• 제목/요약/키워드: recovery cost

검색결과 608건 처리시간 0.025초

농업용수의 수익자 부담원칙 고찰 (Study on the Principle of Cost Recovery for Agricultural Water)

  • 이성희;김태철
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2010년도 학술발표회
    • /
    • pp.430-434
    • /
    • 2010
  • OECD등 국제기구와 현재 국회에 계류 중인 물 관리기본법 제정(안)등에서 물 이용자에 대한 수익자 부담 원칙을 요구하고 있어, 농업용수의 대부분을 관리하고 있는 한국농어촌공사 관리지역의 농업용수 이용료(구 조합비) 면제에 대한 문제점이 제기되고 일부 전문가들 사이에서도 농업용수 이용료 부과의 필요성이 지속적으로 제기되고 있는 실정이다. 이러한 시점에서 과거 농업용수 이용료(구 조합비) 부과 및 면제의 역사를 살펴보고, 농업용수 및 농업 농촌의 특성을 고려한 농업용수 이용에 따른 수익자 부담원칙에 대하여 검토하였다. 농업용수 이용료는 1908년 수리조합이 시작된 이후 1999년까지 조합비 형태로 부과하다가 2000년 농업용 수관련 3개 기관이 공사로 통합하면서 면제가 되었고, 지난 10년 동안 외부(OECD 등)의 요구뿐만 아니라 내부적으로도 농업용수관리 비용증가로 인한 이용료 부과가 필요하다는 주장이 제기되었다. 한편 이용료 부과시 농업인 경제적 부담증가, 농업용수관리 정책의 혼선, 농업인 반발로 인한 사회문제화, 이용료 징수의 실효성 및 실익성에 대한 문제가 발생될 수 있다. 따라서 농업용수이용에 대하여 단순히 수익자 부담원칙 준수를 요구만 할 것이 아니라 면제에 대한 역사적, 사회경제적인 배경과 농업 농촌의 특성을 이해하고 국내외적으로 대두되는 수익자 부담원칙에 대하여 어떻게 합리적인 방법과 사회적인 합의를 이끌어 낼 것인가 장기적인 연구와 검토가 필요하다. 또한 비용부담측면만이 아니라 농업인의 물 관리 참여(PIM, Participatory Irrigation Management)등을 통한 수익자부담 원칙 달성 및 비용절감을 유도할 수 있는 제 3의 방안을 찾아야 한다.

  • PDF

리눅스 운영체제에서 커널 스택의 복구를 통한 커널 하드닝 (Kernel Hardening by Recovering Kernel Stack Frame in Linux Operating System)

  • 장승주
    • 정보처리학회논문지A
    • /
    • 제13A권3호
    • /
    • pp.199-204
    • /
    • 2006
  • 리눅스 운영체제에서 커널 개발자의 오류로 인하여 발생되는 시스템 정지 현상을 줄이기 위해서 커널 하드닝이 필요하다. 그러나 기존의 커널 하드닝 방식은 고장 감내 기능을 통하여 제공되고 있기 때문에 구현이 어려울 뿐만 아니라 많은 비용이 소요된다. 본 논문에서 제안하는 커널 하드닝 방식은 패닉이 발생한 커널 주소에 대한 커널 스택 내의 값들을 정상적인 값으로 복구하기 위해서 커널 내의 panic() 함수 등 커널의 일부분을 수정하므로, 적은 비용으로 시스템 가용성을 높일 수 있다. 제안한 방식의 실험을 위하여 네트워크 모듈에 강제적인 패닉 현상 유발시키고, 잘못된 스택 값을 정상적인 값으로 복구하는 동작을 확인하였다.

Effect of Continuity Rate on Multistage Logistic Network Optimization under Disruption Risk

  • Rusman, Muhammad;Shimizu, Yoshiaki
    • Industrial Engineering and Management Systems
    • /
    • 제12권2호
    • /
    • pp.74-84
    • /
    • 2013
  • Modern companies have been facing devastating impacts from unexpected events such as demand uncertainties, natural disasters, and terrorist attacks due to the increasing global supply chain complexity. This paper proposes a multi stage logistic network model under disruption risk. To formulate the problem practically, we consider the effect of continuity rate, which is defined as a percentage of ability of the facility to provide backup allocation to customers in the abnormal situation and affect the investments and operational costs. Then we vary the fixed charge for opening facilities and the operational cost according to the continuity rate. The operational level of the company decreases below the normal condition when disruption occurs. The backup source after the disrup-tion is recovered not only as soon as possible, but also as much as possible. This is a concept of the business continuity plan to reduce the recovery time objective such a continuity rate will affect the investments and op-erational costs. Through numerical experiments, we have shown the proposed idea is capable of designing a resilient logistic network available for business continuity management/plan.

군 하이브리드 네트워크에서 생존성 향상을 위한 다중 경로 멀티캐스팅 (Constructing κ-redundant Data Delivery Structure for Multicast in a Military Hybrid Network)

  • 방준호;조영종;강경란
    • 한국군사과학기술학회지
    • /
    • 제15권6호
    • /
    • pp.770-778
    • /
    • 2012
  • In this paper, we propose a multi-path construction scheme to improve the survivability of a multicast session in military hybrid networks. A military hybrid network consists of a static backbone network and multiple mobile stub networks where some nodes are frequently susceptible to be disconnected due to link failure and node mobility. To improve the survivability of multicast sessions, we propose a construction scheme of ${\kappa}$ redundant multi-paths to each receiver. In order to take account of different characteristics of static and mobile networks, we propose quite different multi-path setup approaches for the backbone and stub networks, respectively, and combine them at the boundary point called gateway. We prove that our proposed scheme ensures that each receiver of a multicast session has ${\kappa}$ redundant paths to the common source. Through simulations, we evaluate the performance of the proposed schemes from three aspects : network survivability, recovery cost, and end-to-end delay.

정보보호를 위한 다속성 위협지수 : 시뮬레이션과 AHP 접근방법 (Multi-Attribute Threat Index for Information Security : Simulation and AHP Approach)

  • 이강수;김기윤;나관식
    • 한국IT서비스학회지
    • /
    • 제7권1호
    • /
    • pp.117-130
    • /
    • 2008
  • Multi-attribute risk assessments provide a useful framework for systematic quantitative risk assessment that the security manager can use to prioritize security requirements and threats. In the first step, the security managers identify the four significant outcome attributes(lost revenue, lost productivity, lost customer, and recovery cost). Next. the security manager estimates the frequency and severity(three points estimates for outcome attribute values) for each threat and rank the outcome attributes according to AHP(Analytic Hierarchy Process). Finally, we generate the threat index by using muiti-attribute function and make sensitivity analysis with simulation package(Crystal Ball). In this paper, we show how multi-attribute risk analysis techniques from the field of security risk management can be used by security managers to prioritize their organization's threats and their security requirements, eventually they can derive threat index. This threat index can help security managers to decide whether their security investment is consistent with the expected risks. In addition, sensitivity analysis allows the security manager to explore the estimates to understand how they affect the selection.

An FPGA-Based Modified Adaptive PID Controller for DC/DC Buck Converters

  • Lv, Ling;Chang, Changyuan;Zhou, Zhiqi;Yuan, Yubo
    • Journal of Power Electronics
    • /
    • 제15권2호
    • /
    • pp.346-355
    • /
    • 2015
  • On the basis of the conventional PID control algorithm, a modified adaptive PID (MA-PID) control algorithm is presented to improve the steady-state and dynamic performance of closed-loop systems. The proposed method has a straightforward structure without excessively increasing the complexity and cost. It can adaptively adjust the values of the control parameters ($K_p$, $K_i$ and $K_d$) by following a new control law. Simulation results show that the line transient response of the MA-PID is better than that of the adaptive digital PID because the differential coefficient $K_d$ is introduced to changes. In addition, experimental results based on a FPGA indicate that the MA-PID control algorithm reduces the recovery time by 62.5% in response to a 1V line transient, 50% in response to a 500mA load transient, and 23.6% in response to a steady-state deviation, when compared with the conventional PID control algorithm.

패시브 공진 스너버를 이용한 플라이백형 ZVS PWM DC-DC 컨버터의 특성해석 (Characteristic Analysis of Flyback Type ZVS PWM DC-DC Converter Using Passive Resonant Snubber)

  • 김정도;문상필;박한석
    • 전기학회논문지P
    • /
    • 제65권3호
    • /
    • pp.158-164
    • /
    • 2016
  • In this paper, a high frequency flyback type zero voltage soft switching PWM DC-DC converter using IGBTs is proposed. Effective applications for this power converter can be found in auxiliary power supplies of rolling stock transportation and electric vehicles. This power converter is basically composed of active power switches and a flyback high frequency transformer. In addition to these, passive lossless snubbers with power regeneration loops for energy recovery, consisting of a three winding auxiliary high frequency transformer, auxiliary capacitors and diodes are introduced to achieve zero voltage soft switching from light to full load conditions. Furthermore, this power converter has some advantages such as low cost circuit configuration, simple control scheme and high efficiency. Its operating principle is described and to determine circuit parameters, some practical design considerations are discussed. The effectiveness of the proposed power converter is evaluated and compared with the hard switching PWM DC-DC converter from an experimental point of view and the comparative electromagnetic conduction and radiation noise characteristics of both DC-DC power converter circuits are also depicted.

중·저소득 국가의 건강보장제도에서 이용자 부담 도입과 효과: Realist Review 방법을 활용한 탐색적 연구 (The User Fee Introduction and Its Effect in the Health System of Low and Middle Income Countries: An Exploratory Study Using Realist Review Method)

  • 손경복;김창엽
    • 보건행정학회지
    • /
    • 제25권3호
    • /
    • pp.207-220
    • /
    • 2015
  • Background: The purpose of this exploratory study is to explain where, when and how the introduction of user fee system works in low and middle income countries using context, mechanism, and outcome configuration. Methods: Considering advanced research in realist review approach, we made a review process including those following 4 steps. They are identifying the review question, initial theory and mechanism, searching and selecting primary studies, and extracting, analyzing, and synthesizing relevant data. Results: User fee had a detrimental effect on medical utilization in low and middle income countries. Also previous and current interventions and community participation were critical context in user fee system. Those contexts were associated with intervention initiation and recognition and coping strategies. Such contexts and mechanisms were critical explanatory factors in medical utilization. Conclusion: User fee is a series of interventions that are fragile and dynamic. So the introduction of user fee system needs a comprehensive understanding of previous and new intervention, policy infrastructure, and other factors that can influence on medical utilization.

Prioritized Multipath Video Forwarding in WSN

  • Asad Zaidi, Syed Muhammad;Jung, Jieun;Song, Byunghun
    • Journal of Information Processing Systems
    • /
    • 제10권2호
    • /
    • pp.176-192
    • /
    • 2014
  • The realization of Wireless Multimedia Sensor Networks (WMSNs) has been fostered by the availability of low cost and low power CMOS devices. However, the transmission of bulk video data requires adequate bandwidth, which cannot be promised by single path communication on an intrinsically low resourced sensor network. Moreover, the distortion or artifacts in the video data and the adherence to delay threshold adds to the challenge. In this paper, we propose a two stage Quality of Service (QoS) guaranteeing scheme called Prioritized Multipath WMSN (PMW) for transmitting H.264 encoded video. Multipath selection based on QoS metrics is done in the first stage, while the second stage further prioritizes the paths for sending H.264 encoded video frames on the best available path. PMW uses two composite metrics that are comprised of hop-count, path energy, BER, and end-to-end delay. A color-coded assisted network maintenance and failure recovery scheme has also been proposed using (a) smart greedy mode, (b) walking back mode, and (c) path switchover. Moreover, feedback controlled adaptive video encoding can smartly tune the encoding parameters based on the perceived video quality. Computer simulation using OPNET validates that the proposed scheme significantly outperforms the conventional approaches on human eye perception and delay.

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • 제49권3호
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.