• Title/Summary/Keyword: Technology Leakage

Search Result 1,687, Processing Time 0.029 seconds

Analysis of Slot Leakage Reactance of Submersible Motor with Closed Slots during Starting Transient Operation

  • Bao, Xiaohua;Di, Chong;Fang, Yong
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.1
    • /
    • pp.135-142
    • /
    • 2016
  • Generally, closed slots are adopted to reduce the water friction loss in both the stator and the rotor of water filling submersible motor due to the special environment of operation. One of the obvious differences between the traditional induction motors and water filling submersible motors is that the submersible motors only need relatively smaller starting torque. This paper aims to analyze the slot leakage reactance of water filling submersible motor during starting transient operation. An improved analytical method which considered the magnetic saturation of the slot bridge and the skin effect of rotor bars is proposed. The slot permeance factor which has a direct impact on the slot leakage reactance is calculated. Then finite element models with different stator slot types are constructed and search coils are introduced to measure the slot flux linkage. Moreover, the starting performances of the models with two typical stator slots are compared and the flux leakage characteristics are obtained. Finally, the results obtained by finite element method are very close to the results obtained by analytical method.

Impact of Corporate Characteristics on Personal Information Breach Accident (기업의 특성이 개인정보 유출 사고에 미치는 영향)

  • Kim, Taek-Young;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.13-30
    • /
    • 2020
  • Not only does it cause damage to individuals and businesses due to the occurrence of large-scale personal information leakage accidents, but it also causes many problems socially. Companies are embodying efforts to deal with the threat of personal information leakage. However, it is difficult to obtain detailed information related to personal information leakage accidents, so there are limitations to research activities related to leakage accidents. This study collects information on personal information leakage incidents reported through the media for 15 years from 2005 to 2019, and analyzes how the personal information leakage incidents occurring to companies are related to the characteristics of the company. Through the research results, it is possible to grasp the general characteristics of personal information leakage accidents, and it may be helpful in decision making for prevention and response to personal information leakage accidents.

A Study on the Diagnostic Techniques of Leakage Current for Switch-Gear Based on LabVIEW (LabVIEW 기반의 수배전반 누설전류 진단기법 연구)

  • Kim, Yong-Seong;Jang, Sung-Il;Choi, Jung-Hwan;Kim, Kwang-Ho
    • Journal of Industrial Technology
    • /
    • v.34
    • /
    • pp.61-66
    • /
    • 2014
  • Recently, Because the consumption of electricity is increased, having stable electricity supply and diagnosis of the power device is important. In this paper, I propose a diagnostic techniques of the leakage current for switchgear based on LabVIEW NI's. Using the data obtained from the leakage current sensor installed in switchgear panels, in performed continuously diagnosis, notifications and warnings can be the administrator immediately results. It is expected accordingly, the administrator will be able to take prompt action. Using the virtual switchgear with a PXI NI's, war tested the proposed techniques.

  • PDF

Management Criteria of Underground Strage Tank for Prevention of Soil Contamination (토양오염방지를 위한 지하저장탱크의 관리 방안 연구)

  • Kim, Joon Hyun;Han, Young Han
    • Journal of Industrial Technology
    • /
    • v.18
    • /
    • pp.453-460
    • /
    • 1998
  • The purpose of this study was to analyze their status of underground storage tank(UST) facilities and level of soil contamination, and to establish its management criteria. DB program was developed to analyze the correlation between specific characteristic of UST and level of soil contamination. For a suitable management of UST, leakage monitoring and inspection method of UST was investigated. Inspection period was established based on the leakage rate. The most dominant factor for leakage seemed to be caused by the corrosion. Therefore, main factor, construction method and installation year of UST, and corrosion protection system were suggested for optimal protection of UST. Considering the present management status of UST in Korea, inspection and management criteria of UST should be accomplished in term of contamination protection of leakage, and flexible regulation act should be introduced for each specific site.

  • PDF

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

Discussion On the Status and Improvements For Technology Leakage Crimes: Based on Acquittal Case (기술유출 형사사건의 처리 실태와 개선 고려사항 논의: 무죄사건을 중심으로)

  • Kyung Joon Hwang;Hun Yeong Kwon
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.41-55
    • /
    • 2022
  • As the importance of technology protection is emphasized day by day, various protection measures are being carried out to protect technology. But attempts to leak technology are continuing. As an alternative to this, stronger punishment is socially required for technology leakage crimes. In response to these social demands, the standard for punishment has been steadily raised. Legislative bills containing additional reinforcement are still pending in the National Assembly. However, in order to substantially enhance the deterrence against crime, it is not enough to strengthen the punishment standards. The effect can only be fully exercised when the certainty of punishment increases. Therefore, this paper focused on seeking ways to increase the certainty of punishment under the current system rather than the reinforcement of the punishment itself. The purpose of this study was to derive the reason why the innocence rate in technology leakage criminal cases is higher than that of general criminal cases by analyzing cases and causes of innocent cases in technology leakage criminal cases. Based on this, I discussed improvement considerations to reduce unfair acquittal cases.

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis (로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석)

  • Hong, Jun Suk;Park, Won Hyung;Kim, Yanghoon;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

Development of Leakage Detector for Electric Equipment Failure in Fountain (분수대에서의 전기설비 고장에 대한 누전 감지 장치 개발)

  • Kim, Doo-Hyun;Kim, Sung-Chul;Park, Jong-Young
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.1
    • /
    • pp.35-40
    • /
    • 2018
  • This research aimed to develop an leakage detector of analyzing the electric potential generated from the electric leakage of electric equipment of the fountain. To accomplish this goal, the potential gradient was analyzed against path 1 ~ path 4; this was done by taking the lighting of a fountain as the electric leakage point based on code analyses in Korea and other countries. Lighting 1 was taken as the electric leakage point, and the earthing point was set against lightings(2~3). It appeared that the allowable touch voltage against the 1 type(under 2.5 V) exceeded 60.0%. Therefore, the lighting of fountain turned out to be the most dangerous point, and electric shock could be formed by the electric leakage of electric equipment in underwater as well as by the lighting. An leakage detector was developed based on this risk; this detector is capable of analyzing the electric potential of a electric equipments of the fountain in underwater. Then, a verification test was carried out. This leakage detector can be used to measure electric potential in various submerged areas such as swimming pools, flooded spaces, and fountains.

A Case Study on the Leakage in Concrete Face Rockfill Dam (콘크리트 표면차수벽형 석괴댐(CFRD)의 누수특성에 관한 사례연구)

  • 방돈석;신창건;이강용;안상로
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.03a
    • /
    • pp.197-202
    • /
    • 2003
  • The leakage quantity through concrete facing of Concrete Face Rockfill Dam(CFRD) is very small due to its low permeability of intact concrete. Even though the concrete facing is well designed and constructed, fine cracks can be generated due to effects of thermal and drying shrinkage. Therefore, it can be said that the leakage from the CFRD is subjected to not permeability of intact concrete but poor joints, cracks and foundation rocks. The Safety of a dam on leakage was evaluated based on the comparison between apparent permeability estimated and leakage quantity measured. The above method can be concluded to give a good direction for the evaluation of safety on CFRD in maintenance aspects as design and construction technology is improved with the accumulation of leakage data.

  • PDF

Minimal Leakage Pattern Generator

  • Kim, Kyung-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.1-8
    • /
    • 2011
  • This paper proposes a new input pattern generator for minimal leakage power in the nanometer CMOS technology considering all the leakage current components (sub-threshold leakage, gate tunneling leakage, band-to-band tunneling leakage). Using the accurate macro-model, a heuristic algorithm is developed to generate a input pattern for the minimum leakage. The algorithm applies to ISCAS85 benchmark circuits, and the results are compared with the results of Hspice. The simulation result shows that our method's accuracy is within a 5% difference of the Hspice simulation results. In addition, the simulation time of our method is far faster than that of the Hspice simulation.