• Title/Summary/Keyword: Information Engineering Methodology

Search Result 1,690, Processing Time 0.03 seconds

Efficient Signal Integrity Verification in Complicated Multi-Layer VLSI Interconnects (복잡한 다층 VLSI 배선구조에서의 효율적인 신호 무결성 검증 방법)

  • Jin, U-Jin;Eo, Yun-Seon;Sim, Jong-In
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.3
    • /
    • pp.73-84
    • /
    • 2002
  • Fast and accurate new capacitance determination methodology for non-uniform complicated multi-layer VLSI interconnects is presented. Since a capacitance determination of intricate multi-layer interconnects using 3-dimensional field-solver is not practical, quasi-3-dimensional methodology is presented. Interconnects with discontinuity (i.e., bend structure and different spacing between lines, etc.) are partitioned. Then, each partial capacitance of divided parts is extracted by using 2-dimensional extraction methodology. For a multi-layer interconnects with shielding layer, the system can be simplified by investigating a distribution of charge in it. Thereby, quasi-3-dimensional capacitance for multi-layer interconnects can be determined by combining solid-ground based 2-dimensional capacitance and shielding effect which is independently determined with layout dimensions. This methodology for complicated multi-layer interconnects is more accurate and cost-efficient than conventional 3-dimensional methodology It is shown that the quasi-3-dimensional capacitance methodology has excellent agreement with 3-dimensional field- solver-based results within 5% error.

Optimal Hierarchical Design Methodology for AESA Radar Operating Modes of a Fighter (전투기 AESA 레이더 운용모드의 최적 계층구조 설계 방법론)

  • Heungseob Kim;Sungho Kim;Wooseok Jang;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.281-293
    • /
    • 2023
  • This study addresses the optimal design methodology for switching between active electronically scanned array (AESA) radar operating modes to easily select the necessary information to reduce pilots' cognitive load and physical workload in situations where diverse and complex information is continuously provided. This study presents a procedure for defining a hidden Markov chain model (HMM) for modeling operating mode changes based on time series data on the operating modes of the AESA radar used by pilots while performing mission scenarios with inherent uncertainty. Furthermore, based on a transition probability matrix (TPM) of the HMM, this study presents a mathematical programming model for proposing the optimal structural design of AESA radar operating modes considering the manipulation method of a hands on throttle-and-stick (HOTAS). Fighter pilots select and activate the menu key for an AESA radar operation mode by manipulating the HOTAS's rotary and toggle controllers. Therefore, this study presents an optimization problem to propose the optimal structural design of the menu keys so that the pilot can easily change the menu keys to suit the operational environment.

A Study on the Methodology of Stereo-Scope Visualization Using Virtual Reality Technique (가상현실 기술을 이용한 입체영상 시각화 기법에 관한 연구)

  • Shin, Mi-Hae;Seo, Su-Seok;Kim, Eui-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1482-1487
    • /
    • 2010
  • Recently, Product and contents using virtual reality technique is spreading quickly. Visualization using virtual reality technique is provide a differentiated experience with existing visualization methodology by giving enhanced immersiveness to users. This paper is make a suggestion to a new methodology of stereo-scope visualization and talk about this utilization possibility. We proposed the design method of stereo-scope realization system that is composed at least two screen. through which users will feel more immersiveness and experience to virtual reality. The suggestion system of this paper will widely used in various industry such as virtual reality exhibitions, shows, games, training programs, etc.

A methodology for the standardization of structural design document structure using XML schema matching technique (XML 스키마 매칭 기법을 이용한 구조설계 문서구조 표준화 방법론)

  • Kim Bong-Geun;Jeong Yeon-Suk;Kim Dong-Hyun;Lee Sang-Ho
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2006.04a
    • /
    • pp.200-207
    • /
    • 2006
  • A new formal standardization methodology of the structural design document information is proposed in this paper. The standardization process is divided into three steps: pre-process of the collected sample document (CSD), construction of the document structure, and definition of the occurrence of each element in the document. During the pre-process, the detail document contents in the CSD are indexed with templates defined in this study, and the indexed CSD is translated into XML Schema (XSD) formal Afterwards the degree of confidences of all elements between the temporary standard document (TSD) and the translated CSD are calculated by using the XML schema matching algorithm; the TSD is then updated. This second step is repeated until all of the CSD are compared. In the final step, the common elements and unbounded elements are extracted by determining the occurrence of the temporary document elements, and the standardized document schema is exported in the XSD format. The case study dealing with the structural calculation documents show that the ,proposed methodology can be effectively used to build a XML -based information model of structural design documents.

  • PDF

Study on Information Security Management System Evaluation Methodology (국내환경에 적합한 정보보호관리체계 평가 방법론에 대한 연구)

  • Hong, Sung-Hyuk;Park, Jong-Hyuk;Seo, Jung-Taek
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.4
    • /
    • pp.384-391
    • /
    • 2008
  • These days, along with the information society, the value of information has emerged as a powerful factor for a company's development and sustainability, and therefore, the importance of the Information Security and Management System (ISMS) has emerged and become an integral part of all areas of business. In this paper, ISMS evaluation methods from around the world are compared and analyzed with the standards of various management guidelines, definitions, management of threats and vulnerability, approaches to result calculations, and the evaluation calculation indexes for domestic to propose the best method to evaluate the Information Security Management System that will fit the domestic environment.

  • PDF

Rating Prediction by Evaluation Item through Sentiment Analysis of Restaurant Review

  • So, Jin-Soo;Shin, Pan-Seop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.81-89
    • /
    • 2020
  • Online reviews we encounter commonly on SNS, although a complex range of assessment information affecting the consumer's preferences are included, it is general that such information is just provided by simple numbers or star ratings. Based on those review types, it is not easy to get specific information that consumers want and use it to make a decision for purchase. Therefore, in this study, we propose a prediction methodology that can provide ratings broken down by evaluation items by performing sentiment analysis on restaurant reviews written in Korean. To this end, we select 'food', 'price', 'service', and 'atmosphere' as the main evaluation items of restaurants, and build a new sentiment dictionary for each evaluation item. It also classifies review sentences by rating item, predicts granular ratings through sentiment analysis, and provides additional information that consumers can use to make decisions. Finally, using MAE and RMSE as evaluation indicators it shows that the rating prediction accuracy of the proposed methodology has been improved than previous studies and presents the use case of proposed methodology.

Projection-based Performance Measurement Methodology of Session Initiation Protocol for the Next Generation Convergence Network (차세대 네트워크를 위한 프로젝션 기법 기반 SIP 성능 측정 방법론)

  • Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2533-2540
    • /
    • 2009
  • Performance of processing protocols is one most important goal in a network or systems constituting the network. Measurement of performance, thus, is an essential element to not only establish the network but also develop systems. A projection in vector mathematics is the transformation of points and lines in one plane onto another plane by connecting corresponding points on the two planes with parallel lines. This is a method, as an application of vector mathematics, which is widely used in engineering as well to consider elements dedicated to the measurement object. This paper proposes a sound methodology for measuring the performance of the SIP protocol, which is based on the projection. The SIP protocol is a typical standard protocol for call-processing in the internet telephony of Next Generation Convergence Network. Owing to use the projected protocol which excludes unnecessary operation paths, the methodology can be effective in implementation and resource utilization. This paper also presents a process based on the proposed methodology to measure the performance of a SIP proxy server.

Development of Integrated Design Methodology for Relational Database Application -Focusing on Object-Oriented Analysis and Design Methodology- (관계형 데이터베이스 응용시스템을 위한 통합 설계방법론 개발 -객체지향 분석.설계 방법론을 중심으로-)

  • Joo, Kyung-Soo;Jho, Do-Hyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.25-34
    • /
    • 2011
  • In this paper we present an integrated design methodology for relational database based on object-oriented analysis and design. The integrated design methodology is based on business profile and has six phases. In the first phase, business use cases are identified and described by macroactivity diagrams and then the macroactivity diagrams are transformed to detailed business activity diagrams by using objects, object flows and business worker's responsibilities. In the third phase, the detailed business activity diagrams are transformed to business class diagrams that describe the static structure of the entire business system based on detailed business activity diagrams. In the four phase, the business class diagrams are transformed to class diagrams that represent the initial conceptual model of the target relational database. In the five phase, we add additional transformations on the class diagrams with generalization and specialization of associations, roles, activities, additional classes and redundant associations. Eventually, the final class diagrams are transformed to relational database schema. The methodology presented in this paper by applying that proposal for organic connection between object-oriented analysis and design methodology and relational database design methodology. And it will be able to deal with integration management. By the integrated design methodology, we can make more easily software systems based on relational database. In the case study, proposal integrated design methodology applied for a visa issuing system.