• Title/Summary/Keyword: Leakage risk

Search Result 424, Processing Time 0.037 seconds

Factors Affecting the Severity of Urinary Incontinence and the Quality of Life of Women with Urinary Incontinence (여성 요실금 환자의 요실금 중증도 및 삶의 질에 대한 영향요인 분석)

  • Oh Hyun Soo;Kim Mi Kyung
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.3
    • /
    • pp.469-477
    • /
    • 2005
  • Purpose: This study was conducted to investigate the factors that affect the severity of urinary incontinence and the quality of life of women with urinary incontinence. Methods: An exploratory correlation research design was applied and the sixty women who responded that they currently experience involuntary urine leakage at least once per week were invited to participate in the study. Results: According to the study results, the factors that significantly contribute to the severity of urinary incontinence were age, number of parity, and number of normal deliveries. Other influencing factors, such as obesity, menopausal state, hysterectomy, and number of episiotomies, were not significant to predict the severity of urinary incontinence. Urinary incontinence frequency per week and duration of experiencing urinary incontinence were shown to be factors that significantly affect quality of life. Conclusion: In women above 60 years old, multiparity, and multiple experiences of vaginal delivery tended to present a higher level of severity of urinary incontinence. In addition, women with higher frequencies of urinary incontinence per week and a longer duration of urinary incontinence showed a lower level of quality of life.

A Study on the Transient State Characteristics of TFR-8 Cable caused by Over Current (과전류에 의한 TFR-8 케이블의 과도상태 특성에 관한 연구)

  • Kim, Byeong-Jo;Kim, Jae-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.29 no.1
    • /
    • pp.57-63
    • /
    • 2015
  • The incidence of fires caused by electrical factors has increased with the growth in domestic electrical consumption. According to the national fire data system of national emergency management agency, electrical fires accounted for 20% of all domestic fires in the last 10 years. Electrical fires are mainly caused by short circuit, leakage current, defect in an electrical equipment, over load, utility fault, etc. The fault current can be several times larger than the nominal current, thereby exceeding the rated current of cable. Consequently, the cable conductor, typically copper wire, heats up to a temperature that ignites surrounding combustibles. This paper describes the transient characteristics of the 0.6/1kV, TFR-8 cable have been investigated, and analyzed under the over current conditions for reduce the risk of electrical fire by experimental and FEM analysis. The experimental and FEM(Finite Element Method) analysis results of temperature and resistance variation according to the over current in copper wires were analyzed. The experimental results coincide well with the FEM analysis.

A Study on the safety measures for hydrogen cooling system of 500MW class thermal power plant (500MW급 화력발전소 수소냉각시스템의 안전대책)

  • Kim, Soon-Gi;Yuk, Hyun-Dai;Ka, Chool-Hyun
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.385-390
    • /
    • 2005
  • This paper provided a counter measures against the troubles and accidents that are likely to take place in the power plant using hydrogen gas as a coolant for the cooling system of the generator. Because of the extremely wide flammability limits of hydrogen in comparison to the other flammable gases, the safety measures against the hydrogen accidents is very important to ensure the normal operation of electric-power facility. This study's purpose was a presentation of standard model of safety management of hydrogen equipments in the coal firing power plant such as following items: 1) providing the technical prevention manual of the hydrogen explosions and hydrogen fires occurring in the cooling system of power generator; 2) the selection of explosion-proof equipments in terms of the risk level of operating environment; 3) the establishment of regulations and counter measures, such as the incorporation of gas leakage alarm device, for preventing the accidents from arising; 4) the establishment of safety management system to ensure the normal operation of the power plant.

  • PDF

A Study on the Rail Vehicle Applications and Increase the Capacity of Lithium Polymer Batteries (리튬폴리머 축전지의 철도차량 적용 및 용량증대에 관한 연구)

  • Cho, Kyu-Hwa;Kang, Seung-Wook
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.4
    • /
    • pp.340-345
    • /
    • 2016
  • Railway vehicle battery is supplying the power required for the initial start-up of the train, in the event of a fault in the vehicle, or catenary for supplying emergency power is one of the components are very important. Currently, the railway vehicles such as nickel-cadmium batteries are being used [1,2]. Ni-Cd batteries as a battery installed in the railway vehicles have a strong corrosion resistance is included, The charge-discharge performance is significantly degraded in cold weather, there is a danger of deterioration or explosion. Train accidents have been caused a lot of damage due to rapid deterioration and cracking of the battery and memory due to the effect of Ni-Cd batteries. In order to solve the problems, There is no risk of degradation, deterioration and leakage, cracking and exploding. maintenance is simple and applied measures proposed to apply Lithium Polymer battery of high performance. In addition, the lack of capacity problems identified by testing the different special systems is replaced by a 70Ah lithium-polymer battery is possible without changing the batteries of 50Ah caused by installing additional equipment in existing older trains were applied to the vehicle.

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.

Development of Impact Evaluation and Diagnostic Indicators for Sinkholes

  • Lee, KyungSu;Kim, TaeHyeong
    • International Journal of Contents
    • /
    • v.14 no.3
    • /
    • pp.53-60
    • /
    • 2018
  • Based on the previous studies on sinkholes and ground subsidence conducted until date, the factors affecting the occurrence of sinkholes can be divided into natural environmental factors and human environmental factors in accordance with the purpose of the study. Furthermore, to be more specific, the human environment can be classified into the artificial type and the social type. In this study, the assessment indices for assessing risks of sinkholes and ground subsidence were developed by performing AHP analysis based on the results of the study by Lee et al. (2016), who selected the risk factors for the occurrence of sinkholes by performing Delphi analysis targeting relevant experts. Analysis showed that the artificial environmental factors were of significance in affecting the occurrence of sinkholes. Explicitly, the underground factors were found to be of importance in the natural environment, and among them, the level of underground water turned out to be an imperative influencing factor. In the artificial environment, the underground and subterranean structures exhibited similar importance, and in the underground structures, the excessive use of the underground space was found to be an important influencing factor. In the subterranean ones, the level of water leakage and the erosion of the water supply and sewage piping system were the influential factors, and in the surface, compaction failure was observed as an imperative factor. In the social environment, the regional development, and above all, the groundwater overuse were found to be important factors. In the managemental and institutional environment, the improper construction management proved to be the most important influencing factor.

Security Attack Analysis for Wireless Router and Free Wi-Fi Hacking Solutions (무선공유기 보안공격 분석 및 무료와이파이 해킹 해결방안)

  • Bae, Hee-Ra;Kim, Min-Young;Song, Su-Kyung;Lee, Seul-Gi;Chang, Young-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.65-70
    • /
    • 2016
  • As network communication increases by using public WiFi to check e-mail and handling Internet banking, the danger of hacking public routers continues to rise. While the national policy is to further propagate public routers, users are not eager to keep their information secure and there is a growing risk of personal information leakage. Because wireless routers implement high accessibility but are vulnerable to hacking, it is thus important to analyze hacking to tackle the attacks. In this study, an analysis is made of the encryption method used in WiFi and cases of hacking WiFi by security attacks on wireless routers, and a method for tackling the attacks is suggested.

An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing

  • Zhang, Qiu-yu;Li, Yu-zhou;Hu, Ying-jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2612-2633
    • /
    • 2020
  • Due to the explosive growth of multimedia speech data, how to protect the privacy of speech data and how to efficiently retrieve speech data have become a hot spot for researchers in recent years. In this paper, we proposed an encrypted speech retrieval scheme based on long short-term memory (LSTM) neural network and deep hashing. This scheme not only achieves efficient retrieval of massive speech in cloud environment, but also effectively avoids the risk of sensitive information leakage. Firstly, a novel speech encryption algorithm based on 4D quadratic autonomous hyperchaotic system is proposed to realize the privacy and security of speech data in the cloud. Secondly, the integrated LSTM network model and deep hashing algorithm are used to extract high-level features of speech data. It is used to solve the high dimensional and temporality problems of speech data, and increase the retrieval efficiency and retrieval accuracy of the proposed scheme. Finally, the normalized Hamming distance algorithm is used to achieve matching. Compared with the existing algorithms, the proposed scheme has good discrimination and robustness and it has high recall, precision and retrieval efficiency under various content preserving operations. Meanwhile, the proposed speech encryption algorithm has high key space and can effectively resist exhaustive attacks.

The Qualitative Study on the Evaluation and the Application of 3D scan and virtual try-on technology (3차원 스캔과 가상 착의 기술의 평가와 활용에 관한 질적연구)

  • Choi, Young-Lim;Nam, Yun-Ja
    • Fashion & Textile Research Journal
    • /
    • v.11 no.3
    • /
    • pp.437-444
    • /
    • 2009
  • According to the activation of the fashion electronic commerce, this research investigated the merits and demerits and improvement plan of the 3D virtual try-on technology using the qualitative research method. This research was performed by interview with 70 evaluation group. The evaluation group of 3D virtual try-on was organized and the fit evaluation process by 3D human body scan and the 3D virtual try-on of the i-Fashion technology center were experienced. This study was performed by interview after the actual and virtual try-on about the casual shirt. The convenience and accuracy of measurement, usability in online shopping, body evaluation, complement of sizing system, and body shape management were discovered as merits. The requirement of high accuracy in sizing and avatar, limits of fabric expression, practical limitation by cost, vexatious of measurement garment, differences between real and virtual fittings, personal information leakage risk, and etc were pointed out as demerits. The mass customization, customized garment connected with medical service, humanized avatar, improved fitting report, entertainment, coordination, wardrobe manager were proposed as improvement plan.

Fingerprint Smudge Attacks Based on Fingerprint Image Reconstruction on Smart Devices (지문 영상 복원 기반의 스마트 기기 지문 스머지 공격 연구)

  • Lee, Hoyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.233-240
    • /
    • 2017
  • Fingerprint authentication identifies individuals based on user specific information. It is widely used as it is convenient, secure and has no risk of leakage, loss, or forgotten. However, the latent fingerprints remaining on the smart device's surface are vulnerable to smudge attacks. We analyze the usage patterns of individuals using smart device and propose methods to reconstruct damaged fingerprint images using fingerprint smudges. We examine the feasibility of smudge attacks with frequent usage situations by reconstructing fingerprint smudges collected from touch screens. Finally, we empirically verify the vulnerability of fingerprint authentication systems by showing high attack rates.