• Title/Summary/Keyword: Zero

Search Result 9,239, Processing Time 0.042 seconds

A Study on the Distribution of Residual Stress for Drilled Shaft (현장타설말뚝의 잔류응력 분포에 관한 연구)

  • Kim, Won-Cheul;Hwang, Young-Cheol;Ahn, Chang-Yoon
    • Journal of the Korean GEO-environmental Society
    • /
    • v.6 no.1
    • /
    • pp.45-51
    • /
    • 2005
  • The distribution of shaft resistance is measured by the static load test with the strain gauge or stress gauge, so that the long-term load distribution must be considered for the pile design. However, the measurement by strain gauge generally assumes the 'zero reading', which is the reading taken at 'zero time' with 'zero' load and the residual stress, which is the negative skin friction(or the negative shaft resistance) caused by the pile construction, is neglected. Therefore, the measured value by strain gauge is different from the true load-distribution because residual stresses were neglected. In this study, the three drilled shafts were constructed, and the strain measurements were carried out just after shaft construction. As a result of this study, it is shown that the true load-distribution of drilled shaft is quite different with known load distribution and the true load-distribution of drilled shaft changed from the negative skin friction to the positive skin according to the load increment.

  • PDF

A Bayesian zero-inflated negative binomial regression model based on Pólya-Gamma latent variables with an application to pharmaceutical data (폴랴-감마 잠재변수에 기반한 베이지안 영과잉 음이항 회귀모형: 약학 자료에의 응용)

  • Seo, Gi Tae;Hwang, Beom Seuk
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.2
    • /
    • pp.311-325
    • /
    • 2022
  • For count responses, the situation of excess zeros often occurs in various research fields. Zero-inflated model is a common choice for modeling such count data. Bayesian inference for the zero-inflated model has long been recognized as a hard problem because the form of conditional posterior distribution is not in closed form. Recently, however, Pillow and Scott (2012) and Polson et al. (2013) proposed a Pólya-Gamma data-augmentation strategy for logistic and negative binomial models, facilitating Bayesian inference for the zero-inflated model. We apply Bayesian zero-inflated negative binomial regression model to longitudinal pharmaceutical data which have been previously analyzed by Min and Agresti (2005). To facilitate posterior sampling for longitudinal zero-inflated model, we use the Pólya-Gamma data-augmentation strategy.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

A study on ways to strengthen the new security system through the stipulation of zero trust : legal improvement under the Electronic Financial Transactions Act (제로 트러스트 명문화를 통한 신 보안체계 강화 방안 연구 - 전자금융거래법상 법적 개선을 중심으로 -)

  • Min-won Lee;Hun-yeong Kwon
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Due to COVID-19, the concept of Zero Trust, a safe security in a non-face-to-face environment due to telecomm uting, is drawing attention. U.S. President Biden emphasized the introduction of Zero Trust in an executive order to improve national cybersecurity in May 2021, and Zero Trust is a global trend. However, the most difficulty in introd ucing new technologies such as Zero Trust in Korea is excessive regulation of cloud and network separation, which is based on the boundary security model, but is limited to not reflecting all new information protection controls due to non-face-to-face environments. In particular, in order for the government's policy to ease network separation to b ecome an effective policy, the zero trust name culture is essential. Therefore, this paper aims to study legal improve ments that reflect the concept of zero trust under the Electronic Financial Transactions Act.

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

A Study on the Zero Waste Fashion Design in Conscious Fashion Perspective from the New Normal Era (뉴노멀 시대의 컨셔스 패션에 나타난 제로웨이스트 패션디자인 연구)

  • Dal A Lee;Chan Ho Kim
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.25 no.4
    • /
    • pp.59-76
    • /
    • 2023
  • The COVID-19 pandemic has brought about environmental severity and new social, economic, and cultural changes. Conscious fashion, which is oriented to sustainable and valuable consumption, has become a trend to consume products produced using eco-friendly and ethical processes, from the selection of the product materials to the manufacturing process. The purpose of this study is to identify the concepts and characteristics of conscious fashion and zero waste, and to explore design trends of zero wastein the new normal era of conscious fashion through the analysis of various cases. The research method is a literature review on conscious fashion based on relevant professional and academic books and articles, designer collections, and campaigns from 2010 to the present, when conscious fashion as eco-friendliness and sustainable fashion became a trend. The concept and characteristics of conscious fashion were examined them in terms of environmental, ethical, social, and cultural aspects and the concept and characteristics of zero waste through previous studies and case analysis. Through this, the trends of zero-waste design in conscious fashion were categorized into: first, an eco-friendly design orientation that utilizes reuse and reduce methods of clothing and fabric; second, a variable design orientation that practices zero waste designs by using diversity of patterns through deconstruction, disassembly, and various cutting methods. Third, long-term circulation of design through the recycling of resources by second-hand trade, the utilization of stock clothing, resale, and availability of eco-friendly materials through the development of new technologies. As an active practice for the sustainable fashion industry expands, it is expected that continuous research will be conducted as a future core value to realize the possibility of long-term circular zero-waste design through social responsibility and conscious recycling, reuse, and reproduction.

SYMBOLS OF MINIMUM TYPE AND OF ZERO CLASS IN EXPONENTIAL CALCULUS

  • LEE, Chang Hoon
    • East Asian mathematical journal
    • /
    • v.34 no.1
    • /
    • pp.29-37
    • /
    • 2018
  • We introduce formal symbols of product type, of zero class, and of minimum type and show that the formal power series representations for $e^p$ and $e^q$ are formal symbols of product type giving the same pseudodifferential operator, where p and q are formal symbols of minimum type and p - q is of zero class.

DERIVATION OF A PRICE PROCESS FOR MULTITYPE MULTIPLE DEFAULTABLE BONDS

  • Park Heung-Sik
    • Journal of the Korean Statistical Society
    • /
    • v.35 no.2
    • /
    • pp.193-199
    • /
    • 2006
  • We consider a zero coupon bond that is at the risk of multitype multiple defaults. Assuming defaults occur according to k Cox processes, we find a price process for zero coupon bonds. To derive this process we follow the Lando (1998)'s method which uses conditional expectations instead of the traditional methods.