• 제목/요약/키워드: Industrial Technology Leakage

Search Result 189, Processing Time 0.029 seconds

A Study on Safety and Operational Management System for CNG Filling Stations (CNG충전소 안전.운영 관리를 위한 시스템 구축에 관한 연구)

  • Yang, Jae-Mo;Kim, Bum-Su;Yong, Jong-Won;Ko, Byung-Seok;Lee, Dong-Hyuk;Ko, Jae-Wook
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.6
    • /
    • pp.8-13
    • /
    • 2011
  • All over the nation, a lot of industrial complex utilize gas as their energy source. Possibilities are fire, explosion, and leakage could happen any time in these large complexes. To prevent these tragic accidents and to minimize the damage when the accident occurs, the development of diagnostic technology for these facilities is imperative. The safety check is conducted on an individual and partial basis, currently. Accordingly, the accumulation and improvement of the safety management technology is necessary in order to make all the different checking techniques and management systems compatible, since checking processes, result interpretation techniques, and subsequent prognoses are not the same. The program provides damage scenarios from gas leakage. The output enables policy makers to predict the degree of infliction. Through this program, engineers are able to design an effective gas safety program to operate and maintain ubiquitous gas facilities.

Anomaly Detection Analysis using Repository based on Inverted Index (역방향 인덱스 기반의 저장소를 이용한 이상 탐지 분석)

  • Park, Jumi;Cho, Weduke;Kim, Kangseok
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.294-302
    • /
    • 2018
  • With the emergence of the new service industry due to the development of information and communication technology, cyber space risks such as personal information infringement and industrial confidentiality leakage have diversified, and the security problem has emerged as a critical issue. In this paper, we propose a behavior-based anomaly detection method that is suitable for real-time and large-volume data analysis technology. We show that the proposed detection method is superior to existing signature security countermeasures that are based on large-capacity user log data according to in-company personal information abuse and internal information leakage. As the proposed behavior-based anomaly detection method requires a technique for processing large amounts of data, a real-time search engine is used, called Elasticsearch, which is based on an inverted index. In addition, statistical based frequency analysis and preprocessing were performed for data analysis, and the DBSCAN algorithm, which is a density based clustering method, was applied to classify abnormal data with an example for easy analysis through visualization. Unlike the existing anomaly detection system, the proposed behavior-based anomaly detection technique is promising as it enables anomaly detection analysis without the need to set the threshold value separately, and was proposed from a statistical perspective.

Analysis of Warpage of Fan-out Wafer Level Package According to Molding Process Thickness (몰드 두께에 의한 팬 아웃 웨이퍼 레벨 패키지의 Warpage 분석)

  • Seung Jun Moon;Jae Kyung Kim;Euy Sik Jeon
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.4
    • /
    • pp.124-130
    • /
    • 2023
  • Recently, fan out wafer level packaging, which enables high integration, miniaturization, and low cost, is being rapidly applied in the semiconductor industry. In particular, FOWLP is attracting attention in the mobile and Internet of Things fields, and is recognized as a core technology that will lead to technological advancements such as 5G, self-driving cars, and artificial intelligence in the future. However, as chip density and package size within the package increase, FOWLP warpage is emerging as a major problem. These problems have a direct impact on the reliability and electrical performance of semiconductor products, and in particular, cause defects such as vacuum leakage in the manufacturing process or lack of focus in the photolithography process, so technical demands for solving them are increasing. In this paper, warpage simulation according to the thickness of FOWLP material was performed using finite element analysis. The thickness range was based on the history of similar packages, and as a factor causing warpage, the curing temperature of the materials undergoing the curing process was applied and the difference in deformation due to the difference in thermal expansion coefficient between materials was used. At this time, the stacking order was reflected to reproduce warpage behavior similar to reality. After performing finite element analysis, the influence of each variable on causing warpage was defined, and based on this, it was confirmed that warpage was controlled as intended through design modifications.

  • PDF

Design Optimization to achieve an enhanced flatness of a Lab-on-a-Disc for liquid biopsy (액체생검용 Lab-on-a-Disc의 평탄도 향상을 위한 최적화)

  • Seokkwan Hong;Jeong-Won Lee;Taek Yong Hwang;Sung-Hun Lee;Kyung-Tae Kim;Tae Gon Kang;Chul Jin Hwang
    • Design & Manufacturing
    • /
    • v.17 no.1
    • /
    • pp.20-26
    • /
    • 2023
  • Lab-on-a-disc is a circular disc shape of cartridge that can be used for blood-based liquid biopsy to diagnose an early stage of cancer. Currently, liquid biopsies are regarded as a time-consuming process, and require sophisticated skills to precisely separate cell-free DNA (cfDNA) and circulating tumor cells (CTCs) floating in the bloodstream for accurate diagnosis. However, by applying the lab-on-a-disc to liquid biopsy, the entire process can be operated automatically. To do so, the lab-on-a-disc should be designed to prevent blood leakage during the centrifugation, transport, and dilution of blood inside the lab-on-a-disc in the process of liquid biopsy. In this study, the main components of lab-on-a-disc for liquid biopsy are fabricated by injection molding for mass production, and ultrasonic welding is employed to ensure the bonding strength between the components. To guarantee accurate ultrasonic welding, the flatness of the components is optimized numerically by using the response surface methodology with four main injection molding processing parameters, including the mold & resin temperatures, the injection speed, and the packing pressure. The 27 times finite element analyses using Moldflow® reveal that the injection time and the packing pressure are the critical factors affecting the flatness of the components with an optimal set of values for all four processing parameters. To further improve the flatness of the lab-on-a-disc components for stable mass production, a quarter-disc shape of lab-on-a-disc with a radius of 75 mm is used instead of a full circular shape of the disc, and this significantly decreases the standard deviation of flatness to 30% due to the reduced overall length of the injection molded components by one-half. Moreover, it is also beneficial to use a quarter disc shape to manage the deviation of flatness under 3 sigma limits.

  • PDF

Design and Implementation of Low power ALU based on NCL (Null Convention Logic) (NCL 기반의 저전력 ALU 회로 설계 및 구현)

  • Kim, Kyung Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.5
    • /
    • pp.59-65
    • /
    • 2013
  • Conventional synchronous design circuits cannot only satisfy the timing requirement of the low voltage digital systems, but also they may generate wrong outputs under the influence of PVT variations and aging effects. Therefore, in this paper, a NCL (Null Convention Logic) design as an asynchronous design method has been proposed, where the NCL method doesn't require any timing analysis, and it has a very simple design methodology. Base on the NCL method, a new low power reliable ALU has been designed and implemented using MagnaChip-SKhynix 0.18um CMOS technology. The experimental results of the proposed NCL ALU have been compared to those of a conventional pipelined ALU in terms of power consumption and speed.

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime

Effect of Noble Metals on Hydrogen Sensing Properties of Metal Oxide-based Gas Sensors

  • Mirzaei, Ali;Bang, Jae Hoon;Kim, Sang Sub;Kim, Hyoun Woo
    • Journal of Sensor Science and Technology
    • /
    • v.29 no.6
    • /
    • pp.365-368
    • /
    • 2020
  • As a green and abundant source of energy, H2 has attracted the attention of researchers for use in different applications. Nevertheless, it is highly flammable, and because of its significantly small size, extreme attention is needed to detect its leakage. In this review, we discuss different effects of noble metals on the H2 gas response and performance of metal oxide-based gas sensors. In this regard, we discuss the effects of noble metals, in combination with metal oxides, on H2 gas detection. The catalytic activity towards H2 gas and the formation of heterojunctions with metal oxides are the main contributions of noble metals to the sensing improvement of H2 gas sensors. Furthermore, in the special case of Pd and somewhat Pt, the formation of PdHx and PtHx also affects the H2 sensing performance. This review paper provides useful information for researchers working in the field of H2 gas detection.

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

Blockchain-based safety MyData Service Model (블록체인 기반 안전한 마이데이터 서비스 모델)

  • Lee, Kwang Hyoung;Jung, Young Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.873-879
    • /
    • 2020
  • The importance of data as a core resource of the 4th industrial revolution is emerging, and companies illegally collect and use personal data. In the financial sector, active research is conducted to safely manage personal data and provide better services using blockchain, big data, and AI technology. In this paper, we propose a system that can safely manage personal data by using blockchain technology, which can be used without changing the existing system. The composition of this system consists of a blockchain, blockchain linkages, a service provider, and a user (i.e., an app). Blockchain can be used regardless of its type and form, and services are provided by classifying blockchains and services in the blockchain linkages. Service providers can access personal data only after requesting and receiving delegated permission from users. Existent MyData services store all data in a user's mobile phone, so information may get leaked due to jailbreaks or rooting. But in the proposed system, personal data are stored in blockchain so information leakage can be prevented. In the future, we will study ways to provide customized services using personal data stored in blockchain.

Development of a RADIUS WLAN Security System for Industrial Applications Based on WEB (WEB 기반의 기업용 RADIUS 무선랜 보안 시스템 개발)

  • Jeong, Yeon-Woo;Sohn, Jong-Yoon;Chun, Joong-Chang;Choi, Kyung-Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.599-603
    • /
    • 2016
  • Recently the wireless LAN system is substituting wired LAN system notably as the number of mobile users increases greatly along the advancement of technology. But the wireless LAN has a critical weakness in the security such as data leakage. Thus a safe security system is imperative to avoid threatening from hackers with offering the best convenience to inner users. In this research, we have developed a RADIUS wireless LAN security system for industrial applications, which performs the EAP authentication with the compatibility for any maker of wireless LAN. The system has interfaces based on WEB, providing DB access function for user management so that users can perform authentication of 802.1x in their computers.