• Title/Summary/Keyword: leakage detection

Search Result 461, Processing Time 0.032 seconds

Deep Learning-based Object Detection of Panels Door Open in Underground Utility Tunnel (딥러닝 기반 지하공동구 제어반 문열림 인식)

  • Gyunghwan Kim;Jieun Kim;Woosug Jung
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.665-672
    • /
    • 2023
  • Purpose: Underground utility tunnel is facility that is jointly house infrastructure such as electricity, water and gas in city, causing condensation problems due to lack of airflow. This paper aims to prevent electricity leakage fires caused by condensation by detecting whether the control panel door in the underground utility tunnel is open using a deep learning model. Method: YOLO, a deep learning object recognition model, is trained to recognize the opening and closing of the control panel door using video data taken by a robot patrolling the underground utility tunnel. To improve the recognition rate, image augmentation is used. Result: Among the image enhancement techniques, we compared the performance of the YOLO model trained using mosaic with that of the YOLO model without mosaic, and found that the mosaic technique performed better. The mAP for all classes were 0.994, which is high evaluation result. Conclusion: It was able to detect the control panel even when there were lights off or other objects in the underground cavity. This allows you to effectively manage the underground utility tunnel and prevent disasters.

The Discrimination of Innocents Exposed to Crime Details using an Autobiographical Implicit Association Test (범죄 정보 인식에 따른 용의자 변별을 위한 aIAT 활용)

  • Kim, Kiho;Lee, Eun-Ji;Lee, Jang-Han
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.2
    • /
    • pp.173-190
    • /
    • 2020
  • The purpose of this study is to verify whether it is possible for participants to discriminate between innocent and guilty suspects when they are exposed to criminal information utilizing an autobiographical implicit association test (aIAT). A total of 49 college students were randomly assigned to guilty group, innocent-aware group, or innocent-unaware group. Participants performed an aIAT to detect suspects after performing either mock crime or control task. It was verified that innocent suspect and guilty suspect exposed with crime information could be distinguished through D-score and reaction time, converted to symbolize strength of the association between guilty sentences, innocent sentences, and truth sentences. As a result of the analysis, guilty group showed significantly higher D-score than both innocent-aware group and innocent-unaware group. guilty group also showed faster response time in true-guilty condition than true-innocent condition. This shows that the association of true-guilty conditions is stronger than that of true-innocent conditions. On the other hand, the innocent-aware group showed a faster response time in the true-innocent condition than the true-guilty condition, and innocent-unaware group showed no significant difference between the two conditions. Through this, it was confirmed that innocent suspects exposed to criminal information can be discriminated according to the aIAT pattern, which has a faster reaction rate to the truth and innocence union than the guilty group. This study confirmed that suspects exposed to criminal information can be effectively discriminated using aIAT, and further suggests the usefulness and potential of aIAT in the field of lie detection.

  • PDF

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

High Performance Flexible Inorganic Electronic Systems

  • Park, Gwi-Il;Lee, Geon-Jae
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.08a
    • /
    • pp.115-116
    • /
    • 2012
  • The demand for flexible electronic systems such as wearable computers, E-paper, and flexible displays has increased due to their advantages of excellent portability, conformal contact with curved surfaces, light weight, and human friendly interfaces over present rigid electronic systems. This seminar introduces three recent progresses that can extend the application of high performance flexible inorganic electronics. The first part of this seminar will introduce a RRAM with a one transistor-one memristor (1T-1M) arrays on flexible substrates. Flexible memory is an essential part of electronics for data processing, storage, and radio frequency (RF) communication and thus a key element to realize such flexible electronic systems. Although several emerging memory technologies, including resistive switching memory, have been proposed, the cell-to-cell interference issue has to be overcome for flexible and high performance nonvolatile memory applications. The cell-to-cell interference between neighbouring memory cells occurs due to leakage current paths through adjacent low resistance state cells and induces not only unnecessary power consumption but also a misreading problem, a fatal obstacle in memory operation. To fabricate a fully functional flexible memory and prevent these unwanted effects, we integrated high performance flexible single crystal silicon transistors with an amorphous titanium oxide (a-TiO2) based memristor to control the logic state of memory. The $8{\times}8$ NOR type 1T-1M RRAM demonstrated the first random access memory operation on flexible substrates by controlling each memory unit cell independently. The second part of the seminar will discuss the flexible GaN LED on LCP substrates for implantable biosensor. Inorganic III-V light emitting diodes (LEDs) have superior characteristics, such as long-term stability, high efficiency, and strong brightness compared to conventional incandescent lamps and OLED. However, due to the brittle property of bulk inorganic semiconductor materials, III-V LED limits its applications in the field of high performance flexible electronics. This seminar introduces the first flexible and implantable GaN LED on plastic substrates that is transferred from bulk GaN on Si substrates. The superb properties of the flexible GaN thin film in terms of its wide band gap and high efficiency enable the dramatic extension of not only consumer electronic applications but also the biosensing scale. The flexible white LEDs are demonstrated for the feasibility of using a white light source for future flexible BLU devices. Finally a water-resist and a biocompatible PTFE-coated flexible LED biosensor can detect PSA at a detection limit of 1 ng/mL. These results show that the nitride-based flexible LED can be used as the future flexible display technology and a type of implantable LED biosensor for a therapy tool. The final part of this seminar will introduce a highly efficient and printable BaTiO3 thin film nanogenerator on plastic substrates. Energy harvesting technologies converting external biomechanical energy sources (such as heart beat, blood flow, muscle stretching and animal movements) into electrical energy is recently a highly demanding issue in the materials science community. Herein, we describe procedure suitable for generating and printing a lead-free microstructured BaTiO3 thin film nanogenerator on plastic substrates to overcome limitations appeared in conventional flexible ferroelectric devices. Flexible BaTiO3 thin film nanogenerator was fabricated and the piezoelectric properties and mechanically stability of ferroelectric devices were characterized. From the results, we demonstrate the highly efficient and stable performance of BaTiO3 thin film nanogenerator.

  • PDF

A Study on the Performance and Exhaust Emissions Characteristics of LPG Engine using LPG Fuel with New Sulfur Free Odorant (새로운 비황분계 부취제 혼합 LPG 연료의 엔진성능과 배출가스 특성에 관한 연구)

  • Kim, Jae-Kon;Yim, Eui Soon;Min, Kyong-Il;Jung, Choong-Sub
    • Journal of Energy Engineering
    • /
    • v.23 no.3
    • /
    • pp.88-95
    • /
    • 2014
  • In general, odorants are added to fuel gases, such as LPG, LNG and city gas, to prevent gas poisoning, ignition, explosion, or other accident caused by fuel gases, and to enable immediate and easy detection of fuel-gas leakage by emitting an offensive smell. This study describes a study on the performance and exhaust emissions (CO, THC, $CO_2$, $NO_x$, $SO_2$) characteristics of liquefied petroleum gas (LPG) engine using LPG fuel with new sulfur free odorant (K-Petro S-Free). New sulfur free odorant (40 mg/kg) was added to 2 type LPG fuels for summer, and winter and it was used in performance and exhaust emissions, compare to LPG fuel with sulfur containing odorant (EM, ethyl mercaptan). Engine performance using LPG with sulfur free odorant was similar to LPG with sulfur-containing odorant. Exhaust emissions (CO, THC, $CO_2$, $NO_x$) of LPG with sulfur free odorant were also similar characteristics, compare with sulfur containing odorant. Especially, $SO_2$ emission using LPG with K-Petro S-Free odorant was more reduced 83 % than LPG with sulfur containing odorant(EM) at 2000 rpm.

Detection of anomalous features in an earthen dam using inversion of P-wave first-arrival times and surface-wave dispersion curves (P파 초동주시와 표면파 분산곡선 역산을 통한 흙댐의 이상대 탐지)

  • Kim, K.Y.;Jeon, K.M.;Hong, M.H.;Park, Young-Gyu
    • Geophysics and Geophysical Exploration
    • /
    • v.14 no.1
    • /
    • pp.42-49
    • /
    • 2011
  • To locate anomalous features including seepage pathways through the Daeryong earth-fill dam, P and Rayleigh waves were recorded along a 250-m profile on the crest of the dam. Seismic energy was generated using a 5-kg sledgehammer and detected by 24 4.5-Hz vertical-axis geophones installed at 3-m intervals. P-wave and apparent S-wave velocities of the reservoir dam and underlying bedrock were then inverted from first-arrival traveltimes and dispersion curves of Rayleigh waves, respectively. Apparent dynamic Poisson's ratios as high as 0.46 were obtained at the base of the dam near its north-east end, where an outlet conduit occurs, and in the clay core body near the south-west end of the profile where the dam was repeatedly grouted to abate seepage before our survey. These anomalies of higher Poisson's ratios in the upper part of clay core were also associated with effusion of grout on the downstream slope of the dam during post-survey grouting to abate leakage. Combining P-wave traveltime tomography and inversion of Rayleigh wave velocities was very effective in detecting potential pathways for seepage and previous grouted zones in this earthen dam.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

A Novel Method to Assess the Aerobic Gasoline Degradation by Indigenous Soil Microbial Community using Microbial Diversity Information (토양 미생물 다양성 지표를 이용한 토착 미생물 군집의 호기성 가솔린 오염분해능력 평가 기법 개발 연구)

  • Hwang, Seoyun;Lee, Nari;Kwon, Hyeji;Park, Joonhong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.36 no.5
    • /
    • pp.839-846
    • /
    • 2016
  • Since oil leakage is one of the most common nonpoint pollution sources that contaminate soil in Korea, the capacity of soil microbial community for degrading petroleum hydrocarbons should be considered to assess the functional value of soil resource. However, conventional methods (e.g., microcosm experiments) to assess the remediation capacity of soil microbial community are costly and time-consuming to cover large area. The present study suggests a new approach to assess the toluene remediation capacity of soil microbial community using a microbial diversity index, which is a simpler detection method than measuring degradation rate. The results showed that Shannon index of microbial community were correlated with specific degradation rate ($V_{max}$), a degradation factor. Subsequently, a correlation equation was generated and applied to Michaelis-Menten kinetics. These results will be useful to conveniently assess the remediation capacity of soil microbial community and can be widely applied to diverse engineering fields including environment-friendly construction engineering fields.

Noise Analysis and Measurement for a CW Bio-Radar System for Non-Contact Measurement of Heart and Respiration Rate (호흡 및 심박수 측정을 위한 비접촉 방식의 CW 바이오 레이더 시스템의 잡음 분석 및 측정)

  • Jang, Byung-Jun;Yook, Jong-Gwan;Na, Won;Lee, Moon-Que
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.9
    • /
    • pp.1010-1019
    • /
    • 2008
  • In this paper, we present a noise analysis and measurement results of a bio-radar system that can detect human heartbeat and respiration signals. The noise analysis including various phase noise effects is very important in designing the bio-radar system, since the frequency difference between the received signal and local oscillator is very small and the received power is very low. All of the noise components in a bio-radar system are considered from the point of view of SNR. From this analysis, it can be concluded that the phase noise due to antenna leakage is a dominant factor and is a function of range correlation. Therefore, the phase noise component with range correlation effect, which is the most important noise contribution, is measured using the measurement setup and compared with the calculated results. From the measurement results, our measurement setup can measure a closed-in phase noise of a free-running oscillator. Based on these results, it is possible to design a 2.4 GHz bio-radar system quantitatively which has a detection range of 50 cm and low power of 1 mW without additional PLL circuits.