• Title/Summary/Keyword: administrative information system

Search Result 615, Processing Time 0.028 seconds

Similarity Measurement Using Ontology in Vessel Clearance Process (온톨로지를 이용한 선박 통관 프로세스의 유사성 측정)

  • Yahya, Bernardo N.;Park, Jae-Hun;Bae, Hye-Rim;Mo, Jung-Kwan
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.2
    • /
    • pp.153-162
    • /
    • 2011
  • The demands of complicated data communications have issued a new challenge to port logistics systems. Customers expect ports to handle their generated administrative data while a vessel is docked in a port. One port logistics system, known as the Vessel Clearance Process (VCP), manages large numbers of documents related to port of entry. In the VCP, information flows through many organizations such as the port authority, shipping agents, marine offices, immigration offices, and others. Therefore, for effective management of the Business Process (BP) of the VCP, a standardized method of BP modeling is essential, especially in heterogeneous system environments. In a port, according to port policy, terms and data are sued that are similar to but different from those of other logistics partners, which hinders standardized modeling of the BP. In order to avoid tedious and time-consuming document customization work, more convenient modeling of BP for VCP is essential. This paper proposes an ontology-based process similarity measurement to assist designer for process modeling in port domain, especially VCP. We expect that this methodology will use convenient and quick modeling of port business processes.

A Study on the Stream and Reservoir Segmentation in Paldang Dam Basin in Kompsat-3A Image (Kompsat-3A 영상에서 팔당댐 유역의 하천과 저류지의 분할에 관한 연구)

  • You, Ho-Jin;Choi, Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.2_2
    • /
    • pp.173-180
    • /
    • 2020
  • In Korea, due to the rapid increase in population due to industrialization, rivers were developed and managed with a focus on the completion and dimension of rivers. Due to the rapid increase in river use, there are so many river facilities indiscriminately that the administrative and management tasks are complicated and diversified in computerizing facilities and hydrologic data. Many methods have been proposed to solve this problem, but many problems exist. Among them, water has the same spectral characteristics, so it is difficult to subdivide into rivers, reservoirs, and dams. Therefore, this study subdivided the water system using supervised classification and GIS in order to efficiently manage the water resources by classifying the water system with the same spectral characteristics. In order to analyze the accuracy of the results, the accuracy of the objects classified using land cover map provided by environmental spatial information service was evaluated, and the result was an average of 91.75%, with 97.50% of rivers, 87.76% of reservoirs, and 90.00% of others.

A Study on the Renovation of Ordinary Classroom into Computer Laboratory (보통교실(普通敎室)을 개조(改造)한 컴퓨터실(室) 계획(計劃)에 관한 연구(硏究))

  • Joo, Young-Ju
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.1 no.1
    • /
    • pp.21-32
    • /
    • 1994
  • It is time to put our top priority on the computer education to cope with rapid chage in technology and expansion of information. With 6th educational reform plan, from 1995 computer courses will be offered as elective subjects in the most of middle schools. However, detail planning for training of computer courses will be offered as elective subjects in the most of middle schools. However, detail planning for training of computer teachers and providing facilicles for computer education hasn't been adequately prepared yet, This will bring about confusion in computer education. The purpose of this study is to propose how to renovate the ordinary classroom into computer classroom. Followings are the suggestions for the educational specification for the renovated computer classroom for middle school in the urban area. 1) Purpose of computer classroom, 2) Size of computer classroom, 3) Curriculum design and class hour, 4) Facilities, 5) Environments, 6) Equipment and media(lighting and electric system, acoustical treatment, cooling/heating and ventilation system), 7) Activity area(Teacher workstation, Student workstation, Support area, Display surface). For the promotion of computer education, the legal, financial and administrative supports by concerned authorities should be established ahead of discussing the contents of computer education.

  • PDF

Measurement of missing video frames in NPP control room monitoring system using Kalman filter

  • Mrityunjay Chaubey;Lalit Kumar Singh;Manjari Gupta
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.37-44
    • /
    • 2023
  • Using the Kalman filtering technique, we propose a novel method for estimating the missing video frames to monitor the activities inside the control room of a nuclear power plant (NPP). The purpose of this study is to reinforce the existing security and safety procedures in the control room of an NPP. The NPP control room serves as the nervous system of the plant, with instrumentation and control systems used to monitor and control critical plant parameters. Because the safety and security of the NPP control room are critical, it must be monitored closely by security cameras in order to assess and reduce the onset of any incidents and accidents that could adversely impact the safety of the NPP. However, for a variety of technical and administrative reasons, continuous monitoring may be interrupted. Because of the interruption, one or more frames of the video may be distorted or missing, making it difficult to identify the activity during this time period. This could endanger overall safety. The demonstrated Kalman filter model estimates the value of the missing frame pixel-by-pixel using information from the frame that occurred in the video sequence before it and the frame that will occur in the video sequence after it. The results of the experiment provide evidence of the effectiveness of the algorithm.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

A Decision-Making Model for Handling Personal Information Using Metadata (메타데이터를 활용한 개인정보 처리에 대한 의사결정 모델)

  • Kim, Yang-Ho;Cho, In-Hyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.259-273
    • /
    • 2016
  • After realizing through the three large-scale data leakage incidents that intentional or accidental insider jobs are more serious than external intrusions, financial companies in Korea have been taking measures to prevent data leakage from occuring again. But, the IT system architecture reflecting the domestic financial environment is highly complicated and thereby difficult to grasp. It is obvious that despite administrative, physical, and technical controls, insider threats are likely to cause personal data leakage. In this paper, we present a process that based on metadata defines and manages personally identifiable attribute data, and that through inter-table integration identifies personal information broadly and controls access. This process is to decrease the likelihood of violating compliance outlined by the financial supervisory authority, and to reinforce internal controls. We derive and verify a decision-making model that reflects the proposed process.

A Study on the Relation between Record and Information Management and Knowledge Management from the Perspective of Knowledge Management : Focused on the Definition and Management Process (지식경영 관점에서 본 기록관리와 지식경영의 연관 관계 - 지식의 정의와 지식관리 프로세스를 중심으로 -)

  • Roh Jeong-Ran
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.4
    • /
    • pp.5-24
    • /
    • 2005
  • The various concepts of knowledge such as Knowledge Management(KM). Intellectual assets and digital knowledge asset management are currently important issues among many organizations. To the country like Korea that has professed Itself for a great power of knowledge Information and adopted KM and Record and Information Management (RIM) as the country's main polity, the study on the theoretical basis and best practices of KM and RIM from the perspective of Library & Information science is very urgent. However, many studies on knowledge including KM were mainly done at the business administrative field. and the consolidated study basis on knowledge even in the Library & Information Sciences was quite in deficiency, furthermore any discussion on knowledge, correlation among related systems and the possibilities of cooperation as the development of Information communication has not been done. Therefore, this study is to present the alternative plan of the consolidated management on knowledge through comparative analysis on the definition, main function and trend of KM & RIM. Especially, this study would be the theoretical basis to the public organizations that plan to introduce KM & RIM.

Information Security and Its Awareness in Local Governments (지방자치단체의 정보보호 현황 및 인식의 변화 분석)

  • Noh, Jae In;Seo, Jin-Wan
    • Informatization Policy
    • /
    • v.23 no.1
    • /
    • pp.20-37
    • /
    • 2016
  • As the numbers of various cyber-crimes have sharply increased, the importance of securing information has also been emphasized. Despite the government's constant efforts to solve the issue, they hardly work in practice, and cases related to information security are still on the rise. This study investigates the reasons for the discrepancy that occurs when a solution is put to action. The research analyzes the recent shift in the administrative system with regard to information security and officials' awareness of the shift, focusing on members of local government. The results of the study confirm a steady attempt including changes in institutions at the level of the central government. However, there is still a lack of personnel and budget support at the local government level as well as not much change in the awareness of information security.

Vision-Based Fast Detection System for Tunnel Incidents (컴퓨터 시각을 이용한 고속 터널 유고감지 시스템)

  • Lee, Hee-Sin;Jeong, Sung-Hwan;Lee, Joon-Whoan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.9-18
    • /
    • 2010
  • Our country has so large mountain area that the tunnel construction is inevitable and the need of incident detection that provides safe management of tunnels is increasing. In this paper, we suggest a tunnel incident detection system using computer vision techniques, which can detect the incidents in a tunnel and provides the information to the tunnel administrative office in order to help safe tunnel operation. The suggested system enhances the processing speed by using simple processing algorithm such as image subtraction, and ensures the accuracy of the system by focused on the incident detection itself rather than its classification. The system is also cost effective because the video data from 4 cameras can be simultaneously analyzed in a single PC-based system. Our system can be easily extended because the PC-based analyzer can be increased according to the number of cameras in a tunnel. Also our web-based structure is useful to connect the other remotely located tunnel incident systems to obtain interoperability between tunnels. Through the experiments the system has successfully detected the incidents in real time including dropped luggage, stoped car, traffic congestion, man walker or bicycle, smoke or fire, reverse driving, etc.

A Study on the Current State and Improvement Plans for the Information Disclosure System of Metropolitan Police Agencies : Focusing on Busan Metropolitan Police Agency (지방경찰청의 정보공개제도 운영 현황 및 개선 방안 연구 부산지방경찰청을 중심으로)

  • Kim, Hyunjung;Kim, Soojung
    • The Korean Journal of Archival Studies
    • /
    • no.68
    • /
    • pp.73-105
    • /
    • 2021
  • The aim of this study was to investigate the current state of operation of information disclosure system in Busan Metropolitan Police Agency and to suggest recommendations for improvement. To achieve this goal, this study quantitatively analyzed the data on information disclosure claims (2010~2020.6), appeal cases (2010~2020.6), the disclosure rate of original documents (2014~2019) and so on. Furthermore, it examined how and how much information is announced in advance through the agency's homepage and the information disclosure portal site. Results show that the agency has various problems regarding information disclosure including the high rate of transferring information to other institutions, the low disclosure rate of original documents, the high rate of information released publicly only after an administrative appeal, a small number of information announced in advance, and a not user-friendly website. To solve these problems, this study proposes providing accurate information about the scope of information the agency and other related institutions own, expanding the disclosure of original documents, discovering more information to announce in advance, and enhancing the usability of the website.