• Title/Summary/Keyword: Integrity Check

Search Result 154, Processing Time 0.027 seconds

Detection of flaw in steel anchor-concrete composite using high-frequency wave characteristics

  • Rao, Rajanikant;Sasmal, Saptarshi
    • Steel and Composite Structures
    • /
    • v.31 no.4
    • /
    • pp.341-359
    • /
    • 2019
  • Non-monolithic concrete structural connections are commonly used both in new constructions and retrofitted structures where anchors are used for connections. Often, flaws are present in anchor system due to poor workmanship and deterioration; and methods available to check the quality of the composite system afterward are very limited. In case of presence of flaw, load transfer mechanism inside the anchor system is severely disturbed, and the load carrying capacity drops drastically. This raises the question of safety of the entire structural system. The present study proposes a wave propagation technique to assess the integrity of the anchor system. A chemical anchor (embedded in concrete) composite system comprising of three materials viz., steel (anchor), polymer (adhesive) and concrete (base) is considered for carrying out the wave propagation studies. Piezoelectric transducers (PZTs) affixed to the anchor head is used for actuation and the PZTs affixed to the surrounding concrete surface of the concrete-anchor system are used for sensing the propagated wave through the anchor interface to concrete. Experimentally validated finite element model is used to investigate three types of composite chemical anchor systems. Studies on the influence of geometry, material properties of the medium and their distribution, and the flaw types on the wave signals are carried out. Temporal energy of through time domain differentiation is found as a promising technique for identifying the flaws in the multi-layered composite system. The present study shows a unique procedure for monitoring of inaccessible but crucial locations of structures by using wave signals without baseline information.

Sipping Test Technology for Leak Detection of Fission Products from Spent Nuclear Fuel (사용후핵연료 핵분열생성물 누출탐상 Sipping 검사기술)

  • Shin, Jung Cheol;Yang, Jong Dae;Sung, Un Hak;Ryu, Sung Woo;Park, Young Woo
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.16 no.2
    • /
    • pp.18-24
    • /
    • 2020
  • When a damage occurs in the nuclear fuel burning in the reactor, fission products that should be in the nuclear fuel rod are released into the reactor coolant. In this case, sipping test, a series of non-destructive inspection methods, are used to find leakage in nuclear fuel assemblies during the power plant overhaul period. In addition, the sipping test is also used to check the integrity of the spent fuel for moving to an intermediate dry storage, which is carried out as the first step of nuclear decommissioning, . In this paper, the principle and characteristics of the sipping test are described. The structure of the sipping inspection equipment is largely divided into a suction device that collects fissile material emitted from a damaged assembly and an analysis device that analyzes their nuclides. In order to make good use of the sipping technology, the radioactive level behavior of the primary system coolant and major damage mechanisms in the event of nuclear fuel damage are also introduced. This will be a reference for selecting an appropriate sipping method when dismantling a nuclear power plant in the future.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

An analysis of neutron sources and gamma-ray in spent fuels using SCALE-ORIGEN-ARP (SCALE-ORIGEN-ARP를 이용한 사용후핵연료 내 중성자 및 감마선원 분석)

  • So-Hee Cha;Kwang-Heon Park
    • Journal of the Korean institute of surface engineering
    • /
    • v.56 no.1
    • /
    • pp.84-93
    • /
    • 2023
  • The spent nuclear fuel is burned during the planned cycle in the plant and then generates elements such as actinide series, fission products, and plutonium with a long half-life. An 'interim storage' step is needed to manage the high radioactivity and heat emitted by nuclides until permanent-disposal. In the case of Korea, there is no space to dispose of high-level radioactive waste after use, so there is a need for a period of time using interim storage. Therefore, the intensity of neutrons and gamma-ray must be determined to ensure the integrity of spent nuclear fuel during interim storage. In particular, the most important thing in spent nuclear fuel is burnup evaluation, estimation of the source term of neutrons and gamma-ray is regarded as a reference measurement of the burnup evaluation. In this study, an analysis of spent nuclear fuel was conducted by setting up a virtual fuel burnup case based on CE16×16 fuel to check the total amount and spectrum of neutron, gamma radiation produced. The correlation between BU (burnup), IE (enrichment), and CT (cooling time) will be identified through spent nuclear fuel burnup calculation. In addition, the composition of nuclide inventory, actinide and fission products can be identified.

Smartphone Forensic of Military Data Information Leakage (군사자료 정보유출의 스마트폰 포렌식 연구)

  • Kim, Yong-youn;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.238-241
    • /
    • 2022
  • North Korea launched an ICBM and declared Moratorium for the September 19 military talks. The Armed Forces must protect military security for national defense and security. The Ministry of National Defense, which received a hacking attack from North Korea, must protect its military security even more. Recently, the leakage of military data through smartphones is occurring through smartphones. Officers and non-commissioned officers can use smartphones while working. Therefore, smartphone forensics is required to check information leakage of military data from smartphones. In this study, forensic leaks of military data from the Galaxy S20 model of S company. Research integrity verification for securing smartphone forensic evidence, securing metadata, and adopting evidence. This study will contribute to the development of military security and forensic technology.

  • PDF

Annotation Method for Reliable Video Data (신뢰성 영상자료를 위한 어노테이션 기법)

  • Yun-Hee Kang;Taeun Kwon
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.77-84
    • /
    • 2024
  • With the recent increase in the use of artificial intelligence, AI TRiSM data management within organizations has become important, and thus securing data reliability has emerged as an essential requirement for data-based decision-making. Digital content is transmitted through the unreliable Internet to the cloud where the digital content storage is located, then used in various applications. When detecting anomaly of data, it is difficult to provide a function to check content modification due to its damage in digital content systems. In this paper, we design a technique to guarantee the reliability of video data by expanding the function of data annotation. The designed annotation technique constitutes a prototype based on gRPC to handle a request and a response in a webUI that generates classification label and Merkle tree of given video data.

  • PDF

Investigation on the Allowable Transient Power Levels to Maintain the Mechanical Integrity of the 17$\times$17 KOFA Fuel Rod During the ANS Conditions I and II (ANS과도조건 I 및 II에서 17x17 KOFA 핵연료봉의 기계적 건전성이 유지되는 과도상태 허용 출력준위에 관한 연구)

  • Lee, Chan-Bock;Kim, Ki-Hang;Kim, Kyu-Tae
    • Nuclear Engineering and Technology
    • /
    • v.26 no.1
    • /
    • pp.119-125
    • /
    • 1994
  • Transient power level of the fuel rod is one of the key parameters for the transient fuel behavior. Through the analysis of the fuel performance data bases and sensitivity analyses of such parameters as rod power history, fast neutron flux, fuel enrichment and cycle length, which can affect the transient fuel behavior, a methodology generally applicable to find the allowable transient power level during the ANS Conditions I and II below which the mechanical integrity of the fuel rod is maintained was derived, and allowable transient power levels for the 17$\times$17 KOFA fuel rod have been determined as a function of the burnup. With the introduction of this methodology, design analysis of the transient fuel behavior currently being calculated every cycle can be replaced by the simple check of the peak transient power level achievable during the cycle, and an operational flexibility of the reactor can be obtained by allowing higher transient power level up to 689.5 w/cm at low burnup range than current maximum allowable transient power level, 591 w/cm for the 17$\times$17 KOFA fuel.

  • PDF

Efficient Management of Statistical Information of Keywords on E-Catalogs (전자 카탈로그에 대한 효율적인 색인어 통계 정보 관리 방법)

  • Lee, Dong-Joo;Hwang, In-Beom;Lee, Sang-Goo
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.4
    • /
    • pp.1-17
    • /
    • 2009
  • E-Catalogs which describe products or services are one of the most important data for the electronic commerce. E-Catalogs are created, updated, and removed in order to keep up-to-date information in e-Catalog database. However, when the number of catalogs increases, information integrity is violated by the several reasons like catalog duplication and abnormal classification. Catalog search, duplication checking, and automatic classification are important functions to utilize e-Catalogs and keep the integrity of e-Catalog database. To implement these functions, probabilistic models that use statistics of index words extracted from e-Catalogs had been suggested and the feasibility of the methods had been shown in several papers. However, even though these functions are used together in the e-Catalog management system, there has not been enough consideration about how to share common data used for each function and how to effectively manage statistics of index words. In this paper, we suggest a method to implement these three functions by using simple SQL supported by relational database management system. In addition, we use materialized views to reduce the load for implementing an application that manages statistics of index words. This brings the efficiency of managing statistics of index words by putting database management systems optimize statistics updating. We showed that our method is feasible to implement three functions and effective to manage statistics of index words with empirical evaluation.

  • PDF

Recruitment and Selection of Police Officials in the United States -the System and it's Implications- (미국 경찰관 모집·선발제도의 특징 및 함의)

  • Park, Dong-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.5
    • /
    • pp.384-392
    • /
    • 2011
  • Recruitment and selection are separate but mutually reinforcing processes. The goal of recruitment is to attract the largest number of applicants possible to apply to the agency, and selection is the process of weeding out unqualified candidates and identifying qualified candidates. In this context, the recruitment and selection system of police officials is an important issue because it affects their future performance as police officers on the job, especially their policing skills, perception of society, occupational ethics. This study suggested the characteristics of U. S. recruitment and selection system of police officials. In the U. S, each police agency sets up its own recruitment and selection standards and procedures. However, recruitment and selection process follows a certain sequence : receiving application, psychological examination, background check, polygraph test, drug screening, interview, physical agility, and medical test. Special characteristic of American police system regarding recruitment and selection is that many law enforcement agencies use a polygraph test to ensure the integrity of the candidates. Another interesting screening process is a drug test because many Americans abuse illegal drugs. A candidate officer must submit urine or a hair sample for screening test. Police human resources specialists should continually identify the most innovative tests and approaches recruit and select police officers. Recruitment and selection strategies should increasingly attract and retain those officers who have the attributes to work in a community-oriented policing environment.

A Comparison of American and Korean Experimental Studies on Positive Behavior Support within a Multi-Tiered System of Supports (다층지원체계 중심의 긍정적 행동지원에 관한 한국과 미국의 실험연구 비교분석)

  • Chang, Eun Jin;Lee, Mi-Young;Jeong, Jae-Woo;ChoBlair, Kwang-Sun;Lee, Donghyung;Song, Wonyoung;Han, Miryeung
    • Korean Journal of School Psychology
    • /
    • v.15 no.3
    • /
    • pp.399-431
    • /
    • 2018
  • The purpose of this study was to summarize the empirical literature on implementation of positive behavior support (PBS) within a multi-tiered system of supports in American and Korean schools and to compare its key features and outcomes in an attempt to suggest future directions for development of a Korean school-wide PBS model and implementation manuals as well as directions for future research. Twenty-four American articles and 11 Korean articles (total 35 articles) that reported the outcomes of implementation of PBS at a tier 1 and/or tier 2, or tier 3 level and that met established inclusion criteria were analyzed using systematic procedures. Comparisons were made in the areas of key features and outcomes of PBS in addition to general methodology (e.g., participants, design, implementation duration, dependent measures) at each tier of PBS. The results indicated that positive outcomes for student behavior and other areas were reported across tiers in all American and Korean studies. At the tier 1 level, teaching expectations and rules were the primary focus of PBS in American and Korean schools. However, Korean schools focused on modifying the school and classroom environments and teaching social skills whereas American schools focused on teacher training on standardized interventions or curricular by experts and teacher support during implementation of PBS. At the tier 2 level, more American studies reported implementation of tier 2 interventions within school-wide PBS, and Check/In Check/Out (CICO) was found to be the most commonly used tier 2 intervention. The results also indicated that in comparison to Korean schools, American schools were more likely to use systematic screening tools or procedures to identify students who need tier 2 interventions and more likely to promote parental involvement with implementing interventions. At the tier 3 level, more Korean studies reported the outcomes of individualized interventions, but more American studies reported that designing individualized intervention plans based on comprehensive functional behavior assessment results and establishment of systematic screening systems were focused when implementing individualized interventions. Furthermore, few Korean studies reported the assessment of procedural integrity, social validity, and contextual fit in implementing PBS across tiers, indicating the need for development of valid instruments that could be used in assessing these areas. Based on these results, limitations of the study and suggestions for future research are discussed.