• Title/Summary/Keyword: Risk monitor

Search Result 350, Processing Time 0.033 seconds

An Predictive System for urban gas leakage based on Deep Learning (딥러닝 기반 도시가스 누출량 예측 모니터링 시스템)

  • Ahn, Jeong-mi;Kim, Gyeong-Yeong;Kim, Dong-Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.41-44
    • /
    • 2021
  • In this paper, we propose a monitoring system that can monitor gas leakage concentrations in real time and forecast the amount of gas leaked after one minute. When gas leaks happen, they typically lead to accidents such as poisoning, explosion, and fire, so a monitoring system is needed to reduce such occurrences. Previous research has mainly been focused on analyzing explosion characteristics based on gas types, or on warning systems that sound an alarm when a gas leak occurs in industrial areas. However, there are no studies on creating systems that utilize specific gas explosion characteristic analysis or empirical urban gas data. This research establishes a deep learning model that predicts the gas explosion risk level over time, based on the gas data collected in real time. In order to determine the relative risk level of a gas leak, the gas risk level was divided into five levels based on the lower explosion limit. The monitoring platform displays the current risk level, the predicted risk level, and the amount of gas leaked. It is expected that the development of this system will become a starting point for a monitoring system that can be deployed in urban areas.

  • PDF

Probability Based Risk Evaluation Techniques for the Small-Sized Sea Floater (소형 해상 부유체의 확률 기반 위기평가기법)

  • Yim, Jeong-Bin
    • Journal of Navigation and Port Research
    • /
    • v.36 no.10
    • /
    • pp.795-801
    • /
    • 2012
  • This paper describes theoretical approach methodology for the Probability based risk Evaluation Techniques (PET) to monitor the risk levels of small-sized sea floater as like a yacht pier. The risk decision-making process by risk criteria with five-step scales is the core concepts of PET. These five-step scales are calculated from cumulative probability distribution of response functions for the sea floater motions using closed-form expressions. In addition, The risk decision-making process of PET with the risk criteria is proposed in this work. To verify the usability of PET, simulation experiments are carried out using mimic signals with the electrical specifications of ADIS16405 sensor that is to be use as measurement tool for the floater motions. As results from experiments, the risk evaluation error by PET shows 0.38 levels in maximum 5.0 levels. These results clearly shown that the proposed PET can be use as the monitoring techniques.

Analysis of Volatile Organic Compounds Emitted from Chemical Parts and Monitor Set of PC/Monitor (PC/Monitior 구성 화학부품 및 제품에서 방출되는 휘발성 유기화합물의 분석)

  • Choe, Jong-Woo;Baek, Kyn-Won;Ri, Chang-Seop
    • Journal of the Korean Chemical Society
    • /
    • v.44 no.5
    • /
    • pp.415-421
    • /
    • 2000
  • Volatile organic compounds(VOCs) emitted from PC/Monitor set and chemical parts com-prising of PC/Monitor set were analyzed aran, and xylene of VOCs based on qualitative analysis. As a result of these analyses, when the Wedge Rub-ber of rubber product was heated from 60$^{\circ}C$ to 80$^{\circ}C$, the emission rate(%) of xylene was increased about 2.5 times. But it was evaluated that the left of chemical parts were not affected by temperature except Wedge Rub-ber. The results of qualitative analyses between RGA and GC-MS were a little different respectively. With quantitative analysis, concentration of xylene emitted from cabinet was measured to be maximum as 6029.3 ug/ m$^3$(1.3ppm). The concentrations of toluene, xylene, and benzofuran derived from PC/Monitor set were 10.25${\mu}g/m^3$, 690${\mu}g/m^3$, and 180 ${\mu}g/m^3$, and these concentrations were relatively high levels which can bring on the risk to human health.

  • PDF

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

가동중 정비를 위한 Risk Monitor 개발

  • 김길유;한상훈;김태운
    • Proceedings of the Korean Institute of Industrial Safety Conference
    • /
    • 1997.05a
    • /
    • pp.127-132
    • /
    • 1997
  • 미국에서는 모든 원전(원자력발전소) 에서 확률론적 안전성 평가 (PSA)를 실시하여 각 원전의 취약점 등을 파악하고 취약한 부분의 보강에 힘써 왔다. 근래에는 PSA나 개별원전평가(IPE)에서 구축한 각 원전의 PSA 모델, 즉, 고장수목 (FT)이나 사건수목(ET)등을 원전의 운전, 정비, 규제 등에 활용하기 위한 연구 및 실제활용이 활발하다. 우리나라는 확률론적 안전성 평가 (PSA)를 고리 3.4호기, 영광 3,4 호기등 여러 원전에서 실시하여 가동중인 원전에서는 취약한 부분을 찾아내어 보완하였으며, 건설 중인 원전의 경우에는 설계 개선에 이바지하여 왔다. (중략)

  • PDF

Tuberculosis Treatment in Patients with Comorbidities

  • Kang, Young Ae
    • Tuberculosis and Respiratory Diseases
    • /
    • v.76 no.6
    • /
    • pp.257-260
    • /
    • 2014
  • Tuberculosis is a significant infectious problem in elderly patients with comorbidities in Korea. The age-associated diseases such as malignancy and diabetes mellitus may increase the risk of tuberculosis in this population. The medication treatments of tuberculosis in patients with comorbidities can cause adverse reactions to antituberculosis drugs and inadequate treatment responses. Thus, clinicians must carefully monitor the toxicity of antituberculosis therapy and the efficacy of treatment in patients with comorbidities.

A Real Time Temperature Monitoring System for Plating Process (도금공정 실시간 원격 온도 모니터링 시스템)

  • Jung, Sun-Wung;Choi, Tae-Lin;Yoo, Woosik;Kim, Byung Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.72-79
    • /
    • 2015
  • A number of plating companies have been exposed to the risk of fire due to unexpected temperature increasing of water in a plating bath. Since the companies are not able to forecast the unexpected temperature increasing of water and most of raw materials in the plating process have low ignition temperature, it is easy to be exposed to the risk of fire. Thus, the companies have to notice the changes immediately to prevent the risk of fire from plating process. Due to this reason, an agile and systematic temperature monitoring system is required for the plating companies. Unfortunately, in case of small size companies, it is hard to purchase a systematic solution and be offered consulting from one of the risk management consulting companies due to an expensive cost. In addition, most of the companies have insufficient research and development (R&D) experts to autonomously develop the risk management solution. In this article, we developed a real time remote temperature monitoring system which is easy to operate with a lower cost. The system is constructed by using Raspberry Pi single board computer and Android application to release an economic issue for the small sized plating manufacturing companies. The derived system is able to monitor the temperature continuously with tracking the temperature in the batch in a short time and transmit a push-alarm to a target-device located in a remoted area when the temperature exceeds a certain hazardous-temperature level. Therefore, the target small plating company achieves a risk management system with a small cost.

A Practical 1 Page Contextual Diagram for Monitoring Multiple Projects: An Empirical Study of an IT Organization

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.121-129
    • /
    • 2016
  • Company A, an embedded system manufacturer, has been managing multiple development projects. Executives need to understand the risk level of every project and prioritize resource distribution. Traditional project monitoring tools or excel sheets are too complex for calculating the risk factors across a functional organization. Two new charts, "Spear-head Chart" and "Float Chart" were designed to assist high level decision making processes. Two charts were used for weekly executive meetings in order to monitor project progress and rectify project direction. One page graphical monitoring tools in Company A are good enough for high management decision making. Authors explain the characteristics of two charts and propose its practical implementation in real working environment. Spear-head chart was also implemented as a system.