• Title/Summary/Keyword: Leakage information

Search Result 1,513, Processing Time 0.026 seconds

A Parametric Study of Pulsed Gamma-ray Detectors Based on Si Epi-Wafer (실리콘 에피-웨이퍼 기반의 펄스감마선 검출센서 최적화 연구)

  • Lee, Nam-Ho;Hwang, Young-Gwan;Jeong, Sang-Hun;Kim, Jong-Yeol;Cho, Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1777-1783
    • /
    • 2014
  • In this paper, we designed and fabricated a high-speed semiconductor sensor for use in power control devices and analyzed the characteristics with pulsed radiation tests. At first, radiation sensitive circular Si PIN diodes with various diameters(0.1 mm ~5.0 mm) were designed and fabricated using Si epitaxial wafer, which has a $42{\mu}m$ thick intrinsic layer. The reverse leakage current of the diode with a radius of 2 mm at a reverse bias of 30 V was about 20.4 nA. To investigate the characteristic responses of the developed diodes, the pulsed gamma-radiation tests were performed with the intensity of 4.88E8 rad(Si)/sec. From the test results showing that the output currents and the rising speeds have a linear relationship with the area of the sensors, we decided that the optimal condition took place at a 2 mm diameter. Next, for the selected 2 mm diodes, dose rate tests with a range of 2.47E8 rad(Si)/sec to 6.21E8 rad(Si)/sec were performed. From the results, which showed linear characteristics with the radiation intensity, a large amount of photocurrent over 60mA, and a high speed response under 350ns without saturation, we can conclude that the our developed PIN diode can be a good candidate for the sensor of power control devices.

A Study on Efficiency of Local Water Supply Service Contracting by Data Envelopment Analysis and Malmquist Index (DEA 및 Malmquist 지수를 이용한 물자원사업 민간위탁경영기관에 관한 효율성 분석)

  • Kim, Hee-Kyung;Lee, Chang-Won
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.89-111
    • /
    • 2017
  • The era of today's day is that the era of the black gold age is now approaching the era of the blue gold age. As the importance of water increases, support and policies for the water industry are presented. The water industry is a public service industry but it faces the problem for unbalanced supply between users. One of solutions for solving the problem at hand is the privatization of the public service and it is the most sensitive and focused subject to the issue. Korea is also coming up for the privatization of the water industry. So, one of the privatization operations based on the privatization of the current waterworks law is management contract by the specialized organization and it is in progress to enhance the efficiency of public services. Therefore, this study aims at finding out the local water supply services' efficiency by K-Water using DEA(Data Envelopment Analysis), and productivity analysis by malmquist index on 18 organizations of the implementation of local water supply management contract using the date from 2012 to 2014. According to the result of the DEA, 10 of the 18 organizations were the most efficient during 3 years and malmquist index for analysing the productivity was decreasing. That is because of the leakage ratio and utilization ratio of the raw water and both of them are significant to productivity. As a result, this study differs from the previous studies by analysing efficiency and productivity using DEA and malmquist index to the solution for the problem faced by current water industry.

  • PDF

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

System Software Design of Computed Tomography Radiation Dose Management (컴퓨터 단층촬영(CT) 방사선 노출 관리 시스템 소프트웨어 설계)

  • Yang, Yu-mi;Lee, Kil-hung;Cho, Sang-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.489-492
    • /
    • 2014
  • This thesis provides the design of system software for the management of radiation dose that is generated using computer tomography(CT). Because radiation exposure is different depending on the difference in sensitivity to each part for each of the patient's body, if we will be able to manage an appropriate amount of radiation, it is possible to estimate the radiation exposure of the patient as a result. Recently, radiation leakage incident of Japanese nuclear power plant was in the news internationally and there is a growing interest not only a nuclear power plant, to medical radiation exposure. In spite of the fact that currently safety management of radiation is under control only the workers of the radiation involved, exposure management of patients until now have been required. Surgery and inspection using the radiation in Korea will increase, due to this medical exposure has increased, but it is a reality that medical institution don't know the level of radiation exposure applied to the patient. Therefore a system for managing the radiation exposure of the patient from the medical institution is required. This paper proposes a design of a software program to manage the radiation exposure of CT is an typical imaging tool to use the radiation in the medical institution. By check the amount of radiation dose and set the limit of dose, we would help to optimize the medical exposure of the patient.

  • PDF

Deep Learning-based Object Detection of Panels Door Open in Underground Utility Tunnel (딥러닝 기반 지하공동구 제어반 문열림 인식)

  • Gyunghwan Kim;Jieun Kim;Woosug Jung
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.665-672
    • /
    • 2023
  • Purpose: Underground utility tunnel is facility that is jointly house infrastructure such as electricity, water and gas in city, causing condensation problems due to lack of airflow. This paper aims to prevent electricity leakage fires caused by condensation by detecting whether the control panel door in the underground utility tunnel is open using a deep learning model. Method: YOLO, a deep learning object recognition model, is trained to recognize the opening and closing of the control panel door using video data taken by a robot patrolling the underground utility tunnel. To improve the recognition rate, image augmentation is used. Result: Among the image enhancement techniques, we compared the performance of the YOLO model trained using mosaic with that of the YOLO model without mosaic, and found that the mosaic technique performed better. The mAP for all classes were 0.994, which is high evaluation result. Conclusion: It was able to detect the control panel even when there were lights off or other objects in the underground cavity. This allows you to effectively manage the underground utility tunnel and prevent disasters.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Proposal for Ignition Source and Flammable Material Safety Management through 3D Modeling of Hazardous Area: Focus on Indoor Mixing Processes (폭발위험장소 구분도의 3D Modeling을 통한 점화원 및 가연물 안전관리 방안 제안: 실내 혼합공정을 중심으로)

  • Hak-Jae Kim;Duk-Han Kim;Young-Woo Chon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.47-59
    • /
    • 2024
  • Purpose: This study aims to propose measures for the prevention of fire and explosion accidents within manufacturing facilities by improving the existing classification criteria for hazardous locations based on the leakage patterns of flammable liquids. The objective is to suggest ways to safely manage ignition sources and combustible materials. Method: The hazardous locations were calculated using "KS C IEC 60079-10-1," and the calculated explosion hazard distances were visualized in 3D. Additionally, the formula for the atmospheric dispersion of flammable vapors, as outlined in "P-91-2023," was utilized to calculate the dispersion rates within the hazardous locations represented in 3D. Result: Visualization of hazardous locations in 3D enabled the identification of blind spots in the floor plan, facilitating immediate recognition of ignition sources within these areas. Furthermore, when calculating the time taken for the Lower Explosive Limit (LEL) to reach within the volumetric space of the hazardous locations represented in 3D, it was found that the risk level did not correspond identically with the explosion hazard distances. Conclusion: Considering the atmospheric dispersion of flammable liquids, it was concluded that safety management should be conducted. Therefore, a method for calculating the concentration values requiring detection and alert based on realistically achievable ventilation rates within the facility is proposed.

Annotation-guided Code Partitioning Compiler for Homomorphic Encryption Program (지시문을 활용한 동형암호 프로그램 코드 분할 컴파일러)

  • Dongkwan Kim;Yongwoo Lee;Seonyoung Cheon;Heelim Choi;Jaeho Lee;Hoyun Youm;Hanjun Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.7
    • /
    • pp.291-298
    • /
    • 2024
  • Despite its wide application, cloud computing raises privacy leakage concerns because users should send their private data to the cloud. Homomorphic encryption (HE) can resolve the concerns by allowing cloud servers to compute on encrypted data without decryption. However, due to the huge computation overhead of HE, simply executing an entire cloud program with HE causes significant computation. Manually partitioning the program and applying HE only to the partitioned program for the cloud can reduce the computation overhead. However, the manual code partitioning and HE-transformation are time-consuming and error-prone. This work proposes a new homomorphic encryption enabled annotation-guided code partitioning compiler, called Heapa, for privacy preserving cloud computing. Heapa allows programmers to annotate a program about the code region for cloud computing. Then, Heapa analyzes the annotated program, makes a partition plan with a variable list that requires communication and encryption, and generates a homomorphic encryptionenabled partitioned programs. Moreover, Heapa provides not only two region-level partitioning annotations, but also two instruction-level annotations, thus enabling a fine-grained partitioning and achieving better performance. For six machine learning and deep learning applications, Heapa achieves a 3.61 times geomean performance speedup compared to the non-partitioned cloud computing scheme.

Characteristics of the ( Pb, La ) $TiO_3$ Thin Films with Pb/La Compositions (Pb/La 조성에 따른 ( Pb, La ) $TiO_3$ 박막의 특성 변화)

  • Kang, Seong-Jun;Joung, Yang-Hee;Yoon, Yung-Sup
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.1
    • /
    • pp.29-37
    • /
    • 1999
  • In this study, we have prepared PLT thin films having various La concentrations by using sol-gel method and studied on the effect of La concentration on the electrical properties of PLT thin films. As the La concentration increases from 5mol% to 28mol%, the dielectric constant at 10kHz increases from 428 to 761, while the loss tangent decreases from 0.063 to 0.024. Also, the leakage current density at 150kV/cm has a tendency to decrease from 6.96${\mu}A/cm^2$ to 0.79${\mu}A/cm^2$. In the result of hysteresis loops of PLT thin films, the remanent polariation and the coercive field decrease from 9.55${\mu}C/cm^2$ to 1.10${\mu}C/cm^2$ and from 46.4kV/cm to 13.7kV/cm, respectively. With the result of the fatigue test on the PLT thin films, we have found that the fatigue properties are improved remarkably as the La concentration increases from 5 mol% to 28mol%. In particular, the PLT28) has paraelectric phase and its charge storage clensity and leakage current density at 5V are 134fC/${\mu}cm^2$ and 1.01${\mu}A/cm^2$, respectively. The remanent polarization and coercive field of the PLT(10) film are 6.96${\mu}C/cm^2$ and 40.2kV/cm, respectively. After applying of $10^9$ square pulses with ${\pm}5V$, the remanent polarilzation of the PLT(10) film decreases about 20% from the initial state. In the results, we conclude that the 10mol% and the 28mol% La doped PLT thin films are very suitable for the capacitor dielectrics of new generation of DRAM and NVFRAM respecitively.

  • PDF

Priority Analysis of Cause Factors of Safety Valve Failure Mode Using Analytical Hierarchy Process (AHP를 활용한 안전밸브(PSV) 고장모드의 Cause Factors 우선순위 분석)

  • Kim, Myung Chul;Lee, Mi Jeong;Lee, Dong Geon;Baek, Jong-Bae
    • Korean Chemical Engineering Research
    • /
    • v.60 no.3
    • /
    • pp.347-355
    • /
    • 2022
  • The safety valve (PSV) is a safety device that automatically releases a spring when the pressure generated by various causes reaches the set pressure, and is restored to a normal state when the pressure falls below a certain level. Periodic inspection and monitoring of safety valves are essential so that they can operate normally in abnormal conditions such as pressure rise. However, as the current safety inspection is performed only at a set period, it is difficult to ensure the safety of normal operation. Therefore, evaluation items were developed by finding failure modes and causative factors of safety valves required for safety management. In addition, it is intended to provide decision-making information for securing safety by deriving the priority of items. To this end, a Delphi survey was conducted three times to derive evaluation factors that were judged to be important in relation to the Failure Mode Cause Factor (FMCFs) of the safety valve (PSV) targeting 15 experts. As a result, 6 failure modes of the safety valve and 22 evaluation factors of its sub-factors were selected. In order to analyze the priorities of the evaluation factors selected in this way, the hierarchical structure was schematized, and the hierarchical decision-making method (AHP) was applied to the priority calculation. As a result of the analysis, the failure mode priorities of FMCFs were 'Leakage' (0.226), 'Fail to open' (0.201), 'Fail to relieve req'd capacity' (0.152), 'Open above set pressure' (0.149), 'Spuriously' 'open' (0.146) and 'Stuck open' (0.127) were confirmed in the order. The lower priority of FMCFs is 'PSV component rupture' (0.109), 'Fail to PSV size calculation' (0.068), 'PSV Spring aging' (0.065), 'Erratic opening' (0.059), 'Damage caused by improper installation and handling' (0.058), 'Fail to spring' (0.053), etc. were checked in the order. It is expected that through efficient management of FMCFs that have been prioritized, it will be possible to identify vulnerabilities of safety valves and contribute to improving safety.