• Title/Summary/Keyword: technology leak prevention

Search Result 20, Processing Time 0.021 seconds

Prediction of Damages and Evacuation Strategies for Gas Leaks from Chlorine Transport Vehicles (염소 운송차량 가스누출시 피해예측 및 대피방안)

  • Yang, Yong-Ho;Kong, Ha-Sung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.407-417
    • /
    • 2024
  • The objective of this study is to predict and reduce potential damage caused by chlorine gas leaks, a hazardous material, when vehicles transporting it overturn due to accidents or other incidents. The goal is to forecast the anticipated damages caused by chlorine toxicity levels (ppm) and to design effective response strategies for mitigating them. To predict potential damages, we conducted quantitative assessments using the ALOHA program to calculate the toxic effects (ppm) and damage distances resulting from chlorine leaks, taking into account potential negligence of drivers during transportation. The extent of damage from toxic gas leaks is influenced by various factors, including the amount of the leaked hazardous material and the meteorological conditions at the time of the leak. Therefore, a comprehensive analysis of damage distances was conducted by examining various scenarios that involved variations in the amount of leakage and weather conditions. Under intermediate conditions (leakage quantity: 5 tons, wind speed: 3 m/s, atmospheric stability: D), the estimated distance for exceeding the AEGL-2 level of 2 ppm was calculated to be 9 km. This concentration poses a high risk of respiratory disturbance and potential human casualties, comparable to the toxicity of hydrogen chloride. In particular, leaks in urban areas can lead to significant loss of life. In the event of a leakage incident, we proposed a plan to minimize damage by implementing appropriate response strategies based on the location and amount of the leak when an accident occurs.

On Study of Runoff Analysis Using Satellite Information (위성자료를 이용한 유출해석에 관한 연구)

  • Kang, Dong Ho;Jeung, Se Jin;Kim, Byung Sik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.2
    • /
    • pp.13-23
    • /
    • 2021
  • This study intended to assess the reliability of topographic data using satellite imaging data. The topographical data using actual instrumentation data and satellite image data were established and applied to the rainfall-leak model, S-RAT, and the topographical data and outflow data were compared and analyzed. The actual measurement data were collected from the Water Resources Management Information System (WAMIS), and satellite image data were collected from MODIS observation sensors mounted on Terra satellites. The areas subject to analysis were selected for two rivers with more than 80% mountainous areas in the Han River basin and one river basin with more than 7% urban areas. According to the analysis, the difference between instrumentation data and satellite image data was up to 50% for peak floods and up to 17% for flood totals in rivers with high mountains, but up to 13% for peak floods and up to 4% for flood totals. The biggest difference in the video data is Landuse, which shows that MODIS satellite images tend to be recognized as cities up to 60% or more in urban streams compared to WAMIS instrumentation data, but MODIS satellite images are found to be less than 5% error in forest areas.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

A study on Improved Convergence Security Monitoring System model (융합보안관제시스템 개선에 관한 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.3-12
    • /
    • 2011
  • According to the NIS, damages due to leaking industrial technology are reaching tens of trillion won. The type of damages are classified according to insider leaks, joint research, and hacking, illegal technology leaks and collaborated camouflaged. But 80% of them turned out to be an insider leak about connecting with physical security. The convergence of IT and non IT is accelerating, and the boundaries between all area are crumbling. Information Security Industry has grown continuously focusing Private Information Security which is gradually expanding to Knowledge Information Security Industry, but Information Security Industry hereafter is concentrated with convergence of IT Security Technology and product, convergence of IT Security and Physical Security, and IT convergence Industry Security. In this paper, for preventing company information leaks, logical security and physical security both of them are managed at the same level. In particular, using convergence of physical security systems (access control systems, video security systems, and others) and IT integrated security control system, convergence security monitoring model is proposed that is the prevention of external attacks and insider leaks, blocked and how to maximize the synergy effect of the analysis.

A Study on the Seismic Performance Design of Waterproofing Materials Applied Single-side Walls on Underground Structures (지하 구조물 외벽에 적용되는 방수재료의 구조체 거동 및 진동 대응 성능 설계 제안 연구)

  • Kim, Soo-Yeon;Kim, Meong-Ji;Oh, Sang-Keun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.1
    • /
    • pp.43-50
    • /
    • 2020
  • In this study, the possibility of seismic performance design was proposed and the quality verification test method was reviewed as part of the design of waterproof performance in underground walls under accelerated environment conditions for waterproofing materials, which are barrier and finishing material that can prevent ingress or overflowing water from inside and outside of a building by attaching all of the construction materials used in construction structures. Considering the current state of earthquake-resistant design of construction materials in Korea and abroad, seismic product groups are rare and mostly dependent on construction methods because there are no regulations on materials, although there are still regulations on earthquake-resistant design in the building process under the current law. Overseas, it was possible to confirm that various building materials that gave seismic performance to non-structural materials, such as Japan, Canada, and Germany, are being developed. If it is possible to have a complementary response to earthquakes in the advanced external waterproofing materials, it can be expected to be applicable as leak prevention and prevention technology along with the seismic designed structure.

Development of IoT-based Safety Management Method through an Analysis of Risk Factors for Industrial Valves (산업용 밸브의 위험요소 분석을 통한 IoT 기반 안전관리 방안 개발)

  • Kim, Jung-Hoon;Kim, Young-Gu
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.5
    • /
    • pp.35-43
    • /
    • 2019
  • The safety of industrial valves, which are the core parts of plant facilities, are managed by manpower and there are difficulties because of side area for inspection and limited accessibility due to the nature of facilities. The industrial valves used in plant facilities cause problems such as interrupted production; a loss of life due to leak or explosion of poisonous material and flammable gases, and difficulty in locating accident positions in the event of leakage or failure. Therefore, safety management and control systems based on IoT technology are needed. This study is about the development of risk factor prediction technique among the safety management of industrial valves through IoT- based wireless communication and the development of actuator control system. We have developed IoT-based industrial valve safety management techniques to prevent accidents caused by main risk factors by conducting an analysis of the structural characteristics of valves and an analysis of the causes of main risk factors through review of failure data and literature and an analysis of accident scenarios.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

A Study on the Relative Importance of the Administrative and Technical Measures for the Personal Information Protection (개인정보의 관리적·기술적 보호조치 기준의 상대적 중요도에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.135-150
    • /
    • 2014
  • As the collection and use of personal information increases, the accidents that abuse and leak personal information are continuously increasing. The nation has established new laws and strengthened related laws for the prevention of the mass leakage of personal information and the secondary damage due to the leaked personal information. The nation also established the guidelines that need to be implemented by the institutions handling personal information for the safety of the personal information. For the efficient implementation of guidelines under the limited time and resources, it is necessary to establish the priorities between guidelines. This paper compares the relative importance of the guidelines by AHP (Analytic Hierarchy Process) technique. We performed the analysis on two expert groups, the group of consultants working in information security consulting company and the group of information security staffs handling personal information directly in the company. We compared the differences between groups and recommended the relative importances of the guidelines.

A Study on the Coolant leaks Prevention Design of Heaters for Combat Vehicles (전투차량용 온수히터 냉각수 누수방지 설계에 관한 연구)

  • Park, Dong Min;Kwak, Daehwan;Jang, Jongwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.379-385
    • /
    • 2020
  • This paper presents a design for preventing coolant leaks in the core part of a heater mounted in a combat vehicle. The heater is a device that makes heated coolant flow through the heater core in the crew room. A problem with coolant leaks in the heater core area during the operation of a combat vehicle was identified. This problem is caused mainly by high pressure at the junction of the tank and tube due to the vulnerability of this area. To solve this problem, an improved core was made by improving the welding method and changing the end region of the heater core to a structure that can withstand high pressure. When pressure was applied sequentially to the existing core and improved core, a leak occurred at 7.0 kgf/㎠ in the existing core while the improved core maintained its structure up to 17.0 kgf/㎠, highlighting the improvement. Finally, performance tests and environment tests were conducted to demonstrate the suitability of the improved structure. The improved heater will be applied to combat vehicles. This paper is expected to serve as a reference for improving defense capabilities by securing reliability as well as the design and analysis of failures of similar equipment.nse capabilities through securing reliability as well as the design and analysis of failures of similar equipment.

Development of Radiation Free Soft X-Ray Ionizer with Ion Control (완전차폐 및 이온조절형 연X선식 정전기제거장치의 개발)

  • Jeong, Phil Hoon;Lee, Dong Hoon
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.5
    • /
    • pp.22-27
    • /
    • 2016
  • The Electrostatic Charge Prevention Technology is a core factor that highly influences the yield of Ultra High Resolution Flat Panel Display and high-integrated semiconductor manufacturing processes. The corona or x-ray ionizations are commonly used in order to eliminate static charges during manufacturing processes. To develop such a revolutionary x-ray ionizer that is free of x-ray radiation and has function to control the volume of ion formation simultaneously is a goal of this research and it absolutely overcomes the current risks of x-ray ionization. Under the International Commission on Radiological Protection, it must have a leakage radiation level that should be lower than a recommended level that is $1{\mu}Sv/hour$. In this research, the new generation of x-ray ionizer can easily control both the volume of ion formation and the leakage radiation level at the same time. In the research, the test constraints were set and the descriptions are as below; First, In order not to leak x-ray radiation while testing, the shielding box was fully installed around the test equipment area. Second, Implement the metallic Ring Electrode along a tube window and applied zero to ${\pm}8kV$ with respect to manage the positive and negative ions formation. Lastly, the ion duty ratio was able to be controlled in different test set-ups along with a free x-ray leakage through the metallic Ring Electrode. In the result of experiment, the maximum x-ray radiation leakage was $0.2{\mu}Sv/h$. These outcome is lower than the ICRP 103 recommended value, which is $1{\mu}Sv/h$. When applying voltage to the metallic ring electrode, the positive decay time was 2.18s at the distance of 300 mm and its slope was 0.272. In addition, the negative decay time was 2.1s at the distance of 300 mm and its slope was 0.262. At the distance of 200 mm, the positive decay time was 2.29s and its slope was 0.286. The negative decay time was 2.35s and its slope was 0.293. At the distance of 100 mm, the positive decay time was 2.71s and its slope was 0.338. The negative decay time was 3.07s and its slope was 0.383. According to these research, the observation was shown that these new concept of ionizer is able to minimize the leakage radiation level and to control the positive and negative ion duty ratio while ionization.