• Title/Summary/Keyword: Leakage detection model

Search Result 70, Processing Time 0.024 seconds

A Study on the Simulation of Leak Flow-rate Using Isothermal Chamber (등온화용기를 이용한 누설유량 시뮬레이션에 관한 연구)

  • Ji, S.W.;Jang, J.S.
    • Journal of Power System Engineering
    • /
    • v.14 no.5
    • /
    • pp.71-75
    • /
    • 2010
  • Leak detection technology is a challenging research until nowadays, because it has wide and various applications in industry. Furthermore pneumatic component reliability test based on ISO requires air leakage measurement. The conventional measurement methods need a complex operation and the calibration of leak detector. Tracing the history of our study, we proposed a new method for measurement of leak flow rate using isothermal chamber. In this study, propose a simulation model of isothermal chamber by infinitesimal flow -rate, such as a leak flow-rate. The effectiveness of the proposed simulation model is proved by simulation and experimental results. Base on the comparison results, proposed simulation model is good agreement with experimental results.

A scheme of leak detection model in a reservoir pipeline valve system using wavelet coherence analysis of injected pressure wave (주입 압력파의 웨이블릿 일관성 분석을 사용한 저수조-관로-밸브 시스템에서의 누수탐지모형 연구)

  • Ko, Dongwon;Lee, Jeongseop;Kim, Jinwon;Kim, Sanghyun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.35 no.1
    • /
    • pp.15-25
    • /
    • 2021
  • In this study, a method of leakage detection was proposed to locate leak position for a reservoir pipeline valve system using wavelet coherence analysis for an injected pressure wave. An unsteady flow analyzer handled nonlinear valve maneuver and corresponding experimental result were compared. Time series of pressure head were analyzed through wavelet coherence analysis both for no leak and leak conditions. The leak information can be obtained through either time domain reflectometry or the difference in wavelet coherence level, which provide predictions in terms of leak location. The reconstructed pressure signal facilitates the identification of leak presence comparing with existing wavelet coherence analysis.

Research on Artificial Intelligence Based De-identification Technique of Personal Information Area at Video Data (영상데이터의 개인정보 영역에 대한 인공지능 기반 비식별화 기법 연구)

  • In-Jun Song;Cha-Jong Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.19 no.1
    • /
    • pp.19-25
    • /
    • 2024
  • This paper proposes an artificial intelligence-based personal information area object detection optimization method in an embedded system to de-identify personal information in video data. As an object detection optimization method, first, in order to increase the detection rate for personal information areas when detecting objects, a gyro sensor is used to collect the shooting angle of the image data when acquiring the image, and the image data is converted into a horizontal image through the collected shooting angle. Based on this, each learning model was created according to changes in the size of the image resolution of the learning data and changes in the learning method of the learning engine, and the effectiveness of the optimal learning model was selected and evaluated through an experimental method. As a de-identification method, a shuffling-based masking method was used, and double-key-based encryption of the masking information was used to prevent restoration by others. In order to reuse the original image, the original image could be restored through a security key. Through this, we were able to secure security for high personal information areas and improve usability through original image restoration. The research results of this paper are expected to contribute to industrial use of data without personal information leakage and to reducing the cost of personal information protection in industrial fields using video through de-identification of personal information areas included in video data.

An Analysis of Geophysical and Temperature Monitoring Data for Leakage Detection of Earth Dam (흙댐의 누수구역 판별을 위한 물리탐사와 온도 모니터링 자료의 해석)

  • Oh, Seok-Hoon;Suh, Baek-Soo;Kim, Joong-Ryul
    • Journal of the Korean earth science society
    • /
    • v.31 no.6
    • /
    • pp.563-572
    • /
    • 2010
  • Both multi-channel temperature monitoring and geophysical electric survey were performed together for an embankment to assess the leakage zone. Temperature variation according to space and time on the inner parts of engineering constructions (e.g.: dam and slope) can be basic information for diagnosing their safety problem. In general, as constructions become superannuated, structural deformation (e.g.: cracks and defects) could be generated by various factors. Seepage or leakage of water through the cracks or defects in old dams will directly cause temperature anomaly. This study shows that the position of seepage or leakage in dam body can be detected by multi-channel temperature monitoring using thermal line sensor. For that matter, diverse temperature monitoring experiments for a leakage physical model were performed in the laboratory. In field application of an old earth fill dam, temperature variations for water depth and for inner parts of boreholes located at downstream slope were measured. Temperature monitoring results for a long time at the bottom of downstream slope of the dam showed the possibility that temperature monitoring can provide the synthetic information about flowing path and quantity of seepage of leakage in dam body. Geophysical data by electrical method are also added to help interpret data.

Optimal Machine Learning Model for Detecting Normal and Malicious Android Apps (안드로이드 정상 및 악성 앱 판별을 위한 최적합 머신러닝 기법)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • The mobile application based on the Android platform is simple to decompile, making it possible to create malicious applications similar to normal ones, and can easily distribute the created malicious apps through the Android third party app store. In this case, the Android malicious application in the smartphone causes several problems such as leakage of personal information in the device, transmission of premium SMS, and leakage of location information and call records. Therefore, it is necessary to select a optimal model that provides the best performance among the machine learning techniques that have published recently, and provide a technique to automatically identify malicious Android apps. Therefore, in this paper, after adopting the feature engineering to Android apps on official test set, a total of four performance evaluation experiments were conducted to select the machine learning model that provides the optimal performance for Android malicious app detection.

Multivariate Outlier Removing for the Risk Prediction of Gas Leakage based Methane Gas (메탄 가스 기반 가스 누출 위험 예측을 위한 다변량 특이치 제거)

  • Dashdondov, Khongorzul;Kim, Mi-Hye
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.12
    • /
    • pp.23-30
    • /
    • 2020
  • In this study, the relationship between natural gas (NG) data and gas-related environmental elements was performed using machine learning algorithms to predict the level of gas leakage risk without directly measuring gas leakage data. The study was based on open data provided by the server using the IoT-based remote control Picarro gas sensor specification. The naturel gas leaks into the air, it is a big problem for air pollution, environment and the health. The proposed method is multivariate outlier removing method based Random Forest (RF) classification for predicting risk of NG leak. After, unsupervised k-means clustering, the experimental dataset has done imbalanced data. Therefore, we focusing our proposed models can predict medium and high risk so best. In this case, we compared the receiver operating characteristic (ROC) curve, accuracy, area under the ROC curve (AUC), and mean standard error (MSE) for each classification model. As a result of our experiments, the evaluation measurements include accuracy, area under the ROC curve (AUC), and MSE; 99.71%, 99.57%, and 0.0016 for MOL_RF respectively.

A General Acoustic Drone Detection Using Noise Reduction Preprocessing (환경 소음 제거를 통한 범용적인 드론 음향 탐지 구현)

  • Kang, Hae Young;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.881-890
    • /
    • 2022
  • As individual and group users actively use drones, the risks (Intrusion, Information leakage, and Sircraft crashes and so on) in no-fly zones are also increasing. Therefore, it is necessary to build a system that can detect drones intruding into the no-fly zone. General acoustic drone detection researches do not derive location-independent performance by directly learning drone sound including environmental noise in a deep learning model to overcome environmental noise. In this paper, we propose a drone detection system that collects sounds including environmental noise, and detects drones by removing noise from target sound. After removing environmental noise from the collected sound, the proposed system predicts the drone sound using Mel spectrogram and CNN deep learning. As a result, It is confirmed that the drone detection performance, which was weak due to unstudied environmental noises, can be improved by more than 7%.

Design of Intrusion Detection System Using the Circuit Patrol to protect against information leakage through Mobile access (모바일 접근에 의한 정보 누출을 막기 위한 Circuit Patrol 침입탐지 시스템 설계)

  • 장덕성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.46-52
    • /
    • 2002
  • Trend of wire internet has been transferred to wireless internet gradually due to the spread of mobile phone which made Possible Mobility and portability which wire internet could not afford. Not only front line of business part can access business information but also people can use government information for their daily life without limit of place. The frequent report of larceny and misuse of information has been issued to social sector that the need for IDS considering wire wireless internet. In this paper to design IDS to protect information first, searched wire internet intrusion type, intrusion detection method, and wireless intrusion type. In this paper, first, separate abnormal access at the point of system landing and detect intrusion attack with disguise through mobile wireless internet. Due to the intruder can access system normally with disguise, Circuit Patrol model has been suggested to monitor from intrusion attack.

  • PDF

Development of ETSS for the SG Secondary Side Loose Part Signal Detection and Characterization (SG전열관 2차측 이물질 검출 및 특성분석을 위한 ETSS 개발)

  • Shin, Ki Seok;Moon, Yong Sig;Min, Kyong Mahn
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.7 no.3
    • /
    • pp.61-66
    • /
    • 2011
  • The integrity of the SG(Steam Generator) tubes has been challenged by numerous factors such as flaws, operation, atmosphere, inherently degraded materials, loose parts and even human errors. Of the factors, loose parts(or foreign materials) on the secondary side of the tubes can bring about volumetric defects and even leakage from the primary to the secondary side in a short period of time. More serious concerns about the loose parts are their unknown influx path and rapid growth rate of the defects affected by the loose parts. Therefore it is imperative to detect and characterize the foreign materials and the defects. As a part of the measures for loose part detection, TTS(Top of Tubesheet) MRPC(Motorized Rotating Pancake Coils) ECT has been carried out especially to the restricted high probability area of the loose part. However, in the presence of loose parts in the other areas, wide range loose part detection techniques are required. In this study, loose part standard tube was presented as a way to accurately detect and characterize loose part signals. And the SG tube ECT bobbin coil and MRPC ISI(In-service Inspection) data of domestic OPR-1000 and Westinghouse Model F(W_F) were reviewed and consequently, comprehensive loose part detection technique is derived especially by applying bobbin coil signals

Distortion of Resistivity Data Due to the 3D Geometry of Embankment Dams (저수지 3차원 구조에 의한 전기비저항 탐사자료의 왜곡)

  • Cho, In-Ky;Kang, Hyung-Jae;Kim, Ki-Ju
    • Geophysics and Geophysical Exploration
    • /
    • v.9 no.4
    • /
    • pp.291-298
    • /
    • 2006
  • Resistivity method is a practical and effective geophysical technique to detect leakage zones in embankment dams. Generally, resistivity survey conducted along the crest assumes that the embankment dam has a 2D structure. However, the 3D topography of embankments distorts significantly resistivity data measured on anywhere of the dam. In this study, we analyse the influence from 3D effects created by specific dam geometry through the 3D finite element modeling technique. We compared 3D effects when resistivity surveys are carried out on the upstream slope, left edge of the crest, center of the crest, right edge of the crest and downstream slope. We ensure that 3D effect is greatly different according to the location of the survey line and data obtained on the downstream slope are most greatly influenced by 3D dam geometry. Also, resistivity data are more influenced by the electrical resistivity of materials constituting reservoir than 3D effects due to specific dam geometry. Furthermore, using resistivity data synthesized with 3D modeling program for an embankment dam model with leakage zone, we analyse the possibility of leakages detection from 2D resistivity surveys performed along the embankment dam.