• Title/Summary/Keyword: Information leak

Search Result 245, Processing Time 0.028 seconds

Simulation of Water/steam into Sodium Leak Behavior for an Acoustic Noise Generation Mechanism Study

  • Kim, Tae-Joon;Hwang, Sung-Tai;Jeong, Kyung-Chai;Park, Jong-Hyeun;Valery S. Yughay
    • Nuclear Engineering and Technology
    • /
    • v.33 no.2
    • /
    • pp.145-155
    • /
    • 2001
  • This simulation first allows us to define a transition zone from a bubble to jet mode of the argon out-flow and hereinafter to define a similar area for water-steam leak in the KALIMER SG (Korea Advanced Liquid Metal Reactor Steam Generator) using a water mock-up system, taking into account the KALIMER leak classification and tube bundle design, as a simulation of a real water-steam into sodium leak. in accordance with leak conditions in the KALIMER SG, the transition from bubbling to jetting is studied by means of turbulence regime simulation for argon out-flow through a very small orifice, which has the equivalent diameter of about 0.253 mm. finally the noise generation mechanism is explained from the existing experimental data. We also confirmed the possibility of micro-leak detection from the information of the bubbling mode through simulations and the experiment in this study.

  • PDF

Location Estimation Method of Steam Leak in Pipelines Using Leakage Area Analysis (누설영역 분석을 이용한 배관 증기누설 위치 추정 방법)

  • Kim, Se-Oh;Jeon, Hyeong-Seop;Son, Ki-Sung;Park, Jong Won
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.36 no.5
    • /
    • pp.384-390
    • /
    • 2016
  • It is important to have a pipeline leak-detection system that determines the presence of a leak and quickly identifies its location. Current leak detection methods use a acoustic emission sensors, microphone arrays, and camera images. Recently, many researchers have been focusing on using cameras for detecting leaks. The advantage of this method is that it can survey a wide area and monitor a pipeline over a long distance. However, conventional methods using camera monitoring are unable to target an exact leak location. In this paper, we propose a method of detecting leak locations using leak-detection results combined with multi-frame analysis. The proposed method is verified by experiment.

A Study on the Distribution Estimation of Personal Data Leak Incidents (개인정보유출 사고의 분포 추정에 관한 연구)

  • Hwang, Yoon-hee;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.799-808
    • /
    • 2016
  • To find the pattern of personal data leak incidents and confirm which distribution is suitable for, this paper searched the personal data leak incidents reported by the media from 2011 to 2014. Based on result, this research estimated the statistical distribution using the 'K-S Statistics' and tested the 'Goodness-of-Fit'. As a result, the fact that in 95% significance level, the Poisson & Exponential distribution have high 'Goodness-of-Fit' has been proven quantitatively and, this could find it for major personal data leak incidents to occur 12 times in a year on average. This study can be useful for organizations to predict a loss of personal data leak incidents and information security investments and furthermore, this study can be a data for requirements of the cyber-insurance.

The Correspondence Competence of Information Accident by Firms Experienced in Confidential Information Leak (기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구)

  • Jung, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.73-86
    • /
    • 2016
  • The purpose of this study is to examine a security investment for firms experienced in confidential information leak. Information security is an apparatus for protection of secret information. The competence of information security is a competitiveness to avoid information leakage in changing business environment. The type of information security is divided into administrative security, technical security and physical security. It is necessary to improve the incident correspondence competence through information security investment of the three types. Therefore, the investment of information security is to enhance information-asset protection of firms. To reinforce accident response competence, an organization discussed an establishment, security technology development, expand investment and legal system of the security system. I have studied empirically targeting the only information leak of firms. This data is a technical security competence and technology leakage situation of firms happened in 2010. During recovery of the DDos virus damage on countries, company and individual, the collected data signify a reality of information security. The data also identify a security competence of firms worrying information security management. According to the study, the continuous investment of information security has a high competence of accident correspondence. In addition, the most of security accidents showed a copy and stealing of paper and computer files. Firm on appropriate security investment is an accident correspondence competence higher than no security investment regardless of a large, small and medium-sized, and venture firm. Furthermore, the rational security investment should choose the three security type consideration for firm size.

A Study on The Leak of Core Business Technologies Using Preventative Security Methods Such as Clustering (군집화를 이용한 기업 핵심기술 유출자 분류에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.23-28
    • /
    • 2010
  • Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and invesment companies. This shows that the source of the leaks are internal personnel. In this manner, we can infer that the management and plan of personnel security has not implemented sound practices to prevent technology leak by people. Therefore, this thesis suggests classifying methods of technology leak through clustering, one of the data mining methods about the information of internal personnel to prevent core technology leak from businesses.

A Leak Inspection Automation System for Sealed SUS CAN Rotor (밀폐형 SUS CAN Rotor를 위한 Leak 검사 자동화 시스템)

  • Choi, Chang-min;Seo, Su-min;Shin, Gi-su;Park, Jong-won;Jung, Yeon-seok;Yoo, Nam-hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.406-408
    • /
    • 2019
  • The motor applied to electric water pump used in automobiles is the canned type motor structure. The rotor, which is the driving component of the motor, is located in the bulkhead structure of the plastic injection molding, and rotates while immersed in the antifreeze. Plastic Injection Stator is placed on the outside of the bulkhead structure so that the rotor can rotate. The configuration of the rotor consists of magnet, core and shaft. In the case of magnet and core, it is very important to keep the parts sealed because it is a material that is corroded by moisture. When mounted on a vehicle, it must be capable of driving at $120^{\circ}C$ ambient conditions and should not leak under pressure of 1 bar or more. In this paper, we designed and implemented a Leak inspection automation system using helium to check the defects of the electric water pump developed satisfying this condition.

  • PDF

A Study on Validation for Mapping of Gas Detectors at a BTX Plant (BTX 공정에서 Gas Detector Mapping 적정성 검토에 관한 연구)

  • Seo, Ji Hye;Han, Man Hyoeng;Kim, Il Kwon;Chon, Young Woo
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.5
    • /
    • pp.168-178
    • /
    • 2017
  • In order to prevent major and chemical accidents, some of the plants which would like to install and operate hazard chemicals handling facilities must submit Off-site Consequence Analysis due to recent arisen leak accidents since 2015. A lot of chemical industrials choose gas detectors as mitigation equipment to early detect gas vapor. The way of placement of gas detectors has two methods; Code-based Design(CBD) and Performance-based Design. The CBD has principles for gas detectors to be installed with consideration for the place that is expected to accumulate gas, and the leak locations according to legal standards and technical guidelines, and has a possibility to be unable to detect by these rules to locate gas detectors by vapor density information. The PBD has two methods; a Geographic Method and Scenario based Method. The Scenario-based Method has been suggested to make up for the Geographic Coverage Method. This Scenario-based Method draw the best optimum placement of gas detectors by considering leak locations, leak speed information, leak directions and etc. However, the domestic placement guidelines just refers to the CBD. Therefore, this study is to compare existing placement location of gas detectors by the domestic CBD with placement locations, coverages and the number of gas detectors in accordance with the Scenario-based Method. Also this study has measures for early detecting interest of Vapor Cloud and suitable placement of gas detectors to prevent chemical accidents. The Phast software was selected to simulate vapor cloud dispersion to predict the consequence. There are two cases; an accident hole size of leak(8 mm) from API which is the highst accident hole size less than 24.5 mm, and a normal leak hole size from KOSHA Guide (1.8 mm). Detect3D was also selected to locate gas detectors efficiently and compare CBD results and PBD results. Currently, domestic methods of gas detectors do not consider any risk, but just depend on domestic code methods which lead to placement of gas detectors not to make personnels recognize tolerable or intolerable risks. The results of the Scenario-based Method, however, analyze the leak estimated range by simulating leak dispersion, and then it is able to tell tolerable risks. Thus it is considered that individuals will be able to place gas detectors reasonably by making objectives and roles flexibly according to situations in a specific plant.

A Study on Leak Detection Technique of a Pipe In a Noisy Environment (기계잡음 환경에서의 배관 누설탐지기법에 관한 연구)

  • Yoon, Doo-Byung;Park, Jin-Ho;Shin, Sung-Hwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.31 no.7
    • /
    • pp.449-460
    • /
    • 2012
  • The importance of the leak detection of a buried pipe in a power plant of Korea is being emphasized as the buried pipes of a power plant are more than 20 years old. The objective of this work is to enhance the capability of the leak detection technique in a noisy environment. For this purpose, a modified cross-correlation method that can effectively remove the rotating machinery noise component is suggested. In addition, a method for leak point detection using phase information of cross-spectrum is suggested. The validity of the proposed method is verified by performing an experiment. The experimental result demonstrates that the performance of the cross-correlation method can be enhanced by reducing the periodic noise components due to mechanical equipment.

An Algorithm for Detecting Leak of Defaced Confidential Information Based on SVDD (SVDD 기반 중요문서 변조 유출 탐지 알고리즘)

  • Ghil, Ji-Ho;Nam, Ki-Hyo;Kang, Hyung-Seok;Kim, Seong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.105-111
    • /
    • 2010
  • This paper proposes the algorithm which addresses the problem of detecting leak of defaced confidential documents from original confidential document. Generally, a confidential document is defaced into various forms by insiders and then they are trying to leak these defaced documents to outside. Traditional algorithms detecting leak of documents have low accuracy because they are based on similarity of two documents, which do not reflect various forms of defaced documents in detection. In order to overcome this problem, this paper proposes a novel v-SVDD algorithm which is based on SVDD, the novelty detection algorithm. The result of experiment shows that there is significant improvement m the accuracy of the v-SVDD in comparison with the traditional algorithms.

Revisiting PageRank Computation: Norm-leak and Solution (페이지랭크 알고리즘의 재검토 : 놈-누수 현상과 해결 방법)

  • Kim, Sung-Jin;Lee, Sang-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.268-274
    • /
    • 2005
  • Since introduction of the PageRank technique, it is known that it ranks web pages effectively In spite of its usefulness, we found a computational drawback, which we call norm-leak, that PageRank values become smaller than they should be in some cases. We present an improved PageRank algorithm that computes the PageRank values of the web pages correctly as well as its efficient implementation. Experimental results, in which over 67 million real web pages are used, are also presented.