• Title/Summary/Keyword: Resources Management System

Search Result 3,366, Processing Time 0.029 seconds

Drought Triggers and Monitoring System (가뭄 경보기준과 모니터링 시스템)

  • Lee, Dong-Ryul;Lee, Dea-Hee;Kang, Shin-Uk
    • Journal of Korea Water Resources Association
    • /
    • v.36 no.3 s.134
    • /
    • pp.375-384
    • /
    • 2003
  • Severe drought tends to occur in almost event five years in Korea. Drought responses have been well operated in close collaboration with the central, local government and the water management authorities on the institutional framework. However, the responses are usually post-activities to a drought event. The responses often face difficulties in operating and managing process due to an absence of a drought monitoring system and drought triggers. The objective of this study is to set up drought triggers through a time-spatial interpretation of drought index and the government responses during historical drought events. Drought triggers are divided into four categories: advisory, watch, warning and emergency stage. The range and drought-impacted area of an each stage in triggers have been addressed using drought index. Furthermore, a web-based drought monitoring system is illustrated.

A Study on the Construction of the Framework Spatial DB for Developing Watershed Management System Based on River Network (하천 네트워크 기반의 유역관리시스템 개발을 위한 프레임워크 공간 DB 구축에 관한 연구)

  • Kim, Kyung-Tak;Choi, Yun-Seok;Kim, Joo-Hun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.2
    • /
    • pp.87-96
    • /
    • 2004
  • When watershed spatial database is constructed from DEM, hydrological geographic characteristics of watershed can be easily extracted. And the characteristics can be assigned and managed as the attribute of spatial database. In this study the scheme of constructing framework spatial database which is basic information for managing watershed information is examined. We established framework spatial data and defined the relationship of the data. And framework spatial database of test site was constructed. In this study, HyGIS(Hydrological Geographic Information System) which is developed by domestic technology for making hydrological spatial data and developing water resources system is used. Hydrological geographic characteristics and spatial data is extracted by HyGIS. And the data from HyGIS is used for constructing framework spatial database of test site. Finally, this study suggests the strategy of constructing framework spatial database for developing watershed management system based on river network.

  • PDF

A Study on Management of Marine Geographic Information System (해양지리정보체계의 관리방안 연구)

  • KIM, Jong-Kyu;KIM, Jong-Hwa
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.14 no.2
    • /
    • pp.161-176
    • /
    • 2002
  • GIS (geographic information system) is a relatively new tool in the coastal and ocean area management toolbox, but its uses and functionality are quickly being recognized. GIS can help identity potential threats to coastal and ocean resources and evaluate alternative land-use and management practices. The application of GIS to coastal and ocean issues continues to grow as the general use of GIS matures. GIS software and technicians with the skills to apply GIS are now commonplace at federal, state and local government agencies as well as many NGOs and the private sector. However, these applications were focused on their special purposes. Therefore, we describe the management strategy of marine GIS and its components. The results of this study can be used as the fundamental guideline for the coastal and ocean management and sustainable development.

CW-MAN : The Cooperative-Work Management System with Hybrid Architecture for Efficient Multimedia Collaboration (CW-MAN : 효율적인 멀티미디어 공동저작을 위한 혼합형 구조의 공동저작 관리 시스템)

  • Lee, Gwang-Haeng;Jeon, Jae-U;O, Sam-Gwon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1253-1262
    • /
    • 1999
  • For the efficient co-authoring of multimedia documents in a distributed systems environment, the cooperative-work management systems that can not only allow the sharing of distributed resources but also facilitate the authors' interaction, are needed. In this paper, we present a cooperative-work management system with hybrid architecture, called CW-MAN, in which the information on shared objects and co-authoring management is stored in a dedicated computer system but the shared objects distributed all over the local computer systems. The main management functions provided by the CW-MAN are those for shared objects, session, and telepointing. The shared-object use them exclusively. The session managements allows authors to dynamically create, update, and destroy sessions. Lastly, the telepointing management allows local pointing events to be synchronously presented to remote systems.

  • PDF

Development of efficient smart library resource management system based on IoT (IoT 기반의 효율적인 스마트도서관 자원 관리 시스템 개발)

  • Lee, Joohwa;Lee, Myungsuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.1-9
    • /
    • 2019
  • In this study, we constructed a system to operating and manage the resources of the Smart Library Reading Room automatically using the Internet of things. The persistent problem of smart library or unattended library is electric energy waste and efficient seat management. The electricity and seat layout management method of the existing library reading room is being treated as concentrated management in the central system. However, this approach results in wasting electricity and seats do not provide a fair opportunity for each user. In this study, IoT sensor was used to turn off electricity and empty seat for about 20 minutes, so that it could be marked as vacant and managed efficiently, so that opportunities for seats were evenly maintained. In the future, we will improve this and construct a model in the reading room of actual village library or school library, and analyze and reflect the result.

Development Measures for Korea's National Aviation Safety Management - Focused on Organizing and Handling Resources for Aviation Safety - (국가 항공안전관리체계 발전방안 - 항공안전 관련 자원의 조직·관리 중점 -)

  • Lee, Jang Ryong;Kim, Dae Ho
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.26 no.2
    • /
    • pp.132-138
    • /
    • 2018
  • Aviation safety requires systematic national attention and management because aircraft accident produce greater undesired social impact, economical damage, and declining national credibility compare to other transportation accident. Specially, Republic of Korea has highly increased risk of air accident as a major air transportation point having small aerospace, connecting pacific ocean and Asia, and explosively increased air traffic produced by economical growth, operating numerous military aircraft for the South and North Koreas' confrontational situation. Also, greatly increased domestic and oversea air travels by Koreans and foreigners as well as air freight based on heightened Korea's national power, launching new low cost carriers, and popularized leasure aviation have produced large amount of aviation needs in various fields. However, national aviation safety management system gratifying increased aviation needs and aircraft operations is seem to be slow in progress. This paper will show optimized measures utilizing private, governmental, and military resources to prevent aircraft accident under circumstances of limited budget and an favorable conditions, then will propose several action items.

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

User Demand-based Grid Trade Management Model (사용자 요구기반의 그리드 거래 관리 모델)

  • Ma, Yong-Beom;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.11-21
    • /
    • 2006
  • Importance of and need for grid resource management have accelerated in accordance with increasing development of grid computing. However, it is very complex to distribute and utilize resources efficiently in geographically dispersed environments. This is due to the different access policies and constraints of grid resource owners. Users request resources according to their needs. Operators of a grid computing system need to be able to monitor the system states for reflecting these demands. So, a grid computing system needs a resource management policy that monitors states of resources and then allocates resources. This paper proposes a user demand-based grid trade management model that provides an efficient resource management by the trade allocation based on a users' demand and providers' supply strategy. To evaluate performance, this paper measures increasing rate of resource trades, average response time of trades, and processing time utilization. Firstly, the average increasing rates of trade are 585.7% and 322.6% higher than an auction model and a double auction model. Secondly, the average response time of the user demand-based grid trade management model is maintained between 3 and 5 simulation time. Finally, it is found that the processing time utilization is an average of 145.4% and 118.0% higher than an auction model and a double auction model. These empirical results demonstrate the usefulness of the user demand-based grid trade management model.

  • PDF