• Title/Summary/Keyword: 로그관리

Search Result 568, Processing Time 0.027 seconds

Performance Evaluation Method of Tunnel Scanner for Lining Crack Detection (터널 균열 검출에 활용되는 터널스캐너의 성능검증 방법론)

  • Bae, Sung-Jae;Jung, Wook;Chamrith, Sereivatana;Kim, Chan-Jin;Kim, Young-Min;Hong, Sung-Ho;Kim, Jung-Gon;Kim, Jung-Yeol
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.39-52
    • /
    • 2021
  • Purpose: Recently, due to increasing usage of high-tech equipment for facility inspection, the need of verifying high-tech equipment is being emphasized. Therefore, the purpose of this paper is to develop performance evaluation methodology of tunnel scanners that inspect tunnel facilities. Method: This paper describes literature reviews regarding the performance evaluation methodology of high-tech based equipment for facility inspection. Based on these investigations and expert advisory meetings, this paper suggests a performance evaluation methodology of tunnel scanner. Result: First evaluation indicator states minimum performance standards of tunnel scanners. Second evaluation indicator is related to tunnel scanner quality. Conclusion: The performance evaluation methodology can provide reliable equipment performance catalogues, helping users to make a proper selection of equipment. Also, developers of equipment can get authorized verification of performances, preventing poor maintenance of facilities.

A Study on DB Security Problem Improvement of DB Masking by Security Grade (DB 보안의 문제점 개선을 위한 보안등급별 Masking 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.101-109
    • /
    • 2009
  • An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.

Temperature-dependent Diffusion Coefficient of Chloride Ion in UAE Concrete (UAE 콘크리트에 대한 염화물 확산의 온도의존성)

  • Ji-Won Hwang;Seung-Jun Kwon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.4
    • /
    • pp.48-54
    • /
    • 2024
  • NPP (Nuclear power plant) structures have been constructed near to the sea shore line for cooling water and exposed to steel corrosion due to chloride attack. Regarding NPP structures built in the UAE, chloride transport may be more rapid than those in the other regions since the temperature near to the coast is high. In this study, concrete samples with 5,000psi (35MPa) design strength grade were manufactured with the materials and mix proportions, which were the same as used in the UAE NPP structures, then chloride diffusion coefficients were evaluated considering temperature and curing age. The compressive strength and the diffusion coefficient were evaluated and analyzed for the samples with 28 and 91 curing days. In addition, chloride diffusion tests for 91-day-cured condition were carried out in the range of 20℃ to 50℃. The activation energy was obtained through converting the temperature slope to a logarithmic function and it was compared with the previous studies. The proposed activation energy can be useful for a reasonable durability design by using actual temperature-dependent chloride diffusion coefficient.

Performance Evaluation of Catalog Management Schemes for Distributed Main Memory Databases (분산 주기억장치 데이터베이스에서 카탈로그 관리 기법의 성능평가)

  • Jeong, Han-Ra;Hong, Eui-Kyeong;Kim, Myung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.4
    • /
    • pp.439-449
    • /
    • 2005
  • Distributed main memory database management systems (DMM-DBMSs) store the database in main memories of the participating sites. They provide high performance through fast access to the local databases and high speed communication among the sites. Recently, a lot of research results on DMM- DBMSs has been reported. However, to the best of our knowledge, there is no known research result on the performance of the catalog management schemes for DMM-DBMSs. In this work, we evaluated the performance of the partitioned catalog management schemes through experimental analysis. First, we classified the partitioned catalog management schemes into three categories : Partitioned Catalogs Without Caching (PCWC), Partitioned Catalogs With Incremental Caching (PCWIC), and Partitioned Catalogs With Full Caching (PCWFC). Experiments were conducted by varying the number of sites, the number of terminals per site, buffer size, write query ratio, and local query ratio. Experiments show that PCWFC outperforms the other two schemes in all cases. It also means that the performance of PCWIC gradually increases as time goes by. It should be noted that PCWFC does not guarantee high performance for disk-based distributed DBMSs in cases when the workload of individual site is high, catalog write ratio is high, or remote data objects are accessed very frequently. Main reason that PCWFC outperforms for DMM-DBMSs is that query compilation and remote catalog access can be done in a very high speed, even when the catalogs of the remote data objects are frequently updated.

  • PDF

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

A Study on the Characteristics of Local Energy Consumption by Using Index Decomposition Analysis (지수분해분석을 이용한 지자체의 에너지 소비특성에 관한 연구)

  • Jin, Sang Hyeon;Hwang, In Chang
    • Environmental and Resource Economics Review
    • /
    • v.18 no.4
    • /
    • pp.557-586
    • /
    • 2009
  • Although energy demand management policy attracts attention internationally and domestically, the importance of local government in this policy is not so much as central government. But local government can do a role with regard to this policy because it is close to energy consumers not like central government. So local energy plan should be based on the understanding local energy consumption characteristics to activate local energy demand management policy. This paper tries to analyze energy characteristics of 16 local governments by decomposing energy consumption into population, production and intensity factors. The result of index decomposition analysis shows that energy intensity improvement has offset the increase of energy consumption caused by economic growth in the metropolitan cities, while it couldn't offset in the other provinces because of industrialization based on the manufacturing. In conclusion, this paper suggests that it will be necessary to switch to low energy society by carrying out concrete energy efficiency improvement projects in the metropolitan cities while it will be helpful to make a local development plan for low energy intensive industrialization in the other provinces.

  • PDF

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

A Study on the Development of IoT Inspection System for Gas Leakage Inspection in Kitchen Gas Range Built-in Method (주방 가스레인지 빌트인 방식에서 가스 누출검사를 위한 IoT 검사 시스템 개발에 관한 연구)

  • Kang, Dae Guk;Choi, Young Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.283-290
    • /
    • 2022
  • In this study, an IoT inspection system that can be linked with a server was developed using a gas timer and ESP-01 Wi-Fi module installed on a gas valve in the home. The server environment of the gas leak IoT inspection system was installed with APM (Apache, PHP, MySQL) to collect gas pressure data by generation so that leakage checks could be performed. In order to control the gas leak IoT inspection system, the app inventory was used to manage the gas leak check value in real time. In addition, user convenience has been enhanced so that membership management, WiFi settings, and leakage check values can be checked through mobile apps. In order to manage subscribers by region, the user list was checked by logging in in in the administrator mode so that the information on whether or not the leak test was conducted and the results could be provided. In addition, when the user presses the gas leak check button, the pressure is automatically checked, and the measured value is stored in the server, and when a gas leak occurs, the leakage check is performed after alarm and repair so that it can be used if normal. In addition, in order to prevent overlapping membership, membership management can be performed based on MAC addresses.

Decomposition of CO2 Emissions in the Manufacturing Sector : An International Comparative Study for Korea, UK, and USA (제조업 부문의 이산화탄소 배출 요인분해: 한국·영국·미국의 국제비교 연구)

  • Han, Taek Whan;Shin, Wonzoe
    • Environmental and Resource Economics Review
    • /
    • v.16 no.3
    • /
    • pp.723-738
    • /
    • 2007
  • This paper draws some implications from Logarithmic Mean Weight Divisia Method (LMWDM) on the sources of $CO_2$ emission changes in the manufacturing sectors of Korea, UK, and USA. The sources of change in industrial $CO_2$ emission of a country, as manifested by production scale factor, structural factor, and technical factor, summarizes the forces behind the change in $CO_2$ emissions in each country's manufacturing sector. There are three observations. First one is that Korea's emission is increasing while USA and UK are experiencing reduction or stabilization of $CO_2$ emission in the manufacturing sector. Second implication is that the technical factor affecting $CO_2$ emission in Korea does not help much, or even hinder, the reduction of $CO_2$ emissions, comparing to USA and UK. Third one, which is the combined result of the first and the second one, is that Korea's increasing trend in aggregate $CO_2$ emission throughout the periods in consideration is mainly due to the failure in technical progress, or the deterioration in the structure of within subcategories, or both. The policy implications is clear. The obvious prescription is to launch a nation-wide policy drive which can revert these adverse trends.

  • PDF

Empirical Analyses on the Financial Profile of Korean Chaebols in Corporate Research & Development Intensity (국내 자본시장에서의 재벌 계열사들의 연구개발비 비중에 대한 재무적 실증분석)

  • Kim, Hanjoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.232-241
    • /
    • 2019
  • This study examines one of the conventional and controversial issues in modern finance. Specifically, this study identifies financial determinants of corporate R&D intensity for firms belonging to Korean Chaebols. Empirical estimation procedures are applied to derive more robust results of each hypothesis test. Static panel data, Tobit regression and stepwise regression models are employed to obtain significant financial factors of R&D expenditures, while logit, probit and complementary log-log regression models are used to detect financial differences between Chaebol firms and their counterparts not classified as Chaebols. Study results found the level of R&D intensity in the prior fiscal year, market-value based leverage ratio and firm size empirically showed their significance to account for corporate R&D intensity in the first hypothesis test, whereas the majority of explanatory variables had important power on a relative basis. Assuming that the current circumstances in the domestic capital market may necessitate gradual changes of Korean Chaebols in terms of their socio-economic function, the results of this study are expected to contribute to identifying financial antecedents that can be beneficial to attain optimal level of corporate R&D expenditures for Chaebol firms on a virtuous cycle.