• Title/Summary/Keyword: leakage ability

Search Result 139, Processing Time 0.026 seconds

A Study of Self-Sealing Rubber Material Using Foamed Natural Rubber (NR 발포를 사용한 자기 밀폐형 고무 재료의 연구)

  • Kim, Do-Hyun;Kim, Hyun-Mook;Lee, Chang-Seop;Ahn, Won-Sool;Kim, Joon-Hyung
    • Elastomers and Composites
    • /
    • v.41 no.2
    • /
    • pp.88-96
    • /
    • 2006
  • The self-sealing rubber material for a fuel cell which has self-sealing ability, in case of fuel leakage, was studied. Cure characteristics, density, swelling, and surface morphology of foamed natural rubber were investigated with carbon black and with processing oil within the range of $10{\sim}30phr$. The rheological properties indicated that the value of $ts_2$ and the value of $Tc_{90}$ were increased with increasing a content of processing oil, while carbon black did not show a similar trend. A difference in density by foaming was decreased to one fifth scale compared to the initial value. According to the swelling test of foamed natural rubber in fuel C, isooctane and toluene, all the self-sealing action was finished in two minutes. From the SEM image for the surface of rubber compounding, a foaming by sodium bicarbonate was found to be unequal and consecutive foaming cell.

Design and Verification of the Integrated Log Analysis System for Enterprise Information Security (기업정보 유출 방지를 위한 통합 로그분석 시스템 설계 및 검증)

  • Lee, Jae-Yong;Kang, Soo-Yong
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.491-498
    • /
    • 2008
  • The leakage of sensitive information by an insider within the organization becomes a serious threat nowadays. Sometimes, these insider threats are more harmful to an organization than external attack. Companies cannot afford to continue ignoring the potential of insider attacks. The purpose of this study is to design an integrated log analysis system that can detect various types of information leakages. The system uses threat rules generated through risk analysis, and monitors every aspect of the online activities of authorized insider. Not only should system have the ability to identify abnormal behavior, they should also be able to predict and even help to prevent potential risk. The system is composed of three modules, which are log collector, log analyzer and report generator.

  • PDF

Implementation of Home Security System using a Mobile App (모바일 앱을 이용한 홈 시큐리티 시스템 구현)

  • Kwon, Young-Il;Jeong, Sam-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.91-96
    • /
    • 2017
  • In this paper, we aim to respond efficiently to crime by using Arduino and smartphone apps in response to increasing number of house-breaking crimes. It receives the signal of the sensor installed in the house and connects it with the app of the smartphone. To use the app, you can download the app from the user's smartphone, launch the app, and operate the operation outside the home, not only inside the house, by linking the executed app. Among the sensors installed in the house, the movement detection sensor is used to enhance the security, and the gas leakage sensor and the flame detection sensor can be used to easily detect the risk of fire and to prevent the fire early. Security is further enhanced by the ability to remotely control the front door with a smartphone. After that, various sensors can be added and it can be developed as a WiFi module in addition to the Bluetooth module.

The Effectiveness of Information Protection and Improvement Plan Based on SMEs Consulting Case

  • Kim, Jae-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.201-208
    • /
    • 2019
  • In the phono-sapiens era of the intelligence information society, most business activities are increasingly dependent on networks and information systems. SMEs, which occupy the majority of Korean companies, are increasingly possessing the value and technology of their information assets, and their ability to protect core technologies that are the driving force of corporate growth will be the most important competitiveness of enterprises. Accordingly, the Ministry of Science and ICT and the Korea Internet & Security Agency(KISA) provides a foundation for minimizing the damage from cyber threats such as hacking and information leakage by evaluating the current information protection level of SMEs and enhancing information protection capability by supporting a high level of customized information protection consulting. In this study, we analyze the effectiveness of information protection based on the results of KISA SMEs consulting. In addition, by identifying problems and limitations derived from SMEs information protection consulting results, SMEs should propose measures to improve information security of SMEs that can manage information protection management system more efficiently and effectively.

Combination of Brain Cancer with Hybrid K-NN Algorithm using Statistical of Cerebrospinal Fluid (CSF) Surgery

  • Saeed, Soobia;Abdullah, Afnizanfaizal;Jhanjhi, NZ
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.120-130
    • /
    • 2021
  • The spinal cord or CSF surgery is a very complex process. It requires continuous pre and post-surgery evaluation to have a better ability to diagnose the disease. To detect automatically the suspected areas of tumors and symptoms of CSF leakage during the development of the tumor inside of the brain. We propose a new method based on using computer software that generates statistical results through data gathered during surgeries and operations. We performed statistical computation and data collection through the Google Source for the UK National Cancer Database. The purpose of this study is to address the above problems related to the accuracy of missing hybrid KNN values and finding the distance of tumor in terms of brain cancer or CSF images. This research aims to create a framework that can classify the damaged area of cancer or tumors using high-dimensional image segmentation and Laplace transformation method. A high-dimensional image segmentation method is implemented by software modelling techniques with measures the width, percentage, and size of cells within the brain, as well as enhance the efficiency of the hybrid KNN algorithm and Laplace transformation make it deal the non-zero values in terms of missing values form with the using of Frobenius Matrix for deal the space into non-zero values. Our proposed algorithm takes the longest values of KNN (K = 1-100), which is successfully demonstrated in a 4-dimensional modulation method that monitors the lighting field that can be used in the field of light emission. Conclusion: This approach dramatically improves the efficiency of hybrid KNN method and the detection of tumor region using 4-D segmentation method. The simulation results verified the performance of the proposed method is improved by 92% sensitivity of 60% specificity and 70.50% accuracy respectively.

Role of Trehalose Synthesis in Ralstonia syzygii subsp. indonesiensis PW1001 in Inducing Hypersensitive Response on Eggplant (Solanum melongena cv. Senryo-nigou)

  • Laili, Nur;Mukaihara, Takafumi;Matsui, Hidenori;Yamamoto, Mikihiro;Noutoshi, Yoshiteru;Toyoda, Kazuhiro;Ichinose, Yuki
    • The Plant Pathology Journal
    • /
    • v.37 no.6
    • /
    • pp.566-579
    • /
    • 2021
  • Ralstonia syzygii subsp. indonesiensis (Rsi, former name: Ralstonia solanacearum phylotype IV) PW1001, a causal agent of potato wilt disease, induces hypersensitive response (HR) on its non-host eggplant (Solanum melongena cv. Senryo-nigou). The disaccharide trehalose is involved in abiotic and biotic stress tolerance in many organisms. We found that trehalose is required for eliciting HR on eggplant by plant pathogen Rsi PW1001. In R. solanacearum, it is known that the OtsA/OtsB pathway is the dominant trehalose synthesis pathway, and otsA and otsB encode trehalose-6-phosphate (T6P) synthase and T6P phosphatase, respectively. We generated otsA and otsB mutant strains and found that these mutant strains reduced the bacterial trehalose concentration and HR induction on eggplant leaves compared to wild-type. Trehalose functions intracellularly in Rsi PW1001 because addition of exogenous trehalose did not affect the HR level and ion leakage. Requirement of trehalose in HR induction is not common in R. solanacearum species complex because mutation of otsA in Ralstonia pseudosolanacearum (former name: Ralstonia solanacearum phylotype I) RS1002 did not affect HR on the leaves of its non-host tobacco and wild eggplant Solanum torvum. Further, we also found that each otsA and otsB mutant had reduced ability to grow in a medium containing NaCl and sucrose, indicating that trehalose also has an important role in osmotic stress tolerance.

Analysis of Ventilation Performance of PCVD Facility for Solar Cell Manufacturing (Explosion Prevention Aspect) (태양전지 제조용 PCVD설비의 환기 성능 분석(폭발 방지 측면))

  • Lee, Seoung-Sam;An, Hyeong-hwan
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.5
    • /
    • pp.35-40
    • /
    • 2022
  • PCVD (Plasma Chemical Vapor Deposition), a solar cell manufacturing facility, is a facility that deposits plasma generated in a chamber (NH3, SIH4, O2 on a wafer. In the PCVD facility, gas movement and injection is performed in the gas cabinet, and there are many leak points inside because MFC, regulator, valve, pipe, etc. are intricately connected. In order to prevent explosion in case of leakage of NH3 with an upper explosive limit (UEL) of 33.6% and a lower explosive limit (LEL) of 15%, the dilution capacity must be capable of allowing the concentration of NH3 to be out of the explosive range. This study was analyzed using the CFD analysis technique, which can confirm the dilution ability in 3D and numerical values when NH3 gas leaks from the existing PCVD gas cabinet. As a result, it was concluded that it corresponds to medium dilution and that testicular ventilation is possible through facility improvement.

De-Identified Face Image Generation within Face Verification for Privacy Protection (프라이버시 보호를 위한 얼굴 인증이 가능한 비식별화 얼굴 이미지 생성 연구)

  • Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.201-210
    • /
    • 2023
  • Deep learning-based face verificattion model show high performance and are used in many fields, but there is a possibility the user's face image may be leaked in the process of inputting the face image to the model. Althoughde-identification technology exists as a method for minimizing the exposure of face features, there is a problemin that verification performance decreases when the existing technology is applied. In this paper, after combining the face features of other person, a de-identified face image is created through StyleGAN. In addition, we propose a method of optimizingthe combining ratio of features according to the face verification model using HopSkipJumpAttack. We visualize the images generated by the proposed method to check the de-identification performance, and evaluate the ability to maintain the performance of the face verification model through experiments. That is, face verification can be performed using the de-identified image generated through the proposed method, and leakage of face personal information can be prevented.

Interface between calcium silicate cement and adhesive systems according to adhesive families and cement maturation

  • Nelly Pradelle-Plasse;Caroline Mocquot;Katherine Semennikova;Pierre Colon;Brigitte Grosgogeat
    • Restorative Dentistry and Endodontics
    • /
    • v.46 no.1
    • /
    • pp.3.1-3.14
    • /
    • 2021
  • Objectives: This study aimed to evaluate the interface between a calcium silicate cement (CSC), Biodentine and dental adhesives in terms of sealing ability. Materials and Methods: Microleakage test: 160 standardized class II cavities were prepared on 80 extracted human molars. The cavities were filled with Biodentine and then divided into 2 experimental groups according to the time of restoration: composite resin obturation 15 minutes after Biodentine handling (D0); restoration after 7 days (D7). Each group was then divided into 8 subgroups (n = 5) according to the adhesive system used: etch-and-rinse adhesive (Prime & Bond); self-etch adhesive 2 steps (Optibond XTR and Clearfil SE Bond); self-etch adhesive 1 step (Xeno III, G-aenial Bond, and Clearfil Tri-S Bond); and universal used as etch-and-rinse or self-etch (ScotchBond Universal ER or SE). After thermocycling, the teeth were immersed in a silver nitrate solution, stained, longitudinally sectioned, and the Biodentine/adhesive percolation was quantified. Scanning electron microscopic observations: Biodentine/adhesive interfaces were observed. Results: A tendency towards less microleakage was observed when Biodentine was etched (2.47%) and when restorations were done without delay (D0: 4.31%, D7: 6.78%), but this was not significant. The adhesives containing 10-methacryloyloxydecyl dihydrogen phosphate monomer showed the most stable results at both times studied. All Biodentine/adhesive interfaces were homogeneous and regular. Conclusions: The good sealing of the CSC/adhesive interface is not a function of the system adhesive family used or the cement maturation before restoration. Biodentine can be used as a dentine substitute.

A Study on Private Investigator's Role against Digital Related Social Problems (디지털 관련 사회문제와 탐정의 역할)

  • Hur Myung Bum;Kim Kwon Ho;Yeom Keon Ryeong
    • Industry Promotion Research
    • /
    • v.8 no.4
    • /
    • pp.177-186
    • /
    • 2023
  • Modern society is operated based on the internet, wireless networks, and digital devices to the extent that it is called a digital society. In particular, as most of financial transactions, information movement, and commercial activities are based online, various social problems and side effects related to this are increasing rapidly. Representative examples include industrial espionage activities and leakage of industrial technology, and social problems such as illegal goods trade such as drugs using online and online gambling are increasing to a serious level. These digital-based social problems cannot be solved only by the activities and capabilities of judicial institutions such as police and prosecutors. Now that the private investigation market is open, active intervention using them is necessary. To this end, it is necessary to actively cultivate private investigator's ability to investigate and collect evidence in relation to digital social and criminal problems. In addition, each private investigation education institution or association should actively invest and research this.