• Title/Summary/Keyword: Leakage risk

Search Result 424, Processing Time 0.031 seconds

A Study on the Non-Hazardous Method for complying with the Explosion Proof Criteria of the Electrolysis (수전해설비의 전기방폭 기준 만족을 위한 비방폭화 방안에 관한 연구)

  • YongGyu, Kim;ShinTak, Han;JongBeom, Park;ByungChan, Kong;GyeJun, Park;SeungHo, Jung
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.6
    • /
    • pp.65-75
    • /
    • 2022
  • Recently, the possibility of fire and explosion due to hydrogen leakage and the resulting risk are increasing since the operating pressure of the electrolysis increases. This study performed the hazardous area classification in accordance with KS C IEC 60079-10-1 and KGS GC101 in consideration of the general operating conditions of the electrolysis. In addition, in order to achieve a To Non-hazardous, an appropriate ventilation rate was estimated to maintain a concentration of less than 25 % of the lower explosive limit. As a result, it was reviewed that the electrolysis is classified as an hazardous area when only natural ventilation is applied, and a huge amount of ventilation is required to classify it as a non-hazardous area.

Intelligent Monitoring System for Solitary Senior Citizens with Vision-Based Security Architecture (영상보안 구조 기반의 지능형 독거노인 모니터링 시스템)

  • Kim, Soohee;Jeong, Youngwoo;Jeong, Yue Ri;Lee, Seung Eun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.639-641
    • /
    • 2022
  • With the increasing of aging population, a lot of researches on monitoring systems for solitary senior citizens are under study. In general, a monitoring system provides a monitoring service by computing the information of vision, sensors, and measurement values on a server. Design considering data security is essential because a risk of data leakage exists in the structure of the system employing the server. In this paper, we propose a intelligent monitoring system for solitary senior citizens with vision-based security architecture. The proposed system protects privacy by ensuring high security through an architecture that blocks communication between a camera module and a server by employing an edge AI module. The edge AI module was designed with Verilog HDL and verified by implementing on a Field Programmable Gate Array (FPGA). We tested our proposed system on 5,144 frame data and demonstrated that a dangerous detection signal is generated correctly when human motion is not detected for a certain period.

  • PDF

Study for the Pseudonymization Technique of Medical Image Data (의료 이미지 데이터의 비식별화 방안에 관한 연구)

  • Baek, Jongil;Song, Kyoungtaek;Choi, Wonkyun;Yu, Khiguen;Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.6
    • /
    • pp.103-110
    • /
    • 2016
  • The recent frequent cases of damage due to leakage of medical data and the privacy of medical patients is increasing day by day. The government says the Privacy Rule regulations established for these victims, such as prevention. Medical data guidelines can be seen 'national medical privacy guidelines' is only released. When replacing the image data between the institutions it has been included in the image file (JPG, JPEG, TIFF) there is exchange of data in common formats such as being made when the file is leaked to an external file there is a risk that the exposure key identification information of the patient. This medial image file has no protection such as encryption, This this paper, introduces a masking technique using a mosaic technique encrypting the image file contains the application to optical character recognition techniques. We propose pseudonymization technique of personal information in the image data.

A Study on Smart Suthentication Process for Non-face-to-face Body heat Detector with Smart Authentication (비대면 스마트 인증 발열 감지기를 위한 스마트 인증 프로세스 연구)

  • Kim, Hyung-O;Hong, ChangHo;Lee, Hyo Jae;Kim, Eung-seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.244-245
    • /
    • 2021
  • Recently, A fever test is essential in a crowded places over the world because of COVID-19. A fever test is also conducted for visitors through a thermometer or a thermal imaging camera In Korea leading world with K-quarantine. However, the current body heat measurement process is divided into the steps of body heat examination and entry register. Therefore, access control person must be deployed at the entrance. In addition, since the accessor directly measures body heat and records personal information, the reliability of the information is low and the risk of personal information leakage is high. Therefore, in this paper, we consider the non-face-to-face smart authentication fever detector and propose a smart authentication process to unify the process for dualized body heat measurement and access recording.

  • PDF

A Study on Access Control Technique for Provision of Cloud Service in SSO-based Environment

  • Eun-Gyeom Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.73-80
    • /
    • 2023
  • In this paper, a technology to protect important information from access in order to revitalize the cloud service market. A technology is proposed to solve the risk of leakage of important confidential and personal information stored in cloud systems, which is one of the various obstacles to the cloud service market. To protect important information, access control rights to cloud resources are granted to cloud service providers and general users. The system administrator has superuser authority to maintain and manage the system. Client computing services are managed by an external cloud service provider, and information is also stored in an external system. To protect important in-house information within the company, all users, it was designed to provide access authority with users including cloud service providers, only after they are authenticated. It is expected that the confidentiality of cloud computing resources and service reliability achieved through the proposed access control technology will contribute to revitalizing the cloud service market.

Privacy model for DTC genetic testing using fully homomorphic encryption (동형암호를 활용한 DTC유전자검사 프라이버시모델)

  • Hye-hyeon Jin;Chae-ry Kang;Seung-hyeon Lee;Gee-hee Yun;Kyoung-jin Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.133-140
    • /
    • 2024
  • The spread of Direct-to-Consumer (DTC) genetic testing, where users request tests directly, has been increasing. With growing demand, certification systems have been implemented to grant testing qualifications to non-medical institutions, and the scope of tests has been expanded. However, unlike cases in less regulated foreign countries, disease-related tests are still excluded from the domestic regulations. The existing de-identification method does not adequately ensure the uniqueness and familial sharing of genomic information, limiting its practical utility. Therefore, this study proposes the application of fully homomorphic encryption in the analysis process to guarantee the usefulness of genomic information while minimizing the risk of leakage. Additionally, to safeguard the individual's right to self-determination, a privacy preservation model based on Opt-out is suggested. This aims to balance genomic information protection with maintainability of usability, ensuring the availability of information in line with the user's preferences.

Design of a Question-Answering System based on RAG Model for Domestic Companies

  • Gwang-Wu Yi;Soo Kyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.81-88
    • /
    • 2024
  • Despite the rapid growth of the generative AI market and significant interest from domestic companies and institutions, concerns about the provision of inaccurate information and potential information leaks have emerged as major factors hindering the adoption of generative AI. To address these issues, this paper designs and implements a question-answering system based on the Retrieval-Augmented Generation (RAG) architecture. The proposed method constructs a knowledge database using Korean sentence embeddings and retrieves information relevant to queries through optimized searches, which is then provided to the generative language model. Additionally, it allows users to directly manage the knowledge database to efficiently update changing business information, and it is designed to operate in a private network to reduce the risk of corporate confidential information leakage. This study aims to serve as a useful reference for domestic companies seeking to adopt and utilize generative AI.

A Knowledge Graph-based Chatbot to Prevent the Leakage of LLM User's Sensitive Information (LLM 사용자의 민감정보 유출 방지를 위한 지식그래프 기반 챗봇)

  • Keedong Yoo
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.1-18
    • /
    • 2024
  • With the increasing demand for and utilization of large language models (LLMs), the risk of user sensitive information being inputted and leaked during the use of LLMs also escalates. Typically recognized as a tool for mitigating the hallucination issues of LLMs, knowledge graphs, constructed independently from LLMs, can store and manage sensitive user information separately, thereby minimizing the potential for data breaches. This study, therefore, presents a knowledge graph-based chatbot that transforms user-inputted natural language questions into queries appropriate for the knowledge graph using LLMs, subsequently executing these queries and extracting the results. Furthermore, to evaluate the functional validity of the developed knowledge graph-based chatbot, performance tests are conducted to assess the comprehension and adaptability to existing knowledge graphs, the capability to create new entity classes, and the accessibility of LLMs to the knowledge graph content.

A Study on the Safety of Carbon Manufacturing By-product Gas Emissions (카본제조 부생가스 배출 안전성에 관한 연구)

  • Joo, Jong-Yul;Jeong Phil-Hoon;Kim, Sang-Gil;Sung-Eun, Lee
    • Journal of the Korea Safety Management & Science
    • /
    • v.26 no.1
    • /
    • pp.99-106
    • /
    • 2024
  • In the event of an emergency such as facility shutdown during process operation, the by-product gas must be urgently discharged to the vent stack to prevent leakage, fire, and explosion. At this time, the explosion drop value of the released by-product gas is calculated using ISO 10156 formula, which is 27.7 vol%. Therefore, it does not correspond to flammable gas because it is less than 13% of the explosion drop value, which is the standard for flammable gas defined by the Occupational Safety and Health Act, and since the explosion drop value is high, it can be seen that the risk of fire explosion is low even if it is discharged urgently with the vent stock. As a result of calculating the range of explosion hazard sites for hydrogen gas discharged to the Bent Stack according to KS C IEC 60079-10-1, 23 meters were calculated. Since hydrogen is lighter than air, electromechanical devices should not be installed within 23 meters of the upper portion of the Bent Stack, and if it is not possible, an explosion-proof electromechanical device suitable for type 1 of dangerous place should be installed. In addition, the height of the stack should be at least 5 meters so that the diffusion of by-product gas is facilitated in case of emergency discharge, and it should be installed so that there are no obstacles around it.

Procedural outcomes of laparoscopic caudate lobe resection: A systematic review and meta-analysis

  • Shahab Hajibandeh;Ahmed Kotb;Louis Evans;Emily Sams;Andrew Naguib;Shahin Hajibandeh;Thomas Satyadas
    • Annals of Hepato-Biliary-Pancreatic Surgery
    • /
    • v.27 no.1
    • /
    • pp.6-19
    • /
    • 2023
  • A systematic review was conducted in compliance with PRISMA statement standards to identify all studies reporting outcomes of laparoscopic resection of benign or malignant lesions located in caudate lobe of liver. Pooled outcome data were calculated using random-effects models. A total of 196 patients from 12 studies were included. Mean operative time, volume of intraoperative blood loss, and length of hospital stay were 225 minutes (95% confidence interval [CI], 181-269 minutes), 134 mL (95% CI, 85-184 mL), and 7 days (95% CI, 5-9 days), respectively. The pooled risk of need for intraoperative transfusion was 2% (95% CI, 0%-5%). It was 3% (95% CI, 1%-6%) for conversion to open surgery, 6% (95% CI, 0%-19%) for need for intra-abdominal drain, 1% (95% CI, 0%-3%) for postoperative mortality, 2% (95% CI, 0%-4%) for biliary leakage, 2% (95% CI, 0%-4%) for intra-abdominal abscess, 1% (95% CI, 0%-4%) for biliary stenosis, 1% (95% CI, 0%-3%) for postoperative bleeding, 1% (95% CI, 0%-4%) for pancreatic fistula, 2% (95% CI, 1%-5%) for pulmonary complications, 1% (95% CI, 0%-4%) for paralytic ileus, and 1% (95% CI, 0%-4%) for need for reoperation. Although the available evidence is limited, the findings of the current study might be utilized for hypothesis synthesis in future studies. They can be used to inform surgeons and patients about estimated risks of perioperative complications until a higher level of evidence is available.