• Title/Summary/Keyword: 시간 기반 위험도 평가

Search Result 147, Processing Time 0.028 seconds

In Silico Approach for Predicting Neurotoxicity (In silico 기법을 이용한 신경독성 예측)

  • Lee, So-yeon;Yoo, Sun-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.270-272
    • /
    • 2022
  • Safety is one of the factors that prevent clinical drugs from being distributed on the market. In the case of neurotoxicity, which is the main cause of safety problems caused by drug side effects, risk assessment of drugs and compounds is required in advance. Currently, experiments for testing drug safety are based on animal experimetns, which have the disadvantage of being time-consuming and expensive. Therefore in order to solve the above problem, a neurotoxic prediction model through an in silico experiment was suggested. In this study, the category of neurotoxicity was expanded using a unified medical language system and various related compound data were obtained based on an integrated database. The SMILES (Simplified Molecular Input Line Entry System) of the obtained compounds were converted into fingerprints and it is used as input of machine learning. The model finally predicts the presence or absence of neurotoxicity. The experiment proposed in this study can reduce the time and cost required for the in vivo experiment. Furthermore, it is expected to shorten the research period for new drug development and reduce the burden of suspension of development.

  • PDF

A Development of System for Efficient Quantitative Risk Assessment on Natural Gas Supply Facilities (천연가스 공급시설에 대한 효율적 정량적 위험성 평가를 위한 시스템 구축과 적용)

  • Yoon, Ik-Keun;Oh, Shin-Kyu;Seo, Jae-Min;Lim, Dong-Yeon;Yoon, En-Sup
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.1
    • /
    • pp.39-45
    • /
    • 2012
  • While the natural gas supply industry has continuously been growing, its potential hazard has also risen since the natural gas facilities essentially require installations that carry highly flammable and pressurized gas close to the populated areas, posing a serious consequence of significant property damage as well as human casualties in the event of accident. Therefore Quantitative Risk Assessment (QAR) has been recognized as a appropriate method to reduce the risk as far as possible, considering the reality of unachievable zero-risk. However, it is hard to perform effective QRA on hundreds of gas facilities because of insufficient number of expert and long-term analysis. In this paper, we suggest a conceptual QRA system framework to support more efficient risk analysis in gas supply facilities. In this system, the experts make questionnaires and internal calculation formula needed in accident frequency/consequence analysis of the facility through pre-analysis on the point of analysis, called incident point, and general users locate the point on the map and input the value required by the questionnaire to obtain the risk. Ultimately, this is suggested based on the idea that the specialization is available in QRA analysis process and the validity of the system is verified through actual system construction and application.

The proposal of improved secure cookies system based on public-key certificate (인증서 기반의 개선된 보안 쿠키의 설계와 구현)

  • 양종필;이경현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1090-1096
    • /
    • 2002
  • The HTTP does not support continuity for browser-server interaction between successive visits or a user due to a stateless feature. Cookies were invented to maintain continuity and state on the Web. Because cookies are transmitted in plain and contain text-character strings encoding relevant information about the user, the attacker can easily copy and modify them for his undue profit. In this paper, we design a secure cookies scheme based on X.509 public key certificate for solving these security weakness of typical web cookies. Our secure cookies scheme provides not only mutual authentication between client and server but also confidentiality and integrity of user information. Additionally, we implement our secure cookies scheme and compare it to the performance with SSL(Secure Socket Layer) protocol that is widely used for security of HTTP environment.

Development of Prediction of Electric Arc Risk using Object Dection Model (객체 탐지 모델을 활용한 전기 아크 위험성 예측 시스템 개발)

  • Lee, Gyu-bin;Kim, Seung-yeon;An, Donghyeok
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.38-44
    • /
    • 2020
  • Due to the high dependence on electric energy, electric fires make up a significant portion of fires in Korea. Electric arcs by short circuits or poor contact cause three of four electrical fires. An electric arc is a discharge phenomenon of electrical current between the insulators, which instantaneously produces high temperature. In order to reduce the fire due to electric arc, this study aims to predict the electric arc risk. We collected arc data from the arc detectors and converted into graphs based on temporal arc data. We used machine learning for training converted graph with different number of temporal arc data. To measure the performance of the learning model, we use the test data. In the results, when the number of temporal arc data was 20, the prediction rate was high as 86%.

Assessment of Lifeline Construction Technology for Buried Alive in Building Collapse (도심지 붕괴사고에 따른 매몰지역 생명선 시공기술 평가)

  • Ryu, Byung-Hyun;Kang, Jae-Mo;Lee, Jangguen;Kim, Young-Sam;Joo, Rak-Bong
    • Journal of the Korean GEO-environmental Society
    • /
    • v.17 no.9
    • /
    • pp.47-52
    • /
    • 2016
  • Unusual extreme weather events, which exceed a safe design capacity of the infrastructure, increase the frequency of natural disasters and has also been enlarged damage scale. Aging buildings and rapid urban progress act as weighting factors for the new composite disasters. Technological advances support detecting pre-disaster risk, real-time data analysis, and rapid response to the disaster site, but it is insufficient that emergency relief for buried alive must take advantage of the proven technologies through field tests. This study aims to evaluate directional drilling performance through underground soils and the reinforced concrete structure for primary lifeline installation in order to quickly provide relief supplies for buried alive when urban structures collapse.

Estimation of Effect Zone for the Establishment of Damage-Minimizing Plan of Chemical Plants (화학공장의 사고피해 최소화 대책수립을 위한 영향범위 평가)

  • Lee, Hern-Chang;Han, Seong-Hwan;Cho, Ji-Hoon;Shin, Dong-Il;Kim, Tae-Ok
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.2
    • /
    • pp.69-74
    • /
    • 2011
  • As a way to propose a method for the establishment of practical damage-minimizing plan for chemical plants, the release scenario was established by using API-581 BRD and the effect zone was estimated by the KS-RBI program supporting the quantitative cause analysis. And the risk assessment was performed. As a result, we found that to minimize the damage of a chemical plant, it is effective to use four release hole diameters (small, medium, large and rupture) and release time estimated according to the classes of detection and isolation systems. In addition, it can be safely said that through appling the damage areas considering weighted average by failure frequency and worst-case simultaneously, industrial sites can come up with the effective emergency response plan.

Knowledge Reasoning Model using Association Rules and Clustering Analysis of Multi-Context (다중상황의 군집분석과 연관규칙을 이용한 지식추론 모델)

  • Shin, Dong-Hoon;Kim, Min-Jeong;Oh, SangYeob;Chung, Kyungyong
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.11-16
    • /
    • 2019
  • People are subject to time sanctions in a busy modern society. Therefore, people find it difficult to eat simple junk food and even exercise, which is bad for their health. As a result, the incidence of chronic diseases is increasing. Also, the importance of making accurate and appropriate inferences to individual characteristics is growing due to unnecessary information overload phenomenon. In this paper, we propose a knowledge reasoning model using association rules and cluster analysis of multi-contexts. The proposed method provides a personalized healthcare to users by generating association rules based on the clusters based on multi-context information. This can reduce the incidence of each disease by inferring the risk for each disease. In addition, the model proposed by the performance assessment shows that the F-measure value is 0.027 higher than the comparison model, and is highly regarded than the comparison model.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Fast Visualization Technique and Visual Analytics System for Real-time Analyzing Stream Data (실시간 스트림 데이터 분석을 위한 시각화 가속 기술 및 시각적 분석 시스템)

  • Jeong, Seongmin;Yeon, Hanbyul;Jeong, Daekyo;Yoo, Sangbong;Kim, Seokyeon;Jang, Yun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.22 no.4
    • /
    • pp.21-30
    • /
    • 2016
  • Risk management system should be able to support a decision making within a short time to analyze stream data in real time. Many analytical systems consist of CPU computation and disk based database. However, it is more problematic when existing system analyzes stream data in real time. Stream data has various production periods from 1ms to 1 hour, 1day. One sensor generates small data but tens of thousands sensors generate huge amount of data. If hundreds of thousands sensors generate 1GB data per second, CPU based system cannot analyze the data in real time. For this reason, it requires fast processing speed and scalability for analyze stream data. In this paper, we present a fast visualization technique that consists of hybrid database and GPU computation. In order to evaluate our technique, we demonstrate a visual analytics system that analyzes pipeline leak using sensor and tweet data.

A Study on Required Safe Egress Time (RSET) Comparison and Error Calculation in Relation to Fire Room Range Set Conditions of Performance Based Fire Safety Designers (성능위주설계자들의 화재실 범위 설정 방식에 따른 소요피난안전시간(RSET) 비교 및 오차산정에 관한 연구)

  • Baek, Sona;Choi, Jun-Ho;Hong, Won-Hwa;Jung, Jong-Jin
    • Fire Science and Engineering
    • /
    • v.30 no.3
    • /
    • pp.73-78
    • /
    • 2016
  • The Installation, Maintence, and Safety Control of Fire-fighting Systems Act of South Korea regulates that over 30-storey high-rise buildings including underground spaces should vitally perform the Performance-based Design to minimize property damage and personal injury as a fire risk assessment in advance. Therefore a PBD designer such as a fire safety professional engineer evaluate occupant's life safety by a scientific methodology. In order to evaluate the life safety, fire safety designers calculate the Required Safety Egress Time (RSET) which does not have the legal criteria regarding the standard method of calculation yet. So this way has been showing different results depending upon the designer's choice, knowledges and experiences. In this study, RSET calculation methods by six designers respectively were analysed from the thirteen reports of real performance based design projects conducted in Busan for a last five years. In particular, the Response Time calculation methods which have the most powerful effect for figuring the RSET are compared with the other designer's to deduce an error value.