• Title/Summary/Keyword: 룰 기반

Search Result 197, Processing Time 0.034 seconds

A Study on Construction of Domain Ontology in Third-party Logistics (제3자 물류 환경에서 도메인 온톨로지 구축)

  • Gao, Li;Koh, Jin-Gwang;Bae, Si-Yeong;Lee, Hyun-Chang;Choi, Hyun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.235-241
    • /
    • 2011
  • A large number of industry and trade circulation enterprises integrate logistics resource. They give links of product transport to some professional logistics enterprises in order to reduce costs. We call these professional logistics enterprises as the Third-party Logistics. As the development of the computer and internet, the suppliers, buyers and the Third-party Enterprises connect each other with internet. And different company use different management software, so heterogeneous data become a big problem of the information system for Third-party Enterprises. We built the logistics ontology with prot$\'{e}$g$\'{e}$, and translate it in OWL. We also built the rules for Logistics Ontology to improve the limitations of the OWL. Then we design the intelligent system for 3PL Enterprises Distribution Center based on Logistics Ontology and Logistics Rules. At final, we give an example to show the workflow visually.

A Study of Password Management System for Improves the Availability and Efficiency (효율성과 가용성을 향상시킨 패스워드 관리시스템 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.150-153
    • /
    • 2013
  • By the development of IT, most business has been processed on the IT solution-based servers has increased Therefore, the importance of security of the server is highlighted. And the need for password management server efficient and safe is raised. There is a need to change at least 8 characters to mix the numbers and letters and password change passwords on a regular basis, you need a password for each system account is set in a different way, but the continuation of the system there is a tendency to password problems occur problems caused by the limits of the introduction of human resources and introduction basis occurs. The password management feature, though it is expensive is partially providing integrated access control solutions at home and abroad, there is a drawback that stresses the traffic on the server. Future, we conducted a study of password management solutions for the server of the server is determined IT transformation trend of non-IT field to accelerate, is continuously increasing it accordingly.

  • PDF

A Study on Smart EDR System Security Development (Smart EDR 시스템구축을 위한 보안전략과 발전방안)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.41-47
    • /
    • 2020
  • In the corporate information system environment, detecting and controlling suspicious behaviors occurring at the end point of the actual business application is the most important area to secure the organization's business environment. In order to accurately detect and block threats from inside and outside, it is necessary to be able to monitor all areas of all terminals in the organization and collect relevant information. In other words, in order to maintain a secure business environment of a corporate organization from the constant challenge of malicious code, everything that occurs in a business terminal such as a PC beyond detection and defense-based client security based on known patterns, signatures, policies, and rules that have been universalized in the past. The introduction of an EDR solution to enable identification and monitoring is now an essential element of security. In this study, we will look at the essential functions required for EDR solutions, and also study the design and development plans of smart EDR systems based on active and proactive detection of security threats.

A Case Study on Application of Dispatching Rule-Based Advanced Planning and Scheduling (APS) System (디스패칭 룰 기반의 Advanced Planning and Scheduling (APS) 시스템 활용 사례연구)

  • Lee, Jae-yong;Shin, Moonsoo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.78-86
    • /
    • 2015
  • Up-to-date business environment for manufacturers is very complex and rapidly changing. In other words, companies are facing a variety of changes, such as diversifying customer requirements, shortening product life cycles, and switching to small quantity batch production. In this situation, the companies are introducing the concept of JIT (just-in-time) to solve the problem of on-time production and on-time delivery for survival. Though many companies have introduced ERP (enterprise resource planning) systems and MRP (material requirement planning) systems, the performance of these systems seems to fall short of expectations. In this paper, the case study on introducing an APS (advanced planning and scheduling) system based on dispatching rules to a machining company and on finding a method to establish an efficient production schedule is presented. The case company has trouble creating an effective production plan and schedule, even though it is equipped with an MRP-based ERP system. The APS system is applied to CNC (computer numerical control) machines, which are key machines of the case company. The overall progress of this research is as follows. First, we collect and analyze the master data on individual products and processes of the case company in order to build a production scheduling model. Second, we perform a pre-allocation simulation based on dispatching rules in order to calculate the priority of each order. Third, we perform a set of production simulations applying the priority value in order to evaluate production lead time and tardiness of pre-defined dispatching rules. Finally, we select the optimal dispatching rule suitable for work situation of the case company. As a result, an improved production schedule leads to an increase in production and reduced production lead time.

An Empirical Analysis on Long Tail Patterns with Online Daily Deals (소셜 커머스 시장의 롱테일 현상에 대한 실증 연구)

  • Jeon, Seongmin
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.119-129
    • /
    • 2014
  • The renowned Pareto rule of 80/20 has been challenged in the electronic marketplace with the emergence of long tail economy. Mass customization on top of the Internet infrastructure is expected to explain these changes of product concentration. In this paper, we empirically analyzed the micro-transactional data of a Groupon-like daily deal web site to identify the changes of product and customer concentration. The results show the long tail pattern aligned with the previous research on the e-commerce literature on the long tail. We find that the notification setting on email or SMS about daily deal influences the patterns of sales concentration. The information through email and SMS is expected to enable consumers to know about daily bargains and purchase the coupons eventually. However, the email notification for niche products results in the decreased sales while the SMS notification for overall product promotes overall products.

Study on the Buried Semiconductor in Organic Substrate (SoP-L 기술 기반의 반도체 기판 함몰 공정에 관한 연구)

  • Lee, Gwang-Hoon;Park, Se-Hoon;Yoo, Chan-Sei;Lee, Woo-Sung;Kim, Jun-Chul;Kang, Nam-Kee;Yook, Jong-Gwan;Park, Jong-Chul
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.06a
    • /
    • pp.33-33
    • /
    • 2007
  • SoP-L 공정은 유전율이 상이한 재료를 이용하여 PCB 공정이 가능하고 다른 packaging 방법에 비해 공정 시간과 비용이 절약되는 잠정이 있다. 본 연구에서는 SoP-L 기술을 이용하여 Si 기판의 함몰에 판한 공정의 안정도와 함몰 시 제작된 때턴의 특성의 변화에 대해 관찰 하였다. Si 기판의 함몰에 Active device를 이용하여 특성의 변화를 살펴보고 공정의 안정도를 확립하려 했지만 Active device는 측정 시 bias의 확보와 특성의 민감한 변화로 인해 비교적 측정이 용이하고 공정의 test 지표를 삼기 위해 passive device 를 구현하여 함몰해 보았다. Passive device 의 제작 과정은 Si 기판 위에 spin coating을 통해 PI(Poly Imide)를 10um로 적층한 후에 Cr과 Au를 seed layer로 증착을 하였다. 그리고 photo lithography 공정을 통하여 photo resister patterning 후에 전해 Cu 도금을 거쳐 CPW 구조로 $50{\Omega}$ line 과 inductor를 형성하였다. 제작 된 passive device의 함몰 전 특성 추출 data와 SoP-L공정을 통한 함몰 후 추출 data 비교를 통해 특성의 변화와 공정의 안정도를 확립하였다. 차후 안정된 SoP-L 공정을 이용하여 Active device를 함몰 한다면 특성의 변화 없이 size 룰 줄이는 효과와 외부 자극에 신뢰도가 강한 기판이 제작 될 것으로 예상된다.

  • PDF

Assessment of Climate Change Impact on Downstream Flow by Dam Operations during the Drawdown Period (기후변화가 이수기 댐운영에 따른 하류하천유량에 미치는 영향 평가)

  • Park, Jong-Yoon;Ha, Rim;Jung, In-Kyun;Kang, Boo-Sik;Chung, Se-Woong;Kim, Seong-Joon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.157-157
    • /
    • 2012
  • 본 연구에서는 충주댐유역($6,642km^2$)을 대상으로 미래 기후변화가 다목적댐의 이수운영에 따른 하류하천유량에 미치는 영향을 평가하고자 하였다. 이를 위해, 물리적 기반의 장기유출모형인 SWAT(Soil and water assessment tool) 모형과 저수지의 홍수조절, 용수공급계획, 저수지 제약사항 조사 및 실시간 의사결정지원이 가능한 HEC-ResSim 모형을 적용하였다. 먼저, 미래 댐유입량 산정을 위해 IPCC(Intergovernmental panel on climate change)에서 제공하는 A1B 배출시나리오를 포함하는 MIROC3.2 hires 모형의 결과로부터 충주댐 유역의 총 6개 기상관측소에 대한 과거 30년(1997~2006) 실측자료를 바탕으로 미래 온도와 강수에 대한 편이보정(Bias correction) 및 상세화(Downscaling) 과정을 통하여 미래 기후자료(2040s, 2080s)를 생산하였다. 그 결과, 미래 연평균 온도는 기준년도인 2010년에 비해 최대 $+4.8^{\circ}C$(2080s)의 온도증가를 보였으며, 강수량의 경우 여름과 가을 강수량이 다소 감소하였으나 연평균 강수량은 최대 +34.4%(2080s) 증가하는 것으로 전망되었다. 기후변화에 따른 충주댐의 유입량 산정은 SWAT모형을 이용하여 수자원공사에서 제공하는 1995~2010년까지의 일별 댐유입량 자료를 제공받아 모형의 보정 및 검증을 실시하였다. 기후변화 시나리오 적용에 따른 연평균 댐 유입량은 2080s에 39.8% 증가는 것으로 전망되었다. 이러한 댐유입량의 변화는 댐운영의 변화를 가져올 것으로 예상된다. 따라서, 본 연구에서는 HEC-ResSim모형을 이용하여 충주댐의 월별 용수공급계획(생공용수, 발전용수, 관개용수, 하천유지용수) 및 저수지 운영룰(Rule)에 따른 이수운영모의를 통해 미래 댐유입량 시나리오별 저수위변화 및 방류량을 산정하고 하류 하천의 유황변화를 분석하였다.

  • PDF

Design of the Secured SMTP Gateway for Spam-Mail Interception (스팸메일 차단을 위한 SMTP 보안 게이트웨이 설계)

  • Lee, Chang-Sung;Lee, Eun-Sun;Han, Young-Ju;Kim, Hee-Seung;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1087-1090
    • /
    • 2004
  • 인터넷이 발전함에 따라 기업의 업무, 커뮤니케이션 등이 온라인으로 전환되고 있으며, 정보 전달의 통로로써 전자 메일의 사용이 나날이 늘어남과 동시에 전자 메일을 통한 스팸메일의 폭발적인 증가로 인한 심각성 또한 대두되고 있다. 현재 스팸메일을 막기 위한 여러 가지 방법이 제안되었으나, 대부분 메일 서버내의 정책에 따른 메일 필터링 방식으로써 완벽한 스팸메일 탐지를 제공하지 못하며, 스팸메일로 인한 메일서버 및 네트워크 자원 손실 문제는 여전히 해결되지 않고 있다. 본 논문에서는 스팸메일 탐지율을 높이고 네트워크 내 자원 손실을 예방할 수 있는 SMTP 보안 게이트웨이를 제안하고자 한다. 본 SMTP 보안 게이트웨이는 스팸메일 차단 규칙에 의한 메일 필터링을 기본적으로 제공하고, 룰에 정의되지 않은 메일에 대해서는 사용자 선택에 기반한 메일 전송을 제공한다. 이는 규칙에 정의되지 않은 스팸메일에 대한 탐지 가능성을 높이며, 궁극적으로 메일서버의 자원 및 네트워크 자원의 가용성을 높일 수 있다.

  • PDF

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Policy-based In-Network Security Management using P4 Network DataPlane Programmability (P4 프로그래머블 네트워크를 통한 정책 기반 인-네트워크 보안 관리 방법)

  • Cho, Buseung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Recently, the Internet and networks are regarded as essential infrastructures that constitute society, and security threats have been constantly increased. However, the network switch that actually transmits packets in the network can cope with security threats only through firewall or network access control based on fixed rules, so the effective defense for the security threats is extremely limited in the network itself and not actively responding as well. In this paper, we propose an in-network security framework using the high-level data plane programming language, P4 (Programming Protocol-independent Packet Processor), to deal with DDoS attacks and IP spoofing attacks at the network level by monitoring all flows in the network in real time and processing specific security attack packets at the P4 switch. In addition, by allowing the P4 switch to apply the network user's or administrator's policy through the SDN (Software-Defined Network) controller, various security requirements in the network application environment can be reflected.