• Title/Summary/Keyword: 진단 프로세스

Search Result 171, Processing Time 0.023 seconds

The Maintenance Process Model using BPMN Method in Public Rental Housing (BPMN 방식을 이용한 공공임대주택 유지관리 업무 프로세스 모델)

  • Park, Kyung-Mo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.743-751
    • /
    • 2016
  • It is critical to effectively change the measures of prevention from the breakdown maintenance proceeding an apartment housing maintenance task scope. It is necessary that systematization be performed for a series of tasks, such as facility inspection, diagnosis and replacement. In addition, it is preceded by establishing a standardization for maintenance work scope. Therefore, this study examined the problems related to public rental housing maintenance work scope to manage it more systematically. In addition, the study suggests a work process section for facility repairs, long term replacement and general maintenance using one on one interviews with experts to classify the occupants, management office and head office. This study's standard work system is expected to provide fairness and transparency in addition to improving the productivity in public rental housing maintenance via an efficiency promotion plan. In addition, it is used as the basic reference for developing a system of public rental housing maintenance costs and diagnosis actions. Finally, it is necessary to create improvements that provide a more objective work system standardization throughout the analysis of the productivity data according to the work flow and the review of the occupants, management office and head office in the future applications of the pilot site.

Development Strategy of New Services for Supporting the Commercialization of Export Public Services (공공서비스 수출 사업화 지원을 위한 신서비스 개발 전략)

  • Kwon, Hyeog-In;Lee, Jin-Hwa;Kang, Ji-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.476-488
    • /
    • 2015
  • The export demand for various public services of e-government is growing. This study defines the new services that are required in each step of export processes for public services in order to develop the new services for supporting the commercialization of the export public services. And the study arrives at a conclusion of the main problems and requirements of the current export processes for the public services through the previous literature, the open-ended questions and the focus group interview. The new services are divided into six steps including the general information and consultation of the export public services; specifically, 'evaluation of the export capabilities', 'information of export pubic services', 'network of export companies', 'knowledge exchange of export', 'guide map of export information' and 'place for communication'. Furthermore, the score test about importance of 14 detailed services and the ease of implement is conducted. Based on the results of the test, Portfolio Evaluation Quadrant analysis derives a conclusion that 'the guide map service of export information' in the step 5 is preferentially considered to be in need of implementation.

시스템 개발 프로세스 관리 능력의 향상을 위한 방안: 지식관리적 접근방법

  • 김성근;이진실;원은희
    • Proceedings of the Korea Database Society Conference
    • /
    • 1998.09a
    • /
    • pp.509-524
    • /
    • 1998
  • 정보시스템 개발노력의 상당수는 실패로 끝나고 있다. 최근 통계에 따르면 정보시스템 개발 프로젝트의 반은 실패로 끝난다고 한다[kaplan, 1998]. 이와 같은 높은 실패율은 시스템 개발을 위한 노력을 체계적으로 투입하지 못하고 개발 프로젝트를 관리하기 위한 노력을 단위프로젝트 차원에서만 집중시키는데서 연유한다고 생각된다. 다시 말해 장기적인 관점에서 개발조직의 역량 향상이라는 보다 근본적인 목표를 간과하고 있는 것이다. 이러한 점에 착안하여 소프트웨어 엔지니어링 분야에서는 정보시스템 개발과 관련'한 개발 조직의 능력을 향상시키기 위한 다양한 접근방법이 제시되고 있다. 개발조직의 개발 프로세스 성숙도를 진단하기 위한 측정도구로 개발된 카네기멜론대학의 CMM(Capability Maturity Model)과 ISO 에서 정의한 표준인 SPICE (Software Process Improvement and Capability dEtermination) 모델이 그 대표적인 예에 속한다. 그러나 이와 같은 모델들은 개발조직의 프로세스 개선을 위한 방향과 요건은 제시하고 있지만, 이를 조직 내에서 구현하기 위한 구체적인 방법이나 수단은 제시해주지 못하고 있다. 따라서 이러한 접근방법 역시 소프트웨어 엔지니어링 역량 이나 개발경험이 일천한 우리 현실에서는 부분적인 성과 이상을 기대하기는 어려웠다. 본 연구에서는 이와 같은 문제점이 개발 프로젝트와 관련된 경험이나 지식을 효과적으로 추출하고, 획득하고, 체계화하고, 시스템화하여 조직 내에서 활용하려는 노력이 부족한기 때문이라고 본다. 이에 본 연구에서는 개발조직의 역량 향상을 위한 지식관리적 접근 방법의 세가지 유형을 제시하기로 한다.>$Ca^{2+}$ 는 뿌리에서, $Mg^{2+}$ 는 잎에서 많았으며, $PO_4$$^{-}$ 는 과실과 줄기에서 많았다. 배지간에 따른 차이는 나타나지 않았으며, $K^{+}$, $Ca^{2+}$$Mg^{2+}$ 는10:0에서, $PO_4$$^{-}$ 는 8:2에서 각각 많았다.해 제품을 판매하였으며, 기업 및 제품이미지 제고를 위한 고객에 대한 서비스도 강화하고 있었다. 통신기기업체내지 소프트웨어 산업으로의 진출이 가능할 수 있도록 상호진출을 허용할 필요가 있다고 본다. 이를 위해서 우리 나라 정부 역시 미국처럼 새로운 통신개혁법을 만들 필요가 있다. 새로운 통신개혁법의 핵심적인 사항으로서 첫째, 통신과 CATV간의 상호진입을 허용, 둘째, 통신사업자가 통신관련 기기산업에 참여할 수 있는 규제완화를 허용, 셋째, 유아단계에 있는 소프트웨어 및 컨테트산업을 육성하는데 산업육성책 수립 등을 적극적으로 추진하여야 할 것이다. 그리고 현재 국내 재벌기업들로 구성되어 있는 기반산업을 지원하는 기술개발 지원체제와 육성정책을 소프트웨어 및 컨텐트의 응용산업으로 개편할 필요성도 제시되며, 이를 위해 범부처 차원에서 소프트웨어 및 컨텐트 육성정책을 지원하는 종합적인 대책을 마련해야 한다고 본다.서, Li-K, Li-Na탄산염에 대하여 부 식거동을 검토한 결과, 가압하에서 내식성이 향상되는 것이 발견되었다. 이유로서는 가압하에서 용융탄산엽의 증가된 산화력으로 보다 치밀한 내식성 산화물 피막이 형성되기 때문으로 생각되고 있다. 또

  • PDF

A Study on the Automation of MVDC System-Linked Digital Substation (MVDC 시스템연계 디지털변전소 자동화 연구)

  • Jang, Soon Ho;Koo, Ja Ik;Mun, Cho Rong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.7
    • /
    • pp.199-204
    • /
    • 2021
  • Digital substation refers to a substation that digitizes functions and communication methods of power facilities such as monitoring, measuring, control, protection, and operation based on IEC 61850, an international standard for the purpose of intelligent power grids. Based on the intelligent operating system, efficient monitoring and control of power facilities is possible, and automatic recovery function and remote control are possible in the event of an accident, enabling rapid power failure recovery. With the development of digital technology and the expansion of the introduction of eco-friendly renewable energy and electric vehicles, the spread of direct current distribution systems is expected to expand. MVDC is a system that utilizes direct current lines with voltage levels and transmission capacities between HVDCs applied to conventional transmission systems and LVDCs from consumers. Converting existing lines in substations, where most power equipment is alternating current centric, to direct current lines will reduce transmission losses and ensure greater current capacity. The process bus of a digital substation is a communication network consisting of communication equipment such as Ethernet switches that connect installed devices between bay level and process level. For MVDC linkage to existing digital substations, the process level was divided into two buses: AC and DC, and a system that can be comprehensively managed in conjunction with diagnostic IEDs as well as surveillance and control was proposed.

Fault Localization for Self-Managing Based on Bayesian Network (베이지안 네트워크 기반에 자가관리를 위한 결함 지역화)

  • Piao, Shun-Shan;Park, Jeong-Min;Lee, Eun-Seok
    • The KIPS Transactions:PartB
    • /
    • v.15B no.2
    • /
    • pp.137-146
    • /
    • 2008
  • Fault localization plays a significant role in enormous distributed system because it can identify root cause of observed faults automatically, supporting self-managing which remains an open topic in managing and controlling complex distributed systems to improve system reliability. Although many Artificial Intelligent techniques have been introduced in support of fault localization in recent research especially in increasing complex ubiquitous environment, the provided functions such as diagnosis and prediction are limited. In this paper, we propose fault localization for self-managing in performance evaluation in order to improve system reliability via learning and analyzing real-time streams of system performance events. We use probabilistic reasoning functions based on the basic Bayes' rule to provide effective mechanism for managing and evaluating system performance parameters automatically, and hence the system reliability is improved. Moreover, due to large number of considered factors in diverse and complex fault reasoning domains, we develop an efficient method which extracts relevant parameters having high relationships with observing problems and ranks them orderly. The selected node ordering lists will be used in network modeling, and hence improving learning efficiency. Using the approach enables us to diagnose the most probable causal factor with responsibility for the underlying performance problems and predict system situation to avoid potential abnormities via posting treatments or pretreatments respectively. The experimental application of system performance analysis by using the proposed approach and various estimations on efficiency and accuracy show that the availability of the proposed approach in performance evaluation domain is optimistic.

A GPU-based Filter Algorithm for Noise Improvement in Realtime Ultrasound Images (실시간 초음파 영상에서 노이즈 개선을 위한 GPU 기반의 필터 알고리즘)

  • Cho, Young-Bok;Woo, Sung-Hee
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1207-1212
    • /
    • 2018
  • The ultrasound image uses ultrasonic pulses to receive the reflected waves and construct an image necessary for diagnosis. At this time, when the signal becomes weak, noise is generated and a slight difference in brightness occurs. In addition, fluctuation of image due to breathing phenomenon, which is the characteristic of ultrasound image, and change of motion in real time occurs. Such a noise is difficult to recognize and diagnose visually in the analysis process. In this paper, morphological features are automatically extracted by using image processing technique on ultrasound acquired images. In this paper, we implemented a GPU - based fast filter using a cloud big data processing platform for image processing. In applying the GPU - based high - performance filter, the algorithm was run with performance 4.7 times faster than CPU - based and the PSNR was 37.2dB, which is very similar to the original.

A Study on Development of the Evaluation Model about Level of Security in National R&D Program (국가연구개발사업 연구보안수준 평가모델 개발에 관한 연구)

  • Bae, Sang Tae;Kim, Ju Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.73-80
    • /
    • 2013
  • Government promotes that the strategy of national R&D converts from catch-up R&D type to leading R&D type for the future growth and national competitiveness according to the recent paradigm shift in the research and development. So the many national researches about foundation, source and core technology are actively being made. As a result of these researches, the security has become an important part of success factor in R&D. And so various security diagnosis and evaluation is being conducted about national R&D program. Existing the research security evaluation models are classified domains in terms of security management and created evaluation indicators according to the domains. However the models are inappropriate in case of researchers doing self-diagnosis of research security. This paper set up the domains in aspect of research management and then proposed the evaluation indicator of research security according to the domains. The evaluation indicator model that is suggested can be utilized in self-diagnosis of research security effectively.

  • PDF

A Study of Practical Field Application Cryptographic Module through Evaluation Derived by Connection Indicators (품질 연계지표 평가방법을 사용한 암호화 모듈 실무현장 적용체계 연구)

  • Noh, SiChoon;Na, SangYeob
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.55-60
    • /
    • 2014
  • In this study, we propose a cryptographic module quality evaluation system referenced by ISO/IEC 9000 quality system with Quality, Quality Factor, Quality Subfactor, Metric. Practical application process encryption algorithm based on the encryption algorithm to encrypt the pros and cons valuation of diagnosis, point selection algorithm, analysis, and quality items(quality factor), eliciting constraints derived, such as the cryptographic module design quality evaluation system is set to step 5. The five steps are examples of field-based diagnostic tool for cryptographic operations, the most essential work to be done in order to derive one will work. 2-Factor encryption module for connection between indicator items(quality factor) to identify and ensure the quality of the item the constraints of the environment are two kinds of cryptographic operations. This study is an encryption module and a practical field application system, it presents the standardized model. We have to meet the rapid changes in information technology. The environment, development and the encryption algorithm applied to model a wide variety of on-site development encryption will be able to expect the efficiency.

Development of Risk Breakdown Structure of Nuclear Power Plant Decommissioning Project: Focusing on Structural Damage / Work Process Risks (원전 차폐 콘크리트 구조물 제염해체공사 리스크 분류체계 구축: 구조적 / 작업 리스크를 중심으로)

  • Kim, Byeol;Lee, Joo-Sung;Ahn, Yong-Han
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.3
    • /
    • pp.38-45
    • /
    • 2018
  • The purpose of this study is to deduct the structural damage / work process risks factors which can be occurred during the decommissioning in the NPP containment concrete structure. To achieve these purpose, risk profile specified in the construction industry is analyzed, and the work process of NPP decommissioning and the construction project were matched based on the similarity of each works. Accordingly, human and physical risk factors are classified. Finally, the risk associated with the building structure and work process was classified as per their process activities, and risk typology explaining the disaster which put the structure, equipments, machine and workers in serious danger was developed.

A Brute-force Technique for the Stepping Stone Self-Diagnosis of Interactive Services on Linux Servers (리눅스 서버에서 인터렉티브 서비스 Stepping Stone 자가진단을 위한 brute-force 기법)

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.41-51
    • /
    • 2015
  • In order to hide their identities, intruders on the Internet often attack targets indirectly by staging their attacks through intermediate hosts known as stepping stones. In this paper, we propose a brute-force technique to detect the stepping stone behavior on a Linux server where some shell processes remotely logged into using interactive services are trying to connect other hosts using the same interactive services such as Telnet, Secure Shell, and rlogin. The proposed scheme can provide an absolute solution even for the encrypted connections using SSH because it traces the system calls of all processes concerned with the interactive service daemon and their child processes. We also implement the proposed technique on a CentOS 6.5 x86_64 environment by the ptrace system call and a simple shell script using strace utility. Finally the experimental results show that the proposed scheme works perfectly under test scenarios.