• Title/Summary/Keyword: Knowledge Mapping

Search Result 213, Processing Time 0.025 seconds

Risk Analysis for the Rotorcraft Landing System Using Comparative Models Based on Fuzzy (퍼지 기반 다양한 모델을 이용한 회전익 항공기 착륙장치의 위험 우선순위 평가)

  • Na, Seong Hyeon;Lee, Gwang Eun;Koo, Jeong Mo
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.49-57
    • /
    • 2021
  • In the case of military supplies, any potential failure and causes of failures must be considered. This study is aimed at examining the failure modes of a rotorcraft landing system to identify the priority items. Failure mode and effects analysis (FMEA) is applied to the rotorcraft landing system. In general, the FMEA is used to evaluate the reliability in engineering fields. Three elements, specifically, the severity, occurrence, and detectability are used to evaluate the failure modes. The risk priority number (RPN) can be obtained by multiplying the scores or the risk levels pertaining to severity, occurrence, and detectability. In this study, different weights of the three elements are considered for the RPN assessment to implement the FMEA. Furthermore, the FMEA is implemented using a fuzzy rule base, similarity aggregation model (SAM), and grey theory model (GTM) to perform a comparative analysis. The same input data are used for all models to enable a fair comparison. The FMEA is applied to military supplies by considering methodological issues. In general, the fuzzy theory is based on a hypothesis regarding the likelihood of the conversion of the crisp value to the fuzzy input. Fuzzy FMEA is the basic method to obtain the fuzzy RPN. The three elements of the FMEA are used as five linguistic terms. The membership functions as triangular fuzzy sets are the simplest models defined by the three elements. In addition, a fuzzy set is described using a membership function mapping the elements to the intervals 0 and 1. The fuzzy rule base is designed to identify the failure modes according to the expert knowledge. The IF-THEN criterion of the fuzzy rule base is formulated to convert a fuzzy input into a fuzzy output. The total number of rules is 125 in the fuzzy rule base. The SAM expresses the judgment corresponding to the individual experiences of the experts performing FMEA as weights. Implementing the SAM is of significance when operating fuzzy sets regarding the expert opinion and can confirm the concurrence of expert opinion. The GTM can perform defuzzification to obtain a crisp value from a fuzzy membership function and determine the priorities by considering the degree of relation and the form of a matrix and weights for the severity, occurrence, and detectability. The proposed models prioritize the failure modes of the rotorcraft landing system. The conventional FMEA and fuzzy rule base can set the same priorities. SAM and GTM can set different priorities with objectivity through weight setting.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

Analysis of Oceanic Current Maps of the East Sea in the Secondary School Science Textbooks (중등 과학 교과서의 동해 해류도 분석)

  • Park, Kyung-Ae;Park, Ji-Eun;Seo, Kang-Sun;Choi, Byoung-Ju;Byun, Do-Seong
    • Journal of the Korean earth science society
    • /
    • v.32 no.7
    • /
    • pp.832-859
    • /
    • 2011
  • The importance of scientific education on accurate oceanic currents and circulation has been increasingly addressed because the currents have played a significant role in climate change and global energy balance. The objectives of this study are to analyze errors of the oceanic current maps in the textbooks, to discuss a variety of error sources, to suggest how to produce a unified oceanic current map of the East Sea for the students. Twenty-seven textbooks based on the 7th National Curriculum were analyzed and quantitatively investigated on the characteristics of the current maps by comparing with both the previous literature and up-to-date scientific knowledge. All the maps in the textbooks with different mappings were converted to digitalized image data with Mercator mapping using geolocation information. Detailed analysis were performed to investigate the patterns of the Tsushima Warm Current (TWC) in the Korea Strait, to examine how closely the nearshore branch of the TWC flows along the Japanese coast, to scrutinize the features of the offshore branch of the TWC south of the subpolar front in the East Sea, to quantitatively investigate the northern range of the northward-propagating East Korea Warm Current and its latitude turning to the east, and lastly to examine the outflow of the TWC near the Tsugaru Strait and the Soya Strait. In addition, the origins, southern limits, and distances from the coast of the Liman Current and the North Korea Cold Current were analyzed. Other erroneous expressions of the currents in the textbooks were presented. These analyses revealed the problems in the present current maps of the textbooks, which might lead the students to misconception. This study also addressed a necessity in a bridge between scientists with up-to-date scientific results and educators who needed educational materials.