• Title/Summary/Keyword: 검증 프로세스

Search Result 919, Processing Time 0.03 seconds

A Dynamic Service Architecture for Adaptable Mobile Smartwork System (적응형 모바일 스마트워크 시스템을 위한 동적 서비스 아키텍쳐)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3447-3454
    • /
    • 2015
  • There is increasing demand for enterprise smartwork system by a mobile device increases in these days. Therefore, it has been suggested in the technical platform of smartwork system. But,the research of the changeable smartwork system for quick and immediate correspondence of rapidly changing business affairs is insufficient. In this paper, we propose an adaptable mobile service architecture that can be based on the construction of flexible mobile smartwork system. This adaptable mobile service architecture is possible to dynamic service connecting the adaptable service in an existing smartwork system, and the core elements of the adaptable mobile service architecture propose 'Adaptable Service Manager', 'HotSpot', and 'Configurator'. We propose the dyanmic service processs that based on These core elements. Also, we verify the feasibility through case study that develop the project management mobile service that is usable in business of enterprise. Thus, this research provides the adaptable mobile service architecture that can provide the dynamic mobile service beyond the static mobile service of the existing smartwork system for the various change business of enterprise.

Computational Modelling to Predict the Welding Deformation in Steel Structures (용접변형예측을 위한 용접부 수치 모델링)

  • Park, Jeong-Ung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.96-102
    • /
    • 2007
  • Welding deformation causes critical problems under construction and in use of steel structures by varying the magnitude of the steel structures and deteriorating mechanic strength. Existing method to construct steel structures in civil engineering needs preassembly process for a part of or the whole structures on a broad space to examine the size of structures inevitably varied in the process of welding (assembly process). It leads to waste of time, space and human efforts, worry of safety accidents with the characteristic of the work to be performed on a high place, and non-efficiency and non-economy by using such supplementary equipments as crane. This paper, to remove the needless preassembly process by pre-estimating welding deformation produced under construction of large steel structures, devises a method modeling welded part for applying the equivalence load method and examines the effects of welding sequence and self weight on welding deformation by the method.

  • PDF

Study on Signal Processing Method for Extracting Hand-Gesture Signals Using Sensors Measuring Surrounding Electric Field Disturbance (주변 전기장 측정센서를 이용한 손동작 신호 검출을 위한 신호처리시스템 연구)

  • Cheon, Woo Young;Kim, Young Chul
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.26-32
    • /
    • 2017
  • In this paper, we implement a signal-detecting electric circuit based LED lighting control system which is essential in NUI technology using EPIC converting surrounding earth electric field disturbance signals to electric potential signals. We used signal-detecting electric circuits which was developed to extract individual signal for each EPIC sensor while conventional EPIC-based development equipments provide limited forms of signals. The signals extracted from our developed circuit contributed to better performance as well as flexiblity in processes of feature extracting stage and pattern recognition stage. We designed a system which can control the brightness and on/off of LED lights with four hand gestures in order to justify its applicability to real application systems. We obtained faster pattern classification speed not only by developing an instruction system, but also by using interface control signals.

Distributed Development and Evaluation of Software using Agile Techniques (애자일 기법을 이용한 소프트웨어 분산 개발 및 평가)

  • Lee, Sei-Young;Yong, Hwan-Seung
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.549-560
    • /
    • 2009
  • The Agile movement is a phenomenon that is part of the next phase of the software engineering evolution. At the same time, globally distributed software development is another trend delivering high-quality software to global users at lower costs. In this paper, Agile Framework for Distributed Software Development (AFDSD) has been suggested, and Chameleon project of Yahoo! Inc. has been implemented based on the framework. Also, the project has been evaluated by measuring Agile adoption and improvement levels, degrees of agility and agile project success, and comparing the performance and quality with the previous version. The overall performance and satisfaction with Chameleon increased by more than 30% since Agile techniques were adopted. Our objective is to highlight successful practices and suggest a framework to support adoption and evaluation of Agile techniques in a distributed environment.

Optimization of Early-phase Ship Design using Set-Based Design and Genetic Algorithm (집합기반설계와 유전자알고리즘을 이용한 초기단계 함정설계 최적화)

  • Park, Jin-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.486-492
    • /
    • 2019
  • The system-based approach is needed to select an optimal mix of weapon systems and ship platform among a variety of design alternatives with the uncertainties of the initial required operational capability. In the early-phase design, which included a feasibility study and concept design, it is possible to cause problems when a review of the operational concept, database development, and systematic design are not done, thereby producing uncertain and unstable requirements. To select the best solution without trial-and-error, the U.S. navy has applied the set-based method for the early-phase design of a new ship-to-shore connector. The ship synthesis model plays an important role in applying the set-based method, but only a few countries possess this model and have prohibited this model from being transferred to other countries. This paper suggests a set-based method using a genetic algorithm and decision-making theory through benchmarking existing ship data. The algorithm was verified using the DDG-51 class ship synthesis model to optimize the weapon system design, which has been released for research purposes.

Cleaning Noises from Time Series Data with Memory Effects

  • Cho, Jae-Han;Lee, Lee-Sub
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.37-45
    • /
    • 2020
  • The development process of deep learning is an iterative task that requires a lot of manual work. Among the steps in the development process, pre-processing of learning data is a very costly task, and is a step that significantly affects the learning results. In the early days of AI's algorithm research, learning data in the form of public DB provided mainly by data scientists were used. The learning data collected in the real environment is mostly the operational data of the sensors and inevitably contains various noises. Accordingly, various data cleaning frameworks and methods for removing noises have been studied. In this paper, we proposed a method for detecting and removing noises from time-series data, such as sensor data, that can occur in the IoT environment. In this method, the linear regression method is used so that the system repeatedly finds noises and provides data that can replace them to clean the learning data. In order to verify the effectiveness of the proposed method, a simulation method was proposed, and a method of determining factors for obtaining optimal cleaning results was proposed.

Suggestion of Procurement Strategy with Commodity Classification by Peter Kraljic Matrix (피터 크랄직 매트릭스 기법에 의한 자재 분류를 활용한 구매 전략 제안)

  • Choi, Hyun Koo;Lee, Jae-Heon
    • Plant Journal
    • /
    • v.11 no.3
    • /
    • pp.53-63
    • /
    • 2015
  • 구매자는 일반 제조업에서 자재를 피터 크랄직 매트릭스 기법에 의해 경쟁품목, 일반품목, 전략품목, 위험품목으로 분류한 후 각 품목 특성에 맞추어 구매 전략을 수립한다. 피터 클라직 매트릭스란 구매 리스크와 비즈니스 영향도 즉 특정 품목의 구매 금액 비중에 따라 자재를 분류하는 기법이다. 본 논문은 플랜트 엔지니어링산업에서 플랜트 기자재를 대상으로 피터 클라직 매트릭스 기법에 의해 기자재를 분류한 후 각 품목 특성에 맞는 구매 전략을 제안하고 사례 기업인 A사가 사우디아라비아에서 수행하는 발전 플랜트 기자재에 제안한 구매 전략을 적용하여 그 효과를 검증한 것이다. 플랜트 엔지니어링산업은 수주산업인데 총 수주금액 중 구매가 차지하는 비중은 약 50~60%이다. 따라서 프로젝트를 수행할 때 원가를 절감하여 이익을 극대화하기 위해 구매는 매우 중요한 역할을 한다. 플랜트 기자재는 크게 회전기계류, 고정장치류, 전기자재류, 제어자재류, 배관자재류로 구분된다. 각 공종별 플랜트 기자재에 대해 구매 지출 분석을 한 후 피터 클라직 매트릭스 기법에 의해 플랜트 기자재를 분류한 결과 경쟁품목에는 열교환기, 저장탱크 등이 포함되었고 일반품목에는 전선관, 조명기자재, 밸브 등이 포함되었다. 또한 전략품목에는 가스터빈, 가스터빈 흡입공기 냉각장치 등이 포함되었고, 위험품목에는 가스터빈 고정 볼트 등이 포함되었다. 경쟁품목 중 다관형 열교환기는 공급자와 공동으로 원가 모델을 구축하는 전략을 수립했고 저장탱크의 경우에는 공급자에게 원자재를 사급하는 전략을 수립하였다. 그 전략을 A사가 수행하는 프로젝트에 적용한 결과 각각 20%와 6%의 원가 절감 효과를 얻었다. 일반품목 중 전선관은 구매 대행사를 활용하는 전략을 수립했고 조명기자재는 기술 사양 검토 과정을 생략한 구매 프로세스 간소화 전략을 수립하였다. 그 결과 약 10%의 원가 절감과 평균 5일의 발주기간을 단축할 수 있었다. 전략품목 중 가스터빈 흡입공기 냉각장치는 공급자와 포괄적 양해각서를 체결하여 공동으로 사업주에 대응하는 전략을 수립했고 그 결과 프로젝트 수행 안정성 확보와 공급자 조기 참여를 통한 발주 스케줄 단축을 이룰 수 있었다. 위험품목 중 가스터빈 고정볼트는 재고 확보 전략을 수립하여 자재의 부족이나 파손으로 인해 프로젝트 공기에 영향을 주지 않도록 리스크를 감소시키는 효과를 얻었다.

  • PDF

A Study on Big Data Maturity Assessment Framework for Corporate Data Strategy and Investment (기업 데이터 전략과 투자를 위한 빅데이터 성숙도 평가 프레임워크 실증 연구)

  • Kim, Okki;Park, Jung;Cho, Wan-Sup
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.13-22
    • /
    • 2021
  • The purpose of this study is to develop and demonstrate a framework for evaluating the maturity of big data for effective data strategy establishment and efficient investment of companies. By supplementing the shortcomings of the evaluation developed so far, a framework was developed to evaluate the maturity of a company's big data in an integrated process. As a result, four evaluation areas of 'Vision and Strategy', 'Management', 'Analysis' and 'Utilization', assessment items for each area, detailed content, and criteria for each stage were derived. This was verified through a survey of entrepreneurs, and the maturity level of big data of domestic companies was confirmed. As a future research direction, it is proposed to develop detailed assessment factors according to the characteristics of each industry, to develop a data utilization framework according to the assessment results, and to improve validity and reliability through adjustment of verification targets.

MITRE ATT&CK and Anomaly detection based abnormal attack detection technology research (MITRE ATT&CK 및 Anomaly Detection 기반 이상 공격징후 탐지기술 연구)

  • Hwang, Chan-Woong;Bae, Sung-Ho;Lee, Tae-Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.13-23
    • /
    • 2021
  • The attacker's techniques and tools are becoming intelligent and sophisticated. Existing Anti-Virus cannot prevent security accident. So the security threats on the endpoint should also be considered. Recently, EDR security solutions to protect endpoints have emerged, but they focus on visibility. There is still a lack of detection and responsiveness. In this paper, we use real-world EDR event logs to aggregate knowledge-based MITRE ATT&CK and autoencoder-based anomaly detection techniques to detect anomalies in order to screen effective analysis and analysis targets from a security manager perspective. After that, detected anomaly attack signs show the security manager an alarm along with log information and can be connected to legacy systems. The experiment detected EDR event logs for 5 days, and verified them with hybrid analysis search. Therefore, it is expected to produce results on when, which IPs and processes is suspected based on the EDR event log and create a secure endpoint environment through measures on the suspicious IP/Process.

Graph Database based Malware Behavior Detection Techniques (그래프 데이터베이스 기반 악성코드 행위 탐지 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.55-63
    • /
    • 2021
  • Recently, the incidence rate of malicious codes is over tens of thousands of cases, and it is known that it is almost impossible to detect/respond all of them. This study proposes a method for detecting multiple behavior patterns based on a graph database as a new method for dealing with malicious codes. Traditional dynamic analysis techniques and has applied a method to design and analyze graphs of representative associations malware pattern(process, PE, registry, etc.), another new graph model. As a result of the pattern verification, it was confirmed that the behavior of the basic malicious pattern was detected and the variant attack behavior(at least 5 steps), which was difficult to analyze in the past. In addition, as a result of the performance analysis, it was confirmed that the performance was improved by about 9.84 times or more compared to the relational database for complex patterns of 5 or more steps.