• Title/Summary/Keyword: 운영관리방안

Search Result 2,756, Processing Time 0.032 seconds

A Study on the Development of Maintenance System for Equipment of LNG-FPSO Ship (LNG-FPSO 선박 장비들의 보전활동 지원시스템 개발에 관한 연구)

  • Lee, Soon-Sup;Kang, Donghoon;Lee, Jong-Hyun;Lee, Seung-Jun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.2
    • /
    • pp.233-239
    • /
    • 2016
  • In this paper, a maintenance system is developed for LNG-FPSO topside and hullside equipment based CBM (Condition Based Maintenance) methodology. First, the development system defined the PWBS(Product Work Breakdown Structure) of major equipment of LNG-FPSO. Second, the development system developed the failure analysis, economic evaluation for optimal maintenance plan and database systems that save and manage information about equipment, failure mode, failure rate and failure cause. Finally, the verification of the development system was applied to the inlet system of topside and the pump tower system of hullside and the system was confirmed the effectiveness of CBMS(Condition Based Maintenance System).

A Survey Study for Establishment of National Global Earth Observation System of Systems (국가 전지구관측시스템 구축을 위한 기초조사연구)

  • Ahn, bu-young;Joh, min-su
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.80-83
    • /
    • 2007
  • Entering 21st century, various natural disasters have been caused by the scorching heat wave, earthquake, tsunami, typhoon and so on. The casuality and damages have been drastically increased in terms of the frequency and magnitude. Therefore, 50 nations around the world agreed to build up the GEO(Global Earth Observation) in charge of the earth observation for the understanding of the earth system changes, monitoring and prediction and it is on operation. To keep the pace with GEOSS for the cooperation of Science & Technology and to successfully achieve the GEOSS project, KGEO office was established and has been on its duty. Moreover, for more prosperous building of the GEOSS, in cooperation with KGEO and KISTI(Korea Institute of Science and Technology Information), we've conducted the survey of the domestic situation about 9 societal benefit areas of the GEOSS. This survey consists of 5 sections as follows: the standardization, the information system management, the raw data and metadata, the infrastructure, and the others. This survey results will be used as the basic material for establishing the National Global Earth Observation System.

  • PDF

Analysis of Train Delay in Daejeon Metro (대전도시철도의 열차 지연운행 분석연구)

  • Kwon, Young-Seok;Lee, Jin-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.50-57
    • /
    • 2017
  • This study investigated the causes and problems of train operation impediments through the statistics analysis of 8 years'internal data of Daejeon Metropolitan Express Transit. By evaluating the risks regarding the system, equipment, and parts of high risk group, this study measured the Risk Index Severity, and applied the $5{\times}5$ Risk Assessment Matrix which is a method of risk management to calculate the scale of risk to analyze the safety level and allowance range. As a result, the car sector, the most serious risk, followed by machinery and equipment sector showed that the inherent risk. In particular, the door broken and the door rail signaling and control devices due to defects of the vehicle is high, but also the severity, and frequency are showing very frequent additional potential accidents. PSD also had defects in the machinery sector appeared to be the most dangerous of the PSD poor safety gates, it was found that the glass also involve the risk of mishandling and breakage of the PSD. This study intended to contribute to the transportation benefits through the safety and stable operation of Metropolitan Express Transit.

Construction of an Hybrid Firewall for School Networks and Implementation of a Graphical Interface for Access Control Rules (학교망을 위한 혼합방화벽 구축 및 접근제어 규칙을 위한 그래픽 인터페이스 구현)

  • Park, Chan-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.2
    • /
    • pp.67-75
    • /
    • 2000
  • Due to the advantages of Internet, many teachers use Internet as an educational tool and due to the computerized works in schools, the usages of the Internet increase. However, because of the openness of the Internet, the sensitive data of an organization are exposed to outsiders and the Internet-based working has some problems such as the corruptions of instructional data or on-line assessment results. The need for protecting a school network from outsiders increases but the school networks with firewalls rarely exist. In this paper, in order to solve the security problem of a school network, we construct a hybrid firewall for school networks. In addition, we implement a graphical user interface for teachers to set up the access control rules of a hybrid firewall easily. The interface also provides the facilities such as log analysis, a real-time monitor for network traffics, and the statistic on traffics.

  • PDF

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

A Study on the Analysis and Current State of the Records Disposition Schedule in College of Education: Focused on J College of Education (교육대학교의 기록물분류기준표 운영현황 및 분석에 관한 연구 - J교육대학교를 중심으로 -)

  • Bae, Sung Jung;Oh, Hyo-Jung;Jang, Jun Kab;Kim, Yong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.1
    • /
    • pp.187-216
    • /
    • 2016
  • This study aims to identify the problems of the records disposition schedule of the college of education through transaction and records folder analysis. For these purpose, the study conducted a literature survey. Moreover, this study compared and analyzed the records classification system of the all college of education. In addition, we conducted an interview to the person in charge and gained the materials from the national archives in Korea thorough a request of information disclosure. It was found that problems in terms of practical side. Consequently, based on the analysis, the college of education have established and segmented the transactions properly. With the proposed system, records disposition schedule of the college of education can be facilitated.

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

Industrial Security Crime's Realities and Counter-Measure (산업보안범죄의 실태 및 대응방안)

  • Seo, Bong Sung;Lim, You Seok
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.141-149
    • /
    • 2015
  • Modern society is to have an significant impact on the competitiveness of the country in which the economic value is very high occupancy and ensure a state-of-the-art science and technology. The country's core technology or industry security crimes going seized state-of-the-art technology firms can threat of damage to the country's economic security. In particular, the defense industry serious crime that is directly related to national security. The company's core technology and trade secrets leaked once the industrial countries must prevent security breaches and offenses of strict punishment measures because it is impossible to recover. Also, some advanced countries directly has been operating industrial security crime for the country's economy and national security. In recent years, Nation core technology infringement cases are rapidly increasing in the country. In addition, industrial security crime threat to national security. Therefore, the industry security crimes damage to the national security that infringe on the business secrets of core technologies and businesses. It is necessary to identify that industry security crime associated with the visibility of the broad scope of intellectual property protection.

A Study on the Overseas Expansion Strategy of u-City based on BIM/GIS (BIM/GIS 기반 u-City 해외진출 전략 연구)

  • Na, Joon Yeop;Lee, Woo Sik;Hong, Chang Hee;Hwang, Jung Rae
    • Spatial Information Research
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2012
  • u-City is next generation city which can innovate functions of city. It can realize increase of convenience, improvement of life quality and safety guarantee by convergence of information technologies and ubiquitous service with urban space. Market of u-City is in range of rapid growth and u-City can make enormous synergy effects by accompanying construction technologies with spatial information, sensor technologies, communications network and related equipments. In this study, we analyzed the domestic/abroad status, researches and element technologies involved in u-City. And, we suggested overseas expansion strategy of u-City such as selection and analysis of target nations, packaging method of u-City service models and application of BIM/GIS connection technologies in terms of u-City construction and operation.

A Survey on the Obstacles of Technology-based Startups (기술창업 장애요인 실태조사)

  • Kim, Dae-Ho;Kim, Hong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.4 no.1
    • /
    • pp.67-88
    • /
    • 2009
  • The purpose of this study IS to suggest the failure factors and the success factors of technology-based startups(TBS). This study surveyed 327 startup companys on the general obstacles of starting business and the entrepreneurship policy of the Government. The failure factors of TBS are 1) overconfidence of TBS in their technology, 2) lack of cost management, 3) lack of concentration on the sales revenue of their activies, 5) many unplanned challenges, and 5) lack of strategic decision. And the success factors of TBS are 1) CEO's leadership having a clear business concept, 2) development of innovative products and services, 3) flat and flexible organization structure, 4) leveraging outside business resources and networks, and 5) strengthening the human resources by the hybrid agent.

  • PDF