• 제목/요약/키워드: Information Systems Operation

검색결과 2,603건 처리시간 0.029초

낙동강 하류 보, 하굿둑의 효율적인 운영을 위한 ICT 시스템 융합 구현 (The implementaion of ICT systems convergence for the efficient operation of Nakdong River Downstream Weirs and Estuary Barrages)

  • 김석주
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.988-991
    • /
    • 2013
  • 낙동강 하류 지역에는 합천 창녕보, 창녕 함안보, 낙동강하굿둑 좌안배수문 그리고 우안배수문의 수자원시설이 건설되어 운영되고 있다. 원거리에 위치한 각각의 시설물을 연계하여 통합 운영하는 것은 국가 수자원의 관리와 설비 운영의 효율과 효과 측면에서 중요하다. 이러한 이유로 ICT 기술을 활용하여 개별 시설물을 유기적으로 운영할 수 있는 시스템 구현을 계획하고 실행하였다. 부산 낙동강하굿둑 인근에 위치한 K-water 낙동강통합물관리센터에서 개별 시설들을 통합 운영할 수 있는 시스템을 구축하여 효율적인 수자원관리와 운영비용 절감 등의 상당한 기대효과가 있을 것으로 사료된다.

  • PDF

신뢰성 높은 차량 안전 서비스를 위한 WAVE 기반 Multi-Channel MAC 기술 (WAVE based Multi-Channel MAC(MCM) Technology for Reliable Vehicle Safety Message Service)

  • 박종민;오현서;조성호
    • 한국ITS학회 논문지
    • /
    • 제10권4호
    • /
    • pp.78-85
    • /
    • 2011
  • 차량 통신 환경에서 운전자가 돌발 상황에 미리 대비하여 교통사고를 예방하기 위해서는 교통사고 정보, 응급상황 정보, 차량 및 도로 상태 정보를 실시간으로 정확하게 다른 차량 및 기지국으로 전달하여야 한다. 본 논문에서는, 기존의 경쟁 기반 싱글 채널 동작 환경에서 충돌로 인한 송 수신 지연 및 통신 실패가 발생 수 있기 때문에 멀티 채널 동작에 적합한 Multi-Channel MAC (MCM) 기술에 대하여 설명한다. 차량 간 통신 및 차량과 기지국 간 통신 시 다양한 서비스를 수용하면서도 끊김없는 안전 서비스 제공을 위한 WAVE 표준 기반의 MAC 기술이 필요하다. 본 논문에서 소개하는 WAVE 표준 기반 MCM은 C 언어 기반 Real Time Operating System에 구현된 MAC 소프트웨어와 FPGA에 VHDL로 구현된 MAC 하드웨어로 구성된다. 구현 된 MCM의 QoS 보장 및 성능 검증은 기존 싱글 채널 동작과 비교하여 수행하였다.

A Comprehensive Information System Validation Model

  • Choi, Kyung-Sub
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.557-561
    • /
    • 2007
  • Along with the significance of information systems in today s global business operation, the significance of information systems control and audit is ever increasing in the effort to secure accuracy and integrity of vital business data. A study is undertaken to integrate Food and Drug Administration computerized systems validation regulations. Securities & Exchange Commission Sarbanes-Oxley Act of 200 and other significant regulations, and lastly, People Capability Maturity Model into one comprehensive information system validation model. The initial benefits to this comprehensive model are convenience, time-saving, and synchronization of the regulations. An organization that is striving for a high level of quality system in its essential operating areas of organization may opt for this model. After the complete development of the model, a field test would be scheduled to test its efficacy and validity.

  • PDF

데이터 웨어하우징을 이용한 공군 EIS 아키텍처 (An Executive Information Systems Architecture for the Air Force Using Data Warehousing)

  • 최준섭;서의호;서창교
    • Asia pacific journal of information systems
    • /
    • 제8권3호
    • /
    • pp.1-20
    • /
    • 1998
  • We propose an Executive Information Systems (EIS) Architecture for chief officers of the Air Force using data warehousing method. This architecture has two main proposes. The one is to provide the information for chief officers to control and command their organizations effectively by analyzing operation data at normal times. The other is to provide chief officers with the information about current situation so that they may make right and rapid decisions at emergency. The architecture introduced here is one that analyzes operational trends as well as current trends in a hierarchical organization environment. System analysis and design techniques for the Air Force EIS such as data flow diagram, system structure, entity-relational diagram, and third normal form of relational database were presented. After prototype screens are demonstrated, benefits of new EIS architecture were also discussed as a conclusion.

  • PDF

Integrated Ship Cybersecurity Management as a Part of Maritime Safety and Security System

  • Melnyk, Oleksiy;Onyshchenko, Svitlana;Pavlova, Nataliia;Kravchenko, Oleksandra;Borovyk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.135-140
    • /
    • 2022
  • Scientific and technological progress is also fundamental to the evolving merchant shipping industry, both in terms of the size and speed of modern ships and in the level of their technical capabilities. While the freight performance of ships is growing, the number of crew on board is steadily decreasing, as more work processes are being automated through the implementation of information technologies, including ship management systems. Although there have been repeated appeals from international maritime organizations to focus on building effective maritime security defenses against cyber attacks, the problems have remained unresolved. Owners of shipping companies do not disclose information about cyberattack attempts or incidents against them due to fear of commercial losses or consequences, such as loss of image, customer and insurance claims, and investigations by independent international organizations and government agencies. Issues of cybersecurity of control systems in the world today have gained importance, due to the fact that existing threats concern not only the security of technical means and devices, but also issues of environmental safety and safety of life at sea. The article examines the implementation of cyber risk management in the shipping industry, providing recommendations for the safe ship operation and its systems in order to improve vulnerability to external threats related to cyberattacks, and to ensure the safety and security of such a technical object as a seagoing ship.

ERP시스템 도입기업과 미도입기업의 회계투명성 관련 재무적 특성 (A Study on the Accounting Transparency Financial Characteristics between ERP Systems Implementation and Non Implementation Companies)

  • 최현돌;이장형
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제14권1호
    • /
    • pp.107-124
    • /
    • 2005
  • ERP systems are comprehensive sorfware packages that seek to integrate the complete range of lbusiness processes and functions in order to present a heuristic perspectives of a firm from a single information and information technlogy architecture. The ERP systems have delicate internal controls with built-in devices. It is known that the delicate internal controls help to enhance the accounting transparency. We empirically investigate the relationship between the ERP systems inplementations and an accounting transparency. In order to measure the accounting transparency differences, we compare the ERP systems implementation firms with firms which did not implement the ERP systems by 6 financial ratios (accruals, net profit margin, operation cash folo to sales, total debt to equity, accounts receivable changes, assets quality). Data are collecte from 135 firms implemented the ERP systems and 135 firms non-implemented the systems (the firms listed in the Korea Stock Exchange). We analyze financial statements from 270 firms for the period 2001-2003 to ezamine the 6 financial ratios differences. The results of 810 firms analyses over the 3-year period indicate that the ERP systems implementation firms show the statistically significant differences in the accrual ratio, the net profit margin ratio, operating cash flow to sales ratio, and total debt to equity ratio from the ERP systems non-implementation firms. But there is statistically no differences between the two groups for accounts receivable changes to sales ratio and assets quality.

  • PDF

모델 기반 중소형 플랜트 형상관리 시스템의 효과성 평가 사례 (A case on the Evaluation of the Effectiveness of Model based Configuration Management System for Small/ Medium-Sized Plant)

  • 하가연;김진일;신중욱;염충섭
    • 시스템엔지니어링학술지
    • /
    • 제17권1호
    • /
    • pp.107-113
    • /
    • 2021
  • Plant Configuration Management(CM) is an activity to maintain consistency of design requirements, physical configuration, facility configuration information throughout the life cycle of the plant by systematically managing changes that occur during the plant design and operation process. Conformity between information must be ensured not only in the design stage, but also in the case of design changes in the operation and maintenance stages, and thus a computer system capable of efficiently managing them is required. In particular, in consideration of an application to small and medium-sized domestic plants, a computer system that can support configuration management at a low cost is needed. Accordingly, in this study, a configuration management system has been developed to support the management of plant design information and change procedures in the operation stage of small and medium-sized plants. Here, a case for quantitatively evaluating the effectiveness of the developed system is described.

정보담당 최고임원 (CIO)의 경영자 역할이 사용자에 미치는 직접적 영향에 관한 연구 (A Study on the Effects of CIOs' Managerial Roles on Users)

  • 이재범;안상협
    • Asia pacific journal of information systems
    • /
    • 제7권3호
    • /
    • pp.125-143
    • /
    • 1997
  • As information is the critical resource of business, CIOs(chief information officers)' managerial roles become more important. CIOs work out the organization and information system strategies, introduce changes into organizations, communicate with chief executive officers and users, and take the responsibilities of the information system operation. The CIOs' managerial roles make affects on the information system performance and the organizational effectiveness. They are divided into six sub-roles; leader, liaison, entrepreneur, monitor, resource allocator and spokesman. The CIOs' influences on organizations are evaluated by information systems performance. User information satisfaction is one of the most valid information system evaluation criterions. User participation and user involvement are regarded as the antecedents of user satisfaction. This study investigates the effect of CIOs' managerial roles on user satisfaction, user participation, user involvement, CIOs' six managerial roles do not equally influence users. The results of this study have implications for the CIOs' managerial roles in organizations. As CIOs effectively perform managerial roles, user satisfaction is improved.

  • PDF

MAP 이중화 시스템의 구현 (Implementation of redundant MAP system)

  • 문홍주;박홍성;김원철;박정우;안상철;우원식;권옥현
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1992년도 하계학술대회 논문집 A
    • /
    • pp.248-251
    • /
    • 1992
  • In this paper, the RedMAP, i.e. a redundant Mini-MAP system for high reliability is proposed. Redundancy is implemented for LLC, MAC, and Physical layer of ISL-Mini -MAP. The detection of error of the network, the broadcasting of the error event, and the network change sequence are three major functions for the dualized Mini-MAP system. The abnormal operation of the network is mainly detected indirectly with the function of the TBC( token bus controller). The time delay to be required for the change of the networks must be minimized. With the RedMAP, we can achieve successful transmission only with short additional recovery time.

  • PDF

SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map

  • El-Semary, Aly M.;Azim, Mohamed Mostafa A.;Diab, Hossam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권7호
    • /
    • pp.3608-3628
    • /
    • 2017
  • Several block cipher modes of operation have been proposed in the literature to protect sensitive information. However, different security analysis models have been presented for attacking them. The analysis indicated that most of the current modes of operation are vulnerable to several attacks such as known plaintext and chosen plaintext/cipher-text attacks. Therefore, this paper proposes a secure block cipher mode of operation to thwart such attacks. In general, the proposed mode combines one-time chain keys with each plaintext before its encryption. The challenge of the proposed mode is the generation of the chain keys. The proposed mode employs the logistic map together with a nonce to dynamically generate a unique set of chain keys for every plaintext. Utilizing the logistic map assures the dynamic behavior while employing the nonce guarantees the uniqueness of the chain keys even if the same message is encrypted again. In this way, the proposed mode called SPCBC can resist the most powerful attacks including the known plaintext and chosen plaintext/cipher-text attacks. In addition, the SPCBC mode improves encryption time performance through supporting parallelized implementation. Finally, the security analysis and experimental results demonstrate that the proposed mode is robust compared to the current modes of operation.