• Title/Summary/Keyword: control management model

Search Result 2,382, Processing Time 0.03 seconds

A New Directionin the Advance of TM/TC System (물관리자동화시스템의 발전방향)

  • 고광돈;여운식
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 1999.10c
    • /
    • pp.99-104
    • /
    • 1999
  • In 2000 FFIA , FIA, RDC are united into new corporation. This corporation will manage rural water with TM/TC(Tele-Monitoring/Tele-Control) system. Most systems which were adopted in TM/TC system were Closed Control System which use exclusive network and protocol . Closed Control System can not support new corporation's requirement in water management system. Therefore, new corporation should adopt Open Control System as standard rural water management system. Open Control System support Fieldbus technology, TCP/IP various protocols, programming model, OPC which is essential to the water management program, and so on.

  • PDF

Apply a Model of CQI to the Hospital

  • Tsay W.D;Chen C.S;Lai M.C
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 1998.11a
    • /
    • pp.673-679
    • /
    • 1998
  • The paper aims to apply a model of continuous quality improvement (CQI) to Taiwan provincial Pin Ton hospital. Tools of quality control were used both total quality management (TQM) and quality control circle (QCC) in order to approach the objective of ${\ulcorner}$higher quality, higher efficiency, lower cost${\lrcorner}$. During two years, this hospital has organized thirteen QC circles that were classified three categories according to that objective: four circles work for higher quality; the other four circles work for higher efficiency; five circles for lower cost. After implementation, several results were found from two viewpoints. From viewpoint of tangibility, one of the most outcomes is to reduce labor cost from 56 persons to 28 persons of temporary employees. From viewpoint of intangibility, the result was evaluated using radar chart to compare the difference after improvement. This paper is going to report the process of CQI for the hospital management because it is a new issue in Taiwan since 1997

  • PDF

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

Development of Inventory Control System for Large-scale Retailers using Neural Network and (s*,S*) Policy (신경회로망과 (s*,S*) 정책을 이용한 대규모 유통업을 위한 재고 관리 시스템의 개발)

  • 김우주
    • The Journal of Information Systems
    • /
    • v.6 no.1
    • /
    • pp.223-256
    • /
    • 1997
  • Since the business scales of retailing companies become to be very large and the number of items dealt increases explosively, automation of inventory management becomes one of the most important issues to solve in retailing industry. In order to accomplish this automation of inventory management, there must be a great need to a method which can perform real-time decision making on inventory control in an automatic fashion, while communicating with inventory information systems like POS system and automatic warehousing system. But even in this circumstance, there are also many obstructions to such automation like varying demands, limited capacity of warehouse and exhibition room, need for strategic consideration on inventory control, etc., in a real sense. Due to these reasons, it seems very difficult that most large-scaled retailing companies get fully automated inventory management system. To overcome those difficulties and reflect them into inventory control, we propose a automated inventory control methodology for retailing industry based on neural network and policy model. Especially, policy model is devised to deal with dynamic varying demands and using this model, strategic goals on inventory can be considered into inventory control mechanism. Our proposed approach is implemented in workstation and its performance is also empirically verified also against to real case of one of the major retailing firm in Korea.

  • PDF

Strategy of Research for Developing Model of Community Based Non-Communicable Diseases Control and Prevention (지역사회 기반 만성질환 관리모형 구축을 위한 연구방안)

  • Park, Yoon Hyung
    • Health Policy and Management
    • /
    • v.26 no.1
    • /
    • pp.1-3
    • /
    • 2016
  • The prevalence of non-communicable disease (NCD) has been continuously increasing due to population ageing, and the change in consumption and lifestyle patterns. Cancers, cerebrovascular diseases, and hypertensive diseases have been the major causes of deaths in the Republic of Korea since 1983. Numerous studies have suggested the need for a sustained comprehensive treatment tailored for individual patients and recommend the development of a systematic program to manage NCD patients to provide such care. It's necessary to develop the Korean model of the community based NCD prevention and control, consisting strategy of community movement, education for the NCD patients, and partnership the primary care clinic with public health organization to meet the needs in community people.

The Impact of Information System Control and Audit on the Perceived Risk of the Computer Crime in Case of Financial Institutions (정보시스템통제 및 감사가 컴퓨터범죄의 인지된 위험에 미치는 영향: 금융기관을 중심으로)

  • Han, In-Gu;Yun, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.112-128
    • /
    • 1995
  • The information system control includes organizational structure, control mechanism, and management tools which contribute to accomplish the goals of information system: asset safeguarding, data integrity, effectiveness, and efficiency. Information system audit is the process to evaluate whether the information system accomplishs the goals. Information system auditor examine the reliability of information system control and suggest recommendations to improve the information system control. Both information system control and information system audit activities contribute to prevent and detect the computer crime for the organization. This paper proposes a causal model of information system control/audit and the perceived risk of computer crime, and tests the model using a survey on 38 financial institutions in Korea. Statistical results show that information system control and audit significantly reduce the computer crime risk perceived by the user group. The general control has a stronger impact than the application control. In addition, it turns out that the greater the deviation between the importance and the actual level of information system control is, the higher the perceived risk of computer crime is.

  • PDF

A Model on the OSI Fault Management Implementation for Effective Alarm Processing (효과적인 경보 처리를 위한 OSI 장애 관리 구현 모델)

  • 이재오;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.4
    • /
    • pp.537-548
    • /
    • 1993
  • The OSI fault management is composed of specific management functions such as the Alarm Reporting Function, Event Report Management Function, and Log Control Function. The fault management is to notify and manage the events and the alarm data which are transfered as the information of the fault management may be managed effectively. And it is necessary to design the model of the fault management properly by using these functions for the study of network management activities. Therefore, in this paper, the integrated management model of the Event Report Management and Log Control Function based on Alarm Reporting Function is investigated. Also, the system component of alarm collector which is added in the manager system for the effective fault management is studied and proposed.

  • PDF

Supplementary analyses of economic X over bar chart model

  • Jeon, Tae-Bo
    • Korean Management Science Review
    • /
    • v.12 no.1
    • /
    • pp.111-124
    • /
    • 1995
  • With the increasing interest of reducing process variation, statistical process control has served the pivotal tool in most industrial quality programs. In this study, system analyses have been performed associated with a cost incorporated version of a process control, a quadratic loss-based X over bar control chart model. Specifically, two issues, the capital/research investments for improvement of a system and the precision of a parameter estimation, have been addressed and discussed. Through the analysis of experimental results, we show that process variability is seen to be one of the most important sources of loss and quality improvement efforts should be directed to reduce this variability. We further derive the results that, even if the optimal designs may be sensitive, the model appears to be robust with regard to misspecification of parameters. The approach and discussion taken in this study provide a meaningful guide for proper process control. We conclude this study with providing general comments.

  • PDF

정보시스템 사용에 대한 내부통제 효과성이 정보역량에 미치는 영향에 관한 연구

  • Lee, Jae-Beom;Kim, Sang-Su;Lee, Jae-Cheol
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.58-63
    • /
    • 2007
  • Recently, as the management environments are changing rapidly and the uncertainty is becoming larger, the needs of internal control for management and IS become stronger. In order to construct a new internal control system for IS, it is necessary to evaluate the former research of the system. This study emphasizes the importance of effective internal control system, presents a conceptual framework for the preceding factors to consider, and verifies empirically the framework. This study sets the organization citizenship behavior, IS innovation resistance, and IT capability from the viewpoint of Socio-Technical system as the preceding factors for the effectiveness of internal control system. A research model, affecting the above factors on IS capability as a mediating variable of the internal control effectiveness for the use of IS, is set up. PLS-Graph 3.0 is used to verify the model. We found that the internal control effectiveness have affirmative effect on information capability, a surrogate variable of the IS effectiveness and a mediation effect is meaningful.

  • PDF

Design and Analysis of Role-based Security Management Model for Policy-based Security Management in SNMPv3 Network (SNMPv3 통신망의 정책기반 보안관리를 위한 역할기반 보안관리 모델의 설계 및 분석)

  • Ju, Gwang-Ro;Lee, Hyeong-Ho;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.573-584
    • /
    • 2001
  • Policy-Based Network Management (PBNM) architecture is to meet various needs of network users and to provide effective management facilities in distributed and large scale networks to network managers. In PBNM, network managers perform network management operations by stipulating a set of rules rather than control each network component. On the other hand, providing security services such as authentication, privacy of messages as well as a new flexible and extensible administration framework, SNMPv3 enables network managers to monitor and control the operation of network components more secure way than ever before. Despite of its enhanced security services, SNMPv3 has difficulties in managing distributed, large-scaled network because it does not provide centralized security management facilities. In this paper, we propose a new security model called Role-based Security Management model (RSM) with security management policy to support scalable and centralized security management for SNMP-based networks. Also, the structure and the operation of the security system as well as the efficiency analysis of RSM in terms of security management are also described.

  • PDF