• Title/Summary/Keyword: Management operating system

Search Result 1,913, Processing Time 0.037 seconds

Design and Implementation of MongoDB-based Unstructured Log Processing System over Cloud Computing Environment (클라우드 환경에서 MongoDB 기반의 비정형 로그 처리 시스템 설계 및 구현)

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.71-84
    • /
    • 2013
  • Log data, which record the multitude of information created when operating computer systems, are utilized in many processes, from carrying out computer system inspection and process optimization to providing customized user optimization. In this paper, we propose a MongoDB-based unstructured log processing system in a cloud environment for processing the massive amount of log data of banks. Most of the log data generated during banking operations come from handling a client's business. Therefore, in order to gather, store, categorize, and analyze the log data generated while processing the client's business, a separate log data processing system needs to be established. However, the realization of flexible storage expansion functions for processing a massive amount of unstructured log data and executing a considerable number of functions to categorize and analyze the stored unstructured log data is difficult in existing computer environments. Thus, in this study, we use cloud computing technology to realize a cloud-based log data processing system for processing unstructured log data that are difficult to process using the existing computing infrastructure's analysis tools and management system. The proposed system uses the IaaS (Infrastructure as a Service) cloud environment to provide a flexible expansion of computing resources and includes the ability to flexibly expand resources such as storage space and memory under conditions such as extended storage or rapid increase in log data. Moreover, to overcome the processing limits of the existing analysis tool when a real-time analysis of the aggregated unstructured log data is required, the proposed system includes a Hadoop-based analysis module for quick and reliable parallel-distributed processing of the massive amount of log data. Furthermore, because the HDFS (Hadoop Distributed File System) stores data by generating copies of the block units of the aggregated log data, the proposed system offers automatic restore functions for the system to continually operate after it recovers from a malfunction. Finally, by establishing a distributed database using the NoSQL-based Mongo DB, the proposed system provides methods of effectively processing unstructured log data. Relational databases such as the MySQL databases have complex schemas that are inappropriate for processing unstructured log data. Further, strict schemas like those of relational databases cannot expand nodes in the case wherein the stored data are distributed to various nodes when the amount of data rapidly increases. NoSQL does not provide the complex computations that relational databases may provide but can easily expand the database through node dispersion when the amount of data increases rapidly; it is a non-relational database with an appropriate structure for processing unstructured data. The data models of the NoSQL are usually classified as Key-Value, column-oriented, and document-oriented types. Of these, the representative document-oriented data model, MongoDB, which has a free schema structure, is used in the proposed system. MongoDB is introduced to the proposed system because it makes it easy to process unstructured log data through a flexible schema structure, facilitates flexible node expansion when the amount of data is rapidly increasing, and provides an Auto-Sharding function that automatically expands storage. The proposed system is composed of a log collector module, a log graph generator module, a MongoDB module, a Hadoop-based analysis module, and a MySQL module. When the log data generated over the entire client business process of each bank are sent to the cloud server, the log collector module collects and classifies data according to the type of log data and distributes it to the MongoDB module and the MySQL module. The log graph generator module generates the results of the log analysis of the MongoDB module, Hadoop-based analysis module, and the MySQL module per analysis time and type of the aggregated log data, and provides them to the user through a web interface. Log data that require a real-time log data analysis are stored in the MySQL module and provided real-time by the log graph generator module. The aggregated log data per unit time are stored in the MongoDB module and plotted in a graph according to the user's various analysis conditions. The aggregated log data in the MongoDB module are parallel-distributed and processed by the Hadoop-based analysis module. A comparative evaluation is carried out against a log data processing system that uses only MySQL for inserting log data and estimating query performance; this evaluation proves the proposed system's superiority. Moreover, an optimal chunk size is confirmed through the log data insert performance evaluation of MongoDB for various chunk sizes.

A Study of Content Analysis on ICU(Intensive Care Unit) Nurses' Knowledge of Basic Nursing Sciences (중환자실 간호사의 기초간호과학 지식의 필요성 분석)

  • Byeon, Young-Soon;Choe, Myoung-Ae;Kim, Hee-Seung;Park, Mi-Jung;Seo, Wha-Sook;Lee, Kyung-Sook;Choi, S-Mi;Hong, Hae-Sook
    • Journal of Korean Biological Nursing Science
    • /
    • v.4 no.1
    • /
    • pp.41-49
    • /
    • 2002
  • The purpose of this study was to identify the knowledge contents of basic nursing sciences needed by nurses in the practices of the intensive care unit(ICU). To attain the goal of this study, the nurses working at 10 hospitals in the areas of Seoul and Kangwon Province were randomly selected. They were primarily interviewed, and the open question was secondarily put to them through the questionnaire. In the process of the 1st interview, the interviewees were asked of the question, "What is the knowledge of basic sciences such as anatomy, pathology, physiology. microbiology, pharmacology and the like thought to be lacking when you communicate with doctors in the ICU and when you carry out your nursing practices in it?" The contents of the interview were tape-recorded. The period of data collection ranged from May 1, 2001 to Sept 30. The interviews were conducted with total of 20 nurses. The open-end questionnaire was secondarily mailed to nurses. 113 questionnaires were returned. 100 questionnaires except 13 ones thought to be poorly completed in content were used for data analysis. Three coders classified data obtained from the interview and the questionnaire research into 5 detailed items relating to such as anatomical physiology, pathology, pharmacology. microbiology and basics of nursing. The three coders had experiences in nursing education of 18 years, 8 years and 6 years, respectively, and of them one coder was professor in basic nursing sciences. Data were statistically treated using frequency analysis and percentage by the SAS program. As a result, the following findings were obtained : It was found that the contents that ICU nurses responded were most needed in the field of Human structure and function were water and electrolytic balance(38%), blood and circulatory system(20%), changer in the patient's skin(12%), the arrangement of the human body(10%) and the endocrine system(10%), nervous system(6%), and assessment of the state of the patient's consciousness(4%). It was found that the contents that ICU nurses responded were most needed in the field of pathology were found to be the process of the progress of the disease(32%), symptoms of the disease(27%), prognosis of the disease(22%), followed by the injury-healing process, clinical pathological examination, and examination by radiation. It was found that the contents that nurses responded were most needed in the field of pharmacology were the effect of drug(25%), the side effect of drug(22%), the relationship between diseases and drug(20%), the relationship between disease-causing bacteria and drug(20%) and chemotherapy(2%). It was found that the contents that ICU nurses responded were most needed in the field of microbiology were the relationship between diseases and disease-causing bacteria(45%), Kinds and characteristics of disease-causing bacteria(18%), infection control(16%), application of the aseptic technique(12%), isolation(9%) and the like. It was found that the basic knowledge that ICU nurses responded were needed were the identification of the patient's current state(36%), understanding of the therapeutic process(22%), the operating principle of medical equipment and instrument(20%), medical terminology(9%), equipment and instrument management(7%), calculation of the dose of injection(2%) and the like.

  • PDF

A Study on the Moderating Effect of Perceived Voluntariness in the Organizational Information System Usage and Performance (정보시스템 사용과 성과에 있어서 자발성의 조절효과에 관한 연구)

  • Lee, Seung-Chang;Lee, Ho-Geun;Jung, Chang-Wook;Chung, Nam-Ho;Suh, Eung-Kyo
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.195-221
    • /
    • 2009
  • According to an industry report, a large number of organizations have invested in Organizational Information System(OIS) in the past few years. Several research results indicate that successful investments in OIS lead to productivity enhancement, while failed ones result in undesirable consequences such as financial losses and dissatisfaction among employees. In spite of huge investments, however, many organizations have failed in achieving the hoped-for returns from OIS. Thus, understanding user acceptance, adoption, and usage of new IS(Information Systems) is an important issue for IS practitioners. Indeed, study of the user acceptance of new information system has been one of the most important research topics in the contemporary IS literature. Several theoretical models are tested to examine 'user acceptance' and 'usage behavior' in IS context. While many research models incorporate 'ease of use' or 'usefulness' as important factors in explaining user acceptance, Technology Acceptance Model(TAM) has been one of the most widely applied models in user acceptance and usage behavior. Even in recent IS studies that employ theories of innovation diffusion in the area of IS implementation, a major focus has been on the user's perception of information technologies. In this research, we study 'voluntariness' as an important factor in IS acceptance by users. Voluntariness is defined as "the degree to which the use of the innovation is perceived as being voluntary, or of free will" When examining the diffusion of accepting OIS, a thoughtful consideration should be given to 'perceived voluntariness.' Current article has following research questions: 1) What models are appropriate to explain the success of OIS? and 2) How does the 'voluntariness' affect the success of OIS? In order to answer these questions, a research model is proposed to describe the detailed nature of association among three independent variables (IT usage level, task interdependency, and organizational support), a mediating variable (IS usage), a dependent variable (perceived performance), and a moderating variable(perceived voluntariness). The central claim of this article is that organizations hardly realize expected returns from OIS investments unless perceived voluntariness is effectively managed after operating OIS. As an example of OIS in this study we have selected the Intranet of Republic of Korea Air Force (ROKAF). ROKAF has implemented the Intranet in an attempt to improve communication and coordination within the organization. To test our research model and hypotheses, survey questionnaires were first sent out to 400 Intranet users. With the assistance of ROKAF, Intranet users were initially identified among its members, and subjects were randomly drawn from the pool. 377 survey responses were finally returned. The unit of measurement and analysis in this research is a personal level. Path analysis based on structural equation modeling was used to test research hypotheses. Construct validity represents accordance between the theoretical base concept of constructs and its measurement items. Tests for the reliability and discriminant validity are accepted, thus verifying our survey instrument. In this research, we have proposed a conceptual framework to highlight the importance of perceived voluntariness after organization deploys OIS. The results of our analysis present several key finding. First, all three independent variables (IT usage level, task interdependency, and organizational support) have significant effects on IS usage, which will eventually improve performance. Thus, IS usage plays a mediating role between antecedent variables (IT usage level. task interdependency, and organizational support) and performance improvement. Second, the effect of the task dependency was the highest for IS usage among the three antecedent variables. This is highly plausible since one of the Intranet's major capabilities is to facilitate communication among members within an organization. Accordingly, we conclude that the higher the task dependency, the higher Intranet usage. The effect of user's IT usage level was the second, while the effect of the organizational support was the third. Finally, the perceived voluntariness plays a pivotal role in enhancing perceived performance in personal level after launching the Intranet. Relationships among investigated variables were significantly different between groups with a high level and a low level of voluntariness. The impact of the Intranet usage on the performance was greater in the higher level voluntariness group than in the lower one. For the lower level voluntariness group, the user's IT usage had the highest effect on the Intranet usage among the three antecedent variables. In short, our study suggests that the higher the perceived voluntariness is the more IS usage will be. Perceived voluntariness was found to have a moderating effect on the relationships among user IT usage level, task interdependency, IS usage, and perceived performance, supporting all the hypotheses on the moderating effect. Most of all, user IT usage level has the strongest influence on IS usage, indicating that users with superior IT usage are more likely to enjoy a high level of perceived performance.

Risk Ranking Analysis for the City-Gas Pipelines in the Underground Laying Facilities (지하매설물 중 도시가스 지하배관에 대한 위험성 서열화 분석)

  • Ko, Jae-Sun;Kim, Hyo
    • Fire Science and Engineering
    • /
    • v.18 no.1
    • /
    • pp.54-66
    • /
    • 2004
  • In this article, we are to suggest the hazard-assessing method for the underground pipelines, and find out the pipeline-maintenance schemes of high efficiency in cost. Three kinds of methods are applied in order to refer to the approaching methods of listing the hazards for the underground pipelines: the first is RBI(Risk Based Inspection), which firstly assess the effect of the neighboring population, the dimension, thickness of pipe, and working time. It enables us to estimate quantitatively the risk exposure. The second is the scoring system which is based on the environmental factors of the buried pipelines. Last we quantify the frequency of the releases using the present THOMAS' theory. In this work, as a result of assessing the hazard of it using SPC scheme, the hazard score related to how the gas pipelines erodes indicate the numbers from 30 to 70, which means that the assessing criteria define well the relative hazards of actual pipelines. Therefore. even if one pipeline region is relatively low score, it can have the high frequency of leakage due to its longer length. The acceptable limit of the release frequency of pipeline shows 2.50E-2 to 1.00E-l/yr, from which we must take the appropriate actions to have the consequence to be less than the acceptable region. The prediction of total frequency using regression analysis shows the limit operating time of pipeline is the range of 11 to 13 years, which is well consistent with that of the actual pipeline. Concludingly, the hazard-listing scheme suggested in this research will be very effectively applied to maintaining the underground pipelines.

Characteristics of Park Program Operation of Seoul Metropolitan Government (서울시의 공원 프로그램 운영 특성)

  • Cho, Yun Joo;Chae, Young;Wee, Man-Gyu;Jung, Sang Hak;Song, Hyeong Nam;Kim, Yun-Geum
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.48 no.2
    • /
    • pp.10-19
    • /
    • 2020
  • The park program can adeptly cope with the diversification of leisure needs in accordance with the changing times. The program also makes the relationship between the users and the park itself closer. For this reason, the Seoul Metropolitan Government has operated a variety of programs, beginning with the Botanical Class Program at the Namsan Outdoor Botanical Garden in 1997. The government additionally began to organize park programs by establishing the Park and Leisure Department and three Park Greenery Offices. However, research on park programs is mainly focused on park users. Therefore, this study intends to reveal the structure of the programs by studying the program operation. The specific purposes of this study are '1. Review the institutional characteristics that underlie the operation of the Park Program in Seoul by examining the relevant laws, the operation organizations, and the personnel composition, 2. Analyze the operation methods, such as procurement and the execution of the program, operation costs, and public-private cooperation methods, etc. 3. Analyze the composition and contents of the program from 2015 to 2017, and process and identify the relationship between the structure of the program operation and the program itself.' Summarizing the results obtained from the study, as far as the structure of the first program operation, the support laws were not systematic, but the operating organization was working to establish a system. The second characteristic of the operation is that most of the budget was funded by local governments, but the level of citizen involvement was low. Third, when we looked at the characteristics of the program, the number of programs increased, but they were focused on a specific theme and few programs actively used the park facilities. Based on the results, three tasks can be proposed. The first is that the 'Act on Parks and Green Spaces' should include the concepts and support for park programs. Second, there is a need to change from the ideas of the quantitative increase of programs to qualitative improvements. Lastly, it is necessary to reorganize the Green Seoul Bureau of the Seoul Metropolitan Government into a citizen-led and leisure-oriented organization to promote the park leisure culture. This study has significance, as it was conducted with a service provider, not a program user, unlike many previous park program-related studies. The results of this study will be able to contribute not only to the Seoul Metropolitan Government, but also to other local governments to suggest the direction of the management and the operation of the park for the consumer, and consequently, it will help prepare the long-term vision of parks as the closest leisure location for most citizens.

Monitoring soybean growth using L, C, and X-bands automatic radar scatterometer measurement system (L, C, X-밴드 레이더 산란계 자동측정시스템을 이용한 콩 생육 모니터링)

  • Kim, Yi-Hyun;Hong, Suk-Young;Lee, Hoon-Yol;Lee, Jae-Eun
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.2
    • /
    • pp.191-201
    • /
    • 2011
  • Soybean has widely grown for its edible bean which has numerous uses. Microwave remote sensing has a great potential over the conventional remote sensing with the visible and infrared spectra due to its all-weather day-and-night imaging capabilities. In this investigation, a ground-based polarimetric scatterometer operating at multiple frequencies was used to continuously monitor the crop conditions of a soybean field. Polarimetric backscatter data at L, C, and X-bands were acquired every 10 minutes on the microwave observations at various soybean stages. The polarimetric scatterometer consists of a vector network analyzer, a microwave switch, radio frequency cables, power unit and a personal computer. The polarimetric scatterometer components were installed inside an air-conditioned shelter to maintain constant temperature and humidity during the data acquisition period. The backscattering coefficients were calculated from the measured data at incidence angle $40^{\circ}$ and full polarization (HH, VV, HV, VH) by applying the radar equation. The soybean growth data such as leaf area index (LAI), plant height, fresh and dry weight, vegetation water content and pod weight were measured periodically throughout the growth season. We measured the temporal variations of backscattering coefficients of the soybean crop at L, C, and X-bands during a soybean growth period. In the three bands, VV-polarized backscattering coefficients were higher than HH-polarized backscattering coefficients until mid-June, and thereafter HH-polarized backscattering coefficients were higher than VV-, HV-polarized back scattering coefficients. However, the cross-over stage (HH > VV) was different for each frequency: DOY 200 for L-band and DOY 210 for both C and X-bands. The temporal trend of the backscattering coefficients for all bands agreed with the soybean growth data such as LAI, dry weight and plant height; i.e., increased until about DOY 271 and decreased afterward. We plotted the relationship between the backscattering coefficients with three bands and soybean growth parameters. The growth parameters were highly correlated with HH-polarization at L-band (over r=0.92).

A Study on the Improvement of Capital Gains Tax Act through the Analysis of the Precedents of the cases of the lawsuit - Focusing on the transfer of inherited and donated property - (행정소송판례 검토를 통한 양도소득세법 개선방안 - 상속·증여받은 자산의 양도를 중심으로 -)

  • Yu, Soon-Mi;Kim, Hye-Ri
    • Management & Information Systems Review
    • /
    • v.38 no.4
    • /
    • pp.61-78
    • /
    • 2019
  • When calculating gains from transfers of assets inherited or donated, the value recognized at the market price as of the date of inheritance or acquisition is recognized as the actual transaction value at the time of acquisition. However, Precedents for the appeal for review by the NTS, the request for adjudgment by the Tax Tribunal(TT) and the request of examination by the Board of Audit and Inspection of Korea(BAI) and the cases of the lawsuit have not shown a consistent results on how much such a the actual transaction value will be measured. This study investigates the operating state of the current tax appeal system using the statistical data of the TT, NTS, and BAI and cases of the lawsuit from 2008 to 2017, and suggests the Improvement of Capital Gains Tax Act on the transfer of inherited and donated property. As a result, total number of requested cases has diminished because cases of the pre-assessment review and the reconsideration appeal by the NTS have decreased steadily over the past decade, while the cases of the lawsuit and the administrative trials(the request for adjudgment by the TT, the appeal for review by the NTS, and the request of examination by the BAI) have been steadily increasing. Also This study found that more than 40% of the complainants proceeded with the cases of the lawsuit proceedings in disagreement with the disposition of tax dissatisfaction under the administrative trials. In addition, Even though the retrospective appraisal price is not recognized as the market price due to the strict interpretation of the tax regulations, it can be seen that it is interpreted as a more expanded concept in the application of the market price than the government office or the tax judge. Therefore, according to the precedents of the cases lawsuit, it is necessary to establish a regulation on the recognition of retroactive appraisal value.

Requirement Analysis for Agricultural Meteorology Information Service Systems based on the Fourth Industrial Revolution Technologies (4차 산업혁명 기술에 기반한 농업 기상 정보 시스템의 요구도 분석)

  • Kim, Kwang Soo;Yoo, Byoung Hyun;Hyun, Shinwoo;Kang, DaeGyoon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.175-186
    • /
    • 2019
  • Efforts have been made to introduce the climate smart agriculture (CSA) for adaptation to future climate conditions, which would require collection and management of site specific meteorological data. The objectives of this study were to identify requirements for construction of agricultural meteorology information service system (AMISS) using technologies that lead to the fourth industrial revolution, e.g., internet of things (IoT), artificial intelligence, and cloud computing. The IoT sensors that require low cost and low operating current would be useful to organize wireless sensor network (WSN) for collection and analysis of weather measurement data, which would help assessment of productivity for an agricultural ecosystem. It would be recommended to extend the spatial extent of the WSN to a rural community, which would benefit a greater number of farms. It is preferred to create the big data for agricultural meteorology in order to produce and evaluate the site specific data in rural areas. The digital climate map can be improved using artificial intelligence such as deep neural networks. Furthermore, cloud computing and fog computing would help reduce costs and enhance the user experience of the AMISS. In addition, it would be advantageous to combine environmental data and farm management data, e.g., price data for the produce of interest. It would also be needed to develop a mobile application whose user interface could meet the needs of stakeholders. These fourth industrial revolution technologies would facilitate the development of the AMISS and wide application of the CSA.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Development of Computer Program for the Arrangement of the Forest-road Network to Maximize the Investment Effect on the Forest-road Construction (임도개설(林道開設)에 있어서 투자효과(投資效果)를 최대(最大)로 하는 임도배치(林道配置)프로그램 개발(開發))

  • Park, Sang-Jun;Son, Doo-Sik
    • Journal of Korean Society of Forest Science
    • /
    • v.90 no.4
    • /
    • pp.420-430
    • /
    • 2001
  • The object of this study is to develop a computer program for the arrangement of the forest-road network maximizing the investment effect in forest-road construction with factors such as terrains, forest physiognomy, management plan, logging system, cost of forest-road construction, capacity of inputted labour, capacity of timber production and so on. The operating system developed by this study is Korean Windows 95/98 and Microsoft Visual Basic ver. 5.0. User interface was designed as systematic structure, it is presented as a kind of GUI(graphic user interface). The developed program has result of the most suitable forest-road arrangement, has suitable forest-road density calculated with cost of logging, cost of forest-road construction, diversion ratio of forest-road, cost of walking in forest. And the most suitable forest-road arrangement was designed for forest-road arrangement network which maximized investment effect through minimizing the sum of cost of logging and cost of forest-road construction. Input data were divided into map data and control data. Digital terrain model, division of forest-road layout plan, division of forest function and the existing road network are obtained from map data. on the other hand, cost of logging related terrain division, diversion ratio of forest-road and working road, cost of forest-road construction, cost of walking, cost of labor, walking speed, capacity of inputted labor, capacity of timber production and total distance of forest-road are inputted from control data. And map data was designed to be inputted by mesh method for common matrix. This program can be used to construct a new forest-road or vice forest-road which compensate already existing forest-road for the functional forestry.

  • PDF