• Title/Summary/Keyword: Construction Risk

Search Result 1,901, Processing Time 0.027 seconds

Generating Firm's Performance Indicators by Applying PCA (PCA를 활용한 기업실적 예측변수 생성)

  • Lee, Joonhyuck;Kim, Gabjo;Park, Sangsung;Jang, Dongsik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.2
    • /
    • pp.191-196
    • /
    • 2015
  • There have been many studies on statistical forecasting on firm's performance and stock price by applying various financial indicators such as debt ratio and sales growth rate. Selecting predictors for constructing a prediction model among the various financial indicators is very important for precise prediction. Most of the previous studies applied variable selection algorithms for selecting predictors. However, the variable selection algorithm is considered to be at risk of eliminating certain amount of information from the indicators that were excluded from model construction. Therefore, we propose a firm's performance prediction model which principal component analysis is applied instead of the variable selection algorithm, in order to reduce dimensionality of input variables of the prediction model. In this study, we constructed the proposed prediction model by using financial data of American IT companies to empirically analyze prediction performance of the model.

A Study on SQL Performance-Based IT Application Change Management Process to Prevent Failures of Online Transactions (온라인 거래 장애 방지를 위한 SQL 성능 기반 IT 응용프로그램 변경관리 프로세스 연구)

  • Kim, Jeong-Hwan;Ko, Moo-Seong;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.817-838
    • /
    • 2014
  • Test environment on the company that handles a large amount of data such as telecommunications companies and financial institutions, may not always be the same as the production environment, which is caused by conversion of important columns about information and limitation of storage capacity due to the construction cost. Therefore, SQL performance degradation that occurs when the test and production environments are not the same, which is an important cause of connecting to the unexpected failures of online transactions, and it generates financial loss of business, customer complaints, a decrease in reliability. In studies related SQL performance, it has so far been conducted mainly studies of tuning associated with DBMS Optimizer, and it has not been addressed issues of this sector. Therefore, in this paper, I verify the validity about presentation of the advanced SQL Performance-based IT application change management process, in order to prevent failures of the online transactions associated with poor performance of SQL generated by differences in test and production environments.

Discharge Equation Related to a Levee-Break for a Flood Hazard Map (홍수위험지도 작성을 위한 하천 제방 붕괴 유량공식 제안)

  • Lee, Khil-Ha;Kim, Sung-Wook;Choi, Bong-Hyuck
    • The Journal of Engineering Geology
    • /
    • v.25 no.4
    • /
    • pp.623-627
    • /
    • 2015
  • To compile a flood hazard map it is essential to identify the potential risk areas. A scenario-based numerical modeling approach is commonly used to build a flood hazard map in the case of a levee-break. The model parameters that capture peak discharge, including breach formation and progress, are important in the modeling method. In this study an earth-levee-break model is constructed under the assumption that the failure mechanism and hydraulic processes are identical for all levee-break river activities. Estimation of the hydrograph at the outlet as a function of time is highlighted. The constructed hydrograph can then serve as an upper boundary condition in running the flood routing model downstream, although flood routing is not considered in this study.

The Risk of Wardriving Attack Against Wireless LAN and its Counterplan (무선랜 워드라이빙 공격의 위험성과 대응방안)

  • Choi, Young-Nam;Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2121-2128
    • /
    • 2009
  • The application range of IEEE 802.11 wireless LAN has rapidly expanding from campus, enterprise to the public network of Hot Spot area due to the advantages of easiness of construction, mobility of wireless client station, convenience of usage and so on. However the security of WLAN(Wireless LAN) is vulnerable inherently because of using RF as a medium, and so the dangers of infringement of personal information and inside data of enterprises have increased and wardriving attack searching for security vulnerability in wireless LAN has become more serious especially. In this paper, we find out the overview of various procedures and preparatory stages for wardriving attack against wireless LAN, and propose complementary methods to prevent information infringement accidents from wardriving attack in wireless LAN. For this purpose, we make an equipment which is suitable for wardriving in wireless LAN and show security vulnerability of AP(Access Point) operation in WLAN around Yangjae-Dong in Seoul as a result of using the equipment.

A Study on Performance Evaluation and Security Measures of U-IT Electrical Safety Integrated Management System's Module (U-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dea-Woo;Choi, Choung-Moon;Kim, Eung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.307-310
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. U-City in order to prevent the disaster of U-IT Power Equipment Performance Module and the security for the safety of the U-City is necessary. In this paper, the power unit of U-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation and security measures will be studied. U-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as U-IT integrated management system for electrical safety and strengthen the security, safety and security with a U-City will contribute to the construction and operation.

  • PDF

Development and Rationalization of Maritime Traffic Facilities Management System (해양교통시설 운영관리 시스템 구축 및 합리화 방안)

  • Jeon, Min-Su;Lee, Joong-Woo
    • Journal of Navigation and Port Research
    • /
    • v.37 no.6
    • /
    • pp.587-595
    • /
    • 2013
  • Establishment and operation of Aids to Navigation in the process of port design, construction and management are crucial factor of maritime safety and collision prevention. According to the IMO SOLAS Chapter 5, regulation 13, the establishment and operation of maritime safety facilities are mandated for the competent authorities. The facilities of Aids to Navigations are moving to a concept of e-Navigation with state-of-the-art technology of radio navigation equipments such as AIS, DGPS and e-Loran from the traditional visual facilities (optics, shape), Although the autonomous maritime traffic system is a new trend, yet the traditional and conventional Aids to Navigation like lighthouses and beacons are still imperative for vessel's safe navigation. In this paper, for decision of service level of maritime traffic facilities to enhance the efficiency of visual navigation system management it was proposed the Aids to Navigation availability as an efficient management system incorporating the whole maritime traffic facilities under one management system. Comparison of foreign level of services and analysis of the theoretical background of them were analyzed and the proposed LOS was applied to Incheon area to evaluate the safety of navigation routes.

A Development of the Integrated Total Asset Management System (통합 유가증권시스템의 개발)

  • Hwang Hyun-Cheol;Song Ha-Yoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.458-463
    • /
    • 2005
  • The total asset management system is used for banks or financial institutions for the management of trusteed assets or own assets and it is divided into three systems: the front-office system, the middle-office system and the back-office system by its business areas and functionalities. This kind of asset management system is a huge and complex system handling large data and various financial products, and requires professional knowledges like accounting, financial product specific knowledge, compliance and regulations, etc. It also performs high level computation for NAV calculation and risk measurement on every day Therefore, it needs absolute stability, extendability and efficiency and should handle the frequent change of regulation and products and connectivity with outdoor institutions. In this paper, we report our successful development of such a system and discuss issues regarding its efficient system design and system construction.

Mapping Soil Contamination using QGIS (QGIS를 이용한 토양오염지도 작성)

  • Kim, Ji-Young;Bae, Yong-Soo;Park, Jin-Ho;Son, Yeong-Geum;Oh, Jo-Kyo
    • Journal of Environmental Health Sciences
    • /
    • v.45 no.5
    • /
    • pp.487-496
    • /
    • 2019
  • Objective: The purpose of this study was to create soil contamination maps using QGIS (Quantum Geographic Information System) and suggest selection methods for soil pollution sources for preferential investigation in a soil contamination survey. Method: Data from soil contamination surveys over five years in Gyeonggi-do Province, South Korea (2013-2017) were used for making soil contamination maps and analyzing the density of survey points. By analyzing points exceeding the concern level of soil contamination, soil pollutant sources for priority management were identified and selection methods for preferred survey points were suggested through a study of the model area. Results: A soil contamination survey was conducted at 1,478 points over five years, with the largest number of surveys conducted in industrial complex and factory areas. Soil contamination maps for copper, zinc, nickel, lead, arsenic, fluoride, and total petroleum hydrocarbons were made, and most of the survey points were found to be below concern level 1 for soil contamination. The density of the survey points is similar to that of densely populated areas and factory areas. The analysis results of points exceeding the criteria showed that soil pollutant sources for priority management were areas where ore and scrap metals were used and stored, traffic-related facilities areas, industrial complex and factory areas, and areas associated with waste and recycling. According to the study of the model area, the preferred survey points were traffic-related facilities with 15 years or more since their construction and factories with a score of 10 or more for soil contamination risk. Conclusion: Soil contamination surveys should use GIS for even regional distribution of survey points and for the effective selection of preferred survey points. This study may be used as guidelines to select points for a soil contamination survey.

A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions (자원 제약하의 중소기업 정보보안계획 수립방안 연구)

  • Kwon, Jang-Kee;Kim, kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.119-124
    • /
    • 2017
  • Information is a valuable asset regardless of the size of the enterprise and information security is an essential element for the survival and prosperity of the enterprise. However, in the case of large corporations, Security is ensured through rapid introduction of information security management system. but In the case of SMEs, security systems are not built or construction is delayed due to complex factors such as budget constraints, insufficient security guidelines, lack of security awareness. In this paper, we analyze the actual situation of information security management of SMEs through questionnaires, and We would like to suggest a comprehensive security plan for SMEs in free or inexpensive ways. We believe that by applying the method presented in this paper, SMEs will be able to implement the lowest cost basic information security and will benefit SMEs who plan to establish an information security plan.

A Study on the Assessment of Safety Performance for Complex Installation System of Stationary Fuel Cell and Boiler (건물용 연료전지-보일러 복합설치 안전성능 평가에 관한 연구)

  • Kim, Min-Woo;Lee, Eun-Kyung;Oh, Gun-Woo;Lee, Jung-Woon;Lee, Seung-Kuk
    • Korean Journal of Hazardous Materials
    • /
    • v.6 no.2
    • /
    • pp.77-86
    • /
    • 2018
  • Interest in renewable energy is increasing for eco-friendly use of energy, and fuel cells are being used in various ways such as houses and buildings as power generation methods that have low emissions such as $NO_X$ and $CO_2$. As the supply of fuel cells expands, more and more boilers are installed in the existing buildings, but safety management is not being performed properly. Therefore, in this study, a prior study was conducted on the status of fuel cell-boiler complex installation and related criteria, and the risk factors were analyzed according to the installation environment and structure. Based on these standards, the safety performance of the fuel cell-boiler combined installation is assessed by conducting a demonstration using the starting product of the simulated operation to derive the installation criteria (proposal) for the fuel cell-boiler combined installation. The installation criteria (proposal) include the construction and connection method of the piping according to the fuel cell-boiler complex installation.