• Title/Summary/Keyword: Audit techniques

Search Result 46, Processing Time 0.033 seconds

A Study on the use of Automotive Testing Data for Updating Quality Assurance Models (새로운 품질보증(品質保證)을 위한 자동검사(自動檢査)데이터의 활용(活用)에 관(關)한 연구(硏究))

  • Jo, Jae-Ip
    • Journal of Korean Society for Quality Management
    • /
    • v.11 no.2
    • /
    • pp.25-31
    • /
    • 1983
  • Often arrangement for effective product assessment and audit have not been completely satisfactory. The underlying reasons are: (a) The lack of early evidence of new unit quality. (b) The collection and processing of data. (c) Ineffective data analysis techniques. (d) The variability of information on which decision making is based. Because of the nature of the product the essential outputs from an affective QA organization would be: (a) Confirmation of new unit quality. (b) Detection of failures which are either epidemic or slowly degradatory. (c) Identification of failure cases. (d) Provision of management information at the right time to effect the necessary corrective action. The heart of an effective QA scheme is the acquisition and processing of data. With the advent of data processing for quality monitoring becomes feasible in an automotive testing environment. This paper shows how the method enables us to use Automotive Testing data for the cost benefits of QA management.

  • PDF

The Study on the Ergonomic Workplace Assessment Index (인간공학적 작업장 평가지수에 관한 연구)

  • 이윤원;이동경;신용백
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.3
    • /
    • pp.25-34
    • /
    • 2002
  • The prevention of accidents or diseases is one of the most profitable activities in any business. The useful tools to diagnose existing safety problems and to systematically guide the improvement of those deficiencies have been developed in the world. In the recent, however, the importance of the interface between workers and workplaces has been increasingly recognized. In order to audit the correlations of job environments and workers we developed the rating system called "Ergonomic Workplace Assessment Index" for ergonomic condition in this study. The auditors will measure the degree of compliance of the criteria using judgement techniques, checks and interviews with EWAI(Ergonomic Workplace Assessment Index) which involves 5 categories and total 50 elements. elements.

Secure and Robust Metering in the Web Advertising

  • Kim, Soon-Seok
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.68-72
    • /
    • 2007
  • In this paper, we present robust and secure metering scheme to measure the number of interactions between clients and servers in the web, especially the web advertising. In most cases the web advertising is consists of advertisers, clients, servers, and an audit agency. The metering scheme should always be secure against fraud attempts by servers which maliciously try to inate the number of their visits and against clients that attempt to disrupt the metering process. We propose robust and secure metering scheme based on cryptographic techniques. By analyzing the proposed scheme we show that our scheme is more robust and secure than the previous schemes [1,2,4,5].

Research of Data Mining Techniques for the Audit Data Analysis (감사데이터 분석을 위한 데이터 마이닝 기법의 연구)

  • Huh, Moon-Heang
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.459-462
    • /
    • 2010
  • 최근 네트워크의 발달로 인해 네트워크 감사데이터의 양이 점점 증가하고 있다. 이렇게 증가하는 네트워크 감사데이터를 능동적이고 효율적으로 분석하기 위한 연구가 진행되고 있다. 하지만 지금까지의 연구들은 특정 침입탐지시스템에 제한되어 데이터 마이닝 기법을 적용하여 감사데이터를 분석하고 침입탐지모델을 구축하는 연구였다. 따라서 이 논문에서는 특정 침입탐지시스템에 의존하지 않고 감사데이터를 효율적으로 분석하여 알려지지 않은 공격패턴이나 규칙들을 발견하여 보안정책 실행시스템에서 활용할 수 있도록 하기위한 감사데이터 분석 마이너를 설계하고 구현하였다. 보안관리자는 구현된 감사데이터 마이너를 이용하여 원하는 정보를 가공 추출하여 고수준의 의미추출에 이용할 수 있다.

  • PDF

Ontology-based Course Mentoring System (온톨로지 기반의 수강지도 시스템)

  • Oh, Kyeong-Jin;Yoon, Ui-Nyoung;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.149-162
    • /
    • 2014
  • Course guidance is a mentoring process which is performed before students register for coming classes. The course guidance plays a very important role to students in checking degree audits of students and mentoring classes which will be taken in coming semester. Also, it is intimately involved with a graduation assessment or a completion of ABEEK certification. Currently, course guidance is manually performed by some advisers at most of universities in Korea because they have no electronic systems for the course guidance. By the lack of the systems, the advisers should analyze each degree audit of students and curriculum information of their own departments. This process often causes the human error during the course guidance process due to the complexity of the process. The electronic system thus is essential to avoid the human error for the course guidance. If the relation data model-based system is applied to the mentoring process, then the problems in manual way can be solved. However, the relational data model-based systems have some limitations. Curriculums of a department and certification systems can be changed depending on a new policy of a university or surrounding environments. If the curriculums and the systems are changed, a scheme of the existing system should be changed in accordance with the variations. It is also not sufficient to provide semantic search due to the difficulty of extracting semantic relationships between subjects. In this paper, we model a course mentoring ontology based on the analysis of a curriculum of computer science department, a structure of degree audit, and ABEEK certification. Ontology-based course guidance system is also proposed to overcome the limitation of the existing methods and to provide the effectiveness of course mentoring process for both of advisors and students. In the proposed system, all data of the system consists of ontology instances. To create ontology instances, ontology population module is developed by using JENA framework which is for building semantic web and linked data applications. In the ontology population module, the mapping rules to connect parts of degree audit to certain parts of course mentoring ontology are designed. All ontology instances are generated based on degree audits of students who participate in course mentoring test. The generated instances are saved to JENA TDB as a triple repository after an inference process using JENA inference engine. A user interface for course guidance is implemented by using Java and JENA framework. Once a advisor or a student input student's information such as student name and student number at an information request form in user interface, the proposed system provides mentoring results based on a degree audit of current student and rules to check scores for each part of a curriculum such as special cultural subject, major subject, and MSC subject containing math and basic science. Recall and precision are used to evaluate the performance of the proposed system. The recall is used to check that the proposed system retrieves all relevant subjects. The precision is used to check whether the retrieved subjects are relevant to the mentoring results. An officer of computer science department attends the verification on the results derived from the proposed system. Experimental results using real data of the participating students show that the proposed course guidance system based on course mentoring ontology provides correct course mentoring results to students at all times. Advisors can also reduce their time cost to analyze a degree audit of corresponding student and to calculate each score for the each part. As a result, the proposed system based on ontology techniques solves the difficulty of mentoring methods in manual way and the proposed system derive correct mentoring results as human conduct.

Validation of a New Design of Tellurium Dioxide-Irradiated Target

  • Fllaoui, Aziz;Ghamad, Younes;Zoubir, Brahim;Ayaz, Zinel Abidine;Morabiti, Aissam El;Amayoud, Hafid;Chakir, El Mahjoub
    • Nuclear Engineering and Technology
    • /
    • v.48 no.5
    • /
    • pp.1273-1279
    • /
    • 2016
  • Production of iodine-131 by neutron activation of tellurium in tellurium dioxide ($TeO_2$) material requires a target that meets the safety requirements. In a radiopharmaceutical production unit, a new lid for a can was designed, which permits tight sealing of the target by using tungsten inert gaswelding. The leakage rate of all prepared targets was assessed using a helium mass spectrometer. The accepted leakage rate is ${\leq}10^{-4}mbr.L/s$, according to the approved safety report related to iodine-131 production in the TRIGA Mark II research reactor (TRIGA: Training, Research, Isotopes, General Atomics). To confirm the resistance of the new design to the irradiation conditions in the TRIGA Mark II research reactor's central thimble, a study of heat effect on the sealed targets for 7 hours in an oven was conducted and the leakage rates were evaluated. The results show that the tightness of the targets is ensured up to $600^{\circ}C$ with the appearance of deformations on lids beyond $450^{\circ}C$. The study of heat transfer through the target was conducted by adopting a one-dimensional approximation, under consideration of the three transfer modes-convection, conduction, and radiation. The quantities of heat generated by gamma and neutron heating were calculated by a validated computational model for the neutronic simulation of the TRIGA Mark II research reactor using the Monte Carlo N-Particle transport code. Using the heat transfer equations according to the three modes of heat transfer, the thermal study of I-131 production by irradiation of the target in the central thimble showed that the temperatures of materials do not exceed the corresponding melting points. To validate this new design, several targets have been irradiated in the central thimble according to a preplanned irradiation program, going from4 hours of irradiation at a power level of 0.5MWup to 35 hours (7 h/d for 5 days a week) at 1.5MW. The results showthat the irradiated targets are tight because no iodine-131 was released in the atmosphere of the reactor building and in the reactor cooling water of the primary circuit.

A Secure and Efficient Metering Scheme for Internet Advertising (인터넷 광고에서 안전하고 효율적인 측정방법)

  • Kim, Soon-Seok;Shin, Je-Yong;Kim, Sung-Kwon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.153-160
    • /
    • 2002
  • In this paper, we consider a secure and efficient metering scheme to measure the interaction between clients and servers in interned advertising. In most cases internet advertising is composed of clients, servers, and an audit agency who collects a metering information about the number of clients that were served by each server. The metering scheme should always be secure against fraud attempts by servers which maliciously try to inflate the number of their clients and against clients that attempt to disrupt the metering process. So we suggest secure and efficient metering schemes, based on some cryptographic techniques, which are also very accurate and robust.

Performance Improvement of Infusion Detection System based on Hidden Markov Model through Privilege Flows Modeling (권한이동 모델링을 통한 은닉 마르코프 모델 기반 침입탐지 시스템의 성능 향상)

  • 박혁장;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.674-684
    • /
    • 2002
  • Anomaly detection techniques have teen devised to address the limitations of misuse detection approach for intrusion detection. An HMM is a useful tool to model sequence information whose generation mechanism is not observable and is an optimal modeling technique to minimize false-positive error and to maximize detection rate, However, HMM has the short-coming of login training time. This paper proposes an effective HMM-based IDS that improves the modeling time and performance by only considering the events of privilege flows based on the domain knowledge of attacks. Experimental results show that training with the proposed method is significantly faster than the conventional method trained with all data, as well as no loss of recognition performance.

New Environmental Impact Assessment Technology (신환경영향평가기술(新環境影響評價技術)의 개발방향(開發方向))

  • Han, Sang-Wook;Lee, Jong-Ho;Nam, Young-Sook
    • Journal of Environmental Impact Assessment
    • /
    • v.9 no.4
    • /
    • pp.277-290
    • /
    • 2000
  • The purpose of this study is to identify the problems of environmental impact assessment(EIA) and to suggest new EIA technology. The problems of EIA in Korea can be summarized as follows. First, the EIA does not reflect the impact of policy, plan and program on environment. Second, the project EIA does not consider the cumulative impacts such as additive impacts, synergistic impacts, threshold/saturation impacts, induced and indirect impacts, time-crowded impacts, and space-crowded impacts. Third, the EIA techniques in Korea are not standardized. Finally, the present EIA suggests only alternatives to reduce adverse impacts. To solve above-mentioned problems, the development of new EIA technology is essential. First, the new EIA technology should be developed toward pollution prevention technology and comprehensive and integrated environmental management technology. Second, new fields of EIA for pollution prevention contain strategic environmental assessment, cumulative impacts assessment, socio-economic impact assessment, cyber EIA and EIA technology necessary after the reunification of Korean Peninsula. Third, EIA technology for integrated environmental management contains the development of integated environment assessment system and the development of packaged EIA technology. The EIA technology for integrated environmental assessment system contains (1) development of integrated impact assessment technology combining air/water quality model, GIS and remote sensing, (2) integrated impact assessment of EIA, traffic impact assessment, population impact assessment and disaster impact assessment. (3) development of integrated technology combining risk assessment and EIA (4) development of integrated technology of life cycle assessment and EIA, (5) development of integrated technology of spatial planning and EIA, (6) EIA technology for biodiversity towards sustainable development, (7) mathematical model and GIS based location decision techniques, and (8) environmental monitoring and audit. Furthermore, there are some fields which need packaged EIA technology. In case of dam development, urban or industrial complex development, tourist development, landfill or combustion facilities construction, electric power plant development, development of port, road/rail/air port, is necessary the standardized and packaged EIA technology which considers the common characteristics of the same kind of development project.

  • PDF

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.