• Title/Summary/Keyword: 사후 점검

Search Result 58, Processing Time 0.026 seconds

Optimum Management Plan for Soil Contamination Facilities (특정토양오염관리대상시설의 최적 관리방안에 관한 연구)

  • Park, Jae-Soo;Kim, Ki-Ho;Kim, Hae-Keum;Choi, Sang-Il
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.45 no.2
    • /
    • pp.293-300
    • /
    • 2012
  • This study was to investigate the unsuitable rate of the storage facilities, the changes in corrosion process over time after installation according to the status, the time to install the facilities, years elapsed after facilities installation, inspection of methods and motivation, and so on, based on the results of the inspection at the petroleum storage facilities conducted by domestic soil-relate specialized agency to derive optimal management plans which meet the status of soil contamination facilities. The results showed that the facilities more than 5 years after the initial leak test at the time of the installation need to be inspected periodically by considering costs of leak test and remediation of polluted soil. The inspection period can be decided by cost and leak test methods showing discrepancies for the results obtained from individual test whether it was direct or indirect. To compensate these matters, we suggested that the direct inspection method on regular schedule is recommended. On the other hand, the inspection can be voluntarily completed to ease burden of the results by inspection or equivalent level to this inspection method. Also, it may need improved construction supervision and performance test system to minimize the occurrence of the nature defects in installing the facilities as well as the upgrade program for the facilities during intervals of inspection period.

A Operation Characteristics of Photovoltaic System for Optimum Parameter calculation (최적의 파라미터를 적용한 태양광발전시스템 운전특성)

  • Park, Jeong-Min;Choi, Youn-Ok;Jung, Byoung-Ho;Baek, Hyung-Lae;Cho, Geum-Bae
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.1130_1131
    • /
    • 2009
  • 현재까지 국내 PV시장은 신재생에너지 개발 이용 보급 촉진법을 통해서 태양광발전시스템의 이용 보급의 확대를 목표로 하고 있지만 이에 따른 해결해야할 기술적인 문제점들이 많다. 즉, PV시스템의 성능특성 평가분석은 발전성능에 중대한 영향을 미치는 주요 발생손실을 평가.진단함으로서 손실저감을 통한 시스템의 성능개선, 최적절계, 사후운영관리 및 유지점검 등의 응용기술을 개발하는데 있다. 이러한 기술개발을 위해서는 입력인 태양에너지로부터 PV어레이의 직류출력에서 시스템의 교류출력까지의 성능 및 발생손실에 대해서 정량적인 값으로 나타낼 필요가 있다. 본 논문에서는 태양광발전 설비의 효율에 관한 파라미터인 위도와 경도, 온도 및 일사량, 시스템 구성요소에 대한 세부적인 기술검토와 태양광발전시스템의 효율을 개선시킬 수 있는 파라미터에 접근하기 위해 정확한 시스템의 운전특성을 분석 하고자 한다.

  • PDF

Improvement of the Electronic Customs System to Improve the Quality of Export and Import Declaration Data (수출입 신고데이터 품질제고를 위한 전자통관 시스템 개선)

  • Jo, Hang-Jin;Park, Koo-Rack;Lee, Jang-Sik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.429-430
    • /
    • 2021
  • 본 논문에서는 우리나라 수출입 등 통관의 전반적인 것을 담당하는 전자통관시스템의 문제점을 발굴하고 개선점을 찾아 보완하여 보다 진화된 양질의 전자통관시스템으로 개발하는 것을 목표로 하고 있다. 전자통관시스템의 문제점을 중심으로 구분하면 통관업무, 사전검증시스템, 데이터정제시스템으로 볼 수 있다. 각 부분별로 문제점을 분석한 결과 오류 데이터 전송, 자가진단 점검기능 부재, 경험치로 관리, 사후관리 체계 부재, 오류분석 기능 미활용으로 나왔으며, 이런 문제점을 해결하기 위해 개선방안에 대해 면밀히 검토하여 맞춤형 대책을 마련하여 처음 신고인이 양질의 정보를 정확히 입력할 수 있는 시스템 구축부터 검증시스템을 통해 정확한 정보를 정제하는 중간단계를 거쳐 마지막으로 최상의 결과를 도출 및 제공하기까지 시스템을 향상시켜 이용객에게 더욱 정확한 처리결과 제공 및 진화된 국가행정시스템을 구축함으로써 국가경쟁력을 강화할 수 있다.

  • PDF

Performance analysis of tunnel scanning system based on Japanese performance evaluation system (일본 성능평가 제도기반 터널 스캐닝 시스템 성능 분석)

  • Chulhee Lee;Jaemo Kang;Donggyou Kim
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.25 no.4
    • /
    • pp.331-344
    • /
    • 2023
  • The performance of the existing tunnel scanning system was analyzed through the post-evaluation of NETIS (New Technology Information System) and Inspection Support Technology Performance Catalog. Suggestions for improvement and development direction of the tunnel scanning system were deduced. As new technology of Japan gave priority to providing user-centered information, it was possible to objectively compare and analyze the characteristics of various tunnel scan systems through post-evaluation of NETIS and standard test methods in the Inspection Support Technology Performance Catalog. Construction New Technology of Korea was centered on suppliers of technology certification, making it impossible to objectively compare the performance of tunnel scanning systems. The performance was compared and evaluated indirectly by comparing the specifications of the camera, which is a core device of Japan's tunnel scanning system. For the future development of tunnel scanning systems, high-resolution and fast exposure performance of cameras and corresponding high-intensity lighting devices are required. For this purpose, it is necessary to make an experimental environment in which the performance of the camera and lighting can be analyzed indoors.

A Study on Development of Improvements to Collaborative Energy Saving Projects with NGO (에너지절약 민간단체 협력사업의 개선방안 연구)

  • Lim, Ki Choo
    • Journal of Energy Engineering
    • /
    • v.25 no.1
    • /
    • pp.177-184
    • /
    • 2016
  • Solutions to improve collaborative energy-saving programs were developed as follow; First, the scoring for the selection of the programs between KEMCO and the NGOs' Energy Network needs to be adjusted. Second, solutions were proposed to diversify the network selected to participate in programs and to tighten the network among the participating citizens. Third, improving the compatibility with the targets that are set for the program and raising the program budget was proposed. Fourth, ideas to introduce the final evaluation guidelines for the programs by the network, to improve the convenience of the program procedures. Fifth, developing a manual to inspect energy-saving measures in households, counseling for at-home energy-saving behaviors, sharing search programs such as financial support and home repair, introducing a program energy-saving APPs.

A Case Study on the Risk Management for the Long-term Preservation Business Activities Related to Electronic Records (전자기록 장기보존 위험관리 사례)

  • Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.3-43
    • /
    • 2014
  • This paper showed results of the risk management project in detail which was conducted by National Archives of Korea(NAK) in 2010. In the project NAK examined its long-term preservation business of electronic records using DRAMBORA(Digital Repository Audit Method Based on Risk Assessment). NAK has defined 44 different risk elements related to its business activities, assessed and classified them into several grades according to the severity calculated by risk probability score and risk potential impact score, and developed precise management plans for two of the most serious risks. This paper introduced the management plan for one of them. The risk was numbered with NR04 and described by 'Loss of integrity of records information'. This paper explained mitigation strategies, contingency organization, disaster control responsibilities, and personal mission cards for the NR04. This paper planned to give comprehensive understandings to Records Management Organizations about the risk management approaches as an effective way for business management through the case study.

Public Records Disposition Oversight Program : A Case Study of the NARA's Records Management Oversight and Reporting Program (공공기록물의 평가·폐기에 대한 감독제도 연구 미국의 기록관리 감독·보고 프로그램을 중심으로)

  • Seol, Moon-won;Park, In-seon
    • The Korean Journal of Archival Studies
    • /
    • no.62
    • /
    • pp.41-75
    • /
    • 2019
  • Although we expect the Records Freezing system to be introduced through the revision of the Public Records Management Act, the system alone has limitations in preventing illegal disposal of records. If some records have already been destroyed illegally, the agency should identify the reason and prepare corrective action and improvement measures to prevent the repetition of such a wrongful disposal. The purpose of this study is to analyze the NARA's inspection program for unauthorized disposal based on the "Records Management Oversight and Reporting Program" and to find implications for improving the control system of public records disposal. NARA's program is particularly effective in the prevention and post-processing of unauthorized disposal. In this study, firstly, the federal records management oversight and reporting program in the United States was investigated in the legal system. Secondly, the status of NARA's control of unauthorized disposal cases was reviewed and a case of SEC's MUI records was analyzed for showing the systematic procedure of NARA's inspection. Finally, we have summed up the implications of this program for improving NAK's control system of illegal disposal of public records.

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

Where do Entrepreneurial Opportunities come from? Schumpeter's Idea and Stakeholder Theory Framework (창업 아이디어는 어디에서 오는가? 슘페터의 생각과 이해관계자 이론체계)

  • Lee, Ju-Heon
    • Korean Business Review
    • /
    • v.23 no.1
    • /
    • pp.17-44
    • /
    • 2010
  • Even though it is generally recognized that entrepreneurship is complex socio-economic phenomena and entrepreneurial opportunities can be created from economic, social, technological, political and legal forces, entrepreneurship has been discussed in very narrow economic terms and focusing on narrow economic relationships such as consumers, suppliers, owners and employee. However, recently, a lot of researchers talk about social entrepreneurship. How can we explain social entrepreneurs? In our paper, employing stakeholder theory, we try to offer more realistic model to understand entrepreneurial opportunities. We claim that entrepreneurial exploitations can be successful only when entrepreneurs can identify ex post stakeholder inefficiencies. Thus, our efforts focus on the question of where, when, and how stakeholder inefficiencies occur?

  • PDF

The Effects of Response Cost Technique in the Computer Training for the Mentally Retarded Person (정신지체인의 컴퓨터 교육에서 반응대가 기법의 효과)

  • Song, Mi-Kyung;Kang, Oh-Han
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.147-154
    • /
    • 2002
  • In this paper, we investigated the effects of response technique which uses free tokens in the computer training for the mentally retarded person. We set wrong line entering. wrong space number entering, wrong line-type designation and wrong cell merger as the target behaviors in the research. The experiment period of the research was 36 sessions altogether, and the period was divided into four steps such as basic period I. treatment period I, basic period II, and treatment period II. We also conducted a follow up experiment to identify whether the experiment's effect is still maintained two weeks after the experiment finished. We know that the response cost technique which uses free tokens to the mentally retarded person is efficient in the computer training.

  • PDF