• Title/Summary/Keyword: IT Infra Management

Search Result 154, Processing Time 0.031 seconds

Studies on the Tree Growth and Soil Environmental Characteristics in the Planting Zone on the Back Slope of Dam (댐체 비탈면 녹화지역의 수목 생장 및 토양환경 특성에 관한 연구)

  • Bahn, Gwon-Soo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.3
    • /
    • pp.85-98
    • /
    • 2021
  • In this study, the characteristics of tree growth and soil environment were analyzed at 5 sites that had been planted on the back slope of dam for more than 15 years in Korea. First, as a result of investigating the growth of 15 trees planted on the back slope of the dam, the average height was 10.6m, diameter at roots was 27.3cm, and DBH was 22.9cm, showing good growth status of most of the trees. In particular, the growth levels of pine, hackberry, and oak were similar or better than those of general forests and artificial ground. As a result of excavating and investigating the roots of trees, horizontal roots grew well in the left and right directions of the back slope of the dam, and the growth of vertical roots was insufficient. Currently, the roots of trees do not directly affect dam safety, but they may continue to grow in the long term and interfere with dam management. Second, the physicochemical characteristics of the soil on the back slope of dam were generally above the intermediate level in terms of landscape design standards, and were similar to those of the domestic forest soil. Therefore, although it was judged to be suitable for plant growth, isolation of the site, soil acidification, and nutrient imbalance may affect tree growth and forest health in the long term. Through this study, it was possible to confirm the potential and applicability of planting area on the back slope of dam as an ecological base. Continuous monitoring is required for safety management and ecological value of dams in the future, and through this, it will be possible to secure the feasibility of planting trees on the slopes of new or existing dams and improving management.

Operation Strategy for Electronic Commerce Promotion Base on Common Mechanic Industry (ASP기반으로 한 기계산업체간의 성공적 전자상거래 구축을 위한 전략연구)

  • Jeong, Sei-Hyun
    • Journal of Information Technology Services
    • /
    • v.1 no.1
    • /
    • pp.81-117
    • /
    • 2002
  • The generalization of Internet use has been spreaded all over the world and impacted company to introduce intranet and extranet for their operation which dealt with electronic commerce. For these reason, endeavor of implementation of web site system is promotioned and enhanced the possibility of adaptation range for the view of company. Dramatic competition which company faced with the use of internet and request from all over the world made company brought company to various and different type of level. It is necessary to develop website system with experty knowledge to satisfy customer needs. To deal with this situation, works from the level of government should proposed to spread whole country business which propelled through kyungnam mechanic industry information promotion center. With strategic proposal concerning district characteristics to adapt electronic commerce successfully, information promotion should performed. Support of government is needed continuously to realize infra of ASP composed of 4,877 mechanic industry company. It might be possible to deal with international rapid change with cooperation of company and government related department.

A study on how to build an efficient information system according to changes in IT infrastructure paradigm (IT 인프라 패러다임 변화에 따른 효율적인 정보 시스템 구축 방안에 대한 연구)

  • Kang, Hyun-Sun
    • Journal of Industrial Convergence
    • /
    • v.18 no.6
    • /
    • pp.27-32
    • /
    • 2020
  • Recently, as the business using IT has increased rapidly, a lot of budget is required to operate and manage the complex IT infrastructure. There is a need for a new IT infrastructure technology that can effectively and reduce costs. In this paper, we introduce CI(Converge Infrastructure) and HCI(Hyper Converge Infrastructure) methods, which are IT infrastructure methods for simplifying information systems and reducing operational management efficiency and cost. In addition, it proposes an information system using the HCI method, a new IT infrastructure technology, and a plan to establish a disaster recovery system to provide continuity of service in the event of a disaster or failure. In addition to the introduction of major technologies for using the HCI method, the area, power consumption, and operational efficiency of the information system before and after the introduction of HCI are compared and analyzed.

A Study on Development of Online Wide Area SynchroPhasor and Voltage Stability Monitoring System using Satellite Network (위성망을 이용한 온라인 광역 동기위상 및 전압안정도 감시 시스템 개발에 관한 연구)

  • Kwon, Dae-Yun;Kim, Tae-Jin;Yoon, Sang-Hyun;Jung, Gwang-Gyun;Oh, Gyu-Whan
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.273-274
    • /
    • 2008
  • Recently, the most wide-area blackout in North America, Canada and Europe had shown us indirectly the importance of Wide-Area Power System Protection and had influence on the direction of domestic electric power industry. After reorganization of the electric power industry in 2001, market incentives controls the power generation, transmission and distribution rather than stability of power grid, and moreover it produce bad results like inefficient facility management and too much competition. In addition, we can easily predict the massive loss of social and economic when the wide-area outage occurs by north direction load flow which is a pending problems of domestic power system and in a changed industry likes hi-tech manufacture and information technology industries. This paper introduces the development of infra systems for prevent wide-area blackout in situations of the power system operations.

  • PDF

A Study on the Progressive Use Plan of RFID/USN for Improvement in Distribution of e-Trade (전자무역의 물류/유통 개선에 대한 RFID/USN의 진보적인 활용방안 연구)

  • Jeong, Boon-Do;Jang, Gi-Young
    • International Commerce and Information Review
    • /
    • v.10 no.3
    • /
    • pp.101-116
    • /
    • 2008
  • Future e-Trade RFID/USN distribution should satisfy the new needs of reasonable customers such as efficient supply of goods, presentation of information, and communication by developing intermediate and long-term strategies through analysis of industrial conditions and customers' needs. Through preferential application of new technology, knowledge-based e-Trade RFID/USN distribution environment and DB of industrial portal sites should be developed, RFID/USN infra such as Supply Chain Management(SCM) should be expanded, future-oriented knowledge-based services should be developed to prepare specific and realistic plans for proper UT(Ubiquitous Technology). Such change in e-Trade distribution environment should have historical and environmental backgrounds to suggest specific tasks and directions as a conversion of structural concept of engineering and trade theory for new u-Trade. Accordingly, this study is to present all the problems available in RFID/USN distribution, develop an organized and technological estimate model and provide a foundation to apply it efficiently. This study aims to present an interpretational foundation of RFID/USN distribution, rather than technical directions.

  • PDF

A Design of RFID based Product Lifecycle Management System (RFID 기반 상품의 효율적 라이프사이클관리를 위한 통합시스템 설계)

  • Kim, Dong-Min;Lee, Jong-Tae
    • IE interfaces
    • /
    • v.19 no.4
    • /
    • pp.333-341
    • /
    • 2006
  • RFID (Radio Frequency Identification) is a technology that can input identification information to microchip and make goods, animals, persons recognized, chased, and managed using radio frequency, and is founded on the core technology of ubiquitous environment of the future. In this paper, we propose a RFID integrated system designed to manage the lifecycle of an individual product efficiently. The proposed system can enable traceability and visibility of items through their entire life by integrating distribution and banking information on the basis of EPCglobal Network. It may provide the infra of Digital Manufacturing and RTE (Real Time Enterprise) and effective information sharing structure with existing legacy system (ERP, CRM, SCM) by real time.

A Smart Monitoring Management System Architecture Design for Modular Data Center Infra (모듈러 데이터센터 인프라를 위한 스마트 모니터링 관리 시스템 구조 설계)

  • Lee, Woo Seung;Kim, Hyun Woo;Lee, Young Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.26-29
    • /
    • 2013
  • 클라우드 컴퓨팅 및 빅데이터 환경에서 최근 데이터의 유동량은 폭발적으로 증가하였다. 그에 따라 대규모 IT자원 및 서비스 제공을 위한 핵심 인프라 역할을 맡고 있는 데이터센터의 수요가 급증하고 있는 추세이다. 하지만, 데이터센터의 빠른 확장 속도에 비하여 데이터센터를 통합적, 효율적으로 관리하고 모니터링 할 수 있는 시스템의 부재로 데이터센터의 빠른 유지보수, 효율적 자원관리와 고신뢰 시스템 구축이 어려운 실정이다. 또한 국내 여건상 외국의 사례와 같이 넓은 부지를 사용하여 데이터센터를 구축할 수가 없기 때문에 모듈 형태의 데이터센터 구축 연구가 절실한 상황이다. 본 논문에서는 이러한 폭발적 데이터 환경과 국내 여건을 고려한 효율적인 인프라 지원을 위한 모듈러 데이터 센터의 스마트 모니터링 관리 시스템 구조를 설계한다.

A study on the effect on IT adoption results by adoption factors of IT Outsourcing in the services industries (서비스 분야의 IT 아웃소싱의 도입요인이 도입성과에 미치는 영향)

  • Jeong, Jin-Back;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.115-125
    • /
    • 2012
  • In this study, The adoption factors of IT Outsourcing as a independent variables (business Factors, Outsourcing scope factors and risks factors), which were centered on services industries, were analyzed in order to identify the impacts of the results factors of IT outsourcing as a dependent variables. The main results of study have been summarized as follows. Firstly, among the business factors in the adoption of IT outsourcing, the industrial competitiveness and supports of CEO appeared to have positive impacts on the results of outsourcing adoption. However the environmental changes in technologics for services appeared not to have significant impacts. Secondly, the outsourcing scope factors such as the infra outsourcing, application outsourcing and total outsourcing appeared to have positive impacts on the results of IT outsourcing adoption. Thirdly, the control of risk factors such as risk in safety management, risk of increase, and risk of loss of autonomy appeared to have positive impacts on the results of IT outsourcing adoption.

A Study of Blue-Ocean Business model for Smart work Service (블루오션전략을 이용한 스마트워크산업의 비즈니스모델 모색)

  • Song, Keyong-Seog
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.93-100
    • /
    • 2012
  • Changing the world, Smartphone has appeared in our lives. People feel convenient in their lives or work. The growth of Smartwork has developed for years all over the world. It has many functions, for instance it is not only help to save energy but also reduce environmental pollution at office or company. There are lots of reasons for this. Eventually Korea is well known as IT industry. So it is the best place to build. In order to achieve Smartwork, there must be service like infra, device, software and so on. Therefore in this study, we'll find business model(Blue ocean strategy) for Smartwork service, and apply into this.

A Study on Anomaly Signal Detection and Management Model using Big Data (빅데이터를 활용한 이상 징후 탐지 및 관리 모델 연구)

  • Kwon, Young-baek;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.287-294
    • /
    • 2016
  • APT attack aimed at the interruption of information and communication facilities and important information leakage of companies. it performs an attack using zero-day vulnerabilities, social engineering base on collected information, such as IT infra, business environment, information of employee, for a long period of time. Fragmentary response to cyber threats such as malware signature detection methods can not respond to sophisticated cyber-attacks, such as APT attacks. In this paper, we propose a cyber intrusion detection model for countermeasure of APT attack by utilizing heterogeneous system log into big-data. And it also utilizes that merging pattern-based detection methods and abnormality detection method.