• Title/Summary/Keyword: 복구비용

Search Result 236, Processing Time 0.025 seconds

환경영양평가 및 사전환경성검토제도의 효율성, 신뢰성 향상된다

  • 환경보전협회
    • Bulletin of Korea Environmental Preservation Association
    • /
    • v.26 no.5_6
    • /
    • pp.21-23
    • /
    • 2004
  • 환경은 일단 한번 파괴되면 그 원상회복이 거의 불가능하고 또한 복구에 막대한 비용이 소요되어 궁극적으로는 경제활동을 제약하게 되므로 환경문제에 효율적으로 대처하기 위해서는 환경오염에 대한 사전예방의 노력이 매우 중요하다.<중략>

  • PDF

TCP Session Recovery Technique for High Availability in Smart On-Devices (스마트 온디바이스의 고가용성을 위한 TCP 세션 복구 기술)

  • Hong, Seungtae;Kim, Beob-Kyun;Lee, Kwang-Yong;Kim, Jeong-Si;Lim, Chae-Deok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.6
    • /
    • pp.261-270
    • /
    • 2017
  • With the development of smart on-devices and communication technology, demand for non-stop services is increasing. Therefore, the high availability for continuously providing services in the event of system failure has been spotlighted. Meanwhile, because most internet-based services are provided by using TCP, an efficient TCP session recovery technique for providing non-stop services is required. However, the existing TCP session recovery techniques are inefficient because it has a high recovery cost or does not support failover operation, To solve these problems, in this paper, we propose a TCP session recovery technique for high availability in smart on-devices. For this, we first recover the TCP session without re-establish the TCP session by correcting a sequence number and a acknowledgment number. Second, we synchronize the TCP session recovery data between the master and the server, and then we operate the failover operation when master server fails. Finally, we provide the non-stop service to peer by using the virtual IP number and the transmission of GARP (Gratuitous ARP) packet.

Data Consistency-Control Scheme Using a Rollback-Recovery Mechanism for Storage Class Memory (스토리지 클래스 메모리를 위한 롤백-복구 방식의 데이터 일관성 유지 기법)

  • Lee, Hyun Ku;Kim, Junghoon;Kang, Dong Hyun;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.7-14
    • /
    • 2015
  • Storage Class Memory(SCM) has been considered as a next-generation storage device because it has positive advantages to be used both as a memory and storage. However, there are significant problems of data consistency in recently proposed file systems for SCM such as insufficient data consistency or excessive data consistency-control overhead. This paper proposes a novel data consistency-control scheme, which changes the write mode for log data depending on the modified data ratio in a block, using a rollback-recovery scheme instead of the Write Ahead Logging (WAL) scheme. The proposed scheme reduces the log data size and the synchronization cost for data consistency. In order to evaluate the proposed scheme, we implemented our scheme on a Linux 3.10.2-based system and measured its performance. The experimental results show that our scheme enhances the write throughput by 9 times on average when compared to the legacy data consistency control scheme.

A Study on System Integration between Community Mapping and Drone Mapping for Disaster Safety Management (재난안전 관리를 위한 커뮤니티매핑과 드론매핑의 연계방안 연구)

  • Lee, JongHoon;Pyo, KyungSoo;Kim, SeongSam
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_2
    • /
    • pp.873-881
    • /
    • 2019
  • There are limitations to the manager's investigation of all damage sites and establishment of management plan in terms of manpower and cost. Community mapping can be used to overcome these problems with the information. However, it is difficult to make decisions when multiple information are registered in multiple areas of damage. Because community mapping information are registered only with pictures and simple contents, it is so difficult for the manager to clearly understand the site situation. This study suggests a methodology to support decision-making processes during disaster management through system integration between the community mapping and the drone mapping. By applying the proposed method, decision makers can make a timely judgment effectively on the damage situation. It is expected that the proposed method will save time, manpower, and cost in the recovery phase.

User-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage (블록체인과 분산 스토리지를 활용한 프록시 재암호화 기반의 사용자 중심 재해 복구 시스템)

  • Park, Junhoo;Kim, Geunyoung;Kim, Junseok;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1157-1169
    • /
    • 2021
  • The disaster recovery refers to policies and procedures to ensure continuity of services and minimize loss of resources and finances in case of emergency situations such as natural disasters. In particular, the disaster recovery method by the cloud service provider has advantages such as management flexibility, high availability, and cost effectiveness. However, this method has a dependency on a service provider and has a structural limitation in which a user cannot be involved in personal data. In this paper, we propose a protocol using proxy re-encryption for data confidentiality by removing dependency on service providers by backing up user data using blockchain and distributed storage. The proposed method is implemented in Ethereum and IPFS environments, and presents the performance and cost required for backup and recovery operations.

Optimal Design of Breakwater Caisson Considering Expected Total Construction Cost and Allowable Sliding Distance (기대 총 건설비 및 허용 활동량을 고려한 방파제 케이슨의 최적설계)

  • Kim Kyung-Suk;Suh Kyung-Duck
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.17 no.4
    • /
    • pp.280-293
    • /
    • 2005
  • In this study, a model to calculate the expected total construction cost has been developed by combining a model to calculate the sliding distance of a caisson of a vertical breakwater and a model to calculate the rehabilitation cost of a caisson. The optimal cross-section of a caisson of a vertical breakwater is defined as the cross-section that requires a minimum expected total construction cost within the allowable limit of caisson sliding. Two allowable limits are considered: 0.1 m of the expected sliding distance during the lifetime of the breakwater and 0.1 of the probability that the cumulative sliding distance during the lifetime of the breakwater is greater than 0.3 m. A discount rate has also been introduced to convert the future rehabilitation cost to the present value. The introduction of the discount rate reduces the expected total construction cost for the caissons designed for shorter return periods due to frequent rehabilitations. The present design method requires a smaller cross-section than the conventional deterministic method in shallow water depths, enabling us to design a caisson more economically. On the other hand, the above-mentioned allowable limits of caisson sliding show similar results for smaller water depths, while, for larger depths, the former requires a larger cross-section than the latter.

Development of BCA Model about Accident Prevention and Disaster Recovery Program (재해예방 및 복구사업 경제성 평가모델 개발)

  • Kim, Han-Tae;Han, Chong-Soo;Jang, Moon-Yup;Kwon, Jeong-Ho
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2015.11a
    • /
    • pp.103-105
    • /
    • 2015
  • 본 논문에서는 재해 예방 및 복구사업 경제성평가 모델 개발을 위해 경제성 평가 활용현황 및 문제점을 정리하고 경제성 평가모델개발방안 도출 등의 연구를 수행한다. 경제성 평가기법의 연구개발 현황 파악과 경제성 평가방법의 당면 과제 도출로부터 조사 범위 및 방법을 결정하고 성과물에 대한 활용방안 또한 결정에 참고하도록 한다. 기존 연구 및 풍수해 관련 자료의 분석결과 경제성 평가는 BCA가 일반적으로 사용되여 Benefit과 Cost의 고려범위에 따라 연구방법과 내용이 각기 다른 실정이었다. 또한 대부분의 연구는 정량화가 쉬운 직접비용에 치중되어 있으며, 고려 범위가 추상적인 경우는 과다하게 측정되는 경향이 있었다. 한편, 피해 발생 시 현재는 NDMS에 피해액관련 데이터 입력하여 활용하고 있으며 이는 관련보상 법규가 없던 과거조사자료와 최근의 조사자료사이에 큰 차이를 보이고 있다.

  • PDF

Panel Data Analysis between Flood Damage and Recovery Cost (Panel Data 분석을 통한 홍수피해와 복구비 관계분석)

  • Park, Doo-Ho;Kim, Sun-Young
    • Journal of Korea Water Resources Association
    • /
    • v.44 no.1
    • /
    • pp.1-8
    • /
    • 2011
  • This paper addresses the correlation between the flood damage cost and recovery cost. National data (15 regions) for 20 years, panel data, has been analyzed for this test. Model specification of panel data analysis depends on the characteristics of data set and "fixed" or "random" effects model can be used. The results are represented in both models. As we expected all independent variables show positive relationship with recovery cost, except for the number of death and suffers. The damage of public facilities, such as rivers and road are the major factors on the damage and recovery cost, which means that flood damage can not be decreased without decreasing damages of public facilities from floods. Especially, the recovery cost is always higher than the damage cost and investment for flood control. Unlikely, government investment for flood control is the highest and recovery cost is the always lower than da mage cost andinvestment in Japan. Which means that proper investment can reduce economic damage cost of flood and recovery cost.

Indirect Cost Effects on Life-Cycle-Cost Effective Optimum Design of Steel Box Girder Bridge (강상자형교의 LCC 최적설계에 미치는 간접비용의 영향)

  • Lee, Kwang Min;Cho, Hyo Nam;Cha, Chul Jun;Eom, In Su
    • Journal of Korean Society of Steel Construction
    • /
    • v.17 no.2 s.75
    • /
    • pp.115-130
    • /
    • 2005
  • This paper presents the effects of indirect costs on Life-Cycle-Cost(LCC) effective optimum design of steel-box girder bridges. The LCC formulations considered in the LCC optimization of the bridges consist of initial cost and expected rehabilitation costs including repair/replacement costs, loss of contents or fatality and injury losses, and indirect costs such as road user costs and indirect socio-economic losses. To demonstrate the LCC-effectiveness for optimum design of the bridges, an actual steel box girder bridge having two continuous spans(2@50m=100m) is considered as a numerical example. And also, in this paper, various sensitivity analyses are performed to investigate the effects of indirect costs caused by traffic conditions such as number of detour route, number of lane on detour route, length of detour route, and traffic volumes on the LCC-effective optimum design. From the numerical investigations, it may be concluded that indirect costs caused by traffic network may sensitively influence on the LCC-effective optimum design of steel-box girder bridges. Therefore, it may be stated that the traffic conditions should be considered as one of the important items in the LCC-effective optimum design of the bridges.

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.