• Title/Summary/Keyword: Contractee

Search Result 4, Processing Time 0.017 seconds

A Comparative Study on Importance-Performance Analysis of Perceived Foodservice Quality between the Contractor and the Contractee (단체급식 서비스품질에 대한 고객사와 위탁급식회사 중요도-수행도 비교 연구)

  • Kim, Hong-Geun
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.23 no.6
    • /
    • pp.850-861
    • /
    • 2013
  • This study aimed at investigating any differences perceived between the contractor and the contractee based on an importance-performance analysis (IPA) of foodservice quality attributes. Questionnaires were distributed to 200 personnel concerned in the Busan, Ulsan and Kyungnam areas and a total of 134 valid responses were used for analysis. Of the 23 foodservice quality attributes, the factors of 'food quality', 'employee service', 'hygiene and safety', 'customer orientation' and 'operation quality' were induced from a scale purification process through the exploratory factor analysis. The level of importance (p<0.01) of the 'hygiene and safety' factor and 'employee service' factor was not found to be significantly different between the groups. In the level of performance, the factors of 'food service', 'employee service', 'customer orientation' and 'operation quality' were found to be perceived significantly lower than expected by the contractor group. In the importance level, 'food quality', 'employee service', 'hygiene and safety', 'customer orientation' and 'operation quality' were rated by the contractor as 4.03, 4.30, 4.27, 4.01 and 4.12 points, respectively. In contrast, in the performance level, perceived 'food quality', 'employee service', 'hygiene and safety', 'customer orientation' and 'operation quality' were evaluated as 3.57, 3.94, 4.06, 3.83 and 3.95 points, respectively.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF