• Title/Summary/Keyword: cloud loss

Search Result 96, Processing Time 0.023 seconds

Construction of Expert System for Hazard Assessment of Unconfined Vapor Cloud Explosion (증기운 폭발의 위험성 평가를 위한 전문가 시스템의 구축)

  • 함병호;손민일;김태옥;조지훈;이영순
    • Journal of the Korean Society of Safety
    • /
    • v.10 no.2
    • /
    • pp.97-104
    • /
    • 1995
  • To evaluate readily the effect of unconfined vapor cloud explosion(UVCE) having high possibility of accident and risk in chemical industries, the expert system of UVCE was developed and its applicability on a real accident was analyzed. We found that the hazard of UVCE could be well evaluated from the TNT equivalency model and the empirical loss data produced by overpressure for chemical facilities. By using the developed expert system, the size of vapor cloud, the quantity of vaporization, the released energy, the overpressure range from explosion point, and the impact damage of each installation could be estimated respectively. Also, probable maximum loss and catastrophic loss potential for real accident( cyclohexane release in Flixborough Nypro company) were estimated and compared with damages of the accident. As a result, the developed expert system could be well applicable to real accident.

  • PDF

Study on Hybrid Type Cloud System (하이브리드형 클라우드 시스템에 관한 연구)

  • Jang, Jae-Youl;Kim, Do-Moon;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.611-618
    • /
    • 2016
  • The suggested paper studies communications network and system technology, designing data to sync to both USB memories and cloud storages at the same time, which would allow users to safely keep and manage data even in case of network troubles, affecting cloud storages, and/or loss of physical USB memories, resulting in lost data in the physical memory. The need of secure data management policy for cloud storage users form the basis of this study, offering solutions to network failures and loss of physical storage by creating hybrid cloud system. To provide convenience to windows users, the UI design should integrate that of windows explorer to maximize security and convenience.

The Framework Development of Cloud Computing-based Integrated EHS Management System for Small and Medium Construction Companies (중소건설사를 위한 클라우드 컴퓨팅 기반 EHS 통합관리시스템 프레임워크 개발)

  • Seo, Kwang-Kyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.139-143
    • /
    • 2010
  • The small and medium construction companies are facing potential EHS(Environment, Health & Safety) of major accidents to cause casualties or a financial loss and increasing social responsibility. So, they have to voluntarily accomplish the EHS management system rather than passively with regard to EHS regulation. In this study, the framework of integrated EHS management system is developed based on cloud computing, and construction companies are to materialize self-regulation EHS process of construction workplace and to standardize the total EHS business process using the developed system. The proposed system also provides risk analysis, education/control and continuous improvement for EHS tasks and users can easily access the system on the web at a low price through cloud computing service. Eventually, the integrated system contributes to the managerial improvement by minimizing economic and physical loss caused by construction accidents.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

A Study of Personal Characteristics Influencing Cloud Intention (클라우드 사용의도에 영향을 미치는 개인특성 연구)

  • Kim, Jin Bae;Cho, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.135-157
    • /
    • 2019
  • Information technology has economic, social and cultural impacts is closely linked to our lives. This information technology is becoming a key to the change of human civilization through connecting people and objects on the earth. In addition, future information technology is becoming more intelligent and personalized with the development of computing technology, and due to the rapid development of alcohol, environment without time and space constraint is realized, Is spreading. Since existing portable storage media are made of physical form, there is a limit to usage due to the risk of loss and limitation of capacity. Cloud services can overcome these limitations. Due to the problems of existing storage media, it is possible to overcome the limitations of storing, managing and reusing information through cloud services. Despite the large number of cloud service users, the existing research has focused mainly on the concept of cloud service and the effect of introduction on the companies. This study aims to conduct a study on individual characteristics that affect the degree of cloud use. We will conduct research on the causes of IT knowledge, personal perception of security, convenience, innovation, economical trust, and platform dependency affecting the intention to use the cloud. These results show that the variables affecting individual 's use of cloud service are influenced by individuals, and this study can be used as a basic data for individuals to use cloud service.

The Development of Cloud Computing-Based Integrated EHS Management System for the Construction Companies (클라우드 컴퓨팅 기반 건설사용 EHS 통합관리시스템 개발)

  • Seo, Kwang-Kyu
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11b
    • /
    • pp.859-861
    • /
    • 2010
  • The construction companies are facing potential EHS(Environment, Health & Safety) of major accidents to cause casualties or a financial loss and increasing social responsibility. So, they have to voluntarily accomplish the EHS management system rather than passively with regard to EHS regulation. In this study, the integrated EHS management system is developed based on cloud computing, and construction companies are to materialize self-regulation EHS process of construction workplace and to standardize the total EHS business process using the developed system. The proposed system also provides risk analysis, education/control and continuous improvement for EHS tasks and users can easily access the system on the web at a low price through cloud computing service. Eventually, the integrated system contributes to the managerial improvement by minimizing economic and physical loss caused by construction accidents.

  • PDF

A Development of Expert System for the Estimated Maximum Loss of Vapor Cloud Explosion (증기운 폭발시의 예상최대손실 산정을 위한 전문가 시스템 개발)

  • 김원철
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 1996.11a
    • /
    • pp.37-42
    • /
    • 1996
  • The assessment of catastrophic accidents such as BLEVE, vapor cloud explosion, and toxic material releases in the chemical process industries(CPI) shall be carried out according to the Requirement of PSM/SMS enforced by Korea Government Agencies, but reasonable models are not proposed for the practical application. The traditional models, TNT Equivalency Model, are well-known and helpful for the assessment of vapor cloud explosion. However, the estimated-damage-area using the traditional model has much more deviations comparing to the real damage caused by vapor cloud explosion suffered before. These are why an expert system for the assessment of vapor cloud explosion has been developed, which is based on theoretical, statistical and experimental data, and it would be helpful for CPI to evaluate the damage-area in case of vapor cloud explosion.

  • PDF

Efficient Image Size Selection for MPEG Video-based Point Cloud Compression

  • Jia, Qiong;Lee, M.K.;Dong, Tianyu;Kim, Kyu Tae;Jang, Euee S.
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.06a
    • /
    • pp.825-828
    • /
    • 2022
  • In this paper, we propose an efficient image size selection method for video-based point cloud compression. The current MPEG video-based point cloud compression reference encoding process configures a threshold on the size of images while converting point cloud data into images. Because the converted image is compressed and restored by the legacy video codec, the size of the image is one of the main components in influencing the compression efficiency. If the image size can be made smaller than the image size determined by the threshold, compression efficiency can be improved. Here, we studied how to improve the compression efficiency by selecting the best-fit image size generated during video-based point cloud compression. Experimental results show that the proposed method can reduce the encoding time by 6 percent without loss of coding performance compared to the test model 15.0 version of video-based point cloud encoder.

  • PDF

Development of Cloud and Shadow Detection Algorithm for Periodic Composite of Sentinel-2A/B Satellite Images (Sentinel-2A/B 위성영상의 주기합성을 위한 구름 및 구름 그림자 탐지 기법 개발)

  • Kim, Sun-Hwa;Eun, Jeong
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_1
    • /
    • pp.989-998
    • /
    • 2021
  • In the utilization of optical satellite imagery, which is greatly affected by clouds, periodic composite technique is a useful method to minimize the influence of clouds. Recently, a technique for selecting the optimal pixel that is least affected by the cloud and shadow during a certain period by directly inputting cloud and cloud shadow information during period compositing has been proposed. Accurate extraction of clouds and cloud shadowsis essential in order to derive optimal composite results. Also, in the case of an surface targets where spectral information is important, such as crops, the loss of spectral information should be minimized during cloud-free compositing. In thisstudy, clouds using two spectral indicators (Haze Optimized Tranformation and MeanVis) were used to derive a detection technique with low loss ofspectral information while maintaining high detection accuracy of clouds and cloud shadowsfor cabbage fieldsin the highlands of Gangwon-do. These detection results were compared and analyzed with cloud and cloud shadow information provided by Sentinel-2A/B. As a result of analyzing data from 2019 to 2021, cloud information from Sentinel-2A/B satellites showed detection accuracy with an F1 value of 0.91, but bright artifacts were falsely detected as clouds. On the other hand, the cloud detection result obtained by applying the threshold (=0.05) to the HOT showed relatively low detection accuracy (F1=0.72), but the loss ofspectral information was minimized due to the small number of false positives. In the case of cloud shadows, only minimal shadows were detected in the Sentinel-2A/B additional layer, but when a threshold (= 0.015) was applied to MeanVis, cloud shadowsthat could be distinguished from the topographically generated shadows could be detected. By inputting spectral indicators-based cloud and shadow information,stable monthly cloud-free composited vegetation index results were obtained, and in the future, high-accuracy cloud information of Sentinel-2A/B will be input to periodic cloud-free composite for comparison.

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.