• Title/Summary/Keyword: IT Assets

Search Result 1,255, Processing Time 0.031 seconds

Study on the Urethane Restoration Filling Material and Adhesive for Stone Cultural Heritage (석조문화재 복원용 우레탄 메움제 및 접착제에 관한 연구)

  • Han, Won-Sik;Lee, Ho-Youn;Park, Gi-Jung;Hong, Tae-Kee;Wi, Koang-Chul
    • Journal of Conservation Science
    • /
    • v.27 no.1
    • /
    • pp.115-121
    • /
    • 2011
  • A Urethane resin restoration material was made to be used in the restoration of stone cultural assets. The Urethane resin restoration material showed strong adhesive strength and tensile strength similar to epoxy recovery material, which had been mainly used for the recovery of stone cultural assets. The sealing property, anti-shrinking property and paint-ability of Urethane resin restoration material are also similar to existing epoxy system restoration materials. Especially, this Urethane resin restration material is expected to give permanence and continuous stability in the restoration of cultural assets made in stone by resolving the two big issues of existing epoxy recovery material, which are 'yellowing' and 'ir-reversibility'. This Urethane resin restration material had been directly applied as a filling material and adhesive and it was dissolved again. The Urethane resin, which had been used for the recovery, was able to be perfectly removed, which means that this Urethane resin recovery material has perfect reversibility. This Urethane resin restoration material also has enhanced convenience since user can adjust the working-life dependent on work environment. It is believed that this Urethane resin restoration material can also be used as a filling material or adhesive for other cultural assets made of ceramic or metal heritage, in addition to stone, since it has strong adhesive strength and tensile strength.

An Estimation of ASL in Appraisal : Using Korea National Wealth Survey Data (유형고정자산 감정을 위한 내용연수 산정)

  • Oh, H.S.;Lee, S.J.;Kwon, J.H.;Jung, N.Y.;Cho, J.H.
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.2
    • /
    • pp.141-152
    • /
    • 2018
  • Although the 1997 Raw Data of the National Wealth Statistical Survey (South Korea) is timely 20-year-old data, it is meaningful as a benchmarking in the capital stock estimations of Korea, which is estimated by PIM (permanent inventory method). In the case of machinery/equipment, it is the data that can analyze in depth the changes in the industrial structure of Korea. In the case of ASL (average service life) which has economic concept, since the change of ASL is not so large, ASL yielded by the Raw Data of the 1997 National Wealth Statistical Survey is meaningful as reference value for the ASL estimated by the Bank of Korea and the National Statistical Office. As you know Japan has changed its service life due to changes in its industrial structure. However, many of its assets are still used for the years indicated in Showa (before 1989). The same trend with other countries such as Japan. However, the United States is constantly devoted to assessing the useful ASL and value of assets by distinguishing between the Hulten-Wykoff models and those not. Korea has also benchmarked the useful ASL of the United States and Japan when it conducted its own survey every 10 years by due diligence until 1997. In this study, the 'constraint' Iowa curve estimation by the Raw Data of the 1997 National Wealth Statistical Survey is based on the age records of the assets and the maximum age of the assets appropriately derived. And then we made modified Iowa curve by smoothing. From this modified one, we suggested ASL by asset. After 1997, the vintage disposal data directly were collected by the National Statistical Office with Oh Hyun Seung, Cho Jin Hyung, in order to estimate the useful ASL. Since then, the B/S team of the Economic and Statistics Bureau of the Bank of Korea has been working on a new concept of content training.

An Analysis of Spatial Determinants of Inventor Networks in Korea (발명자 네트워크의 공간적 결정요인 분석)

  • Jeong, Jun Ho
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.1-17
    • /
    • 2016
  • This paper attempts to explore the spatial structure of inventor networks and their determinants among 230 shi-gun-gu regions in Korea by investigating the residence of co-inventors engaged in Korean patent applications to the Korean Intellectual Office and exploiting a zero inflated negative binomial model to accommodate an estimation to the count nature of a dependent variable and its excess of zeros. Several variables are found to affect the spatial linkage of inventor networks. Spatial links extend beyond the region if it has more own R&D-related specific assets (private R&D, patent productivity, population, education); if it is physically close to and has technological similarity with the other region. The assets of the other region plays a positive role if, in a similar way, the other region has more R&D-related specific assets.

  • PDF

Financing of Healthcare Facilities in Pension System Assets of Ecologically Problematic Regions in Kazakhstan

  • YESSENTAY, Aigerim;KIREYEVA, Anel A.;KHALITOVA, Madina;ABILKAYIR, Nazerke A.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.7
    • /
    • pp.531-541
    • /
    • 2020
  • The purpose of the study is a theoretical and practical justification for building a mechanism for financing health facilities based on public-private partnerships from a pension fund in regions with environmental problems. The theoretical background is built on works of local and foreign authors on state and non-state pension provisions issues, pension funds' assets management. This study provides an analysis of the health status of the population of the Kyzylorda region; it analyzes also the worldwide and Kazakhstan practice of investing pension funds and implementing projects. There has been legislative and methodological framework for financing health projects based on public-private partnerships in Kazakhstan. The scientific methods considered in this study made it possible to develop a mechanism for financial support for the modernization of a healthcare facility using the budget of pension funds. The authors point out possible risks in the implementation of projects in the field of healthcare and make recommendations on the construction a mechanism for financing healthcare facilities in the regions of Kazakhstan with environmental problems. In addition, they underline the key insights of the analysis, which are requisites for identifying the profitability of project for business and social effects for the public. Factors influencing efficacy, effect and implementation risks identified.

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

The Collaboration Expression in the Modern Fashion Design - Focusing on the Collaboration of Korean Cultural Contents - (현대 패션디자인에서의 콜래보레이션 표현성 - 한국적 문화콘텐츠의 응용을 중심으로 -)

  • Lee, Eun-Sook;Kim, Sae-Bom
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.14 no.4
    • /
    • pp.99-111
    • /
    • 2012
  • This study intends to explore the collaborative expression in the modern fashion design by analyzing the collaboration of motifs symbolizing Korean cultural identity. As for the data research, in order to examine the expressional objects of collaboration in the collections of the fashion designers from Korea and overseas who have applied the Korean culture among their collections posted on the Internet sites, www.firstview.com, and www.style.com from 2005 to 2012 were collected for analysis. 923 pictures used in the analysis sheet. As for the research method, the content analysis method was used. In the modern fashion design, the collaborative expression in the motifs symbolizing Korean cultural identity are limited to tangible expression, intangible expression, integrated expression. The results of this study were as follows. First, in the tangible expression, traditional tangible assets are used in the shapes, items, colors, materials, patterns and details to symbolize uniquely Korean image. The intangible expression, the applicability for Korean intangible assets include the master's (intangible cultural assets) and the craftsmanship of the modern designers being collaborated onto the contemporary customs to express the Korean traditional culture in a realistic or an abstract trend. The hybride expression, it is to represent Korean thoughts and values using the tangible elements. Second, The expressivity of collaboration of each year mostly shows integrated expression, intangible expression and tangible expression were shown respectively. The trend of seasonal collaboration expressivity was muchly the integrated expression in most seasons, and intangible expression and tangible expression followed respectively. It is recognizable that the expressivity of collaboration of each designer was; integrated expression was muchly shown in Lie Sang Bong and Lee Young Hee's works, Duri Jung showed much of intangible expression, and much tangible expressivity was shown in Carolina Herrera.

  • PDF

Analysis on deterioration behaviors of the beewax-treated Annals of Joseon Dynasty (「조선왕조실록」 밀납본의 열화특성 분석)

  • Jo, Byoung-muk;Kim, Hyoung-jin;Choi, Tae-ho;Eom, Tae-jin
    • 보존과학연구
    • /
    • s.28
    • /
    • pp.21-37
    • /
    • 2007
  • Paper cultural asset show various deterioration characteristics and behaviors according to the environmental conditions during the storage. The understanding of the paper itself and its conservation knowledge is thus prerequisite to preserve paper cultural assets and pass them to descendants in a good condition. The Annals of Joseon Dynasty is one of the most important our written cultural assets (National treasure No.151) and it is registered as a UNESCO Memory of the World. The Annals of Joseon Dynasty is composed of 1707 volumes and 1,187 books that were written on the official history of 472 years(AD 1392-1863) from King Taejo to King Chuljong (25 generations). Among them, beewax-treated Annals show severe damages due to the deterioration of wax materials such as breaking, hardening, darkening, discoloring and whitening. Urgent measures should be taken to preserve the Annals and prevent further deterioration. Therefore, a systematic and scientific approach on the conservation and restoration of the Annals of Joseon Dynasty is definitely necessary. So it can be used an example to show how much the preservation science can conserve the paper cultural assets. In this respect, this study focuses on analyzing paper properties and deterioration behaviors of the Annals of King Sejong, the most damaged one, using non-destructive micro analysis techniques.

  • PDF

A Study on the Present Condition and Prospect of Architectural Cultural Heritage Content Applied to 3D Digital Technology (3차원 디지털기술 적용 건축문화재 콘텐츠 현황분석 및 전망에 관한 연구)

  • Jung, Sung Ju;Lee, Tae Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.188-198
    • /
    • 2021
  • Digital data was collected using modern three-dimensional digital technology. Current content-specific technologies were investigated through domestic and foreign cases so that three-dimensional digital technology could be applied to the utilization of various contents. First, the use of three-dimensional digital technology of architectural cultural assets has been changing from the restoration of cultural assets. Second, some of the contents produced were found to be underutilized. Third, the type of content has been changing in experience and exhibition, but the online approach was small. Fourth, digital restoration using domestic IT technology has been used as a technology to restore overseas cultural heritage. The fifth analysis of the relationship between the content types and 3D digital technologies shows the use of currently limited technologies. This study analyzed the status of digital architecture and the application of three-dimensional digital technologies to lay the foundation for the active development and utilization of content. Subsequent studies on various layers and digital technologies will be needed to revitalize digital architectural cultural assets in the future.

Structure and Challenges of a Security Policy on Small and Medium Enterprises

  • Almeida, Fernando;Carvalho, Ines;Cruz, Fabio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.747-763
    • /
    • 2018
  • Information Technology (IT) plays an increasingly important role for small and medium-sized enterprises. It has become fundamental for these companies to protect information and IT assets in relation to risks and threats that have grown in recent years. This study aims to understand the importance and structure of an information security policy, using a quantitative study that intends to identify the most important and least relevant elements of an information security policy document. The findings of this study reveal that the top three most important elements in the structure of a security policy are the asset management, security risk management and define the scope of the policy. On the other side, the three least relevant elements include the executive summary, contacts and manual inspection. Additionally, the study reveals that the importance given to each element of the security policy is slightly changed according to the sectors of activity. The elements that show the greatest variability are the review process, executive summary and penalties. On the other side, the purpose of the policy and the asset management present a stable importance for all sectors of activity.

An Effective Threat Evaluation Algorithm for Multiple Ground Targets in Multi-target and Multi-weapon Environments

  • Yoon, Moonhyung;Park, Junho;Yi, Jeonghoon
    • International Journal of Contents
    • /
    • v.15 no.1
    • /
    • pp.32-38
    • /
    • 2019
  • In an environment where a large number of weapons are operated compared to a large number of ground targets, it is important to monitor and manage the targets to set up a fire plan, and through their multilateral analysis, to equip them with a priority order process for targets having a high threat level through the quantitative calculation of the threat level. Existing studies consider the anti-aircraft and anti-ship targets only, hence, it is impossible to apply the existing algorithm to ground weapon system development. Therefore, we proposed an effective threat evaluation algorithm for multiple ground targets in multi-target and multi-weapon environments. Our algorithm optimizes to multiple ground targets by use of unique ground target features such as proximity degree, sorts of weapons and protected assets, target types, relative importance of the weapons and protected assets, etc. Therefore, it is possible to maximize an engagement effect by deducing an effective threat evaluation model by considering the characteristics of ground targets comprehensively. We carried out performance evaluation and verification through simulations and visualizations, and confirmed high utility and effect of our algorithm.