• Title/Summary/Keyword: 실행 프로세스

Search Result 573, Processing Time 0.026 seconds

A Study on Process Selection and Implementation for Business Process Management (BPM 대상 프로세스 선정 방법론 개발 및 적용에 관한 연구)

  • Choi, Jin-Ho;Lee, Jin-Mii
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.25-41
    • /
    • 2006
  • This paper is about how to drive a Business Process Management(BPM) implementation project from selecting a target process to BPM deployment. For guidance of BPM implementation, LG CNS BPM Methodology and enPAM(Entrue Process Assessment Model) were used. This paper focuses on the methodology of process selection and presents a case study from the telecommunication industry. The enPAM consists of three major criteria in determining process priority for BPM system deployment: business impact, BPM adequateness and implementation feasibility. These three criteria can be easily modified for other telecommunication business just as we did to suit this telecom case. Moreover, it could provide useful ideas to companies that consider introducing a BPM solution for process management. Although we propose a comprehensive design methodology for selecting a proper target business process for BPM implementation, more work is still needed to extend the results for rigorous and practical method.

Design Anomalies in the Business Process Modeling (비즈니스 프로세스 모델에서의 설계 이상 현상)

  • Kim, Gun-Woo;Lee, Jeong-Wha;Son, Jin-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.850-863
    • /
    • 2008
  • Business Process is a set of interrelated business functions, which are defined by various business process rule and that will lead a company to accomplishing a specific organizational goal. Many business organizations are using process modeling methods for their business process management, but mostly these methods are accomplished by Human-Based activities. These human-based activities cause unexpected design anomalies in modeling phase. If process engine executed without design anomalies detection, that will be lead to huge loss on costs. To ensure that there is no design anomalies in modeling phase and to detect anomalies of predefined actions within modeling tools are important issues in business process management. In this paper, we provide specific types of design anomalies, which can effectively use to detect design anomalies in business process modeling phase.

A study on the application of the socio-technical systems approach to the successful business process reengineering (성공적인 비즈니스 프로세스 리엔지니어링을 위한 사회.기술적 시스템 접근법의 적용에 관한 연구)

  • 권태형;조건호;고석용;박강희
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.09a
    • /
    • pp.264-279
    • /
    • 1995
  • 오늘날 기업 경영 환경은 더욱 복잡해지고, 국가간.지역간 통합 경제 체제 형태로 변화하고 있다. 정보 기술과 텔리커뮤니케이션의 결합에 따른 급속한 발전은 국가간.지역간 경계를 넘어 다국적 기업, 더 나아가서는 범세계적 기 업으로 글로벌(global) 기업을 출현시켰다. 경영 환경의 빠른 변화의 추세 속 에서 경쟁 우위를 지키기 위해서는 이러한 변화를 적절히 수용하고 적응할 수 있는 조직이 필요하였다. 기존의 MIS 관점으로는 환경 변화에 적응 할 수 있는 혁신적인 조직으로 변화시키는 데는 한계가 있었고, 이에 따라 BPR 이 대두되었다. BPR실행에 있어 성공뿐만 아니라 많은 실패도 겪었다. BPR 실행에는 많은 자금과 인력, 시간이 투자되기 때문에 실패의 손실은 기업에 게 큰 타격을 가져다 줄 수 있다. 대부분의 BPR의 실패 원인은 사회적 측면 을 고려하지 못한 데 있다. 정보 기술을 이용하여 프로세스를 급진적으로 재 설계 하였지만, 운영 주체인 구성원의 저항감이나 조직의 문화에 대한 고려 를 하지 못하였다. 그러므로 BPR을 수행함에 있어 사회적 측면과 기술적 측 면을 동시에 고려하여 적용한다면 오류나 실패 요인을 감소시킬 수 있다. 따 라서 요즈음 새로이 부상하고 있는 사회.기술적 시스템 접근법은 성공적인 BPR 실행을 위한 대안이 될 수 있다.

  • PDF

Exploiting Back-end Fusion in Multi-Core Processors (다중 코어 환경에서의 Back-end Fusion 구현)

  • Park, Jong Hyun;Jeong, I Poom;Ro, Won Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.33-36
    • /
    • 2014
  • 최근 스마트폰이나 태블릿 PC 등의 모바일 디바이스가 상용화 되어감에 따라 그 안에서 핵심적인 처리기능을 담당하는 프로세서의 코어 수가 점차적으로 늘어나고 있다. 많은 수의 코어를 효율적으로 사용하기 위해 여러 가지 메커니즘이 구현되어 있으나, 단일 프로세스를 순차적으로 실행하는 경우 여전히 성능에서의 한계가 존재한다. 병렬화 되어 있지 않은 프로세스의 경우, Amdahl's Law[1]에 따르면 순차적으로 실행을 할 수 밖에 없는 부분이 존재하고, 이 부분은 하나의 코어에서만 실행되기 때문에 많은 연산 자원들이 낭비되는 현상이 발생한다. 본 논문은 다중 코어 환경에서 이러한 잉여자원을 효과적으로 사용하기 위해 Back-end Fusion 이라는 구조를 제안하여 프로세서의 성능 향상을 위한 연구를 진행하였다. Back-end Fusion 이란, 연산 처리를 담당하는 back-end 부분(execution unit, writeback 단계 등)을 필요에 따라 코어 간에 동적으로 재구성하여 성능을 향상시키는 메커니즘이다. 이 재구성된 프로세서의 back-end 를 효율적으로 사용하기 위해, 종속성과 로드 밸런스 등을 고려한 인스트럭션 분배 알고리즘을 함께 제안한다. Intel 사의 x86 Instruction Set Architecture(ISA)를 기반으로 한 시뮬레이터를 이용하여 Back-end Fusion 프로세서의 성능을 측정 해 본 결과 기존의 단일 코어 프로세서에 비해 평균 32.2%의 성능 향상을 확인할 수 있었다.

An Empirical Research on the Effect of the Environmental Adaptation and the Implementation of Strategies on the Business Performance in Korean Shipping Companies (외항선사(外航船社)의 환경대응력(環境對應力)과 전략실행(戰略實行)이 경영성과(經營成果)에 미치는 영향(影響)에 관한 실증연구(實證硏究))

  • Kim, Myung-Jae;Nam, Jin-Hyun;Ahn, Ki-Myung
    • Journal of Navigation and Port Research
    • /
    • v.34 no.8
    • /
    • pp.659-667
    • /
    • 2010
  • In this study, we examine features of marine transport environment which shipping companies are facing, analyze the ability to cope with this environment, and present the relationship between the ability and business performances. Then, we demonstrate that diagnosis of shipping environment in the global marine transport environment and preparing to it is very important. Also, we present that the ability to prepare is the main factor to decide the competitive power of the company. This study has a meaning in that the importance of business activities related to environment such like diagnosis of environment, analyzing, management, adaptation, and prediction is presented. Besides, the value of this study is that we analyze the relationship between corresponding ability, strategic execution process and business performance in general.

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

A Study on the Design of System Access Control Software For the Improvement of the Stability and Survivability of Naval Combat Management System

  • Jong-Hyeon Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.137-145
    • /
    • 2023
  • In this paper, we propose system access control software that improves the survivability of the naval combat system while maintaining security and stability. The software was improved by improving the operating environment configuration and user authentication process of the system access control software that constitutes the naval combat system, defining the operating environment classification of the naval combat system, and applying a software parallel execution process considering the load rate. Through this, the waiting time required to configure the environment is shortened, providing rapid operation to the operator, and improving the fact that the naval combat system cannot be operated unless the environment configuration is completed even in emergency situations. In order to test the performance, a test environment was created by simulating the existing naval combat system, and the execution time for each operation category was measured and compared. Compared to the existing naval combat system, the execution time of the basic combat system was reduced by about 69.3%, the execution time of the combat system was reduced by about 54.9%, and the execution time of the integrated combat system was confirmed to be reduced by about 8.4%.

Construction Process Modelling Method Improving the Traceability of ICT Applications (ICT 적용 추적성 개선을 위한 시공관리 프로세스 모델링)

  • Go, Taeyong;Lim, Taekyung;Lee, Dong-Eun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.1
    • /
    • pp.114-123
    • /
    • 2019
  • Tracking ICT applications on construction business processes is critical to the success of ICT-applied construction projects. Existing IDEF0 is a representative modeling method for visualizing and analyzing business processes. It defines a construction production process into a visual information model, hence, encouraging the project participant to understand the activities, their deliverable, and control flow of the process. However, IDEF0 dose not lend itself to ICT-applied construction processes, because it does not provide a mean to define how, in what order, by which each and every activity that ICT applied implements. This paper presents a new business modeling method that improves the traceability of ICT application (IAMB: ICT Application tracking Model for Business process) for construction management. The IAMB contributes to handle the sophisticated features of construction management processes to which ICT are applied. The method categorizes the process into three types: management, construction, and information exchange. The validity of IAMB was confirmed by analyzing the performance when it is used for tracking each modeling step of lift reservation process which making use of ICT. The test case provides an admissible evidence that the method encourage to define who, what, how, which order, and by which ICT tools the construction process exchanges production information.

A More Comprehensive Approach for Enhancing Business Process Efficiency (BPM에서의 업무효율성 향상을 위한 포괄적 접근법)

  • Rhee, Seung-Hyun;Cho, Nam-Wook;Bae, Hye-Rim
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.73-87
    • /
    • 2007
  • To survive in a global competition, many companies are trying to standardize and visualize Business Process (BP) by implementing Business Process Management (BPM). Recently, enhancing business process efficiency has become one of critical success factors. In this paper, we introduce a two-phase perspective of BP efficiency: Process Engine Perspective (PEP) and Task Performer Perspective (TPP). The former is related to allocation function of BP engine; it is mainly concerned with efficient task allocation to users. The latter phase influences efficiency depending on how users execute tasks assigned to them. Instead of considering each phase separately, we develop a comprehensive method considering the two-phase together, which is more effective for the BP efficiency. We carry out simulation experiment to show the combinational effect of the two phases.

  • PDF

Design and Implementation of Event Notification System Using E-Mail Service (전자메일 서비스를 이용한 이벤트 알림 시스템의 설계 및 구현)

  • Lee, Seung-Min;Kim, Myoung-Il;Jeong, Hee-Seok;Kim, Jae-Sung;Lee, Sang-Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.91-94
    • /
    • 2010
  • 응용 프로그램을 실행할 때 프로세스간의 상호 연동이 필요한 경우 통신을 하게 된다. 프로세스간의 통신에서 서비스를 요청하는 프로세스의 상태에 따라 동기(Blocking) 모드와 비동기(Non-blocking) 모드로 나누어진다. 동기 모드는 서비스를 요청받은 프로세스의 작업이 완료할 때까지 서비스를 요청한 프로세스의 상태가 멈추는 방식이고, 비동기 모드는 다른 프로세스에 서비스를 요청한 후 자신은 다른 유용한 작업을 계속 수행할 수 있는 방식으로 통신 상대가 여럿이거나 서비스 수행시간이 긴 작업의 경우 비동기 모드를 사용한다. 프로세스 간의 비동기적인 작업 수행이 이벤트 기반으로 이루어지도록 지원하는 이벤트 알림 시스템은 전자메일(E-mail) 서비스와 유사한 특징이 있다. 전자메일 서비스는 컴퓨터 통신망을 통해 편지를 주고 받을 수 있는 서비스 및 해당 편지를 일컫는 용어로, 본 논문에서는 이전에 제시된 이벤트 알림 시스템의 구성과 잘 알려진 전자메일 서비스의 특징을 파악하여 전자메일 서비스를 이용한 이벤트 알림 시스템의 설계 및 구현 방법을 제시한다.