• Title/Summary/Keyword: Logical Information Check

Search Result 18, Processing Time 0.023 seconds

The EMFG Modeling and Analysis for a Workflow (워크플로우의 EMFG 모델링과 분석)

  • Heo, Hu-Sook;Yeo, Jeong-Mo
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1189-1196
    • /
    • 2003
  • Owing to the developed If industry, many people are more and more interested in Workflow which is an automated business processing system. In this paper, we present basic structures and various parallel processing structures of a workflow using EMFG (Extended Mark Flow Graph) that makes conceptional design available. And then, We design a workflow with EMFG. We propose the commitability verification method to check whether a workflow can complete or not and the logical bug verification method to find whether invalid components exist or not by using simulation result of it. The proposed EMFG modeling and analysis method for a workflow make it possible to become a visual and formal design. Also, it makes intuitional and mathematical analysis possible.

Development of a Simulation Model for Supply Chain Management of Precast Concrete (프리캐스트 콘크리트 공급사슬 관리를 위한 시뮬레이션 모형 개발)

  • Kwon, Hyeonju;Jeon, Sangwon;Lee, Jaeil;Jeong, Keunchae
    • Korean Journal of Construction Engineering and Management
    • /
    • v.22 no.5
    • /
    • pp.86-98
    • /
    • 2021
  • In this study, we developed a simulation model for supply chain management of Precast Concrete (PC) based construction. To this end, information on the Factory Production/Site Construction system was collected through literature review and field research, and based on this information, a simulation model was defined by describing the supply chain, entities, resources, and processes. Next, using the Arena simulation software, a simulation model for the PC supply chain was developed by setting model frameworks, data modules, flowchart modules, and animation modules. Finally, verification and validation were performed using five review methodologies such as model check, animation check, extreme value test, average value test, and actual case test to the developed model. As a result, it was found that the model adequately represented the flows and characteristics of the PC supply chain without any logical errors and provided accurate performance evaluation values for the target supply chains. It is expected that the proposed simulation model will faithfully play a role as a performance evaluation platform in the future for developing management techniques in order to optimally operate the PC supply chain.

A Study on the Application of Modularization Technique to Standard Security Policy to Protect Information Assets and the Securement of Confidentiality and Integrity (정보자산 보호를 위한 표준 보안정책 모듈화 기법 적용과 기밀성 및 무결성 확보를 위한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.111-118
    • /
    • 2019
  • For the security of a vast amount of information, it has been started to diagnose the site as a way of operating and managing the information owned by a company holding assets, to establish indexes to check the actual status and all kinds of standards to obtain security, and also to classify the information assets based on that. This has been extended to many different areas including policies to operate and manage information assets, services, the management of owned devices as physical assets, and also the management of logical assets for application software and platforms. Some of these information assets are already being operated in reality as new technology in new areas, for example, Internet of Things. Of course, a variety of electronic devices like Smart Home are being used in ordinary families, and unlike in the past, these devices generate a series of information life cycles such as accumulating and processing information. Moreover, as even distribution is now being realized, we are facing a task to secure the stability of information assets and also information that assets are holding. The purpose of this study is to suggest and apply standard security policy by moduling methods for information assets owned by companies and even families and obtain the enhancement of confidentiality as well as integrity.

A Study on the Characteristics of Vocational Experience Facilities in Accordance with Experience Marketing - Focused on Vocational Experience Facilities for Children - (체험 마케팅에 의한 직업체험관의 특성에 관한 연구 - 어린이 직업체험 중심으로 -)

  • Joo, Hee-Moon;Byun, Dae-Joong
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.3
    • /
    • pp.108-116
    • /
    • 2013
  • This study has the purpose to review the way of experience element and property of space design appearing in vocational experience space and accumulate basic study material for children's vocational experience space and build systematic and specialized modules. Analysing the marketing elements of experience space through pilot research to arrange frame of analysis, and in a determined range, experimental marketing's property appearing in children's vocational experience center is analysed. This researcher analysed experimental displaying space's function of recognition, emotional, behavior, sense marketing and experimental marketing induced from pilot research on space design expressive elements of experimental marketing when it is applied to spaces through the frame of analysis with the combination of total 8 kind's experience display space function such as investigative, conceptional, aesthetic, entertaining, logical, relative, participating, and comprehensive experience based on 5 vocational experience spaces located in Seoul and Gyeonggi, opened after 2010, being operated at present with more than 500 pyeong (about 1,650 square meter) and targeted for children, after this researcher visited the site directly to make check list with the frame of analysis together with the staff and administrator in charge of vocational experience education. As a conclusion, vocational experience center is a space of edutainment helping children experience various profession more easily to find their interest and to bring up their dream. By analysing current vocational experience center through the element called experimental marketing, current status of vocational experience center could be known. the experience itself in vocational experience center becomes a merchandise. Instead of mere experience, so as to get professional experience and new information, new experiences should be provided by incessant variation and development. This study is to build basic research data for children's vocational experience space, however not only drawing specialty of vocational experience center through the connection of enterprises based on the contents arranged above but also systematic and specialized modules are expected to be built in next researches.

Design and Implementation of a Reusable and Extensible HL7 Encoding/Decoding Framework (재사용성과 확장성 있는 HL7 인코딩/디코딩 프레임워크의 설계 및 구현)

  • Kim, Jung-Sun;Park, Seung-Hun;Nah, Yun-Mook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.96-106
    • /
    • 2002
  • this paper, we propose a flexible, reusable, and extensible HL7 encoding and decoding framework using a Message Object Model (MOM) and Message Definition Repository (MDR). The MOM provides an abstract HL7 message form represented by a group of objects and their relationships. It reflects logical relationships among the standard HL7 message elements such as segments, fields, and components, while enforcing the key structural constraints imposed by the standard. Since the MOM completely eliminates the dependency of the HL7 encoder and decoder on platform-specific data formats, it makes it possible to build the encoder and decoder as reusable standalone software components, enabling the interconnection of arbitrary heterogeneous hospital information systems(HISs) with little effort. Moreover, the MDR, an external database of key definitions for HL7 messages, helps make the encoder and decoder as resilient as possible to future modifications of the standard HL7 message formats. It is also used by the encoder and decoder to perform a well formedness check for their respective inputs (i. e., HL7 message objects expressed in the MOM and encoded HL7 message strings). Although we implemented a prototype version of the encoder and decoder using JAVA, they can be easily packaged and delivered as standalone components using the standard component frameworks like ActiveX, JAVABEAN, or CORBA component.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Network Capacity Design in the local Communication and Computer Network for Consumer Portal System (전력수용가포털을 위한 구내 통신 및 컴퓨터 네트워크 용량 설계)

  • Hong, Jun-Hee;Choi, Jung-In;Kim, Jin-Ho;Kim, Chang-Sub;Son, Sung-Young;Son, Kwang-Myung;Jang, Gil-Soo;Lee, Jea-Bok
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.10
    • /
    • pp.89-100
    • /
    • 2007
  • Consumer Portal is defined as "a combination of hardware and software that enables two-way communication between energy service provider(ESP, like KEPCO) and equipment within the consumer's premises". The portal provides both a physical link(between wires, radio waves, and other media) and a logical link(translating among language-like codes and etiquette-like protocols) between in-building and wide-area access networks. Thus, the consumer portal is an important, open public shared infrastructure in the future vision of energy services. In this paper, we describe a new methodology for local communication and computer network capacity design of consumer portal, and also presents capacity calculation method using a network system limitation factors. By the approach, we can check into the limitations of existing methods, and propose an improved data processing algorithm that can expand the maximum number of the networked end-use devices up to $30{\sim}40$ times. For validation, we applies the proposed methode to our real system design. Our contribution will help electrical power information network design.

Ontology-Based Process-Oriented Knowledge Map Enabling Referential Navigation between Knowledge (지식 간 상호참조적 네비게이션이 가능한 온톨로지 기반 프로세스 중심 지식지도)

  • Yoo, Kee-Dong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.61-83
    • /
    • 2012
  • A knowledge map describes the network of related knowledge into the form of a diagram, and therefore underpins the structure of knowledge categorizing and archiving by defining the relationship of the referential navigation between knowledge. The referential navigation between knowledge means the relationship of cross-referencing exhibited when a piece of knowledge is utilized by a user. To understand the contents of the knowledge, a user usually requires additionally information or knowledge related with each other in the relation of cause and effect. This relation can be expanded as the effective connection between knowledge increases, and finally forms the network of knowledge. A network display of knowledge using nodes and links to arrange and to represent the relationship between concepts can provide a more complex knowledge structure than a hierarchical display. Moreover, it can facilitate a user to infer through the links shown on the network. For this reason, building a knowledge map based on the ontology technology has been emphasized to formally as well as objectively describe the knowledge and its relationships. As the necessity to build a knowledge map based on the structure of the ontology has been emphasized, not a few researches have been proposed to fulfill the needs. However, most of those researches to apply the ontology to build the knowledge map just focused on formally expressing knowledge and its relationships with other knowledge to promote the possibility of knowledge reuse. Although many types of knowledge maps based on the structure of the ontology were proposed, no researches have tried to design and implement the referential navigation-enabled knowledge map. This paper addresses a methodology to build the ontology-based knowledge map enabling the referential navigation between knowledge. The ontology-based knowledge map resulted from the proposed methodology can not only express the referential navigation between knowledge but also infer additional relationships among knowledge based on the referential relationships. The most highlighted benefits that can be delivered by applying the ontology technology to the knowledge map include; formal expression about knowledge and its relationships with others, automatic identification of the knowledge network based on the function of self-inference on the referential relationships, and automatic expansion of the knowledge-base designed to categorize and store knowledge according to the network between knowledge. To enable the referential navigation between knowledge included in the knowledge map, and therefore to form the knowledge map in the format of a network, the ontology must describe knowledge according to the relation with the process and task. A process is composed of component tasks, while a task is activated after any required knowledge is inputted. Since the relation of cause and effect between knowledge can be inherently determined by the sequence of tasks, the referential relationship between knowledge can be circuitously implemented if the knowledge is modeled to be one of input or output of each task. To describe the knowledge with respect to related process and task, the Protege-OWL, an editor that enables users to build ontologies for the Semantic Web, is used. An OWL ontology-based knowledge map includes descriptions of classes (process, task, and knowledge), properties (relationships between process and task, task and knowledge), and their instances. Given such an ontology, the OWL formal semantics specifies how to derive its logical consequences, i.e. facts not literally present in the ontology, but entailed by the semantics. Therefore a knowledge network can be automatically formulated based on the defined relationships, and the referential navigation between knowledge is enabled. To verify the validity of the proposed concepts, two real business process-oriented knowledge maps are exemplified: the knowledge map of the process of 'Business Trip Application' and 'Purchase Management'. By applying the 'DL-Query' provided by the Protege-OWL as a plug-in module, the performance of the implemented ontology-based knowledge map has been examined. Two kinds of queries to check whether the knowledge is networked with respect to the referential relations as well as the ontology-based knowledge network can infer further facts that are not literally described were tested. The test results show that not only the referential navigation between knowledge has been correctly realized, but also the additional inference has been accurately performed.