• Title/Summary/Keyword: 재실행

Search Result 512, Processing Time 0.035 seconds

An Adaptive Business Process Mining Algorithm based on Modified FP-Tree (변형된 FP-트리 기반의 적응형 비즈니스 프로세스 마이닝 알고리즘)

  • Kim, Gun-Woo;Lee, Seung-Hoon;Kim, Jae-Hyung;Seo, Hye-Myung;Son, Jin-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.301-315
    • /
    • 2010
  • Recently, competition between companies has intensified and so has the necessity of creating a new business value inventions has increased. A numbers of Business organizations are beginning to realize the importance of business process management. Processes however can often not go the way they were initially designed or non-efficient performance process model could be designed. This can be due to a lack of cooperation and understanding between business analysts and system developers. To solve this problem, business process mining which can be used as the basis of the business process re-engineering has been recognized to an important concept. Current process mining research has only focused their attention on extracting workflow-based process model from competed process logs. Thus there have a limitations in expressing various forms of business processes. The disadvantage in this method is process discovering time and log scanning time in itself take a considerable amount of time. This is due to the re-scanning of the process logs with each new update. In this paper, we will presents a modified FP-Tree algorithm for FP-Tree based business processes, which are used for association analysis in data mining. Our modified algorithm supports the discovery of the appropriate level of process model according to the user's need without re-scanning the entire process logs during updated.

Approaches to Creating a Digital Encyclopedia of Korean Archaeology (한국고고학 디지털 사전 구축 방안 연구)

  • LEE Chorong
    • Korean Journal of Heritage: History & Science
    • /
    • v.56 no.2
    • /
    • pp.28-45
    • /
    • 2023
  • Although we have entered the era of digital transformation, there is currently no system that efficiently collects, manages, integrates, and services a large number of archaeological digital source materials produced as a result of cultural relics research, i.e., an intelligent integrated management and service platform for archaeological academic information. In this regard, the need to build a digital dictionary of Korean archaeology was confirmed by examining the problem of the Digital Encyclopedia of Korean Archaeology, which is currently available in PDF format on the web, the current status of the publication and use of the Dictionary of Korean Archaeology, and the cases of building digital platforms at home and abroad. Therefore, this paper aims to suggest a general direction for creating a digital encyclopedia of Korean archaeology based on the Dictionary of Korean Archaeology, which includes quality knowledge information, to reconsider the accessibility of archaeological data in conformity with data access limitations. The application of the series Dictionary of Korean Archaeology, published since 2001, and the necessity for digital transformation were examined, as well as the application of data from the archaeological data archiving platforms of Europe, the USA, Japan, and cases of establishing platforms corresponding to specialized encyclopedias from Korea. Based on these, a three-step implementation plan and detailed projects were suggested to create the Digital Encyclopedia of Korean Archaeology. Through this, we proposed the design of metadata for computerized records and the expansion to semantic (meaning-based) data that gives and shows the relationship information between the produced metadata as the implementation tasks to build the Digital Dictionary of Korean Archaeology. It is hoped that such research will help create an integrated intelligent management and service platform for archaeology, raise awareness, and provide a better understanding of Korean archaeology to the general public.

A Review of Salvage Archaeology in Korea and a Joint Research and Excavation Plan for North Korean Cultural Heritage (남북 문화유산 조사 현황과 공동조사를 위한 제언)

  • Choi, Jongtaik;Seong, Chuntaek
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.2
    • /
    • pp.20-37
    • /
    • 2019
  • Three Inter-Korea summits and a North Korea-USA summit that were previously unexpected provide a basis for an optimistic outlook for the future development of Korean archaeology. While Korean archaeology has witnessed a great advance since the mid-20th century, it also exhibits significant weaknesses in explaining cultural changes in prehistory and the early historical period in the Korean Peninsula due to the paucity of information on archaeological evidence of North Korea. Recent development of favorable conditions for research and excavations of North Korean cultural heritage could be a valuable opportunity for Korean archaeology to overcome the current adversity. Especially, given the expected large-scale SOC industrial project in North Korea, we need to prepare for the systematic research and excavation of archaeological materials. The present essay attempts to provide a suggestion for the joint archaeological expeditions to excavate and manage cultural resources in North Korea based on a critical review of previous salvage excavations in South Korea, such as those conducted before the construction of the Korean rapid transit railway system (KTX). We suggest that professional archaeologists should be included in the project and oversee the planning and design of road and railway constructions and other SOC projects in order to minimize the cost of trial and error processes that were well exemplified by the KTX salvage excavations. The Korean Archaeological Society and North Korean Archaeological Society may organize a common association that will supervise joint archaeological expeditions. Importantly, The Korean Archaeological Society and other related institutions should prepare to build an organization that conducts impending archaeological excavation in North Korea. While we likely face challenges and difficulties during the various stages of archaeological research and excavations in North Korea, only through thorough and systematic preparation can we avoid the destruction of valuable cultural heritage and find an opportunity for the further development of Korean archaeology.

A Study on the Determinants of Downsizing Method in Small Manufacturing Firms (중소제조기업의 다운사이징 방식의 결정요인에 관한 연구)

  • Park, Kwang-Seo;Chung, Hee-Kyun
    • Management & Information Systems Review
    • /
    • v.30 no.2
    • /
    • pp.133-159
    • /
    • 2011
  • This study was conducted about the various forms of downsizing in small manufacturing firms such as lay-offs, honorary retirement, wage cuts, reduction of assets, merging of organizations with similar functions. Specially the study was conducted among small manufacturing companies to investigate which factors play a role in deciding which method to use. As result, the study found out the form of downsizing varies according to the characteristics of the small manufacturing companies. In other words, it is the size and the growth form of the company which influences the form of downsizing, rather than the management experience of the company. Based on the result of the study, small firms tend to prefer form of downsizing which will have short term or immediate effect, depending on the condition of their organization. Also, this kind of slim down on workforce has positive effect on the management achievement. However, there is also a negative effect on the moral of the members of the organization and the level of concentration in the work field. Therefore, it is better for small manufacturing companies to seek other long term means to increase its' productivity and renovation in management, and avoid method which will have direct effect on the moral of the members.

  • PDF

Limits to the Institutional Formation and Operation for the Network City : A Case Study of Daegu-Gyeongbuk Free Economic Zone (네트워크 도시의 제도적 구성과 운영의 한계 - 대구경북경제자유구역을 사례로 -)

  • Jung, Sung-Hoon;Jung, Hye-Yoon
    • Journal of the Korean association of regional geographers
    • /
    • v.21 no.3
    • /
    • pp.461-473
    • /
    • 2015
  • The aim of this paper is to explore limits to the institutional formation and operation for network city as a case study of Daegu-Gyeongbuk Free Economic Zone (DGFEZ) in the introductory context. The legal and institutional framework of FEZ in Korea can be characterized by multi-dimensional, vertical or horizontal governance. However, in terms of its implementation process of DGFEZ, the density of the public-private network becomes relatively week, and consequently, the level of participation by local people was not institutionalized in a more collaborative way. With respect to the network city for DGFEZ, while at the initial stage its plan was highly focused upon the conceptual framework of the city, the process of its implementation was based upon a polarization strategy of individual unit and a performance-oriented type. Other evidence for it is that administrative organization in DGFEZ changed from development-based throughout investment attraction-focused up to region-based department. Therefore, there are limits to the institutional formation and operation for the network city in the context of DGFEZ.

  • PDF

An Analysis on the Roles and Strategies of Imagistic Simulation Observed in Mental Simulation about Problematic Situations of Prediction (예측의 문제 상황에 대한 멘탈 시뮬레이션에서 나타난 심상 시뮬레이션의 역할과 전략 분석)

  • Ko, Min-Seok;Yang, Il-Ho
    • Journal of The Korean Association For Science Education
    • /
    • v.34 no.3
    • /
    • pp.247-260
    • /
    • 2014
  • Purpose of this study is to analyze the roles and strategies of imagistic simulation observed in mental simulation about problematic situation of prediction, and thereby identify the process of generating prediction, explanation and sophistication. For this study, a framework for mental simulation process and strategy based on literary research was developed and content was validated from four experts of science education. This study was participated by 10 preliminary elementary school teachers, and a total of 20 cases were gathered for two thought experiment tasks based on the think-aloud method. The results were as follows: First, mental simulation process described based on the seven elements of 'perception,' 'interpretation,' 'statement of initial representation,' 'running imagistic simulation,' 'identifying result of simulation,' 'identifying alignment' and 'restatement structured representation.' The study confirmed that initial representation by interpreting related concepts and running imagistic simulation a number of times to develop explanation and prediction. Second, the study identified the use of strategies to enhance simulation such as 'zoom in,' 'partition,' 'dimensional enhancement,' 'dimensional reduction,' 'remove,' 'replace' and 'extreme case.' Running spatial transformation that uses strategy to enhance simulation contributed to discovering mechanism elements in problematic situations.

An Efficient Peer Connection Scheme for Pure P2P Network Environments (순수 P2P 네트워크 환경을 위한 효율적인 피어 연결 기법)

  • 김영진;엄영익
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.11-19
    • /
    • 2004
  • P2P network environments provide users with direct data transmission and sharing facilities and those environments can be classified into hybrid P2P network environments and pure P2P network environments according to the arbitration mechanism among the peers in the network. In hybrid P2P network environments, there exists a server that maintains index information for the data to be shared and network isolation does not occur because every peer always keeps connection to the server. In pure P2P network environments, however, each peer directly connects to another peer and gets services without server intervention, and so, network isolation can occur when the mediating peer fails to work. In this paper. we propose a scheme for each peer to keep connection to other peers continuously by maintaining IP addresses of its neighbor peers and connecting to the peers when the mediating peer fails to work. Although the P2P application that uses our proposed framework should obtain one or more IP addresses of the neighbor peers manually, after instantiation, the application can do its job while maintaining connection to the network continuously and automatically. To evaluate our proposed scheme, we measured and analyzed the time for a peer to reconnect to the network when the mediating peer fails and the network isolation occurs.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Design of an Efficient Concurrency Control Algorithms for Real-time Database Systems (실시간 데이터베이스 시스템을 위한 효율적인 병행실행제어 알고리즘 설계)

  • Lee Seok-Jae;Park Sae-Mi;Kang Tae-ho;Yoo Jae-Soo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.67-84
    • /
    • 2004
  • Real-time database systems (RTDBS) are database systems whose transactions are associated with timing constraints such as deadlines. Therefore transaction needs to be completed by a certain deadline. Besides meeting timing constraints, a RTDBS needs to observe data consistency constraints as well. That is to say, unlike a conventional database system, whose main objective is to provide fast average response time, RTDBS may be evaluated based on how often transactions miss their deadline, the average lateness or tardiness of late transactions, the cost incurred in transactions missing their deadlines. Therefore, in RTDBS, transactions should be scheduled according to their criticalness and tightness of their deadlines, even If this means sacrificing fairness and system throughput, And It always must guarantee preceding process of the transaction with the higher priority. In this paper, we propose an efficient real-time scheduling algorithm (Multi-level EFDF) that alleviates problems of the existing real-time scheduling algorithms, a real-time concurrency control algorithm(2PL-FT) for firm and soft real-time transactions. And we compare the proposed 2PL F[ with AVCC in terms of the restarting ratio and the deadline missing ratio of transactions. We show through experiments that our algorithms achieve good performance over the other existing methods proposed earlier.

  • PDF

A Practical Process Model for Clients in Service-Oriented Architecture (서비스 지향 아키텍처의 클라이언트를 위한 실용적 프로세스 모델)

  • Lee, Jae-Yoo;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.513-522
    • /
    • 2008
  • Service-Oriented Architecture(SOA) is an method to develop applications by developing and publishing reusable services which potentially be used in various applications, and discovering and composing right services dynamically. SOA adopts a paradigm of publish-discover-invoke, which is considerably different from object-oriented and component-based development(CBD) approaches. The service in SOA is different from function in procedural programming, object in object-oriented programming, and component in CBD, and its fundamental requirement is a high level of reusability and applicability. In SOA, service providers and service consumers are loosely coupled since the providers try to develop reusable services and the consumers try to locate right services without knowing much about the providers and their published services. Moreover, the process of searching, choosing and invoking right services is not presented in conventional programming paradigms. Therefore, conventional approaches to developing user interfaces and invoking the functionality on servers through JSP, and RMI in object-oriented programming cannot well be applicable to designing clients’ programs in SOA. Therefore, there is a high demand for a practical and systematic process for developing clients’ applications, and the such a process should be devised by considering key characteristics of services and SOA. However, little work on this area is known to date, and there has not a process for client side just except few guide lines for developing service client. In this paper, we propose a practical and systematic development process for developing clients' applications in SOA. Then, we define instructions for carrying out each activity in the process. To show the applicability of the proposed work, we show the result of applying our process in developing a services application for searching and booking hotels.