25 research outputs found

    Multislice Electron Tomography using 4D-STEM

    Full text link
    Electron tomography offers important three-dimensional (3D) structural information which cannot be observed by two-dimensional imaging. By combining annular dark field scanning transmission electron microscopy (ADF-STEM) with aberration correction, the resolution of electron tomography has reached atomic resolution. However, tomography based on ADF-STEM inherently suffers from several issues, including a high electron dose requirement, poor contrast for light elements, and artifacts from image contrast nonlinearity. Here, we developed a new method called MultiSlice Electron Tomography (MSET) based on 4D-STEM tilt series. Our simulations show that multislice-based 3D reconstruction can effectively reduce undesirable reconstruction artifacts from the nonlinear contrast, allowing precise determination of atomic structures with improved sensitivity for low-Z elements, at considerably low electron dose conditions. We expect that the MSET method can be applied to a wide variety of materials, including radiation-sensitive samples and materials containing light elements whose 3D atomic structures have never been fully elucidated due to electron dose limitations or nonlinear imaging contrast.Comment: 26 pages, 9 figure

    A Cyber Command and Control Framework for Psychological Operation Using Social Media

    Get PDF
    Global threats, international terrorist groups and North Korea, paralyze political decisions by attacking and neutralizing the credibility of the main policy makers in the state and simultaneously manipulate the public opinion, which results in distrust and disconnection between each other. These threats use social media as their biggest core routine to conduct such attacks. This paper presents a series of processes and frameworks on how a commander should make a decision when performing a cyber psychological operation using social media. Based on the Endsley model, which is a situational awareness model, the paper compares the strengths and weaknesses of the three social media operations (IGMO, DeSMO, OSMO) performed by the military and proposes a guideline for performing an operation

    Development of an Accident Sequence Precursor Methodology and its Application to Significant Accident Precursors

    No full text
    The systematic management of plant risk is crucial for enhancing the safety of nuclear power plants and for designing new nuclear power plants. Accident sequence precursor (ASP) analysis may be able to provide risk significance of operational experience by using probabilistic risk assessment to evaluate an operational event quantitatively in terms of its impact on core damage. In this study, an ASP methodology for two operation mode, full power and low power/shutdown operation, has been developed and applied to significant accident precursors that may occur during the operation of nuclear power plants. Two operational events, loss of feedwater and steam generator tube rupture, are identified as ASPs. Therefore, the ASP methodology developed in this study may contribute to identifying plant risk significance as well as to enhancing the safety of nuclear power plants by applying this methodology systematically

    An Analysis of Economic Impact on IoT Industry under GDPR

    No full text
    The EU GDPR comes into effect on May 25, 2018. Under this regulation, stronger legislation than the existing directive can be enforced. The IoT industry, especially among various industries, is expected to be heavily influenced by GDPR since it uses diverse and vast amounts of personal information. This paper first analyzes how the IoT industry handles personal information and summarizes why it is affected by GDPR. The paper then uses the cost definition of Gordon and Loeb model to estimate how GDPR affects the cost of IoT firms qualitatively and uses the statistical and legal bases to estimate quantitatively. From a qualitative point of view, GDPR impacted the preventative cost and legal cost of the Gordon and Loeb model. Quantitative view showed that the cost of IoT firms after GDPR could increase by three to four times on average and by 18 times if the most. The study finally can be applied to situational awareness of the economic impact on the certain industry

    Design and Implementation of Multi-Cyber Range for Cyber Training and Testing

    No full text
    It is essential to build a practical environment of the training/test site for cyber training and weapon system test evaluation. In a military environment, cyber training sites should be continuously developed according to the characteristics of the military. Weapons with cyber security capabilities should be deployed through cyber security certification. Recently, each military has been building its own cyber range that simulates its battlefield environment. However, since the actual battlefield is an integrated operation environment, the cyber range built does not reflect the integrated battlefield environment that is interconnected. This paper proposes a configuration plan and operation function to construct a multi-cyber range reflecting the characteristics of each military to overcome this situation. In order to test the multi-cyber range, which has scenario authoring and operation functions, and can faithfully reflect reality, the impact of DDoS attacks is tested. It is a key to real-world mission-based test evaluation to ensure interoperability between military systems. As a result of the experiment, it was concluded that if a DDoS attack occurs due to the infiltration of malicious code into the military network, it may have a serious impact on securing message interoperability between systems in the military network. Cyber range construction technology is being developed not only in the military, but also in school education and businesses. The proposed technology can also be applied to the construction of cyber ranges in industries where cyber-physical systems are emphasized. In addition, it is a field that is continuously developing with the development of technology, such as being applied as an experimental site for learning machine learning systems

    Visualization 1.mp4

    No full text
    Visualizations of evaporating water drop over one hou
    corecore