• Title/Summary/Keyword: Data leak

Search Result 256, Processing Time 0.023 seconds

Estimate Minimum Amount of Methane for Explosion in a Confined Space (밀폐공간에서 메탄 폭발사고의 최소 가스누출량 예측)

  • Jo, Young-Do
    • Journal of the Korean Institute of Gas
    • /
    • v.21 no.4
    • /
    • pp.1-5
    • /
    • 2017
  • Leaking of natural gas, which is mostly methane, in a confined living space creates flammable atmosphere and gives rise to explosion accident. The minimum amount of leaked methane for explosion is highly dependent on the degree of mixing in the confined space. This paper proposes a method for estimating minimum amount of flammable gas for explosion by using Gaussian distribution explosion model(GDEM) and experimental explosion data. The explosion pressure in the confined space can be estimated by assuming the Gaussian distribution of flammable gas along the height of an enclosure and estimating the maximum amount of gas within flammable limits, combustion of the estimated gas with constant volume and adiabatic or isothermal mixing in the confined space. The predicted minimum gas amount for an explosion is tied to explosion pressure that results in a given building damage level. The result shows that very small amount of methane leaking in the confined space may results in a serious gas explosion accident. This result could be applied not only to setting the leak criteria for developing a gas safety appliance but also to accident investigating of explosion.

Defining Area of Damage of 2012 Hydrofluoric Acid Spill Accident in Gumi, Korea (구미 불산 누출사고로 인한 주변지역 환경영향권 설정에 관한 연구)

  • Koh, Dohyun;Kim, Jeongsoo;Choi, Kyungho
    • Journal of Environmental Health Sciences
    • /
    • v.40 no.1
    • /
    • pp.27-37
    • /
    • 2014
  • Objectives: On September 27, 2012, leakage of anhydrous hydrofluoric acid occurred in a chemical plant in the Gumi National Industrial Complex. Following the accident, local factory workers and residents complained of abnormal health conditions. In addition, visual discolorations were widely observed in crops and trees in surrounding areas. The main objectives of the present study were to identify the area that was affected by the spill using data obtained from plants, soil, and water samples after the accident. Methods: Fluoride concentrations were analyzed in pine tree needles, soil, nearby streams, ponds and reservoirs collected from an area within a radius of three kilometers from the plant where the leak occurred. Fluoride concentrations in the air at the time of leakage were then estimated from fluoride concentrations that were measured in the pine tree needles. A Kriged map was developed to describe the spatial distribution of hydrofluoric acid at the time of the leakage and was compared with the area designated as a Special Disaster Zone by the government. Results: The Special Disaster Zone did not include all the affected area that was estimated by the Kriged map. Analytical results of the environmental samples also supported this discrepancy. Conclusion: Using plants, atmospheric concentrations of fluoride at the time of the leakage could be estimated. For the area that was identified as affected, further public health risk assessment and environmental risk assessment should be considered. Also, in the absence of air monitoring at the time of leakage, studies employing plants may be conducted in order to better understand the spatial extent and severity of the contamination.

Study on Flowmeter Proving Errors of a Small Volume Prover (소형 푸루버의 유량계 검증 오차 연구)

  • 백종승;임기원;최용문
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.14 no.1
    • /
    • pp.259-266
    • /
    • 1990
  • Leaks at the piston seal and the by-pass port of a small volume prover have relatively large influence on the proving accuracy in comparison with a conventional ball prover. The pulse interpolator, which is to increase the discrimination, is affected by the characteristic of the flowmeter signal. In this study, a small volume prover of the double cylinder type was designed in order to study the pulse interpolation error as well as the leak error. The basic volume of the prover determined by a water draw method was about 9.68L. Experimental results revealed that interpolation data attained by the repeated piston pass for turbine meters at a fixed flowrate may be treated effectively by applying a statistical method. It was possible to limit the pulse interpolation error less than .+-. 0.02% at the 95% confidence level. However, in the case of the bulk meter, if failed to achieve the required repeatability level because of the pulse characteristics. The basic volume change appeared to be independent of the piston velocity within the .+-. 0.05% of tolerance.

Investigating Change of Users' Perception of Privacy Pre- and Post-Education on Library User Privacy (도서관이용자프라이버시에 대한 교육전후의 이용자인식변화 분석 연구)

  • Noh, Younghee;Kim, Tae-Kyung;Kim, Dong-Seok
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.1
    • /
    • pp.63-84
    • /
    • 2015
  • Library users must provide their personal information to libraries. This study surveyed these library users' perception of privacy and the effect of the education after providing library user privacy education. As a result, first, it was found that after education, users were more interested in their privacy, rated the problem of library user privacy as more severe, and rated library user data collection as more likely to be considered privacy invasion. Second, we investigated users' perception of how much user service records being collected in libraries violate users' privacy, which showed a great perception change in 25 questions after the education. Third, in the survey about library and librarians' efforts for protecting library user privacy, it was found that all 15 questions were rated as significantly more important after education. Fourth, library users have recognized that is necessary to process and handle the library record and are more sympathetic to the need for this procedure. Fifth, library users felt the possibility of a library record leak was a very serious threat.

Characteristics and Nursing Activities of Severe Trauma Patients Regarding the Main Damaged Body Parts (중증외상환자의 주 손상 부위별 특성과 간호활동)

  • Kim, Myung Hee;Kim, Myung Hee;Park, Jung Ha
    • Journal of Korean Biological Nursing Science
    • /
    • v.15 no.4
    • /
    • pp.210-218
    • /
    • 2013
  • Purpose: The purpose of this study was to identify the characteristics and nursing activities of severe trauma patients regarding damaged body parts in Busan Regional Emergency Medical Center. Methods: A survey using a 'trauma patient information questionnaire and a list of nurse activities' was conducted with 133 patients over 15 points ISS on EMR from June 1, 2011 to May 31, 2012. The collected data were analyzed by the SPSS/WIN 12.0 program. Results: Almost all of the subjects were men, and the mean age was 48.8. The amount of road traffic accidents was 60.4%, and the mean RTS and ISS were 6.08, and 23.14 points. Nursing activities in common were airway management, assessment of LOC & GCS, and EKG monitoring. Most of head and neck trauma patients were cared for manasing using intracranial pressure: each patience had the following assessed: pupil size and light reflex, they were checked the leak of CSF, kept $30^{\circ}$ head elevation, and administered medications. Some of chest trauma patients were treated for chest tube and central venous catheter insertion. Partial abdominal trauma patients were administered analgesic and cared for using arterial pressure measurement. Part of the limbs and pelvis trauma patients were given a blood transfusion. Conclusion: Based on the results, the characteristics and nursing activities were specific according to the specific damaged body parts.

Efficient Group Management Mechanism and Architecture for Secure Multicast (안전한 멀티캐스트 서비스 제공을 위한 효율적인 그룹 관리 메커니즘 및 구조)

  • Eun, Sang-A;Jo, Tae-Nam;Chae, Gi-Jun;Lee, Sang-Ho;Park, Won-Ju;Na, Jae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.323-330
    • /
    • 2002
  • Multicast services are gradually diversified and used widely. Proportionately, they become the center of attackers' attention and there are growing possibilities of an intelligence leak. Therefore, research related to secure multicast should be required to provide multicast service efficiently. This paper presents the architecture for secure multicast which provides efficient group management mechanism in group consists using member's dynamic join and leave. This architecture can provide secure multicast services to many users with regard to security aspects in one-to-many communication. The simulation results show that the proposed architecture achieves an efficient group management and a secure data transmission with low latency compared with the other existing secure multicast architecture.

A Study on the 43$0^{\circ}C$ Degradation Behavior of Cast Stainless Steel(CF8M) (III) - Evaluation of Elastic-Plastic Fracture Toughness - (주조 스테인리스강 CF8M의 43$0^{\circ}C$ 열화거동에 관한 연구 (III) - 탄소성 파괴인성 평가 -)

  • Gwon, Jae-Do;In, Jae-Hyeon;Park, Jung-Cheol;Choe, Seong-Jong;Park, Yun-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.10 s.181
    • /
    • pp.2405-2412
    • /
    • 2000
  • A cast stainless steel may experience an embrittlement when it is exposed to approximately 30$0^{\circ}C$ for long period. In the present investigation, The three classes of the thermally aged CF8M specimie n are prepared using an artificially accelerated aging method. Namely, after the specimen are held for 300, 1800 and 3600hrs. at 43$0^{\circ}C$ respectively, the specimens are quenched in water to room temperature. Load versus load line displacement curves and J-R curves are obtained using the unloading compliance method. $J_{IC}$ values are obtained following ASTM E 813-87 and ASTM E 813-81 methods. In addition to these methods, JIC values are obtained using SZW(stretch zone width) method described in JSME S 001-1981. The results of the unloading compliance method are $J_Q$=485.7 kJ/m$^2$ for virgin material, $J_{IC}$ of the degraded materials associated with 300, 1800 and 3600hrs are obtained 369.25 kJ/m$^2$, 311.02 kJ/m$^2$, 276.7 kJ/m$^2$, respectively. The results of SZW method are similar to those of the unloading compliance method. Through the elastic-plastic fracture toughness test, it is found that the value of $J_{IC}$ is decreased with increasing of the aging time. The results obtained through the investigation can provide reference data for a leak before break(LBB) of reactor coolant system of nuclear power plants.

Bioglue-Coated Teflon Sling Technique in Microvascular Decompression for Hemifacial Spasm Involving the Vertebral Artery

  • Lee, Seong Ho;Park, Jae Sung;Ahn, Young Hwan
    • Journal of Korean Neurosurgical Society
    • /
    • v.59 no.5
    • /
    • pp.505-511
    • /
    • 2016
  • Objective : Microvascular decompression (MVD) for hemifacial spasm (HFS) involving the vertebral artery (VA) can be technically challenging. We investigated the therapeutic effects of a bioglue-coated Teflon sling technique on the VA during MVD in 42 cases. Methods : A bioglue-coated Teflon sling was crafted by the surgeon and applied to patients in whom neurovascular compression was caused by the VA. The radiologic data, intra-operative findings with detailed introduction of the procedure, and the clinical outcomes of each patient were reviewed and analyzed. Results : The 42 patients included in the analysis consisted of 22 females and 20 males, with an average follow-up duration of 76 months (range 24-132 months). Intraoperative investigation revealed that an artery other than the VA was responsible for the neurovascular compression in all cases : posterior inferior cerebellar artery (PICA) in 23 patients (54.7%) and anterior inferior cerebellar artery (AICA) in 11 patients (26.2%). All patients became symptom-free after MVD. Neither recurrence nor postoperative neurological deficit was noted during the 2-year follow-up, except in one patient who developed permanent deafness. Cerebrospinal fluid (CSF) leak occurred in three patients, and one required dural repair. Conclusion : Transposition of the VA using a bioglue-coated Teflon sling is a safe and effective surgical technique for HFS involving the VA. A future prospective study to compare clinical outcomes between groups with and without use of this novel technique is required.

A Design of Encryption Method for Strong Security about Tapping/Interception of VoIP Media Information between Different Private Networks (이종 사설망간에 VoIP 미디어의 도.감청 보안 강화를 위한 암호화 기법 설계)

  • Oh, Hyung-Jun;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.113-120
    • /
    • 2012
  • VoIP provides voice data service using existing IP networks and has received much attention recently. VoIP service has a variety of security vulnerabilities. Types of main attacks on VoIP service are tapping/interception, DoS attacks, spam, misuse of service attacks and the like. Of these, confidential information leak because of tapping/interception has been considered as a critical problem. Encryption techniques, such as SRTP and ZRTP, are mostly used to prevent tap and intercept on VoIP media information. In general, VoIP service has two service scenarios. First, VoIP service operates within a single private network. Second, VoIP service operates between different private networks. Both SRTP and ZRTP for VoIP media information within a single private network can perform encryption. But they can not perform encryption between different private networks. In order to solve this problem, in this paper, we modify SRTP protocol. And then, we propose an encryption method that can perform encryption of VoIP media information between the different private networks.

Security Analysis of Information Flow using SAT (SAT를 이용한 정보흐름의 안전성 분석)

  • Kim, Je-Min;Kouh, Hoon-Joon
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.253-261
    • /
    • 2016
  • As many people use internet through the various programs of PC and mobile devices, the possibility of private data leak is increasing. A program should be used after checking security of information flow. Security analysis of information flow is a method that analyzes security of information flow in program. If the information flow is secure, there is no leakage of personal information. If the information flow not secure, there may be a leakage of personal information. This paper proposes a method of analyzing information flow that facilitates SAT solver. The method translates a program that includes variables where security level is set into propositional formula representing control and information flow. The satisfiability of the formula translated is determined by using SAT solver. The security of program is represented through the result. Counter-example is generated if the program is not secure.