• Title/Summary/Keyword: 프레임 신뢰도

Search Result 486, Processing Time 0.026 seconds

Framework for Self-reconfigurable and Collaborative Supply Chains and Revenue Sharing Strategy based on Trust Models of Enterprises (자율 재구성형 협업 공급망 프레임워크 및 기업간 신뢰모델 기반 이익분배 전략 개발)

  • Lee, Ki-Youl;Ryu, Kwang-Yeol;Moon, Il-Kyeong;Jung, Moo-Young
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.4
    • /
    • pp.323-330
    • /
    • 2011
  • Globalization of market and diversification of customers' needs make enterprises to collaboration of participants in supply chain. To establish collaboration, supply chain must have the flexibility and reconfigurability, which are supported by fractal based supply chain management (FrSCM). In this paper, base on the FrSCM, formulation of trust model among the enterprises in the supply chain, and development of profit sharing strategies in the supply chain based on the trust model are investigated. To evaluate trust model, generation of enterprise's goal and its description, extraction and systematic composition of trust factors and trust evaluation are investigated. Based on the developed model, we developed the fuzzy inference engine to evaluate the trust value in terms of numerical value. And then revenue sharing strategies are developed based on the fractal concept and trust model for the collaborative SCM. The fractal concept is used to obtain the optimal production and transportation plans. In addition, the trust model will be integrated into the RS model. In such an RS model, the supply chain will obtain the maximum total profit and profit of each participant depends on its trust value.

Development of a Novel Integrated Evaluation Index for Freeway Traffic Data (고속도로 교통자료 품질 통합평가지표 개발)

  • PARK, Hyunjin;YOON, Mijung;KIM, Hae;OH, Cheol
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.4
    • /
    • pp.417-429
    • /
    • 2015
  • Evaluation of traffic data quality is a backbone of better traffic information and management systems because it directly affects the reliability of traffic information. This study developed an integrated index for evaluating the quality of archived intelligent transportation systems (ITS) data. Two novel indices including spatio-temporal consistency and severity of missing data were devised and integrated with existing indices such as availability and completeness. An evaluation framework was proposed based on the developed integrated index. Both analytical hierarchical analysis (AHP) technique and entropy method were adopted to derive mixed weighting values to be used for the integrated index. It is expected that the proposed methodology would be effectively used in enhancing the quality of traffic data as a part of traffic information system.

A Study for Security-Based Medical Information Software Architecture Design Methodology (의료정보보안 기반 소프트웨어 아키텍처 설계방법)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.35-41
    • /
    • 2013
  • What is an alternative to medical information security of medical information more secure preservation and safety of various types of security threats should be taken, starting from the software design. Interspersed with medical information systems medical information to be able to integrate the real-time exchange of medical information must be reliable data communication. The software architecture design of medical information systems and sharing of medical information security issues and communication phase allows the user to identify the requirements reflected in the software design. Software framework design, message standard design, design a web-based inter-process communication procedures, access control algorithm design, architecture, writing descriptions, evaluation of various will procedure the establishing architecture. The initial decision is a software architecture design, development, testing, maintenance, ongoing impact. In addition, the project will be based on the decision in detail. Medical information security method based on the design software architecture of today's medical information security has become an important task of the framework will be able to provide.

Study on Fatigue Life Estimation for Aircraft Engine Support Structure (항공기 엔진 지지구조물의 피로수명 해석에 관한 연구)

  • Hur, Jang-Wook
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.11
    • /
    • pp.1667-1674
    • /
    • 2010
  • The fatigue life is estimated while determining the reliability of aircraft structures. In this study, the estimation of fatigue life was carried out on the basis of a cumulative damage theory; the working S-N curve and the equivalent stress on the engine support structure significantly affect the safety of the aircraft. The maximum stress observed was 1,080 MPa in the case of scissors link under crash load condition, and there was a 5% margin for the allowable stress corresponding to the temperature reduction factor. The maximum stress was 876 MPa, and the stress equation coefficient had a maximum value of 0.019 MPa/N in the case of scissors link under fatigue loads. In the results of the fatigue life analysis, the safety life in a fretting area of scissors link upper part was 416,667 flight hour, and other parts showed to infinite life. Therefore, it was demonstrated that the fatigue life requirement of aircraft engine support structure (scissors link, straight link) could be satisfied.

Cepstral Feature Normalization Methods Using Pole Filtering and Scale Normalization for Robust Speech Recognition (강인한 음성인식을 위한 극점 필터링 및 스케일 정규화를 이용한 켑스트럼 특징 정규화 방식)

  • Choi, Bo Kyeong;Ban, Sung Min;Kim, Hyung Soon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.4
    • /
    • pp.316-320
    • /
    • 2015
  • In this paper, the pole filtering concept is applied to the Mel-frequency cepstral coefficient (MFCC) feature vectors in the conventional cepstral mean normalization (CMN) and cepstral mean and variance normalization (CMVN) frameworks. Additionally, performance of the cepstral mean and scale normalization (CMSN), which uses scale normalization instead of variance normalization, is evaluated in speech recognition experiments in noisy environments. Because CMN and CMVN are usually performed on a per-utterance basis, in case of short utterance, they have a problem that reliable estimation of the mean and variance is not guaranteed. However, by applying the pole filtering and scale normalization techniques to the feature normalization process, this problem can be relieved. Experimental results using Aurora 2 database (DB) show that feature normalization method combining the pole-filtering and scale normalization yields the best improvements.

A Study on the Construction of CIS(Cooperative Information System) based on CBD (CBD 기반의 CIS 구성에 관한 연구)

  • Kim, Haeng-Gon;Sin, Ho-Jun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.715-722
    • /
    • 2001
  • In recent years, we recognize a new paradigm in the development process:From object oriented development, to the development process which has focused on the use of standard components. In recent years a lot of research related to the component-based development has been done, especially in business domain. but still there are many open and unresolved problems in this area. such as established development process for a distributed environment, formal process, infrastructure for COTS, development and management tool considering maintenance to guarantee a proper treatment of components. It also required a service and an application integration for component. In this paper, we propose cooperative information systems (CIS) that supports component based development. It must address for component based systems to achieve their full potential. We identify a set of CIS organized 3-tier which is a presentation layer, business logic layer and data control layer. We also discuss the specific roles and activities for the layers. we also define the behavior and managed information for business logic layer as core level. As an illustration of the CIS, we present a successful considerations which is widely helpful to user when they make decision in component development and assemble. Also, we expect to component reusability and efficiency in business domain.

  • PDF

MPEG-21 Event Reporting Message Structure based on digital data broadcasting use case scenarios (디지털 데이터 방송 유즈케이스 시나리오에 기반한 MPEG-21 이벤트 리포팅 구조 설계)

  • 송영주;홍진우;문남미;지경희
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.399-409
    • /
    • 2003
  • In this paper, we present an Event Reporting which is one of the major items of MPEG-21 and exemplify two digital data broadcasting use case scenarios, and according1y we propose the Event Reporting message structure for MPEG-21 broadcasting contents that is based on these use case scenarios. Every interaction with a Digital Item in the multimedia framework can be called an Event. The need to standardize Event Reporting within the Multimedia Framework arise from the need to monitor and communicate amongst Peers and Users the Events relating to Digital Items and/or the programs and devices that operate on them at any given time. However, there are a number of difficulties in providing an accurate report about an Event. Different observers of the Event may have vastly different perspectives. In this paper, we describe a structure and vision of the Event Reporting. Besides we show the activities on MPEG-21 Event Reporting standardization.

Robust Data, Event, and Privacy Services in Real-Time Embedded Sensor Network Systems (실시간 임베디드 센서 네트워크 시스템에서 강건한 데이터, 이벤트 및 프라이버시 서비스 기술)

  • Jung, Kang-Soo;Kapitanova, Krasimira;Son, Sang-H.;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.37 no.6
    • /
    • pp.324-332
    • /
    • 2010
  • The majority of event detection in real-time embedded sensor network systems is based on data fusion that uses noisy sensor data collected from complicated real-world environments. Current research has produced several excellent low-level mechanisms to collect sensor data and perform aggregation. However, solutions that enable these systems to provide real-time data processing using readings from heterogeneous sensors and subsequently detect complex events of interest in real-time fashion need further research. We are developing real-time event detection approaches which allow light-weight data fusion and do not require significant computing resources. Underlying the event detection framework is a collection of real-time monitoring and fusion mechanisms that are invoked upon the arrival of sensor data. The combination of these mechanisms and the framework has the potential to significantly improve the timeliness and reduce the resource requirements of embedded sensor networks. In addition to that, we discuss about a privacy that is foundation technique for trusted embedded sensor network system and explain anonymization technique to ensure privacy.

The Framework for Cost Reduction of User Authentication Using Implicit Risk Model (내재적 리스크 감지 모델을 사용한 사용자 인증 편의성 향상 프레임워크)

  • Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1033-1047
    • /
    • 2017
  • Traditional explicit authentication, which requires awareness of the user's authentication process, is a burden on the user, which is one of main reasons why users tend not to employ authentication. In this paper, we try to reduce such cost by employing implicit authentication methods, such as biometrics and location based authentication methods. We define the 4-level security assurance model, where each level is mapped to an explicit authentication method. We implement our model as an Android application, where the implicit authentication methods are touch-stroke dynamics-based, face recognition based, and the location based authentication. From user experiment, we could show that the authentication cost is reduced by 14.9% compared to password authentication-only case and by 21.7% compared to the case where 6-digit PIN authentication is solely used.

A Validation Check of Simulation Model with the Model Transformation (모델변환에 의한 시뮬레이션 모델의 타당성 검사)

  • 정영식
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1992.10a
    • /
    • pp.9-9
    • /
    • 1992
  • 시뮬레이션(simulation)은 실 시스템(real system)의 효과적이고 효율적인 운영을 도모하기 위하여 실 시스템의 동작을 이해하고 분석, 예측, 평가하는 과학적인 문제해결 접근방법이다. 시뮬레이션 수행단계는 실 시스템의 행위를 정확히 반영하도록 타당한 모델을 구축하는 모델링 단계와 모델에 의도하는 명령어들을 컴퓨터 프로그램으로 작성하는 구현단계로 나누어진다. 시뮬레이션 모델은 시간, 상태, 확률변수, 상호규칙 등의 여러 관점에 따라 다양하게 존재하는데, DEVS(Descrete EVent system Specification) 모델은 연속적인 시간상에서 이산적으로 발생하는 사건에 따라 시스템의 상태를 분석할 수 있고 모델링 및 시뮬레이션 방법론의 형식화를 위한 견고한 이론적 기반을 제공하고 있다. 또한, DEVS 모델은 모듈적, 계층적 특성을 제공하고 집합론에 근거한 수학적 형식구조를 제공하여 실 시스템에 대한 체계적인 분석과정을 수행하게 되어 보다 현실적인 모델링을 가능하게 한다. 그러나 타당하지 못한 DEVS 모델이 구축되면 시뮬레이션을 통한 분석결과의 신뢰성이 떨어져 아무런 효과가 없고 경제적인 손실만이 따른다. DEVS 모델에 대한 기존의 타당성 검사가 많은 시간과 노력이 요구되고, 반복적인 DEVS 모델링 과정으로 인한 전문적이고 경험적인 지식을 요구한다. 또한, 모델설계자에 의해 설정된 실험 프레임하에서 DEVS 모델의 구성요소에 속하는 상태전이함수, 시간진행함수 및 출력함수에 대하여 commutative 성질의 보전성 검사가 어렵다는 문제점을 가지고 있다. 본 연구에서는 이와 같은 문제점을 해결하기 위하여, DEVS 모델에 대한 타당성 검사를 SPN(Stochastic Petri Net) 모델로 변환하여 SPN 모델을 이용하는 간단하고 효과적인 타당성 검사 방법을 제안한다. 먼저, DEVs 모델에 대한 개념과 기존의 DEVS 모델에 대한 타당성 검사 방법을 고찰하고 그 문제점에 대하여 자세히 설명한다. DEVS 모델의 타당성 검사에 이용하는 SPN 모델에 대한 개념과 DEVS 모델과 행위적으로 동등한 SNP 모델로 변환을 위한 관점을 제조명하다. 동일한 관점에서 두 모델의 상태표현이 같도록 DEVS 모델이 SPN 모델로 표현됨을 보이는 변환이론을 제시하고 변환이론을 바탕으로 모델 변환과정을 제시한다. 모델 변환이론과 변환고정을 기본으로 타당성 검사를 위한 새로운 동질함수(homogeneous function)를 정의하고 이와 함께 SPN 모델의 특성을 이용하여 DEVS 모델에 대한 타당성 검사 방법을 새롭게 제안한다.

  • PDF