• Title/Summary/Keyword: Leakage management

Search Result 669, Processing Time 0.033 seconds

Stability analysis on the concrete slab of the highest concrete-faced rock-fill dam in South Korea

  • Baak, Seung-Hyung;Cho, Gye-Chun;Song, Ki-Il
    • Geomechanics and Engineering
    • /
    • v.13 no.5
    • /
    • pp.881-892
    • /
    • 2017
  • Design and management of concrete slabs in concrete-faced rock-fill dams are crucial issues for stability and overall dam safety since cracks in the concrete face induced by stress, shrinkage, and deterioration can cause severe leakage from the reservoir into the dam. Especially, the increase of dam height to a certain level to enhance the storage capacity and to improve hydraulic stability can lead to undesirable deformation behavior and stress distribution in the existing dam body and in the concrete slabs. In such conditions, simulation of a concrete slab with a numerical method should involve the use of an interface element because the behavior of the concrete slab does not follow the behavior of the dam body when the dam body settles due to the increase of dam height. However, the interfacial properties between the dam body and the concrete slab have yet to be clearly defined. In this study, construction sequence of a 125 m high CFRD in South Korea is simulated with commercial FDM software. The proper interfacial properties of the concrete slab are estimated based on a comparison to monitored vertical displacement history obtained from the concrete slab. Possibility of shear strength failure under the critical condition is investigated based on the simplified model. Results present the significance of the interfacial properties of the concrete slab.

A Study on Determining the Priority of Supervising Mooring Line while 125K LNG Moss Type Discharging at Pyeong Taek Gas Terminal

  • Kim, Jong Sung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.3
    • /
    • pp.278-286
    • /
    • 2019
  • The Port of Pyeong Taek is located on the west coast, meaning that the difference between the rise and fall of tide is great (flood tide 1.8 to 2.9 knots, ebb tide 1.6 to 2.9 knots). Due to mainly N~NW'ly strong winds & high waves during winter, navigating as well as loading & discharging vessels must focus on cargo handling. The strong tidal and wind forces in the Port of Pyeong Taek can push an LNG carrier away from its berth, which will end up causing forced disconnection between the vessel's cargo line and shore-side loading arm. The primary consequence of this disconnection will be LNG leakage, which will lead to tremendous physical damage to the hull and shore-side equipment. In this study, the 125K LNG Moss Type ship docked at No. 1 Pier of the Pyeong Taek is observed, and the tension of the mooring line during cargo handling is calculated using a combination of wind and waves to determine effective mooring line and mooring line priority management. As a result if the wind direction is $90^{\circ}$ to the left and right of the bow, it was found that line monitoring should be performed bearing special attention to the Fore Spring Line, Fore Breast Line, and Aft Spring Line.

Efficient Resource Slicing Scheme for Optimizing Federated Learning Communications in Software-Defined IoT Networks

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.27-33
    • /
    • 2021
  • With the broad adoption of the Internet of Things (IoT) in a variety of scenarios and application services, management and orchestration entities require upgrading the traditional architecture and develop intelligent models with ultra-reliable methods. In a heterogeneous network environment, mission-critical IoT applications are significant to consider. With erroneous priorities and high failure rates, catastrophic losses in terms of human lives, great business assets, and privacy leakage will occur in emergent scenarios. In this paper, an efficient resource slicing scheme for optimizing federated learning in software-defined IoT (SDIoT) is proposed. The decentralized support vector regression (SVR) based controllers predict the IoT slices via packet inspection data during peak hour central congestion to achieve a time-sensitive condition. In off-peak hour intervals, a centralized deep neural networks (DNN) model is used within computation-intensive aspects on fine-grained slicing and remodified decentralized controller outputs. With known slice and prioritization, federated learning communications iteratively process through the adjusted resources by virtual network functions forwarding graph (VNFFG) descriptor set up in software-defined networking (SDN) and network functions virtualization (NFV) enabled architecture. To demonstrate the theoretical approach, Mininet emulator was conducted to evaluate between reference and proposed schemes by capturing the key Quality of Service (QoS) performance metrics.

Development of Automatic Shutdown and Recovery Device for Standby Power using Doppler Sensor (도플러 센서를 적용한 대기전력 자동 차단복구 장치)

  • Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.243-249
    • /
    • 2019
  • In this paper, we have developed a device to reduce the standby power consumption that is unnecessarily consumed in unused electrical appliances. The Doppler sensor is used to automatically power off and power off the outlet depending on whether or not a person is present near the outlet. The Doppler sensor uses a coaxial cable trap to design a transmitting antenna and emits a 10 GHz band RF signal and receives a reflected wave signal whose wavelength is reflected from the target object to the receiver to detect an object and recognize human approach. It automatically cuts off and restores standby power to prevent unnecessary power consumption, saving energy and developing a standby power automatic shutdown and recovery device that can prevent the risk of large fires caused by leakage current.

Dynamic Configuration and Operation of District Metered Areas in Water Distribution Networks

  • Bui, Xuan-Khoa;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.147-147
    • /
    • 2021
  • A partition of water distribution network (WDN) into district metered areas (DMAs) brings the efficiency and efficacy for water network operation and management (O&M), especially in monitoring pressure and leakage. Traditionally, the DMA configurations (i.e., number, shape, and size of DMAs) are permanent and cannot be changed occasionally. This leads to changes in water quality and reduced network redundancy lowering network resilience against abnormal conditions such as water demand variability and mechanical failures. This study proposes a framework to automatically divide a WDN into dynamic DMA configurations, in which the DMA layouts can self-adapt in response to abnormal scenarios. To that aim, a complex graph theory is adopted to sectorize a WDN into multiscale DMA layouts. Then, different failure-based scenarios are investigated on the existing DMA layouts. Here, an optimization-based model is proposed to convert existing DMA layouts into dynamic layouts by considering existing valves and possibly placing new valves. The objective is to minimize the alteration of flow paths (i.e., flow direction and velocity in the pipes) while preserving the hydraulic performance of the network. The proposed method is tested on a real complex WDN for demonstration and validation of the approach.

  • PDF

Water Distribution Network Partitioning Based on Community Detection Algorithm and Multiple-Criteria Decision Analysis

  • Bui, Xuan-Khoa;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.115-115
    • /
    • 2020
  • Water network partitioning (WNP) is an initiative technique to divide the original water distribution network (WDN) into several sub-networks with only sparse connections between them called, District Metered Areas (DMAs). Operating and managing (O&M) WDN through DMAs is bringing many advantages, such as quantification and detection of water leakage, uniform pressure management, isolation from chemical contamination. The research of WNP recently has been highlighted by applying different methods for dividing a network into a specified number of DMAs. However, it is an open question on how to determine the optimal number of DMAs for a given network. In this study, we present a method to divide an original WDN into DMAs (called Clustering) based on community structure algorithm for auto-creation of suitable DMAs. To that aim, many hydraulic properties are taken into consideration to form the appropriate DMAs, in which each DMA is controlled as uniform as possible in terms of pressure, elevation, and water demand. In a second phase, called Sectorization, the flow meters and control valves are optimally placed to divide the DMAs, while minimizing the pressure reduction. To comprehensively evaluate the WNP performance and determine optimal number of DMAs for given WDN, we apply the framework of multiple-criteria decision analysis. The proposed method is demonstrated using a real-life benchmark network and obtained permissible results. The approach is a decision-support scheme for water utilities to make optimal decisions when designing the DMAs of their WDNs.

  • PDF

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

A Case of Bronchoesophageal Fistula Treated by Bronchial Stent Insertion and Endoscopic Histoacryl Injection (기관 스텐트 삽입과 히스토아크릴 주입법으로 치료한 식도 누공 1례)

  • Dong Joon Oh;Joo Young Cho
    • Journal of Digestive Cancer Research
    • /
    • v.2 no.1
    • /
    • pp.21-23
    • /
    • 2014
  • We report a bronchoesophageal fistula that treat with bronchial stent insertion and histoacryl injection. A 52-year-old man with esophagel cancer was transferred for dysphagia management. At the CT scan that underwent on admission, esophageal cancer with multiple lymph node metastasis was observed. At the gastroduodenoscopy and contrast study, bronchoesophageal fistula was observed. Recurrent stent insertion treatment was failed, and then, By the broncoscopy, covered stent was inserted to right bronchus, and By the endoscopy, fibrin glue and histoacryl was injected in the fistula opening. At the contrast study, contrast leakage was not observed, and the patient was discharged. But, at the 14 days after discharge, the patient was admitted to the emerency room because of cough symptom whenever he eat food. The patient was diagnosed with aspiration pneumonia, we were determined that it is unable to oral intake. The patient received a jejunostomy and antibiotic treatment for aspiration pneumonia. He was discharged after symptomatic improvement.

  • PDF

Federated Learning Based on Ethereum Network (이더리움 네트워크 기반의 연합학습)

  • Seung-Yeon Hwang;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.191-196
    • /
    • 2024
  • Recently, research on intelligent IoT technology has been actively conducted by various companies and research institutes to analyze various data collected from IoT devices and provide it through actual application services. However, security issues such as personal information leakage may arise in the process of transmitting and receiving data to use data collected from IoT devices for research and development. In addition, as data collected from multiple IoT devices increases, data management difficulties exist, and data movement is costly and time consuming. Therefore, in this paper, we intend to develop an Ethereum network-based federated learning system with guaranteed reliability to improve security issues and inefficiencies in a federated learning environment composed of various devices.

Countermeasures against Security Threats on Smart Device in Educational Institutions (교육기관에서의 스마트단말기 보안위협에 대한 대응방안)

  • In Ho Lee;Tae-Sung Kim
    • Journal of Information Technology Services
    • /
    • v.23 no.2
    • /
    • pp.13-29
    • /
    • 2024
  • Recently, with the rapid spread of mobile terminals such as smartphones and tablet PCs, social demand for mobile information security is increasing as new security issues that are difficult to predict as well as service evolution and lifestyle changes are raised. Smart terminals include smartphones, smart pads, chromebooks, laptops, etc. that provide various functions such as phone calls, text messages, Internet browsing, social media apps, games, and education. Along with the explosive spread of these smart terminals, they are naturally being used in our daily life and educational environment. In the mobile environment, behind the convenience of portability, there are more various security threats and vulnerabilities than in the general PC environment, and threats such as device loss, information leakage, and malicious codes exist, so it is necessary to take fundamental security measures at a higher level. In this study, we suggest ways to improve security by identifying trends in mobile smart information security and effectively responding to security threats to the mobile environment. In addition, it presents implications for various measures for effective class utilization along with correct security management methods and security measures related to the supply of smart devices that the Office of Education is promoting for schools at each level.