• Title/Summary/Keyword: Data leak

Search Result 256, Processing Time 0.024 seconds

Source Tracking Models on Chemical Leaks for Emergency Response in Chemical Plants Based on Deep Learning of Big Data (화학공장 누출사고 대응을 위한 빅데이터-딥러닝 누출원 추적모델)

  • Kim, Hyunseung;Shin, Dongil
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.339-340
    • /
    • 2017
  • 화학공장의 누출사고는 초기에 적절히 대응하지 못할 경우 화재 폭발과 같은 2차 3차의 복합재난사고로 확산될 위험성이 매우 높다. 이러한 이유로 누출사고 발생 초기에 누출이 발생한 지점을 신속히 파악하여 현장안전요원에게 알림으로써, 보다 체계적이고 효율적인 초기대응을 가능하게 하여, 사고피해를 완화시킬 수 있는 통합적인 누출사고 대응시스템 구축은 매우 중요하다고 할 수 있다. 본 연구에서는, 통합적인 누출사고 대응시스템 구축을 위한 선행연구로, 딥러닝 기반의 누출원추적 모델 개발을 제안한다. 여수에 위치한 실제 화학공장을 대상으로 누출사고 시나리오에 대한 Computational Fluid Dynamics (CFD) 시뮬레이션을 진행한 뒤, 화학공장 경계면에 배치된 각 센서별 위치에서의 농도, 풍향 그리고 풍속데이터를 추출하고, 센서 좌표를 추가하여 인공신경망을 학습시켰다. 학습된 모델은 40개의 누출후보군에 대해 학습에 사용되지 않은 상황들에서도 75.43%의 정확도로 누출이 일어난 지점을 실시간 예측해냄을 확인하였다. 또한 누출지점 예측이 일치하지 않은 경우도, 예측된 지점이 실제 누출이 일어난 지점과 물리적으로 매우 인접함을 확인함으로써 제안된 모델을 실제 현장에 적용할시 기대되는 효과는 더 클 것으로 판단하였다.

  • PDF

A Study on Convergence Security of National Infrastructure (국가 인프라 시설의 융합보안 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.341-342
    • /
    • 2017
  • Control and development systems such as air traffic control systems, road traffic systems, and Korea Hydro &Nuclear Power are the infrastructure facilities of the country, and if the malicious hacking attacks proceed, the damage is beyond imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social problems. In this study, we analyze the environment of the development control system and analyze the status of the convergence security research, which is a recent issue, and propose a strategy system for stabilizing various power generation control systems and propose countermeasures. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control.

  • PDF

A Study on Null Characteristics of 4-way Spool Valve (4방향 스풀밸브의 중립특성에 관한 연구)

  • Ham, Young-Bog;Yun, So-Nam;Lee, Geun-Ho;Kim, Sung-Dong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.8
    • /
    • pp.165-171
    • /
    • 2000
  • In this study the 4-way spool valve characteristics are clearly defined and clearly defined and proposed new type of spool valve. This paper presents governing equations of the flow through clearances between sleeve and spool as a model of orifice flow for null characteristics analysis and programmed analysis software of it. This software is possible to basically analysis that not only which case of open center closed center or critical center but _ -displacement of spool lab position boundary region and spool opening of the valve and to estimate the pressure variation in the spool and external leak flow variation. We are convinced that the scale of load pressure difference is changed as lab condition of valve and this scale is changed with boundary point on the annular clearance. It is vary useful to designer and user of spool valve with this design data and analysis software.

  • PDF

Chiari Type III : Experience of Outcome for 15 Cases

  • Gabr, Mohamed;Elmataeshy, Mahmoud;Abdullah, Ahmed A.
    • Journal of Korean Neurosurgical Society
    • /
    • v.65 no.6
    • /
    • pp.841-845
    • /
    • 2022
  • Objective : Chiari III malformations are extremely rare hindbrain malformations that are associated with a high early mortality rate, or severe neurologic deficits in the survivors. The treatment is early operative closure and cerebrospinal fluid diversion (CSF) shunting. Methods : We operated on 15 patients by repair and excision between July 2014 till June 2020 and retrospective data collection was done. Only one patient doesn't need ventriculoperitoneal (VP) shunt and the other 14 patients need a VP shunt. We described stepwise dissection and untethering of the cerebellum from the bony edge to regrowth and herniation of cerebellum again into this potential space and simple dural closure or repair with graft was done. Results : We started with VP in eight patients (53%) and the other seven patients (46.7%) started with excision and then six patients need VP shunt later on because four patients developed CSF leak and two patients developed increased high intracranial tension. Only four patients (26.7%) needed a blood transfusion. Conclusion : There are variations in the outcome and not all cases of Chiari malformation III will die and severe developmental delay is not a must. Proper management and repair carry a good prognosis.

A Study on Integrated Control and Safety Management Systems for LNG Membrane Storage Tank (멤브레인식 LNG 저장탱크용 통합제어안전관리시스템에 대한 연구)

  • Kim, Chung-Kyun
    • Journal of the Korean Institute of Gas
    • /
    • v.14 no.2
    • /
    • pp.40-46
    • /
    • 2010
  • In this study, the integrated control and safety management system for a super-large LNG membrane storage tank has been presented based on the investigation and analysis of measuring equipments and safety analysis system for a conventional LNG membrane storage tank. The integrated control and safety management system, which may increase a safety and efficiency of a super-large LNG membrane storage tank, added additional pressure gauges and new displacement/force sensors at the steel anchor between an inner tank and a prestressed concrete structure. The displacement and force sensors may provide clues of a membrane panel failure and a LNG leakage from the inner tank. The conventional leak sensor may not provide proper information on the membrane panel fracture even though LNG is leaked until the leak detector, which is placed at the insulation area behind an inner tank, send a warning signal. Thus, the new integrated control and safety management system is to collect and analyze the temperature, pressure, displacement, force and LNG density, which are related to the tank system safety and leakage control from the inner tank. The digital data are also measured from measurement systems such as displacement and force of a membrane panel safety, LNG level and density, cool-down process, leakage, and pressure controls.

Induction of the High Order Calibration Equation of Metal Oxide Semiconductor Gas Sensors (산화물 반도체식 가스센서의 입출력 고차 캘리브레이션 방정식 도출)

  • Park, Gyoutae;Kim, Kangmin;Lee, Hyeonggi;Yoon, Myeongsub
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.2
    • /
    • pp.44-49
    • /
    • 2020
  • In this paper, a measuring circuit is designed through analyzing manufacture specification of the sensor based on MOS. And the best input-output polynomial are induced that really gas sensors are used in gas safety management industrial fields. Response characteristics of a MOS gas sensor is analysed by through sensor's output voltages are measured after standard gases with six kinds of concentrations are manufactured and are injected to the sensor. A lookup table is created by relations of sensor's output voltages by injecting gases with other concentrations. Because data of the formed lookup table are equal interval, a polynomial can be induced of method of approximation function. So the 5th polynomial of input-output for a sensor is defined, coefficients are calculated by using least squares method, and the 5th polynomial is completed for representing characteristics of the sensor. If the proposed polynomial is applied to gas leak detectors, an inverse transformation of polynomial and programing of array codes are recreated. In this research, polynomial is implemented with array types that intervals of values of a lookup table are one-fifth sampled and interpolated. The performance of proposed 5th calibration equation is verified that errors are reduced than a linear expression when tests are performed by measurement of concentrations against injection of standard gases.

Cluster exploration of water pipe leak and complaints surveillance using a spatio-temporal statistical analysis (스캔통계량 분석을 통한 상수도 누수 및 수질 민원 발생 클러스터 탐색)

  • Juwon Lee;Eunju Kim;Sookhyun Nam;Tae-Mun Hwang
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.37 no.5
    • /
    • pp.261-269
    • /
    • 2023
  • In light of recent social concerns related to issues such as water supply pipe deterioration leading to problems like leaks and degraded water quality, the significance of maintenance efforts to enhance water source quality and ensure a stable water supply has grown substantially. In this study, scan statistic was applied to analyze water quality complaints and water leakage accidents from 2015 to 2021 to present a reasonable method to identify areas requiring improvement in water management. SaTScan, a spatio-temporal statistical analysis program, and ArcGIS were used for spatial information analysis, and clusters with high relative risk (RR) were determined using the maximum log-likelihood ratio, relative risk, and Monte Carlo hypothesis test for I city, the target area. Specifically, in the case of water quality complaints, the analysis results were compared by distinguishing cases occurring before and after the onset of "red water." The period between 2015 and 2019 revealed that preceding the occurrence of red water, the leak cluster at location L2 posed a significantly higher risk (RR: 2.45) than other regions. As for water quality complaints, cluster C2 exhibited a notably elevated RR (RR: 2.21) and appeared concentrated in areas D and S, respectively. On the other hand, post-red water incidents of water quality complaints were predominantly concentrated in area S. The analysis found that the locations of complaint clusters were similar to those of red water incidents. Of these, cluster C7 exhibited a substantial RR of 4.58, signifying more than a twofold increase compared to pre-incident levels. A kernel density map analysis was performed using GIS to identify priority areas for waterworks management based on the central location of clusters and complaint cluster RR data.

On Study of Runoff Analysis Using Satellite Information (위성자료를 이용한 유출해석에 관한 연구)

  • Kang, Dong Ho;Jeung, Se Jin;Kim, Byung Sik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.2
    • /
    • pp.13-23
    • /
    • 2021
  • This study intended to assess the reliability of topographic data using satellite imaging data. The topographical data using actual instrumentation data and satellite image data were established and applied to the rainfall-leak model, S-RAT, and the topographical data and outflow data were compared and analyzed. The actual measurement data were collected from the Water Resources Management Information System (WAMIS), and satellite image data were collected from MODIS observation sensors mounted on Terra satellites. The areas subject to analysis were selected for two rivers with more than 80% mountainous areas in the Han River basin and one river basin with more than 7% urban areas. According to the analysis, the difference between instrumentation data and satellite image data was up to 50% for peak floods and up to 17% for flood totals in rivers with high mountains, but up to 13% for peak floods and up to 4% for flood totals. The biggest difference in the video data is Landuse, which shows that MODIS satellite images tend to be recognized as cities up to 60% or more in urban streams compared to WAMIS instrumentation data, but MODIS satellite images are found to be less than 5% error in forest areas.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

kNN Query Processing Algorithm based on the Encrypted Index for Hiding Data Access Patterns (데이터 접근 패턴 은닉을 지원하는 암호화 인덱스 기반 kNN 질의처리 알고리즘)

  • Kim, Hyeong-Il;Kim, Hyeong-Jin;Shin, Youngsung;Chang, Jae-woo
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1437-1457
    • /
    • 2016
  • In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query type which is widely used in many fields and the result of the kNN query is closely related to the interest and preference of the user. Therefore, studies on secure kNN query processing algorithms that preserve both the data privacy and the query privacy have been proposed. However, existing algorithms either suffer from high computation cost or leak data access patterns because retrieved index nodes and query results are disclosed. To solve these problems, in this paper we propose a new kNN query processing algorithm on the encrypted database. Our algorithm preserves both data privacy and query privacy. It also hides data access patterns while supporting efficient query processing. To achieve this, we devise an encrypted index search scheme which can perform data filtering without revealing data access patterns. Through the performance analysis, we verify that our proposed algorithm shows better performance than the existing algorithms in terms of query processing times.