• Title/Summary/Keyword: Asset Management Information System

Search Result 193, Processing Time 0.03 seconds

Failure Rate Calculation using the Mixture Weibull Distribution (혼합 와이블 분포를 이용한 고장률 산출 기법에 관한 연구)

  • Chai, Hui-seok;Shin, Joong-woo;Lim, Tae-jin;Kim, Jae-chul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.3
    • /
    • pp.500-506
    • /
    • 2017
  • In 2014, ISO 55000s has been enacted and the power plant asset management is becoming a hot issue for all over the world. The asset management system is being developed as a combination of CBM(Condition Based Maintenance) and RCM(Reliability Centered Maintenance). Therefore, the research on the calculation of the failure rate which is the most basic index of RCM is actively carried out. The failure rate calculation has been going on for a long time, and the most widely used probability distribution is the Weibull distribution. In the Weibull distribution, the failure rate function is determined in three types according to the value of the shape parameter. However, the Weibull distribution has a limitation that it is difficult to apply it when the trend of failure rate changes-such as bathtub curves. In this paper, the failure rate is calculated using the mixture Weibull distribution which can appropriately express the change of the shape of the failure rate. Based on these results, we propose the necessity and validity of applying mixture Weibull distribution.

Study IoT Asset Management System Based on Block-Chain Framework (블록체인 프레임워크 기반 IoT 자산관리시스템)

  • Kang, Sung Won;Kim, Young Chul
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.94-98
    • /
    • 2019
  • In this paper, we developed the tools enabling to manage the IoT systems owned by managers. Since equipment agents consists based on open-source block-chain framework, we can secure the invariance on data and furthermore can locate the resources by searching the AP connected to the equipments. Also the manager can trace the connecting details on equipments from their block-chain accounts. In addition, we work on the possibility of protecting ARP poisoning attacks by removing the credibility on additional ARP requests being generated during the process of network creation.

A Study on Implementing a National Academic Resources Management System in Korea (국가학술자원관리시스템구축 계획에 관한 연구)

  • Noh, Young-Hee;Park, Hong-Seok;Lee, Soo-Ji
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.1
    • /
    • pp.99-127
    • /
    • 2008
  • National competence is based on the quality of university education, which is determined by the competitiveness of academia, research and information, IMD reported that Singapore, #2 country in national competence index, topped in quality of university education. Meanwhile Korea's current national knowledge infrastructure project lacks comprehensive coordination at a governmental level and has been conducted in a rather sporadic manner, without any consideration on the overall analysis of knowledge information resources. Consequently, a disproportionate amount of attention was devoted to collecting general information resources, while neglecting rare, hard-to-collect sources with historic, academic, and/or cultural values. This study proposes to build an academic resource management system to fully supervise academic resources at least, among national knowledge information resources which is a national asset, and also to allocate budget and cultivate new information building projects based on overall analysis on academic resources. In other words, there is a need for a management system to implement efficient linkage, distribution and utilization of academic resources and, to that end, we need to build an academic resource management system at a national level, maximizing the benefits from the knowledge society that we live in.

A Study on the Construction and Improvement of Software Process Infrastructure for Software Firms In Korea (국내 소프트웨어 사업자의 프로세스 기반구조 구축 및 개선 방안 연구)

  • Ahn, Yeon-Shick;Moon, Song-Chul;Kim, Dong-Soo
    • Asia pacific journal of information systems
    • /
    • v.14 no.4
    • /
    • pp.23-47
    • /
    • 2004
  • This study was tried for the improvement of software process ability of the software firms, and analyzed empirically the impact that a software process infrastructure level influences on the software process level and process performance. The questionnaire were developed and data were collected from the process improvement correspondences or project quality managers of the 78 software firms. The result was shown that management-organization infrastructure was composed of software process improvement organization's role and activity, process standard and education, management system and supporting, management guides and procedures. And organization's standard development procedure or criteria, process asset, process support tools were included in technical infrastructure. This study provides that some components of software process infrastructure had an significant influence on the process level, process infrastructure management level, and software process performance.

BIM-based Property Management by Linking Maintenance with Financial Data for Commercial Building Projects

  • Shin, Hyeonju;Cha, Heesung
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.418-425
    • /
    • 2022
  • For a commercial building, property managers play an important role in maximizing the benefit by reducing cost and increasing revenue in the operation and maintenance phase of the building. However, most of property managers are spending their time in monitoring facility managers who have little impact on cost reduction and maximization of operating profit. The industry practitioners have difficutlty in increasing the efficiency of thier work due to this work environment. In addition, both property managers(PMr) and facility managers(FMr) are dependent on the paper drawings and manuals, which can worsen the inefficiency and human errors are inevitable. This study aims to contribute to improvement of the current practice by developing a novel algorithm that autmatically links the facility information with 3D model, which can provide an efficient property management for commercial buildings.

  • PDF

Development of Pavement Management System for Highway Maintenance (국도유지관리를 위한 포장관리시스템 개발에 관한 연구)

  • Lee, Young-Wook;Do, Myung-Sik;Lee, Jong-Dal
    • International Journal of Highway Engineering
    • /
    • v.9 no.4
    • /
    • pp.159-169
    • /
    • 2007
  • In this paper, a PMS(Pavement Management System) is presented for the public agency who wish to execute rational repair by referring to asset management information regarding road pavement. The aim of the paper is to provide the decision makers with the planning information regarding maintenance strategies for efficient road pavement management. We found that life cycle cost can be minimized and repair cost in each year fluctuates when repeating repair at the IRI management level. The validity of PMS application presented in this paper is investigated through case studies for conducted for 22 national highway road sections in Korea.

  • PDF

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

The Design and Implementation for Practical Risk Analysis Method & Modules (실용적인 위험분석 방법론 설계와 모듈 구현)

  • 정윤정;김인중;이철원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1081-1089
    • /
    • 2002
  • In these days many Organizations recognize risk of information asset by rapid change of information system environments, and need suitable management for that. Also many organization which operate important information-communication infrastructure take interest in threat, vulnerability and risk analysis of important asset by enforcement of Act on protection of information and communication infrastructure. But, it is most that methodology and tools that analyze risk for organization's information asset are developed in abroad up to now, domestic research of this field is insufficient stage. An research of this field is necessary in domestic because it can't reflect domestic actuality by depending on most foreign methodology or a tool. In this paper we proposed design and implementation for the risk analysis methodology, a prototype and important modules that considers the user convenience. We expect that the result of this paper will for step improvement of domestic risk analysis methodology and tool development.

A Risk Analysis Model for Information System Security (정보시스템 보안을 위한 위험분석 모델)

  • Kim, Kang;Park, Jin-Sub;Kim, Bong-Hoi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.60-67
    • /
    • 2002
  • Existing as a reverse function in the information age, the security threats against the information system is increasing day by day and a systematic security management to this is being considered more and more important. The most important thing on security management is a risk analysis to understand the cause of the threat and to set up a countermeasure. Therefore, to increase security the proposed model will advise on the set up of the security policy and for a set up of an economic security countermeasure we have increased the reliability on the risk calculation stage. Especially, on the countermeasure stage we have requested a security level on the asset in order to examine the mutual reliance between assets, and differing from the standard model, we have improved the proposed model so that the materializing of the proposed countermeasure has been made to identify the restricted items for each asset and in order to not materialize superficial countermeasures and to make sure to materialize an economic countermeasure.

  • PDF

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.