• Title/Summary/Keyword: 정보시스템 유지보수

Search Result 917, Processing Time 0.026 seconds

A Study on Road Traffic Volume Survey Using Vehicle Specification DB (자동차 제원 DB를 활용한 도로교통량 조사방안 연구)

  • Ji min Kim;Dong seob Oh
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.2
    • /
    • pp.93-104
    • /
    • 2023
  • Currently, the permanent road traffic volume surveys under Road Act are conducted using a intrusive Automatic Vehicle Classification (AVC) equipments to classify 12 categories of vehicles. However, intrusive AVC equipment inevitably have friction with vehicles, and physical damage to sensors due to cracks in roads, plastic deformation, and road construction decreases the operation rate. As a result, accuracy and reliability in actual operation are deteriorated, and maintenance costs are also increasing. With the recent development of ITS technology, research to replace the intrusive AVC equipment is being conducted. However multiple equipments or self-built DB operations were required to classify 12 categories of vehicles. Therefore, this study attempted to prepare a method for classifying 12 categories of vehicles using vehicle specification information of the Vehicle Management Information System(VMIS), which is collected and managed in accordance with Motor Vehicle Management Act. In the future, it is expected to be used to upgrade and diversify road traffic statistics using vehicle specifications such as the introduction of a road traffic survey system using Automatic Number Plate Recognition(ANPR) and classification of eco-friendly vehicles.

A Study on Intelligent Mobility Enhancement System for the Mobility Handicapped (첨단 교통약자 보호시스템에 대한 연구)

  • Han, Woong-Gu;Shin, Kang-Won;Choi, Kee-Choo;Kim, Nam-Sun;Sohn, Sang-Hyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.5
    • /
    • pp.25-37
    • /
    • 2010
  • This study is aimed at enhancing mobility rights for the transportation underprivileged that has been made light of relatively compared to normal people. In order to do this, we've suggested having ITS (Intelligent Traffic System) built and improving satisfaction through the test operation of its main system. The existing sound signal device for the visually handicapped has one problem with managing it. Because, the people in charge of it had to visit each problematic site directly to maintain and fix some problems every time it was out of order. Moreover, it couldn't provide sustainable services about voice guidance and the visually handicapped had to control it by either confirming the location of buttons that were installed on the pillar of traffic light and then pressing one of them or using a remote controller on their own. In order to improve such inconveniences, we have created a new typed sound signal device for the visually handicapped by applying the cutting-edge wireless technology based on ergonomics considering actual road situations. Such technology enables it report the status of signal device and light to them by using its voice guidance system automatically every time they have access to it. Additionally, we've already introduced it to a couple of test areas and then known the fact that they recognized traffic situation more conveniently and safely compared to the existing sound signal device. That is above average in terms of satisfaction. In addition to that, we've provided LTS (Location Tracking System - Location-based service intended for elementary students) by utilizing the existing wireless infrastructure and founded the fact that about 87% of their parents were satisfied with the service based on LTS.

Structural Design and Thermal Analysis of a Module Coil for a 750 kW-Class High Temperature Superconducting Generator for Wind Turbine (풍력 터빈용 750 kW 급 고온초전도 발전기 모듈의 코일 구조 설계 및 열 해석)

  • Tuvdensuren, Oyunjargal;Go, Byeong-Soo;Sung, Hae-Jin;Park, Min-Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.2
    • /
    • pp.33-40
    • /
    • 2019
  • Many companies have tried to develop wind power generators with a larger capacity, smaller size and lighter weight. High temperature superconducting (HTS) generators are more suitable for wind power systems because they can reduce volume and weight compared with conventional generators. However, the HTS generator has problems such as huge vacuum vessel and the difficulty of repairing the HTS field coils. These problems can be overcome through the modularization of the HTS field coil. The HTS module coil require a current leads (CLs) for deliver DC current, which causes a large heat transfer load. Therefore, CLs should be designed optimally for reducing the conduction and Joule heat loads. This paper deals with a structural design and thermal analysis of a module coil for a 750 kW-class HTS generator. The conduction and radiation heat loads of the module coils were analysed using a 3D finite element method program. As a result, the total thermal load was less than the cooling capacity of the cryo-cooler. The design results can be effectively utilized to develop a superconducting generator for wind power generation systems.

A Design and Analysis of Pressure Predictive Model for Oscillating Water Column Wave Energy Converters Based on Machine Learning (진동수주 파력발전장치를 위한 머신러닝 기반 압력 예측모델 설계 및 분석)

  • Seo, Dong-Woo;Huh, Taesang;Kim, Myungil;Oh, Jae-Won;Cho, Su-Gil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.672-682
    • /
    • 2020
  • The Korea Nowadays, which is research on digital twin technology for efficient operation in various industrial/manufacturing sites, is being actively conducted, and gradual depletion of fossil fuels and environmental pollution issues require new renewable/eco-friendly power generation methods, such as wave power plants. In wave power generation, however, which generates electricity from the energy of waves, it is very important to understand and predict the amount of power generation and operational efficiency factors, such as breakdown, because these are closely related by wave energy with high variability. Therefore, it is necessary to derive a meaningful correlation between highly volatile data, such as wave height data and sensor data in an oscillating water column (OWC) chamber. Secondly, the methodological study, which can predict the desired information, should be conducted by learning the prediction situation with the extracted data based on the derived correlation. This study designed a workflow-based training model using a machine learning framework to predict the pressure of the OWC. In addition, the validity of the pressure prediction analysis was verified through a verification and evaluation dataset using an IoT sensor data to enable smart operation and maintenance with the digital twin of the wave generation system.

The Exploratory Study on IT Investment Management of the Public Sector Based on Forecasting (수요예측기반의 공공정보화 투자관리방안에 대한 탐색적 연구)

  • Lee, Jae-Du;Park, Sae-Gue
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.1-10
    • /
    • 2014
  • From 2004 to 2013, the annual investment for the ICT sector in Korea amounted to about 3.2 trillion won. Depending on whether the government policy allowed for budget increases and/or decreases, this impacted the investment in the ICT sector. In particular, the fixed costs of operation and maintenance lead to a reduced chance for a new potential demands in IT programs. Even though a situation may exist that there are insufficient funds available, there is a need for building a sustainable long-term IT investment management system. The purpose of this study is to conduct basic research for the arrangement of preparation to meet IT needs required in the public sector. For this, this paper introduces the concept of IT Investment Management based on prudent forecasting. After both foreign and domestic relevant cases are reviewed, implications will be derived from the aforementioned cases. Through this process, the direction of IT Investment Management based on forecasting for the IT projects decision making will be suggested. These research results could be used for helping to develop better policies and a more efficient management of the public sector IT budget.

The Development for KASS Reference Station Site (KASS 기준국 사이트 구축)

  • Cho, Sunglyong;Jang, Hyunjin;Jeong, Hwanho;Lee, Byungseok;Nam, Giwook
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.4
    • /
    • pp.273-279
    • /
    • 2020
  • In the Korea's SBAS(KASS), reference site is an important infrastructure facility for the collecting and monitoring GPS/GEO signals. The SBAS reference station has an clear requirements than other regular monitoring stations. It requires constant maintenance during the system operation. The development for KRS site should be prepared for site survey, site construction, antenna geodetic survey, equipment installation and operation. Site survey is initially performed as an important step to predict site availability and system performance. The operation center must provide the reference site, equipment room, and appurtenant to satisfy the site requirements. The position of antennas is very important information, and accuracy must be secured through the geodetic survey. Measurement collected at the from precise antenna are provided to the KASS processing station. The position of antenna should be maintained through continuous position checks and updates during the operation. When the development of the KRS site is completed, it performs tasks for installing and operating the KRS equipment. In this paper, we presented the procedures and some results for the development of the 7 KRS sites.

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.

Design of Required Interface for Components in EJB Environment (EJB 환경에서 컴포넌트의 Required 인터페이스 설계 기법)

  • Yoon, Hee-Yoon;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.11D no.3
    • /
    • pp.671-682
    • /
    • 2004
  • As new and diverse information technologies are being introduced and software complexity is increased, software development cost and efforts are also sharply increased. Component-Based Development (CBD) technology is appealing as a new way to reduce the cost and effort by increasing reusability and maintainability. Component in CBD has variability infernally which enables customization of the component within the specific domain. A component user can easily set up internally variability parts though Required interface which is provided by the component. Enterprise JavaBeans (EJB) is utilized as a commercial standard to implement Java-based components. However, EJB constructs are limited in directly implementing Required interfaces of coarse-grained components[8]. In this paper, we define Required interface and propose interface-storage technique, class-storage technique, interface-generation technique, and Plug -in technique for implementing required interface of component. Interface-storage technique stores variable value in Required interface and class-storage technique take the Bean containg variability as Required interface without modification of component model. Interface-generation technique generates new Bean which takes the role of Required interface for component variability and Plug-in technique sets up component variability that component user plugged-in variable part externally The proposed four techniques conform to the semantics of CBD component interface and enable the implementation of high quality components.

A Study on Reliability Demonstration for Railway Signaling Equipment (철도신호장치의 신뢰도입증에 관한 연구)

  • Shin, Duck-ho;Chae, Eunkyung;Park, Chan-woo;Lee, June-Seok
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.4
    • /
    • pp.458-465
    • /
    • 2017
  • The railway signaling system, which controls the course of trains and the distance between trains, is a safety critical system of the railway system because derailment or collision of trains can occur if unsafe failure is generated by any fault. The international standards of reliability, availability, maintainability, and safety of railway applications require that the safety of functions be guaranteed in safety critical systems; system reliability and safety are quantitatively estimated and demonstrated by the failure rates of devices. The development of technology has accelerated the development of railway signaling systems. Existing devices, which have already been verified as to their safety, are applied with special user requirements to reflect the new operation scenario. It is found that the reliability and safety of the devices are different depending on individual application. Therefore, the reliability of the railway signaling system must be considered while complying with the international standards; this requires that the initial failure rate be estimated and demonstrated using fault data gathered over several years. This paper shows a method for demonstrating the initial estimated failure rate and suggests a fault data collection method and an overall process that is based on probability.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.