• 제목/요약/키워드: leakage problems

Search Result 545, Processing Time 0.026 seconds

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

A Fabrication of the Micro Valve with Free Floating Structure (Free Floating 구조를 갖는 마이크로 밸브의 제작)

  • Son, Mi-Young;Mun, Byung-Phil;Jeon, Ho-Seung;Han, Jin-Woo;Kim, Chul-Ju
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.136-139
    • /
    • 2002
  • Previous valves have initial gap problem, high voltage or high pressure problem. In this paper, various micro valves with free floating structure have been fabricated and tested to solve the initial gap and high pressure problems. The paper presents how to etch Parylene-C which is a valve cap material without A1 mask layer. The maximum flow-rate of fabricated micro valve is$118{\mu\ell}$/min with $370{\mu}m$ orifice size and the leakage at the initial and reverse pressure is not observed.

  • PDF

Optimized Hybrid Modulation Strategy for AC Bypass Transformerless Single-Phase Photovoltaic Inverters

  • Deng, Shuhao;Sun, Yao;Yang, Jian;Zhu, Qi;Su, Mei
    • Journal of Power Electronics
    • /
    • v.16 no.6
    • /
    • pp.2129-2138
    • /
    • 2016
  • The full-bridge inverter, widely used for single-phase photovoltaic grid-connected applications, presents a leakage current issue. Therefore, an AC bypass branch is introduced to overcome this challenge. Nevertheless, existing modulation strategies entail drawbacks that should be addressed. One is the zero-crossing distortion (ZCD) of the AC current caused by neglecting the AC filter inductor voltage. Another is that the system cannot deliver reactive power because the AC bypass branch switches at the power frequency. To address these problems, this work proposes an optimized hybrid modulation strategy. To reduce ZCD, the phase angle of the inverter output voltage reference is shifted, thereby compensating for the neglected leading angle. To generate the reactive power, the interval of the negative power output is calculated using the power factor. In addition, the freewheeling switch is kept on when power is flowing into the grid and commutates at a high frequency when power is fed back to the DC side. In this manner, the dead-time insertion in the high-frequency switching area is minimized. Finally, the performances of the proposed modulation strategy and traditional strategies are compared on a universal prototype inverter. Experimental results validate the theoretical analysis.

누설전류가 작은 $1.3\mum$ GaInAsP/InP 평면매립형 레이저 다이오드

  • Lee, Jung-Gi;Cho, Ho-Sung;Park, Kyung-Hyun;Park, Chan-Yong;Lee, Yong-Tak
    • ETRI Journal
    • /
    • v.13 no.4
    • /
    • pp.2-9
    • /
    • 1991
  • Buried-heterostructure lasers are more difficult to fabricate than weakly index guided or gain guided lasers. However, these strongly index guided structures are most suitable for a source of lightwave transmission systems. But, for conventional etched mesa buried heterostructure lasers, the regrowth of InP blocking layer is difficult and irreproducible. So, there are inevitable leakage currents flowing outside the active region resulting poor performance. To eliminate these problems, we used a planar buried heterostructure. As a results, the average threshold current was 28mA and the differential quantum efficiency was about 20% per facet for $1.3\mum$ GaInAsP/InP PBH-LD. The initial forward leakage current was not exceeding $1\muA$ and the reverse voltage for $-10\muA$ was -3V~-5V, these are improved figure of 1mA~10mA and -1V~-3V for EMBH laser diode. The chip modulation bandwidth was more than 2.4GHz for $1.5I_th$.

  • PDF

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

A Study on Degradation Pattern of GIS Using Clustering Methode (군집화 기법을 이용한 GIS 열화 패턴 연구)

  • Lee, Deok Jin
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.31 no.4
    • /
    • pp.255-260
    • /
    • 2018
  • In recent years, increasing electricity use has led to considerable interest in green energy. In order to effectively supply, cut off, and operate an electric power system, many electric power facilities such as gas insulation switch (GIS), cable, and large substation facilities with higher densities are being developed to meet demand. However, because of the increased use of aging electric power facilities, safety problems are emerging. Electromagnetic wave and leakage current detection are mainly used as sensing methods to detect live-line partial discharges. Although electromagnetic sensors are excellent at providing an initial diagnosis and very reliable, it is difficult to precisely determine the fault point, while leakage current sensors require a connection to the ground line and are very vulnerable to line noise. The partial discharge characteristic in particular is accompanied by statistical irregularity, and it has been reported that proper statistical processing of data is very important. Therefore, in this paper, we present the results of analyzing ${\Phi}-q-n$ cluster distributions of partial discharge characteristics by using K-means clustering to develop an expert partial discharge diagnosis system generated in a GIS facility.

An Experimental Study on the Galling Characteristics of valve Seat Materials for Water Works (밸브시트 재료의 갤링 특성에 관한 실험적 연구)

  • 박성준;김영태;이상조
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.21 no.3
    • /
    • pp.100-108
    • /
    • 2004
  • Contamination of environment induces the shortage of drinkables. In this trend, the leakage of water that occurs by breakage or erosion of rubber valve seats is serious problem. Rubber is apt to cause breakage between two materials when they contact with each other. The possible way to avoid leakage of water by damage and breakdown of rubber is to replace that with metal. Because of this reason, nowadays, rubber is being substituted with metal as valve seat materials for water works. In tribology, a severe from of wear is characterized by local, macroscopic material transfer, removal, or formation of surface protrusions when two solid surfaces experience relative sliding under load. One of the major problems in sliding of metals is galling due to bad surface quality. Experimentally, there are various elements which influence on incipient galling, such as hardness, surface roughness, temperature, load, velocity and external environments. This paper is aimed at verifying the galling tendencies according to hardness, surface roughness, load and velocity and showing how much effect the factors have on the galling tendencies.

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

Incorporation of anisotropic scattering into the method of characteristics

  • Rahman, Anisur;Lee, Deokjung
    • Nuclear Engineering and Technology
    • /
    • v.54 no.9
    • /
    • pp.3478-3487
    • /
    • 2022
  • In this study, we incorporate an anisotropic scattering scheme involving spherical harmonics into the method of characteristics (MOC). The neutron transport solution in a light water reactor can be significantly improved because of the impact of an anisotropic scattering source with the MOC flat source approximation. Several problems are selected to verify the proposed scheme and investigate its effects and accuracy. The MOC anisotropic scattering source is based on the expansion of spherical harmonics with Legendre polynomial functions. The angular flux, scattering source, and cross section are expanded in terms of the surface spherical harmonics. Later, the polynomial is expanded to achieve the odd and even parity of the source components. Ultimately, the MOC angular and scalar fluxes are calculated from a combination of two sources. This paper presents various numerical examples that represent the hot and cold conditions of a reactor core with boron concentration, burnable absorbers, and control rod materials, with and without a reflector or baffle. Moreover, a small critical core problem is considered which involves significant neutron leakage at room temperature. We demonstrate that an anisotropic scattering source significantly improves solution accuracy for the small core high-leakage problem, as well as for practical large core analyses.

A STUDY ON THE SAFETY ANALYSIS OF ROCK FILL DAM (1) (필댐의 안정성 해석 연구 (1))

  • HoWoongShon;DaeKeunLee
    • Journal of the Korean Geophysical Society
    • /
    • v.6 no.3
    • /
    • pp.165-177
    • /
    • 2003
  • The purpose of this paper is to analyze the behavior and to study the safety evaluation of the Unmun Dam located in Cheongdo-Gun of GyeongBuk Province, Korea. For this purpose, soil analyses including boring data, geophysical surveys were conducted. In this paper, especially many geophysical methods were adopted to configure out the subsurface situation of dam. Applied geophysical methods were: 1) electric resistivity survey, 2) high frequency magnetotelluric (HFMT) survey, 3) ground penetrating radar (GPR) survey, 4) seismic refraction survey, 5) seismic cross-hole tomography survey, and 6) high frequency impedance (ZHF) survey. Each of geophysical surveys were analyzed and joint analyses between geophysical surveys were also performed to deduce the more reliable subsurface information of Dam by using the features and characteristics of each geophysical survey. Since many defects, such as gravel and weathered rock blocks in the dam core, and lots of amounts of leakage, by boring analyses were found, reinforcement by compaction grouting system (CGS) has been conducted in some range of dam. Some geophysical data and data of geotechnical gauges were also used to confirm the effects of reinforcement. Electric resistivity, EM, GPR, ZHF, seismic refraction and seismic tomography surveys show that left side of dam is weak, which means the possibility of existence of gravel, rock block, water and cavities in the core of dam. This result coincides with the boring data. Especially, electric survey after reinforcement shows that even the right side of the dam has been deformed by the strong pressure during the reinforcement itself. As a conclusion, some problems in the dam found. Especially, the dam near spillway shows the high possibility of leakage. It should be pointed out that only the left side of he dam has not a leakage problem. As a whole, the dam has problems of weakness, because of unsatisfactory construction. It is strongly recommended that highly intensive monitoring is required.

  • PDF