• Title/Summary/Keyword: Industrial Technology Leak

Search Result 50, Processing Time 0.02 seconds

Security-equipment building cause based on 「grounded theory」 approaches (융합보안 설비구축 원인에 대한 근거이론적 접근)

  • Lim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.69-75
    • /
    • 2016
  • The government is to prevent technology leakage in 2007, the Industrial Technology Protection Act was enacted and encouraging deployment of security equipment. in this study, corporate security equipment for the tried to determine the cause. In contrast to quantitative research, which is an existing research method, Barney G. Glaser & Anselm L. Strauss used a grounded theory as a kind of qualitative methodology in social science. As a result, it was found that the higher the government subsidy, the request from the representative or the client, the higher the efficiency through the prevention of technology leakage, the higher the sales increase, In the United States.

Manufacturing and Performance Test of Obsolete Valve in NPP using DED Metal 3D Printing Technology (원전 단종 밸브의 DED 방식 금속 3D프린팅 제작 및 성능시험)

  • Kyungnam Jang
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.17 no.2
    • /
    • pp.75-82
    • /
    • 2021
  • The 3D printing technology is one of the fourth industrial revolution technology that drives innovation in the manufacturing process, and should be applied to nuclear industry for various purposes according to the manufacturing trend change. In nuclear industry, it can be applied to manufacture obsolete items and new designed parts in advanced reactors or small modular reactors (SMRs), replacing the traditional manufacturing technologies. A gate valve body was manufactured, which was obsolete in nuclear power plant, using DED(Directed Energy Deposition) metal 3D printing technology after restoring design characteristics including 3D design drawing by reverse engineering. The 3D printed valve body was assembled with commercial parts such as seat-ring, disk, stem, and actuator for performance test. For the valve assembly, including 3D printed valve body, several tests were performed, including pressure test, end-loading test, and seismic test according to KEPIC MGG and KEPIC MFC. In the pressure test, hydraulic pressure of 391kgf/cm2 was applied to 3D printed valve body, and no leak was detected. Also the 3D printed valve assembly was performed well in end-loading and seismic tests.

Development of IoT-based Safety Management Method through an Analysis of Risk Factors for Industrial Valves (산업용 밸브의 위험요소 분석을 통한 IoT 기반 안전관리 방안 개발)

  • Kim, Jung-Hoon;Kim, Young-Gu
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.5
    • /
    • pp.35-43
    • /
    • 2019
  • The safety of industrial valves, which are the core parts of plant facilities, are managed by manpower and there are difficulties because of side area for inspection and limited accessibility due to the nature of facilities. The industrial valves used in plant facilities cause problems such as interrupted production; a loss of life due to leak or explosion of poisonous material and flammable gases, and difficulty in locating accident positions in the event of leakage or failure. Therefore, safety management and control systems based on IoT technology are needed. This study is about the development of risk factor prediction technique among the safety management of industrial valves through IoT- based wireless communication and the development of actuator control system. We have developed IoT-based industrial valve safety management techniques to prevent accidents caused by main risk factors by conducting an analysis of the structural characteristics of valves and an analysis of the causes of main risk factors through review of failure data and literature and an analysis of accident scenarios.

A Study on the Stability of Torque for Compressing-Cutting Device of Nano Tube Manufacturing System Using DC Servo Motor (DC 서보모터를 이용한 나노튜브 제조용 압축-절단 장치의 토크 안전성에 관한 연구)

  • Choi, Kab-Yong;Oh, Tae-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5393-5397
    • /
    • 2011
  • The compressing-cutting device is used for manufacturing nano tube. the purpose of this study is to design and manufacture the compressing-cutting device witch has safety and stable performance. The most important core technology, in nano tube manufacturing, is to seam the each end of tube with appropriate pressure and to cut it off into the two part safely not to leak injected medium. Since the compressing pressure and the cutoff speed make the quality of nano tube, they are very important. This study will show the processes of design and manufacturing of compressing-cutting device.

The Automatical Process Map Generation Using Network Representation In Radiopharmaceutical Synthesis (네트워크 모델링을 통한 방사성의약품 합성 프로세스 맵 자동생성 시스템)

  • Lee, Cheol-Soo;Heo, Eun-Young;Kim, Jong-Min;Kim, Dong-Soo
    • IE interfaces
    • /
    • v.24 no.2
    • /
    • pp.156-163
    • /
    • 2011
  • The radiopharmaceutical synthesis for PET (positron emission tomography) is composed of chemical reactions using automated synthetical equipment. Due to the radioactive material, the automated equipment is being frequently developed to replace human operators who conduct dangerous, repetitive and dexterous operations. As to operation, the manipulating program is commonly coded using the spread sheet while the whole actuators are mapped in every step. The process map (program) is changed according to such parameters as temperature of reactor, keeping time, mixture sequence and amount of reagent. In cases of customizing the automated synthetical equipment or developing the new radiopharmaceuticals, lots of experiments should be conducted and the programming mistake is not allowed as it can lead abnormal control of the equipment to leak the radioactive materials. The exact process map has depended on trial and error manner. Thus, this study developed the methodology to tabulate the synthetical process to convert the process map automatically while the synthetical module formation is represented by a network model. The proposed method is validated using the actual radiopharmaceutical synthetical procedure.

Development of A Validation System For Automatic Radiopharmaceutical Synthesis Process Using Network Modeling (방사성의약품 합성 프로세스 검증을 위한 네트워크 모델링)

  • Lee, Cheol-Soo;Heo, Eun-Young;Kim, Jong-Min;Kim, Dong-Soo
    • IE interfaces
    • /
    • v.24 no.3
    • /
    • pp.187-195
    • /
    • 2011
  • The automatic radiopharmaceutical module consists of several 2-way valves, couple of syringes, gas supply unit, heating(cooling) unit and sensors to control the chemical reagents as well as to help the chemical reaction. In order to control the actuators of radiopharmaceutical module, the process is tabulated using spread sheet as like excel. Unlike the common program, a trivial error is too critical to allowed in the process because the error can lead to leak the radioactive reagent and to cause the synthesis equipment failure during synthesizing. Hence, the synthesis process has been validated using graphic simulation while the operator checks the whole process visually and undergoes trial and error. The verification of the synthesis process takes a long time and has a difficulty in finding the error. This study presents a methodology to verify the process algebraically while the radiopharmaceutical module is converted to the network model. The proposed method is validated using actual synthesis process.

Analysis of Physical Properties and Total Petroleum Hydrocarbon for Soil Contamination (토양오염 해석을 위한 석유제품 물성 및 TPH 분석)

  • Lim, Young-Kwan;Jeong, Choong-Sub;Han, Kwan-Wook
    • Applied Chemistry for Engineering
    • /
    • v.23 no.6
    • /
    • pp.618-623
    • /
    • 2012
  • The significance of soil environment has been gradually increased because of petroleum leak accidents. Comparing with wastewater clean treatments and air pollutant controls, the soil purification requires a long-term process and it is very expensive. In this study, we analyzed the physicochemical properties of total petroleum hydrocarbon (TPH) contaminated in soil. This could be applied to deciding the source of petroleum when a soil contamination accident occurs.

Position Sensorless Control of PMSM Drive for Electro-Hydraulic Brake Systems

  • Yoo, Seungjin;Son, Yeongrack;Ha, Jung-Ik;Park, Cheol-Gyu;You, Seung-Han
    • Journal of Drive and Control
    • /
    • v.16 no.3
    • /
    • pp.23-32
    • /
    • 2019
  • This study proposed a fault tolerant control algorithm for electro-hydraulic brake systems where permanent magnet synchronous motor (PMSM) drive is adopted to boost the braking pressure. To cope with motor position sensor faults in the PMSM drive, a braking pressure controller based on an open-loop speed control method for the PMSM was proposed. The magnitude of the current vector was determined from the target braking pressure, and motor rotational speed was derived from the pressure control error to build up the braking pressure. The position offset of the pump piston resulting from a leak in the hydraulic system is also compensated for using the open-loop speed control by moving the piston backward until it is blocked at the end of stroke position. The performance and stability of the proposed controller were experimentally verified. According to the results, the control algorithm can be utilized as an effective means of degraded control for electro-hydraulic brake systems in the case that a motor position sensor fault occurs.

Discussion On the Status and Improvements For Technology Leakage Crimes: Based on Acquittal Case (기술유출 형사사건의 처리 실태와 개선 고려사항 논의: 무죄사건을 중심으로)

  • Kyung Joon Hwang;Hun Yeong Kwon
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.41-55
    • /
    • 2022
  • As the importance of technology protection is emphasized day by day, various protection measures are being carried out to protect technology. But attempts to leak technology are continuing. As an alternative to this, stronger punishment is socially required for technology leakage crimes. In response to these social demands, the standard for punishment has been steadily raised. Legislative bills containing additional reinforcement are still pending in the National Assembly. However, in order to substantially enhance the deterrence against crime, it is not enough to strengthen the punishment standards. The effect can only be fully exercised when the certainty of punishment increases. Therefore, this paper focused on seeking ways to increase the certainty of punishment under the current system rather than the reinforcement of the punishment itself. The purpose of this study was to derive the reason why the innocence rate in technology leakage criminal cases is higher than that of general criminal cases by analyzing cases and causes of innocent cases in technology leakage criminal cases. Based on this, I discussed improvement considerations to reduce unfair acquittal cases.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.