• Title/Summary/Keyword: leakage management

Search Result 657, Processing Time 0.023 seconds

A method to prevent cerebrospinal fluid leakage: Reinforcing acellular dermal matrix

  • Lee, Hojune;Eom, Ye Seul;Pyon, Jai-Kyong
    • Archives of Craniofacial Surgery
    • /
    • v.21 no.1
    • /
    • pp.45-48
    • /
    • 2020
  • In neurosurgical cases, problems related to wound healing can vary from simple wound dehiscence to multilayer defects. This study demonstrates an effective method to prevent persistent cerebrospinal fluid (CSF) leakage using reinforcing acellular dermal matrix in neurosurgical patients with wound dehiscence. A 52-year-old woman was admitted for management of recurrent glioblastoma. After tumor removal surgery, the patient experienced sustained CSF leakage from the wound despite reparative attempts. The plastic surgery team performed wound repair procedure after remnant tumor removal by the neurosurgery team. Acellular dermal matrix was applied over the mesh plate to prevent CSF leakage and the postoperative status of the patient was evaluated. No sign of CSF leakage was found in the immediate postoperative period. After 3 years, there were no complications including CSF leakage, wound dehiscence, and infection. We hereby propose this method as a feasible therapeutic alternative for preventing CSF leakage in patients experiencing wound problem after neurosurgical procedures.

A Study on the Security Management System for Preventing Technology Leakage of Small and Medium Enterprises in Digital New Deal Environment

  • Kim, Sun-Jib
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.355-362
    • /
    • 2021
  • Through the Korean version of the New Deal 2.0, manufacturing-oriented SMEs are facing a new environmental change called smart factory construction. In addition, SMEs are facing new security threats along with a contactless environment due to COVID-19. However, it is practically impossible to apply the previously researched and developed security management system to protect the core technology of manufacturing-oriented SMEs due to the lack of economic capacity of SMEs. Therefore, through research on security management systems suitable for SMEs, it is necessary to strengthen their business competitiveness and ensure sustainability through proactive responses to security threats faced by SMEs. The security management system presented in this study is a security management system to prevent technology leakage applicable to SMEs by deriving and reflecting the minimum security requirements in consideration of technology protection point of view, smart factory, and remote access in a non-contact environment. It is also designed in a modular form. The proposed security management system is standardized and can be selectively used by SMEs.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

Leakage detection and management in water distribution systems

  • Sangroula, Uchit;Gnawali, Kapil;Koo, KangMin;Han, KukHeon;Yum, KyungTaek
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.160-160
    • /
    • 2019
  • Water is a limited source that needs to be properly managed and distributed to the ever-growing population of the world. Rapid urbanization and development have increased the overall water demand of the world drastically. However, there is loss of billions of liters of water every year due to leakages in water distribution systems. Such water loss means significant financial loss for the utilities as well. World bank estimates a loss of $14 billion annually from wasted water. To address these issues and for the development of efficient and reliable leakage management techniques, high efforts have been made by the researchers and engineers. Over the past decade, various techniques and technologies have been developed for leakage management and leak detection. These include ideas such as pressure management in water distribution networks, use of Advanced Metering Infrastructure, use of machine learning algorithms, etc. For leakage detection, techniques such as acoustic technique, and in recent yeats transient test-based techniques have become popular. Smart Water Grid uses two-way real time network monitoring by utilizing sensors and devices in the water distribution system. Hence, valuable real time data of the water distribution network can be collected. Best results and outcomes may be produced by proper utilization of the collected data in unison with advanced detection and management techniques. Long term reduction in Non Revenue Water can be achieved by detecting, localizing and repairing leakages as quickly and as efficiently as possible. However, there are still numerous challenges to be met and future research works to be conducted in this field.

  • PDF

A Study on the Construction Methods of Sealer of Injection Type for Leakage Maintenance for Water Leakage and Cracks in Concrete (콘크리트 누수균열의 유지관리를 위한 누수보수용 주입형 실링재 시공방법 연구)

  • Kwon Shi-Won;Oh Mi-Hyun;Kwak Kyu-Sung;Oh Sang-Keun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.6 no.1 s.19
    • /
    • pp.87-91
    • /
    • 2006
  • Since water leakage and cracks are not the source of serious problems such as long-term lowering of performance and durability of a stricture, including damages to operating facilities of a structure, damages to internal finishing materials, exhibition, and goods, and pollution of residential environment, they might have led to development of positive coping skills; however, an instant loss of lives or property due to earthquake, explosion, typhoon, or a fire was indeed neglected. In these days, repair materials for leakage cannot help but being taken in temporary way without any noticeable countermeasure. This kind of repair is socially criticized many times that is defective construction even if this costs a lot. It was not arrange the standard for construction methods of sealer of injection type for leakage maintenance, even it has been used various type of construction methods for leakage part. In conclusion, we suggest that the construction methods of sealer of injection type for leakage maintenance for leakage to establish the leakage repairing technology as increase of structure demand. Therefore, it would be possible to provide a stage-by-stage solution by developing systematic research activities among the industry, schools, and research institutes to spread maintenance management techniques globally through technical solution to water leakage and cracks, acquisition of structural safety with prolonged durability for life cycle, reduction of water leakage repair expense s, and so on.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Current Characteristics in the Silicon Oxides (실리콘 산화막의 전류 특성)

  • Kang, C.S.;Lee, Jae Hak
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.29 no.10
    • /
    • pp.595-600
    • /
    • 2016
  • In this paper, the oxide currents of thin silicon oxides is investigated. The oxide currents associated with the on time of applied voltage were used to measure the distribution of voltage stress induced traps in thin silicon oxide films. The stress induced leakage currents were due to the charging and discharging of traps generated by stress voltage in the silicon oxides. The stress induced leakage current will affect data retention in memory devices. The oxide current for the thickness dependence of stress current and stress induced leakage currents has been measured in oxides with thicknesses between $109{\AA}$, $190{\AA}$, $387{\AA}$, and $818{\AA}$ which have the gate area $10^{-3}cm^2$. The oxide currents will affect data retention and the stress current, stress induced leakage current is used to estimate to fundamental limitations on oxide thicknesses.

A Study on the Insider Behavior Analysis Framework for Detecting Information Leakage Using Network Traffic Collection and Restoration (네트워크 트래픽 수집 및 복원을 통한 내부자 행위 분석 프레임워크 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.125-139
    • /
    • 2017
  • In this paper, we developed a framework to detect and predict insider information leakage by collecting and restoring network traffic. For automated behavior analysis, many meta information and behavior information obtained using network traffic collection are used as machine learning features. By these features, we created and learned behavior model, network model and protocol-specific models. In addition, the ensemble model was developed by digitizing and summing the results of various models. We developed a function to present information leakage candidates and view meta information and behavior information from various perspectives using the visual analysis. This supports to rule-based threat detection and machine learning based threat detection. In the future, we plan to make an ensemble model that applies a regression model to the results of the models, and plan to develop a model with deep learning technology.

Development of an automated system for water-hydraulic and leakage test of pressure vessels

  • Kim, Dong-Soo;Lee, Won-Hee
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.5 no.1
    • /
    • pp.55-59
    • /
    • 2004
  • This study developed a fully automated test system for pressure vessels, containing such as oxygen, nitrogen, which is widely used in many industries. The pressure vessel test has three major parts including weight measurement test, water-hydraulic test and leakage test followed by cleaning and drying. The control system for these tests consists of three parts: a PLC, a monitoring system and a database management system. The PLC oversees overall control of test machines, while the monitoring system measures and displays weight, pressure, flow etc. for every situations, and the database management system stores test data. These three modules are designed to communicate with one another at 1 Hz frequency alerting problematic situations to the operator. The system has gone through actual field tests for verification of performances.

A Phenomenological Review on the Damage of Hot Gas Parts caused by Explosion of Gas Turbine Cooling System (가스터빈 내부 냉각계통 발화에 의한 고온부품 손상의 현상학적 고찰)

  • Yu, Won-Ju;Lee, Seong-Hyun
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2010.04a
    • /
    • pp.81-95
    • /
    • 2010
  • Gas turbines generating power operate in high temperature condition and use natural gas as fuel. For that reason, there are many cases where damage is done to the hot gas parts caused by the high temperature and many accidents occur like gas explosions, then various efforts are needed to maintain the hot gas parts and prevent accidents. It is difficult to find the root causes of damage to the hot gas parts from the gas explosion caused by gas leakage through rotor cooling air line from fuel gas heat exchanger during the shut down. To prevent gas turbine from damage, removal of gas leakage inside of gas turbine is required by purging the turbine before firing, improving the fuel gas heating system and installing alarm systems for detecting gas leakage from stop valve to turbine while the gas turbine has shut down.

  • PDF