• Title/Summary/Keyword: IT System

Search Result 103,800, Processing Time 0.093 seconds

The Construction Of Water Treatment Operation System Using Fieldbus (필드버스(Lonworks)를 이용한 수운영시스템 구축)

  • Park, J.S.;Kim, I.S.;Song, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2257-2259
    • /
    • 2004
  • Water Treatment Operation System is applied in most water treatment plants with DCS(Distributed Control System) or PLC(Programmable Logic Controller) system. But it has a lot of problems in viewpoint of cost and expansibilities. Therefore, we rose demand about a system that it was easier, convenient and a few costs. So, It was appeared at a Fieldbus as an alternative about this. It is used in ail industrial fields, but because of the economic reality that we can't removes the existing system, and cannot introduce new technology. Because it is actual to be hard to find an actual implementation reward and way of domestic fieldbus technology, we cannot be acknowledged with reliability in the industrial spot. Therefore, We is going to look into a fieldbus application reward in this paper. That is, We recognize structure and a kind of a fieldbus in a Chapter 2. And we is going to look into difference between a PLC method and fieldbus methods in a Chapter 3. Also, We are going to compare the system that used PLC with the system that used fieldbus (LonWorks). And the objects are JinAn and Wonju where a field bus was applied to.

  • PDF

Appplication of Role-based access control in Embedded OS (임베디드 OS에서의 역할기반 접근제어 적용)

  • Lim, Jae-Deok;Un, Sung-Kyong;Kim, Ki-Young;Kim, Jeong-Nyeo;Lee, Choel-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.163-165
    • /
    • 2007
  • Recently, the security requirements of the embedded system which were not considered when the embedded system is independently deployed are being increased because the embedded system is connected to an internet. The connection to the internet of embedded system is the meaning that it is exposed to the various kinds of external attack and can be a victim to these attacks in anytime. Particularly, it is trend that the user-related information is stored into the personal terminals and/or electrical appliances such as PDA, home gateway for home network, settop boxes and so on. So it is needed the security mechanism which protects the user information from the malicious accesses. Accordingly, the coverage of the system security is being expanded from the general server to the embedded system. And it is not enough that the embedded system supports only its inherent functions and it becomes the essential element to provide the security function to the embedded system. This paper applies the RBAC(role-based access control) function to the embedded linux OS and tries to strengthen the security of the embedded linux OS. RBAC is implemented as a loadable kernel module with LSM(Linux Security Module) security framework for user's flexibility.

  • PDF

Development of Lavatory Emergency Detection System using Sensors in Train (센서를 활용한 열차 화장실 내 응급상황 감지에 관한 연구)

  • Song, Dahl-Ho;Chang, Duk-Jin;Kang, Song-Hee
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.4
    • /
    • pp.341-347
    • /
    • 2011
  • In this paper, studied was the application of IT and sensor technology to trains in order to provide safety and convenience for passengers. One of applications is Lavatory Emergency Detection System in a train. Since a lavatory in a train is securely separated space, it is hard to notice an emergency inside of it unless a user sends a request for help. A system that can detect an emergency by using sensors was presented. System requirements were analyzed to design and implement a system. Prototype of the system was made. Then, tests in a laboratory were carried out based on a set of test plan to verify the system functions. Performance was turned out to be very successful. The system developed may have a chance to be installed according to the requirements of specifications of the train to be ordered.

Compensation for the Distorted $16{\times}40$ Gbps NRZ Channels in 1,000 km NZ-DSF WDM System Using MSSI with Optimal Parameters

  • Lee, Seong-Real
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1044-1052
    • /
    • 2006
  • In this paper the optimum position of optical phase conjugator (OPC) and the optimal dispersion coefficients of filler sections in WDM system with the conventional mid-span spectral inversion (MSSI) are numerically induced and then applied into $16{\times}40$ Gbps WDM systems with 1,000km non zero - dispersion shifted fiber(NZ-DSF) in order to efficiently compensate for the distorted overall channels. It is confirmed that the compensation extents of overall WDM channels are more improved by applying the induced optimal parameters into WDM system than those in WDM system with the conventional MSSI. So it is expected to alternate with the forming method of the symmetrical distributions of power and local dispersion by applying these optimal parameters into the real WDM system, which generate a serious problem of applying the OPC into multi-channels WDM system if it is not formed. It is also confirmed that two optimal parameters depend on each other, but less related with the finding procedure. And, it will be possible to realize the flexible system design by applying the methods proposed in this paper into the real WDM system with OPC.

Comparative Studies on Hotel Grading Systems of Korea and Foreign Countries (한국 및 외국의 호텔 등급제도에 관한 비교 연구)

  • Yang Sin Cheol;Kim Dong Ho
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.15 no.1
    • /
    • pp.57-80
    • /
    • 2004
  • Resort Hotel Rate System was first introduced as an official guideline after Tourism Promotion Act, which enables the secretary of transportation to rate resort hotel by its facility and accommodation, was enacted on January 18, 1971. And the system was modified time to time to what we currently have after numerous revisions. However, the system has made a slow progress compare to the other countries system and have shown many potential problems that need to be improved. There is a problem that it is not even clear whether the act is as effective to apply it to rate any resort hotel in reality. The hotel rate system was first introduced in 1970's and changed ever since, and it also changed the private organizations to audit the decision. However, unlike the hotels in other countries, our hotel rating system is not focus on the customer's service and informations. It focus on the hotel's quality so that cause the problem whether the hotel is for customer or not In other different countries, they have some specific standard for evaluation of customer service based on customers' reference or needs. However, there is no evaluation part concerning on customer service in Korea. Also, even the hotel rating system is not based on the hotel waitress or waiter's service part. It means the system is almost focus on the hotel's qualities. Therefore, customer who needs hotel service, can not trust whether they can choose the hotels which gives the right informations and good quality services. Although hotel's physical layout is important, the service part is also important for evaluating the hotel entirely. There are a lot of things to develop and to be changed in order to develop tourism industry in the process of decision about Hotel's level in Korea Thus, this research will summarize some problems which are revised through the former research of hotel's level. And it will compare the system of hotel's level between Korea and developed countries in hotel industry Additionally, I will show current tourism industry in Korea. Finally, I suggest the improvement proposal for the level system of hotel in Korea and process of this system in the future.

  • PDF

Enhancing the Applicability and Improvement Direction of Integrated Environmental Permit System (통합환경허가시스템의 활용도 제고 및 개선방향)

  • Park, Jae Hong;Shin, Su Jeong;Lee, Dae Gyun
    • Journal of Korean Society on Water Environment
    • /
    • v.34 no.3
    • /
    • pp.339-345
    • /
    • 2018
  • The integrated environmental permit system is currently in operation online. It carries out various functions of postmanagement such as the submission of annual reports containing operations management data onto integrated management workplaces, the operation and management of emission facilities and prevention facilities, and the disclosure of information on the integrated permission. On the other hand, the integrated environmental permit system needs to perform various roles in order to stably manage and smoothly perform the permitting work. It is necessary to utilize this system to establish policies by using diverse operations management data onto integrated management workplaces collected in the integrated environmental permit system. This system can also play a role in improving the post-management system and user convenience after the permission review and approval processes. The integrated environmental permit system can be effectively used to set up the BAT-AEL because it collects all of the cross-media data and identifies the overall status of the workplace. In order to establish a post management system after the approval, it is necessary to provide performance management and performance evaluation functions as conditions of the permit after approval. In addition, a variety of support functions should be provided to enable the permission authority and the environmental expert examination agency to facilitate the review of permits. It will be necessary to provide an evaluation system and a proactive diagnostic function to determine whether permission conditions and permit emission standards will change in the future. Also, it is important to adopt an information exchange platform that can be used to collect the status data onto the workplaces; the platform can also be used as an information exchange site for technical working groups (TWG), and for collecting field experts' opinions.

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

A Development of the Integrated Total Asset Management System (통합 유가증권시스템의 개발)

  • Hwang Hyun-Cheol;Song Ha-Yoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.458-463
    • /
    • 2005
  • The total asset management system is used for banks or financial institutions for the management of trusteed assets or own assets and it is divided into three systems: the front-office system, the middle-office system and the back-office system by its business areas and functionalities. This kind of asset management system is a huge and complex system handling large data and various financial products, and requires professional knowledges like accounting, financial product specific knowledge, compliance and regulations, etc. It also performs high level computation for NAV calculation and risk measurement on every day Therefore, it needs absolute stability, extendability and efficiency and should handle the frequent change of regulation and products and connectivity with outdoor institutions. In this paper, we report our successful development of such a system and discuss issues regarding its efficient system design and system construction.

Ship network security system research that apply Green IT (Green IT를 적용한 선박 네트워크 보안 시스템 연구)

  • Baek, Jong-Il;Park, Dea-Woo;An, Jae-Min;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.379-382
    • /
    • 2009
  • As IT becomes leading part of futurity industry, issue about Green IT is being on the increase and resources recycling, toxicity water use resection, saveenergy etc. are emphasized. Fundamental purpose for Neteuwokeusiseutem's Green IT realization that is constructed on ship studied about network security system that can control access that use resources as efficient and safe and is enemy of evil which can give subordinate of system for this and resect unnecessary hardware waste by back more.

  • PDF

Implement of High Available Replicate Systems Based on Cloud Computing (클라우드 컴퓨팅 기반의 고가용성 복제시스템의 구현)

  • Park, Sung-Won;Lee, Moon-Goo;Lee, Nam-Yong
    • 전자공학회논문지 IE
    • /
    • v.48 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • As business management has a high level of dependence on Informational Technology (IT), protecting assets of a company from disaster is one of the most important thing that IT operating managers should consider. Because data or information is a major source of operation of the company, data security is the first priority as an aspect of continuity of business management. Therefore, this paper will realize disaster recovery system, which is suspended because of disaster, based on cloud computing system. Realized High Available Replicate System applied a method of multi thread target database to improve Replicate performance, and real time synchronize technology can improve efficiency of network. From Active to Active operation, it maximizes use of backup system, and it has a effect to disperse load of source database system. Also, High Available Replicate System realized consistency verification mechanism and monitoring technique. For Performance evaluation, High Available Replicate System used multi thread method, which shows more than threefold of replicate performance than single thread method.