• Title/Summary/Keyword: 설계변경관리

Search Result 558, Processing Time 0.025 seconds

A Study on the Reformation of the Contract Time Extension Process in the Public Construction projects (공공건설사업에서 계약기간 연장처리방법 개선에 관한 연구)

  • Cho Young-Jun;Lee Sang-Beom
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.3 s.25
    • /
    • pp.81-89
    • /
    • 2005
  • Delay schedule coming about duration extension is happening essentially because public construction project consist of many sub contractor. The method which can calculate delay day is suggested by many studies in case of happing delay schedule, but It is difficult to apply to real construction project because there is no mention about the control of The law of contract according to delay schedule. The law of Contract which is cost of account has more uncertain problem than FIDIC condition of contract. This study suggests method which can make extension of duration procedure clear in case of happing the reason of design change related with activity duration during carrying on construction, and a submission process of the reason of duration extension and modify schedule making way about section which is basis of calculating contract amount clear.

A Study on the Modeling of Three-Dimensional Work Structure Using Web 3D in Cyberspace (Cyberspace에서 Web 3D를 이용한 3차원 공사 구조물 모델링의 활용성 제언)

  • Lee Hui-Chul;Lee Tai-Sik;Kim Young-Hyun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.531-534
    • /
    • 2002
  • Complexity in construction projects has increased over the years, which has led to an increase in the number of organizations involved in those projects. In today's environment, these organizations operate in different parts of the world requiring their personnel to be geographically distributed. So, these organizations construct and utilize the information systems. However, looking into this systems' content, those use two-dimensional planes such as pictures and drawings to check the scheduling etc., which cause the defect of communication and problems such as change order. Accordingly, this study introduces the Web 3Ds and 3D Libraries, intends to present the effect on modeling of three-dimensional work structure using Web 3D in cyberspace.

  • PDF

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 더블키를 이용한 경량 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.239-254
    • /
    • 2007
  • Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.

An Integrated Authentication System for Mobile Codes (이동코드를 위한 통합 인증 시스템)

  • Bae, Seong-Hun;Lee, Su-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.535-542
    • /
    • 2001
  • Mobile codes such as Java, Java-Script, ActiveX, and Script code are loaded into a client system first and then run without any notice to the client user. Executing code by this mechanism may cause various security problems such as flowing out system information, deleting or modifying files, and exhausting system resources. In this paper we propose an integrated authentication system to establish the uniform security countermeasure on various mobile codes. The system helps to solve to problems mentioned above. An integrated authentication system allows to load into an interpreter using ACL (Access Control List) which sets up an access authority to the executable contents and communicates with an interpreter using client/server model.

  • PDF

An Aspect-Oriented Slicing Technique Tracing Crosscutting Concern (횡단관심사 추적을 위한 관점지향 슬라이싱 기법)

  • Park, Jong-Kack;Park, Ok-Cha;Yoo, Cheol-Jung
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.741-752
    • /
    • 2008
  • Aspect-Oriented Software Development(AOSD) is the software development methodology that classifies concerns of the system and identifies crosscutting concerns and organizes aspect class, and AOSD has emerged as an important user-oriented software development methodology with high maintainability. However, most of related studies worked on identification and specification and coding of crosscutting concerns. And there have been few studies on slicing technique for tracing method of specified crosscutting concerns. Therefore, this paper proposes slicing technique based on AOSD that identifies and specifies crosscutting concerns through interactive analysis between use cases; also, suggests slicing technique which improves traceability centering on identified crosscutting concerns; applies the aspect-oriented slicing technique to Learning Management System(LMS) for case-study. LMS is a cyber educational system that demands a lot of functional changes and expansion, so it is effective to apply AOSD with high maintainability in developing LMS; and shows the results that compared with related studies by comparing six elements.

A Neural Network Model for Selecting a Piling Method of Building Construction (건축공사 말뚝공법 선정을 위한 신경망 모델 개발)

  • Cheon Bong-Ho;Koo Choong-Wan;Um Ik-Joon;Koo Kyo-Jin
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.317-322
    • /
    • 2004
  • As a construction project in urban area tends to be high-rise and huge, the importance of the project's underground work, in terms of the cost and the schedule, is gradually increasing. It's extremely significant to choose a proper filing method, at the stage of underground work. However, in piling work many change orders have been occurred since a piling method is experientially selected based on uncertain information and many earth factors to consider. It has effects on the cost and the schedule of the project. In this study, we have suggested a decision model for piling method that can be used to determine and verify the suitable piling method in design and pre-construction phase of a project. Based on historical data, a neural network model has already proven to be efficient. The tests of the model for selecting a suitable piling method have progressed exactly with the data of 150 piling works which were done room 2000 to 2004 in Korea. The optimization or the developed neural network model has progressed with the data for teaming. The validity of the neural network model has been verified.

  • PDF

A Diet Prescription System for U-Healthcare Personalized Services (유헬스케어 개인화 서비스를 위한 식단 처방 시스템)

  • Kim, Jong-Hun;Park, Jee-Song;Jung, Eun-Young;Park, Dong-Kyun;Lee, Young-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.111-119
    • /
    • 2010
  • U-Healthcare provides healthcare and medical services, such as prevention, diagnosis, treatment, and follow-up services whenever and wherever it is needed, and its ultimate goal is to improve quality of life. This study defines the figure of U-Healthcare personalized services for providing U-Healthcare personalized services and proposes a healthcare model. A diet prescription system for personalized services can draw customized calories and rates of nutrition factors and represent a personalized diet through analyzing the personal preference in foods. This system changes the personal preference by monitoring the diet selection behavior of users. Also, this system is designed to be interactively operated with some sensors and devices in various environments using Java-based OSGi middleware.

A Study on Improvements of Regulation for the Preventing Commercial Disputes Related to Adjustment of Subcontract Price (하도급대금 조정 관련 분쟁의 예방을 위한 법규 개선방안에 관한 연구)

  • Min Byeong-Uk;Lee Jong-Gwang;Kim Yong-Su
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.1 s.23
    • /
    • pp.186-194
    • /
    • 2005
  • The purpose of this study is to examine the problems of the regulations regarding the modification of subcontact price. It also suggests several measures to improve the regulations related to the subcontact price adjustment which help to reduce unnecessary claims and commercial disputes. The literature research, structure and context analysis on the subcontract regulation and survey are adopted as basic research methods. The primary findings of this study are summarized as the following: (1) A provision outlining necessary procedures that an owner and a contractor should notify a subcontract or the adjustment of contact price needs to be made. (2) A provision allowing procedures that subcontactor could make the alteration of subcontract agreement and adjustment of subcontact price needs to be made. (3) The terminology like a unit cost and the rate of contact price needs to be clearly defined in order to improve the criterions of the subcontact price adjustment. (4) The criterions and additional expenses that the contractors ate responsible far need to be defined.

System Design for the Safe store and Issue Service Assurance of the E-Document (전자문서의 안전한 보관 및 발급 서비스 확보를 위한 시스템 설계)

  • Sung, Kyung-Sang;Kim, Jung-Jae;Oh, Hae-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.173-180
    • /
    • 2008
  • Certified e-Document Authority keep it with protection legal as a system a guarantee and identifies originality of an e-Record, It presume to be authenticity e-Records and contents of an e-Record prove what was not changed. But, e-Records has high medium degree of dependence and loss danger of information has very high problems. In addition, Because correction(attachment and deletion) and a revision of information are easy, a problem for integrity and the originality of an e-Record is caused. Existing system show the following inefficient. For the originality guarantee, an existing e-Documents encryption method accomplishes a encrypted process of a whole document with a symmetric key, if the information revised midway, the whole documents content must accomplish re-scanning and re-encryption process again. To get over such inefficient, this paper maximize efficiency which occurred at the time of partial information revision request by encryption and managing using the link information based on the linkage characteristics of the each page on the registered requested e-Documents, It was able to increase security configuration by minimizing problems on an information exposure through increasing complicated of the key management.

  • PDF

An Efficient Code Expansion from EM to SPARC Code (EM에서 SPARC 코드로 효율적인 코드 확장)

  • Oh, Se-Man;Yun, Young-Shick
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2596-2604
    • /
    • 1997
  • There are two kinds of backends in ACK:code generator(full-fledged backend) and code expander(fast backend). Code generators generate target code using string pattern matching and code expanders generate target code using macro expansion. ACK translates EM to SPARC code using code expander. The corresponding SPARC code sequences for a EM code are generated and then push-pop optimization is performed. But, there is the problem of maintaining hybrid stack. And code expander is not considered to passes parameters of a procedure call through register windows. The purpose of this paper is to improve SPARC code quality. We suggest a method of SPARC cod generation using EM tree. Our method is divided into two phases:EM tree building phase and code expansion phase. The EM tree building phase creates the EM tree and code expansion phase translates it into SPARC code. EM tree is designed to pass parameters of a procedure call through register windows. To remove hybrid stack, we extract an additional information from EM code. We improved many disadvantages that arise from code expander in ACK.

  • PDF