• Title/Summary/Keyword: Leakage management

Search Result 668, Processing Time 0.029 seconds

Evaluation of Engineering Properties in Synthetic Polymer-Silica Sol Grout (합성폴리머 실라카졸 그라우트의 공학적 특성 평가)

  • Jang, Seong-Min;Jung, Hyuk-Sang;Kim, Jeong-Han;Min, Byung-Chan;Lee, Byeong-Seok
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.3
    • /
    • pp.29-39
    • /
    • 2022
  • The engineering characteristics of synthetic polymer-silica sol, which has the effect of reducing leakage, was evaluate and compared with typical grouting material, the water glass-based SGR injection material in this study. The result of the laboratory tests on strength and durability about the synthetic polymer-silica sol showed more than twice as high as LW-based injection materials in uniaxial compressive strength, significantly lower values in shrinkage rate and permeability. The result of pH was less than 8.5 (the drinking water quality standard). As a result of the leaching test, the Na2O elution amount of the synthetic polymer-silica sol was measured to be 3 to 4 times smaller than that of the water glass grout. These results be assumed that the synthetic polymer-silica sol has better durability and permeability than those of the typical water glass-based grout.

A Data Analysis and Visualization of AI Ethics -Focusing on the interactive AI service 'Lee Luda'- (인공지능 윤리 인식에 대한 데이터 분석 및 시각화 연구 -대화형 인공지능 서비스 '이루다'를 중심으로-)

  • Lee, Su-Ryeon;Choi, Eun-Jung
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.269-275
    • /
    • 2022
  • As artificial intelligence services targeting humans increase, social demands are increasing that artificial intelligence should also be made on an ethical basis. Following this trend, the government and businesses are preparing policies and norms related to artificial intelligence ethics. In order to establish reasonable policies and norms, the first step is to understand the public's perceptions. In this paper, social data and news comments were collected and analyzed to understand the public's perception related to artificial intelligence and ethics. Interest analysis, emotional analysis, and discourse analysis were performed and visualized on the collected datasets. As a result of the analysis, interest in "artificial intelligence ethics" and "artificial intelligence" favorability showed an inversely proportional correlation. As a result of discourse analysis, the biggest issue was "personal information leakage," and it also showed a discourse on contamination and deflection of learning data and whether computer-made artificial intelligence should be given a legal personality. This study can be used as data to grasp the public's perception when preparing artificial intelligence ethical norms and policies.

A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information (가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구)

  • Kim, Dong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • Recently, as personal information has been used as data, various new industries have been discovered, but cases of personal information leakage and misuse have occurred one after another due to insufficient systematic management system establishment. In addition, services that use personal information anonymously and anonymously have emerged since the enforcement of the Data 3 Act in August 2020, but personal information issues have arisen due to insufficient alias processing, safety measures for alias information processing, and insufficient hate expression. Therefore, this study proposed a new PbD principle that can be applied to the pseudonym information life cycle based on the Privacy by Design (PbD) principle proposed by Ann Cavoukian [1] of Canada to safely utilize personal information. In addition, the significance of the proposed method was confirmed through a survey of 30 experts related to personal information protection.

Efficient Attack Traffic Detection Method for Reducing False Alarms (False Alarm 감축을 위한 효율적인 공격 트래픽 탐지 기법)

  • Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.65-75
    • /
    • 2009
  • The development of IT technology, Internet popularity is increasing geometrically. However, as its side effect, the intrusion behaviors such as information leakage for key system and infringement of computation network etc are also increasing fast. The attack traffic detection method which is suggested in this study utilizes the Snort, traditional NIDS, filters the packet with false positive among the detected attack traffics using Nmap information. Then, it performs the secondary filtering using nessus vulnerability information and finally performs correlation analysis considering appropriateness of management system, severity of signature and security hole so that it could reduce false positive alarm message as well as minimize the errors from false positive and as a result, it raised the overall attack detection results.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

Drilling off the Petrosal Apex and Opening the Upper Wall of Meckel's Cave Are the Key Elements of Good Outcomes in the Treatment of Trigeminal Neuralgia Secondary to Petrous Apex Meningioma

  • Bai, Jie;Zhou, Yufan;Song, Gang;Ren, Jian;Xiao, Xinru
    • Journal of Korean Neurosurgical Society
    • /
    • v.65 no.3
    • /
    • pp.479-488
    • /
    • 2022
  • Objective : The surgical management of trigeminal neuralgia (TN) caused by petrous apex meningioma (PAM) is still a challenge because of the lesion's deep location and the surrounding complex structures. The authors describe the intradural anterior transpetrosal approach (ATPA) and its effect on the treatment of TN secondary to PAM. Methods : A retrospective analysis of 15 patients with TN secondary to PAM who underwent surgery via the intradural ATPA was conducted. The key techniques, which included drilling off the petrosal apex (PA) and opening the upper wall of Meckel's cave (MC), are described in detail. Results : Total removal of the tumor and complete pain relief (Barrow Neurological Institute I) were achieved in all 15 patients without significant morbidity. Five patients developed new facial numbness postoperatively, which disappeared within three months after surgery. The postoperative magnetic resonance imaging showed temporal lobe swelling in three patients, but no clinical symptoms. One patient had cerebrospinal fluid leakage and was managed with bed rest and temporary lumbar drainage. One patient had an intracranial infection and was treated with antibiotics. By the last follow up, no patients had pain relapse or/and tumor recurrence. It is worth noting that the vascular compression at the root of the trigeminal nerve was found in one patient during the operation. Conclusion : Our experience suggests that drilling off the PA and opening the upper wall of the MC are key elements for a good outcome of the treatment of TN secondary to PAM. The intradural ATPA has the advantages for both tumor resection and pain relief.

A Study on the Safety Improvement of City Gas Pressure Regulators in Apartment Housing (공동주택 등에 설치하는 도시가스 압력조정기의 안전성 향상에 관한 연구)

  • Youngman Yun;Yongchai Kwon;Kyungho Kim;Jihyun Jang
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.2
    • /
    • pp.86-94
    • /
    • 2023
  • This study was conducted with the purpose of preparing an alternative to improving the safety of civil pressure regulators installed instead of gas governors to supply city gas to apartment houses. First, problems were derived and solutions were presented by investigating the safety standards and installation status of domestic pressure regulators. In addition, using the DNV Phast-Safeti program, a quantitative risk assessment solution, risks such as gas leakage contained in pressure regulators installed in apartment houses and surrounding gas facilities were evaluated in terms of individual risks and societal risks, and measures were derived to reduce the risks in the installation and management of the pressure regulators.

A Design of Industrial Safety Service using LoRa Gateway Networks (LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.313-316
    • /
    • 2021
  • In the IoT(IoT: Internet of Things) environment, network configuration is essential to collect data generated from objects. Various communication methods are used to process data of objects, and wireless communication methods such as Bluetooth and WiFi are mainly used. In order to collect data of objects, a communication module must be installed to collect data generated from sensors or edge devices in real time. And in order to deliver data to the database, a software architecture must be configured. Data generated from objects can be stored and managed in a database in real time, and data necessary for industrial safety can be extracted and utilized for industrial safety service applications. In this paper, a network environment was constructed using a LoRa(LoRa: Long Range) gateway to collect object data, and a client/server data collection model was designed to collect object data transmitted from the LoRa module. In order to secure the resources necessary for data collection and storage management without data leakage, data collection should be possible in real time. As an application service, location data required for industrial safety can be stored and managed in a database in real time.

  • PDF

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

Evaluation of Microbial Analysis and Application of Reduction Technology in a Dairy Factory (목장형 유가공장의 미생물 분석 및 저감기술 적용 평가)

  • Jong-Hui Kim;Eun-Seon Lee;Bu-Min Kim;Jun-Sang Ham;Mi-Hwa Oh
    • Journal of Dairy Science and Biotechnology
    • /
    • v.41 no.4
    • /
    • pp.203-210
    • /
    • 2023
  • Bacterial contamination negatively affects the quality, functionality, and safety of dairy products. Adherent populations of bacteria, referred to as biofilms, grow on the surfaces of dairy processing equipment and are the primary cause of dairy contamination. In addition, microorganisms present in the farm environment and dairy factory can contaminate the Clear-In-Place (CIP) line through raw milk transport pipes; therefore, exhaustive management is required. In dairy manufacturing facilities, biofilm formation is controlled using CIP systems that primarily require sodium hydroxide and nitric acid. However, the leakage or incomplete removal of these potently active compounds can be harmful to humans. In the present study, we compared the eradication of Escherichia coli and other bacteria using commercially available combinations of sodium hypochlorite (NaClO) and citric acid, which are recognized by the Korean Ministry of Food and Drug Safety (MFDS) as food disinfectants. When considered in the CIP system of the field manufacturing process, E. coli was not detected (compared to detection before treatment), and other bacteria were detected at 0-32 culture-forming units (CFU)/cm2. The residual amount of chlorine ions after CIP treatment was similar to that in tap water, and there was no significant difference in the overall components of the fermented dairy products. Therefore, the NaClO/citric acid CIP system can be safely applied in dairy manufacturing processes.