• Title/Summary/Keyword: 관리 패턴

Search Result 1,568, Processing Time 0.038 seconds

Effect of Discharge Systems on the Transport of Suspended Sediment Particles (방류형태에 따른 부유사 거동 특성)

  • Oh, Jungsun;Choi, Sung-Uk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.59-62
    • /
    • 2015
  • 하천에서 유사이동 분석이 중요한 이유는, 지속가능한 하천관리의 관점에서 하도, 구조물, 생물 서식처와 수질에 이르기까지 하천 내 유사이동이 미치는 영향이 광범위하기 때문이다. 특히, 유사가 어느 지점에서 유실되며 어느 지점에 쌓이는지와 같은 이슈는 하천 지속가능한 관리를 위한 핵심이라 해도 과언이 아니다. 상대적으로 크기가 작은 부유사 입자의 이동은 일상적인 하천의 흐름에서도 대부분 관찰되기 때문에, 그 이동패턴을 파악하는 것이 하천의 효율적 관리에 밑바탕이 된다. 기존연구들에서 주로 연구되었던 부유사 농도 또는 플럭스 산정은 유사에 의한 영향을 파악하기 위한 좋은 지표임은 분명하지만, 유사 입자가 움직이기 시작하는 지점이나 침전하는 지점 등 공간적 분석을 위해서는 입자의 움직임에 초점을 맞춘 분석이 필요하다. 따라서 본 연구에서는 부유사 입자를 추적하는 모의 방법을 이용하여, 개수로에서 부유사 입자를 방류하는 형태가 바뀌었을 때, 입자의 공간적 분포가 어떤 식으로 영향을 받는지에 대하여 분석하였다. 모의결과와 실험결과를 비교하여 연구의 접근방법이 부유사 이동의 공간적 분석을 위한 타당한 방법을 검증하였으며, 나아가 실험으로 측정하기 어려운 부유사 이동 패턴을 제시하였다. 입자의 방류 위치나 방류 간격 등 부유사 입자의 분산에 영향을 미치는 요인들 또한 함께 분석하였다.

  • PDF

Design of the intelligent user profile management technique for home network system (홈네트워크 시스템을 위한 지능적 사용자 프로파일 관리 기법 설계)

  • Lee, Seung-Hun;Shin, Dong-Kyoo;Shin, Dong-il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.23-26
    • /
    • 2009
  • 인터넷 이용자의 폭발적인 증가와 기술의 발전으로 홈 네트워크 기술은 급속한 성장을 이루고 있는 추세이다. 본 연구팀이 기존에 연구한 스마트 홈 서버 아키텍처에서는 사용자에게 제공하기 위한 가전 서비스 예측을 위하여 감독형 패턴분석기와 규칙기반 패턴분석기 그리고 사용자감정 분석기를 사용하였다. 그러나 효율적인 홈 서비스를 위해 사용자, 가전기기, 센서장비 등의 데이터베이스를 관리하는 방안에 대해서는 충분한 제시를 하지 않았다. 본 논문에서는 세부 모듈로써 홈 네트워크 시스템 사용자에게 개인화된 서비스를 제공하는 사용자 프로파일 관리 컴포넌트를 설계하며 개선점을 제시한다.

Pattern-based RFID Logistic Process Triggering Using Complex Event (복합 이벤트를 이용한 패턴 기반 RFID 물류 프로세스 트리거링)

  • Yu, Yeong-Woong;Bae, Hye-Rim;Das, Sajal K.;Koo, Hoon-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.4
    • /
    • pp.315-332
    • /
    • 2009
  • In logistic environments, a process, in that it manages the flow of materials among partners, involves more than one organization. In this regard, a logistic process, as a combined process consisting of multiple sub processes, needs to be managed with controling interaction among partners. In achieving systematic management of a logistic process, traditional Business Process Management (BPM) cannot be used for the entire flow, since it lacks the ability to manage interactions among partners. Particularly in logistic environments where RFID technologies are used, how to deal with the connection between RFID event and logistic flow has not been properly addressed. To overcome this limitation, this paper proposes a new method of managing multi-organizational logistic processes based on RFID events. We define inter-workflow pattern, and suggest ECA(Event-Condition-Action) rules for auto triggering of logistic processes. To adjust the rules to RFID events, we invent RFID-based ECA rules using complex event. A prototype system has been developed for the purpose of demonstrating the effectiveness of our approach.

  • PDF

Patterns and Trends in Cost Control Practice of Korean General Contractors (건설기업 원가관리 패턴의 현황 및 변화 분석)

  • Jung, Young-Soo;Joo, Mi-Hee
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.4
    • /
    • pp.79-87
    • /
    • 2011
  • Cost control is an exceedingly fundamental and important construction business function. Even though enormous research efforts have been exerted in this area, there has been no comprehensive and quantitative study exploring detailed cost control practice of construction companies in terms of practical patterns and trends. This paper identified the variables for practical cost control process first. A survey questionnaire was developed and used in order to collect data from Korean general contractors. Survey results analyzing responses from 45 companies show that engineering aspects of cost management has recently been strongly stressed in the construction industry. Applying various types of progress measurement method are getting popular, and the level of details in collecting job site cost data are prevalent. Cost forecasting are performed more frequently. These trends indicates the recent efforts by Korean general contractors to achieve competitive advantages in the globalized market.

Characteristics and Automatic Detection of Block Reference Patterns (블록 참조 패턴의 특성 분석과 자동 발견)

  • Choe, Jong-Mu;Lee, Dong-Hui;No, Sam-Hyeok;Min, Sang-Ryeol;Jo, Yu-Geun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.9
    • /
    • pp.1083-1095
    • /
    • 1999
  • 최근 처리기와 입출력 시스템의 속도 차이가 점점 커짐에 따라 버퍼 캐쉬의 효율적인 관리가 더욱 중요해지고 있다. 버퍼 캐쉬는 블록 교체 정책과 선반입 정책에 의해 관리되며, 각 정책은 버퍼 캐쉬에서 블록의 가치 즉 어떤 블록이 더 가까운 미래에 참조될 것인가를 결정해야 한다. 블록의 가치는 응용들의 블록 참조 패턴의 특성에 기반하며, 블록 참조 패턴의 특성에 대한 정확한 분석은 올바른 결정을 가능하게 하여 버퍼 캐쉬의 효율을 높일 수 있다. 본 논문은 각 응용들의 블록 참조 패턴에 대한 특성을 분석하고 이를 자동으로 발견하는 기법을 제안한다. 제안된 기법은 블록의 속성과 미래 참조 거리간의 관계를 이용해 블록 참조 패턴을 발견한다. 이 기법은 2 단계 파이프라인 방법을 이용하여 온라인으로 참조 패턴을 발견할 수 있으며, 참조 패턴의 변화가 발생하면 이를 인식할 수 있다. 본 논문에서는 8개의 실제 응용 트레이스를 이용해 블록 참조 패턴의 발견을 실험하였으며, 제안된 기법이 각 응용의 블록 참조 패턴을 정확히 발견함을 확인하였다. 그리고 발견된 참조 패턴 정보를 블록 교체 정책에 적용해 보았으며, 실험 결과 기존의 대표적인 블록 교체 정책인 LRU에 비해 최대 57%까지 디스크 입출력 횟수를 줄일 수 있었다.Abstract As the speed gap between processors and disks continues to increase, the role of the buffer cache located in main memory is becoming increasingly important. The buffer cache is managed by block replacement policies and prefetching policies and each policy should decide the value of block, that is which block will be accessed in the near future. The value of block is based on the characteristics of block reference patterns of applications, hence accurate characterization of block reference patterns may improve the performance of the buffer cache. In this paper, we study the characteristics of block reference behavior of applications and propose a scheme that automatically detects the block reference patterns. The detection is made by associating block attributes of a block with the forward distance of the block. With the periodic detection using a two-stage pipeline technique, the scheme can make on-line detection of block reference patterns and monitor the changes of block reference patterns. We measured the detection capability of the proposed scheme using 8 real workload traces and found that the scheme accurately detects the block reference patterns of applications. Also, we apply the detected block reference patterns into the block replacement policy and show that replacement policies appropriate for the detected block reference patterns decreases the number of DISK I/Os by up to 57%, compared with the traditional LRU policy.

The Effect of Baby-boomer Retirees' Consumption Patterns on Depression in Later Life (은퇴 베이비부머의 소비패턴과 우울에 관한 연구)

  • Park, Seo-Young;Hong, Song-Iee
    • 한국노년학
    • /
    • v.37 no.2
    • /
    • pp.349-368
    • /
    • 2017
  • The purpose of this study is to empirically structure the patterns of baby boomer retirees'consumption and their effects on depression in later life. Using the 5th wave of Korea Retirement and Income Study(KReIS) in 2013, of baby boomers born in 1955 to 1963, we analyzed those who were completely retired(n=420). The Latent Profile Analysis(LPA) classified the empirical patterns of consumption and then a multiple regression analyzed the effect of consumption patterns on depression among these baby boomer retirees. The LPA results showed that the consumption patterns consist of five groups: (1) Basic life-oriented class(26.9%), (2) Balanced consumption class(29.3%), (3) Social life-oriented class(18.3%), (4) Leisure-oriented class(18.5%), and (5) Education-oriented class(7.0%). Baby boomer retirees' depression was associated with their consumption patterns. Specifically, the basic life-oriented class showed significantly lower depression than the education-oriented class. Other correlates such as higher education, having no spouse, lower subjective health, greater limitations in physical functions, having a diagnosed disability, having fewer children, higher dissatisfaction with leisure activities, and lower self-perceived economic status were associated with higher levels of depression in this study. These findings suggest meaningful implications for gerontological policy and practice for baby boomer retirees in Korea. In light of vulnerable retirement preparation, social services specialized for baby boomers should consider financial education for revamping consumption scale beyond asset management and long-term case management of pre and post retirement cases.

Design and Implementation of a Paper Submission Management System Using Domain Object Interface and Object Oriented Design Patterns (객체지향 설계 유형 및 도메인 객체 인터페이스를 이용한 논문 투고 관리 시스템 설계 및 구현)

  • Sim, Chun-Bo;Jung, Se-Hoon;Lim, Eun-Cheon;You, Kang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.449-458
    • /
    • 2010
  • Recently, the interest on object oriented design patterns has been increased considering to reusability of software and efficiency of maintenance expense in designing software architecture. In this paper, we design the paper submission management system applicable to specific domain using domain object interface based on object oriented design patterns, and then implement it with Java and XML. The proposed system applies method of implementation by assemblying each system objects with upward after system entire architecture design by combining properly downward method and upward method and applies with GoF Design pattern. As well as, we convert domain data of system into the form of various persistent objects through XML, and minimize the complexity of system by not adopting method that generates domain object as in Class with automatic. Finally, the implementation of our system can be used in general C/S environment, but we implement system user GUI using the XSLT built in general web browser in consideration for user convenience and consistency.

ANIDS(Advanced Network Based Intrusion Detection System) Design Using Association Rule Mining (연관법칙 마이닝(Association Rule Mining)을 이용한 ANIDS (Advanced Network Based IDS) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2287-2297
    • /
    • 2007
  • The proposed ANIDS(Advanced Network Intrusion Detection System) which is network-based IDS using Association Rule Mining, collects the packets on the network, analyze the associations of the packets, generates the pattern graph by using the highly associated packets using Association Rule Mining, and detects the intrusion by using the generated pattern graph. ANIDS consists of PMM(Packet Management Module) collecting and managing packets, PGGM(Pattern Graph Generate Module) generating pattern graphs, and IDM(Intrusion Detection Module) detecting intrusions. Specially, PGGM finds the candidate packets of Association Rule large than $Sup_{min}$ using Apriori algorithm, measures the Confidence of Association Rule, and generates pattern graph of association rules large than $Conf_{min}$. ANIDS reduces the false positive by using pattern graph even before finalizing the new pattern graph, the pattern graph which is being generated is compared with the existing one stored in DB. If they are the same, we can estimate it is an intrusion. Therefore, this paper can reduce the speed of intrusion detection and the false positive and increase the detection ratio of intrusion.

Designing of The Enterprise Insider-Threats Management System Based on Tasks and Activity Patterns (사용자 직무와 활동패턴 기반의 내부자위협통합관리체계 설계)

  • Hong, Byoung Jin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.3-10
    • /
    • 2015
  • Recent massive data breaches or major security incidents show that threats posed by insiders have greatly increased over time. Especially, authorized insiders can cause more serious problems than external hackers can. Therefore there is a growing need to introduce a system that can monitor the insider threats in real time and prevent data breaches or security incidents in early-stage. In this paper, we propose a EITMS(Enterprise Insider-Threats Management System). EITMS detects the abnormal behaviors of authorized insiders based on the normal patterns made from their roles, duties and private activities. And, in order to prevent breaches and incidents in early-stage, a scoring system that can visualize the insider threats is also included.

Development of PC Software for IED using software architectures (소프트웨어 아키텍처를 이용한 IED용 PC 소프트웨어 개발)

  • Kwon, Hyo-Chul
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.739-740
    • /
    • 2011
  • 최근 변전소용 IED는 IEC61850의 적용을 기점으로 하여 기술적으로 더 많은 발전을 거듭하고 있다. IED에 더 다양한 기술을 포함하면서 안정적이고 확실한 동작을 요구하는 것은 기본이고, 사용자 위주의 Interface와 편리한 관리 도구도 요구되어 진다. 이에 따라 IED를 PC로 제어하고 관리하기 위한 소프트웨어 또한 기술적으로 발전해야 하는 상황이다. 소프트웨어는 기본적으로 실시간 관리와 프로젝트 관리 그리고 다수의 IED지원 등의 기능을 가져야 하며 이를 구현하기 위하여 여러 가지 방식의 아키텍처 패턴이 적용될 수 있다. 본 논문에서는 IED를 관리하는 소프트웨어에 적용될 수 있는 아키텍처를 제시함으로써 소프트웨어 구현에 대한 방향을 모색해 보았다.

  • PDF