• Title/Summary/Keyword: Asset Management System

Search Result 375, Processing Time 0.023 seconds

A Study on the Implementation of RFID for Korean Defense (RFID 군 적용방안 연구)

  • Lee, Jea-Youl;Kim, Seong-Won;Choi, Sang-Young
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.58-72
    • /
    • 2005
  • RFID(Radio Frequency Identification) is one of key technologies in ubiquitous computing. RFID system comprises tag, reader, and computer application. The tag is a small electronic chip, which is attached to a thing such as item, pallet, container. The reader has an tiny antenna obtaining the identification information of the things by radio frequency, and provides the information to the computer application for a business. In this paper we have proposed the military application of RFID and its implementation policy for the Korean armed forces. We believe that The principle application area would be logistics TAV(total asset visibility) and resource management, and the implementation should be achieved step by step considering the advancement of RFID technology and government policy.

A Study on the Development of DOI Lookup API (DOI 수집 API 개발에 관한 연구)

  • Kim, Sun-Tae;Yae, Yong-Hee
    • Journal of Information Management
    • /
    • v.39 no.1
    • /
    • pp.221-237
    • /
    • 2008
  • CrossRef provides a various queries(OpenAPIs) which can be used for DOI & meta data lookup. CrossRef encourages publishers and library societies to develop diverse system by using the queries. In this thesis, CrossRef's queries are analyzed and DOI Lookup API which could automatically lookup the DOI by various methods was developed. I proposed that how institutions having their own meta data can use the developed API.

An Information System Architecture for Extracting Key Performance Indicators from PDM Databases (PDM 데이터베이스로부터 핵심성과지표를 추출하기 위한 정보 시스템 아키텍쳐)

  • Do, Namchul
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • The current manufacturers have generated tremendous amount of digitized product data to efficiently share and exchange it with other stakeholders or various software systems for product development. The digitized product data is a valuable asset for manufacturers, and has a potential to support high level strategic decision makings needed at many stages in product development. However, the lack of studies on extraction of key performance indicators(KPIs) from product data management(PDM) databases has prohibited manufacturers to use the product data to support the decision makings. Therefore this paper examines a possibility of an architecture that supports KPIs for evaluation of product development performances, by applying multidimensional product data model and on-line analytic processing(OLAP) to operational databases of product data management. To validate the architecture, the paper provides a prototype product data management system and OLAP applications that implement the multidimensional product data model and analytic processing.

The Factors Affecting the Implementation of Risk Management Systems: The Case of ALM Systems (국내 금융기관의 위험관리시스템 도입에 영향을 미치는 요인: ALM시스템을 중심으로)

  • Hahm, Yu-Kun
    • Korean Management Science Review
    • /
    • v.15 no.2
    • /
    • pp.211-227
    • /
    • 1998
  • The process of implementing risk management systems for the organizations in financial service industry can be viewed as a diffusion of innovation since the introduction of the risk management systems changes the decision making process on risks faced by the organizations. The purpose of the reported research is to examine the factors that affect the successful implementation of ALM(asset & liability management) systems, the risk management systems managing interest rate risk. Specifically, this paper presents an investigation of three factors from the diffusion of innovation studies; internal factors, external factors, and time. A field survey was conducted for Korean banks that have implemented ALM systems. The results suggest that the perceived uncertainty of market, system supports, and management supports be most significantly related to the successful implementation of the risk management systems. The findings of the current study also suggest a certain amount of time should be passed to diffuse the risk management systems in organizations.

  • PDF

uLAMP: Unified Linguistic Asset Management Platform for Natural Language Processing (uLAMP: 자연어 처리를 위한 자원 통합 관리 플랫폼)

  • Um, Jung-Ho;Shin, Sung-Ho;Choi, Sung-Pil;Jung, Hanmin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.25-34
    • /
    • 2012
  • Due to the development of wireless devices such as smart-phone and internet, a lot of linguistic resources actively are opened in each area of expertise. Also, various systems using semantic web technologies are developing for determining whether such information are useful or not. In order to build these systems, the processes of data collection and natural language processing are necessary. But, there is few systems to use of integrating software and data required those processes. In this paper, we propose the system, uLAMP, integrating software and data related to natural language processing. In terms of economics, the cost can be reduced by preventing duplicated implementation and data collection. On the other hand, data and software usability are increasing in terms of management aspects. In addition, for the evaluation of uLAMP usability and effectiveness, user survey was conducted. Through this evaluation, the advantages of the currentness of data and the ease of use are found.

Technology Valuation Framework and Technology Valuation System (보유 기술의 가치평가 방법론 및 기술가치 평가시스템)

  • Yun, Myung-H.;Han, Sung-H.;Choi, In-Jun;Ryu, Tae-B.;Kwon, O-Chae
    • IE interfaces
    • /
    • v.15 no.4
    • /
    • pp.444-451
    • /
    • 2002
  • Recently, the interest in technology valuation is revived and increasing mainly due to the lack of suitability of the traditional valuation methods in explaining the market reaction to newly-emerging knowledge-oriented companies. Moreover, many firms are now gearing their efforts to the strategic use of technology asset such as technology licensing, transfer and commercialization. Firms are also trying to enhance their technological competitiveness by re-evaluating their technology level and thus identifying the strengths/weaknesses of their technology portfolio. To accomplish this objective, the development of an integrated evaluation system for technology assets is essential. This paper presents a technology valuation system developed for a steel manufacturing company in South Korea. The valuation framework is based on; (1) the multi-attribute evaluation of technological competitiveness using Analytic Hierarchical Process and; (2) the expected future benefit of the technology using four different methods of discounted cash flow estimation. The suggested framework will be easily applicable to various industries where technological competitiveness should be evaluated systematically.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

An Exploratory Study on the "Trust" Operational Scheme for Income Security and Asset Management for People with Developmental Disabilities in Adulthood (성인기 발달장애인의 소득보장과 재산관리를 위한 「신탁」 운영방안에 대한 탐색적 연구)

  • Kim, Seong-Cheon;Kang, Ji-Hyun
    • 재활복지
    • /
    • v.21 no.2
    • /
    • pp.29-62
    • /
    • 2017
  • The purpose of this study is to find out the main operational scheme of the "financial planning" and "the trust" for people with developmental disabilities as a means of property protecting and managing for them. The results are as follows; Regarding to "Financial planning", it is necessary to establish a measure to meet the financial needs for people with developmental disabilities in future plan; Issues to be taken care of in the point of financial planning include plan for the maintenance and use of property for their independent life; and public and private resources and support for the disabled. Obstacles are lack of national awareness of the financial planning for the disabled. In relation to the contents of the "trust" of people with developmental disabilities, the principles of operation are assuring universality, publicness, stability, self-decision making, and individuality; operating system is a mixture of public and private; subjects of target are people with developmental disabilities with no parents or caring family as well as income. The required support is a supervisory system for the secure management of asset to entrusted institutions; the decision support system for people with developmental disabilities; maintaining the qualification of government receipt of public assistance for those who do not redeem up to a certain amount of personal property utilizing the trust system.

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

Developing an On-line Scheduling System for Increasing Effectiveness of Public Research Facility (공공기관 연구시설장비 효율성 향상을 위한 온라인 일정계획 시스템 개발)

  • Lee, Chae-Yun;Kim, Ki-Hong;Shin, Seung-Jun
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.1
    • /
    • pp.181-189
    • /
    • 2017
  • The systematic management of technology infrastructure increasingly becomes critical as it represents the driving power for creating competitive advantage of nations and enterprises. In this sense, public facility and equipment, which is one major asset of technology infrastructure, should be managed effectively, systematically and efficiently to increase its overall equipment effectiveness. However, the manual and off-line communication was the unique way to communicate between the suppliers who provide facilities in the public sector and the customers who utilize the facilities in the industrial sector. This communication way caused invisibility of available usage time and increase of idle time, thereby decreasing the equipment effectiveness. This paper presents an web-based scheduling system that enables real-time collaboration and information sharing for increasing the equipment effectiveness. The designed system performs scheduling, facility management, order management and customer relationship management in an on-line platform, and carries out the processing and storing of relevant information in an integrated database. The paper includes a development approach to identify business process models and standardized system models by using object-modeling technique. The deliverable of the present work will contribute to increasing the equipment effectiveness by enhancing visibility, transparency and predictability by means of the integration with a legacy Enterprise Resource Planning.