• 제목/요약/키워드: financial losses

검색결과 167건 처리시간 0.02초

스마트그리드 빅데이터 기반 지역별 배전선로 부하손실 분석 (Regional Analysis of Load Loss in Power Distribution Lines Based on Smartgrid Big Data)

  • 조재훈;이해성;임한민;이병성;문채주
    • 한국전자통신학회논문지
    • /
    • 제17권6호
    • /
    • pp.1013-1024
    • /
    • 2022
  • 전력 계통에서 발생하는 부하손실은 전기품질 수준을 평가하는 지표로 활용되지만, 국내외 전력 유틸리티들의 수익 창출을 방해하는 가장 큰 요인이 된다. 따라서 전력 계통에서 발생하는 부하손실에 대한 정확한 분석은 매우 중요하다. 그러나 빠르게 증가하는 분산전원 연계로 인해 배전계통의 변동성이 증가하여 정확한 손실량을 계산해내는 것이 점점 어려워지고 있다. 본 논문에서는 분산전원 연계로 인해 배전선로에서 발생하는 부하손실의 더욱 정확한 산정을 위하여 스마트그리드 빅데이터 인프라를 구축하였다. 또한, 스마트그리드 빅데이터의 특성 중 하나인 '불확실성'을 제거하기 위한 데이터 전처리기법을 적용하여, 부하손실 분석의 정확도를 높였다. 본 논문에서 수행한 부하손실 분석 결과는 배전설비 투자계획 또는 안정적인 전력공급 신뢰성과 전력품질을 유지하기 위한 배전계통 운영계획에 기초자료로 활용될 수 있다.

근전도와 관성센서가 내장된 암밴드를 이용한 실시간 수화 인식 (Real-time Sign Language Recognition Using an Armband with EMG and IMU Sensors)

  • 김성중;이한수;김종만;안순재;김영호
    • 재활복지공학회논문지
    • /
    • 제10권4호
    • /
    • pp.329-336
    • /
    • 2016
  • 수화를 사용하는 농아인은 의사소통의 제약에 의해 사회적인 불평등과 금전적 손실을 겪고 있다. 이러한 이유로 본 연구에서는 농아인의 원활한 의사소통을 위해 8개의 근전도와 1개의 관성센서로 구성된 암밴드 센서를 이용하여 실시간으로 미국 수화를 인식하는 알고리즘을 개발하였다. 개발된 알고리즘의 성능 검증은 11명의 피험자를 통해 진행하였으며, 패턴 분류기 학습은 훈련 데이터베이스 크기를 증가시키면서 진행하였다. 실험 결과, 개발된 패턴 인식 알고리즘은 동작 별 20개의 훈련 데이터베이스에서 97%이상의 정확도를 가졌으며, 30개의 훈련 데이터베이스에서 99%이상의 정확도를 보였다. 이를 통해 본 연구에서 제안하는 암밴드 센서를 이용한 수화 인식 알고리즘의 실용성과 우수성을 확인하였다.

기업의 정보보안 투자에 시장이 어떻게 반응하는지에 대한 탐색적 연구 (How does the Stock Market Reacts to Information Security Investment of Firms in Korea : An Exploratory Study)

  • 박재영;정우진;김범수
    • 한국IT서비스학회지
    • /
    • 제17권1호
    • /
    • pp.33-45
    • /
    • 2018
  • Recently, many South Korean firms have suffered financial losses and damaged corporate images from the data breaches. Accordingly, a firm should manage their IT assets securely through an information security investment. However, the difficulty of measuring the return on an information security investment is one of the critical obstacles for firms in making such investment decisions. There have been a number of studies on the effect of IT investment so far, but there are few researches on information security investment. In this paper, based on a sample of 76 investment announcements of firms whose stocks are publicly traded in the South Korea's stock market between 2001 and 2017, we examines the market reaction to information security investment by using event study methodology. The results of the main effects indicate that self-developed is significantly related to cumulative average abnormal returns (CAARs), while no significant effect was observed for discloser, investment characteristics and firm characteristics. In addition, we find that the market reacts more favorably to the news announced by the subject of investment than the vendor, in case of investments with commercial exploitation. One of main contributions in our study is that it has revealed the factors affecting the market reaction to announcement of information security investment. It is also expected that, in practice, corporate executives will be able to help make an information security investment decision.

국내 순수 인터넷 기업평가에 관한 탐색적 연구 (Valuation of Pure Internet Business : An Exploratory Study)

  • 김정욱;정승렬;이재정
    • 경영과학
    • /
    • 제17권3호
    • /
    • pp.61-71
    • /
    • 2000
  • Due to the potential growing capability that reflects future value, the market value of internet business companies (IB) are still evaluated high although major players like Amazon continuously suffer losses. Then, how do investors valuate the potential growing capabilities given that traditional financial/accounting based valuation approaches seem to be inappropriate for IB. This study attempts to provide an answer to this issue. We, therefore, analyzed the predictability of various accounting and non-accounting variables for IB value. These include book value, net income, unique visitors, page view, reach rate, public float and institutional holdings. Because of being in infant stage and difficulties in obtaining necessary web traffic data, sample of 20 pure IB were selected from Korea Stock Exchange Market, KOSDAQ, and informal market. The results of this study showed that web traffic date had the strongest relationship with IB value. In particular, unique visitors and reach rate were found to be best predictors for IB value while page view was reasonable indicator. Interestingly, net income was not found to related to IB value. This calls for an attention to the typical characteristics of IB that my hinder the usage of traditional valuation approaches for IB. Another results revealed that none of both public float and institutional holdings was significantly associated with IB value, indicating market’s supply-demand factors were less important than traffic information.

  • PDF

군집화를 이용한 기업 핵심기술 유출자 분류에 관한 연구 (A Study on The Leak of Core Business Technologies Using Preventative Security Methods Such as Clustering)

  • 허승표;이대성;김귀남
    • 융합보안논문지
    • /
    • 제10권3호
    • /
    • pp.23-28
    • /
    • 2010
  • 최근 국내 기업의 핵심기술 유출은 해마다 증가하고 있고 국가적인 차원에서 피해액 손실도 매년 크게 증가하고 있다. 최근 5년 간 우리나라 주요 사업의 기술유출에 따른 피해액은 220조 원에 달했고 2010년 총 예산과 비슷한 액수이다. 또한 핵심기술 유출 유형별로는 전직 직원, 현직 직원, 협력 업체 직원, 유치과학자, 투자업체 순으로 내부 인력에 의한 핵심기밀 유출이 가장 많은 것으로 나타났다. 이처럼, 사람에 의해서 핵심기밀 유출이 가장 많이 발생한 것에 따라 기업의 인원 보안 관리에 대한 대책 및 관리가 제대로 이루어 지지 않는 것을 미루어 짐작할 수 있다. 따라서 본 논문은 기업에서의 핵심기술 유출을 방지하기 위하여 내부 인력에 대한 사전 정보를 데이터 마이닝 방법을 통해서 핵심기술 유출 징후 분류 방법을 제안한다.

A Smart Framework for Mobile Botnet Detection Using Static Analysis

  • Anwar, Shahid;Zolkipli, Mohamad Fadli;Mezhuyev, Vitaliy;Inayat, Zakira
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권6호
    • /
    • pp.2591-2611
    • /
    • 2020
  • Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

쿠키파일의 보안성을 향상하기 위한 보안영역 설계 (Designing on Security zone to improve Cookie File Security level)

  • 서희석;최요한
    • 컴퓨터교육학회논문지
    • /
    • 제14권6호
    • /
    • pp.75-81
    • /
    • 2011
  • 쿠키는 단순한 텍스트 파일로 사용자가 웹 서비스를 제공 받은 서비스 내용이 기록되어 있다. 쿠키파일에 기록 되는 정보 중에는 사용자의 개인정보도 포함된다. 개인정보가 기록된 쿠키파일을 공격자 획득하게 되면 사용자의 개인정보 유출로 인해 금전적인 피해까지 입을 수 있다. 본 논문에서는 쿠키 파일의 보안성 향상을 위해 제시된 관련연구와 쿠키파일의 낮은 보안성으로 인해 발생할 수 있는 취약성을 살펴본다. 관련 연구와 쿠키 파일의 취약성 분석을 통해 쿠키 파일을 안전하게 보관할 수 있는 보안영역에 대한 설계와 효율적인 보안영역을 제시를 위해 보안영역을 구현할 수 있는 방법에 대해서 알아본다. 또한, 성능평가를 통해서 보안성을 확인해 보았다. 보안영역을 통해서 사용자 PC에 저장된 쿠키파일의 보안성을 향상시켜 사용자의 개인정보를 안전하게 유지할 수 있을 것이다.

  • PDF

녹색성장 실행을 위한 그린 6시그마 (Green Six Sigma for Green Growth Implementation)

  • 김동준;홍성훈;신완선
    • 품질경영학회지
    • /
    • 제38권4호
    • /
    • pp.521-530
    • /
    • 2010
  • Global regulatory pressures relating climate change and environmental responsibility are asking companies to find out the best way for sustaining their continuous business growths. It could be known that inadequate management for environmental issues are bad for business, negatively affecting brand image, causing unnecessary losses and costs for environmental preservation. For this reason, environmentally conscious green business growth has been recognized as an essential requirement for a company to stay in business. Many companies are looking for green business opportunities of improving their environmental and financial results, and struggling with how green fits into their business. In this paper, the Green Six Sigma, an environmentally conscious Six Sigma methodology, is presented as a way to find solutions for green growths. The Six Sigma is known as a disciplined, data-driven approach and methodology for achieving world-class performance in any process from manufacturing to transactional. In chronological order, the Six Sigma has been evolved from Motorola's quality-oriented methodology to GE's cost-oriented lean approach, and is being evolved and developed as an environment-oriented green growth approach. There is no doubt that the Green Six Sigma, as an engine of green growth, is a power tool for achieving competitive business performance and reducing the impact on the environment.

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle

  • Kim, Dong Hee;Baek, Seung Jo;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.865-882
    • /
    • 2017
  • To improve passenger convenience and safety, today's vehicle is evolving into a "connected vehicle," which mounts various sensors, electronic control devices, and wired/wireless communication devices. However, as the number of connections to external networks via the various electronic devices of connected vehicles increases and the internal structures of vehicles become more complex, there is an increasing chance of encountering issues such as malfunctions due to various functional defects and hacking. Recalls and indemnifications due to such hacking or defects, which may occur as vehicles evolve into connected vehicles, are becoming a new risk for automakers, causing devastating financial losses. Therefore, automakers need to make voluntary efforts to comply with security ethics and strengthen their responsibilities. In this study, we investigated potential security issues that may occur under a connected vehicle environment (vehicle-to-vehicle, vehicle-to-infrastructure, and internal communication). Furthermore, we analyzed several case studies related to automaker's legal risks and responsibilities and identified the security requirements and necessary roles to be played by each player in the automobile development process (design, manufacturing, sales, and post-sales management) to enhance their responsibility, along with measures to manage their legal risks.

우리나라 보건의료 발전을 위한 의료기술평가의 역할 (Roles of Health Technology Assessment for Better Health and Universal Health Coverage in Korea)

  • 이영성
    • 보건행정학회지
    • /
    • 제28권3호
    • /
    • pp.263-271
    • /
    • 2018
  • Health technology assessment (HTA) is defined as multidisciplinary policy analysis to look into the medical, economic, social, and ethical implications of the development, distribution, and use of health technology. Following the recent changes in the social environment, there are increasing needs to improve Korea's healthcare environment by, inter alia, assessing health technologies in an organized, timely manner in accordance with the government's strategies to ensure that citizens' medical expenses are kept at a stable level. Dedicated to HTA and research, the National Evidence-based Healthcare Collaborating Agency (NECA) analyzes and provides grounds on the clinical safety, efficacy, and economic feasibility of health technologies. HTA offers the most suitable grounds for decision making not only by healthcare professionals but also by policy makers and citizens as seen in a case in 2009 where research revealed that glucosamine lacked preventive and treatment effects for osteoarthritis and glucosamine was subsequently excluded from the National Health Insurance's benefit list to stop the insurance scheme from suffering financial losses and citizens from paying unnecessary medical expenses. For the development of HTA in Korea, the NECA will continue exerting itself to accomplish its mission of providing policy support by health technology reassessment, promoting the establishment and use of big data and HTA platforms for public interest, and developing a new value-based HTA system.