• Title/Summary/Keyword: Data leakage

Search Result 1,084, Processing Time 0.026 seconds

Measurement of Thermal Load in the Tip-Clearance Region of a Rotor Surface (팁간극 영역에서의 동익 표면 열부하 측정)

  • Lee, Sang-Woo;Kwon, Hyun-Goo;Park, Jin-Jae
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.187-192
    • /
    • 2003
  • The heat (mass) transfer characteristics in the tip-leakage flow region of a high-turning first-stage turbine rotor blade has been investigated by employing the naphthalene sublimation technique. The heat transfer data in the tip-leakage flow area for the tip clearance-to-span ratio, h/s, of 2.0% are compared with those in endwall three-dimensional flow region without tip clearance (h/s = 0.0 %). The result shows that the thermal load in the tip-leakage flow region for h/s = 2.0% is more severe than that in the endwall flow region for h/s = 0.0%. The thermal loads even at the leading and trailing edges for h/s = 2.0% are found larger than those for h/s = 0.0%. The tip-leakage flow results in heat transfer augmentations near the tip on both pressure and suction sides in comparison with the mid-span results.

  • PDF

An analysis of the Factors Influencing Leakage of Below-Grade Concrete Structures in Residential Buildings -Survey Centered Data- (공동주택 지하구조물 누수발생 요인에 대한 의견 분석 -설문조사를 중심으로-)

  • An, Ki-Won;Kang, Hyo-Jin;Kim, Soo-Yeon;Oh, Sang-Keun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2017.05a
    • /
    • pp.73-74
    • /
    • 2017
  • Below-grade concrete structure in residential buildings are exposed to various cracking conditions in between installation, construction and usage. Leakage follows the cracks along the exterior wall and floor slabs, and leakage occurring in this conditioning brings about discomfort to the users inside the building. This study analyzes a survey on the causes of leakage in below-grade concrete structure and proposes a solution method.

  • PDF

AN EXPERIMENTAL STUDY ON MARGINAL LEAKAGE OF THE DENTAL PERMANENT CEMENTS AFFECTED BY THE TEMPORARY CEMENTS (치과용 임시합착 Cement가 영구합착 Cement의 변연누출에 미치는 영향에 관한 실험적 연구)

  • Lee, Hyeog;Lee, Ho-Yong
    • The Journal of the Korean dental association
    • /
    • v.22 no.4 s.179
    • /
    • pp.313-322
    • /
    • 1984
  • This study was designed to observe the marginal leakage of three permanent cements affected by three temporary cements. The temporary cements used in this study were Zinc oxide-eugenol, Non-eugenol, and Calcium hydroxide cements and the permanent cements were Zinc phosphate, Polycarboxylate and Alumina reinforced EBA cements. To measure the dye penetration into permanently cemented zone, the experimental specimens were treated with the temporary cements for a week. An analysis of the data obtained from 120 specimens resulted in the following conclusions: 1. Regardless of the types of the permanent cements used, using Calcium hydroxide cement as temporary cement showed higher marginal leakage than other temporary cements. 2. Using Polycarboxylate cement as permanent cement showed less marginal leakage than other permanent cements. 3. The marginal leakage in zinc phosphate cement was similar to Alumina reinforced EBA cement regardless of the types of the temporary cements.

  • PDF

A Study on The Problem in Policy of Korean Resident Registration Number: On Basis of Freedom of Data Provision (현행 주민번호제도의 문제점에 관한 연구: 정보 제공 자유도를 기반으로)

  • Rhee, Hae-kyung
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.45-51
    • /
    • 2016
  • Although the problem of personal data leakage is reported to be serious, there has been no research that tries to excavate out that real cause of the leakage in scientific prospective. Although this topic is considered to be crucial, there have been no literatures relevant to the topic, and the reason for this limitation is that scientific approach to this problem was not feasible. In this respect, in this paper a model for such scientific analysis and a methodology of analysis have been devised. Results show that the degree of rigidity turns out be the determinant that vindicates the degree of leakage. The notion of data rigidity is revealed to be very strongly correlated to the number of hacking incidents in each country. The notion of resident data freedom was then deployed in this paper to determine the world-wide ranking for a slew of different countries. The United Kingdom and the Republic of Korea turned out to be the two extreme countries that lie in the spectrum of the scale, with UK the most flexible and ROK one of the most rigid.

A Study on DLP System for Preventing Internal Information Leakage (내부정보유출방지를 위한 DLP시스템 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.121-126
    • /
    • 2018
  • The development of modern ICT and network technologies has made the business environment smart.and under such circumstances, a great deal of data is being generated, stored and used. The important information that becomes an energy source for corporate management creates economic profit and value and is also utilized as a basis for strong influence. Therefore, important information must ensure its availability and convenience while ensuring confidentiality and integrity, which is the basic objective of information protection. However, most companies are seeing more and more incidents of serious damage due to the leakage of important internal information. In this study, we deal with the Data Loss Prevention (DLP) technologies and solutions to prevent internal information leakage and establish stable data security and information protection management.

  • PDF

Linear interpolation and Machine Learning Methods for Gas Leakage Prediction Base on Multi-source Data Integration (다중소스 데이터 융합 기반의 가스 누출 예측을 위한 선형 보간 및 머신러닝 기법)

  • Dashdondov, Khongorzul;Jo, Kyuri;Kim, Mi-Hye
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.33-41
    • /
    • 2022
  • In this article, we proposed to predict natural gas (NG) leakage levels through feature selection based on a factor analysis (FA) of the integrating the Korean Meteorological Agency data and natural gas leakage data for considering complex factors. The paper has been divided into three modules. First, we filled missing data based on the linear interpolation method on the integrated data set, and selected essential features using FA with OrdinalEncoder (OE)-based normalization. The dataset is labeled by K-means clustering. The final module uses four algorithms, K-nearest neighbors (KNN), decision tree (DT), random forest (RF), Naive Bayes (NB), to predict gas leakage levels. The proposed method is evaluated by the accuracy, area under the ROC curve (AUC), and mean standard error (MSE). The test results indicate that the OrdinalEncoder-Factor analysis (OE-F)-based classification method has improved successfully. Moreover, OE-F-based KNN (OE-F-KNN) showed the best performance by giving 95.20% accuracy, an AUC of 96.13%, and an MSE of 0.031.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

Modified Electrical Resistivity Survey and its Interpretation for Leakage Path Detection of Water Facilities (수변구조물의 누수 경로 탐지를 위한 변형된 전기비저항 탐사 및 자료 해석)

  • Lee, Bomi;Oh, Seokhoon
    • Geophysics and Geophysical Exploration
    • /
    • v.19 no.4
    • /
    • pp.200-211
    • /
    • 2016
  • To support cross potential array and direct potential array, the array for leakage detection of all kinds of water facilities is proposed and it is named as the D-Lux array. The D-Lux array data are arranged to a coloured matrix and it is called the D-Lux view. Low potential difference of anomalous zone shown in D-Lux view implies the indication of leakage zone. Furthermore, for an intuitive interpretation of D-Lux array, equipotential distribution map is made by using D-Lux and direct potential array data. Equipotential distribution map makes us possible to predict import point, export point and the path of water leakage that we could have not anticipated in D-Lux view and the graphs. The water tank experiment and numerical analysis were carried out as preparatory experiment and the field explorations were conducted at a concrete weir and a fill dam. As a result, effective and specific detection of leakage path was possible for the concrete weir and the fill dam.

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

Leakage Detection Method in Water Pipe using Tree-based Boosting Algorithm (트리 기반 부스팅 알고리듬을 이용한 상수도관 누수 탐지 방법)

  • Jae-Heung Lee;Yunsung Oh;Junhyeok Min
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.17-23
    • /
    • 2024
  • Losses in domestic water supply due to leaks are very large, such as fractures and defects in pipelines. Therefore, preventive measures to prevent water leakage are necessary. We propose the development of a leakage detection sensor utilizing vibration sensors and present an optimal leakage detection algorithm leveraging artificial intelligence. Vibrational sound data acquired from water pipelines undergo a preprocessing stage using FFT (Fast Fourier Transform), followed by leakage classification using an optimized tree-based boosting algorithm. Applying this method to approximately 260,000 experimental data points from various real-world scenarios resulted in a 97% accuracy, a 4% improvement over existing SVM(Support Vector Machine) methods. The processing speed also increased approximately 80 times, confirming its suitability for edge device applications.