• Title/Summary/Keyword: Leakage management

Search Result 668, Processing Time 0.038 seconds

Electrical and Fire Prevention Measures through Improvement of Indoor Wiring, Outlets and Plugs (옥내배선, 콘센트 및 플러그 개선을 통한 전기화재 예방대책)

  • Jeung, Sueng Hyo;An, Hui-Seok;Lee, Yong-Su;Kim, Chang-Eun
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.1 no.1
    • /
    • pp.31-39
    • /
    • 2018
  • It is reported that about 20 % of all fires in Korea are caused by the electric equipment and installations. In complex and large-scale buildings, the sizes of electric fires are becoming larger as property damage and casualties increase. Among the causes of various electric fires, fire by short circuit accounts for about 71.5% of overall fires, and in the classification by electric equipment and installation, fire caused by wiring and wiring equipment accounts for approximately 38.3% of overall fires. The purpose of this study is to propose methods to prevent electric fires due to short circuit by improving indoor wiring currently in use and to find the fundamental measures to prevent wiring equipment caused fires by improving the socket and plug which are commonly used in wiring equipment. It is expected that the electric fire prevention measures presented through this study can be used as a measure to protect many people and properties by eliminating the root cause of electric fire.

Oil Storage Tank Inspection using 3D Laser Scanner (3D 레이저스캐너를 활용한 유류 저장탱크의 검사)

  • Park, Joon-Kyu;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.867-872
    • /
    • 2020
  • Oil storage tanks are a major structure in chemical industrial complexes. Damage to the structure due to natural disasters or poor management can cause additional damage, such as leakage of chemicals, fire, and explosion, so it is essential to understand the deformation. In this study, data on oil storage tanks were acquired using a 3D laser scanner, and various analyzes were performed for storage tank management by comparing them with design data. Modeling of the oil storage tank was performed using the data and design drawings acquired by a 3D laser scanner. An inspection of the oil storage tank was effectively performed by overlapping. In addition, cross-sectional and exploded views of the deformation were produced to generate visible data on the deformation of the facility, and it was suggested that the oil storage tank had a maximum deformation of -7.16mm through quantitative analysis. Data that can be used for additional work was obtained by producing drawings to be precisely inspected for areas with large deformation. In the future, an inspection of oil storage tanks using 3D laser scanners is quantitative and visible data on oil storage tank deformation. This will greatly improve the efficiency of facility management by rebuilding it.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Seasonal Paddy Management Options for the Safe Use of Golden Apple Snails (Pomacea canaliculata) in Eco-friendly Rice Cultivation (친환경 벼 재배지에서 왕우렁이(Pomacea canaliculata) 안전사용을 위한 시기별 논 관리요령)

  • Lee, Jin-Hee;Choi, Duck-Soo;Kim, Hyo-Jeong․;Cho, A-Hae;Kim, Ji-In;Hong, Sung-Jun
    • Korean Journal of Organic Agriculture
    • /
    • v.31 no.4
    • /
    • pp.413-426
    • /
    • 2023
  • These experiments were conducted for 3 years from 2021 to 2023 to develop a method that can be safely used to prevent the leakage of Golden apple snails (Pomacea canaliculata) from eco-friendly rice plantations. In the southern part of Jeollanam-do, after planting rice, the young golden apple snails placed in the rice field become adults around mid-July and begin spawning. These individuals can overwinter in drains that do not dry out, but individuals hatched after mid-July will not mature enough to overwinter. The size of golden apple snails overwintered in the drainage canal was more than 2.5cm in shell height. Installing a net at the inlet could block 95% of the inflow of snails, and 99% of outflow was blocked by installing an improved water trap and net at the drain. During the mid-drying period and pre-harvest drying period, a water path was created with a power paddy pottery machine. 59.5% of snails were attracted to the waterway, and it took 130 minutes to build the waterway and collect the snails. Based on these results, seasonal paddy management tips for the safe use of giant snails in rice fields were suggested.

Authentication Protocol based on Credential for Implantable Medical Device (체내 삽입장치를 위한 위임장 기반의 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.259-264
    • /
    • 2014
  • Body insertion due to the recent development of sensor technology, the device is attached patients to receive medical services from anywhere, anytime environment is changing. Body insertion devices for the hospital, the patient's vital information attached personnel (doctors, nurses, pharmacists, etc.) to pass, however, when a problem occurs, a patient's information to a third party that can be exploited easily exposed. In this paper, we proposed signature authentication protocols mandate based on the patient's power of attorney from the center of the u-Healthcare services, hospital officials FormHelper third party disguised as a patient, the hospital patient information easily obtained from the officials to prevent. The proposed protocol, the patient's sensitive information to a third party, do not expose the patient's sensitive information to the random number generated by the u-Healthcare service centers and patients hash signature key to encrypt sensitive information of patients. From third parties to maintain synchronization between the patients and the hospital personnel in order to prevent patient information from being exploited illegally by the patient's vital information leakage can be prevented.

Laparoscopic Primary Repair with Omentopexy for Duodenal Ulcer Perforation: A Single Institution Experience of 21 Cases

  • Ma, Chung Hyeun;Kim, Min Gyu
    • Journal of Gastric Cancer
    • /
    • v.12 no.4
    • /
    • pp.237-242
    • /
    • 2012
  • Purpose: Despite the great advances in laparoscopic techniques, most active general surgeons do not apply laparoscopic surgery in the treatment of duodenal ulcer perforation when facing a real-life emergency. Therefore, our study was designed to evaluate the feasibility of laparoscopic surgery in duodenal ulcer perforation, and provide a step-by-step protocol with tips and recommendations for less experienced surgeons. Materials and Methods: Between March, 2011 and May, 2012, 21 patients presenting with duodenal ulcer perforation underwent laparoscopic primary repair with omentopexy. There were no contraindications to perform laparoscopic surgery, and the choice of primary repair was decided according to the size of the perforation. The procedure for laparoscopic primary repair with omentopexy consisted of peritoneal lavage, primary suture, and omentopexy using a knot pusher. Results: During the operation, no conversion to open surgery or intra-operative events occurred. The median operation time was 45.0 minutes (20~80 minutes). Median day of commencement of a soft diet was day 6 (4~17 days). After surgery, the median hospital stay was 8.0 days (5~27 days). Postoperative complications occurred in one patient, which included a minor leakage. This complication was resolved by conservative management. Conclusions: Although our study was carried out on a small number of patients at a single institution, we conclude that laparoscopic primary repair can be an effective surgical method in the treatment of duodenal ulcer perforation. We believe that the detailed explanation of our procedure will help beginners to perform laparoscopic primary repair more easily.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

Short Segment Pedicle Screw Fixation with Augmented Intra-Operative Vertebroplasty in Unstable Thoraco-Lumbar Fracture - Preliminary Report - (불안정성 흉·요추부 골절에 대한 단 분절 척추경 나사못 고정술 및 추체 보강 성형술 - 예 비 보 고 -)

  • Kim, Young Woo;Oh, Sung Han;Yoon, Do Heum;Chin, Dong Kyu;Cho, Yong Eun;Kim, Young Soo
    • Journal of Korean Neurosurgical Society
    • /
    • v.30 no.11
    • /
    • pp.1271-1277
    • /
    • 2001
  • Objectives : Since vertebroplasty has been introduced, we performed short segment pedicle screw fixation with augmented intra-operative vertebroplasty in patients with unstable thoraco-lumbar fracture. Our intentions are to demonstrate the efficacy and indication of this new technique compare to conventional methods. Material and Methods : The surgery comprised of pedicle screw fixations on one level above and below the fracture site, and the fractured level itself, if pedicle is intact, and intra-operative vertebroplasty under the fluoroscopic guide with in-situ postero-lateral bone graft. Also, in cases of bone apposition, we removed those with small impactor through a transfascetal route. During the last 2 years, we performed in seven(7) unstable thoraco-lumbar fracture patients who consisted of two different characteristics, those four(4) with primary or secondary osteoporosis and three(3) of young and very healthy. All patients were followed clinically by A.S.I.A. score and radiography. Results : Mean follow up period was 14 months. We observed well decompressed state via transfascetal route in cases of bone fragments apposition and no hardware pullout in osteoporotic cases, no poly-methyl-methacrylate (PMMA) leakage through the fracture sites into the spinal canal, and no kyphotic deformities in both cases during follow-up periods. All patients demonstrated solid bony fusion except one following osteoporotic compression fracture on other sites. Conclusions : In the management of unstable thoraco-lumbar fracture, we believe that this short segment pedicle screw fixation with augmented intra-operative vertebroplasty reduce the total length or levels of pedicle screw fixation without post-operative kyphotic deformity.

  • PDF

Windows 7 Operating System Event based Visual Incident Analysis System (윈도우즈 7 운영체제 이벤트에 대한 시각적 침해사고 분석 시스템)

  • Lee, Hyung-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.223-232
    • /
    • 2012
  • Recently, the leakage of personal information and privacy piracy increase. The victimized case of the malicious object rapidlies increase. Most of users use the windows operating system. Recently, the Windows 7 operating system was announced. Therefore, we need to study for the intrusion response technique at the next generation operate system circumstances. The accident response technique developed till now was mostly implemented around the Windows XP or the Windows Vista. However, a new vulnerability problem will be happen in the breach process of reaction as the Windows 7 operating system is announced. In the windows operating system, the system incident event needs to be efficiently analyzed. For this, the event information generated in a system needs to be visually analyzed around the time information or the security threat weight information. Therefore, in this research, we analyzed visually about the system event information generated in the Windows 7 operating system. And the system analyzing the system incident through the visual event information analysis process was designed and implemented. In case of using the system developed in this study the more efficient accident analysis is expected to be possible.

A Study on the Advancement of the Contingency Plan upon Prediction of Toxicity Damage Considering Seasonal Characteristics (계절 특성을 고려한 독성 피해예측에 따른 위기대응 고도화에 관한 연구)

  • Hwang, Man Uk;Hwang, Yong Woo;Lee, Ik Mo;Min, Dal Ki
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.23-32
    • /
    • 2016
  • Today the issue of deterioration of industrial complexes that are located close to life space of residents has been raised as a cause of threats to the safety of local communities. In this study, in order to improve the current risk analysis and scope of community notification, simulated threat zones were comparatively analyzed by utilizing the threat zones of alternative accident scenarios and modes of seasonal weather, and the area with a high probability of damage upon the leakage of toxic substances was predicted by examining wind directions observed at each time slot for each season. In addition, limit evacuation time and minimum separation distance to minimize casualties were suggested, and a proposal to enable more reasonable safety measures for on-site workers and nearby residents made by reviewing the risk management plan currently utilized for emergency response.