• Title/Summary/Keyword: Process tree diagram

Search Result 30, Processing Time 0.031 seconds

Real-time Estimation on Service Completion Time of Logistics Process for Container Vessels (선박 물류 프로세스의 실시간 서비스 완료시간 예측에 대한 연구)

  • Yun, Shin-Hwi;Ha, Byung-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.2
    • /
    • pp.149-163
    • /
    • 2012
  • Logistics systems provide their service to customers by coordinating the resources with limited capacity throughout the underlying processes involved to each other. To maintain the high level of service under such complicated condition, it is essential to carry out the real-time monitoring and continuous management of logistics processes. In this study, we propose a method of estimating the service completion time of key processes based on process-state information collected in real time. We first identify the factors that influence the process completion time by modeling and analyzing an influence diagram, and then suggest algorithms for quantifying the factors. We suppose the container terminal logistics and the process of discharging and loading containers to a vessel. The remaining service time of a vessel is estimated using a decision tree which is the result of machine-learning using historical data. We validated the estimation model using container terminal simulation. The proposed model is expected to improve competitiveness of logistics systems by forecasting service completion in real time, as well as to prevent the waste of resources.

A Reconstruction of Probability Unit of Elementary Mathematics Textbook Based on Freudenthal's Reinvention Method (Freudenthal의 재발명 방법에 기초한 제7차 초등수학교과서 확률 단원 재구성)

  • Kang, Ho-Jin;Kang, Heung-Kyu
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.12 no.1
    • /
    • pp.79-100
    • /
    • 2008
  • Freudenthal has advocated the reinvention method. In that method, the pupils start with a meaningful context, not ready-made concepts, and invent informative method through which he could arrive at the formative concepts progressively. In many face the reinvention method is contrary to the traditional method. In traditional method, which was named as 'concretization method' by Freudenthal, the pupils start with ready-made concepts, and applicate this concepts to various instances through which he could arrive at the understanding progressively. Through analysis, it turns out that Korea's seventh elementary mathematics textbook is based on concretization method. In this thesis, first of all, I will reconstruct probability unit of seventh elementary textbook according to Freudenthal's reinvention method. Next, I will perform teaching experiment which is ruled by new lesson design. Lastly, I analysed the effects of teaching experiment. Through this study, I obtained the following results and suggestions. First, the reinvention method is effective on the teaching of probability concept and algorithm. Second, in comparison with current textbook strand, my strand which made probability concept go ahead and combinatorics concept let behind is not deficiency. Third, tree diagram is effective matrix which contribute to formalization of combinatorics calculation. Lastly, except for fraction, diverse representation of probability, for example percentage or informal ratio expression must be introduced in teaching process.

  • PDF

Systems Engineering approach to Reliability Centered Maintenance of Containment Spray Pump (시스템즈 엔지니어링 기법을 이용한 격납용기 살수펌프의 신뢰기반 정비기법 도입 연구)

  • Ohaga, Eric Owino;Lee, Yong-Kwan;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.9 no.1
    • /
    • pp.65-84
    • /
    • 2013
  • This paper introduces a systems engineering approach to reliability centered maintenance to address some of the weaknesses. Reliability centered maintenance is a systematic, disciplined process that produces an efficient equipment management strategy to reduce the probability of failure [1]. The study identifies the need for RCM, requirements analysis, design for RCM implementation. Value modeling is used to evaluate the value measures of RCM. The system boundary for the study has been selected as containment spray pump and its motor drive. Failure Mode and Criticality Effects analysis is applied to evaluate the failure modes while the logic tree diagram used to determine the optimum maintenance strategy. It is concluded that condition based maintenance tasks should be enhanced to reduce component degradation and thus improve reliability and availability of the component. It is recommended to apply time directed tasks to age related failures and failure finding tasks to hidden failures.

Deciding the Optimal Shutdown Time Incorporating the Accident Forecasting Model (원자력 발전소 사고 예측 모형과 병합한 최적 운행중지 결정 모형)

  • Yang, Hee Joong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.171-178
    • /
    • 2018
  • Recently, the continuing operation of nuclear power plants has become a major controversial issue in Korea. Whether to continue to operate nuclear power plants is a matter to be determined considering many factors including social and political factors as well as economic factors. But in this paper we concentrate only on the economic factors to make an optimum decision on operating nuclear power plants. Decisions should be based on forecasts of plant accident risks and large and small accident data from power plants. We outline the structure of a decision model that incorporate accident risks. We formulate to decide whether to shutdown permanently, shutdown temporarily for maintenance, or to operate one period of time and then periodically repeat the analysis and decision process with additional information about new costs and risks. The forecasting model to predict nuclear power plant accidents is incorporated for an improved decision making. First, we build a one-period decision model and extend this theory to a multi-period model. In this paper we utilize influence diagrams as well as decision trees for modeling. And bayesian statistical approach is utilized. Many of the parameter values in this model may be set fairly subjective by decision makers. Once the parameter values have been determined, the model will be able to present the optimal decision according to that value.

A Study on Security Requirements of Shipboard Combat System based on Threat Modelling (위협 모델링 기반 함정 전투체계 보안 요구사항에 관한 연구)

  • Seong-cheol Yun;Tae-shik Shon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.281-301
    • /
    • 2023
  • The shipboard combat system is a key system for naval combat that supports a command and control process cycle consisting of Detect - Control - Engage in real time to ensure ship viability and conduct combat missions. Modern combat systems were developed on the basis of Open Architecture(OA) to maximize acceptance of latest technology and interoperability between systems, and actively introduced the COTS(Commercial-of-the-shelf). However, as a result of that, vulnerabilities inherent in COTS SW and HW also occurred in the combat system. The importance of combat system cybersecurity is being emphasized but cybersecurity research reflecting the characteristics of the combat system is still lacking in Korea. Therefore, in this paper, we systematically identify combat system threats by applying Data Flow Diagram, Microsoft STRIDE threat modelling methodology. The threats were analyzed using the Attack Tree & Misuse case. Finally we derived the applicable security requirements which can be used at stages of planning and designing combat system and verified security requirements through NIST 800-53 security control items.

A study on the Rationalization of Safety Management through the Analysis of Accident Cause and Occurrence Principles for Safety Accidents in the Construction Industry -Focused on Burial, Conflagration, Explosion, Burn- (건설업 안전사고의 원인과 사고발생원리의 분석을 통한 안전관리 합리화 방안의 고찰 -매몰(埋沒), 화사(火事), 폭렬(爆裂), 화상(火傷)을 대상으로-)

  • Kim, Jin-Ho
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.3
    • /
    • pp.99-111
    • /
    • 2010
  • In recent years, the number of high-rise building construction projects has grown, and the number of construction safety accidents has also been increasing. Therefore, the objective of this study is to propose plans to prevent accidents by systematically organizing accident principles and developing a tree diagram for the process of safety accidents that occur in the construction industry. This study aims to show the diverse characteristics of construction accidents based on KOSHA's annual reports on safety accidents(burial, conflagration, explosion, burn) from 1993 to 2009. To achieve these objectives, in this study we first examined the risk factors for burial, conflagration, explosion, and burn. We then systematically organized the classification viewpoint of accident causes, and suggested a methodology for the rationalization of safety management through an analysis of the primary causes of accidents by work type. The results of this study based on this methodology can be divided into three areas: 1)the types of facilities were divided into 43 categories by analyzing the information of KOSHA's annual reports; 2)the causes of burial, conflagration, explosion, and burn were divided into 63types; 3)the types of work were divided into 29 categories.

A Case Study on Safety Analysis Procedure of Aircraft System using the Relex (Relex를 이용한 항공기 시스템 안전성 평가 절차 사례분석)

  • Lee, Dong-Woo;Kim, Ip-Su;Na, Jong-Whoa
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.3
    • /
    • pp.179-188
    • /
    • 2018
  • In developing avionics systems, safety analysis and evaluation specified in SAE ARP4761 (Methods and Guidelines for Civil Aviation System and Equipment Safety Assessment Process) are carried out to prevent air accidents. Safety analysis requires knowledge of the abnormal state of the system, not its normal state, and its interrelationships with other standards. Therefore, a tool that automatically outputs data which proves compliance with safety certification standards is required. In this study,In this study, Schematized the safety analysis procedure of the specification and studied the method of applying the safety analysis CAD tools to individual procedure. As an example study, ARP4761 analysis was performed on the wheel brake system (WBS) of the ARP4761 appendix.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Restoration Plan of Changwon and Nam Streams Based on the Results of Diagnostic Assessment (생태적 진단결과에 기초한 창원천과 남천의 복원계획)

  • An, Ji Hong;Lim, Chi Hong;Jung, Song Hie;Kim, A Reum;Woo, Dong Min;Lee, Chang Seok
    • Journal of Korean Society on Water Environment
    • /
    • v.33 no.5
    • /
    • pp.511-524
    • /
    • 2017
  • This study was carried out for the purpose of creating a restoration plan to improve the ecological quality of the Changwon and Nam streams. Based upon the results of comprehensive diagnostic assessment, restoration priority was given to the upstream reach, where conservation status is relatively superior. Restoration level was usually determined to practice active restoration as conservation, and the states of both Changwon and Nam streams were not so good. Restoration plans, by reach, were classified into "upstream", "midstream", and "downstream" were suggested in both terms of horizontal section frame and vegetation-based on the result of diagnostic assessment and the reference information. "Upstream", "mid-stream" and the "downstream" of Changwon and Nam streams were classified into "small-gravel- mountainous", "small-sand-plain", and "small-clay-plain streams" respectively (based on scale, and substrate and slope of river bed). The spatial arrangement of vegetation was laid out in diagram form by reflecting micro-topography and the water level of the horizontal section of river. Information regarding species composition was recommended as dominant species, which appear frequently in three vegetation zones composed of herbaceous plants, shrubs and trees and sub-tree- dominated zones divided by reflecting disturbance regime, depending on position on the horizontal section of river. Moreover, there have been prepared not only plans to improve the terrestrial ecosystems around the streams but also plans to create ecological networks, which can serve to improve the ecologic quality of the whole regional environment by serving to connect streams and terrestrial ecosystems, a process probably necessary and definitely recommended to realize true (genuine) restoration. Plans for ecological parks and networks were prepared by mimicking the species composition of Alnus japanica community, Zelkova serrata community, Carpinus laxiflora community, Quercus aliena community, and Q. serrata community.

Improved Social Network Analysis Method in SNS (SNS에서의 개선된 소셜 네트워크 분석 방법)

  • Sohn, Jong-Soo;Cho, Soo-Whan;Kwon, Kyung-Lag;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.117-127
    • /
    • 2012
  • Due to the recent expansion of the Web 2.0 -based services, along with the widespread of smartphones, online social network services are being popularized among users. Online social network services are the online community services which enable users to communicate each other, share information and expand human relationships. In the social network services, each relation between users is represented by a graph consisting of nodes and links. As the users of online social network services are increasing rapidly, the SNS are actively utilized in enterprise marketing, analysis of social phenomenon and so on. Social Network Analysis (SNA) is the systematic way to analyze social relationships among the members of the social network using the network theory. In general social network theory consists of nodes and arcs, and it is often depicted in a social network diagram. In a social network diagram, nodes represent individual actors within the network and arcs represent relationships between the nodes. With SNA, we can measure relationships among the people such as degree of intimacy, intensity of connection and classification of the groups. Ever since Social Networking Services (SNS) have drawn increasing attention from millions of users, numerous researches have made to analyze their user relationships and messages. There are typical representative SNA methods: degree centrality, betweenness centrality and closeness centrality. In the degree of centrality analysis, the shortest path between nodes is not considered. However, it is used as a crucial factor in betweenness centrality, closeness centrality and other SNA methods. In previous researches in SNA, the computation time was not too expensive since the size of social network was small. Unfortunately, most SNA methods require significant time to process relevant data, and it makes difficult to apply the ever increasing SNS data in social network studies. For instance, if the number of nodes in online social network is n, the maximum number of link in social network is n(n-1)/2. It means that it is too expensive to analyze the social network, for example, if the number of nodes is 10,000 the number of links is 49,995,000. Therefore, we propose a heuristic-based method for finding the shortest path among users in the SNS user graph. Through the shortest path finding method, we will show how efficient our proposed approach may be by conducting betweenness centrality analysis and closeness centrality analysis, both of which are widely used in social network studies. Moreover, we devised an enhanced method with addition of best-first-search method and preprocessing step for the reduction of computation time and rapid search of the shortest paths in a huge size of online social network. Best-first-search method finds the shortest path heuristically, which generalizes human experiences. As large number of links is shared by only a few nodes in online social networks, most nods have relatively few connections. As a result, a node with multiple connections functions as a hub node. When searching for a particular node, looking for users with numerous links instead of searching all users indiscriminately has a better chance of finding the desired node more quickly. In this paper, we employ the degree of user node vn as heuristic evaluation function in a graph G = (N, E), where N is a set of vertices, and E is a set of links between two different nodes. As the heuristic evaluation function is used, the worst case could happen when the target node is situated in the bottom of skewed tree. In order to remove such a target node, the preprocessing step is conducted. Next, we find the shortest path between two nodes in social network efficiently and then analyze the social network. For the verification of the proposed method, we crawled 160,000 people from online and then constructed social network. Then we compared with previous methods, which are best-first-search and breath-first-search, in time for searching and analyzing. The suggested method takes 240 seconds to search nodes where breath-first-search based method takes 1,781 seconds (7.4 times faster). Moreover, for social network analysis, the suggested method is 6.8 times and 1.8 times faster than betweenness centrality analysis and closeness centrality analysis, respectively. The proposed method in this paper shows the possibility to analyze a large size of social network with the better performance in time. As a result, our method would improve the efficiency of social network analysis, making it particularly useful in studying social trends or phenomena.