• Title/Summary/Keyword: ,Network Security

Search Result 6,093, Processing Time 0.041 seconds

Integrating physics-based fragility for hierarchical spectral clustering for resilience assessment of power distribution systems under extreme winds

  • Jintao Zhang;Wei Zhang;William Hughes;Amvrossios C. Bagtzoglou
    • Wind and Structures
    • /
    • v.39 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • Widespread damages from extreme winds have attracted lots of attentions of the resilience assessment of power distribution systems. With many related environmental parameters as well as numerous power infrastructure components, such as poles and wires, the increased challenge of power asset management before, during and after extreme events have to be addressed to prevent possible cascading failures in the power distribution system. Many extreme winds from weather events, such as hurricanes, generate widespread damages in multiple areas such as the economy, social security, and infrastructure management. The livelihoods of residents in the impaired areas are devastated largely due to the paucity of vital utilities, such as electricity. To address the challenge of power grid asset management, power system clustering is needed to partition a complex power system into several stable clusters to prevent the cascading failure from happening. Traditionally, system clustering uses the Binary Decision Diagram (BDD) to derive the clustering result, which is time-consuming and inefficient. Meanwhile, the previous studies considering the weather hazards did not include any detailed weather-related meteorologic parameters which is not appropriate as the heterogeneity of the parameters could largely affect the system performance. Therefore, a fragility-based network hierarchical spectral clustering method is proposed. In the present paper, the fragility curve and surfaces for a power distribution subsystem are obtained first. The fragility of the subsystem under typical failure mechanisms is calculated as a function of wind speed and pole characteristic dimension (diameter or span length). Secondly, the proposed fragility-based hierarchical spectral clustering method (F-HSC) integrates the physics-based fragility analysis into Hierarchical Spectral Clustering (HSC) technique from graph theory to achieve the clustering result for the power distribution system under extreme weather events. From the results of vulnerability analysis, it could be seen that the system performance after clustering is better than before clustering. With the F-HSC method, the impact of the extreme weather events could be considered with topology to cluster different power distribution systems to prevent the system from experiencing power blackouts.

The current state and prospects of travel business development under the COVID-19 pandemic

  • Tkachenko, Tetiana;Pryhara, Olha;Zatsepina, Nataly;Bryk, Stepan;Holubets, Iryna;Havryliuk, Alla
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.664-674
    • /
    • 2021
  • The relevance of this scientific research is determined by the negative impact of the COVID-19 pandemic on the current trends and dynamics of world tourism development. This article aims to identify patterns of development of the modern tourist market, analysis of problems and prospects of development in the context of the COVID-19 pandemic. Materials and methods. General scientific methods and methods of research are used in the work: analysis, synthesis, comparison, analysis of statistical data. The analysis of the viewpoints of foreign and domestic authors on the research of the international tourist market allowed us to substantiate the actual directions of tourism development due to the influence of negative factors connected with the spread of a new coronavirus infection COVID-19. Economic-statistical, abstract-logical, and economic-mathematical methods of research were used during the process of study and data processing. Results. The analysis of the current state of the tourist market by world regions was carried out. It was found that tourism is one of the most affected sectors from COVID-19, as, by the end of 2020, the total number of tourist arrivals in the world decreased by 74% compared to the same period in 2019. The consequence of this decline was a loss of total global tourism revenues by the end of 2020, which equaled $1.3 trillion. 27% of all destinations are completely closed to international tourism. At the end of 2020, the economy of international tourism has shrunk by about 80%. In 2020 the world traveled 98 million fewer people (-83%) relative to the same period last year. Tourism was hit hardest by the pandemic in the Asia-Pacific region, where travel restrictions are as strict as possible. International arrivals in this region fell by 84% (300 million). The Middle East and Africa recorded declines of 75 and 70 percent. Despite a small and short-lived recovery in the summer of 2020, Europe lost 71% of the tourist flow, with the European continent recording the largest drop in absolute terms compared with 2019, 500 million. In North and South America, foreign arrivals declined. It is revealed that a significant decrease in tourist flows leads to a massive loss of jobs, a sharp decline in foreign exchange earnings and taxes, which limits the ability of states to support the tourism industry. Three possible scenarios of exit of the tourist industry from the crisis, reflecting the most probable changes of monthly tourist flows, are considered. The characteristics of respondents from Ukraine, Germany, and the USA and their attitude to travel depending on gender, age, education level, professional status, and monthly income are presented. About 57% of respondents from Ukraine, Poland, and the United States were planning a tourist trip in 2021. Note that people with higher or secondary education were more willing to plan such a trip. The results of the empirical study confirm that interest in domestic tourism has increased significantly in 2021. The regression model of dependence of the number of domestic tourist trips on the example of Ukraine with time tendency (t) and seasonal variations (Turˆt = 7288,498 - 20,58t - 410,88∑5) it forecast for 2020, which allows stabilizing the process of tourist trips after the pandemic to use this model to forecast for any country. Discussion. We should emphasize the seriousness of the COVID-19 pandemic and the fact that many experts and scientists believe in the long-term recovery of the tourism industry. In our opinion, the governments of the countries need to refocus on domestic tourism and deal with infrastructure development, search for new niches, formats, formation of new package deals in new - domestic - segment (new products' development (tourist routes, exhibitions, sightseeing programs, special rehabilitation programs after COVID) -19 in sanatoriums, etc.); creation of individual offers for different target audiences). Conclusions. Thus, the identified trends are associated with a decrease in the number of tourist flows, the negative impact of the pandemic on employment and income from tourism activities. International tourism needs two to four years before it returns to the level of 2019.

A Study on the Data Driven Neural Network Model for the Prediction of Time Series Data: Application of Water Surface Elevation Forecasting in Hangang River Bridge (시계열 자료의 예측을 위한 자료 기반 신경망 모델에 관한 연구: 한강대교 수위예측 적용)

  • Yoo, Hyungju;Lee, Seung Oh;Choi, Seohye;Park, Moonhyung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.2
    • /
    • pp.73-82
    • /
    • 2019
  • Recently, as the occurrence frequency of sudden floods due to climate change increased, the flood damage on riverside social infrastructures was extended so that there has been a threat of overflow. Therefore, a rapid prediction of potential flooding in riverside social infrastructure is necessary for administrators. However, most current flood forecasting models including hydraulic model have limitations which are the high accuracy of numerical results but longer simulation time. To alleviate such limitation, data driven models using artificial neural network have been widely used. However, there is a limitation that the existing models can not consider the time-series parameters. In this study the water surface elevation of the Hangang River bridge was predicted using the NARX model considering the time-series parameter. And the results of the ANN and RNN models are compared with the NARX model to determine the suitability of NARX model. Using the 10-year hydrological data from 2009 to 2018, 70% of the hydrological data were used for learning and 15% was used for testing and evaluation respectively. As a result of predicting the water surface elevation after 3 hours from the Hangang River bridge in 2018, the ANN, RNN and NARX models for RMSE were 0.20 m, 0.11 m, and 0.09 m, respectively, and 0.12 m, 0.06 m, and 0.05 m for MAE, and 1.56 m, 0.55 m and 0.10 m for peak errors respectively. By analyzing the error of the prediction results considering the time-series parameters, the NARX model is most suitable for predicting water surface elevation. This is because the NARX model can learn the trend of the time series data and also can derive the accurate prediction value even in the high water surface elevation prediction by using the hyperbolic tangent and Rectified Linear Unit function as an activation function. However, the NARX model has a limit to generate a vanishing gradient as the sequence length becomes longer. In the future, the accuracy of the water surface elevation prediction will be examined by using the LSTM model.

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

Study on Integrating Women's Policies in Unified Korea : Social Welfare Policy (통일한국의 여성정책 통합방안에 관한 연구 : 사회복지정책 부문)

  • Kim, Young-Lan
    • Korean Journal of Social Welfare
    • /
    • v.36
    • /
    • pp.39-69
    • /
    • 1998
  • The study is to grope for the unified device of the women's welfare policy in the United Korea by considering and comparing with the women's welfare in South Korea and North Korea centering on the women's welfare law and system among the social security laws and systems in the present both countries. The both Koreas have enforced the different women's welfare policies according to the different ideologies and constitutions. But in the welfare policy women are in the secondary stage by means of the ideology of sexual devision. It, therefore, is clear that the position of the North Korean woman goes in advance of the South Korean woman in the law and system. However, they are similar to the North Korean women in the aspects of the application of law and system. That is, both of them are discriminated not only in home and labor participation, but also in social welfare. There are the patriarchal family system and sexual devision of labor under the discrimination against woman. As though the both sexes are equal in law, the welfare law and system are applicated unequally to woman because of the ideology of sexual devision and familism which family should take the primary responsibility of welfare. From this perspective the women's welfare policy of the United Korea is not just to unify both laws and systems related women's welfare, but to search for the convergence on the higher level of quality and to make the real gender-equal society. The study suggests as the women's welfare the spread of the application of social welfare system, and social security network constructed through the mother protection policy, women's poverty and social security on basis of the primary principles such as the gender equal right as civil right, benefits of social welfare as social right, escape from the patriarchal familism, strengthening of resposibility of state and the principle of women participation in process of social welfare management. The device of women's welfare means building the social welfare system based on the real gender equality, so the unification will be the important turning point for the gender-equal society to the South-North Korean women.

  • PDF

Using CR System at the Department of Radiation Oncology PACS Evaluation (방사선 종양학과에서 CR System을 이용한 PACS 유용성 평가)

  • Hong, Seung-Il;Kim, Young-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.143-149
    • /
    • 2012
  • Today each hospital is trend that change rapidly by up to date, digitization and introducing newest medical treatment equipment. So, we introduce new CR system and supplement film system's shortcoming and PACS, EMR, RTP system's network that is using in hospital harmoniously and accomplish quality improvement of medical treatment and service elevation about business efficiency enlargement and patient Accordingly, we wish to introduce our case that integrate reflex that happen with radiation oncology here upon to PACS using CR system and estimate the availability. We measured that is Gantry, Collimator Star Shot, Light vs. Radiation, HDR QA(Dwell position accuracy) with Medical LINAC(MEVATRON-MX) Then, PACS was implemented on the digital images on the monitor that can be confirmed through the QA. Also, for cooperation with OCS system that is using from present source and impose code that need in treatment in each treatment, did so that Order that connect to network, input to CR may appear, did so that can solve support data mistake (active Pinacle's case supports DICOM3 file from present source but PACS does not support DICOM3 files.) of Pinacle and PACS that is Planning System and look at Planning premier in PACS. All image and data constructed integration to PACS as can refer and conduct premier in Hospital anywhere using CR system. Use Dosimetry IP in Filmless environment and QA's trial such as Light/Radition field size correspondence, gantry rotation axis' accuracy, collimator rotation axis' accuracy, brachy therapy's Dwell position check is available. Business efficiency by decrease and so on of unnecessary human strength consumption was augmented accordingly with session shortening as that integrate premier that is neted with radiation oncology using CR system to PACS. and for the future patient information security is essential.

A Study on Improvement of the police disaster crisis management system (경찰의 재난위기관리 개선에 관한 연구)

  • Chun, Yongtae;Kim, Moonkwi
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.556-569
    • /
    • 2015
  • With about 75% of the population of Korea criticizing the government's disaster policy and a failure to respond to large-scale emergency like the Sewol ferry sinking means that there is a deep distrust in the government. In order to prevent dreadful disasters such as the Sewol ferry sinking, it is important to secure a prime time with respect to disaster safety. Improving crisis management skills and managerial role of police officers who are in close proximity to the people is necessary for the success of disaster management. With disaster management as one of the most essential missions of the police, as a part of a national crisis management, a step by step strengthening of the disaster safety management system of the police is necessary, as below. First, at the prevention phase, law enforcement officers were not injected into for profit large-scale assemblies or events, but in the future the involvement, injection should be based on the level of potential risk, rather than profitability. In the past and now, the priortiy was the priority was on traffic flow, traffic communication, however, the paradigm of traffic policy should be changed to a safety-centered policy. To prevent large-scale accidents, police investigators should root out improper routines and illegal construction subcontracting. The police (intelligence) should strengthen efforts to collect intelligence under the subject of "safety". Second, with respect to the preparatory phase, on a survey of police officers, the result showed that 72% of police officers responded that safety management was not related to the job descriptions of the police. This, along with other results, shows that the awareness of disaster safety must be adopted by, or rather changed in the police urgently. The training in disaster safety education should be strengthened. A network of experts (private, administrative, and police) in safety management should be established to take advantage of private resources with regard to crisis situtions. Third, with respect to the response phase, for rapid first responses to occur, a unified communication network should be established, and a real-time video information network should be adopted by the police and installed in the police situation room. Fourth, during the recovery phase, recovery teams should be injected, added and operated to minimize secondary damage.

Evaluating the Strategic Reaction of Labor Union Movement toward Labor Reforms: The Two National Centers' Reaction toward Park, Guen-Hye Government's Labor Market Restructuring (노동개혁국면에 있어 노조운동의 대응전략에 관한 평가: 박근혜정부의 노동시장 구조개혁에 대한 양노총의 대응을 중심으로)

  • Lee, Byoung-Hoon
    • 한국사회정책
    • /
    • v.23 no.1
    • /
    • pp.1-23
    • /
    • 2016
  • This study evaluates the strategic capacity of Korean labor union movement by examining policy alternatives and strategic steps that the Federation of Korean Trade Unions and the Korean Confederation of Trade Unions have shown in response to Park Geun-Hye government's labor market structuring policies. While the government-led labor reform was carried out as intended, organized labor has not simply failed to achieve progressive labor reforms to enhance employment security, but also to exert their strategic capacity effectively for preventing Park's labor market flexibilization policies. The two national centers have not been able to exert their strategic capacity (such as intermediating, framing, articulating, learning) for mobilizing the resources of internal solidarity, network embeddedness, narrative discourse, and organizational infrastructure. In particular, the formation and diffusion of public discourse is a significant part of strategic capacity of labor unions dealing with the labor politics of labor market restructuring, since organized labor, which is under the unfavorable constraints of limited movement resources and power imbalance with the business circle, needs to mobilize massive support and participation from union members and civil society organizations. In this light, it becomes of more importance for labor union movement to exert their strategic capacity toward internal solidarity and network embeddedness in the stage of labor market reforms. Under the recent stage of labor reforms, however, the labor unions has not harnessed their movement resources effectively, but undertaken their protest in a traditional manner, thereby losing its public efficacy from inside and outside. Moreover, it is necessary to build and activate the network of organic solidarity among organized labor, civil society organizations and progressive political parties, in order to cope with the pro-business coalition of power elites for accomplishing pro-labor reforms.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.