effect on responses. Two types of questionnaires are considered: one puts the demographic questions at the beginning and the other does at the last. On both types, I asked only a small number of demographic questions which are considered as essential on analytic purposes. The results show no evidence of position effects when the risk to threat confidentiality was minimized.

  • PDF

An Empirical Study on the Factors Influencing User Resistance to ERP : Focused on the Vietnam Users (ERP에 대한 사용자 저항의 영향 요인에 관한 실증적 연구 : 베트남 사용자를 중심으로)

  • Kim, Hongkeun;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.127-158
    • /
    • 2015
  • This study analyzes the factors affecting user resistance to ERP in Vietnam, including the factors related to the cultural values of the users, which is rarely dealt in the previous ERP research. A research model is developed based on Klaus and Blanton [2010] and Hofstede [2011], consisting of the independent variables ('cultural value', 'system', 'organization', and 'process' related variables), a dependent variable ('user resistance to ERP') and a moderating variable ('self efficacy'). Major results of study include (1) users with high degree of uncertainty avoidance and femininity regard ERP as potential threat to their job and are likely to resist to ERP; (2) By training the users with high level of femininity to enhance their self efficacy, the degree of resistance to ERP can be reduced; (3) For ERP to be utilized successfully, systems should be developed in such a way in which working with ERP is not regarded as complex and difficult; and (4) communication and training play an important role in reducing the resistance of users.

The Post-Miesian Office Tower and the Global Issue of Its Interpretation

  • Marfella, Giorgio
    • International Journal of High-Rise Buildings
    • /
    • v.7 no.2
    • /
    • pp.127-140
    • /
    • 2018
  • The skylines of many cities worldwide are still defined by the dominant and ubiquitous office blocks of the twentieth century. While there is consensus stating that future tall building typologies should depart substantially from these past models, the inheritance of large and obsolete tall office building stocks presents a problem of global significance. Too old for present corporate models, but too new for gaining public historical importance, the twentieth-century office tower is a typology under threat of extinction. However, the need for a culturally informed strategy of preservation for that generation of tall buildings is seldom advocated. Drawing evidence from the case of Melbourne, Australia, this article presents a methodological pathway to overcome pitfalls of memory and interpretation, which commonly prevent an unbiased assessment of the value and urban contribution of late-twentieth-century skyscrapers.