• 제목/요약/키워드: Leakage management

검색결과 657건 처리시간 0.027초

전차선로용 피뢰기 진단기법 적용 연구 (Practical diagnostic technique for catenary surge arrester in electric railway)

  • 한문섭;장동욱;정호성;길경석
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 B
    • /
    • pp.1631-1633
    • /
    • 2005
  • This paper describes the measurement result of leakage current flowing arrestors connected in catenary line to propose an optimal management methods. 27 arrestors set in 7 locations were tested. The leakage currents are included a harmonics of electric train during the operation of electric train in feeding section and in case of feeding earthing system.

  • PDF

Pediatric Minor Traumatic Brain Injury : Growing Skull Fracture, Traumatic Cerebrospinal Fluid Leakage, Concussion

  • Choi, Jong-Il;Kim, Sang-Dae
    • Journal of Korean Neurosurgical Society
    • /
    • 제65권3호
    • /
    • pp.348-353
    • /
    • 2022
  • Traumatic brain injury (TBI) is a major public health issue that causes significant morbidity and mortality in the pediatric population. Pediatric minor TBIs are the most common and are widely underreported because not all patients seek medical attention. The specific management of these patients is distinct from that of adult patients because of the different physiologies in these age groups. This article focuses on minor TBIs, particularly growing skull fractures, traumatic cerebrospinal fluid leakage, and concussion.

IoT 기술을 활용한 스마트 물관리 필요성에 관한 연구 (Research Regard to Necessity of Smart Water Management Based on IoT Technology)

  • 최영환;김영렬
    • 한국산업정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.11-18
    • /
    • 2017
  • 본 논문은 소비자에게 공급되는 수돗물의 공급시설(Water Supply Network)에 IoT 기술을 활용하여 소비자의 물 사용량을 원격으로 검침하고, 공급시설의 누수를 줄여서 원가를 절감하는 스마트 물관리(Smart Water Management) 기술의 적용효과를 검증하였다. SWM 실증모형은 수돗물 공급시설에 원격 누수감지센서, 스마트 미터링(Smart Metering), 초소형 멀티센서를 설치하고, 원격에서 운영현황을 실시간으로 감시하고 소비자에게 수돗물 사용량과 수질을 스마트폰 앱으로 제공하였다. 이때, 소비자가 수돗물 사용량 정보를 이용하여 수돗물을 아껴 쓰는지, 수돗물 수질정보를 이용하여 직접 음용하는지를 조사하였다. 특히, 본 연구에서는 SWM을 실증 적용함으로써 공급시설의 유수율 향상, 수돗물 음용률 향상, 소비자 민원 감소, 운영비용 절감, 수돗물 사용량 절감이 달성되는지를 검증하는데 목적이 있다. 또한 수돗물 공급시설의 IoT 센서, 운영자 모니터링 시스템, 이상발생시 탐사복구 솔루션이 융합된 하나의 SWM 모델을 수립하였으며, 관련 기술 개발을 통해 국내 물산업을 육성하고, SWM을 선진수준으로 확산하였다는데 의의가 있다고 하겠다.

LPG 이송작업시 인적과오에 대한 사상수목분석

  • 김호영;김성영;임현교
    • 한국산업안전학회:학술대회논문집
    • /
    • 한국안전학회 1998년도 춘계 학술논문발표회 논문집
    • /
    • pp.277-284
    • /
    • 1998
  • LPG refueling include a lot of risk done by human beings, dealing with highly combustible gas, so, during the refueling, the leakage initiated by human errors can result in a catastrophic accident. Therefore, this research tried to show what kind of tasks would include the high probability of the human errors and what should be considered for effective safety management in the LPG refueling. At first, 4 typical cases were taken through surveying various accident cases, and then a prototype of the refueling task was presented. And each task was analysed by FTA and ETA. The results showed that overpressure occupies 64.64% of the major reasons for gas leakage, and its probability was approximately 6.62E-06. Among the tasks, gas leakage resulted from mal-assembly of lorry hoses had the highest rate, and human errors related to opening and closing valves of pipe lines were most frequent. Also, the effects of confirming tasks were analyzed quantitatively.

  • PDF

New Security Layer for OverLay Networks

  • Imai, Hideki;Shin, Seong-Han;Kobara, Kazukuni
    • Journal of Communications and Networks
    • /
    • 제11권3호
    • /
    • pp.211-228
    • /
    • 2009
  • After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakageresilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.

An improved cross-correlation method based on wavelet transform and energy feature extraction for pipeline leak detection

  • Li, Suzhen;Wang, Xinxin;Zhao, Ming
    • Smart Structures and Systems
    • /
    • 제16권1호
    • /
    • pp.213-222
    • /
    • 2015
  • Early detection and precise location of leakage is of great importance for life-cycle maintenance and management of municipal pipeline system. In the past few years, acoustic emission (AE) techniques have demonstrated to be an excellent tool for on-line leakage detection. Regarding the multi-mode and frequency dispersion characteristics of AE signals propagating along a pipeline, the direct cross-correlation technique that assumes the constant AE propagation velocity does not perform well in practice for acoustic leak location. This paper presents an improved cross-correlation method based on wavelet transform, with due consideration of the frequency dispersion characteristics of AE wave and the contribution of different mode. Laboratory experiments conducted to simulate pipeline gas leakage and investigate the frequency spectrum signatures of AE leak signals. By comparing with the other methods for leak location identification, the feasibility and superiority of the proposed method are verified.

전장관리체계 전자결재시스템을 위한 역할기반 스토리지 암호화 기법 (A Role-based Storage Encryption for the Electronic Approval System of Battle Management Systems)

  • 허경순;이수진
    • 한국국방경영분석학회지
    • /
    • 제37권1호
    • /
    • pp.71-85
    • /
    • 2011
  • 전장관리체계의 전자결재시스템은 가용성과 신뢰성이 최우선이기 때문에 서버와 스토리지를 가장 신뢰성 있게 구축하지 위해 SAN(Storage Area Network)을 이용하고 있다. 본 논문에서는 전장관리체계 내 전자결재 시스템에서 중요한 군사자료가 저장되는 SAN을 대상으로 보안취약점을 분석하고, 분석된 결과를 바탕으로 가상 공격 시나리오를 작성하여 내부자에 의한 자료 유출이 가능할 수 있음을 실험을 통해 검증한 후, 내부자에 의한 자료 유출 위협을 방지할 수 있는 새로운 개념의 사용자 역할 기반 스토리지 암호화 기법을 제안한다.

PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지) (Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information))

  • 채현탁;이상진
    • 정보보호학회논문지
    • /
    • 제24권5호
    • /
    • pp.961-968
    • /
    • 2014
  • 내부자에 의한 개인정보유출 사고를 방지하기 위하여 다수의 기업은 문서 DRM(Digital Right Management), DLP(Data Loss Prevention), 개인정보 검색시스템 등과 같은 PC보안솔루션을 지속적으로 도입하여 운영하고 있다. 하지만 이러한 투자에도 불구하고 개인정보유출 사건들은 지속적으로 발생하고 있다. PC보안솔루션의 단순 구축이 아닌 기업에 적합한 보안 정책을 사전에 수립하고 정책에 맞는 시스템을 운영한다면 개인정보유출 사고를 미연에 방지할 수 있을 것이다. 또한 로그분석을 통하여 수립한 보안정책의 효과성을 검증할 수 있으며 로그분석결과를 바탕으로 보안정책의 수정 보완이 가능할 것이다. 본 논문은 다양한 PC보안솔루션 중 개인정보유출 방지를 위해 PC에 필수 설치되는 보안솔루션을 정의하고, 필수보안 솔루션을 개인정보보호 관점에서 통합 운영하는 방안, 그리고 로그분석을 통해 개인정보유출 사고 방지를 위한 효과적인 보안정책을 제안하고자 한다.

H/W 정보의 인증을 통한 내부정보유출 방지 기법 (A Authentication technique of Internal Information Hacking Protection based on H/W Information)

  • 양선옥;최낙귀;박재표;최형일
    • 디지털산업정보학회논문지
    • /
    • 제5권1호
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.

국방 정보시스템 환경에서 정보유출 방지를 위한 보안성이 강화된 문서 DRM 설계에 관한 연구 (A Study on An Architecture of the Security improved Document DRM for preventing Information Leakage in Military Information System Environment)

  • 엄정호
    • 디지털산업정보학회논문지
    • /
    • 제7권1호
    • /
    • pp.41-49
    • /
    • 2011
  • We designed a security improved document DRM for protecting document based military information which is transmitted in the military information system environment. The user should be could not access document which not related to his/her role and duty, and must view the only document appropriate for his/her role and security level according to the security level of document. We improved the security of document DRM by adding to the access control module in DRM server. Our system allows operation mode authorizations for the document, considering the user's role & security level and the security level of document. And it prevents indiscriminate access to the document and damage the confidentiality and integrity of information.