• Title/Summary/Keyword: Leakage risk

Search Result 424, Processing Time 0.027 seconds

Estimating the Area of Damage Caused by Gas Pipeline Leakage in Subway Construction Zones (지하철역 공사지역 도시가스 배관 누출로 인한 피해면적 산정)

  • Yang, Yong-Ho;Lee, Jae-Wook;Kong, Ha-Sung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.419-427
    • /
    • 2024
  • This study assessed the potential impact of gas leakage resulting from accidental damage to buried urban gas pipelines during perforating operation near subway construction sites. The risk of explosions due to ignition sources such as static electricity, arising from gas infiltrating the subway construction site through storm sewers and sewage pipes, was evaluated using the ALOHA program. The results of the threat zone calculation, which input various parameters of urban gas pipelines such as length, diameter, and pressure, indicated that the flammable area within the vapor cloud extended from 1.2 to 1.4 km (red zone), the blast area ranged from 0.8 to 1.0 km (yellow zone), and the jet fire extended from 45 to 61 m (red zone). This study demonstrates that within the flammable area of the vapor cloud, a specific combination of concentration and conditions can increase flammability. The blast area may experience explosions with a pressure of 1.0 psi, sufficient to break glass windows. In the event of a jet fire, high temperatures and intense radiant heat exposure lead to rapid fire propagation in densely populated areas, posing a high risk of casualties. The findings are presented in terms of the sphere of influence and threat zone ranges.

A Study on the Fire Risk of Black Box Wiring in Motor Vehicle (자동차의 블랙박스 와이어링 화재 위험성에 관한 연구)

  • Kang, Sin-Dong;Kim, Ju-Hee;Choi, Jun-Pyo;Kim, Jae-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.6
    • /
    • pp.22-28
    • /
    • 2017
  • According to the National Fire Data System (NFDS), more than 5,000 vehicle fires have occurred every year for the last 10 years. Vehicle fires are primarily caused by mechanical (breaking system and engine), electrical (wiring and battery), and chemical (oil and fuel gas leakage) problems. The electrical factor has increased with the installation of driver convenience equipment. For example, today, the black box is widely used to provide video data recording of motor vehicle accidents. The black box consists of a front camera, rear camera, and wires. The black box wires are directly connected to the junction box or fuse box from the start battery that operates to provide normal on power supplying for engine stop. It is extremely dangerous when the wires short circuit due to insulation aging, mechanical and electrical stress, etc. In this study, the black box wiring fire risk have been analyzed and investigated when the steady state and abnormal operations, and under the following conditions: wiring arrangements with a high temperature condition, insulation aging, poor contact, and short circuits. The results showed that black box wiring short circuits had a higher fire risk than the other fire hazard elements. To prevent fire hazards caused by black box wiring, the black boxes must be installed by qualified service personnel. Do not modify the wiring, remove the fuse and secure the wiring using cable ties or insulation tape.

Technical Review on Risk Assessment Methodology for Carbon Marine Geological Storage Systems (이산화탄소 해양 지중저장 시스템에서의 누출 위해성 평가방법에 관한 기술적 검토)

  • Hwang, Jin-Hwan;Kang, Seong-Gil;Park, Young-Gyu
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.13 no.2
    • /
    • pp.121-125
    • /
    • 2010
  • Carbon Capture and Storage (CCS) technology mitigates the emission amount of carbon dioxide into the atmosphere and can reduce green house effect which causes the climate change. Deep saline aquifer or obsolete oil/gas storage etc. in the marine geological structure are considered as the candidates for the storage. The injection and storage relating technology have been interested in the global society, however the adverse effect caused by leakage from the system failure. Even the safety level of the CCS is very high and there is almost no possibility to leak but, still the risk to marine ecosystem of the high concentrated carbon dioxide exposure is not verified. The present study introduces the system and environmental risk assessment methods. The feature, event and process approach can be a good starting point and we found the some possibility from the fault tree analysis for evaluation. From the FEP analysis, we drove the possible scenario which we need to concentrate on the construction and operation stages.

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

A Study on Total Hazard Level Algorithm Development for Hazardous Chemical Substances (유해화학물질의 종합위해등급 알고리즘 개발에 관한 연구)

  • 고재선;김광일;정상태
    • Fire Science and Engineering
    • /
    • v.14 no.4
    • /
    • pp.7-16
    • /
    • 2000
  • In the study, three criteria(toxicity, fire & explosion, environment) and damage prediction method for each case was set up, and all these criteria were applied to the subject substance that was selected as hazardous level by integrating all criteria through Algorithm. Particularly, the environment criterion is a comprehensive concept, environment index modeling by combining USCG(United State Coast Guard) & MSDS(Material Safety Data Sheet) environment criteria classifications and the environment part of MFPA's health hazardousnes(Nh). And for damage prediction method of each criterion were adopted and they were applied to hazardous chemical substances in use or stored by chemical substance related enterprises located in each region that made possible to set up total hazard level of used substances(inflammability, poisonousness and counteraction on a unit substance, and hazard level & display modeling on environment) & damage prediction in case of accident & solidity setup(CPQRA: Chemical Process Quantitative Risk Assessment, IAEA: International Atomic Energy Agency, VZ eq: Vulnerable Zone) risk counter. Thus it is deemed that it can be applied to toxic substance leakage that can happen during any chemical processing & storage, application as a tool for prior safety evaluation through potential dangerousness computation of fire & explosion.

  • PDF

A Study on the Cost Analysis of risk facilities using e-Consequence Analysis - Focusing Steel pipe Industry (e-CA(e-Consequence Analysis)를 활용한 위험설비의 비용 분석에 관한 연구 : 강관제조업 사례를 중심으로)

  • Kwon, Hyeok Min;Hwang, Yong Woo;Lee, Ik Mo;Chun, Young Woo;Choi, Young Hun
    • Journal of the Korea Safety Management & Science
    • /
    • v.20 no.3
    • /
    • pp.27-36
    • /
    • 2018
  • The steel pipe manufacturing industry deals with facilities and materials. Especially thermal facilities are close to vapor cloud explosion (VCE) and may cause secondary damage to facilities because they deal with corrosive substances such as hydrofluoric acid, sulfuric acid and acid, fire, explosion, leakage etc. It is in danger. In this study, hazard identification method was conducted using HAZOP techniques and quantitative risk analysis was conducted using e-CA, a program that supports accident impact analysis. Equipment in the influence range of ERPG - 3 was determined to be a facility requiring replacement. It was decided that neutralization is necessary using slaked lime. Based on the cost of loss, We presented the proper replacement which is the timing of the dangerous facility. As a result, It was ideal to replace the facilities with 20 years of heat treatment facilities, one year of hydrofluoric acid storage tank, 20 years of sulfuric acid storage tank, and 5 years of hydrochloric acid storage tank.

Development of IoT-based Safety Management Method through an Analysis of Risk Factors for Industrial Valves (산업용 밸브의 위험요소 분석을 통한 IoT 기반 안전관리 방안 개발)

  • Kim, Jung-Hoon;Kim, Young-Gu
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.5
    • /
    • pp.35-43
    • /
    • 2019
  • The safety of industrial valves, which are the core parts of plant facilities, are managed by manpower and there are difficulties because of side area for inspection and limited accessibility due to the nature of facilities. The industrial valves used in plant facilities cause problems such as interrupted production; a loss of life due to leak or explosion of poisonous material and flammable gases, and difficulty in locating accident positions in the event of leakage or failure. Therefore, safety management and control systems based on IoT technology are needed. This study is about the development of risk factor prediction technique among the safety management of industrial valves through IoT- based wireless communication and the development of actuator control system. We have developed IoT-based industrial valve safety management techniques to prevent accidents caused by main risk factors by conducting an analysis of the structural characteristics of valves and an analysis of the causes of main risk factors through review of failure data and literature and an analysis of accident scenarios.

Evaluation of Risk Factors to Detect Anomaly in Water Supply Networks Based on the PROMETHEE and ANP (상수도관망의 이상징후 판정을 위한 위험요소 평가 - PROMETHEE와 ANP 기법 중심으로)

  • Hong, Sung-Jun;Lee, Yong-Dae;Kim, Sheung-Kown;Kim, Joong-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.1 s.162
    • /
    • pp.35-46
    • /
    • 2006
  • In this study, we proposed a layout of the integrated decision support system in order to prevent the contamination and to manage risk in water supply networks for safe and smooth water supply. We evaluated the priority of risk factors to detect anomaly in water supply networks using PROMETHEE and ANP techniques, which are applied to various Multi-Criteria Decision Making area in Europe and America. To develop the model, we selected pH, residual chlorine concentration, discharge, hydraulic pressure, electrical conductivity, turbidity, block leakage and water temperature as the key data item. We also chose pipe corrosion, pipe burst and water pollution in pipe as the criteria and then we present the results of PROMETHEE and ANP analysis. The evaluation results of the priority of risk factors in water supply networks will provide basic data to establish a contingency plan for accidents so that we can establish the specific emergency response procedures.

Security and Trust of Mobile Payment Apps : Focus on Personal Predisposition and Security Signal (모바일 결제 앱에서의 보안과 신뢰 : 개인의 성향과 보안 신호를 중심으로)

  • Kim, Min-Gyung;Choi, Boreum
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.194-204
    • /
    • 2019
  • The mobile payment app market has been expanding recently. However, the usage rate of mobile payment apps is not meeting service providers' expectations due to concerns about security and privacy. This study investigated how personal predisposition and how the security signals of the payment app affect users' perceived privacy and security risks, and how these factors ultimately affect the trust of mobile payment apps. The results showed that privacy concerns increase the risk of perceived personal information leaks and reduce perceived mobile system security, while familiarity, perceived reputation, and assurance seal reduce the risk of perceived personal information leaks and increase perceived mobile system security. Finally, it revealed that the reduced risk of perceived personal information leaks and the increased security of mobile systems had a positive impact on the reliability of mobile payment apps.