• Title/Summary/Keyword: control management model

Search Result 2,373, Processing Time 0.032 seconds

The European Excellence Model - an ″Excellent″ Model for Management Control\ulcorner

  • Park, Su-Mi -Dahigaard
    • International Journal of Quality Innovation
    • /
    • v.4 no.1
    • /
    • pp.92-115
    • /
    • 2003
  • In this paper some of the main management control theories are reviewed and six dominating paradigms are identified. The identified management control paradigms are compared and analysed in relationship with the European Excellence Model (EEM) in order to investigate whether the EEM can be adopted as a management control model. Based on the analysis. advantages as well as disadvantages of the EEM as control model are discussed.

Development of Automated Mechanical Transmission Model to Evaluate TCU Control Logic (TCU 제어로직 평가를 위한 AMT 모델 개발)

  • Oh, Joo-Young;Song, Chang-Sub
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.27 no.3
    • /
    • pp.118-126
    • /
    • 2010
  • The automated mechanical transmission(AMT) is composed of electronic control management(ECM) and automatic shift gear(ASG). The AMT has advantages which are high efficiency of manual transmissions(MT) and offer operation convenience similar to automatic transmissions(AT). However, it has defects that are the torque gap during gear shift transients and shift time is long. To reduce such defects, it is necessary practically to evaluate error and characteristics as developing simulation model before the control algorithm is applied. In this paper, models are composed of vehicle model and AMT shift control model. Particularly AMT shift control model consists of main clutch management model (MCM) and shift control management model(SCM). The developed models were verified by comparing the simulated and experimental results under the same operational conditions. It can also be used to evaluate shift algorithm.

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Software Design of Stores Management System based on the TMO Model (TMO 모델 기반 무장 관리 시스템 소프트웨어 설계)

  • Park, Hansol
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.13 no.1
    • /
    • pp.1-6
    • /
    • 2017
  • A stores management software which is embedded in the stores management system requires high-level reliability and real-time processing. It also required to implement and verify protocols which requires timing constraints to control various weapons. In this paper, we propose design methodology to design a stores management software and its support middleware based on the TMO (Time-triggered Message-triggered Object) model.

An Access Control Based Privacy Protection Model in ID Management System (ID관리시스템의 접근통제기반 프라이버시 보안모델)

  • Choi Hyang-Chang;Noh Bong-Nam;Lee Hyung-Hyo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.1-16
    • /
    • 2006
  • The vulnerability of privacy in the Identity Management System (IMS) is the most pressing concern of ordinary users. Uncertainty about privacy keeps many users away from utilization of IMS. Therefore, this paper proposes an access-control oriented privacy model for IMS. The proposed model protects privacy using access control techniques with privacy policies in a single circle of trust. We address characteristics of the components of for the proposed model and describe access control procedures. After that, we show the architecture of privacy enforcement and XML-based schema for privacy policies.

  • PDF

Development of a p Control Chart for Overdispersed Process with Beta-Binomial Model (베타-이항모형을 이용한 과산포 공정용 p 관리도의 개발)

  • Bae, Bong-Soo;Seo, Sun-Keun
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.2
    • /
    • pp.209-225
    • /
    • 2017
  • Purpose: Since traditional p chart is unable to deal with the variation of attribute data, this paper proposes a new attribute control chart for nonconforming proportions incorporating overdispersion with a beta-binomial model. Methods: Statistical theories for control chart developed under the beta-binomial model and a new approach using this control chart are presented Results: False alarm probabilities of p chart with the beta-binomial model are evaluated and demerits of p chart under overdispersion are discussed from three examples. Hence a concrete procedure for the proposed control chart is provided and illustrated with examples Conclusion: The proposed chart is more useful than traditional p chart, individual chart to treat observed proportions nonconforming as variable data and Laney p' chart.

Implementation of Remote Management Service using Access Control on OSGi Computing Environment (OSGi 컴퓨팅 환경에서 접근 제어를 이용한 원격 관리 서비스 구현)

  • Choi, Kyu-Sang;Jung, Heoun-Mam;Lee, Se-Hoon;Beak, Yong-Tae
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.109-115
    • /
    • 2006
  • In this paper, we proposed service security model and remote management service on OSGi computing environment. The model is used to make access control decisions like permission-based security inside the java2 platform. In model, policies are defined using a flat text file and include bundles. It method granted flexibility and extendability of access control of bundles and services. Also, we proposed service architecture efficiently for remote management service.

  • PDF

Update Cycle Detection Method of Control Limits using Control Chart Performance Evaluation Model (관리도 성능평가모형을 통한 관리한계선 갱신주기 탐지기법)

  • Kim, Jongwoo;Park, Cheong-Sool;Kim, Jun Seok;Kim, Sung-Shick;Baek, Jun-Geol
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.40 no.1
    • /
    • pp.43-51
    • /
    • 2014
  • Statistical process control (SPC) is an important technique for monitoring and managing the manufacturing process. In spite of its easiness and effectiveness, some problematic sides of application exist such that the SPC techniques are hardly reflect the changes of the process conditions. Especially, update of control limits at the right time plays an important role in acquiring a reasonable performance of control charts. Therefore, we propose the control chart performance evaluation index (CPEI) based on count data model to monitor and manage the performance of control charts. The CPEI could indicate the degree of control chart performance and be helpful to detect the proper update cycle of control limits in real time. Experiments using real manufacturing data show that the proper update intervals are made by proposed method.

Control system modeling of stock management for civil infrastructure

  • Abe, Masato
    • Smart Structures and Systems
    • /
    • v.15 no.3
    • /
    • pp.609-625
    • /
    • 2015
  • Management of infrastructure stock is essential in sustainability of society, and its analysis and optimization are studied in the light of control system modeling in this paper. At the first part of the paper, cost of stock management is analyzed based on macroscopic statistics on infrastructure stock and economical growth. Stock management burden relative to economy is observed to become larger at low economic growth periods in developed economies. Then, control system modeling of stock management is introduced and by augmenting maintenance actions as control input, dynamic behavior of stock is simulated and compared with existing time history statistics. Assuming steady state conditions, applicability of the model to cross sectional data is also demonstrated. The proposed model is enhanced so that both preventive and corrective maintenance can be included as system inputs, i.e., feedforward and feedback control inputs. Optimal management strategy to achieve specified deteriorated stock level with minimal cost, expressed in terms of preventive and corrective maintenance actions, is derived based on estimated parameter values for corrosion of steel bridges. Relative cost effectiveness of preventive maintenance is shown when target deteriorated stock level is lower.