• Title/Summary/Keyword: Authority Database

Search Result 84, Processing Time 0.023 seconds

A Study on the Improvement of Total Cost Change Control in Private Investment Projects (민간투자시설사업에 있어 총사업비 변경관리의 개선방안 연구 - 고속도로 민간투자시설사업을 중심으로)

  • Kim Se-Jong;Kim Yong-Su
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.119-126
    • /
    • 2001
  • This paper analyzes problems related to total cost changes in private investment projects, and then proposes an improvement measure for the control of cost changes within the framework of the project management, contract, human resource, project communication, cost, and time management. From the viewpoint of contract management, the basis of cost change ought to be cleared up with standardization of related provisions in the concession agreement, and potentiality of change ought to be excluded with prescription of the private investor's leading role from the design phase. Regarding human resource management, this paper proposes a standard work flow granting much sovereign rights to private parts by putting restriction on work scopes of the entrusted authority of government, and transferring the rights of assignment, contract, and control about the responsible supervisor to the concessionaire. With regard to project communication management the notification of changes on drawings and technical documents ought to be automated and the realtime database ought to be established with DMIS (Drawings & Documents Management Information System). From the cost management point of view, this thesis integrates the control of cost-change-approved items and disapproved items to one cost breakdown system, and then harmonizes the actual progress with EVMS in time management.

  • PDF

Study on Costumes of Greek Mythology Gods in Films (영화에 나타난 그리스 신화의 신들의 의상 연구)

  • Rhew, Soohyeon
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.6
    • /
    • pp.69-83
    • /
    • 2013
  • This research is to analyze costumes of Greek Mythology Gods in films using Morris' semiotics. In film "Clash of The Titans", Zeus' costume of shining gold armored body suit and long manteaux expressed the limitless sublime. The definite form contouring body shape of his costume also demonstrated classical beauty. Hades' costume of dark colored armor, long manteaux, and transformation via smoke also described the limitless sublime. The unbalanced and irregular shaped armor showed ugliness. In "Percy Jackson & The Olympians: The Lightening Thief", the armor and long manteaux of Zeus showed the limitless sublime. The beauty of his body and his sophisticated business wear indicated classical beauty. These features were also present in Poseidon's costume as well. The limitless sublime and ugliness are implied in Hades' look by portraying him as having a monster body with horns and wings, and his costume of punk look. In "Immortals", gods of Olympus wore clothing that was reminiscent of Egyptian times, which represented a time of strong royal authority, in order to expose the limitless sublime. Classical beauty was shown in the beauty of their body. Titans' costumes and look of non-human being were composed of black and red to present ugliness. The inherent meanings of Gods' costumes are death of god, patriarchy, and the good triumphing over the evil. The Greek gods are not held in the same reverence in the contemporary society. However mythology inspires lots of visual creations. The results help to accumulate a creative design database for fashion.

A Problems in Korean MARC on Disc ("한국문헌목록정보"에 있어서의 문제점)

  • Chung Ok-Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.81-96
    • /
    • 1998
  • This paper studied on problems and improvement method of description and headings in ${\ulcorner}Korean\;MARC\;on\;Disc\lrcorner$. By Korean MARC on Disc, it seems a great mistake that in abridged and full information, give the volumes next to statement of title and author. and even input copies of them respectively in case of multi-volume books. Also, frequently the essential abridged catalog information of a homonymic authors more than 10 which are written to Chinese are enumerated under one author name in Korean, using together with only one list. It is, therefore, effective and reasonable that Korean author headings be written to Korean language at first and be followed by Chinese, and then the subject of an author and the year of birth and death of author be indecated. For that, We should make out a conventional and reasonable subject heading list in advance to maintain the unity of subject, and build a exact authority database of Korean author name according to it.

  • PDF

Priority Assessment for Groundwater Contamination Management Using Analytic Hierarchy Process (AHP) and GIS Approach (계층분석법(AHP)과 GIS를 이용한 고양시 일대의 지하수오염 관리우선순위 평가)

  • Lee, Moung-Jin;Hyun, Yunjung;Kim, Youngju;Hwang, Sang-Il
    • Journal of Soil and Groundwater Environment
    • /
    • v.18 no.5
    • /
    • pp.26-38
    • /
    • 2013
  • In this study, priority for groundwater contamination management was assessed based on regional vulnerability in Goyang-si area, Gyonggi-do, Korea using analytic hierarchy process (AHP) and geographic information system (GIS). We proposed a concept for regional vulnerability to groundwater contamination with using socio-environmental vulnerability factors, which can be classified into three properties including regional hydrogeological property, contamination property, and groundwater use property. This concept is applied to Goyang-si area. For AHP analysis, an expertise-targeted survey was conducted. Based on the survey, a total of 10 factors (criteria) and corresponding weights for regional vulnerability assessment were determined. The result shows that regional contamination property is the most weighted factor among the three property groups (hydrogeological property: contamination property: groundwater use property = 0.3: 0.4: 0.3). Then, database layers for those factors were constructed, and regional vulnerability to groundwater contamination was assessed by weighted superposition using GIS. Results show that estimated regional vulnerability score is ranged from 22.7 to 94.5. Central and western areas of Goyang-si which have groundwater tables at shallow depths and are mainly occupied by industrial and residential areas are estimated to be relatively highly vulnerable to groundwater contamination. Based on assessed regional vulnerability, we classified areas into 4 categories. Category 1 areas, which are ranked at the top 25% of vulnerability score, take about 2.8% area in Goyang-si and give a high priority for groundwater contamination management. The results can provide useful information when the groundwater management authority decide which areas should be inspected with a high priority for efficient contamination management.

Application of Species Distribution Model for Predicting Areas at Risk of Highly Pathogenic Avian Influenza in the Republic of Korea (종 분포 모형을 이용한 국내 고병원성 조류인플루엔자 발생 위험지역 추정)

  • Kim, Euttm;Pak, Son-Il
    • Journal of Veterinary Clinics
    • /
    • v.36 no.1
    • /
    • pp.23-29
    • /
    • 2019
  • While research findings suggest that the highly pathogenic avian influenza (HPAI) is the leading cause of economic loss in Korean poultry industry with an estimated cumulative impact of $909 million since 2003, identifying the environmental and anthropogenic risk factors involved remains a challenge. The objective of this study was to identify areas at high risk for potential HPAI outbreaks according to the likelihood of HPAI virus detection in wild birds. This study integrates spatial information regarding HPAI surveillance with relevant demographic and environmental factors collected between 2003 and 2018. The Maximum Entropy (Maxent) species distribution modeling with presence-only data was used to model the spatial risk of HPAI virus. We used historical data on HPAI occurrence in wild birds during the period 2003-2018, collected by the National Quarantine Inspection Agency of Korea. The database contains a total of 1,065 HPAI cases (farms) tied to 168 unique locations for wild birds. Among the environmental variables, the most effective predictors of the potential distribution of HPAI in wild birds were (in order of importance) altitude, number of HPAI outbreaks at farm-level, daily amount of manure processed and number of wild birds migrated into Korea. The area under the receiver operating characteristic curve for the 10 Maxent replicate runs of the model with twelve variables was 0.855 with a standard deviation of 0.012 which indicates that the model performance was excellent. Results revealed that geographic area at risk of HPAI is heterogeneously distributed throughout the country with higher likelihood in the west and coastal areas. The results may help biosecurity authority to design risk-based surveillance and implementation of control interventions optimized for the areas at highest risk of HPAI outbreak potentials.

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF

A Study on Event Log Correlation Analysis for Control System Threat Analysis (제어시스템 위협분석을 위한 Event Log 상관분석에 관한 연구)

  • Kim, Jongmin;Kim, Minsu;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.35-40
    • /
    • 2017
  • The control system can have such threats as information leakage and falsification through various routes due to communications network fusion with public network. As the issues about security and the infringe cases by new attack methods are diversified recently, with the security system that makes information data database by simply blocking and checking it is difficult to cope with new types of threats. It is also difficult to respond security threats by insiders who have security access authority with the existing security equipment. To respond the threats by insiders, it is necessary to collect and analyze Event Log occurring in the internal system realtime. Therefore, this study could find out whether there is correlation of the elements among Event Logs through correlation analysis based on Event Logs that occur real time in the control system, and based on the analysis result, the study is expected to contribute to studies in this field.

Study on a Web-based Testbed for Historical Astronomy Records and Accounts Services

  • Seo, Yoon Kyung;Mihn, Byeong-Hee;Kim, Sang Hyuk;Ahn, Young Sook;Lee, Ki-Won;Choi, Goeun;Ham, Seon Young
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.2
    • /
    • pp.49.3-50
    • /
    • 2018
  • Korea has kept its records of astronomical phenomena since around 2,000 years ago. However, the contents and scope of relevant service have been limited for researchers who need those records due to lack of complete data collection. In this regard, it is necessary to establish efficient collection and management systems of Korean astronomical records by utilizing an environment that is easily accessible. This study is intended to complete the development of a testbed system that allows researchers to systematically input and validate, in a Web environment, multiple astronomical records among the historical documents until Modern Joseon after the Three Kingdoms Period. Recognition of the pre-translated data and tables in advance is followed by its storage in the database built on the Web. Then, data validation is implemented by providing a retrieval service according to a specific form to only a finite number of researchers who have access authority. This study is targeted at a testbed system that takes around three months to be completely developed. The completed testbed system is expected to allow internal and external researchers of an organization to easily access the service on the Web. This will ensure that the accuracy of the data can be verified mutually and help identify areas of service improvement. The opinions collected regarding service improvement will be reflected in the future system. Eventually, domestic astronomical records will subsequently be able to be utilized internationally through the multilingual service.

  • PDF

BCON : Blockchain-based Content Management Service Using DID

  • Kim, Hye-Won;Lee, Young-Eun;Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.97-105
    • /
    • 2021
  • In this paper, we propose BCON, a service that allows individuals to store personal contents safely, and reliably guarantee their ownership of contents, certifying their identities with DIDs(Decentralized identifiers). DID technology, which supports decentralized identification service based on a blockchain that cannot forgery or alter data, allows users to selectively provide their information, controlling personal information and reinforcing their sovereignty over their identity. BCON stores information about the content specified by a user on the blockchain and Authenticates the user's identity based on DID technology. It also provides functions for the user to safely upload and download the user's content to a distributed database. BCON consists of the content service verifier, the content storage service, the content management contract, and the user application, administrating rhe DID registry for Authority management.

Hsa_Circ_0001947/MiR-661/DOK7 Axis Restrains Non-Small Cell Lung Cancer Development

  • Bao, Yuyan;Yu, Yanjie;Hong, Bing;Lin, Zhenjian;Qi, Guoli;Zhou, Jie;Liu, Kaiping;Zhang, Xiaomin
    • Journal of Microbiology and Biotechnology
    • /
    • v.31 no.11
    • /
    • pp.1508-1518
    • /
    • 2021
  • Hsa_circ_0001947 is associated with multiple cancers, but its function in non-small cell lung cancer (NSCLC) is ambiguous and needs further research. The targeting relationship among circ_0001947, miR-661, and downstream of tyrosine kinase 7 (DOK7) was predicted by database and further verified by dual-luciferase reporter assay, while their expressions in cancer tissues and cells were detected by quantitative real-time polymerase chain reaction (qRT-PCR). After transfection, cell biological behaviors and expressions of miRNAs, miR-661 and DOK7 were determined by cell function experiments and qRT-PCR, respectively. Circ_0001947 was low-expressed in NSCLC tissues and cells. Circ_0001947 knockdown intensified cell viability and proliferation, induced cell cycle arrest at S phase, suppressed apoptosis and evidently enhanced miR-510, miR-587, miR-661 and miR-942 levels, while circ_0001947 overexpression did the opposite. MiR-661 was a target gene of circ_0001947 that participated in the regulation of circ_0001947 on cell biological behaviors. Furthermore, DOK7, the target gene of miR-661, partly participated in the regulation of miR-661 on cell viability. Hsa_circ_0001947 acts as a sponge of miR-661 to repress NSCLC development by elevating the expression of DOK7.