• Title/Summary/Keyword: Technology leak

Search Result 359, Processing Time 0.028 seconds

Safety Monitoring Sensor for Underground Subsidence Risk Assessment Surrounding Water Pipeline (상수도관로의 주변 지반침하 위험도 평가를 위한 안전감시 센서)

  • Kwak, Pill-Jae;Park, Sang-Hyuk;Choi, Chang-Ho;Lee, Hyun-Dong
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.306-310
    • /
    • 2015
  • IoT(Internet of Things) based underground risk assessment system surrounding water pipeline enables an advanced monitoring and prediction for unexpected underground hazards such as abrupt road-side subsidence and urban sinkholes due to a leak in water pipeline. For the development of successful assessment technology, the PSU(Water Pipeline Safety Unit) which detects the leakage and movement of water pipes. Then, the IoT-based underground risk assessment system surrounding water pipeline will be proposed. The system consists of early detection tools for underground events and correspondence services, by analyzing leakage and movement data collected from PSU. These methods must be continuous and reliable, and cover certain block area ranging a few kilometers, for properly applying to regional water supply changes.

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

The implementation of Smart Care System for Dementia Patients (치매 환자를 위한 스마트 캐어 시스템 구현)

  • Ha, Eun-Sil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3832-3840
    • /
    • 2014
  • The rapidly aging population is also increasing the number of dementia patients rapidly. Studies have revealed the early signs of slowing progress. Therefore, dementia patient safety, continuous care, daily living, and health care are becoming more important. In this paper, a smart home care system using smart phones and Bluetooth communication technology was used to monitor the state of dementia patients of based on the results of grading dementia, health care of the dementia patients at home and provide for the safety of the system using motion sensors and gas leak sensors to respond to various emergency situations, such as fire, gas leak protection, and loitering. Using this system, the patient can stay longer in their home due to the nature of Korean culture before admission, while reducing the family's economical, physical and psychological burden and allowing the consultation of specialists through the system by building a database of individuals and providing professional service and specialty care referral agencies through the link.

A Study for Key Generation and Access Control Protocol in BYOD Environments (BYOD환경에서 키 생성 및 접근 제어 프로토콜에 관한 연구)

  • Min, So-Yeon;Jin, Byung-Wook;Lee, Kwang-Hyoung;Lee, Keun-Wang
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.27-35
    • /
    • 2015
  • Depending on the smart device user growth and development of communication technology, the area about working environment was extended without constraints of time and places. It is introducing to work using user's devices and this environment is called 'BYOD(Bring Your On Device)'. But it is vulnerable to security threat that happened in existing wireless environment and its security threat issue which is caused by inside information leak by an inside job and lost or stolen terminal which is caused by careless user is getting heated. So we studied about access control protocol by user rights under the BYOD situation make a session key based on the user information. We make a session key based on the user information and user device information, after that we design an access control protocol. The protocol we suggest can protect from attack under the BYOD situation and wireless communication situation and also safety and security requirement from inside information leak because it controls user rights.

Piping Failure Frequency Analysis for the Main Feedwater System in Domestic Nuclear Power Plants

  • Choi Sun Yeong;Choi Young Hwan
    • Nuclear Engineering and Technology
    • /
    • v.36 no.1
    • /
    • pp.112-120
    • /
    • 2004
  • The purpose of this paper is to analyze the piping failure frequency for the main feedwater system in domestic nuclear power plants(NPPs) for the application to an in-service inspection(ISI), leak before break(LBB) concept, aging management program(AMP), and probabilistic safety analysis(PSA). First, a database was developed for piping failure events in domestic NPPs, and 23 domestic piping failure events were collected. Among the 23 events, 12 locations of wall thinning due to flow accelerated corrosion(FAC) were identified in the main feedwater system in 4 domestic WH 3-loop NPPs. Two types of the piping failure frequency such as the damage frequency and rupture frequency were considered in this study. The damage frequency was calculated from both the plant population data and damage(s) including crack, wall thinning, leak, and/or rupture, while the rupture frequency was estimated by using both the well-known Jeffreys method and a new method considering the degradation due to FAC. The results showed that the damage frequencies based on the number of the base metal piping susceptible to FAC ranged from $1.26{\times}10^{-3}/cr.yr\;to\;3.91{\times}10^{-3}/cr.yr$ for the main feedwater system of domestic WH 3-loop NPPs. The rupture frequencies obtained from the Jeffreys method for the main feedwater system were $1.01{\times}10^{-2}/cr.yr\;and\;4.54{\times}10^{-3}/cr.yr$ for the domestic WH 3-loop NPPs and all the other domestic PWR NPPs respectively, while those from the new method considering the degradation were higher than those from the Jeffreys method by about an order of one.

Development of leakage detection model in water distribution networks applying LSTM-based deep learning algorithm (LSTM 기반 딥러닝 알고리즘을 적용한 상수도시스템 누수인지 모델 개발)

  • Lee, Chan Wook;Yoo, Do Guen
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.8
    • /
    • pp.599-606
    • /
    • 2021
  • Water Distribution Networks, one of the social infrastructures buried underground, has the function of transporting and supplying purified water to customers. In recent years, as measurement capability is improved, a number of studies related to leak recognition and detection by applying a deep learning technique based on flow rate data have been conducted. In this study, a cognitive model for leak occurrence was developed using an LSTM-based deep learning algorithm that has not been applied to the waterworks field until now. The model was verified based on the assumed data, and it was found that all cases of leaks of 2% or more can be recognized. In the future, based on the proposed model, it is believed that more precise results can be derived in the prediction of flow data.

Analysis of the Password Leaking in Virtual Keyboard (가상키보드 비밀번호 유출 분석)

  • Yang, Hee-dong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.827-835
    • /
    • 2022
  • In order to use online financial services, user authentication technology is necessary. Password check through keyboard typing is the most common technique. However, since it became known that key stokes on the keyboard can be intercepted easily, many Internet banking services and easy payment services have adopted the virtual keyboard. However, contrary to the expectation that the virtual keyboard will be safe, there is a risk that key strokes on the virtual keyboard can be leaked. In this paper, we analyzed the possibility of password leaking on the virtual keyboard and presented a password leaking method using mouse event hooking and screen capture in PC operating system. In addition, we inspected the possibility of password leak attacks on several famous Korea Internet banking websites and simple payment services, and as a result, we verified that the password input method through the virtual keyboard in the PC operating system is not secure.

A study of the hazard of fire and explosion due to electric charge by Gas-Solids flow in pipeline

  • Chung Jae Hee;Seo Dae Won;Koo Ja Hyeuk;Kim Sung Jun;An Heau Seak;Kim Joon Ho;Hong Sung Kyung;YAMAGUMA Mizuki;KODAMA Tsutomu
    • Journal of the Korean Institute of Gas
    • /
    • v.4 no.3 s.11
    • /
    • pp.33-38
    • /
    • 2000
  • When fire and explosion accidents have occurred due to a leak of the flammable gas involving the LNG & LPG in an industrialized society, it is a very important problem. Accordingly, in this paper, we have compared and analyzed the occurrence transition and the electrostatic energy according to dust supplies and pressure variations for the electric charge due to the gas-solids of pipe flow. As the experimental results, if dust amounts and the initial pressure increased, electric charge in the pipe and the exit increased. The Specific charge of $Fe_2O_3$ increased proportionally if the initial pressure increased but if the quantity of dust increased, the specific charge decreased. Energy increased significantly as the dust amounts and the initial pressure increased. The possibility of fire and explosion exist in the measuring point(M 1) and the Faraday cage if natural gas and LPG were used.

  • PDF

Electrochemical Characteristics of EDLC with various Organic Electrolytes (유기전해질에 따른 EDLC의 전기화학적 특성)

  • Yang Chun-Mo;Lee J.K.;Cho W.I.;Cho B.W.;Rim Byung-O
    • Journal of the Korean Electrochemical Society
    • /
    • v.4 no.3
    • /
    • pp.113-117
    • /
    • 2001
  • Specific capacitance and charge-discharge rate of EDLC using activated carbon electrode were affected by the compositions of electrolytes, the conditions of charge-discharge and physical properties of activated carbon materials. The activated carbon electrode was prepared by dip coating method. Charge-discharge test and electrochemical experiments were carried out for various kinds of organic electrolytes. Effects of charge and discharge current density on the specific capacitance were studied. Characteristics of leakage current, self-discharge and time-voltage curves in optimum conditions of organic electrolytes were compared with conventional $1M-Et_4NBF_4/PC$ electrolyte. The EDLC using MSP-20(specific surface area: $2000m^2/g$) electrode and $1M-LiPF_6/PC-DEC(1:1)$ was exhibited th highest specific capacitance of 130F/g and low polarization resistances. The EDLC using MSP-20 electrode at $1M-LiPF_6/PC-DEC(1:1)$ was small leak current of 0.0004A for 15min, long voltage retention of 0.8V after 100h and linear time-voltage curves with small IR-drop.

Selection of Transition Point through Calculation of Cumulative Toxic Load -Focused on Incheon Area- (누적독성부하 산정을 통한 주민소산 전환시점 선정에 관한 연구 -인천지역을 중심으로-)

  • Lee, Eun Ji;Han, Man Hyeong;Chon, Young Woo;Lee, Ik Mo;Hwang, Yong Woo
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.6
    • /
    • pp.15-24
    • /
    • 2020
  • With the development of the chemical industry, the chemical accident is increasing every year, thereby increasing the risk of accidents caused by chemicals. The Ministry of Environment provides the criteria for determining shelter-in-place or outdoor evacuation by material, duration of accident, and distance from the toxic substance leak. However, it is hard to say that the criteria for determining the transition point are not clear. Transition point mean the time that evacuation method is switched from shelter-in-place to outdoor evacuation. So, the purpose of this study was to calculate appropriate transition point by comparing the cumulative toxic load. Namdong-gu in Incheon Metropolitan City was finally selected as the target area, considering the current status of the population of Incheon Metropolitan City in 2016 and the statistical survey of chemicals in 2016. The target materials were HCl, HF, and NH3. Modeling was simulated by ALOHA and performed assuming that the entire amount would be leaked for 10 min. Residents' evacuation scenarios were assumed to be shelter-in-place, immediate outdoor evacuation, and outdoor evacuation at an appropriate time after shelter-in-place. Based on the above method, the appropriate transition point from residents located in A(800 m away), B(1,200 m away), C(1,400 m away) and D(2,200 m away) was identified. In HCl, appropriate transition point was after 15 min, after 16 min, after 17 min, after 20 min in order by A, B, C and D. In HF, appropriate transition point was before 1 min or after 16 min, before 4 min or after 19 min, before 5 min or after 20 min, before 14 min or after 26 min in order by A, B, C and D. In NH3, appropriate transition point at A was before 4 min or after 16. Others are not in chemical cloud. This study confirmed the transition point to minimize the cumulative toxic load can be obtained by quantitative method. Through this, it might be possible to select evacuation method quantitatively that cumulative toxic load are minimal. In addition, if the shelter-in-place is maintained without transition to outdoor evacuation, the cumulative toxic load will increase more than outdoor evacuation. Therefore, it was confirmed that actions to reduce the concentration of chemicals in the room were necessary, such as conducting ventilation after the chemical cloud passed through the site.