• Title/Summary/Keyword: Data Flow Diagram

Search Result 151, Processing Time 0.025 seconds

A Study on Architecting Method of a Welding Robot Using Model-Based System Design Method (모델기반 시스템 설계 방법을 이용한 용접로봇의 상부아키텍쳐 정의에 관한 연구)

  • Park Young-Won;Kim Jin-Ill
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.2
    • /
    • pp.152-159
    • /
    • 2005
  • This paper describes the application of a model-based system design method critical to complex intelligent systems, PSARE, to a welding robot development to define its top level architecture. The PSARE model consists of requirement model which describes the core processes(function) of the system, enhanced requirement model which adds technology specific processes to requirement model and allocates them to architecture model, and architecture model which describes the structure and interfaces and flows of the modules of the system. This paper focuses on the detailed procedure and method rather than the detailed domain model of the welding robot. In this study, only the top level architecture of a welding robot was defined using the PSARE method. However, the method can be repeatedly applied to the lower level architecture of the robot until the process which the robot should perform can be clearly defined. The enhanced data flow diagram in this model separates technology independent processes and technology specific processes. This approach will provide a useful base not only for improvement of a class of welding robots but also for development of increasingly complex intelligent real-time systems.

A Study on Cyber Security Requirements of Ship Using Threat Modeling (위협 모델링을 이용한 선박 사이버보안 요구사항 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.657-673
    • /
    • 2019
  • As various IT and OT systems such as Electronic Chart Display and Information System and Automatic Identification System are used for ships, security elements that take into account even the ship's construction and navigation environment are required. However, cyber security research on the ship and shipbuilding ICT equipment industries is still lacking, and there is a lack of systematic methodologies through threat modeling. In this paper, the Data Flow Diagram was established in consideration of stakeholders approaching the ship system. Based on the Attack Library, which collects the security vulnerabilities and cases of ship systems, STRIDE methodologies and threat modeling using the Attack Tree are designed to identify possible threats from ships and to present ship cyber security measures.

A Study on an Object oriented Modeling for the Satelite Control System Development reusing Structured Analysis and Design Approach (위성관제 시스템 개발을 위한 구조적 기법을 재사용한 객체 지향 모델링에 관한 연구)

  • 김재훈;정원찬;이상범
    • Journal of Astronomy and Space Sciences
    • /
    • v.15 no.2
    • /
    • pp.475-484
    • /
    • 1998
  • The object-oriented approach is a difficult method for engineers who are accustomed to other software development methods although it is an excellent software development approach. This paper presents a method for object-orineted modeling re-using DFD(Data Flow Diagram) and SC(Structure Chart) of structured analysis and design approach. This paper suggests an easy method for analysis and design using structured approach for object abstraction, which is one of the most difficult things in object-oriented approach.

  • PDF

Non-linear System Dynamics Simulation Modeling of Adolescent Obesity: Using Korea Youth Risk Behavior Web-based Survey (시스템다이내믹스를 활용한 청소년 비만의 비선형 시뮬레이션: 청소년 건강행태 온라인 조사 자료 활용)

  • Lee, Hanna;Park, Eun Suk;Yu, Jae Kook;Yun, Eun Kyoung
    • Journal of Korean Academy of Nursing
    • /
    • v.45 no.5
    • /
    • pp.723-732
    • /
    • 2015
  • Purpose: The purpose of this study was to develop a system dynamics model for adolescent obesity in Korea that could be used for obesity policy analysis. Methods: On the basis of the casual loop diagram, a model was developed by converting to stock and flow diagram. The Vensim DSS 5.0 program was used in the model development. We simulated method of moments to the calibration of this model with data from The Korea Youth Risk Behavior Web-based Survey 2005 to 2013. We ran the scenario simulation. Results: This model can be used to understand the current adolescent obesity rate, predict the future obesity rate, and be utilized as a tool for controlling the risk factors. The results of the model simulation match well with the data. It was identified that a proper model, able to predict obesity probability, was established. Conclusion: These results of stock and flow diagram modeling in adolescent obesity can be helpful in development of obesity by policy planners and other stakeholders to better anticipate the multiple effects of interventions in both the short and the long term. In the future we suggest the development of an expanded model based on this adolescent obesity model.

Spatio-temporal Load Analysis Model for Power Facilities using Meter Reading Data (검침데이터를 이용한 전력설비 시공간 부하분석모델)

  • Shin, Jin-Ho;Kim, Young-Il;Yi, Bong-Jae;Yang, Il-Kwon;Ryu, Keun-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.11
    • /
    • pp.1910-1915
    • /
    • 2008
  • The load analysis for the distribution system and facilities has relied on measurement equipment. Moreover, load monitoring incurs huge costs in terms of installation and maintenance. This paper presents a new model to analyze wherein facilities load under a feeder every 15 minutes using meter reading data that can be obtained from a power consumer every 15 minute or a month even without setting up any measuring equipment. After the data warehouse is constructed by interfacing the legacy system required for the load calculation, the relationship between the distribution system and the power consumer is established. Once the load pattern is forecasted by applying clustering and classification algorithm of temporal data mining techniques for the power customer who is not involved in Automatic Meter Reading(AMR), a single-line diagram per feeder is created, and power flow calculation is executed. The calculation result is analyzed using various temporal and spatial analysis methods such as Internet Geographic Information System(GIS), single-line diagram, and Online Analytical Processing (OLAP).

Deriving Macroscopic Fundamental Diagrams Using Probe Vehicle Data Based on DSRC (DSRC 기반 프로브 자료를 이용한 거시 교통류 모형 추정 방법)

  • Shim, Jisup;Yeo, Jiho;Lee, Sujin;Jang, Kitae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.29-41
    • /
    • 2017
  • In this study, we used individual trip data to estimate a macroscopic fundamental diagram (MFD) that relates flow (or production) to density (or state) in Daegu metropolitan city. The individual trip data were generated by processing data that were collected from DSRC-based (dedicated short range communication) traffic data collection system. Using the processed individual trip data, we first examined whether the assumptions for MFD are valid, and then the relation between outflow and accumulation was estimated in our study site. As a result, we found that i) the assumptions are valid to construct MFD; and ii) the reproducible and well-defined MFDs exist in the network level.

Structured Analysis of SNS for Development of Production Inventory System Fitted to Minor Enterprise (중소기업에 적합한 생산재고관리 시스템 개발을 위한 SNS 의 구조적 분석)

  • Jeon, Tae-Joon
    • IE interfaces
    • /
    • v.6 no.1
    • /
    • pp.47-54
    • /
    • 1993
  • Sequential Numbering System(SNS) is one of the production and inventory management system, which is more effective and practical to minor enterprises than Material Requirement Planning (MRP) system or Just-in-Time(JIT) system. The purpose of the paper is the structured analysis of SNS as the first phase of software development. Data Flow Diagram(DFD), Data Dictionary(DD), and Mini-Specs are used to analyze the system through the second level. The result can be exploited to SNS software design and programming.

  • PDF

A Study of Traffic Incident Flow Characteristics on Korean Highway Using Multi-Regime (Multi-Regime에 의한 돌발상황 시 교통류 분석)

  • Lee Seon-Ha;kang Hee-Chan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.1 s.6
    • /
    • pp.43-56
    • /
    • 2005
  • This research has examined a time series analysis(TSA) of an every hour traffic information such as occupancy, a traffic flow, and a speed, a statistical model of a surveyed data on the traffic fundamental diagram and an expand aspect of a traffic jam by many Parts of the traffic flow. Based on the detected data from traffic accidents on the Cheonan-Nonsan high way and events when the road volume decreases dramatically like traffic accidents it can be estimated from the change of occupancy right after accidents. When it comes to a traffic jam like events the changing gap of the occupancy and the mean speed is gentle, in addition to a quickness and an accuracy of a detection by the time series analyse of simple traffic index is weak. When it is a stable flow a relationship between the occupancy and a flow is a linear, which explain a very high reliability. In contrast, a platoon form presented by a wide deviation about an ideal speed of drivers is difficult to express by a statical model in a relationship between the speed and occupancy, In this case the speed drops shifty at 6$\~$8$\%$ occupancy. In case of an unstable flow, it is difficult to adopt a statistical model because the formation-clearance Process of a traffic jam is analyzed in each parts. Taken the formation-clearance process of a traffic jam by 2 parts division into consideration the flow having an accident is transferred to a stopped flow and the occupancy increases dramatically. When the flow recovers from a sloped flow to a free flow the occupancy which has increased dramatically decrease gradually and then traffic flow increases according as the result analyzed traffic flow by the multi regime as time series. When it is on the traffic jam the traffic flow transfers from an impeded free flow to a congested flow and then a jammed flow which is complicated more than on the accidents and the gap of traffic volume in each traffic conditions about a same occupancy is generated huge. This research presents a need of a multi-regime division when analyzing a traffic flow and for the future it needs a fixed quantity division and model about each traffic regimes.

  • PDF

A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling (위협모델링을 이용한 전기차 충전 인프라의 보안요구사항에 대한 연구)

  • Cha, Ye-Seul;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1441-1455
    • /
    • 2017
  • In order to build a secure electric vehicle charging infrastructure, security research is required because various data including charging and payment data are transmitted in the electric vehicle charging infrastructure. However, previous researches have focused on smart grid related security research such as power system infrastructure rather than charging infrastructure for electric vehicle charging. In addition, research on charging infrastructure is still lacking, and research using a systematic methodology such as threat modeling is not yet under way. Therefore, it is necessary to apply threat modeling to identify security threats and systematically analyze security requirements to build a secure electric vehicle charging infrastructure. In this paper, we analyze the electric vehicle charging infrastructure by accurately identifying possible threats and deriving objective security requirements using threat modeling including Data Flow Diagram, STRIDE, and Attack Tree.

A Study on the Design of CTI/VoIP Based Internet Call Systems (CTI/VoIP 기반 인터넷 콜시스템의 설계에 관한 연구)

  • Lee, Kang-Seok;Yum, Chang-Sun;Hwang, Gee-Hyun
    • IE interfaces
    • /
    • v.15 no.4
    • /
    • pp.391-400
    • /
    • 2002
  • The internet call systems using CTI(Computer Telephony Integration) functions are designed with system configuration, DFD(Data Flow Diagram) and ERD(Entity Relationship Diagram) in this paper. The internet call systems are constructed to cooperate with conventional CTI call center. The internet phone calls occurred from the web browser of customer can be connected throughout VoIP gateway and PBX to many counselors. The internet call systems can provide various services; customer information service, escorted browsing service, text chatting service, text sharing service, conference service, and statistical analysis service.