• Title/Summary/Keyword: control leakage

Search Result 927, Processing Time 0.028 seconds

A Study on the Efficient Operation of Self-audit in Large-scale PSM Workplace (대규모 PSM 사업장의 자체감사에 대한 효율적 운영 연구)

  • Min, Se-Hong;Kim, Seok-Won
    • Fire Science and Engineering
    • /
    • v.27 no.6
    • /
    • pp.115-121
    • /
    • 2013
  • Industrial facilities are becoming bigger and more up to date, And a kind of the hazardous material used in the industrial filed is diversified. Therefore, serious accidents such as leakage of toxic materials, fire and explosion, is continuously occurred. There is Process Safety Management (PSM) system of the several preventive systems, but it is supposed to be a limitation to ensure safety or huge PSM industrial sites where have potential to catastrophically invisible and unexpected risks because it is still being managed by instruction and inspection of authority having jurisdiction other than self-regulating management differing from the primarily aim of PSM system. To verify safety management system of work-place, supplementation of existing system is urgently required. In this study, it suggests that PSM self-audit be emphasized significantly analyzing problems of the current systems for enhancing self-audit be emphasized significantly analyzing problems of the current systems for enhancing self-control safety through efficient self-audit management and improving the existing system and improving the existing as verifying the system there of, as well as studying methods which can support institutionally.

Intracavitary Radiation Therapy for Recurrent Cystic Brain Tumors with Holmium-166-Chico : A Pilot Study

  • Ha, Eun Jin;Gwak, Ho-Shin;Rhee, Chang Hun;Youn, Sang Min;Choi, Chang-Woon;Cheon, Gi Jeong
    • Journal of Korean Neurosurgical Society
    • /
    • v.54 no.3
    • /
    • pp.175-182
    • /
    • 2013
  • Objective : Intracavitary injection of beta-emitting radiation source for control of cystic tumors has been tried with a benefit of localized internal radiation. The authors treated cystic brain tumor patients with Holmium-166-chitosan complex (Ho-166-chico), composed of a beta-emitting radionuclide Holmium-166 and biodegradable chit polymer, and evaluated the safety and effective measurement for response. Methods : Twenty-two patients with recurrent cystic brain tumor and/or located in a deep or eloquent area were enrolled in this pilot study. The cyst volume and wall thickness were determined on CT or MRI to assess radiological response. The activity of Ho-166-chico injected via Ommaya reservoir was prescribed to be 10-25 Gy to the cyst wall in a depth of 4 mm. Results : There was neither complications related to systemic absorption nor leakage of Ho-166-chico in all 22 patients. But, two cases of oculomotor paresis were observed in patients with recurrent craniopharyngioma. Radiological response was seen in 14 of 20 available follow-up images (70%). Seven patients of 'evident' radiological response experienced more than 25% decrease of both cyst volume and wall thickness. Another 7 patients with 'suggestive' response showed decrease of cyst volume without definitive change of the wall thickness or vice versa. All patients with benign tumors or low grade gliomas experienced symptomatic improvement. Conclusion : Ho-166-chico intracavitary radiation therapy for cystic tumor is a safe method of palliation without serious complications. The determination of both minimal effective dosage and time interval of repeated injection through phase 1 trial could improve the results in the future.

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.

Single-Power-Conversion Series-Resonant AC-DC Converter with High Efficiency (고효율을 갖는 단일 전력변환 직렬 공진형 AC-DC 컨버터)

  • Jeong, Seo-Gwang;Cha, Woo-Jun;Lee, Sung-Ho;Kwon, Bong-Hwan
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.21 no.3
    • /
    • pp.224-230
    • /
    • 2016
  • In this study, a single-power-conversion series-resonant ac-dc converter with high efficiency and high power factor is proposed. The proposed ac-dc converter consists of single-ended primary-inductor converter with an active-clamp circuit and a voltage doubler with series-resonant circuit. The active-clamp circuit clamps the surge voltage and provides zero-voltage switching of the main switch. The series-resonant circuit consists of leakage inductance $L_{lk}$ of the transformer and resonant capacitors $ C_{r1}$ and $ C_{r2}$. This circuit also provides zero-current switching of output diodes $D_1$ and $D_2$. Thus, the switching loss of switches and reverse-recovery loss of output diodes are considerably reduced. The proposed ac-dc converter also achieves high power factor using the proposed control algorithm without the addition of a power factor correction circuit and a dc-link electrolytic capacitor. A detailed theoretical analysis and the experimental results for a 1kW prototype are discussed.

Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls (시스템 호출 기반의 사운덱스 알고리즘을 이용한 신경망과 N-gram 기법에 대한 이상 탐지 성능 분석)

  • Park, Bong-Goo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.45-56
    • /
    • 2005
  • The weak foundation of the computing environment caused information leakage and hacking to be uncontrollable, Therefore, dynamic control of security threats and real-time reaction to identical or similar types of accidents after intrusion are considered to be important, h one of the solutions to solve the problem, studies on intrusion detection systems are actively being conducted. To improve the anomaly IDS using system calls, this study focuses on neural networks learning using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern, That Is, by changing variable length sequential system call data into a fixed iength behavior pattern using the soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm. The backpropagation neural networks technique is applied for anomaly detection of system calls using Sendmail Data of UNM to demonstrate its performance.

  • PDF

Design of Automatic Inspection System for Maintenance of Unmanned Monitoring Facility (무인감시설비 유지보수를 위한 자동점검시스템 설계)

  • Moon, Chaeyoung;Kim, Semin;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.515-517
    • /
    • 2018
  • Access to public facilities such as substations, dams and railway facilities is strictly controlled, and unmanned surveillance equipment has been introduced and operated recently due to the development of IT technology and the government's cost reduction policy. However, if an unmanned surveillance system is broken, surveillance space, information leakage caused by intruders, and damage to facilities may occur. Also, it is necessary to check periodical visit by the manager in order to check the surveillance facilities, which causes additional management costs. In order to solve this problem, we designed a system to check the operation status of the unmanned monitoring facility in real time, attempt to recover automatically when a problem occurs, and notify the administrator of the problem. The designed system consists of an NVR that receives and judges information such as image, sound, and lighting condition, and a control device that detects and restores the state of the unmanned monitoring facility. The system proposed in this paper is expected to contribute to the improvement of the economic efficiency due to the minimization of surveillance space due to the failure of the unmanned monitoring facility and the reduction of the inspection cost.

  • PDF

Time Switching-based Analog Network Coding for Maximizing the Minimum Required Secrecy Capacity in Energy Harvesting Networks (에너지 하베스팅 네트워크에서 최소 요구 보안 용량을 최대화하기 위한 시간 전환 기반의 아날로그 네트워크 코딩)

  • Lee, Kisong;Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2022-2028
    • /
    • 2017
  • Recently, the energy shortage of sensors and the leakage of private information are considered as serious problems as the number of sensors is increasing due to the technological advance in Internet-of-Things. RF energy harvesting, in which sensors collect energy from external RF signals, and physical layer security become increasingly important to solve these problems. In this paper, we propose a time switching-based network analog coding for improving information security in wireless networks where the relay can harvest energy from source signals. We formulate 2-hop relay networks where an eavesdropper tries to overhear source signals, and find an optimal time switching ratio for maximizing the minimum required secrecy capacity using mathematical analysis. Through simulations under various environments, it is shown that the proposed scheme improves the minimum required secrecy capacity significantly, compared to the conventional scheme.

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.

Review of Unplanned Release at Foreign Nuclear Power Plants and Radiological Monitoring at Korean Power Plants (해외원전 비계획적 방출 및 한국의 환경감시 현황 분석)

  • Park, Soo-Chan;Ham, Baknoon;Kwon, Jang-Soon;Cho, Dong-Keun;Jeong, Jihye;Kwon, Man Jae
    • Journal of Soil and Groundwater Environment
    • /
    • v.23 no.4
    • /
    • pp.1-15
    • /
    • 2018
  • Despite of safety issues related to radiological hazards, 31 countries around the world are operating more than 450 nuclear power plants (NPPs). To operate NPPs safely, safety regulations from radiation protection organizations were developed and adopted in many countries. However, many cases of radionuclide releases at foreign NPPs have been reported. Almost all commercial NPPs routinely release radioactive materials to the surrounding environments as liquid and gas phases under control. These releases are called 'planned releases' which are planned, regularly monitored, and well documented. Meanwhile, the releases focused in this review, called 'unplanned releases', are neither planned nor monitored by regulatory and/or protection organizations. NPPs are generally composed of various structures, systems and components (SSCs) for safety. Among them, the SSCs near reactors are closely related to safety of NPPs, and typically fabricated to comply with stringent requirements. However, some non-safety related SSCs such as underground pipes may be constructed only according to commercial standards, causing the leakage of radioactive fluids usually containing tritium ($^3H$). This paper discusses SSCs of NPPs and introduces several cases of unplanned releases at foreign NPPs. The current regulation on the environmental radiological surveillance and assessment around the NPPs in South Korea are also examined.

Successful Angiographic Embolization of Superficial Circumflex Iliac Artery Rupture Caused by Blunt Abdominal Trauma: A Case Report (복부 둔상에 의한 얕은엉덩휘돌이동맥 파열의 혈관조영색전술을 통한 성공적인 치료: 증례보고)

  • Lee, Sang Bong;Park, Sung Jin;Yeo, Kwang Hee;Kim, Ho Hyun;Park, Chan-Yong;Kim, Jae Hun;Kim, Chang Wan;Choi, Seon Uoo;Kim, Seon Hee;Hwang, Jung Joo;Cho, Hyun Min
    • Journal of Trauma and Injury
    • /
    • v.28 no.1
    • /
    • pp.39-42
    • /
    • 2015
  • Lat. abdominal wall hematoma with active bleeding is very rare but need prompt bleeding control. We report successful treatment by angiographic embolization of superficial circumflex iliac artery rupture caused by blunt trauma. A 60-year-old woman presented painful, enlarging, lat. abdominal wall mass with ecchymosis caused by blunt abdominal trauma. Contrast leakage of superficial circumflex iliac a. within the lt. ext. oblique m. hematoma was confirmed by abdominal computed tomography. Angiographic embolization was performed successfully. Patient was discharged at 4th day after trauma without complication. Angiographic embolization is important treatment option of lat. abdominal wall hematoma with active bleeding replacing emergency surgery.

  • PDF