• Title/Summary/Keyword: solution leakage

Search Result 403, Processing Time 0.032 seconds

Studies on the Sorption and Fixation of Cesium by Vermiculite (II)

  • Lee, Sang-Hoon
    • Nuclear Engineering and Technology
    • /
    • v.6 no.2
    • /
    • pp.97-111
    • /
    • 1974
  • The adsorption mechanism of Cs-137 in low level radioactive solution by vermiculite treated with Na ion is studied in order to investigate its effective utilization for the radioactive effluent treatment. The beneficial role of Na-vermiculite is that Na ion can induce the wider c-axis spacing in which Cs ion can be sorbed in vermiculite. Cation exchange capacity and distribution coefficient of cesium seems to be influenced by the variation of c-axis spacing of vermiculite. Comparative identification and detection with the characteristic analyses of X-ray diffraction and electron diffraction patterns, diffrential thermal analysis and electron microscopy of Na-, K- and Cs-vermiculite are studied for the phemomena of Cs adsorption by vermiculite. This importance of the utilization in terms of adsorption and fixation of cesium involving vermiculite is discussed. It is found that the Na-vermiculite is valuable outside charging material for high level radioactive liquid waste storage tank of underground to protect the pollution of the underground water.

  • PDF

Real-time Responses Scheme to Protect a Computer from Offline Surrogate Users and Hackers (오프라인 대리사용자 및 해커로부터 특정 컴퓨터 보호를 위한 실시간 대응방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.313-320
    • /
    • 2019
  • One of the causes of many damage cases that occur today by hacking attack is social engineering attack. The attacker is usually a malicious traitor or an ignorant insider. As a solution, we are strengthening security training for all employees in the organization. Nevertheless, there are frequent situations in which computers are shared. In this case, the person in charge of the computer has difficulty in tracking and responding when a specific representative accessed and what a specific representative did. In this paper, we propose the method that the person in charge of the computer tracks in real time through the smartphone when a representative access the computer, when a representative access offline using hacked or shared authentication. Also, we propose a method to prevent the leakage of important information by encrypting and backing up important files of the PC through the smartphone in case of abnormal access.

AN EXPERIMENTAL STUDY FOR MICROLEAKAGE OF AMALGAM USING RESIN ADHESIVE LINERS IN PRIMARY MOLAR TOOTH (유구치 아말감 수복물에서 레진 접착성 이장재의 미세 변연 누출에 관한 비교 연구)

  • Kim, Jong-Tae;Choi, Byung-Jai;Lee, Jae-Ho;Lee, Jong-Gap
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.23 no.2
    • /
    • pp.401-414
    • /
    • 1996
  • The purpose of this study was to compare the marginal leakage of resin liner which was used as a liner to amalgam restoration. Control group composed of no liner group, copalite group and experimental group composed of All-bond 2, Vitrebond, Superbond D-liner applied groups were evaluated. Cl.V preparation with a size of $3{\times}2{\times}1.5mm$ on 70 extracted primary molars were made and applied appropriate liners for each groups. After amalgam filling and polishing, polished specimens underwent temperature changed from $5^{\circ}C\;to\;55^{\circ}C$ a thousand times. After thermocycling, specimens were placed in 2% methylene blue dye solution for 72 hours in an incubator set at $37^{\circ}C$. The teeth were sectioned buccolingually and the degree of dye penetration was observed with a spectroscopy. (${\times}30$) The following results were obtained. 1. Vitrebond, All-bond 2, Superbond D-liner group exhibited a statistically significant lower degree of dye penetration than no liner and copalite group. (Kruskal-Wallis analysis, P<0.05) 2. No liner group and copalite group exhibited a similar degree of dye penetration. (Mann-Whitney analysis, P>0.05) 3. All-bond 2 group exhibited a statistically significant lower degree of dye penetration than Vitrebond group, (Mann-Whitney analysis, P<0.05) Superbond D-liner group also exhibited a lower degree of dye penetration than Vitrebond group but was statistically insignificant. (Mann-Whitney analysis, P>0.05)

  • PDF

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

The Convergence Application Example of Non-destructive Inspection System (비파괴 검사 시스템의 융합 적용 사례)

  • Lee, Jeong-Ick
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.191-197
    • /
    • 2017
  • This development is for non-destructive machine using X-Ray source about detecting outline faults of below middle size products. The differentiation is product of research and development unspecialized small and medium-sized products using X-Ray light sources can check real time if the surface of an external fault of radiation dose reference, within the leakage. The speed control is possible by software solution. In addition, we're working on possibly block doors for worker safety and equipment at the same time that inner drive can be identified in the image. These principles, as a key enabler of the current inspection system such as the container is small to medium-sized parts - a long way from utilization level is possible. This research will give rise to major effects for other various non-destructive market industries except car-industry. The most important fact is that this developed non-destructive machine is controlled below $0.2micro-S{\mu}v$.

Study on Privacy in the IPTV Broadcasting Service (IPTV 방송서비스에서의 개인정보보호에 관한 연구)

  • Lee, Jinhyuk;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.701-712
    • /
    • 2016
  • The number of subscriber of digital pay TV service such as Digital Cable TV and IPTV is increasing from various kind of service provider world widely. These services require personal information of users to provide VOD(Video on Demand) and customized contents. Therefore, massive amount of personal information collected by service provider can cause social confusion such as leakage of privacy and property damage. This paper investigates whether broadcasting stations are providing enough notification for privacy policy and methodology of collecting private information in proper way. Furthermore, we analyze actual network traffic of IPTV service between user and service provider to suggest solution of privacy protection along with current status analysis.

Performance Evaluation of a Connection Joint using a High-Ductility Concrete (고인성 콘크리트를 사용한 연결조인트의 성능평가)

  • Kim, Byeong-Ki;Kim, Jae Hwan;Yang, Il-Seung;Lee, Sang-Soo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.15 no.2
    • /
    • pp.185-192
    • /
    • 2015
  • Expansion joint is the essential element of the bridge in many cases. When the bridge faces chloride of preventing freezing on the surface of the bridge, the expansion joints is damaged significantly, thus this reduces service life and increases maintenance cost of the bridge. As a solution of this problem, new technology using high ductile materials for the joint without expansion joint was developed and in this research, crack control performance, preventing leaking after the cracking, and chloride resistance were experimentally evaluated. As a result of the experiment, with PCM and FRC materials, the connecting joint suffered poor crack dispersion and severe damage by the chloride penetration while with high-ductile material, the connecting joint dispersed the tensile deformation to microcracks stably up to 7.5mm. Furthermore, under the sever conditions, the leaking was prevented and penetration of chloride ions was prevented after the crack occurred.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Electrochemical Characteristics of all solid supercapacitor based on DAAQ(1,5-diaminoanthraquinone) and SPEEK(sulfonated polyether ether ketone) (DAAQ와 SPEEK를 이용한 전고상 슈퍼커패시터의 전기화학적 특성)

  • Kim, Jin-Yong;Kim, Hong-Il;Kim, Han-Joo;Park, Soo-Gil
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2005.07a
    • /
    • pp.371-372
    • /
    • 2005
  • Supercapacitors are promising devices for delivering high power density. Digital communications, electric vehicles and other devices that require electrical energy at high power levels in relatively short pulses have prompted considerable research on supercapacitors. In recent years, solid electrolytes have been investigated for supercapacitors. Solid electrolytes are advantageous over liquid electrolytes in respect of easy handling and reliability without electrolyte leakage. In this preliminary study, an electrochemical supercapacitor in all solid configuration has been fabricated using CNF-DAAQ and poly-vinylidenefluoride(PVdF). A new type of Supercapacitor was constructed by using carbon nanofibers(CNFs) and DAAQ(l,5-diaminoanthraquinone) monomer. DAAQ was deposited on the carbon nanofibers by chemical polymerization with $(NH_4)_2S_2O_8$ as oxidant in the 0.1M $H_2SO_4$. Dried SPEEK powder was mixed with N-methyl pyrrolidone to make 10 wt.% solution in an ultrasonic bath, the slurry was cast over a glass substrate heated to $70^{\circ}C$ for solvent evaporation. And then we used solid electrolyte of SPEEK. The unit cell consist of DAAQ-CNF/electrolyte/Pt. From the analysis, it is clear that surface of carbon nanofibers was quite uniformly coated with DAAQ. The performance characteristics of the supercapacitors have been evaluated using Cyclic Voltammetry.

  • PDF

Probabilistic Neural Network for Prediction of Leakage in Water Distribution Network (급배수관망 누수예측을 위한 확률신경망)

  • Ha, Sung-Ryong;Ryu, Youn-Hee;Park, Sang-Young
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.20 no.6
    • /
    • pp.799-811
    • /
    • 2006
  • As an alternative measure to replace reactive stance with proactive one, a risk based management scheme has been commonly applied to enhance public satisfaction on water service by providing a higher creditable solution to handle a rehabilitation problem of pipe having high potential risk of leaks. This study intended to examine the feasibility of a simulation model to predict a recurrence probability of pipe leaks. As a branch of the data mining technique, probabilistic neural network (PNN) algorithm was applied to infer the extent of leaking recurrence probability of water network. PNN model could classify the leaking level of each unit segment of the pipe network. Pipe material, diameter, C value, road width, pressure, installation age as input variable and 5 classes by pipe leaking probability as output variable were built in PNN model. The study results indicated that it is important to pay higher attention to the pipe segment with the leak record. By increase the hydraulic pipe pressure to meet the required water demand from each node, simulation results indicated that about 6.9% of total number of pipe would additionally be classified into higher class of recurrence risk than present as the reference year. Consequently, it was convinced that the application of PNN model incorporated with a data base management system of pipe network to manage municipal water distribution network could make a promise to enhance the management efficiency by providing the essential knowledge for decision making rehabilitation of network.