• Title/Summary/Keyword: BIG4

Search Result 3,614, Processing Time 0.032 seconds

Through the Remote-based hard Disk Memory Analysis Audit (AUDIT) System of Metabus Companies, Protecting Big Data (메타버스 기업 원격기반 하드디스크 메모리 상시분석 감사(AUDIT)체계로 주요 빅데이타 보호)

  • Bae, Sang Hyun;Yun, Seong Do;Lee, Jae Chul
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.205-210
    • /
    • 2021
  • 최근 메타버스 산업체 pc 하드디스크 메모리 저장 데이타에 대한 사이버 침해 공격 및 기밀유출 사고대응 방안으로 원격기반 상시 실시간 감시 및 분석 보안 체계를 검토 및 발전 시 요구된다. 이러한 사유는 정보보안 유출 90% 이상은 Edge단 pc에서 발생 되는 것으로 메타버스 산업보안기밀 유출 1건당 평균 10억 2,000만원 등의 유형 및 무형 피해(2018보안과 관련된 가장 중요한 팩트와 수치통계 2018.10.16일 IT WORLD) 발생의 근본에 대한 대응과 동시에 IT인프라 구축 시 연동 통합으로 네트웍 시스템 웹 등 영역에서 발생되는 악성코드 공격 대상 등의 대상이 되므로 이에 대한 대응책으로 Deep-Acess기반 상시 실시간 원격 메모리 분석 및 감사(audit)체계 개념이 핵심이다.

Web Server Log Visualization

  • Kim, Jungkee
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.101-107
    • /
    • 2018
  • Visitors to a Web site leave access logs documenting their activity in the site. These access logs provide a valuable source of information about the visitors' access patterns in the Web site. In addition to the pages that the user visited, it is generally possible to discover the geographical locations of the visitors. Web servers also records other information such as the entry into the site, the URL, the used operating system and the browser, etc. There are several Web mining techniques to extract useful information from such information and visualization of a Web log is one of those techniques. This paper presents a technique as well as a case a study of visualizing a Web log.

Crowdsourced Urban Sensing: Urban Travel Behavior Using Mobile Based Sensing

  • Shin, Dongyoun
    • Architectural research
    • /
    • v.20 no.4
    • /
    • pp.109-120
    • /
    • 2018
  • In the context of ever-faster urbanization, cities are becoming increasingly complex, and data collection to understand such complex relationships is becoming a very important factor. This paper focuses on the lighter weight of the method of collecting urban data, and studied how to use such complementary data collection using crowdsourcing. Especially, the method of converting mobile acceleration sensor information to urban trip information by combining with locational information was experimented. Using the parameters for transportation type classification obtained from the research, information was obtained and verified in Singapore and Zurich. The result of this study is thought to be a good example of how to combine raw data into meaningful behavior information.

A Study on the Analysis of Aviation Safety Data Structure and Standard Classification (항공안전데이터 구조 분석 및 표준 분류체계에 관한 연구)

  • Kim, Jun Hwan;Lim, Jae Jin;Lee, Jang Ryong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.28 no.4
    • /
    • pp.89-101
    • /
    • 2020
  • In order to enhance the safety of the international aviation industry, the International Civil Aviation Organization has recommended establishing an operational foundation for systematic and integrated collection, storage, analysis and sharing of aviation safety data. Accordingly, the Korea aviation industry also needs to comprehensively manage the safety data which generated and collected by various stakeholders related to aviation safety, and through this, it is necessary to previously identify and remove hazards that may cause accident. For more effective data management and utilization, a standard structure should be established to enable integrated management and sharing of safety data. Therefore, this study aims to propose the framework about how to manage and integrate the aviation safety data for big data-based aviation safety management and shared platform.

Comparing Zoom's Security Analysis and Security Update Results (줌의 보안 취약점 분석과 보안 업데이트 결과 비교)

  • Kim, Kyuhyeong;Choi, Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.55-65
    • /
    • 2020
  • As corona began to spread around the world, it had such a big impact on many people's lives that the word "Untact Culture" was born. Among them, non-face-to-face meetings naturally became a daily routine as educational institutions and many domestic and foreign companies used video conferencing service platforms. Among many video conferencing service platforms, Zoom, the company with the largest number of downloads, caused many security issues and caused many concerns about Zoom's security. In this paper, Zoom's security problems and vulnerabilities were classified into five categories, and Zoom's latest update to solve those problems and the 90-day security planning project were compared and analyzed. And the problem was solved and classified as unresolved. Three of the five parts have been resolved but are still described as how they should be resolved and improved in the future for the two remaining parts.

A Study on the Competitiveness Enhancement of ICT Materials, Components and Equipments Industries using Diamond Model Approach in Korea (다이아몬드 모형을 적용한 우리나라 ICT 소재, 부품, 장비 산업의 경쟁력 강화 방향)

  • Park, J.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.4
    • /
    • pp.110-117
    • /
    • 2021
  • The development of core technologies in the 4th Industrial Revolution, such as artificial intelligence, big data, and the intelligent Internet of Things, promote digital transformation and intelligence of the manufacturing industry. To realize them, there is an increasing demand for materials, components, and equipment needed for final goods. In particular, the expansion of global value chain instability due to changes in the external environment, such as the U.S.-China trade dispute, Japan's export regulations, and Covid-19 pandemic, increases the importance of strengthening the materials, components, and equipment industry in the global market. Thus, this study presents a strategic direction for securing global industrial competitiveness of materials, components, and equipment using Michael Porter's diamond model approach.

Exploring the Trends and Challenges of Artificial Intelligence Education through the Analysis of Newspapers in Korea, 1991-2020: A topic-modeling approach

  • Kim, Sung-ae
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.4
    • /
    • pp.216-221
    • /
    • 2020
  • Artificial intelligence (AI), an essential skill of the Fourth Industrial Revolution, is being actively taught in higher education; however, AI education is only in the preparatory stage in elementary, middle, and high schools. Investigating various newspaper articles related to AI education to date can aid in basic data collection, which is an important process in the preparatory stage. Accordingly, 13,378 newspaper articles were collected from a total of 21 newspapers, and five topics were extracted using the latent Dirichlet allocation (LDA)-based topic model along with frequency analysis. Newspaper articles from the early 2000s expanded to technologies related to the Fourth Industrial Revolution. Accordingly, education in AI fields should be linked with education in AI-based technology. In addition, efforts should be made to secure the continuity and sequence of AI education in cooperation with related higher institutions and companies.

EFFICIENT AND ACCURATE FINITE DIFFERENCE METHOD FOR THE FOUR UNDERLYING ASSET ELS

  • Hwang, Hyeongseok;Choi, Yongho;Kwak, Soobin;Hwang, Youngjin;Kim, Sangkwon;Kim, Junseok
    • The Pure and Applied Mathematics
    • /
    • v.28 no.4
    • /
    • pp.329-341
    • /
    • 2021
  • In this study, we consider an efficient and accurate finite difference method for the four underlying asset equity-linked securities (ELS). The numerical method is based on the operator splitting method with non-uniform grids for the underlying assets. Even though the numerical scheme is implicit, we solve the system of discrete equations in explicit manner using the Thomas algorithm for the tri-diagonal matrix resulting from the system of discrete equations. Therefore, we can use a relatively large time step and the computation of the ELS option pricing is fast. We perform characteristic computational test. The numerical test confirm the usefulness of the proposed method for pricing the four underlying asset equity-linked securities.

Modeling clustered count data with discrete weibull regression model

  • Yoo, Hanna
    • Communications for Statistical Applications and Methods
    • /
    • v.29 no.4
    • /
    • pp.413-420
    • /
    • 2022
  • In this study we adapt discrete weibull regression model for clustered count data. Discrete weibull regression model has an attractive feature that it can handle both under and over dispersion data. We analyzed the eighth Korean National Health and Nutrition Examination Survey (KNHANES VIII) from 2019 to assess the factors influencing the 1 month outpatient stay in 17 different regions. We compared the results using clustered discrete Weibull regression model with those of Poisson, negative binomial, generalized Poisson and Conway-maxwell Poisson regression models, which are widely used in count data analyses. The results show that the clustered discrete Weibull regression model using random intercept model gives the best fit. Simulation study is also held to investigate the performance of the clustered discrete weibull model under various dispersion setting and zero inflated probabilities. In this paper it is shown that using a random effect with discrete Weibull regression can flexibly model count data with various dispersion without the risk of making wrong assumptions about the data dispersion.

Replacement Model after Extended Two-phase Warranty (연장된 이단계 보증 이후의 교체모형)

  • Jung, Ki Mun
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.197-204
    • /
    • 2021
  • Under the two-phase warranty, the warranty period is divided into two intervals, one of which is for renewing replacement warranty, and the other is for minimal repair warranty. Jung[13] discusses the two types of extended two-phase warranty models. In this paper, we suggest the replacement model after the extended two-phase warranty that has been proposed by Jung[13]. To determine the optimal replacement policy, we adopt the expected cost rate per unit time. So, the expressions for the total expected cost, the expected length of the cycle and the expected cost rate per unit time from the user's point of view are derived. Also, we discuss the optimal replacement policy and the uniqueness of the solution for the optimization. Furthermore, the numerical examples are provided to illustrate the proposed the replacement model.