• Title/Summary/Keyword: Leakage monitoring

Search Result 321, Processing Time 0.03 seconds

Applicability of the Multi-Channel Surface-soil CO2-concentration Monitoring (SCM) System as a Surface Soil CO2 Monitoring Tool (다채널 지표토양 CO2 농도 모니터링(SCM) 시스템 개발 및 적용성 평가 연구)

  • Sung, Ki-Sung;Yu, Soonyoung;Choi, Byoung-Young;Park, Jinyoung;Han, Raehee;Kim, Jeong-Chan;Park, Kwon Gyu;Chae, Gitak
    • Journal of Soil and Groundwater Environment
    • /
    • v.20 no.1
    • /
    • pp.41-55
    • /
    • 2015
  • Monitoring of $CO_2$ release through the ground surface is essential to confirm the safety of carbon storage projects. We conducted a feasibility study of the multi-channel surface-soil $CO_2$-concentration monitoring (SCM) system as a soil $CO_2$ monitoring tool with a small scale injection test. The background concentrations showed the distinct diurnal variation. The negative relation of $CO_2$ with temperature and the low $CO_2$ concentrations during the day imply that surface-soil $CO_2$ depends on photosynthesis and respiration. After 4.2 kg of $CO_2$ injection (1 m depth for 29 minutes), surface-soil $CO_2$ concentrations increased in the all five chambers, which were located less than 2.8 m of distance from each other. The $CO_2$ concentrations seem to be recovered to the background around 4 hours after the injection ended. To determine the leakage, the data from Chamber 2 and 5 with low increase rates were used for statistical analyses. Coefficient of variation for 30 minutes ($CV_{30min}$.) is efficient to determine a leakage signal, with reflecting the fast change in $CO_2$ concentrations. Consequently, SCM and $CV_{30min}$ could be applied for an efficient monitoring tool to detect $CO_2$ release through the ground surface. Also, this study provides ideas for establishing action steps after leakage detection.

Integrated Monitoring System using Log Data (로그 데이터를 이용한 통합모니터링 시스템)

  • Jeon, Byung-Jin;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.35-42
    • /
    • 2017
  • In this paper, we propose to implement an integrated monitoring system using log data to reduce the load of analysis task of information security officer and to detect information leak in advance. To do this, we developed a transmission module between different model DBMS that transmits large amount of log data generated by the individual security system (MSSQL) to the integrated monitoring system (ORACLE), and the transmitted log data is digitized by individual and individual and researches about the continuous inspection and measures against malicious users when the information leakage symptom is detected by using the numerical data.

A Study on leakage monitoring of tunnel linings using the electric resistivity survey (전기비저항탐사를 이용한 터널라이닝 누수조사 연구)

  • Shin, Jong-Ho;Shin, Yong-Seok;Yoon, Jong-Ryeol;Kim, Ho-Jong
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.10 no.3
    • /
    • pp.257-267
    • /
    • 2008
  • Tunnels acting as drains involve groundwater-related problems such as deterioration of drainage systems or leakage through the linings. Generally initial and minor leakage problems can not be recognized by naked eyes. When the leakage over the linings is noticed, damages to structures and facilities have already occurred and could be considerable. Therefore it is vital to recognize initial leakage as early as possible and provide appropriate measures. Detection of leakage under operation requires installing piezometer. However, that may cause destruction of water proofing sheet which is generally not allowed. In this study electric resistivity method, one of the geophysical surveys, was adopted to detect possible leakage through tunnel linings. Physical lining models were made in the laboratory. The electric response was monitored for varying hydraulic conditions. It is shown that the method is very useful to detect initial leakage and monitor the malfunction of drainage system. Furthermore the method can also be used to check the quality of any repairing works of linings.

  • PDF

Safety analysis and design of full balanced hoist vertical shiplifts

  • Liao, Lekang
    • Structural Engineering and Mechanics
    • /
    • v.49 no.3
    • /
    • pp.311-327
    • /
    • 2014
  • The safety relating to leakage of water and pitch instability of ship chambers of the full balanced hoist vertical shiplifts has been the focus of adoption of the type of vertical shiplifts. This paper aims to remove the doubts through theoretical and engineering researches. The leakage and pitch stability of ship chambers of full balanced hoist vertical ship lifts are investigated on the basis of theoretical analysis and exploration of engineering measures. Regarding the issue of leakage of ship chambers, a mathematical model on leaking process is built and corresponding formula and coping measures are obtained which can be applied in control program of ship lifts by linking with monitoring. The concept of safety grade is put forward to seek the best technical and economic index and the corresponding technical measures are for different grades of ship lift is suggested. For the issue of pitch instability, a methodology of combining theoretical deduction and summary of achievements of design and operation of the type of the full balanced hoist shiplifts is adopted, and the formula for design about pitch stability of ship chambers is derived.

Method to Analyze Information Leakage Malware using SSL Communication in Android Platform

  • Cho, Gilsu;Kim, Sangwho;Ryou, Jaecheol
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2018
  • Widely used around the world, smartphones contain many features and can store content such as contacts, photos, and videos. Information that can be leaked in proportion to the information that the smartphone can store has also been increased. In recent years, accidents such as personal information leakage have occurred frequently. Personal information leakage is happening in the Android environment, which accounts for more than half of the smartphone operating system market share. Analyzing malicious apps that leak information can tell you how to prevent information leakage. Malicious apps that leak information will send importantinformation to the hacker's (C & C) server, which will use network communication. Malicious apps that are emerging nowadays encrypt and transmit important information through SSL communication. In this case, it is difficult to knowwhat kind of information is exposed to network. Therefore, we suggest a method to analyze malicious apps when leak important information through SSL communication. In this paper, we identify the way malicious apps leak information. And we propose a method for analyzing information leaked by SSL communication. Data before encryption was confirmed in the device through SSL hooking and SSL Strip method.

A Design of File Leakage Response System through Event Detection (이벤트 감지를 통한 파일 유출 대응 시스템 설계)

  • Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.7
    • /
    • pp.65-71
    • /
    • 2022
  • With the development of ICT, as the era of the 4th industrial revolution arrives, the amount of data is enormous, and as big data technologies emerge, technologies for processing, storing, and processing data are becoming important. In this paper, we propose a system that detects events through monitoring and judges them using hash values because the damage to important files in case of leakage in industries and public places is serious nationally and property. As a research method, an optional event method is used to compare the hash value registered in advance after performing the encryption operation in the event of a file leakage, and then determine whether it is an important file. Monitoring of specific events minimizes system load, analyzes the signature, and determines it to improve accuracy. Confidentiality is improved by comparing and determining hash values pre-registered in the database. For future research, research on security solutions to prevent file leakage through networks and various paths is needed.

A STUDY ON THE SAFETY ANALYSIS OF ROCK FILL DAM (2) (필댐의 안정성 해석 연구 (II))

  • HoWoongShon;DaeKeunLee
    • Journal of the Korean Geophysical Society
    • /
    • v.6 no.3
    • /
    • pp.189-207
    • /
    • 2003
  • The purpose of this paper is to analyze the behavior and to study the safety evaluation of the Unmun Dam located in Cheongdo-Gun of GyeongBuk Province, Korea. For this purpose, soil analyses including boring data, geophysical surveys and monitoring the buried geotechnical gauges, such as pore-pressure gauge, earth-pressure gauge, displacement gauge, multi-layer settlement gauge, leakage flow-meter, were conducted. In addition to these data, numerical analyses of behavior of dam were performed to predict and to compare the data which were obtained from the above methods. Since many defects, such as gravel and weathered rock blocks in the dam core, and lots of amounts of leakage, by boring analyses were found, reinforcement by compaction grouting system (CGS) has been conducted in some range of dam. Some geotechnical gauge data were also used to confirm the effects of reinforcement. Analyses of monitoring the data of geotechnical gauges buried in the dam, such as pore-pressure gauge, earth-pressure gauge, displacement gauge, multi-layer settlement gauge, and leakage flow-meter shows the load transfer of dam and the possibility of hydraulic fracturing. As a conclusion, some problems in the dam found. Especially, the dam near spillway shows the high possibility of leakage. It should be pointed out that only the left side of he dam has not a leakage problem. As a whole, the dam has problems of weakness, because of unsatisfactory construction. It is strongly recommended that highly intensive monitoring is required.

  • PDF

Development of TDR-based Water Leak Detection Sensor for Seawater Pipeline of Ship (시간영역반사계를 이용한 해수배관시스템의 누수 탐지용 센서 개발 연구)

  • Hwang, Hyun-Kyu;Shin, Dong-Ho;Kim, Heon-Hui;Lee, Jung-Hyung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.6
    • /
    • pp.1044-1053
    • /
    • 2022
  • Time domain reflectometry (TDR) is a diagnostic technique to evaluate the physical integrity of cable and finds application in leak detection and localization of piping system. In this study, a cable-shaped leak detection sensor was proposed using the TDR technique for monitoring leakage detection of ship's engine room seawater piping system. The cable sensor was developed using a twisted pair arrangement and wound by an absorbent material. The availability and performance of the sensor for leak detection and localization were evaluated on a lab-scale pipeline set up. The developed sensor was installed onto the pipes and flanges of the lab-scale set up and various TDR waveforms were acquired and analyzed according to the dif erent variables including the number of twists and sheath thickness. The result indicated that the twisted cable sensor was able to produce clear and smooth signal as compared to the TDR sensor with a parallel arrangement. The optimal number of twist was determined to be above 10 per the unit length. The optimal diameter of sheath thickness that results in the desired sensitivity was determined to be ranging from 80% up to 120% of the diameter of the conductor. The linear regression analysis for estimation of leak localization was carried out to estimate the location of the leakage, and the result was a determination coefficient of 0.9998, indicating a positive relationship with the actual leakage point. The proposed TDR based leak detection method appears to be an effective method for monitoring leakage of ship's seawater piping system.

Development of Electrical Safety Monitoring System for Conventional Markets (재래시장 전기안전 감시시스템 개발)

  • Lee, Sang-Ick;Kim, Gi-Hyun;Bae, Seok-Myung
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.58 no.4
    • /
    • pp.552-556
    • /
    • 2009
  • This paper in order to reduce the electric disaster damage which is caused by with electric equipment of conventional markets is introduced the electric safety monitoring system which is suitable in conventional markets. Investigate the actual conditions about electrical equipment of conventional markets, electrical safety monitoring system was constructed. Electrical safety monitoring system to verify the performance of the experiment was to build a test bed. Research results will be used with the data for the reliability security of the electric safe system operation which follows in the conventional markets actual proof equipment construction which will be advanced.