• Title/Summary/Keyword: Technology leakage

Search Result 1,721, Processing Time 0.035 seconds

Development of an Advanced Oil Deflector Used in Thermoelectric Power Plant (화력발전소에 사용되는 개선된 오일 디플렉터 개발)

  • Choi, Yong Hoon;Kwak, Hyo Seo;Lee, Chang Ryeol;Kim, Chul
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.33 no.8
    • /
    • pp.661-668
    • /
    • 2016
  • Oil deflector prevents oil leakage that occurs in thermoelectric power plant at operating lubricant facilities. Vibration of rotating rotor-induced wear of aluminum tooth in existing oil deflector leads to oil leakage as well as life shortening of the tooth. In this study, an advanced oil deflector was developed for shock absorption and prevention of wear by decreasing clearance (from 0.5 mm to 0.2 mm) between rotor and tooth to minimize oil leakage, and by replacing 2 aluminum teeth in outmost of the oil deflector with hi-performance seal made of engineering plastic. The CFD results were compared between advanced vs. existing oil deflector to determine the amount of oil loss. Structural safety was verified through impact analyses according to the three kinds of engineering plastics, considering cost efficiency, and optimal material of hi-performance seal was chosen.

A Study on Insider Behavior Scoring System to Prevent Data Leaks

  • Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.77-86
    • /
    • 2015
  • The organization shall minimize business risks associated with customer information leaks. Enhance information security activities through voluntary pre-check and must find a way to detect the personal information leakage caused by carelessness and neglect accident. Recently, many companies have introduced an information leakage prevention solution. However, there is a possibility of internal data leakage by the internal user who has permission to access the data. By this thread it is necessary to have the environment to analyze the habit and activity of the internal user. In this study, we use the SFI analytical technique that applies RFM model to evaluate the insider activity levels were carried out case studies is applied to the actual business.

Simple Technique Reducing Leakage Current for H-Bridge Converter in Transformerless Photovoltaic Generation

  • Kot, Radoslaw;Stynski, Sebastian;Stepien, Krzysztof;Zaleski, Jaroslaw;Malinowski, Mariusz
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.153-162
    • /
    • 2016
  • Given their structural arrangement, photovoltaic (PV) modules exhibit parasitic capacitance, which creates a path for high-frequency current during zero-state switching of the converter in transformerless systems. This current has to be limited to ensure safety and electromagnetic compatibility. Many solutions that can minimize or completely avoid this phenomenon, are available. However, most of these solutions are patented because they rely on specific and often complex converter topologies. This study aims to solve this problem by introducing a solution based on a classic converter topology with an appropriate modulation technique and passive filtering. A 5.5 kW single-phase residential PV system that consists of DC-DC boost stage and DC-AC H-bridge converter is considered. Control schemes for both converter stages are presented. An overview of existing modulation techniques for H-bridge converter is provided, and a modification of hybrid modulation is proposed. A system prototype is built for the experimental verification. As shown in the study, with simple filtering and proper selection of switching states, achieving low leakage current level is possible while maintaining high converter efficiency and required energy quality.

Improved nodal equivalence with leakage-corrected cross sections and discontinuity factors for PWR depletion analysis

  • Lee, Kyunghoon;Kim, Woosong;Kim, Yonghee
    • Nuclear Engineering and Technology
    • /
    • v.51 no.5
    • /
    • pp.1195-1208
    • /
    • 2019
  • This paper introduces a new two-step procedure for PWR depletion analyses. This procedure adopts the albedo-corrected parameterized equivalence constants (APEC) method to correct the lattice-based raw cross sections (XSs) and discontinuity factors (DFs) by accounting for neutron leakage. The intrinsic limitations of the conventional two-step methods are discussed by analyzing a 2-dimensional SMR with the commercial DeCART2D/MASTER code system. For a full-scope development of the APEC correction, the MASTER nodal code was modified so that the group constants can be corrected in the middle of a microscopic core depletion. The basic APEC methodology is described and color-set problems are defined to determine the APEC functions for burnup-dependent XS and DF corrections. Then the new two-step method was applied to depletion analyses of the SMR without thermal feedback, and its validity was evaluated in terms of being able to predict accurately the reactor eigenvalue and nodal power profile. In addition, four variants of the original SMR core were also analyzed for a further evaluation of the APEC-assisted depletion. In this work, several combinations of the burnup-dependent and -independent XS and DF corrections were also considered. The results show that the APEC method could enhance the nodal equivalence significantly with inexpensive additional costs.

An Predictive System for urban gas leakage based on Deep Learning (딥러닝 기반 도시가스 누출량 예측 모니터링 시스템)

  • Ahn, Jeong-mi;Kim, Gyeong-Yeong;Kim, Dong-Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.41-44
    • /
    • 2021
  • In this paper, we propose a monitoring system that can monitor gas leakage concentrations in real time and forecast the amount of gas leaked after one minute. When gas leaks happen, they typically lead to accidents such as poisoning, explosion, and fire, so a monitoring system is needed to reduce such occurrences. Previous research has mainly been focused on analyzing explosion characteristics based on gas types, or on warning systems that sound an alarm when a gas leak occurs in industrial areas. However, there are no studies on creating systems that utilize specific gas explosion characteristic analysis or empirical urban gas data. This research establishes a deep learning model that predicts the gas explosion risk level over time, based on the gas data collected in real time. In order to determine the relative risk level of a gas leak, the gas risk level was divided into five levels based on the lower explosion limit. The monitoring platform displays the current risk level, the predicted risk level, and the amount of gas leaked. It is expected that the development of this system will become a starting point for a monitoring system that can be deployed in urban areas.

  • PDF

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

A Study on the Activation Plan of the Support Systems for SMEs' Technology Protection (중소기업 기술보호 지원제도의 활성화 방안 연구)

  • Kim, Sung-won;Park, Hyun-ae;Lee, Hwansoo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.1-17
    • /
    • 2020
  • As technology competition among companies has intensified, the importance of technology protection is increasing day by day. However, according to the status of technology leakage in Korea, the technology protection level of SMEs is weak. SMEs' technology leakage continues to occur, and the damage can be even more serious to SMEs. Thus, the government is operating various support systems for SMEs. However, despite the support system, the interest and use of SMEs is low. This study examines the current status of major support systems for SME technology protection in Korea, and empirically analyzes the recognition and expectation effects of companies on the support systems. Based on the results, this study discusses ways to improve the recognition and use of the support system. The results of this study will contribute to strengthening SMEs 'technology protection by increasing the utility and enhancing the utilization of the support systems.

The Photosensitive Insulating Materials as a Passivation Layer on a-Si TFT LCDs

  • Lee, Liu-Chung;Liang, Chung-Yu;Pan, Hsin-Hua;Huang, G.Y.;Gan, Feng-Yuan
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.695-698
    • /
    • 2006
  • The photosensitive poly-siloxane material used as the passivation layers for the conventional back channel etched (BCE) thin film transistors (TFTs) has been investigated. Through the organic material, the TFT array fabrication process can be reduced and higher aperture ratio can be achieved for higher LCD panel performance. The interface between the organic passivation layer and the back channel of the amorphous active region has been improved by the back channel oxygen treatment and the devices exhibits lower leakage current than the conventional silicon nitride passivation layer of BCE TFTs. The leakage currents between Indium-tin-oxide (ITO) pixels and the TFT devices and its mechanism have also been investigated in this paper.

  • PDF

Design of High Voltage Cascaded NPC H-Bridge Inverter (고전압 Cascaded NPC H-Bridge 인버터 설계)

  • Hyun, Seung-Wook;Noh, Yong-Su;Hyon, Byong Jo;Choi, Jun-Hyuk;Kim, Jin-Hong
    • Proceedings of the KIPE Conference
    • /
    • 2018.07a
    • /
    • pp.290-291
    • /
    • 2018
  • This paper proposed design method of DC link capasitor and leakage inductance of transformer with high voltage cascaded NPC H-bridge inverter. DC link capacitor is designed based on the ripple power between input AC power and output AC power, and leakage inductance of transformer is designed based on FFT table of unipola PWM with NPC H-bridge inverter. The proposed design method is verified by simulation results of 6.6[kV], 1.2[MW] Cascaded NPC H-bridge inverter.

  • PDF

A study on the improvements of law for industrial technology outflow prevention : Focusing on international M&A (해외 M&A시 산업기술 유출 방지를 위한 법 개선 연구)

  • Kim, Seong-Jun;Kim, Woo-Hyun;Yi, Yeong-Seo
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.7-34
    • /
    • 2011
  • Achieving high-level technology in fields such as IT-related industry, semiconductors, mobile phones, LCD, automobile, shipbuilding, etc., Korea has become an international market leader in those fields. In results, there are the increasing numbers of technology leakage attempts in various manners. Recently, technology leakages are not limited to illegal industrial espionage, but also occur during usual corporate proceedings such as technology transfer, joint research and M&A. In fact, there was a technology leakage issue in the M&A between Ssangyong Motors of Korea and Shanghai Motors of China. Current M&A regulations of Korea are not independent laws, but are spread over various laws, such as commercial law, Capital Markets and the Financial Investment Services Act, Foreign Trade Act, etc. This paper focuses on whether the current Korean regulations regarding M&A are able to effectively restrict the leakage of major information of corporate during M&A and seeks the complements.

  • PDF