• Title/Summary/Keyword: Leaks

Search Result 450, Processing Time 0.022 seconds

Clinical Efficacy of Radiation-Sterilized Allografts for Sellar Reconstruction after Transsphenoidal Surgery

  • Kim, Se-Jin;Jeon, Chi-Man;Kong, Doo-Sik;Park, Kwan;Kim, Jong-Hyun
    • Journal of Korean Neurosurgical Society
    • /
    • v.50 no.6
    • /
    • pp.503-506
    • /
    • 2011
  • Objective : The aim of this study was to assess the safety and efficacy of radiation-sterilized allografts of iliac bone and fascia lata from cadaver specimens to repair skull base defects after transsphenoidal surgery. Methods : Between May 2009 and January 2010, 31 consecutive patients underwent endonasal transsphenoidal surgery and all patients received sellar reconstruction using allografts following tumor removal. The allografts were obtained from the local tissue bank and harvested from cadaver donors. The specimens used in our approach were tensor fascia lata and the flat area of iliac bone. For preparation, allografts were treated with gamma irradiation after routine screening by culture, and then stored at $-70^{\circ}C$. Results : The mean follow-up period after surgery was 12.6 months (range, 7.4-16 months). Overall, postoperative cerebrospinal fluid (CSF) leaks occurred in three patients (9.7%) and postoperative meningitis in one patient (3.2%). There was no definitive evidence of wound infection at the routine postoperative follow-up examination or during re-do surgery in three patients. Postoperative meningitis in one patient was improved with the use of antibiotics and prolonged CSF diversion. Conclusion : We suggest that allograft materials can be a feasible alternative to autologous tissue grafts for sellar reconstruction following transsphenoidal surgery under selected circumstances such as no or little intraoperative CSF leaks.

Privacy Disclosure and Preservation in Learning with Multi-Relational Databases

  • Guo, Hongyu;Viktor, Herna L.;Paquet, Eric
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.183-196
    • /
    • 2011
  • There has recently been a surge of interest in relational database mining that aims to discover useful patterns across multiple interlinked database relations. It is crucial for a learning algorithm to explore the multiple inter-connected relations so that important attributes are not excluded when mining such relational repositories. However, from a data privacy perspective, it becomes difficult to identify all possible relationships between attributes from the different relations, considering a complex database schema. That is, seemingly harmless attributes may be linked to confidential information, leading to data leaks when building a model. Thus, we are at risk of disclosing unwanted knowledge when publishing the results of a data mining exercise. For instance, consider a financial database classification task to determine whether a loan is considered high risk. Suppose that we are aware that the database contains another confidential attribute, such as income level, that should not be divulged. One may thus choose to eliminate, or distort, the income level from the database to prevent potential privacy leakage. However, even after distortion, a learning model against the modified database may accurately determine the income level values. It follows that the database is still unsafe and may be compromised. This paper demonstrates this potential for privacy leakage in multi-relational classification and illustrates how such potential leaks may be detected. We propose a method to generate a ranked list of subschemas that maintains the predictive performance on the class attribute, while limiting the disclosure risk, and predictive accuracy, of confidential attributes. We illustrate and demonstrate the effectiveness of our method against a financial database and an insurance database.

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

Experimental Study on Prediction and Diagnosis of Leakage and Water Absorption in Water-Cooled Generator Stator Windings by Drying Process Analysis (수냉각 발전기 고정자 권선의 건조 과정 분석을 통한 누설 및 흡습 예측 진단에 관한 실험적 연구)

  • Kim, Hee-Soo;Bae, Yong-Chae;Lee, Wook-Ryun;Lee, Doo-Young
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.34 no.9
    • /
    • pp.867-873
    • /
    • 2010
  • The failure of water-cooled generator stator windings as a result of insulation breakdown due to coolant water leaks and water absorption often occurs worldwide. Such failure can cause severe grid-related accidents as well as huge economic losses. More than 50% of domestic generators have been operated for over 15 years, and therefore, they exhibit signs of aging. Leaking and water-absorbing windings are often found during an overhaul. In an existing method for evaluating the integrity of generator stator windings, the drying process of the interior of the windings is ignored and only final leak tests are performed. In this study, it is shown that water leaks and water absorption in stator windings can be detected indirectly through vacuum pattern analysis in the vacuum drying mode, which is the used in the preparation stage of the leak test.

Optimal Sensor Placement for Rapid Detecting in Chemical Leak Accident (화학물질의 누출에서 빠른 감지를 위한 센서 배치 최적화)

  • Cho, Jaehoon;Kim, Hyunseung;Kim, Taeok;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.20 no.2
    • /
    • pp.66-71
    • /
    • 2016
  • Nowadays, a number of sensors which are placed in industrial complex are monitoring areas involving chemical leak and other faults. However, even in the presence of the sensors, chemical leaks, sometimes involving huge amount of chemicals, continuously led to big losses in the industrial complex. In most industries, sensor installation has been performed using past experience or using senor manufacturers' guideline; which leads to poor performance of the installed sensor grid. Therefore, we investigate an optimal placement methodology of point sensors for rapid detention and response when chemical leaks happen. This research suggests a generalized formulation suitable for the optimized decision making of minimizing number of sensors to be placed and increasing the fraction of covered scenarios under assumption of negligible effect of other structures. The proposed method has been verified for suitable performance for simple leak scenario simulations, by achieving the safety objectives and guaranteeing safe process operations.

Elastic Wave Detection using Fiber Optic FBG Sensor (광섬유 FBG 센서를 이용한 탄성파 검출)

  • Seo, Dae-Cheol;Kwon, Il-Bum;Yoon, Dong-Jin;Lee, Seung-Suk;Lee, Jung-Ryul
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.30 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Acoustic emission(AE) has emerged as a powerful nondestructive tool to detect or monitor preexisting defects and leaks in the vessel structures. A Bragg grating based acoustic emission sensor system is developed. Various type of fiber Bragg grating sensor including the variable length of sensing part was fabricated and prototype sensor system was tested by using PZT pulser and pencil lead break sources. Two types of sensor attachment were used. First, the fiber Bragg grating sensor was attached fully to the surface using bonding agent. Second one is that one part of fiber was attached to the surface partly by bonding and the other part of fiber will be act as a cantilever. That is, the resonant frequency of the fiber Bragg grating sensor will depend on the length of sensing part. The final goal of the sensor system is to provide on-line monitoring of cracks or leaks in reactor vessel head penetration of nuclear power plants.

A Study on the Explosive Sleeving of A Repair for Defective Tube/Tubeplate on the Nuclear Steam Generator (원자력 증기발생기 결함 세관 보수용 폭발 sleeving에 관한 연구)

  • 이병일;강정윤;이상래
    • Explosives and Blasting
    • /
    • v.17 no.4
    • /
    • pp.8-17
    • /
    • 1999
  • Unfortunately leaks occur in heat exchangers periodically, usually at the tube to tubeplate joint. The usual method of repair is to plug off the defective area and isolate the tubes of concern from the circuit. If the leaks continua the thermal capacity of the units is progressively reduced and for this reason the alternative of using an internal bridging sleeve has been examined. This paper discusses the overall development activities that has been found necessary to bring this repair procedure to a successful conclusion for use on the nuclear steam generator. In this work we have investigated optimum explosives and explosive quality, explosive sleeving's thickness, the design of sheath stress relieving heat treatment pull-out load, hydraulic leakage, stress corrosion cracking properties. The results obtain are as follows : (1) The optimum explosives and explosive qualities are PETN and about 15~40 gr/ft of explosive sleeving in nuclear steam generator. (2) Explosive sleeving's thickness is 1.1~l.4mm, If groove of 0.35mm formed in sleeve outside existed, For the hydraulic leakage is go up, explosive sleeving of formed groove are applicate tube and turnplate. (3) If the stress relieving heat treatment are experiment in $750^\circ{C}$, $850^\circ{C}$, 15 minutes Pull-out strength of sleeving 1,500~2,300kg, hydraulic leakage is $250kg/cm^2$.

  • PDF

Effects of the Recognition of Business Information Protection Activities in Ranks on Leaks of Industrial Secretes (직위에 따른 기업정보보호활동인식이 산업기밀유출에 미치는 영향)

  • Choi, Panam;Han, Seungwhoon
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.475-486
    • /
    • 2015
  • The objective of this study is to analyze control factors in protecting activities of business information that affects the effects of protecting leaks of industrial secretes during business security works in the ranks of staffs. A regression analysis was implemented by 36 items of protecting activities of information and 10 items of preventing industrial secretes for a total of 354 users and managers who use internal information systems in governments, public organizations, and civilian enterprises. In the recognition of protecting activities of business information that affects the prevention of controlling industrial secretes, clerks showed recognitions in physical control, environmental control, and human resource control, and software control and assistant chiefs showed recognitions in hardware control and environmental control. Also, ranks of department managers and higher levels represented recognitions in security control activities. It showed that clerks, assistant chiefs, and above department managers show effects of technical control factors on protecting activities of industrial secretes but section chiefs represent system control factors in preventing industrial secretes.

Effect of the Private Security Guard Unethical work ethic on job attitude and customer service (민간경비원의 비윤리적 직업의식이 직무태도 및 고객서비스에 미치는 영향)

  • Kang, Kyoung-Soo;Kim, Sang-Jin
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.55-64
    • /
    • 2011
  • This study is to investigate the relationship of the effect of the private security guard unethical work ethic on job attitude and customer service. We extracted about 450 people examples after the Selection of the private security guard's in active service in Seoul in 2010, and totally 412 people examples were used. This study carried out factorial analysis, reliability analysis, correlation analysis, multiple regression analysis and pass analysis using SPSSWIN 16.0. The followings are conclusions. First, unethical work ethic affects on job attitude partially. Namely, tampering with work and information leaks reduce job attitude. Also, information leaks increase company's turnover rate. Second, unethical work ethic has no effect on customer service. Third, job attitude affects on customer service partially. In other words, the organizational commitment improves the quality of service but decreases the customer-centered service. Fourth, unethical work ethic has an effect on job attitude and customer service indirectly.

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.