• Title/Summary/Keyword: 비용 계정

Search Result 25, Processing Time 0.023 seconds

에머지(Emergy) 개념을 이용한 산지가치의 계량화에 관한 연구

  • Kim, Nam-Guk;Kim, Jin-Lee;Lee, Seok-Mo
    • Proceedings of the Korean Environmental Sciences Society Conference
    • /
    • 2006.11a
    • /
    • pp.421-424
    • /
    • 2006
  • 종래의 개발은 양면성을 가지고 있다. 하나는 개발로 인한 경제적 효율성과 편리성 부분이고, 다른 하나는 그러한 개발로 인한 자연훼손 및 생태계 파괴이다. 이로 인해 개발과 보전은 양립할 수 없는 상반적인 개념으로 받아들여져 왔고, 개발론과 보전론의 대립적 구도가 지속되어 왔다. 우리나라는 국토의 65% 이상이 산지이기 때문에 산지의 부분적 개발은 피할 수 없는 사회적 요구인 동시에, 산지는 자연생태계의 보고로서 생태계 보전이 필수적인 지역이다. 이러한 산지 개발과 보전에 대한 상반적 이해를 통합하여 자연과 인간의 공생체계를 갖추기 위해서는 인간중심의 사고에서 탈피하여 사람과 생태계 그리고 자연을 하나로 보는 총체적인 측면에서 접근하는 새로운 패러다임이 설정되어야 한다. 본 연구에서는 산지의 정량적인 가치를 평가하기 위해 시 공간적으로 다양한 인자들에 대해 시스템적인 관점에서 그 중요성을 고려하고자 하는 에머지 개념을 통해 산지 본래의 가치를 평가하였다. 에머지 개념은 그 동안 생태계가치평가, 개발사업의 편익-비용평가, 환경수용력 평가, 개발대안 평가, 환경계정, 환경훼손 소송관련 비용 평가 등에 적용되었다. 이러한 에머지 개념을 이용한 평가 방법을 통한 의사결정이 이루어지면 산지뿐만이 아닌 생태계의 지속가능한 이용을 실현하기 위한 적절한 정책의 선택과 이의 이행 실효성을 높일 수 있을 것으로 기대되며, 자연환경 가치의 정량적 평가를 통해서 우리는 한층 더 자연환경 및 자원의 다원적 기능에 대한 자각을 할 수 있을 것으로 판단된다.

  • PDF

Vulnerability Analysis on the CNG Crypto Library (CNG 암호 라이브러리의 보안 취약점 분석)

  • Lee, Kyungroul;Oh, Insu;Lee, Sun-Young;Yim, Kangbin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.838-847
    • /
    • 2017
  • CNG which was released as a substitute of the previous CAPI (Cryptography API) library from Microsoft is constructed with individual modules based on the plug-in architecture, this means CNG is exceedingly helpful in the cost of development as well as the facility of extension. On the opposite side of these advantages, considerations on security issues are quite insufficient. Therefore, a research on security assurance is strongly required in the environment of distributing and utilizing the CNG library, hence, we analyze possible security vulnerabilities on the CNG library. Based on analyzed vulnerabilities, proof-of-concept tools are implemented and vulnerabilities are verified using them. Verified results are that contents of mail, account information of mail server, and authentication information of web-sites such as Amazon, E-bay, Google, and Facebook are exposed in Outlook program and Internet Explorer program using CNG library. We consider that the analyzed result in this paper can improve the security for various applications using CNG library.

Design of Honeynet with separated port managing Honeypot on VM (가상머신에서의 포트 분리 관리 허니팟과 허니넷 설계)

  • 임인빈;최재호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.643-645
    • /
    • 2004
  • 네트워크가 복잡해지면서 다양한 형태의 위험에 노출된다. 일반적인 보안 솔루션으로 사용하는 방화벽(Firewall)이나 침입탐지시스템(IDS)은 허가받지 않은 외부의 접속이나 알려진 공격만을 차단하는 단순하고 수동적인 시스템이다. 이에 반해 허니팟은 웹서버와 같은 실제 Front-End 시스템과 유사하거나, 밀접한 관련을 갖고 직접적으로 반응하므로 신뢰성 높은 실시간 정보를 얻을 수 있어서 관리자가 다양한 위협에 능동적이고 효과적으로 대응할 수 있다. 실제로 웜이나 DRDoS(Distributed Reflection DoS)등 수분만에 네트워크를 점유하는 자동화 공격과 함께 시스템 구성 취약점을 파고들거나 계정 획득을 통한 DB서버 등의 Back-End 시스템에 대한 수동 공격이 혼재한다. 따라서 시스템 전반적인 관리의 중요성이 강조되고 있다. 본 논문에서는 그간의 실험결과를 바탕으로 가상 머신으로 허니팟을 구성하고 특성별로 포트를 분리하여 관리하는 허니넷을 제안하고자 한다 이를 통해 1) 유연한 보안 시스템 구성이 가능하고 2) 관리 효율이 높아지며 3) 하드웨어 도입 비용 절감을 통해 시스템의 TCO(Totai Cost of Ownership)를 감소시키는 효과를 기대할 수 있다.

  • PDF

Design and Implementation of BIG Virtual Platform Infrastructure System for Large-Scale Users (대규모 사용자 지원을 위한 빅 가상 플랫폼 인프라 시스템 설계 및 구현)

  • Kim, Sun-Wook;Oh, Soo-Cheol;Jo, Jeong-Hyun;Kim, Seong-Woon;Kim, Hak-Yeong;Jang, Deok-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.26-29
    • /
    • 2014
  • 가상 데스크탑 서비스 사용자는 데스크탑이나 다양한 모바일 기기를 이용해 할당 받은 계정으로 인증하고 로그인하면 언제 어디서든 인터넷용 가상화 PC 또는 업무용 가상화 PC 를 자신만의 가상 데스크탑처럼 사용할 수 있다. 이러한 가상 데스크탑 서비스가 대중화됨에 따라 라이선스 및 구축 비용, 서비스의 최적화와 같은 사항을 만족시키는 대규모 플랫폼 가상화 기술이 요구된다. 본 논문에서는 클라우드 인프라 상에서 가상 플랫폼을 대규모의 모바일 및 경량 단말 사용자에게 네트워크를 통해 끊김없이 전송하는 빅 가상 플랫폼 인프라 시스템을 설계 및 구현한다.

A Study on the Cost and Schedule Integration Model based on the Improvement of Work Packaging Mode (Work Packaging Model의 개선을 통한 공정 - 공사비 통합모델 구축)

  • Kim Yang-Taek;Hyun Chang-Taek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.1 no.4 s.4
    • /
    • pp.82-90
    • /
    • 2000
  • An integrated cost and schedule control is a noteworthy alternative of the separate control method which is commonly used in the domestic construction industry. In Korea, some cost and schedule integration models have been applied partly by construction managers. But, these models have not been customized yet because they did not reflect the characteristics of the domestic construction industry. This study investigates the characteristics of domestic integration models analyzed through interviews with experts who have the experiences in applying cost-schedule integration models. Based on these surveys, this study suggests the strategy for the improvement of work packaging model in the domestic construction industry.

  • PDF

Design and implementation of prepaid service for Mobile-lP in Diameter (Diameter Mobile-lP 응용을 지원하는 Diameter 선불 시스템의 설계 및 구현)

  • Yoo Sangkeun;Kim Hyungon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1A
    • /
    • pp.76-83
    • /
    • 2005
  • This paper presents the design and implementation of credit-control application to provide prepaid service for Diameter Mobile-lP application in Diameter-based AAA system. Diameter credit-control application is designed to support prepaid accounting service, which is not supported in RADIUS and Diameter accounting. Real-time credit-control requires that an application must be able to rate service information in real-time. In addition, it is necessary to check that the end user's account provides coverage for the requested service, prior to initiation of that service. In this paper, we design and implementation Diameter credit-control to provide prepaid service for Diameter Mobile-IP application.

Development of Project Management System for Geothermal Well Construction (지열발전 시추공 구축 프로젝트관리시스템 개발)

  • Kim, Kwang-Yeom;Lee, Seung-Soo
    • New & Renewable Energy
    • /
    • v.8 no.3
    • /
    • pp.38-46
    • /
    • 2012
  • Enhanced Geothermal System (EGS) among geothermal system types enables to produce sustainable energy even in non-volcanic region while conventional geothermal energy has been restricted to obtain only from hot and permeable formation such as in volcanic regions. Successful EGS project in terms of economy, however, can be expected only when the project is managed effectively considering most of influencing factors (e.g., tangible and intangible resources, cost, time, risks, etc.). In particular, well construction is of the utmost importance in geothermal project as it dominantly influences on time and cost in the whole project. Therefore, when it comes to viable geothermal project without abundant experience, managing drilling economically and efficiently is inevitable. In this study, a project management system for well construction in geothermal project based on project control system including work breakdown structure and cost account was developed to predict and assess the performance of drilling and to visualize the progress.

Artifacts Analysis of Users Behavior in Korea Random Chat Application (국내 랜덤 챗 어플리케이션에서 사용자의 행위에 따른 아티팩트 분석)

  • Seo, Seunghee;Nam, Gihoon;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.1-8
    • /
    • 2018
  • A random chat application is a type of social dating application that helps people find a lover or spouse by randomly connecting and providing services such as text, voice and video chat. Recently, there has been globally a rapid increase in its use due to the fact that it provides people to quick and convenient encounters at low cost. However, it is used as one of method to prostitute or to trade drugs and become a cause of violent crimes due to various criminal occurring after actual meeting between app users. For this reason, a random chat application is likely to provide proof of prostitution or drug trade and clues to arrest rape, kidnapping and murder suspects. Thus, it is necessary to analyse random chat applications from the viewpoint of digital forensics investigation, but there is no related research at all. Therefore, in this paper, we analyzed artifacts of 6 Korea random chat application's user behaviors; Ranchat, AngTalk, SsumgThing, DaTalk, EveryTalk and Sail. As a result, we found that it is remain on mobile device that time and contents of message transmission/reception, sender/receiver, friend profile and user account creation time when user is using the applications.

A Study on the Correlation between Financial Ratio and Operating Performance Considering the Characteristics of Foodservice Companies (외식 기업의 특성을 고려한 재무 비율과 경영 성과간의 관계에 대한 연구)

  • Chong, Yu-Kyeong;Koo, Won-Il;Park, Sun-Shin
    • Culinary science and hospitality research
    • /
    • v.15 no.4
    • /
    • pp.212-226
    • /
    • 2009
  • This study attempted to analyze the correlation between financial ratio and operating performance of foodservice companies, using the financial data by DART service. Financial ratio is an index to identify the management of foodservice companies from calculating the ratio associating two accounts in the financial statements. Managers, creditors and investors often have different purposes for using the ratio analysis to evaluate the contents of the financial statements. According to the analysis of financial ratio and operating performance, listed food and beverage companies proved to have a high correlation in all except for interest coverage. However, foodservice companies showed a high correlation in stability and growth ratio. Therefore, managers of the foodservice companies will need to improve operating performance for using efficient utilization plans of debt from assets and operating expenses(cost of goods sold, general and other expenses).

  • PDF

A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game (소셜 네트워크 게임(SNG) 서비스의 개인정보 유출 및 보안위협 대응방안에 관한 연구)

  • Lee, Sang Won;Kim, Huy Kang;Kim, Eun Jin
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.77-88
    • /
    • 2015
  • As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.