• Title/Summary/Keyword: 자원 절감

Search Result 640, Processing Time 0.032 seconds

A Study on the Archives Management System in Cloud Computing (클라우드 컴퓨팅 환경 영구기록물관리 시스템 구축 방안 연구)

  • Kim, Ki-Jung;Shin, Dong-Soo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.18 no.3
    • /
    • pp.49-70
    • /
    • 2018
  • This paper proposes a cloud system model for incorporating the existing Records Management System (RMS), Archives Management System (AMS), and Central Archives Management System (CAMS) into a cloud-based national records management system. To do this, research on concrete and stepwise ways to transform AMS, including CAMS, into a cloud computing environment was carried out. This study developed a cloud system design strategy and goal model to integrate national records-related systems into a single cloud system to share and utilize information resources, manage them efficiently, and reduce costs. In particular, this study analyzed technical security and operational security that are exposed in the cloud environment and suggested measures to solve them. As a result, cloud computing technology can be applied to achieve low-cost and high-efficiency effects.

A Comparative Analysis for the Awareness of the Integration of Korea's Port Authorities (우리나라 항만공사 조직구성원들의 통합의도에 관한 비교연구)

  • Ha, Myungshin
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.3
    • /
    • pp.1-25
    • /
    • 2012
  • In order to solve the current problems and inefficiencies within the Port Authorities (PA) in Korea, this study introduces the concept of the integration of PA and analyses the awareness of intention of integration. This study is based on analysing the surveys conducted by the members of PA. This research shows that there were different perceptions on the autonomy, business strategy intension, information sharing efficiency, competition, environment and technique change, capital finance, easy finance risk, curtailment of expenditure, personnel management efficiency in PA. Results of the study indicate that YGPA has more clear understanding on the awareness of integration of PA than other PAs. The results of this research will serve as a basic literature for further studies on the integration of PA in Korea. Moreover, the problems that have been identified and analysed in this study will contribute to establishing the strategy for further development of PA in Korea.

A Simulation Framework of Multi-Agent Based Small Engagement Using Cougaar Architecture (Cougaar Architecture 활용 다중 에이전트 기반 소규모 교전 시뮬레이션 Framework)

  • Hwam, Won-K.;Chung, Yong-Ho;Park, Sang-C.
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.101-109
    • /
    • 2011
  • M&S in the field of national defense is a battle system has been highly spotlighted for obtaining weapon systems, analyzing and experimentation of battle effects to reduce costs, time, and risks. It is classified as Campaign, Mission, Engagement, and Engineering levels by detail of description. In engagements, many situations on the battle field which are really unpredictable are required to be considered on the view of diverse tactics. Thus, engagement simulation is in demand to use for forecasting real-world battle situations by inserting various components which consists of real engaging situations into virtual local battle field. While developing the engagement simulation, adopting the concept of agent-based simulation gives it benefits which are improved autonomy, composability, and reusability of entities. It means reducing the time, cost and effort to develop the simulations. This paper concentrates on the framework of multi-agent based engagement simulation using Cougaar Architecture.

A Study on Smart Home Power-Control System with Power-Saving Green Adapter (전력절감 그린어뎁터를 이용한 스마트홈 전력 통제시스템)

  • Yoo, Seung-Jae;Park, Hee-Dong;Kim, Song-Gang
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.85-92
    • /
    • 2013
  • Today we have an obligation to pass the beautiful earth and enrich people's lives to next generations. According to the keynote, governments have a lot of resources to support the smart grid policies. Also the demand of the implementation of smart home applied the concept of smart grid is increasing rapidly. But the construction of smart home is centered on a new public housing except the pre-existing house which is counted for most of more than 90% of total. In this study, we suggest the implementation solution to make smart-homelike for the pre-existing houses without additional wiring or construction. We develop the technology reducing the unnecessary standby power 800mW to 20mW drastically. If we apply this technology, by the power off of main IC the actual power depends on the consumption of minimal devise located on the AC input side. Then the standby power becomes approximately 20mW(110ac).

An Application of Safety Management for Tunnel Construction Using RTLS Technology (RTLS기술을 이용한 터널공사현장의 실시간 안전관리 적용방안)

  • Kim, Dae-Won;Moon, Sung-Mo;Cho, Hun-Hee;Kang, Kyung-In
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.2
    • /
    • pp.12-20
    • /
    • 2011
  • Recently, construction site scale has been growing larger along with the growth of national economy. As construction market requires time reduction, cost saving, and improving quality, a cutting-edge technology applied research has been gradually studied for more efficient project management. In particular, the Real Time Location System (RTLS) technology, a real-time location tracking system of construction resources, can be effectively used in safety management. This technology has been studied and applied in various industries including architectural, marine, urban, and other industries. However, although tunnel construction in civil engineering has a narrow space and many safety risks, there are not researched about this content. Therefore, this study proposes an advanced safety management model for tunnel construction using the RTLS technology and a measurement method of the feasibility of this model in the construction site.

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.

Performance Analysis of Tradeoff between Energy Consumption and Activation Delay in UMTS State Transition Mechanism (UMTS 상태 천이 방식에서 에너지 소비와 활성 지연간의 트레이드오프 성능 분석)

  • Choi, Hyun-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1085-1092
    • /
    • 2012
  • Mobile communication systems define user state transition mechanisms in order to manage radio resources and battery power efficiently. In the state transition mechanism, a state with a higher energy consumption inherently offers a shorter access delay, so there is a tradeoff between the energy and delay performances. In this paper, we analyze the user state transition mechanism of UMTS by considering the bursty traffic attributes of mobile applications. We perform a numerical evaluation for both the energy consumption and the activation delay by Markov modeling of the state transition mechanism, and investigate their tradeoff relationship as functions of operational parameters. The resulting energy-delay tradeoff curves clearly show an achievable performance bound of the user state transition mechanism and also offer an optimal operation strategy to minimize the energy consumption while guaranteeing the delay requirement.

Technology Innovation Activity and the Default Risk : the Mediation Effect of Sales and Profitability (기술혁신활동이 부도위험에 미치는 영향에 있어서 매출액과 수익성의 매개효과)

  • Kim, Jin-Su;Yun, Young-Jun
    • Journal of Korea Technology Innovation Society
    • /
    • v.12 no.4
    • /
    • pp.715-739
    • /
    • 2009
  • Technology innovation activity plays an important role in increasing a sales by bringing on the improvement of product's performance and a profitability by reducing the cost of production. Thus, technology innovation activity can reduce the default risk of firms. However, in spite of these effects of technology innovation activity, this activity can make the default risk of firm because it induce a firm to much investment of resources. This study examines the effect of technology innovation activity on the sales, profitability, and default risk of firms. This study's sample consists of manufacturing firms listed on the Korea Stock Exchange from January 1, 2000 to December 31, 2008. The results show that technology innovation activity has a positive effect on the sales (profitability) but a negative effect on the default risk of firms. Also there is the significant mediation effect of sales and profitability.

  • PDF

Efficient certificate management system design and implementation on the use of medical solutions (의료솔루션 사용과 관련된 효율적인 인증서 관리 시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.5 no.1
    • /
    • pp.114-121
    • /
    • 2016
  • Currently, different medical institutions have been carrying out the e-healthcare system project. The system includes electronic medical record and prescription delivery system, and, the Medical Treatment law permits electronic signature for medical record management, which reduced the relevant costs and enabled sharing medical record. And medical solution using online certificates is expanding its application. In that light, the role of certificates became more important than ever. However, in contrast to active effort made to manage personal certificates, certificates related to medical solutions and other types of work are not being managed properly. Most work-related certificates are saved in office computers, which makes them vulnerable to various security threats. Although certificate servers can be used as a solution to this problem, hospitals must build the server separately and, therefore, small and medium-size hospitals can be reluctant to bear the burden. This study proposed a way to design and implement an effective and secure certificate management system by save the certificate file as a BLOB, using existing resources without needing to build a separate certificate server, at minimized costs.

An Exploratory Study on Security Threats of Smartwork Environment (스마트워크 환경에서의 보안 위협에 관한 탐색적 연구)

  • Ra, Jong-Hei;Choi, Young-Jin;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2012
  • Present many organizations are introduced to smartwork for reducing the operational cost and getting the labor's flexibility. The smartwork is the future-oriented worker's environment in which they can engage in their task, anytime and anywhere conveniently and efficiently. In spite of many smartwork advantages, the security problems are major issues and prevent to introducing and spreading of smartwork for organizations. Therefore, the success of the organization for smartwork environment is put in place appropriate security control model. This study is about security threats for smartwork security control model. We apply the exploratory method for this research, which are reviewing, analyzing of literature for extracting the security threats and clustering of the extracted security threats. Finally we define the 16's security threats according to the aspect of smartwork service layers.