• Title/Summary/Keyword: Cloud Risk

Search Result 142, Processing Time 0.028 seconds

Deleuze and Guattari's Machinism and Pedagogy of Assemblages (들뢰즈와 가타리의 기계론과 배치의 교육학)

  • Choi, Seung-hyun;Seo, Beom Jong
    • Korean Educational Research Journal
    • /
    • v.43 no.1
    • /
    • pp.183-213
    • /
    • 2022
  • The purpose of this study is to examine the implications of Deleuze and Guattari's Machinism and Pedagogy of Assemblages. A slow, empirical process offered by Deleuze and Guattari is possible only if they experience a repetition of the duration in time. The identity of this world, a combination of potential and reality, is expressed as a machine. The identity of the 'machine' is the generation. The identity of the information society that exists everywhere in the cloud and unconsciously collects big data is also the information society. The information society is at risk of leaning toward a society in which individual desires are managed prior to the manifestation of a self-reliance a machine consisting of unmarked and mechanical arrangements. Social science based on the theory of layout shares the characteristics of repetition patterns, coexistence of linguistic and materiality, attention to boundary and negation to total whole. The pedagogy of layout, in which the collective pattern is structurally deformed in time, conforms to the original problem consciousness of Deleuze and Guattari, slow and empirical education. In addition, the work of examining the materiality and expression of the education-machine will contribute to the establishment of a new learning theory, an educational theory in the era of trans-human.

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.

A Study of Establishment of the Infrastructure for Consequence Analysis of Metallic Dust Explosion (금속성 분진폭발의 영향 분석을 위한 기반구축에 관한 연구)

  • Jang, Chang Bong;Lee, Kyung Jin;Moon, Myong Hwan;Baek, Ju Hong;Ko, Jae Wook
    • Journal of the Korean Institute of Gas
    • /
    • v.21 no.4
    • /
    • pp.84-91
    • /
    • 2017
  • Recent years have witnessed the increased usage of flammable metals, such as aluminum or magnesium, in wide range of high-tech industries. These metals are indispensable for the improvement of physical properties of materials as well as the design capability of the final product. During the process, unwanted metal dusts could be released to the environment. This can lead to an occupational health and safety issues. Due to their flammable nature, more serious problem of an explosion can happen in extreme cases. The explosion is the combustion of tiny solid particles and vapor mixture, caused by pyrolysis. This complex composition makes engineering analysis more difficult, compared to simple gas explosions or vapor cloud combustions. The study was conducted to assess this light metal dust explosion in an effort to provide the bases for a risk assessment. Dust explosion characteristics of each material was carefully evaluated and an appropriate analysis tool was developed. A comprehensive database was also constructed and utilized for the calibration of the developed response model and the verification for its accuracy. Subsequently, guidelines were provided to prevent dust explosions that could occur in top-notch industrial processes.

Risk Assessment and Safety Measures for Methanol Separation Process in BPA Plant (BPA 공장의 메탄올 분리공정에서 위험성 평가 및 안전대책)

  • Woo, In-Sung;Lee, Joong-Hee;Lee, In-Bok;Chon, Young-Woo;Park, Hee-Chul;Hwang, Seong-Min;Kim, Tae-Ok
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.3
    • /
    • pp.22-28
    • /
    • 2012
  • For a methanol separation column of the BPA (Bisphenol A) plant, HAZOP (hazard and operability) assessment was performed and damage ranges were predicted from the accident scenarios for the fire and the explosion. As a result, the damage range of the jet fire was 20 m in the case of rupture of the discharge pipe (50 mm diameter) of safety valve, and that of the flash fire was 267 m in the case of catastrophic rupture. Also, the damage ranges of the unconfined vapor cloud explosion (UVCE) for the rupture of the discharge pipe and for the catastrophic rupture were 22 m and 542 m, respectively. For the worst case of release scenarios, safety measures were suggested as follows: the pressure instruments, which can detect abnormal rise of the internal pressure in the methanol separation column, should be installed by the 2 out of 3 voting method in the top section of the column. Through the detection, the instruments should simultaneously shut down the control and the emergency shut-off valves.

Development of Web Service for Liver Cirrhosis Diagnosis Based on Machine Learning (머신러닝기반 간 경화증 진단을 위한 웹 서비스 개발)

  • Noh, Si-Hyeong;Kim, Ji-Eon;Lee, Chungsub;Kim, Tae-Hoon;Kim, KyungWon;Yoon, Kwon-Ha;Jeong, Chang-Won
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.285-290
    • /
    • 2021
  • In the medical field, disease diagnosis and prediction research using artificial intelligence technology is being actively conducted. It is being released as a variety of products for disease diagnosis and prediction, which are most widely used in the application of artificial intelligence technology based on medical images. Artificial intelligence is being applied to diagnose diseases, to classify diseases into benign and malignant, and to separate disease regions for use in identification or reading according to the risk of disease. Recently, in connection with cloud technology, its utility as a service product is increasing. Among the diseases dealt with in this paper, liver disease is a disease with very high risk because it is difficult to diagnose early due to the lack of pain. Artificial intelligence technology was introduced based on medical images as a non-invasive diagnostic method for diagnosing these diseases. We describe the development of a web service to help the most meaningful clinical reading of liver cirrhosis patients. Then, it shows the web service process and shows the operation screen of each process and the final result screen. It is expected that the proposed service will be able to diagnose liver cirrhosis at an early stage and help patients recover through rapid treatment.

Research Trends of Middle-aged Women' Health in Korea Using Topic Modeling and Text Network Analysis (텍스트네트워크분석과 토픽모델링을 활용한 국내 중년여성 건강 관련 연구 동향 분석)

  • Lee, Do-Young;Noh, Gie-Ok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.163-171
    • /
    • 2022
  • This study was conducted to understand the research trends and central concepts of middle-aged women' health in Korea. For the analysis of this study, target papers published from 2012 to 2021 were collected by entering the keywords of 'middle-aged woman' or 'menopausal woman'. 1,116 papers were used for analysis. The co-occurrence network of key words was developed and analyzed, and the research trends were analyzed through topic modeling of the LSD by dividing it into five-year units (2012-2016, 2017-2021), and visualized word cloud and sociogram were used. The keywords that appeared the most during the last 10 years were obesity, depression, body composition, stress, and menopause symptom. Five topics analyzed in the thesis data for 5 years from 2012 to 2016 were 'postmenopausal self-efficacy and satisfaction enhancement strategy', 'exercise to manage obesity and risk factors', 'intervention for obesity and stress', 'promotion of happiness and life management' and 'menopausal depression and quality of life' were confirmed. Five topics of research conducted for the next five years (2017-2021) were 'menopausal depression and quality of life', 'management of obesity and cardiovascular risk factors', 'life experience as a middle-aged woman', and 'life satisfaction and psychological well-being' and 'menopausal symptom relief strategy'. Through the results, the trend of research topics related to middle-aged women's health over the past 10 years have been identified, and research on health of middle-aged women that reflects the trend of the future should be continued.

Computer Vision-based Continuous Large-scale Site Monitoring System through Edge Computing and Small-Object Detection

  • Kim, Yeonjoo;Kim, Siyeon;Hwang, Sungjoo;Hong, Seok Hwan
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1243-1244
    • /
    • 2022
  • In recent years, the growing interest in off-site construction has led to factories scaling up their manufacturing and production processes in the construction sector. Consequently, continuous large-scale site monitoring in low-variability environments, such as prefabricated components production plants (precast concrete production), has gained increasing importance. Although many studies on computer vision-based site monitoring have been conducted, challenges for deploying this technology for large-scale field applications still remain. One of the issues is collecting and transmitting vast amounts of video data. Continuous site monitoring systems are based on real-time video data collection and analysis, which requires excessive computational resources and network traffic. In addition, it is difficult to integrate various object information with different sizes and scales into a single scene. Various sizes and types of objects (e.g., workers, heavy equipment, and materials) exist in a plant production environment, and these objects should be detected simultaneously for effective site monitoring. However, with the existing object detection algorithms, it is difficult to simultaneously detect objects with significant differences in size because collecting and training massive amounts of object image data with various scales is necessary. This study thus developed a large-scale site monitoring system using edge computing and a small-object detection system to solve these problems. Edge computing is a distributed information technology architecture wherein the image or video data is processed near the originating source, not on a centralized server or cloud. By inferring information from the AI computing module equipped with CCTVs and communicating only the processed information with the server, it is possible to reduce excessive network traffic. Small-object detection is an innovative method to detect different-sized objects by cropping the raw image and setting the appropriate number of rows and columns for image splitting based on the target object size. This enables the detection of small objects from cropped and magnified images. The detected small objects can then be expressed in the original image. In the inference process, this study used the YOLO-v5 algorithm, known for its fast processing speed and widely used for real-time object detection. This method could effectively detect large and even small objects that were difficult to detect with the existing object detection algorithms. When the large-scale site monitoring system was tested, it performed well in detecting small objects, such as workers in a large-scale view of construction sites, which were inaccurately detected by the existing algorithms. Our next goal is to incorporate various safety monitoring and risk analysis algorithms into this system, such as collision risk estimation, based on the time-to-collision concept, enabling the optimization of safety routes by accumulating workers' paths and inferring the risky areas based on workers' trajectory patterns. Through such developments, this continuous large-scale site monitoring system can guide a construction plant's safety management system more effectively.

  • PDF

Threat Situation Determination System Through AWS-Based Behavior and Object Recognition (AWS 기반 행위와 객체 인식을 통한 위협 상황 판단 시스템)

  • Ye-Young Kim;Su-Hyun Jeong;So-Hyun Park;Young-Ho Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.189-198
    • /
    • 2023
  • As crimes frequently occur on the street, the spread of CCTV is increasing. However, due to the shortcomings of passively operated CCTV, the need for intelligent CCTV is attracting attention. Due to the heavy system of such intelligent CCTV, high-performance devices are required, which has a problem in that it is expensive to replace the general CCTV. To solve this problem, an intelligent CCTV system that recognizes low-quality images and operates even on devices with low performance is required. Therefore, this paper proposes a Saying CCTV system that can detect threats in real time by using the AWS cloud platform to lighten the system and convert images into text. Based on the data extracted using YOLO v4 and OpenPose, it is implemented to determine the risk object, threat behavior, and threat situation, and calculate the risk using machine learning. Through this, the system can be operated anytime and anywhere as long as the network is connected, and the system can be used even with devices with minimal performance for video shooting and image upload. Furthermore, it is possible to quickly prevent crime by automating meaningful statistics on crime by analyzing the video and using the data stored as text.

TeGCN:Transformer-embedded Graph Neural Network for Thin-filer default prediction (TeGCN:씬파일러 신용평가를 위한 트랜스포머 임베딩 기반 그래프 신경망 구조 개발)

  • Seongsu Kim;Junho Bae;Juhyeon Lee;Heejoo Jung;Hee-Woong Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.419-437
    • /
    • 2023
  • As the number of thin filers in Korea surpasses 12 million, there is a growing interest in enhancing the accuracy of assessing their credit default risk to generate additional revenue. Specifically, researchers are actively pursuing the development of default prediction models using machine learning and deep learning algorithms, in contrast to traditional statistical default prediction methods, which struggle to capture nonlinearity. Among these efforts, Graph Neural Network (GNN) architecture is noteworthy for predicting default in situations with limited data on thin filers. This is due to their ability to incorporate network information between borrowers alongside conventional credit-related data. However, prior research employing graph neural networks has faced limitations in effectively handling diverse categorical variables present in credit information. In this study, we introduce the Transformer embedded Graph Convolutional Network (TeGCN), which aims to address these limitations and enable effective default prediction for thin filers. TeGCN combines the TabTransformer, capable of extracting contextual information from categorical variables, with the Graph Convolutional Network, which captures network information between borrowers. Our TeGCN model surpasses the baseline model's performance across both the general borrower dataset and the thin filer dataset. Specially, our model performs outstanding results in thin filer default prediction. This study achieves high default prediction accuracy by a model structure tailored to characteristics of credit information containing numerous categorical variables, especially in the context of thin filers with limited data. Our study can contribute to resolving the financial exclusion issues faced by thin filers and facilitate additional revenue within the financial industry.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.