• Title/Summary/Keyword: Efficiency of operations

Search Result 1,344, Processing Time 0.026 seconds

An Interactive Approach to Select Optimal Solution for MADM Problems with Preferential Dependence (성호종속을 허용하는 다속성 의사결정문제의 대화형 접근방법)

  • 이강인;조성구
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.20 no.2
    • /
    • pp.61-76
    • /
    • 1995
  • The "optimal" solution for a decision making problem should be the one that best reflects the decision-maker's preference. For MADM (Multi-Attribute Decision-Making) problems, however, finding an optimal solution is difficult, especially when the number of alternatives, or that of attributes is relatively large. Most of the existing mathematical approaches arrive at a final solution on the basis of many unrealistic assumptions, without reflecting the decision-maker's preference structure exactly. To remedy this, some interactive methods have been proposed, but most of them require a large amount of information growing exponentially as the number of alternatives, or that of attributes increases. Therefore it is difficult for the decision-maker to maintain consistency throughout the decision making process. In this paper, an interactive method which finds optimal solutions for deterministic MADM problems with many attributes and alternatives is proposed. Instead of considering all the attributes simultaneously, this method partitions all the attributes into several mutually independent subgroups and considers one of them at each of preordered steps, where the alternatives are eliminated until the optimal one is obtained. The efficiency of the method lies in the fact that the amount of neccessary information is reduced significantly, and even further if a suboptimal solution is acceptable to the decision-maker.ion-maker.

  • PDF

The Evaluation of Ship Motions in a Harbor along the Entrance Channel by Field Observation

  • Cho Ik-Soon
    • Journal of Navigation and Port Research
    • /
    • v.29 no.9
    • /
    • pp.777-782
    • /
    • 2005
  • Maritime transportation consists of various situations such as navigation in the ocean, ship handling at harbor entrances, cargo handling and mooring in harbors. Generally, ships are built for the purpose of currying people and materials upon the seas. In order to accomplish the mission, a ship must be built to withstand the rigors of heavy weather and waves. In particular, the safety of ship motions at the entering/departing harbor and mooring under the effects of waves is very important for ship operation from the viewpoint of marine engineering. Therefore, safety and efficiency during entrance, departure, and mooring are extremely important aspects in the evaluation of ship operations from viewpoints of ship motions. However, the ship motions near a harbor entrance are not observed or studied as much. In this paper, to evaluate the difficulty of ship operations, field observations were performed using a new observation system with high accuracy in typhoon seasons, and grasp was done concerning about the time series characteristic that ship motions change rapidly within a harbor. Namely, such observations enable the quantitative safety evaluation under the effects of waves during ships entering and departing harbors in heavy weather.

Secure and Energy-Efficient Join-Leave Operations in ZigBee Network

  • Kim, Bong-Whan;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2874-2892
    • /
    • 2013
  • Since security plays an important role in several ZigBee applications, such as Smart Energy and medical sensor applications, ZigBee Specification includes various security mechanisms to protect ZigBee frames and infrastructure. Among them, the Join and Leave operations of ZigBee are investigated in this paper. The current Join-Leave operation is protected by the network key (a kind of group key). We claim it is not adequate to employ the network key for such purpose, and propose a new Join-Leave operation protected by the application link key (a kind of pairwise key), which is based on a more efficient key management scheme than that of ZigBee. Hence, the original Join operation consists of a total of 12 command frames, while the new Join operation consists of only 6 command frames. In particular, the security of the proposed Join-Leave operation is equivalent to or better than that of the original Join-Leave operation. The new Join-Leave operation is extensively analyzed in terms of security and efficiency, and compared with the original Join-Leave operation of ZigBee.

A Study on the Status and Future Directions of IT Convergence Policy by the Ministry of Food, Agriculture, Forestry and Fisheries in Korea

  • Huang, Minghao;Park, Heun Dong;Moon, Junghoon;Choe, Young Chan
    • Agribusiness and Information Management
    • /
    • v.4 no.2
    • /
    • pp.22-31
    • /
    • 2012
  • Research and technology has been transforming the agriculture to agribusiness which encompasses all operations with all the connections from faming per se, to manufacture & distribution of production supplies and farm commodities. Further, with the revolutionary development of information technology in the last two decades, we cannot talk about agribusiness process alone without considering the information technology embedded in the artifact, process, and structure. Despite the emergence of precision agriculture (PA) which is supported by IT based innovations which can not only improve efficiency in farming operations but also contribute to environmental sustainability, the adoption of IT among farmers and in agriculture industry are rather low than expected. Thus, Korean government has been seeking to converge IT into food, agriculture, forestry and fisheries to improve the competency of the agribusiness, and much progress has been made. This paper investigated the status quo of the current IT convergence with Food, Agriculture, Forestry and Fisheries in Korea, and further proposed future policy directions.

  • PDF

Comprehensive Assessment on Risk Factors using Fuzzy Inference in Decommissioning Process (퍼지추론을 이용한 해체공정 중 리스크 요인의 통합 평가)

  • Lim, Hyeon Kyo;Kim, Hyunjung
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.4
    • /
    • pp.184-190
    • /
    • 2014
  • Decommissioning process of nuclear facilities consist of a sequence of problem solving activities, because there may exist not only working environments contaminated by radiological exposure but also industrial hazards such as fire, explosions, toxic materials, and electrical and physical hazards. Therefore, not a few countries in the world have been trying to develop appropriate counter techniques in order to guarantee safety and efficiency of the process. In spite of that, there still exists neither domestic nor international standard. Unfortunately, however, there are few workers who experienced decommissioning operations a lot in the past. As a solution, it is quite necessary to utilize experts' opinions for risk assessment in decommissioning process. As for an individual hazard factor, risk assessment techniques are getting known to industrial workers with advance of safety technology, but the way how to integrate those results is not yet. This paper aimed to find out an appropriate technique to integrate individual risk assessment results from the viewpoint of experts. Thus, on one hand the whole risk assessment activity for decommissioning operations was modeled as a sequence of individual risk assessment steps which can be classified into two activities, decontamination and dismantling, and on the other, a risk assessment structure was introduced. The whole model was inferred with Fuzzy theory and techniques, and a numerical example was appended for comprehension.

Design and Implementation of effective ECC Encryption Algorithm for Voice Data (음성 데이터 보안을 위한 효율적인 ECC 암호 알고리즘 설계 및 구현)

  • Kim, Hyun-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2374-2380
    • /
    • 2011
  • Many people is preferred to mVoIP which offers call telephone-quality and convenient UI as well as free of charge. On the other hand, security of mVoIP is becoming an issue as it using Internet network may have danger about wiretapping. Although traditionally encryption algorithm of symmetric key for security of voice data has been used, ECC algorithm of public key type has been preferring for encryption because it is stronger in part the strength of encryption than others. However, the existing way is restricted by lots of operations in poor mobile environment. Thus this paper proposes the efficiency of resource consumption way by reducing cryptographic operations.

Efficient Knowledge Base Construction Mechanism Based on Knowledge Map and Database Metaphor

  • Kim, Jin-Sung;Lee, Kun-Chang;Chung, Nam-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.9-12
    • /
    • 2004
  • Developing an efficient knowledge base construction mechanism as an input method for expert systems (ES) development is of extreme importance due to the fact that an input process takes a lot of time and cost in constructing an ES. Most ES require experts to explicit their tacit knowledge into a form of explicit knowledge base with a full sentence. In addition, the explicit knowledge bases were composed of strict grammar and keywords. To overcome these limitations, this paper proposes a knowledge conceptualization and construction mechanism for automated knowledge acquisition, allowing an efficient decision. To this purpose, we extended traditional knowledge map (KM) construction process to dynamic knowledge map (DKM) and combined this algorithm with relational database (RDB). In the experiment section, we used medical data to show the efficiency of our proposed mechanism. Each rule in the DKM was characterized by the name of disease, clinical attributes and their treatments. Experimental results with various disease show that the proposed system is superior in terms of understanding and convenience of use.

  • PDF

철도택배의 물류정보시스템 구축에 관한 연구

  • 이철식;송장근
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.7-10
    • /
    • 2001
  • The development of information communication technology leads the growth of logistic industry including delivery service as well as electronic commerce. The researchers predict that it will be still improving for the next several years. The logistic information system of railroad courier has been growing for a long time with small-package delivery transportation which is similar to the land-road delivery system. Despite of the long-time growth, it is recently in pain of the great loss since the 1990's, due to the failure to satisfy the customer's need for door-to-door delivery service. But the logistic information system of railroad still has the great potential. There are so many benefits such as timeliness, Punctuality, speed, multi-node storage base, transportation efficiency, energy frugality, environmental sociability, and so on. If the railroad logistic system plays a role of a portion of the nation-wide logistic with other logistic system, the synergy through the balancing logistic will also get much of international competitive advantages. So the objective of this research is to design the model and prototype of the web-based logistic system from which railroad service provider(Korean National Railroad), delivery service providers, and the customers can share the best effective delivery information.

  • PDF

Successive Max-min Connection-Ratio Preoblem:Routing with Fairness and Efficiency in Circuit Telecommunication Networks (연속적인 최대-최소 연결비율 문제: 회선망에서의 공정성 및 효율성을 보장하는 경로설정)

  • 박구현;우재현
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.2
    • /
    • pp.13-29
    • /
    • 1997
  • This paper considers a new routing problem, successive max-min connection ratio problem (SMCRP), arised in circuit telecommunication networks such as SONET and WDM optical transport network. An optimization model for SMCRP is established based on link-flow formulation. It's first optimization process is an integral version of maximum concurrent flow problem. Integer condition does not give the same connection-ratio of each node-pair at an optimal solution any more. It is also an integral multi-commodity flow problem with fairness restriction. In order to guarantee fairness to every node-pair the minimum of connection ratios to demand is maximized. NP- hardness of SMCRP is proved and a heuristic algorithm with polynomial-time bound is developed for the problem. Augmenting path and rerouting flow are used for the algorithm. The heuristic algorithm is implemented and tested for networks of different sizes. The results are compared with those given by GAMS/OSL, a popular commercial solver for integer programming problem.n among ferrite-pearlite matrix, the increase in spheroidal ratio with increasing fatigue limitation, 90% had the highest, 14.3% increasing more then 70%, distribution range of fatigue.ife was small in same stress level. (2) $\sqrt{area}_{max}$ of graphite can be used to predict fatigue limit of Ductile Cast Iron. The Statistical distribution of extreme values of $\sqrt{area}_{max}$ may be used as a guideline for the control of inclusion size in the steelmaking.

  • PDF

A Study on the Military Secret Management System Development Plan using RFID (RFID를 이용한 국방 비밀관리시스템 발전방안에 관한 연구)

  • Chung, Young-Ho;Jang, Worl-Su;Park, Mok-Min;Park, Jin-Woo
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.151-168
    • /
    • 2007
  • The secret management of the Korea Military is one of the most significant operation. But the present method of the Korea Military requires much manpower and time, also the range of an object of administration become wider. In this study, We look into an instance of KIDA's 'The Secret Management System Construction Project' which was the first case to incorporate RFID in secret management system. From this instance, We analyze the effect of RFID on security operation in terms of the efficiency, accuracy and usability of security administration. We also present expected problems and possible solutions when it is extended to the field unit.