• Title/Summary/Keyword: 관리 프레임워크

Search Result 1,197, Processing Time 0.031 seconds

Using the Binomial Option Pricing Model for Strategic Sales of CER's to Improve the Economic Feasibility of CDM projects (이항옵션가격 모형을 활용한 CER 판매전략 구축과 이를 통한 CDM 사업 수익성 향상 방안에 관한 연구)

  • Koo, Bonsang;Park, Jong-Ho;Kim, Cheong-Woon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.1
    • /
    • pp.111-121
    • /
    • 2014
  • The Clean Development Mechanism (CDM) allows New & Renewable Energy projects to make additional income by selling CER's, which represent the amount of Green House Gases(GHG) that is reduced in the project. However, forward contracts used to hedge fluctuating market prices does not allow projects to sell CER's at a premium. As an alternate approach to maximize CER revenue, CER's are modeled as a 'real option', in which CER's are sold only above the desired sales price. Using the Binomial Option Pricing model, the resultant lattices are used to determine whether to sell, defer or abandon the option at individual nodes. Overlaying Pascal's Triangle on the lattices also enabled the calculation of the annual probabilities for deferring CER sales without incurring downside losses. Application to an actual Landfill Gas project showed increased overall NPV, and that CER sales could be deferred at a maximum of 2 years. The proposed framework allows transparency in the analysis and provides valuable and strategical information when making investment decisions related to CER sales of CDM projects.

CC-GiST: A Generalized Framework for Efficiently Implementing Arbitrary Cache-Conscious Search Trees (CC-GiST: 임의의 캐시 인식 검색 트리를 효율적으로 구현하기 위한 일반화된 프레임워크)

  • Loh, Woong-Kee;Kim, Won-Sik;Han, Wook-Shin
    • The KIPS Transactions:PartD
    • /
    • v.14D no.1 s.111
    • /
    • pp.21-34
    • /
    • 2007
  • According to recent rapid price drop and capacity growth of main memory, the number of applications on main memory databases is dramatically increasing. Cache miss, which means a phenomenon that the data required by CPU is not resident in cache and is accessed from main memory, is one of the major causes of performance degradation of main memory databases. Several cache-conscious trees have been proposed for reducing cache miss and making the most use of cache in main memory databases. Since each cache-conscious tree has its own unique features, more than one cache-conscious tree can be used in a single application depending on the application's requirement. Moreover, if there is no existing cache-conscious tree that satisfies the application's requirement, we should implement a new cache-conscious tree only for the application's sake. In this paper, we propose the cache-conscious generalized search tree (CC-GiST). The CC-GiST is an extension of the disk-based generalized search tree (GiST) [HNP95] to be tache-conscious, and provides the entire common features and algorithms in the existing cache-conscious trees including pointer compression and key compression techniques. For implementing a cache-conscious tree based on the CC-GiST proposed in this paper, one should implement only a few functions specific to the cache-conscious tree. We show how to implement the most representative cache-conscious trees such as the CSB+-tree, the pkB-tree, and the CR-tree based on the CC-GiST. The CC-GiST eliminates the troublesomeness caused by managing mire than one cache-conscious tree in an application, and provides a framework for efficiently implementing arbitrary cache-conscious trees with new features.

A Research on Managing Assurance Level for Guaranteeing Quality of Web Services (웹 서비스 품질보장을 위한 보증수준 유지방안 연구)

  • Lee, Young-Kon;Kim, Eun-Ju
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.319-328
    • /
    • 2007
  • As the coverage of Web services become wider and the number of implementation cases is growing, the importance of applying the Web services quality model to real world is increased. For maintaining the level of Web services qualify, it should be required to study on assurance method of Web services qualify level. Assurance for Web services, which is newly proposed by OASIS TC, means the totality of activities for managing the quality level of them. For managing Web service quality, Web service associates could usually use SLA(Service Level Agreement) method in which a service consumer contracts for some service level with a service provider and gives for penalty or pays incentives according to the result of evaluation of services. But, there are some difficulties in applying SLA to Web services, because Web services have publicity, multiple users, and 3rd party for management. So, we need a new assurance method for Web service by considering the characteristics of Web services. This paper provides the new concept of committed assurance level for Web services. This concept can be defined as the set of maximum level of quality expected by each user, which provide the consistent view of Web service quality. This paper presents the method for duality associates to preserve some quality level of Web service by using this concept.

Risk Analysis of Alcohol Consumption During Underwater Activity Using the Risk Assessment and Analysis Method (리스크 평가 및 분석 기법을 활용한 알코올 섭취에 따른 수중활동 시 리스크 분석)

  • SEO, Sang-Woo;KANG, Shin-Beum;KANG, Sin-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.2
    • /
    • pp.159-168
    • /
    • 2019
  • This study was designed to investigate the physiological response of humans to alcohol during underwater activity and to complete related risk analysis. After comparing human responses to alcohol during underwater activity, we analyzed physiological changes and risk level using a new risk analysis method developed in this study, 'Risk Assessment and Analysis (RAA)'. RAA is a modified method based on an internal control frame work. It has 3 steps, the first of which is to analyze risk correlation. The second step is to quantify risk and build a risk database. The last step is to analyze the diagramed risk map. Using RAA, the risk levels of alcohol use underwater were calculated and diagramed. The diagramed risk map was then used to analyze the difference between risk levels underwater before and after alcohol use. As a result, it was found that risk level underwater increased after alcohol use. This study shows alcohol use increases the ratio of high risk groups during underwater activity. It also indicates that risk levels can be quantified according to the likelihood and impairment scale, which can potentially help in identifying high risk groups for intensive management underwater.

Comparative Analysis in Risk Perception of Daycare Center between End-Users and Construction Experts by Applying Traditional and Revised Importance-Performance Analysis (전통 및 수정 중요도-성과도 분석을 통한 어린이집 사용자와 건축 전문가의 공간 별 리스크 인식 비교 분석)

  • Lee, Kyung-Tae;Kim, Hong-Ju;Jekal, Jae-Woong;Kim, Jae-Won;Kim, Ju-Hyung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.1
    • /
    • pp.3-15
    • /
    • 2022
  • Daycare center is an important space for children's mental, physical and social development. Each space of daycare center should be designed and constructed considering interests of end-users such as children and teachers. However, insufficient related guidelines and standardized design and construction of daycare center to moderate potential risks of each space. This arises from the difference in perception of each space between end-users (head and sub teachers) and construction experts (designers and contractors). Therefore, research framework was developed for analyzing the factors of perception differences of each space in daycare center between these groups applied traditional and modified Importance-Performance Analysis (IPA). By comparing risk perception between end-users and experts in two methods, it can be support as construction guide for daycare center in the future and will help minimize conflicts in construction among stakeholders. Moreover, it was found that traditional IPA is comfortable to catch prior project perception of participants, and revised IPA is considered to judge outputs by identifying participant's importance based on the satisfaction of the project performance. Therefore, if IPAs are applied according to the characteristics of the circumstances, it is possible to analyze the perception difference between end-users and construction experts based on the context before and after the construction of the daycare center.

Quantitative impacts of climate change and human activities on the watershed runoff variation of the Geum River basin (기후변화 및 인간 활동이 금강 유역의 중권역 유출량 변동에 미치는 영향의 정량적 평가)

  • Oh, Mi Ju;Kim, Dongwook;Lee, Joo-Heon;Kim, Tae-Woong
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.6
    • /
    • pp.381-392
    • /
    • 2023
  • Precipitation, runoff, and evapotranspiration are changing worldwide due to climate change and human activities. Because watershed runoff is an important component of the hydrological cycle, it is important to investigate the changes in watershed runoff for water resources management. This study collected observed data of runoff, precipitation, temperature, and evapotranspiration in the Geum River basin as well as their synthetic data according to Representative Concentration Pathways (RCP) scenarios, investigated the trend of hydro-meteorological variables using the Mann-Kendall test, and quantitatively evaluated the effects of climate change and human activities on the watershed runoff using the climate elasticity approach and the Budyko framework. The results indicated that the relative contribution of climate change and human activity to changes in runoff varies from region to region. For example, the watershed with the greatest contribution from climate change and human activity were the Yongdam Dam (#3001) basin and the Daecheong Dam (#3008) basin, respectively. Future climate change showed an increase in precipitation and temperature in both RCP 4.5 and 8.5 scenarios, resulting in changes in runoff in the Geum River basin from 44.8% to 65.5%, respectively. We concluded that the effect on watershed runoff can be separated into climate change and human activities, which will be important information in establishing sustainable water resource management plans.

System Architecture of the Integrated Data Safety Zone for the Secured Application of Transportation-specific Mobility Data (교통 분야 모빌리티 데이터의 안전한 활용을 위한 통합데이터안심구역 시스템 아키텍처 개발)

  • Hyoungkun Lee;Keedong Yoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.3
    • /
    • pp.88-103
    • /
    • 2023
  • With the recent advancement of 4th Industrial Revolution technology, transportation systems are generating large amounts of mobility data related to the individual movement trajectories of vehicles and people. There are many constraints on utilizing mobility data containing personal information. Thus, in South Korea, the processing and generation of pseudonymized information and the analysis and utilization of this information have been managed in a dual manner by applying separate agencies and technologies through the revision of the Data 3 Act and the enactment of the Data Basic Act. However, this dual approach fails to securely support the entire data lifecycle and suffers from inefficiencies in terms of processing time and cost. Therefore, to compensate for the problems of the existing Expert Data Combination System and Data Safety Zone, this study proposes an Integrated Data Safety Zone Framework that integrates and unifies the process of generating, processing, analyzing, and utilizing mobility data. The integrated process for data processing was redesigned, and common requirements and core technologies were derived. The result is an architecture for a next-generation Integrated Data Safety Zone system that can manage and utilize the entire life cycle of mobility data at one stop.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

A Framework on 3D Object-Based Construction Information Management System for Work Productivity Analysis for Reinforced Concrete Work (철근콘크리트 공사의 작업 생산성 분석을 위한 3차원 객체 활용 정보관리 시스템 구축방안)

  • Kim, Jun;Cha, Heesung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.2
    • /
    • pp.15-24
    • /
    • 2018
  • Despite the recognition of the need for productivity information and its importance, the feedback of productivity information is not well-established in the construction industry. Effective use of productivity information is required to improve the reliability of construction planning. However, in many cases, on-site productivity information is hardly management effectively, but rather it relies on the experience and/or intuition of project participants. Based on the literature review and expert interviews, the authors recognized that one of the possible solutions is to develop a systematic approach in dealing with productivity information of the construction job-sites. It is required that the new system should not be burdensome to users, purpose-oriented information management, easy-to follow information structure, real-time information feedback, and productivity-related factor recognition. Based on the preliminary investigations, this study proposed a framework for a novel system that facilitate the effective management of construction productivity information. This system has utilized Sketchup software which has good user accessibility by minimizing additional data input and related workload. The proposed system has been designed to input, process, and output the pertinent information through a four-stage process: preparation, input, processing, and output. The inputted construction information is classified into Task Breakdown Structure (TBS) and Material Breakdown Structure (MBS), which are constructed by referring to the contents of the standard specification of building construction, and converted into productivity information. In addition, the converted information is also graphically visualized on the screen, allowing the users to use the productivity information from the job-site. The productivity information management system proposed in this study has been pilot-tested in terms of practical applicability and information availability in the real construction project. Very positive results have been obtained from the usability and the applicability of the system and benefits are expected from the validity test of the system. If the proposed system is used in the planning stage in the construction, the productivity information and the continuous information is accumulated, the expected effectiveness of this study would be conceivably further enhanced.

An Active Queue Management Algorithm Based on the Temporal Level for SVC Streaming (SVC 스트리밍을 위한 시간 계층 기반의 동적 큐 관리 알고리즘)

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.425-436
    • /
    • 2009
  • In recent years, the user demands have increased for multimedia service of high quality over the broadband convergence network. These rising demands for high quality multimedia service led the popularization of various user terminals and large scale display equipments, which needs a variety type of QoS (Quality of Service). In order to support demands for QoS, numerous research projects are in progress both from the perspective of network as well as end system; For example, at the network perspective, QoS guaranteeing by improving of internet performance such as Active Queue Management, while at the end system perspective, SVC (Scalable Video Coding) encoding scheme to guarantee media quality. However, existing AQM algorithms have problems which do not guarantee QoS, because they did not consider the essential characteristics of video encoding schemes. In this paper, it is proposed to solve this problem by deploying the TS- AQM (Temporal Scalability Active Queue Management) which employs the differentiated packet dropping for dependency of the temporal level among the frames, based on SVC encoding characteristics by exploiting the TID (Temporal ID) field of the SVC NAL unit header. The proposed TS-AQM guarantees multimedia service quality through video decoding reliability for SVC streaming service, by differentiated packet dropping when congestion exists.