• Title/Summary/Keyword: Rule based System

Search Result 1,774, Processing Time 0.033 seconds

A study on the Application of the Contra Proferentem Rule in the Interpretation of Marine Insurance Policies (해상보험증권의 해석상 작성자 불이익의 원칙의 적용에 관한 연구)

  • Seong-Hoo Kim;Nak-Hyun Han
    • Korea Trade Review
    • /
    • v.45 no.5
    • /
    • pp.279-301
    • /
    • 2020
  • In the absence of any guidance under statutory law, such as the Rules for Construction of Policy, MIA 1906, judges should follow the general principles of interpretation that apply to all contracts. In simple terms, Contra Proferentem Rule means that if the contents of the terms and conditions are ambiguous, they are interpreted against the writer of the terms and conditions. In the Anglo-American Contract Law, the 'default rule' is an important judicial tool that can supplement defects in contract norms and reinforce the principle of private autonomy through gap-filling techniques related to the interpretation of contracts. In Korea, it is sometimes mentioned in case of precedent, and it has been established as a clear rule. This study analyzes the interpretation of terms and conditions is not in the form that the interpretation of other general contracts and other interpretation principles are valid, but contracts based on terms and conditions are also contracts, and as a general rule, the interpretation of terms and conditions is explained like the general contract interpretation.

Rule-based System for Loading Multiple Items in Containers for Shipping (제품수송 컨터네이너의 적재를 위한 규칙기반시스템)

  • Park, Ji Hee;Lee, Gun Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.6
    • /
    • pp.403-412
    • /
    • 2013
  • This study figures out the concepts of container transport, logistical cost and the distribution of a company through studying documents, and to suggest logistical cost reduction approach, focused on the efficiency of transport which occupied the considerable portion of the total logistical cost of the company. We analyze and discuss the container loading of multiple items for multiple places of departure and arrival through a case study on S company in South Korea. We suggest a direction to reduce the logistical cost of the companies, analyzing the conditions of multiple items loading, and rule-based systems including an algorithm which determines container-loading for minimum freight expenses. We use data mining and OLAP tools of MS Analysis Services to produce loading rules for multiple items loading and generate OLAP cube and decision trees to validate the rules.

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Implementation of Rule-based Inference System on Microcontroller for Smart Home (마이크로컨트롤러를 이용한 스마트 홈 전용 규칙기반 추론 시스템)

  • Koo, Bon-Jae;Shin, Won-Yong;Yang, Sung-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.850-852
    • /
    • 2014
  • Recently, the development of Machine to Machine (M2M) communication has been largely accomplished in a variety of fields including smart home. In M2M communication, the role of sensor node is only limited to gather data and send them to upper application layers. In this research, the limited role of the sensor node in traditional M2M communication is improved in order for the devices to make inference, which makes it possible to provide basic context-aware services within sensor node level. Therefore, implementation of rule-based inference system on microcontroller for smart home is proposed.

  • PDF

Automated Conceptual Data Modeling Using Association Rule Mining (연관규칙 마이닝을 활용한 개념적 데이터베이스 설계 자동화 기법)

  • Son, Yoon-Ho;Kim, In-Kyu;Kim, Nam-Gyu
    • The Journal of Information Systems
    • /
    • v.18 no.4
    • /
    • pp.59-86
    • /
    • 2009
  • Data modeling can be regarded as a series of processes to abstract real-world business concerns. The conceptual modeling phase is often regarded as the most difficult stage in the entire modeling process, because quite different conceptual models may be produced even for similar business domains based on users' varying requirements and the data modelers' diverse perceptions of the requirements. This implies that an object considered as an entity in one domain may be considered as an attribute in another, and vice versa. However, many traditional knowledge-based automated database design systems unfortunately fail to construct appropriate Entity-Relationship Diagrams(ERDs) for a given set of requirements due to the rigid assumption that an object should be classified as an entity if it has been classified as an entity in previous applications. In this paper, we propose an alternative automation system which can generate ERDs from business descriptions using association rule mining technique. Our system can be differentiated from the traditional ones in that our system can perform data modeling only based on business description written by domain workers, rather than relying on any kind of knowledge base. Since the proposed system can produce various versions of ERDs from the same business descriptions simultaneously, users can have the opportunity to choose one of the ERDs as being the most appropriate, based on their business environment and requirements. We performed a case study for personnel management in a university to evaluate the practicability of the proposed system This paper summarizes the result of it in the experiment section.

An Inventory Rationing Method in a M-Store Regional Supply Chain Operating under the Order-up-to Level System

  • Monthatipkul, Chumpol
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.2
    • /
    • pp.80-92
    • /
    • 2009
  • This paper addresses the inventory rationing issue embedded in the regional supply chain inventory replenishment problem (RSIRP). The concerned supply chain, which was fed by the national supply chain, consisted of a single warehouse distributing a single product to multiple stores (M-stores) with independent and normally distributed customer demand. It was assumed that the supply chain operated under the order-up-to level inventory replenishment system and had only one truck at the regional warehouse. The truck could make one replenishment trip to one store per period (a round trip per period). Based on current inventories and the vehicle constraint, the warehouse must make two decisions in each period: which store in the region to replenish and what was the replenishment quantity? The objective was to position inventories so as to minimize lost sales in the region. The warehouse inventory was replenished in every fixed-interval from a source outside the region, but the store inventory could be replenished daily. The truck destination (store) in each period was selected based on its maximum expected shortage. The replenishment quantity was then determined based on the predetermined order-up-to level system. In case of insufficient warehouse inventories to fulfill all projected store demands, an inventory rationing rule must be applied. In this paper, a new inventory rationing rule named Expected Cost Minimization (ECM) was proposed based on the practical purpose. The numerical results based on real data from a selective industry show that its performance was better and more robust than the current practice and other sharing rules in the existing literature.

Evolutionary Neural Network based on DNA coding method for Time series prediction (시계열 예측을 위한 DNA코딩 기반의 신경망 진화)

  • 이기열;이동욱;심귀보
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.4
    • /
    • pp.315-323
    • /
    • 2000
  • In this paper, we propose a method of constructing neural networks using bio-inpired emergent and evolutionary concepts. This method is algorithm that is based on the characteristics of the biological DNA and growth of plants, Here is, we propose a constructing method to make a DNA coding method for production rule of L-system. L-system is based on so-called the parallel rewriting nechanism. The DNA coding method has no limitation in expressing the produlation the rule of L-system. Evolutionary algotithms motivated by Darwinaian natural selection are population based searching methods and the high performance of which is highly dependent on the representation of solution space. In order to verify the effectiveness of our scheme, we apply it one step ahead prediction of Mackey-Glass time series, Sunspot data and KOSPI data.

  • PDF

A Fuzzy Rule-based System for Automatically Generating Customized Training Scenarios in Cyber Security

  • Nam, Su Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.39-45
    • /
    • 2020
  • Despite the increasing interest in cyber security in recent years, the emergence of new technologies has led to a shortage of professional personnel to efficiently perform the cyber security. Although various methods such as cyber rage are being used to cultivate cyber security experts, there are problems of limitation of virtual training system, scenario-based practice content development and operation, unit content-oriented development, and lack of consideration of learner level. In this paper, we develop a fuzzy rule-based user-customized training scenario automatic generation system for improving user's ability to respond to infringement. The proposed system creates and provides scenarios based on advanced persistent threats according to fuzzy rules. Thus, the proposed system can improve the trainee's ability to respond to the bed through the generated scenario.

Rate-Monotonic Scheduler with Extended Schedulability Inspection for Hard Real-Time Tesk (경성 실시간 태스크를 위한 확장된 스케줄 가능성 검사를 갖는 비율단조 스케줄러)

  • 신동헌;조수현;김영학;김태형
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.2
    • /
    • pp.50-60
    • /
    • 2004
  • Recently, most of the embedded system is required not only many functions but also real-time characteristics in purpose. In the hard real-time system, especially, strict deadline of periodic task can affect the performance of the system. In this paper, we design and implement the scheduler based on RM(Rate-Monotonic) rule. This scheduler makes feasible patterns based on EDF(Earliest deadline first) rule with extended schedulability inspection before execution, for periodic task-set that has high CPU utilization and then, execute periodic task-set depended on feasible patterns. The feasible pattern formed into EDF rule is capable of the efficiency of CPU up to 100 percentage and by the referenced execution of the feasible pattern is possible of removing the red-time scheduling overhead that is the defect of the order of dynamic assignment rule.

  • PDF

Rule-Based Generation of Four-Part Chorus Applied With Chord Progression Learning Model (화성 진행 학습 모델을 적용한 규칙 기반의 4성부 합창 음악 생성)

  • Cho, Won Ik;Kim, Jeung Hun;Cheon, Sung Jun;Kim, Nam Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1456-1462
    • /
    • 2016
  • In this paper, we apply a chord progression learning model to a rule-based generation of a four-part chorus. The proposed system is given a 32-note melody line and completes the four-part chorus based on the rule of harmonics, predicting the chord progression with the CRBM model. The data for the training model was collected from various harmony textbooks, and chord progressions were extracted with key-independent features so as to utilize the given data effectively. It was shown that the output piece obtained with the proposed learning model had a more natural progression than the piece that used only the rule-based approach.