• Title/Summary/Keyword: Leakage verification

Search Result 122, Processing Time 0.026 seconds

The direction and formation of carbonized conductive path according to surface leakage between electrodes (전극간 표면누설에 의한 탄화도전로의 생성과 방향성)

  • Shong, Kil-Mok;Han, Woon-Ki;Lee, Ki-Yoen;Kwak, Hee-Ro
    • Proceedings of the KIEE Conference
    • /
    • 2006.07c
    • /
    • pp.1525-1526
    • /
    • 2006
  • Electrical current always travels through the minimum resistance path. In this paper, we are studied on the direction and formation of carbonized conductive path according to surface leakage between electrodes. The analysis of characteristics of the arc discharge as surface is broken down between exposed live parts. Using the HSIS(high speed imaging system, 100,000fps, redlake ltd., USA), it took photographs by arc growth mechanism occurred in on/off surge, ground fault and discharge between electrodes. Therefore, it recommended for results of technology development and application such as theoretic verification of an arc direction and economic security according to a technology about connecting arc generation in surfaces of insulators. Hereafter, it expected effects that application of energy utility technology through the arc control.

  • PDF

Simple Technique Reducing Leakage Current for H-Bridge Converter in Transformerless Photovoltaic Generation

  • Kot, Radoslaw;Stynski, Sebastian;Stepien, Krzysztof;Zaleski, Jaroslaw;Malinowski, Mariusz
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.153-162
    • /
    • 2016
  • Given their structural arrangement, photovoltaic (PV) modules exhibit parasitic capacitance, which creates a path for high-frequency current during zero-state switching of the converter in transformerless systems. This current has to be limited to ensure safety and electromagnetic compatibility. Many solutions that can minimize or completely avoid this phenomenon, are available. However, most of these solutions are patented because they rely on specific and often complex converter topologies. This study aims to solve this problem by introducing a solution based on a classic converter topology with an appropriate modulation technique and passive filtering. A 5.5 kW single-phase residential PV system that consists of DC-DC boost stage and DC-AC H-bridge converter is considered. Control schemes for both converter stages are presented. An overview of existing modulation techniques for H-bridge converter is provided, and a modification of hybrid modulation is proposed. A system prototype is built for the experimental verification. As shown in the study, with simple filtering and proper selection of switching states, achieving low leakage current level is possible while maintaining high converter efficiency and required energy quality.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Smartphone Forensic of Military Data Information Leakage (군사자료 정보유출의 스마트폰 포렌식 연구)

  • Kim, Yong-youn;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.238-241
    • /
    • 2022
  • North Korea launched an ICBM and declared Moratorium for the September 19 military talks. The Armed Forces must protect military security for national defense and security. The Ministry of National Defense, which received a hacking attack from North Korea, must protect its military security even more. Recently, the leakage of military data through smartphones is occurring through smartphones. Officers and non-commissioned officers can use smartphones while working. Therefore, smartphone forensics is required to check information leakage of military data from smartphones. In this study, forensic leaks of military data from the Galaxy S20 model of S company. Research integrity verification for securing smartphone forensic evidence, securing metadata, and adopting evidence. This study will contribute to the development of military security and forensic technology.

  • PDF

A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch (갤럭시 워치를 중심으로 본 스마트워치 활용 기술유출의 위험성 및 대응방안에 대한 연구)

  • Seungjae Jeon;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.893-906
    • /
    • 2023
  • Awareness that smartphones can be used as tools for criminal activity is prevalent in many organizations, but the functionally smartphone-like smartwatch's potential as a criminal tool is being overlooked. Considering this situation, this research verifies the possibility of information leakage through an insider's smartwatch in a situation where smartphones are controlled by security regulations and technologies, but smart watch are not. By analyzing information related application usage and Wi-Fi connection generated in the smartwatch during the verification process, forensic information and limitations are identified. Finally, this research proposes preventive methods to prepare for potential smartwatch-related crimes, and reconsiders awareness of the possibility of using smartwatches as criminal tools.

A Study on the Reliability Evaluation System for O-ring of Semiconductor Equipments (반도체장비용 오링의 종합 신뢰성 평가기술에 관한 연구)

  • 김동수;김광영;최병오;박화영
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.613-617
    • /
    • 2001
  • The test items like as endurance, air leakage and oil endurance test is requested for reliability evaluation about O-ring which is a kind of core machinery accessories of semi-conduct manufacturing equipment. For verification of these, we design and manufactured a test system for endurance, air leakage and oil endurance of O-ring for semi-conduct manufacturing equipment, and also performed the test for two kinds of O-ring, as it were Viton and Kalretz. The characteristics of this test equipment consist in realization of the test conditions of semi-conduct manufacturing equipment and satisfying the test method. The test conditions are cut gas, vacuum grade, temperature and revolution numbers in the endurance test system, vacuum grade and temperature in the air leakage test system, temperature and time in the oil endurance test system. The separating test results for wearing which is an oil endurance test item, the wearing index of domestic produced Viton O-ring is higher than foreign product by 2%, wearing rate of Kalretz O-ring better than Viton O-ring by 17%, and particles existed in various place. The test result of air leakage which is measured through the RGA sensor used Helium, the vacuum grade was $10^-3$Torr. And the test result of oil endurance, the volume change rate was 7~15%. Hereafter, we intend to analysis the reliability test evaluation and to utilize for domestic manufacturing companies by establishing data base and developing reliability softwares.

  • PDF

Development of Leakage Judgment Technique based on Pressure Data of Smart Gas Meter (스마트 가스 계량기 압력 데이터 기반 누출 판단 기법 개발)

  • Jung-Hoon Kim;Jung-Suk Oh;Jin-Han Lee
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.2
    • /
    • pp.57-64
    • /
    • 2023
  • As the meter reading method of gas meters develops, smart gas meters capable of remote meter reading (leak checking meters and multi-function safety meters) are being used. These meters have a function to judge leakage by utilizing the flow rate and pressure data collected as an additional function. Leakage judgment function using flow rate data has valid cases in the actual field, but the pressure data-based leakage judgment standard is based on not only the pressure value change due to leakage but also various factors (pressure regulator pressure, connection with adjacent meters, usage of adjacent houses, location of meters, etc.). There is a problem with pressure magnitude changes (levels). In this paper, as a technique that can judge leaks by using pressure data collected from smart gas meters, it was developed through preprocessing of pressure data, criteria for pressure value ranges related to leaks, leak judgment techniques, and application case verification.

De-Identified Face Image Generation within Face Verification for Privacy Protection (프라이버시 보호를 위한 얼굴 인증이 가능한 비식별화 얼굴 이미지 생성 연구)

  • Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.201-210
    • /
    • 2023
  • Deep learning-based face verificattion model show high performance and are used in many fields, but there is a possibility the user's face image may be leaked in the process of inputting the face image to the model. Althoughde-identification technology exists as a method for minimizing the exposure of face features, there is a problemin that verification performance decreases when the existing technology is applied. In this paper, after combining the face features of other person, a de-identified face image is created through StyleGAN. In addition, we propose a method of optimizingthe combining ratio of features according to the face verification model using HopSkipJumpAttack. We visualize the images generated by the proposed method to check the de-identification performance, and evaluate the ability to maintain the performance of the face verification model through experiments. That is, face verification can be performed using the de-identified image generated through the proposed method, and leakage of face personal information can be prevented.

Computational and Experimental Investigation on U-type Seal of Hydraulic Actuator (유압액추에이터용 U자형 시일의 해석 및 실험적 고찰)

  • Yoo, Myung-Ho;Kwon, Jong-Ho;Lee, Taek-Sung
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.12 s.189
    • /
    • pp.80-87
    • /
    • 2006
  • Seals are usually made from elastomer, a kind of rubber, and it has the non-linearity and hyper-elasticity. U-type seals are used to prevent the leakage of internal fluid sealed in hydraulic actuator because they have more excellent performance than O-rings or rectangular seals. As a core part of hydraulic actuator, U-type seal gives much effect on performance and reliability of actuator. This study considers an NBR U-type seal under high pressure of a hydraulic actuator, and provides its deformation, stress-strain characteristic and contact force using the non-linear finite element analysis. Analysis results are compared with the experimental ones performed by the self-developed testing equipment. Verification result shows that this study presents a good application process for the effective design of U-type seals under high operation pressure.

Selection and Verification of Press Forming Pipe Model using Pipefitting (피팅용 프레스 포밍 파이프 성형 모델 선정 및 검증)

  • Kim, TaeGual;Kim, TaeHo;Park, JoonHong;Park, YoungChul
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.14 no.3
    • /
    • pp.43-49
    • /
    • 2015
  • This paper describes the design of a forged fitting form to acquire a method of product design measurement by target measurement standards. The pipefitting connects each pipe and combines seals and nipples with the pipes normally. Therefore, the section combined with the fitting pipe was measured by a 3D scanner, and the acquired measurement and the design measurement were obtained after modification of the forged fitting pipe by that standard. Moreover, the accuracy of the model was verified through leakage testing of the oil and verification of the design measurement for accuracy decisions on the design measurement after modification of the product.