• Title/Summary/Keyword: Data leak

Search Result 256, Processing Time 0.02 seconds

New Engineering Approach for Estimating Crack Opening Displacement of Complex Cracked Pipes (복합균열이 존재하는 배관의 균열개구변위 계산을 위한 새로운 공학적 계산식)

  • Kim, Yeong-Jin;Heo, Nam-Su;Kim, Yun-Jae
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.25 no.8
    • /
    • pp.1235-1241
    • /
    • 2001
  • An engineering estimation equation for the crack opening displacement(COD) is proposed for a complex cracked pipe, based on the reference stress approach. To define the reference stress, a simple plastic limit load analysis for the complex cracked pipe subjected to combined bending and tension is performed considering the crack closure effect in the compressive-stressed region. Comparison with ten published test data and the results from existing method shows that the present method not only reduces non-conservatism associated with the existing method, but also provides consistent and overall satisfactory results.

Study on Static Characteristics of Hybrid Spool Valve (하이브리드 스폴밸브의 정특성 연구)

  • Yun, So-Nam;Ham, Young-Bok;Kim, Dong-Su
    • Proceedings of the KSME Conference
    • /
    • 2001.06b
    • /
    • pp.121-126
    • /
    • 2001
  • In this study, the 4-way spool valve characteristics are clearly defined and proposed new type of spool valve. This paper presents governing equations of the flow through clearances between sleeve and spool as a model of orifice flow for null characteristic analysis, and programmed analysis software of it. This software is possible to basically analysis that not only which case of open center, closed center or critical center but +,- displacement of spool, lab position, boundary region and spool opening of the valve, and to estimate the pressure variation in the spool and external leak flow variation. We are convinced that the scale of load pressure difference is changed as lab condition of spool valve, and this scale is changed with boundary point on the annular clearance. It is vary useful to designer and user of spool valve with this design data and analysis software.

  • PDF

Design & Implementation of Enhanced Groupware Messenger

  • Park, HyungSoo;Kim, HoonKi;Na, WooJong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.81-88
    • /
    • 2018
  • In this paper, we present some problems with the Groupware Messenger functionality based on dot net 2.0 and implement a new design structure to solve them. They include memory leakage, slow processing, and client window memory crash. These problems resulted in the inconvenience of using instant messaging and the inefficient handling of office tasks. Therefore, in this paper, instant messaging functionality is implemented according to a new design architecture. The new system upgrades dot net 4.5 for clients and deploys the new features based on MQTT for the messenger server. We verify that the memory leak problem and client window memory crash issues have been eliminated on the system with the new messenger functionality. We measure the amount of time it takes to bind data to a set of messages and evaluate the performance, compared to a given system. Through this comparative evaluation, we can see that the new system is more reliable and performing.

A Study on the Measurement of Crack Length of Pipe Specimen Using Image Processing (이미지 프로세싱을 이용한 실배관 시험편의 균열 길이 측정에 관한 연구)

  • Kang, Min-Sung;Koo, Jae-Mean;Seok, Chang-Sung;Huh, Yong
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.2
    • /
    • pp.7-11
    • /
    • 2010
  • Difficulties associated with full-scale pipe tests are rather obvious. That is, it is not only difficult to perform them but also very expensive and it requires lots of experience. And the process of the fracture test for the pipe specimen is very difficult and complicated. Because the pipe specimen, the test jig and the test equipment are very large and heavy, it requires lots of costs and times. In this study, to easily perform the fracture toughness test for a pipe specimen, load line displacement data was obtained using the image processing method.

Theoretical study of cross sections of proton-induced reactions on cobalt

  • Yigit, Mustafa
    • Nuclear Engineering and Technology
    • /
    • v.50 no.3
    • /
    • pp.411-415
    • /
    • 2018
  • Nuclear fusion may be among the strongest sustainable ways to replace fossil fuels because it does not contribute to acid rain or global warming. In this context, activated cobalt materials in corrosion products for fusion energy are significant in determination of dose levels during maintenance after a coolant leak in a nuclear fusion reactor. Therefore, cross-section studies on cobalt material are very important for fusion reactor design. In this article, the excitation functions of some nuclear reaction channels induced by proton particles on $^{59}Co$ structural material were predicted using different models. The nuclear level densities were calculated using different choices of available level density models in ALICE/ASH code. Finally, the newly calculated cross sections for the investigated nuclear reactions are compared with the experimental values and TENDL data based on TALYS nuclear code.

An Effective Technique for Protecting Application Data using Security Enhanced (SE) Android in Rooted Android Phones (루팅된 안드로이드 폰에서 SEAndroid를 이용한 효과적인 앱 데이터 보호 기법)

  • Jeong, Youn-sik;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.352-362
    • /
    • 2017
  • This paper analyzes security threats in Security Enhanced (SE) Android and proposes a new technique to efficiently protect application data including private information on rooted Android phones. On an unrooted device, application data can be accessed by the application itself according to the access control models. However, on a rooted device, a root-privileged shell can disable part or all of the access control model enforcement procedures. Therefore, a root-privileged shell can directly access sensitive data of other applications, and a malicious application can leak the data of other applications outside the device. To address this problem, the proposed technique allows only some specific processes to access to the data of other applications including private information by modifying the existing SEAndroid Linux Security Module (LSM) Hook function. Also, a new domain type of process is added to the target system to enforce stronger security rules. In addition, the proposed technique separates the directory type of a newly installed application and the directory type of previously installed applications. Experimental results show that the proposed technique can effectively protect the data of each application and incur performance overhead up to or less than 2 seconds.

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

The Study on Evaluation of Human Body Injury by Explosion of Portable Butane Gas Range (부탄연소기 폭발로 인한 인체 상해 평가에 관한 연구)

  • Kim, Eui Soo;Shim, J.H.;Kim, J.P.;Park, N.K.
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.3
    • /
    • pp.60-67
    • /
    • 2016
  • The gas leak and explosion accident is able to give a fatal injury to nearby people from the explosion center and interest in effect of the explosion on the human body is increased. Accidents by Portable Butane Gas Range of a gas explosion accident occupy the most share. As a result, the injury on the human body frequently occur. However, It is situation that are experiencing difficulties in consequence analysis of explosion accidents owing to shortage of explosion power data and lack of research on the effect of the human body by the gas explosion. This paper acquire human injury data by performing the actual explosion experiment with Portable Butane Gas Range and evaluate power by explosion and effect of explosion on the human body to perform explosion simulation with LS-DYNA program. It is intended to contribute to the exact cause of the accident investigation and the same type of accident prevention.

Application of black box model for height prediction of the fractured zone in coal mining

  • Zhang, Shichuan;Li, Yangyang;Xu, Cuicui
    • Geomechanics and Engineering
    • /
    • v.13 no.6
    • /
    • pp.997-1010
    • /
    • 2017
  • The black box model is a relatively new option for nonlinear dynamic system identification. It can be used for prediction problems just based on analyzing the input and output data without considering the changes of the internal structure. In this paper, a black box model was presented to solve unconstrained overlying strata movement problems in coal mine production. Based on the black box theory, the overlying strata regional system was viewed as a "black box", and the black box model on overburden strata movement was established. Then, the rock mechanical properties and the mining thickness and mined-out section area were selected as the subject and object respectively, and the influences of coal mining on the overburden regional system were discussed. Finally, a corrected method for height prediction of the fractured zone was obtained. According to actual mine geological conditions, the measured geological data were introduced into the black box model of overlying strata movement for height calculation, and the fractured zone height was determined as 40.36 m, which was comparable to the actual height value (43.91 m) of the fractured zone detected by Double-block Leak Hunting in Drill. By comparing the calculation result and actual surface subsidence value, it can be concluded that the proposed model is adaptable for height prediction of the fractured zone.