• Title/Summary/Keyword: Infrastructure System Design

Search Result 708, Processing Time 0.034 seconds

Airport Power Information System Design in the Inchon Inta'l Airport (인천국제공항 공항전력정보시스템 설계)

  • Oh, Y.D.;Min, S.J.;Lim, J.G.;Moon, J.H.;Lee, T.S.;Yun, T.H.;Kim, M.H.;Moon, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1121-1124
    • /
    • 1998
  • Inchon International Airport(IIA) is constructed for Northeast Asia Gate as is important for IIA to become a 21 century's leader in the world, as is planned for open at december 2000 as a important economic link for unified korea. Airport Power Information System(APIS) is designed through investigation of advanced domestic and international example. In addition to power facility operation it is designed for using an information infrastructure of whole airport. APIS is newly designed for uninterupted power supply, effective power management, information infrastructure's construction. making a profit by positively introduction of new technology for collection and conservation of power related data, correlation with airport infra systems, data interrelative arrangement about related systems like outdoor lighting system and automatic measuring record, CCTV systems for remote power facility monitoring, and promotion of management ability in the emergency status.

  • PDF

Improvement Plan for Construction Management and Legislation of Donation Collection Facilities (기부채납 시설의 건설관리 및 법제에 관한 개선방안)

  • Lee, Juyong;Jung, Youngchul
    • Korean Journal of Construction Engineering and Management
    • /
    • v.25 no.1
    • /
    • pp.3-12
    • /
    • 2024
  • The donation collection system to secure infrastructure and land necessary for public development projects has been actively applied as an effective means of realizing public interest and the concept of recovering development profits, and has contributed greatly to society in public difficult financial conditions. However, due to the ambiguous legal standards and lack of legal grounds for the operation of the donation collection system, it has been arbitrarily used for administrative convenience in the form of granting a donation collection assistant to install infrastructure. In addition, infrastructure is a facility that is constructed and donated within development profits to obtain licenses, and is promoted to minimize construction costs to improve profitability, posing a risk of poor infrastructure planning, design, and construction, resulting in increased safety and maintenance costs for citizens. Continuous system and legal improvement are needed to improve the excellence, convenience, and safety of facilities that citizens will use for half a century through the improvement of the donation system.

Development Strategies of Sustainable PSS in Manufacturing (제조업의 지속 가능한 제품-서비스 시스템 개발 전략 연구)

  • Sohn, Jong-Min;Lee, Hyun-Chan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.16 no.1
    • /
    • pp.31-40
    • /
    • 2011
  • Product-service system (PSS) is a system of products and service, supporting networks and infrastructure that is designed to be competitive. PSSs satisfy customers' needs more effectively and have a lower environmental impact than traditional business models. Therefore, many companies and governmental institutes are eager to implement the PSSs as a new business model. In this paper, we focus on industrial practices as new business models for the company. PSS, especially, is popular in electronic industry, so one can often observe such examples as iPod, iPhone, e-Book and etc in the field. We first thoroughly investigate the current practices of PSS in Korean electronic industry. The examples are surveyed and projected directions are given. Then, non-electronic PSSs are surveyed. Especially mechanical PSSs are intensively discussed. Based on the survey results, we propose several major development strategies of Sustainable PSS (SPSS). SPSS will bring a competitive edge for company as realization of sustainable development of PSS considering economy, society, and environment.

Design and Development of a Web Based Digital Repository for Scholarly Communication: A Case of NM-AIST Tanzania

  • Mgonzo, Wasiwasi J.;Yonah, Zaipuna O.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.2
    • /
    • pp.97-108
    • /
    • 2014
  • Institutional repositories are essential research infrastructures for research-based universities. A properly dimensioned institutional repository has the potential to increase research impact and enhance the visibility of an institution through its scholarly outputs. The aim of the study reported in this paper was to design and develop a web-based digital repository for scholarly communications using NM-AIST as a case study. The system was developed using open source software. Findings obtained from system validation tests show that the system is a viable solution to the major challenges encountered in the management and sharing of scholarly information at the institution.

Enabling role of hybrid simulation across NEES in advancing earthquake engineering

  • Gomez, Daniel;Dyke, Shirley J.;Maghareh, Amin
    • Smart Structures and Systems
    • /
    • v.15 no.3
    • /
    • pp.913-929
    • /
    • 2015
  • Hybrid simulation is increasingly being recognized as a powerful technique for laboratory testing. It offers the opportunity for global system evaluation of civil infrastructure systems subject to extreme dynamic loading, often with a significant reduction in time and cost. In this approach, a reference structure/system is partitioned into two or more substructures. The portion of the structural system designated as 'physical' or 'experimental' is tested in the laboratory, while other portions are replaced with a computational model. Many researchers have quite effectively used hybrid simulation (HS) and real-time hybrid simulation (RTHS) methods for examination and verification of existing and new design concepts and proposed structural systems or devices. This paper provides a detailed perspective of the enabling role that HS and RTHS methods have played in advancing the practice of earthquake engineering. Herein, our focus is on investigations related to earthquake engineering, those with CURATED data available in their entirety in the NEES Data Repository.

A Study on the Requirements Analysis and Design for System Development of Remote Firmware Upgrade Management System Based-on AMI (AMI 기반 원격 펌웨어업그레이드 시스템 개발을 위한 요구분석 및 설계에 관한 연구)

  • Jung, Nam-Joon;Yang, Il-Kwon;Choi, Seong-Hwan;Jin, Young-Taek
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.1
    • /
    • pp.155-161
    • /
    • 2012
  • The firmware upgrade, which is remotely performed, is an essential function in smart metering or AMI (Advanced Metering Infrastructure). In other words, the AMI software and firmware can be switched for maintaining and improvement without replacement of H/W devices in AMI environment. Also, if number and type of devices are increase, the demand of remote update service will be increased. Through the firmware upgrade service remotely, the electric power corporation may be able to benefit various fields. For example, there are to adapt more easily in many environments, real-time service and to cut maintenance costs. In this paper, we proposed to design an international level FUMS(Firmware Upgrade Management System) which includes requirement function, architecture and protocol related with DCU, Smart Meter.

A Design of the Certification System in a Instantant Messenger Using PKI (PKI를 이용한 인스턴트 메신저에서의 인증 시스템 설계)

  • Park Su-Young;Choi Gwang-Mi;Jung Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.142-147
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information, but instant messengers are gaining popularity abroad and domestically because of their nature of getting immediate reponses. However a instant messenger services have the exposure of data on internet but clients use them without recognizing their exposure. It's like phone tapping. The coding technology using Public Key Cryptosystem has developed the public key infrastructure to be able to do the services of Access-control, Authentication, Confidentiality, Integrity. and Non-repudiation with internet. It is a thesis that suggests the certification protocol in a instant messenger using PKI(Public Key Infrastructure) for secure communication.

The Cost Analysis of Network by The Function of Automatic Link Recovery (자동링크복구 기능에 따른 네트워크 비용분석)

  • Song, Myeong-Kyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.439-444
    • /
    • 2015
  • The Social infrastructure systems such as communication, transportation, power and water supply systems are now facing various types of threats including component failures, security attacks and natural disasters, etc. Whenever such undesirable events occur, it is crucial to recover the system as quickly as possible because the downtime of social infrastructure causes catastrophic consequences in the society. Especially when there is a network link-failure, we need an automatic link-recovery method. This means that customers are aware of network failures that can be recovered before you say that service. In this paper, we analysis the relation between Auto-recovery performance and cost.

How to Implement Successful Virtual Desktop Infrastructure (VDI) in the Manufacturing Sector

  • KIM, Tae-Hi
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.10
    • /
    • pp.15-22
    • /
    • 2022
  • Purpose: In the manufacturing sector, VDI (Virtual Desktop Infrastructure) offers advantages to the organizations, such as allowing manufacturers access to the system from any location. The most important things are understanding what the user needs, avoiding under-provisioning, network preparation. This research is to provide useful practical l implementations of VDI in manufacturing industry based on numerous prior studies. Research design, data and methodology: This research has conducted the qualitative content analysis (QCA). When conducting this research, the present author assumed that it is crucial to create the procedures and processes that will be used to acquire the text data needed to structure or solve problems. Results: According to the prior literature analysis, there are five suggestions to implement successful VDI for manufacturing sector. The five solutions are (1) Creation of the machines, (2) Direct users to an available 'Virtual Machine', (3) 'Virtual Machine Power Management', (4) Performance monitoring, and (5) Review security. Conclusions: The research clearly details how VDI can be implemented on a manufacturer platform and how it can be connected to hundreds of users. The author can conclude that connecting hundreds of users can be done using the remote connection of devices and encourage manufacturers to work from different areas.

Design and Implementation of Public key-based Video Conference System for Authentication and Encryption (공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현)

  • Jung Yong-Deug;Lee Sang-Hun;Jin Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.971-980
    • /
    • 2004
  • This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.