• Title/Summary/Keyword: Data loss protection

Search Result 134, Processing Time 0.027 seconds

Resistance of Polystyrene-Impregnated Glued Laminated Lumbers after Exposure to Subterranean Termites in a Field

  • Dede HERMAWAN;Mahdi MUBAROK;Imam Busyra ABDILLAH;Yusuf Sudo HADI;Cossey YOSI;Aujchariya CHOTIKHUN;Rohmah PARI;Gustan PARI
    • Journal of the Korean Wood Science and Technology
    • /
    • v.52 no.1
    • /
    • pp.70-86
    • /
    • 2024
  • Termites are a serious threat to wood-based products in Indonesia. This study investigated the termite resistant property of glulam made from polystyrene-modified wood. Three tropical fast-growing wood species, namely mangium (Acacia mangium), manii (Maesopsis eminii), and rubberwood (Hevea brasiliensis), were prepared for flat-sawn laminae. After getting air-dried condition, the laminae were impregnated with polystyrene using potassium peroxydisulphate as a catalyst followed by polymerization at 80℃. Polystyrene-impregnated and control glued-laminated lumbers (glulams) were manufactured, and solid wood was provided. Three wood species and three wood products with six replicates were exposed in a field in Bogor, Indonesia, for four months, and before the tests, their density and moisture content were measured. At the end of the field tests, the weight loss and protection levels of each test sample were determined. A completely randomized factorial design was used for data analysis. The weight percentage gains for mangium, manii, and rubberwood were 22.30%, 18.22%, and 10.44%, respectively. The results showed that manii belonged to low-density wood, whereas the other two woods were medium-density wood, and the moisture content was the ambient moisture content, typical of the Bogor area. Regarding weight loss and protection level, mangium was the most durable against subterranean termite attacks, followed by rubberwood and manii. Among the wood products, the polystyrene-impregnated glulam presented the highest durability, followed by the control glulam and solid wood. Therefore, mangium and rubberwood polystyrene-impregnated glulams are recommended for future product development.

A Study on Protective Coordination Setting of Positive Offset Mho Loss of Field Relay (Positive Offset Mho 계자 상실 계전기 보호 협조 정정에 관한 연구)

  • Kim, Kwnag-Hyun;Park, Ji-Kyung;Kim, Jun-Hyeok;Kim, Doo-Ung;Kang, Sung-Bum;Kim, Chul-Hwan;Lyu, Young-Sik;Yang, Jeong-Jae;Ko, Yun-Tae
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.8
    • /
    • pp.1326-1333
    • /
    • 2016
  • It is important to clear the fault and prevent resulting in damage to power system. Although the frequency of generator internal fault is relatively low, it can lead to incalculable damage to power system as well as generator. Especially, loss of field on generator can cause the generator to lose synchronism for a short time if it is not removed promptly. Therefore, it is needed to conduct research on loss of field relay for detecting or clearing the loss of field. However, the setting of the relay may vary in generator operator or engineer, and the relay is not coordinated well with other elements associated with loss of field. In this paper, we address specifically the coordination of positive offset mho loss of field relay which is one of the protection schemes for loss of field. Computer simulations are performed by using ElectroMagnetic Transients Program-Restructured Version (EMTP-RV) based on actual data.

Real-time Environmental Radiation Monitoring System with Automatic Restoration of Backup Data in Site Detector via Communication using Radio Frequency (현장검출기에 저장된 백업데이터를 무선통신방식으로 자동 복원하는 실시간 환경선량 감시 시스템)

  • Lee, Wan-No;Kim, Eun-Han;Chung, Kun-Ho;Cho, Young-Hyun;Choi, Geun-Sik;Lee, Chang-Woo;Park, Ki-Hyun;Kim, Yun-Goo
    • Journal of Radiation Protection and Research
    • /
    • v.28 no.3
    • /
    • pp.255-261
    • /
    • 2003
  • An environmental radiation monitoring system based on high pressurized ionization chamber has been used for on-line gamma monitoring surrounding the KAERI (Korea Atomic Energy Research Institute), which transmits the dose data measured from ion chamber on the site via radio frequency to a central processing computer and stores the transmitted real-time data. Although communication using radio frequency has several advantages such as effective and economical transmission, storage, and data process, there is one main disadvantage that data loss during transmission often happens because of unexpected communication problems. It is possible to restore the loss data by off-line such as floppy disk but the simultaneous process and display of current data as well as the backup data are very difficult in the present on-line system. In this work, a new electronic circuit board and the operation software applicable to the conventional environmental radiation monitoring system are developed and the automatical synchronization of the ion chamber unit and the central processing computer is carried out every day. This system is automatically able to restore the backup data within 34 hours without additional equipments and also display together the current data as well as the transmitted backup data after checking time flag.

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.

A Disk-based Archival Storage System Using the EOS Erasure Coding Implementation for the ALICE Experiment at the CERN LHC

  • Ahn, Sang Un;Betev, Latchezar;Bonfillou, Eric;Han, Heejune;Kim, Jeongheon;Lee, Seung Hee;Panzer-Steindel, Bernd;Peters, Andreas-Joachim;Yoon, Heejun
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.56-65
    • /
    • 2022
  • Korea Institute of Science and Technology Information (KISTI) is a Worldwide LHC Computing Grid (WLCG) Tier-1 center mandated to preserve raw data produced from A Large Ion Collider Experiment (ALICE) experiment using the world's largest particle accelerator, the Large Hadron Collider (LHC) at European Organization for Nuclear Research (CERN). Physical medium used widely for long-term data preservation is tape, thanks to its reliability and least price per capacity compared to other media such as optical disk, hard disk, and solid-state disk. However, decreasing numbers of manufacturers for both tape drives and cartridges, and patent disputes among them escalated risk of market. As alternative to tape-based data preservation strategy, we proposed disk-only erasure-coded archival storage system, Custodial Disk Storage (CDS), powered by Exascale Open Storage (EOS), an open-source storage management software developed by CERN. CDS system consists of 18 high density Just-Bunch-Of-Disks (JBOD) enclosures attached to 9 servers through 12 Gbps Serial Attached SCSI (SAS) Host Bus Adapter (HBA) interfaces via multiple paths for redundancy and multiplexing. For data protection, we introduced Reed-Solomon (RS) (16, 4) Erasure Coding (EC) layout, where the number of data and parity blocks are 12 and 4 respectively, which gives the annual data loss probability equivalent to 5×10-14. In this paper, we discuss CDS system design based on JBOD products, performance limitations, and data protection strategy accommodating EOS EC implementation. We present CDS operations for ALICE experiment and long-term power consumption measurement.

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

Developing the Disaster Plan for Materials in Library (도서관 장서를 위한 재난대책 수립)

  • 방준필
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.8 no.1
    • /
    • pp.135-155
    • /
    • 1997
  • The purpose of this study Is to recommand all kinds of library in Korea to develop a disaster plan. The materials in the library are apt to get damaged at once by such disasters as fire or flood etc. It is fortunate that we Have not found any big disaster at libraries in Korean. considering many cases of big disaster which distroy materials at library in foreign countries. In spite of the posibility of disaster any time, that will make librry loss of function, there are no library that have a disaster plan in Korea. Disaster plan is a guidance by which materials are conserved at ordinary times, protected and recoverd in contingency. It consists by four elements: prevention, preparedness, reaction and recovery. As libraries function by biblogrophic data and user data in automation system, it is also recommended to prepare system protection in the disaster plan.

  • PDF

Calculation of the Electromagnetic Fields Distribution around the Human Body and Study of Transmission Loss Related with the Human Body Communication (인체 통신에 따른 인체 주변에서의 전기장 분포 계산 및 전송 손실 연구)

  • Ju, Young-Jun;Gimm, Youn-Myoung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.2
    • /
    • pp.251-257
    • /
    • 2012
  • Human body communication means transmitting and receiving data through human body medium or through free space along with the human body skin. Electric field distribution around the human body between the transmitter and the receiver were calculated at five different frequencies with 5 MHz interval between 10 MHz and 30 MHz. Commercial electromagnetic simulation tool was used for the calculation of E-field distributions applying the Korean standard male model including 29 different kinds of human tissues. After calculating specific absorption rate(SAR) values on back of the hand, it was compared with International Commission on Non-Ionizing Radiation Protection(ICNIRP) human protection guideline. While conductivities(${\sigma}$) and relative permittivities(${\varepsilon}_r$) of the human tissues for each frequency were input as the analyzing parameters, electric field intensities near both hands were integrated along the integral line between the nearby electrodes for the calculation of the transmitting and receiving voltages whose ratio was defined as channel loss. The calculated channel losses were about ($75{\pm}1$) dB and showed nearly flat response all through the evaluated frequencies.

Implementation and Performance Analysis of Mobile Multimedia Terminal (H.324M) (이동 멀티미디어 터미널 (H.324M) 구현 및 성능 분석)

  • 박상현;윤종성;정진호;고성제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9A
    • /
    • pp.1295-1305
    • /
    • 1999
  • In this paper, we present the implementation and performance analysis of H.324M mobile multimedia terminal which s under standardization. The H.324M is the mobile extension of H.324 which is the standard for low bit rate multimedia terminals operating over GSTN. For H.324M, the multiplexing protocol (H.223) of H.324 is enhanced to protect data from the transmission errors over mobile channels. The multiplexing protocol of H.324M is classified into Levels 0, 1, 2, and 3 depending on the level of error protection. Each Level is analyzed according to different types of the data loss elements. Simulation results show that the loss caused by the corrupted flag and header produces the most serious performance degradation. Levels 1 and 2 which protect the header and flag are effective in reducing the total loss. Furthermore, the optimal flag length and threshold value for Levels 1 and 2 are determined.

  • PDF

A Study on Fire Hazard Analysis and Smoke Flowing for the Semiconductor Manufacturing Process (반도체 제조공정의 연기유동에 관한 연구)

  • Han, Soo-Jin;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.1
    • /
    • pp.197-211
    • /
    • 2007
  • The power of semiconductor, Korea is continuously constructing semiconductor production line for keeping a front-runner status. however, studies and data about potential risks in semiconductor factory are still short. If fire does not initially suppressed, the fire causes a great damage. To decrease fire risk factors, in addition to fire fighting safety equipment, more important thing is how to design and construct fire protection system. The current fire protection codes about semiconductor factory come under functional law, and this law is short of consideration about particularity of factory. The existing prescriptive fire codes depending on experience compose without evident engineering verifications, thus equipments which is created by the current prescriptive fire code may bring about a variety of problems. For example, the design under the current regulation can not cope with the excessive investments, low efficiencies, and the diversifying construction designs and be applied to the quick changes of new technologies. Ergo, an optimal design for fire protection is to equip fire protection arrangements with condition and environment of production field. Manufacturing factory of semiconductors is a windowless airtight space. And for cleanliness, there exists strong flow of cooperation. Therefore, there is a need for fire safety design that meets the characteristic of a clean room. Accordingly, we are to derive smoke flow according to cooperation process within a clean room and construction plan of an optimal sensor system. In this study, in order to confirm the performance of proposed smoke-exhaust equipment and suggest efficient smoke exhaust device when there is a fire of 1MW of methane in the clean room of company H, we have implemented fire simulation using fluid dynamics computation.