• Title/Summary/Keyword: S&T infrastructure

Search Result 234, Processing Time 0.026 seconds

Phosphate Adsorption Characteristics of a Filter Medium, Adphos, and Its Efficiency by the Filtration Experiment Combined with the Vegetation Mat (Adphos 여재의 인 흡착특성과 식생 매트와 결합한 여과실험에 의한 효율)

  • Kim, Ji Ah;Joo, Gwang Jin;Choi, I Song;Chang, Kwang Hyeon;Oh, Jong Min
    • Ecology and Resilient Infrastructure
    • /
    • v.3 no.4
    • /
    • pp.231-237
    • /
    • 2016
  • The purpose of this study is to analyze phosphate adsorption characteristic of the filter media applied in water purification technology. And it is also to observe the removal efficiency of the technology that was developed by combining the purification abilities of filter media and the vegetation mat. The filter media, Adphos, is the subject of this study. The result of adsorption test shows that $PO_4{^{3-}-P}$ adsorption characteristics of Adphos is determined by the Langmuir isotherm model fitting and the $q_m$ (maximum adsorption amount) value is calculated as 1.162 mg/g. To verify the removal efficiency of the purification technology, a lab-scale reactor, including a 400 mm depth of filter bed filled by Adphos, was manufactured. Yellow flag Iris (Iris pseudacours L.) was planted on the vegetation bed and the coir-roll was used to fix the root of vegetation. The reactor ran 8 hours per day over 71 days, and the results of filtration experiment show that average removal efficiency of SS, T-N and T-P were calculated as 94%, 41% and 64% respectively. With these results, it was proved that the purification technology is highly effective. And for the long-time use, a maintenance guide is also required.

A Study on IT Service Management Based on ITIL with Consideration of IT Governance Structures : Focused on A Case Study of Manufacturing Company (IT 거버넌스 체계를 고려한 ITIL 기반의 IT 서비스 관리에 관한 연구 : 제조업 사례 중심으로)

  • Oh, Hwa-Seog;Cho, Chi-Woon
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.1
    • /
    • pp.149-159
    • /
    • 2010
  • Unknowingly, the relationship between IT departments and their internal customers becomes that of client-supplier based on the mechanisms of marketing and competition. In addition, due to enhanced focus on the customer in the planning, development, and delivery of information service, IT service management(ITSM) has become increasingly important. These days IT management is focusing particularly on the 'de-facto' standard ITIL (IT Infrastructure Library) for implementing ITSM. It is linked as a part of CobiT’s 'deliver and support' domain, which is a framework of IT governance, and ISO/IEC 20000 is a unique international certification standards on the ITSM. This paper proposes the strategy and procedure for ITSM implementation based on ITIL with consideration of IT governance structure for manufacturing industries. It also presents a case study to share the lessons learned and results of an ITSM project.

Power and Heat Load of IT Equipment Projections for New Data Center's HVAC System Design (데이터센터의 공조시스템 계획을 위한 IT장비의 전력 및 발열량 예측에 대한 연구)

  • Cho, Jin-Kyun;Shin, Seung-Ho
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.24 no.3
    • /
    • pp.212-217
    • /
    • 2012
  • The cooling of data centers has emerged as a significant challenge as the density of IT equipment increased. With the rapid increasing of heat load and cooling system, predictions for electronics power trends have been closely watched. A data center power density projection is needed so that IT organizations can develop data centers with adequate cooling for reasonable lifetimes. This paper will discuss the need for something more than processor and equipment power trend projections which have overestimated the required infrastructure for customers. This projection will use data from a survey of actual enterprise data centers and the ASHRAE projections to formulate a data center server heat load trend projection.

Fuzzy Based Multi-Hop Broadcasting in High-Mobility VANETs

  • Basha, S. Karimulla;Shankar, T.N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.165-171
    • /
    • 2021
  • Vehicular Ad hoc Network (VANET) is an extension paradigm of moving vehicles to communicate with wireless transmission devices within a certain geographical limit without any fixed infrastructure. The vehicles have most important participation in this model is usually positioned quite dimly within the certain radio range. Fuzzy based multi-hop broadcast protocol is better than conventional message dissemination techniques in high-mobility VANETs, is proposed in this research work. Generally, in a transmission range the existing number of nodes is obstacle for rebroadcasting that can be improved by reducing number of intermediate forwarding points. The proposed protocol stresses on transmission of emergency message projection by utilization subset of surrounding nodes with consideration of three metrics: inter-vehicle distance, node density and signal strength. The proposed protocol is fuzzy MHB. The method assessment is accomplished in OMNeT++, SUMO and MATLAB environment to prove the efficiency of it.

Technical Trends of AMI and HEMS for Smart Grid Implementation (스마트그리드를 위한 AMI 및 HEMS 관련 요소 기술 현황)

  • Kim, H.Y.;Jeong, J.S.;Cha, W.S.;Shin, G.S.;Kim, S.T.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.2
    • /
    • pp.11-19
    • /
    • 2013
  • 탄소 배출을 완화하려는 국제적인 노력 중의 일환으로, 전력 시스템에 ICT 기술을 접목시켜 전력 공급자와 소비자 간에 양방향으로 실시간 정보를 교환함으로써 에너지 효율성을 제고시키기 위한 스마트그리드가 최근 각광받고 있다. 그 중에서도 AMI(Advanced Metering Infrastructure) 및 HEMS(Home Energy Management System) 구축은 국내에서도 가장 먼저 수행되고 있는 스마트그리드 관련 사업 중의 하나이다. 이 사업을 위해 필요한 기술로는 관련 서비스 제공을 위한 스마트 에너지 프로파일 2.0, 다수의 장치 간 네트워크 구성을 위한 ZigBee IP, 마지막으로 장치들에 내장되어 제어를 담당하는 임베디드 운영체제 등이 있다. 본고에서는 이러한 세 가지 요소 기술의 현황에 대해 하나씩 살펴보도록 한다.

  • PDF

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

A Study on Customer's Satisfaction and Economic Valuation Model of Information Analysis Report (정보분석 보고서의 이용자 만족도 및 경제적 가치평가 측정에 관한 연구)

  • Jeong, Yion-Il;Moon, Yeong-Ho;Bae, Sang-Jin;Kim, Yoon-Jong
    • Journal of Information Management
    • /
    • v.36 no.3
    • /
    • pp.167-182
    • /
    • 2005
  • This study is to provide the customer's satisfaction and the economic evaluation model for the KISTI S&T Informaion Analysis Report with the results of the survey. Recently the important issue for the informaion analysis service is make policies that reflect the proper demand and satisfaction of customers. In this paper, we explain how the evaluate of information analysis service in the customer's satisfaction and the economic valuation model can be estimated using survey. In such a setting, the customer's satisfaction and the economic evaluation model are important methods for the reflection of monitored information in national scientific and technological policies.

Research Regard to Necessity of Smart Water Management Based on IoT Technology (IoT 기술을 활용한 스마트 물관리 필요성에 관한 연구)

  • Choi, Young Hwan;Kim, Yeong Real
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.11-18
    • /
    • 2017
  • The Objective of this Study is to Prove the Effectiveness of a Smart Water Management(SWM) Technology. The SWM Technology can Reduce the Production Cost using Internet of Thing(IoT) Technology that Utilizes Remote Metering of Consumer's Water usage and Reduce the Leakage of Supply Facilities. The SWM Demonstration Model Installed a Remote Water Leakage Sensor, Smart Metering and Micro Multi Sensor in Water Supply Facility, and Provided Real-Time Monitoring of the Operation Status. Consumers can be Provided the usage of Tap Water and the Water Puality through a Smart Phone Application. At this Time, we Surveyed Whether Consumers save the Tap Water or Drinking Directly using the Tap Water usage Information. Also, this Study is to Verify the Degree of Improvement of Water Supply Rates and Drinking Water Rate, and to Decrease Consumer's Complaints, Operating Costs, and Water Consumption by the SWM Technology. It is also Established a SWM Model Combined with the IoT Sensor at Supply Facilities, operator monitoring system and explored recovery solution detected events. It means the upbringing of the domestic water industry by developing the related technologies and spreading the SWM to advanced levels.

Inelastic analysis for the post-collapse behavior of concrete encased steel composite columns under axial compression

  • Ky, V.S.;Tangaramvong, S.;Thepchatri, T.
    • Steel and Composite Structures
    • /
    • v.19 no.5
    • /
    • pp.1237-1258
    • /
    • 2015
  • This paper proposes a simple inelastic analysis approach to efficiently map out the complete nonlinear post-collapse (strain-softening) response and the maximum load capacity of axially loaded concrete encased steel composite columns (stub and slender). The scheme simultaneously incorporates the influences of difficult instabilizing phenomena such as concrete confinement, initial geometric imperfection, geometric nonlinearity, buckling of reinforcement bars and local buckling of structural steel, on the overall behavior of the composite columns. The proposed numerical method adopts fiber element discretization and an iterative M${\ddot{u}}$ller's algorithm with an additional adaptive technique that robustly yields solution convergence. The accuracy of the proposed analysis scheme is validated through comparisons with various available experimental benchmarks. Finally, a parametric study of various key parameters on the overall behaviors of the composite columns is conducted.

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF