• Title/Summary/Keyword: 통합지원체제

Search Result 136, Processing Time 0.025 seconds

The Path Formation of Thailand's Electricity/Energy Regime and Sustainability Assessment (태국 전력/에너지 체제의 경로 형성과 지속가능성 평가)

  • EOM, Eun Hui;SHIN, Dong Hyuk
    • The Southeast Asian review
    • /
    • v.27 no.4
    • /
    • pp.1-40
    • /
    • 2017
  • This study aims to examine the electricity/energy regime of Thailand, the largest energy-hungry country in the Mekong region. This study examined how the electricity/energy regime of Thailand has been shaped and changed up to the present, not only at the national level but also at the sub-regional level covering the Mekong region. Meanwhile, according to the Paris Agreement in 2015, which will get in to effect from 2020, developing countries as well as developed countries have been given voluntary responsibilities and reduction obligations in response to global climate change. Under the post 2020 Climate Change Regime, Thailand also needs to revise its existing electricity/energy policy. We reviewed the recent energy policy of Thailand and evaluated the possibility of transition to a sustainable energy system based on Energy Trilemma's analysis framework. And we examined the roles and impacts of the Thai civil society on the national power and energy planning as well as in the future climate change policy. As a result of the analysis, it can be seen that Thailand's electricity/energy regime has grown rapidly through the support of the West countries under the Cold War era. In particular, Electricity Generating Authority of Thailand(EGAT) played the key role in Thailand's energy policy. In addition, Thailand's geopolitical location and relatively high economic level compared to neighboring countries will continue to be of importance in the future construction of power grids in the region. Meanwhile, in the frame of Energy Trilemma, Thailand has still been vulnerable to environmental sustainability. Thai NGOs have resisted to as well as collaborated with the government to influence the existing electricity/energy policy in the various dimensions but their influence has weakened considerably since the coup in 2014. In conclusion, this study suggests to cooperate with government as well as civil society for sustainable energy transformation of Thailand and Mekong region.

Development of a Blended U-Learning System using Intelligent Script Interpreter (지능형 스크립트 인터프리터를 이용한 Blended U-Learning System의 개발)

  • Kim, Yong-Beom;Jung, Bok-Moon;Kim, Yung-Sik
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.489-496
    • /
    • 2007
  • u-러닝(u-learning) 체제의 도입은, 다양한 형태의 원격교육을 지원하기 위한 교수-학습 시스템 및 모형을 요구하며, 이에 따라 유무선 인터넷을 이용한 u-러닝 시스템이 지속적으로 개발 적용되어 왔다. 하지만, 현재 운영되고 있는 대부분의 원격교육시스템은 교수자와 학습자간의 지속적인 쌍방향 상호작용 유지의 어려움, 시스템 구축을 위한 경제적 부담, 시스템 운영에 투입되는 교수자의 기술적 소양 부족 등의 문제점을 안고 있다. 이러한 문제점을 해결하기 위해서는 다음 항목에 대한 제고가 필요하다. 첫째, 효율적인 쌍방향 상호작용은 학습자 행동에 대한 지속적인 모니터링 및 피드백, 그리고 교수자의 상시 접속 상태 유지를 전제로 한다. 이는 사이버 교사(cyber tutor)를 이용하는 지능형 학습에 대한 논의로 이어진다. 둘째, 구현될 시스템은 경제성과 재사용성 측면이 고려되어야 하며, 이는 기존의 학교 현장의 인프라를 활용하는 u-러닝 개념의 학습 환경, 즉 이동성 네트워크 구조에 대한 설계가 요구된다. 셋째, 시스템의 직접적인 운영 주체인 일선 교사들의 기술적 소양을 고려할 때, 시스템 구축 및 사용상의 편리성, 학습 진행을 위한 보조적 지원 장치 등이 충분히 전제되어야 한다. 이에 본 연구에서는, 이동성과 내재성의 u-러닝 개념을 포함하고, 지능형 가상 교수자(cyber tutor)에 의한 블랜디드 학습(blended learning)을 도입하며, 사용자의 기술적, 경제적 부담의 제거가 가능한 지능형 u-러닝시스템을 개발하였다. 본 연구에 의해 개발된 시스템은 기존의 네트워크 인프라와 u-러닝의 개념을 통합하는 네트워크 구조, 원격학습을 지원하는 네트워크 화이트보드, 학습 과정의 저장과 해석을 지원하는 스크립트 인터프리터, 학습자 반응에 대한 피드백을 자동 제공할 수 있는 지능형 인터프리터로 구성되었다.

  • PDF

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

A Study on Integrated Anti-counterfeiting Strategy to stop the forgery for Korean cosmetics in China (중국에서 한국 화장품의 위조근절을 위한 통합적 위조방지 전략 연구)

  • Koh, Joong Hyun
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.81-112
    • /
    • 2016
  • About 60 percent of cosmetic products sold in the dominant Taobao internet shopping mall proved recently to be counterfeit products made in China. This paper is to investigate the anti-counterfeiting strategies to clean up fake goods for Korean cosmetics which have been exported to China. Using the scienter rule the paper classified the forgery action for Korean cosmetics into four broad groups - counterfeit, piracy, illegally distributed product, and brand prior register. This paper suggested interior company's anti-counterfeiting strategies for each group, focusing on the construction for an integrated anti-counterfeiting system including consumer's rationality through the government cooperation between Korea and China.

  • PDF

Bibliographic metadata development for the efficient information resource sharing (효율적 정보자원 공유를 위한 서지 메타데이터 XML DTD 개발)

  • Lee, Hye-Jin;Song, In-Seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.427-433
    • /
    • 2004
  • Most information providers are offering integrated retrieval service based on the bibliographic metadata and schema corresponding to each type of document which are developed in a distributed and independent way. However, it is difficult to maintain the relational consistency of those single heterogeneous databases even though they obey the metadata standard like MARC or MODS. It is the main reason that those standards are restricted to present the general property of document regardless of its type and not to applied to define the relationship of document types. Therefore, It is necessary to define a comprehensive meta model to associate the related databases in a systematic way so that the semantically common part of them can be easily shared and reused without any additional effort like conversion or mapping. In this paper, we first outline the document types for designing meta model by the empirical analysis of various data schema of main information providers. We propose then data element definition, metadata model and modularized XML DTD which support the efficient and consistent management of multiple ducument types.

  • PDF

A Study on Modeling a Unified Policy Information Service System in Korea (정책정보통합서비스시스템 구축 모형에 관한 연구)

  • Hong, Hyun-Jin;Noh, Young-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.42 no.1
    • /
    • pp.95-125
    • /
    • 2008
  • Despite huge significance of public policy information to a country and its people, it seems that Korean government lacks a nationwide service that specializes in managing those information. Nowadays the organization of the central government is very complicated and the amount of information and data they are producing is massively growing. Naturally, without any advanced knowledge, it is not easy to find the information you want from the government information service. Besides, government publications are scattered and not under control of unified collection. This study suggests an efficient policy information service model that can i) provide stepping stones for a competent knowledge-based government by providing necessary information for policy-making process in government ministries and public organizations, ii) build national policy information infrastructure by incorporating policy-related information dispersed over different ministries, and iii) identify new approaches to improve policy information services.

Building Resilience through Integrated Urban Climate Education: A case study in Da Nang City, Central Vietnam (통합 도시 기후 교육을 통한 복원력 구축: 베트남 중부 Da Nang 시 사례 연구)

  • Tong, Thi My Thi;Tran, Van Giai Phong;Lee, Dal-Heui;Park, Tae-Yoon;Han, Shin
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.12 no.1
    • /
    • pp.1-17
    • /
    • 2019
  • The importance of education in formulating and complementing climate change response has been widely recognized by international and national frameworks, agendas, strategies and action plans. Climate change education has the potential to meet the needs of communities to access updated information and knowledge on climate change, supporting policy development and the enhancing effectiveness of climate change response. This study develops an innovative model of Integrated Urban Climate Education (IUCE) as one suitable method for teaching and learning climate change and urbanization. This paper presents approaches, methodology and key lessons learned from the case study of IUCE in Cam Le District of Da Nang City. Findings from the study identify a number of important characteristics about the development and implementation of IUCE in a way that effectively contributes to urban resilience building. These characteristics include (1) multidimensional approaches, (2) teacher - centered base, (3) school-family-community connection, and (4) symbiosis principle.

A Study on the Relative Importance of Evaluation Factors for Improvement of Port Security (항만보안 강화를 위한 평가요인과 상대적 중요도 분석)

  • Kang, Min-Gu;Kim, Hwa-Young
    • Journal of Navigation and Port Research
    • /
    • v.43 no.1
    • /
    • pp.49-56
    • /
    • 2019
  • The purpose of this study was to extract the evaluation factors and assess the relative importance between the factors. For this purpose, the evaluation factors were extracted through literature review and the process of brainstorming with experts, who are related to port security. The evaluation factors were then classified into four higher factors and twelve sub- factors through the use of the AHP method. A survey on the classified factors was conducted by experts composed of public officials, port authority employees and education institutions officials. We also carried out statistical tests to determine the perception gap of weights between the groups. As a result of a relative importance analysis of strength, the security operating system factor was highest, followed by improvement of hardware facilities and increase of security personnel. There was a difference in perception among the groups in policy support, facility support and personnel resources budget support. The results of the analysis show that the strength operating system through the establishment of an integrated monitoring system is a priority. It is necessary to understand the difference of perception between groups and build a systematic cooperation system. The evaluation factors extracted from this study can be used for the measurement of port security efficiency in further work.

Design and Implementation of Multi-Function Display Operational Flight Program and Middleware Using Real-Time and Embedded System Java Virtual Machine (실시간 임베디드 시스템용 자바 가상머신을 이용한 다기능 시현 비행운용 프로그램 및 미들웨어 설계 및 구현)

  • Won, Hyeon-Kwon;Jeong, Chai-Hun;Choi, Kyong-Sik;Kim, Jong-Pil;Kim, In-Gyu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.11
    • /
    • pp.1060-1068
    • /
    • 2011
  • In this paper, we present a development of an Operation Flight Program(OFP) on Real Time Operating System(RTOS) and Java Virtual Machine(JVM) of real-time and embedded system. The OFPs are consisted of Multi Function Display(MFD), Integrated Up Front Control(IUFC), Head Up Display(HUD) and Fire Control(FC) and loaded for localization Mission Computer(MC). This paper describes the structure and implementation of a MFD OFP and middleware based on Java.

Executable Code Sanitizer to Strengthen Security of uC/OS Operating System for PLC (PLC용 uC/OS 운영체제의 보안성 강화를 위한 실행코드 새니타이저)

  • Choi, Gwang-jun;You, Geun-ha;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.365-375
    • /
    • 2019
  • A PLC (Programmable Logic Controller) is a highly-reliable industrial digital computer which supports real-time embedded control applications for safety-critical control systems. Real-time operating systems such as uC/OS have been used for PLCs and must meet real-time constraints. As PLCs have been widely used for industrial control systems and connected to the Internet, they have been becoming a main target of cyberattacks. In this paper, we propose an execution code sanitizer to enhance the security of PLC systems. The proposed sanitizer analyzes PLC programs developed by an IDE before downloading the program to a target PLC, and mitigates security vulnerabilities of the program. Our sanitizer can detect vulnerable function calls and illegal memory accesses in development of PLC programs using a database of vulnerable functions as well as the other database of code patterns related to pointer misuses. Based on these DBs, it detects and removes abnormal use patterns of pointer variables and existence of vulnerable functions shown in the call graph of the target executable code. We have implemented the proposed technique and verified its effectiveness through experiments.