• Title/Summary/Keyword: Leakage

Search Result 7,692, Processing Time 0.032 seconds

A Study on the Hazard Area of Bunkering for Ammonia Fueled Vessel (암모니아 연료추진 선박의 벙커링 누출 영향에 관한 연구)

  • Ilsup Shin;Jeongmin Cheon;Jihyun Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.964-970
    • /
    • 2023
  • As part of the International Maritime Organization ef orts to reduce greenhouse gas emissions, the maritime industry is exploring low-carbon fuels such as liquefied natural gas and methanol, as well as zero-carbon fuels such as hydrogen and ammonia, evaluating them as environmentally friendly alternatives. Particularly, ammonia has substantial operational experience as cargo on transport ships, and ammonia ship engines are expected to be available in the second half of 2024, making it relatively accessible for commercial use. However, overcoming the toxicity challenges associated with using ammonia as a fuel is imperative. Detection is possible at levels as low as 5 ppm through olfactory senses, and exposure to concentrations exceeding 300 ppm for more than 30 min can result in irreparable harm. Using the KORA program provided by the Chemical Safety Agency, an assessment of the potential risks arising from leaks during ammonia bunkering was conducted. A 1-min leak could lead to a 5 ppm impact within a radius of approximately 7.5 km, affecting key areas in Busan, a major city. Furthermore, the potentially lethal concentration of 300 ppm could have severe consequences in densely populated areas and schools near the bunkering site. Therefore, given the absence of regulations related to ammonia bunkering, the potential for widespread toxicity from even minor leaks highlights the requirement for the development of legislation. Establishing an integrated system involving local governments, fire departments, and environmental agencies is crucial for addressing the potential impacts and ensuring the safety of ammonia bunkering operations.

Desiccation Tolerance and Storage Behavior of Sarcandra glabra Seeds for Use in ex-situ Conservation (현지외 보존을 위한 죽절초 종자의 건조 내성과 저장성 평가)

  • Da-Eun Gu;Sim-Hee Han;Eun-Young Yim;Jin Kim;Ja-Jung Ku
    • Journal of Korean Society of Forest Science
    • /
    • v.112 no.4
    • /
    • pp.442-450
    • /
    • 2023
  • This study sought to determine the desiccation tolerance and storage behavior of Sarcandra glabra seeds to assist in the establishment of an ex-situ conservation strategy for the species. The basic germination characteristics of S. glabra seeds were investigated. Subsequently, the seeds were dried to various desiccation levels to allow for analysis of their germination characteristics and seed integrity. In addition, the seeds were subjected to germination tests after being stored for different durations. The initial seed moisture content following the removal of the fleshy fruit was 32.8%, and the fresh seeds maintained their seed viability even after a decrease in the seed moisture content to 4.8%, while the germination percentage was 81.0%. The germination percentage of the seeds decreased to 55.0% and 30.0% when they were desiccated to moisture contents of 2.3% and 2.2%, respectively. By contrast, when the stored seeds were desiccated, they maintained their seed viability and vigor at a moisture content of 18.6%; however, when the moisture content decreased below 5.0%, both the seed viability and vigor significantly declined and the germination percentage fell below 20.0%. Furthermore, analysis of the seed leachate revealed that the decrease in the seed viability and vigor was associated with both increased electrical conductivity and increased concentrations of inorganic compounds such as potassium and calcium. In conclusion, the findings of this study show S. glabra seeds to possess desiccation tolerance that falls somewhere between the recalcitrant and intermediate seed types, with the observed variations depending on the degree of deterioration.

"An Analysis Study of Factors for Strengthening Cybersecurity at the Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 요인 분석연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.64-65
    • /
    • 2023
  • The purpose of this study was to assess the current status of cyber security at the Busan Port container terminal and derive strengthening factors through exploratory research. In recent years, the maritime industry has actively adopted Fourth Industrial Revolution technologies, resulting in changes in the form of ports, such as automated and smart terminals. While these changes have brought positive improvements in port efficiency, they have also increased the potential for cyber security incidents and threats, including information leakage through cargo handling equipment and ransomware attacks leading to terminal operations disruption. Especially in the case of ports, cyber security threats can have not only local effects within the port but also physical damage and implications for national security. However, despite the growing cyber security threats within ports, research related to domestic port cyber security remains limited. Therefore, this study aimed to identify factors for enhancing cyber security in ports and derive future enhancement strategies. The study conducted an analysis focusing on the Busan Port container terminal, which is one of the leading ports in South Korea actively adopting Fourth Industrial Revolution technologies, and conducted a survey of stakeholders in the Busan Port container terminal. Subsequently, exploratory factor analysis was used to derive strengthening factors. This study holds significance in providing directions for enhancing cyber security in domestic container ports in the future.

  • PDF

Seasonal Paddy Management Options for the Safe Use of Golden Apple Snails (Pomacea canaliculata) in Eco-friendly Rice Cultivation (친환경 벼 재배지에서 왕우렁이(Pomacea canaliculata) 안전사용을 위한 시기별 논 관리요령)

  • Lee, Jin-Hee;Choi, Duck-Soo;Kim, Hyo-Jeong․;Cho, A-Hae;Kim, Ji-In;Hong, Sung-Jun
    • Korean Journal of Organic Agriculture
    • /
    • v.31 no.4
    • /
    • pp.413-426
    • /
    • 2023
  • These experiments were conducted for 3 years from 2021 to 2023 to develop a method that can be safely used to prevent the leakage of Golden apple snails (Pomacea canaliculata) from eco-friendly rice plantations. In the southern part of Jeollanam-do, after planting rice, the young golden apple snails placed in the rice field become adults around mid-July and begin spawning. These individuals can overwinter in drains that do not dry out, but individuals hatched after mid-July will not mature enough to overwinter. The size of golden apple snails overwintered in the drainage canal was more than 2.5cm in shell height. Installing a net at the inlet could block 95% of the inflow of snails, and 99% of outflow was blocked by installing an improved water trap and net at the drain. During the mid-drying period and pre-harvest drying period, a water path was created with a power paddy pottery machine. 59.5% of snails were attracted to the waterway, and it took 130 minutes to build the waterway and collect the snails. Based on these results, seasonal paddy management tips for the safe use of giant snails in rice fields were suggested.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

TNT Explosion Demonstration and Computational Fluid Dynamics for Safety Verification of Protection Wall in Hydrogen Refueling Station (수소충전소 방호벽 안전성 검증을 위한 TNT 폭발실증 및 전산유동 해석)

  • Yun-Young Yang;Jae-Geun Jo;Woo-Il Park;Hyon Bin Na
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.4
    • /
    • pp.102-109
    • /
    • 2023
  • In realizing a hydrogen society, it is important to secure the safety of the hydrogen refueling station, which is the facility where consumers can easily meet hydrogen. The hydrogen refueling station consists of compressed gas facilities that store high-pressure hydrogen, and there is a risk that the high-pressure compressed gas facility will rupture due to a fire explosion due to hydrogen leakage in the facility or the influence of surrounding fires. Accordingly, the Korea Gas Safety Corporation is making every effort to find out risk factors from the installation stage, reflect them in the design, and secure safety through legal inspection. In this study, a TNT explosion demonstration test using a protection wall was conducted to confirm the safety effect of the protection wall installed at the hydrogen refueling station, and the empirical test results were compared and verified using FLACS-CFD, a CFD program. As a result of the empirical test and CFD analysis, it was confirmed that the effect of reducing the explosion over-pressure at the rear end of the protection wall decreased from 50% to up to 90% depending on the location, but the effect decreased when it exceeded a certain distance. The results of the empirical test and computer analysis for verifying the safety of the protection wall will be used in proposals for optimizing the protection wall standards in the future.

A Study on Acceptance of Blockchain-Based Genetic Information Platform (블록체인 기반 유전자분석 정보플랫폼의 수용에 대한 연구)

  • In Seon Choi;Dong Chan Park;Doo Hee Chung
    • Information Systems Review
    • /
    • v.23 no.3
    • /
    • pp.97-125
    • /
    • 2021
  • Blockchain is a core technology to solve personal information leakage and data management issues, which are limitations of existing Genomic Sequencing services. Due to continuous cost reduction and deregulation, the market size of Genomic Sequencing has been increasing, also the potential of services is expected to increase when Blockchain's security and connectivity are combined. We created our research model by combining the Technology Acceptance Model (TAM) and the Innovation Resistance Theory also analyzed the factors affecting the acceptance intention and innovation resistance of the Blockchain Based Genomic Sequencing Information Platform. A survey was conducted on 150 potential users of Blockchain and Genomic Sequencing services. The analysis was conducted by setting the four Blockchain variables: Security, transparency, availability, and diversity). Also, we set the Perceived Usefulness, Perceived risk, and Perceived Complexity for Technology Acceptance and Innovation Resistance variables and analyzed the effect of the characteristics of the Blockchain on acceptance intention and innovation resistance through these variables. Through this analysis, key variables that need to be considered important to reduce resistance and increase acceptance intention could be identified. This study presents innovation factors that should be considered in companies preparing a new Blockchain Based Genomic Sequencing Information Platform.

Safety Verification Techniques of Privacy Policy Using GPT (GPT를 활용한 개인정보 처리방침 안전성 검증 기법)

  • Hye-Yeon Shim;MinSeo Kweun;DaYoung Yoon;JiYoung Seo;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.207-216
    • /
    • 2024
  • As big data was built due to the 4th Industrial Revolution, personalized services increased rapidly. As a result, the amount of personal information collected from online services has increased, and concerns about users' personal information leakage and privacy infringement have increased. Online service providers provide privacy policies to address concerns about privacy infringement of users, but privacy policies are often misused due to the long and complex problem that it is difficult for users to directly identify risk items. Therefore, there is a need for a method that can automatically check whether the privacy policy is safe. However, the safety verification technique of the conventional blacklist and machine learning-based privacy policy has a problem that is difficult to expand or has low accessibility. In this paper, to solve the problem, we propose a safety verification technique for the privacy policy using the GPT-3.5 API, which is a generative artificial intelligence. Classification work can be performed evenin a new environment, and it shows the possibility that the general public without expertise can easily inspect the privacy policy. In the experiment, how accurately the blacklist-based privacy policy and the GPT-based privacy policy classify safe and unsafe sentences and the time spent on classification was measured. According to the experimental results, the proposed technique showed 10.34% higher accuracy on average than the conventional blacklist-based sentence safety verification technique.

Development of a Rotation Swab Pig Method for Cleaning Water Pipes (상수관의 세척을 위한 회전식 스왑피그 공법 개발)

  • Kicheol Lee;Jaeho Kim;Kisung Kim;Jeongjun Park
    • Journal of the Korean Geosynthetics Society
    • /
    • v.23 no.2
    • /
    • pp.63-75
    • /
    • 2024
  • Drinking water is an essential element to ensure the basic human right to live, and the quality of clean water must always be ensured. However, domestic water facilities, which were installed intensively in the early 2000s, are deteriorating. The accidents such as discoloration of water such as chromaticity and turbidity as well as leakage of substances frequently occur. However, since it is virtually impossible to replace all water pipes, the detailed standards for maintenance of water pipe network facilities established in 2021 require water pipe cleaning. The swab pig method, one of the water pipe cleaning methods, is a method of physically removing substances in pipes and is evaluated as having the highest cleaning efficiency. However, Swab is highly likely to be damaged or deformed during the cleaning process, and may even be lost. Therefore, in this study, the material of the pig was changed to a material with high compressibility, and it was made as close as possible to the inner wall of the water pipe. And, to maximize cleaning efficiency, a rotation swab pig with a rotation blade was developed. In addition, high-strength wire and winding equipment were additionally developed to eliminate the possibility of loss and to determine the location of the pig. The inlet and outlet are connected with wires, and after verifying the performance of each detailed technology, the technology was applied on a test bed with a 30m section. As a result of the application, the performance of the technology was verified by measuring the process time and evaluating applicability.