• Title/Summary/Keyword: IS요구도

Search Result 25,663, Processing Time 0.054 seconds

Systematic Evaluation of Fault Trees using Real-Time Model Checker (실시간 모델 체커를 이용한 풀트 트리의 체계적 검증)

  • 지은경;차성덕;손한성;유준범;구서룡;성풍현
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.12
    • /
    • pp.860-872
    • /
    • 2002
  • Fault tree analysis is the most widely used saftly analysis technique in industry. However, the analysis is often applied manually, and there is no systematic and automated approach available to validate the analysis result. In this paper, we demonstrate that a real-time model checker UPPAAL is useful in formally specifying the required behavior of safety-critical software and to validate the accuracy of manually constructed fault trees. Functional requirements for emergency shutdown software for a nuclear power plant, named Wolsung SDS2, are used as an example. Fault trees were initially developed by a group of graduate students who possess detailed knowledge of Wolsung SDS2 and are familiar with safety analysis techniques including fault tree analysis. Functional requirements were manually translated in timed automata format accepted by UPPAAL, and the model checking was applied using property specifications to evaluate the correctness of the fault trees. Our application demonstrated that UPPAAL was able to detect subtle flaws or ambiguities present in fault trees. Therefore, we conclude that the proposed approach is useful in augmenting fault tree analysis.

Dynamic Handoff Control Methods Considering the Characteristics of Mobile Station (이동국의 특성을 고려한 동적 핸드오프)

  • 김재훈;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.1
    • /
    • pp.104-112
    • /
    • 2002
  • Dynamic Handoff Control Scheme (DHCS), which is propose d in this paper, suggests the method to request handoff at the optimal time. To accomplish this, DHCS measures the speed of the mobile station and sets the pilot strength for handoff request. When the pilot strength of the current base station is bigg or than the pilot strength for handoff request, which means the pilot strength of the current base station is big enough so the possibility of the call to be disconnected is low, DHCS doesn't request for the handoff even though the pilot strength of the adjacent base station is bigger than the pilot strength of the curent base station. DHCS guarantees the QoS (Quality of Service) by processing the handoff calls prior to new calls at the base station and providing continuous service for the mobile station by setting the priorities for the calls according to the queue waiting time transmitted from the mobile stations.

  • PDF

Design Improvement of Vent System for Korean Utility Helicopter's Anti-Explosion Fuel Tank (한국형 기동헬기 내폭발성 만족을 위한 연료 벤트 시스템 설계개선)

  • Kim, Joung-Hun;Kim, Chang-Young;Chang, Joong-Jin;Lee, Mal-Young;Shim, Dai-Sung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.1
    • /
    • pp.76-81
    • /
    • 2014
  • Military helicopter is exposed to the enemy gun firing due to the low altitude flight of contour flight, hovering & nap of the Earth flight, therefore it has the high possibility to be exploded by the gun firing. Recently the Anti-ballistic requirement is required to get the high level of safety from gun firing in required operational capability. The first military utility helicopter of SURION has the Anti-ballistic requirement and explosion proof. In order to meet the requirement, OBIGGS is adopted for the first time in KUH. It is proven that Anti-Explosion capability is satisfied to requirement for improving vent system which was insufficiently designed in development period and related to Anti-explosion.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Analysis Method of User Review using Open Data (오픈 데이터를 이용한 사용자 리뷰 분석 방법)

  • Choi, Taeho;Hwang, Mansoo;Kim, Neunghoe
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.185-190
    • /
    • 2022
  • Open data has a lot of economic value. Not only Korea, but many other countries are doing their best to make various policies and efforts to expand and utilize open data. However, although Korea has a large amount of data, the data is not utilized effectively. Thus, attempts to utilize those data should be made in various industries. In particular, in the fashion industry, exchange and refund problems are the most common due to unpredictable consumers. Better feedback is necessary for service providers to solve this problem. We want to solve it by showing improved images of dissatisfactions along with user reviews including consumer needs. In this paper, user reviews are analyzed on online shopping mall websites to identify consumer needs, and product attributes are defined by utilizing the attributes of K-fashion data. The users' request is defined as a dissatisfaction attribute, and labeling data with the corresponding attribute is searched. The users' request is provided to the service provider in forms of text data or attributes, as well as an image to help improve the product.

A Study on the Calculation of the Number of Rescuers at Fire Sites Using Wireless Signals of Mobile Phones (화재 현장에서 휴대전화 무선 신호를 활용한 구조대원 투입 인원수 산출 연구)

  • Kim, Younghyun;Kim, Boseob;Lee, Sungwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.275-276
    • /
    • 2021
  • In the event of a fire in a complex, the identification of isolated people's location information is delayed, resulting in many casualties. In order to prevent such an accident, research on estimating the location of the requesters by detecting the wireless signal of the mobile phone at fire sites is in progress. The main concept is to use a wireless signal scanner to detect the wireless signal of a mobile phones at fire sites, and then position the mobile phone based on this. However, it is difficult to secure visibility at the fire site due to the smoke, and there is a difficulty in rescuing requesters in need compared with general disaster sites. Therefore, it will be one of the important issues to be solved to determine the minimum number of rescuers to be deployed according to the number and condition of the requesters. In this study, we propose a method to calculate the number of rescuers put to fire sites by using the radio signal generated from mobile phones and the information generated from the inertial sensor of the mobile phones.

  • PDF

The Influence of Shared Goal and Value of Information Security Policy: The Role of Demand-ability Fit and Person-organization Fit (정보보안 정책 목표 공유 및 가치의 영향: 요구-능력 적합성 및 개인-조직 적합성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.609-618
    • /
    • 2024
  • The escalating demand for organized information resource management within organizations necessitates increased investment in information security (IS), as a single error can lead to information exposure incidents, underscoring the importance of IS compliance by insiders. The research aims to elevate IS compliance within the organization by examining the influence of the shared goal of information security policy (ISP), perceived ISP value and individual's fits on an insider's intention to comply with the ISP. Antecedent research in organizational behavior and IS led to a proposed hypothesis, tested using 366 obtained samples. The ISP shared goal's positive influence on ISP compliance intentions was evident from the test results, primarily through the perceived ISP value. Furthermore, the person-organization and demand-ability fit moderated the antecedent factors associated with ISP compliance intentions. Our findings suggest the methods for sustaining organizational IS levels by examining the requisite conditions from the viewpoints of the organizational environment, ISP values, and fits.

IS Knowledge and Skills Requisite on IS Practitioners : Comparative Study of IS Practitioners' Perception and Recruiters' Perception (IS 실무자에 대한 IS 지식 및 기술 수요: IS 실무자와 채용 담당자의 인식에 대한 비교 연구)

  • Go, Seok-Ha;Lee, Hyeon-U
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.255-268
    • /
    • 2008
  • 본 논문에서는 IS 채용 담당자들이 한국의 신규 IS 실무자들에게 어느 IS 지식과 소프트웨어/IT 전문 기술이 얼마나 필요하다고 생각하는지에 대해서 실증조사를 하였다. 본 연구에서는 선행 연구 결과에 따라서 IS 실무자들을 초급 전문가, 중급 전문가, 고급 전문가, 그리고 제너럴리스트로 분류하였으며, 조사 결과를 이들 각 집단이 필요로 하는 수준과 비교하였다. 분석 결과는 한국의 IS 채용 담당자들이 IS 채용 담당자들이 전체적으로는 IS 실무자들에게 어떤 지식 및 전문 기술이 필요한지를 잘 파악하고 있으며, 또한 조직의 지식 및 지술 수요에 필요에 민감하게 반응하고 있다는 것을 보여준다. 분석 결과는 또한 IS 채용 담당자들이 기존의 초급 전문가에게 요구되고 있는 정도보다도 더 높은 수준의 "제품-지향성"을 신규 IS 실무자에게 요구하고 있으며, 도리어 중급 전문가에 더 가까운 지식 및 기술 구성을 갖고 있기를 신규 IS 실무자에게 기대하는 사람의 비율이 더 높다는 것을 보여준다. 분석 결과는 한국의 대학이 산업 지식 및 기술 수요에 맞추어 인력을 양성하고 있지 못하며, 이에 대한 추가적인 연구가 필요하다는 것을 시사한다.

  • PDF

A study of Reference Model of Smart Library based on Linked Open Data (링크드오픈데이터 기반 스마트 라이브러리의 참조모델에 관한 연구)

  • Moon, Hee-kyung;Han, Sung-kook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1666-1672
    • /
    • 2016
  • In recent years, smart technology has been applied to various information system fields. Especially, traditional library service area is changing to Smart-Library from Digital-Library. In this environment are need to library service software platform for supporting variety content, library services, users and smart-devices. Due to this, existing library service has a limitation that inhibits semantic interoperability between different heterogeneous library systems. In this paper, we propose Linked-Open-Data based smart library as an archetype of future-library system that provide a variety content and system interaction and integration of services. It is an innovative system of the cutting-edge information intensive. Therefore, we designed system environments according to various integration requirements for smart library based on Linked-Open-Data. And, we describe the functional requirements of smart-library systems by considering the users' demands and the eco-systems of information technology. In addition, we show the reference framework, which can accommodate the functional requirements and provide smart knowledge service to user through a variety of smart-devices.

Analyzing and Restructuring Mathematical Tasks of Length Measurement in Elementary School Mathematics - Focused on 2nd Graders - (인지적 요구 수준 및 사고수준의 발달방향에 따른 초등학교 길이 측정 단원의 수학과제 분석)

  • Ku, Miyoung;Lee, Kwangho
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.19 no.3
    • /
    • pp.387-408
    • /
    • 2015
  • The purpose of this research is to analyze the mathematical tasks of length measurement in two different perspectives, the level of cognitive demands and learning trajectories, and restructure the mathematical tasks so that the students' conceptual learning is promoted and students are able to have opportunities to think more broadly. Ten lessons with the restructured mathematical tasks were implemented for a class of 2nd grade elementary students. Also a qualitative and in-depth study was conducted with 4 students of the target group. The study shows that firstly, the restructured tasks requiring high level of cognitive skills, had positive effects in increasing the students' level of thinking and reasoning. Secondly, the tasks modified according to the learning trajectories of Szilag, Clements & Sarama(2013) in length measurement, have proven to promote students' concept learning and elaborate the students' level of thinking.