• Title/Summary/Keyword: Information Engineering Methodology

Search Result 1,690, Processing Time 0.04 seconds

Real-time Risk Measurement of Business Process Using Decision Tree (의사결정나무를 이용한 비즈니스 프로세스의 실시간 위험 수준 측정)

  • Kang, Bok-Young;Cho, Nam-Wook;Kim, Hoon-Tae;Kang, Suk-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.4
    • /
    • pp.49-58
    • /
    • 2008
  • This paper proposes a methodology to measure the risk level in real-time for Business Activity Monitoring (BAM). A decision-tree methodology was employed to analyze the effect of process attributes on the result of the process execution. In the course of process execution, the level of risk is monitored in real-time, and an early warning can be issued depending on the change of the risk level. An algorithm for estimating the risk of ongoing processes in real-time was formulated. Comparison experiments were conducted to demonstrate the effectiveness of our method. The proposed method detects the risks of business processes more precisely and even earlier than existing approaches.

A Study of Sensor Reasoning for the CBM+ Application in the Early Design Stage (CBM+ 적용을 위한 설계초기단계 센서선정 추론 연구)

  • Shin, Baek Cheon;Hur, Jang Wook
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.18 no.1
    • /
    • pp.84-89
    • /
    • 2022
  • For system maintenance optimization, it is necessary to establish a state information system by CBM+ including CBM and RCM, and sensor selection for CBM+ application requires system process for function model analysis at the early design stage. The study investigated the contents of CBM and CBM+, analyzed the function analysis tasks and procedures of the system, and thus presented a D-FMEA based sensor selection inference methodology at the early stage of design for CBM+ application, and established it as a D-FMEA based sensor selection inference process. The D-FMEA-based sensor inference methodology and procedure in the early design stage were presented for diesel engine sub assembly.

A Study of linking methodology of Direct Load Control and Unit Commitment Considering System Spinning Reserve Characteristics (계통운전예비력특성을 감안한 직접부하제어와 기동정지계획의 연계방법에 관한 연구)

  • Lee, Buhm
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.826-832
    • /
    • 2003
  • This paper presents a new linking methodology of direct load control(DLC) and unit commitment(UC) considering system spinning reserve characteristics. To consider system spinning reserve characteristics, we formulate new constraints. And to link DLC and UC, we employed 3-Dimensional dynamic programming which has DLC state, UC state, and stage. As a result, economical DLC and UC schedule of the power system is possible. This method is applied to the test system, and the usefulness of the method is verified.

Construction of IAST Model for Agile Process Design with Holistic Concept (전체론적 접근으로서 기민한 프로세스 디자인을 위한 IAST 모델의 건설)

  • Leem, Young-Moon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.24 no.1
    • /
    • pp.1-9
    • /
    • 1998
  • In a competitive environment, systems design should be agile to accomplish business goal. However, there are often significant problems with systems design that is manifested in the fact that there are no current techniques to apply rigorous mathematics to semantic conveyance in the design framework. As a promising solution, this paper introduces situation theory (ST) and provides an application of ST for information flow in manufacturing systems design (IDEF0). The described work in this paper addresses the procedure of creation of IAST Model (Inf-Act On in Situation Theory) which is the first application of ST in engineering fields. Finally, we show that IAST Model is very helpful for effective information capturing in systems by comparison existing methodology with developed methodology as a practical application of ST.

  • PDF

A Tor Security Policy using Exit Relay Methodology (출구 릴레이 방법론을 이용한 Tor 보안 정책)

  • Jang, Duk-Sung;Park, So-Yeon;Choi, Du-Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.6
    • /
    • pp.911-917
    • /
    • 2017
  • Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

Simulation Methodology for Diffusion Process in Poly-silicon (다결정 실리콘의 확산 공정 시뮬레이션)

  • Lee, Hoong-Joo;Lee, Jun-Ha
    • Journal of the Semiconductor & Display Technology
    • /
    • v.4 no.1 s.10
    • /
    • pp.23-27
    • /
    • 2005
  • This paper presents a simulation methodology for the poly-silicon oriented TCAD(technology-CAD) system. A computer simulation environment for the poly-silicon processing has been set up with the proper adoption of the two-stream model for ion-doping, diffusion, and defects inside of grain and on the grain boundary. After the simulator calibration, simulation results for the poly-silicon diffusion hat shown a good agreement with the SIMS data.

  • PDF

Manufacturing Feature Extraction for Sculptured Pocket Machining (Sculptured 포켓 가공을 위한 가공특징형상 추출)

  • 주재구;조현보
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.04a
    • /
    • pp.455-459
    • /
    • 1997
  • A methodology which supports the feature used from design to manufacturing for sculptured pocket is newly devlored and present. The information contents in a feature can be easily conveyed from one application to another in the manufacturing domain. However, the feature generated in one application may not be directly suitable for another whitout being modified with more information. Theobjective of the paper is to parsent the methodology of decomposing a bulky feature of sculptured pocket to be removed into compact features to be efficiently machined. In particular, the paper focuses on the two task: 1) to segment horizontally a bulky feature into intermediate features by determining the adequate depth of cut and cutter size and to generate the temporal precedence graph of the intermediate features and 2)to further decompose each intermediate feature vertical into smaller manufacturing features and to apply the variable feed rate to each small feature. The proposed method will provid better efficiency in machining time and cost than the classical method which uses a long string of NC codes necessary to remove a bulky fecture.

  • PDF

Network System Survivability: A Framework of Transmission Control Protocol with Software Rejuvenation Methodology (네트워크 시스템 생존성 : 소프트웨어 재활기법을 이용한 TCP의 프레임워크)

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.121-125
    • /
    • 2003
  • In this paper, we propose a framework of Transmission Control Protocol with Software Rejuvenation methodology, which is applicable for network system survivability. This method is utilized to improve the survivability because it can limit the damage caused by successful attacks. The main objectives are to detect intrusions in real time, to characterize attacks, and to survive in face of attacks. To counter act the attacks' attempts or intrusions, we perform the Software Rejuvenation methods such as killing the intruders' processes in their tracks, halting abuse before it happens, shutting down unauthorized connection, and responding and restarting in real time. These slogans will really frustrate and deter the attacks, as the attacker can't make their progress. This is the way of survivability to maximize the deterrence against an attack in the target environment. We address a framework to model and analyze the critical intrusion tolerance problems ahead of intrusion detection on Transmission Control Protocol (TCP).

  • PDF

Advanced Self-organizing Neural Networks with Fuzzy Polynomial Neurons : Analysis and Design

  • Oh, Sung-Kwun;Lee , Dong-Yoon
    • KIEE International Transaction on Systems and Control
    • /
    • v.12D no.1
    • /
    • pp.12-17
    • /
    • 2002
  • We propose a new category of neurofuzzy networks- Self-organizing Neural Networks(SONN) with fuzzy polynomial neurons(FPNs) and discuss a comprehensive design methodology supporting their development. Two kinds of SONN architectures, namely a basic SONN and a modified SONN architecture are dicussed. Each of them comes with two types such as the generic and the advanced type. SONN dwells on the ideas of fuzzy rule-based computing and neural networks. Simulation involves a series of synthetic as well as experimental data used across various neurofuzzy systems. A comparative analysis is included as well.

  • PDF

A Study on the Software Reliability of Operational Stage S/W (운영중인 소프트웨어의 신뢰도에 관한 연구)

  • Che, Gyu-Shik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.445-450
    • /
    • 2009
  • One method to improve quality before releasing of S/W after development is to enhance the reliability, whose direct methodology is to detect and revise fault through testing. Once the S/W is released because it meets the target reliability, the operational reliability problem arises. It is obvious the operational reliability different from that of testing stage depending on the condition whether it is universal(package) S/W or dedicated S/W. I propose the methodology to calculate operational software reliability of universal and dedicated S/W in this paper.