• Title/Summary/Keyword: System-level Simulation

Search Result 2,138, Processing Time 0.036 seconds

Analysis of Startup Process based on Process Mining Techniques: ICT Service Cases (프로세스 마이닝 기반 창업 프로세스 분석: ICT 서비스 창업 사례를 중심으로)

  • Min Woo Park;Hyun Sil Moon;Jae Kyeong Kim
    • Information Systems Review
    • /
    • v.21 no.1
    • /
    • pp.135-152
    • /
    • 2019
  • Recently there are many development and support policies for start-up companies because of successful venture companies related to ICT services. However, as these policies have focused on the support for the initial stage of start-up, many start-up companies have difficulties to continuously grow up. The main reason for these difficulties is that they recognize start-up tasks as independent activities. However, many experts or related articles say that start-up tasks are composed of related processes from the initial stage to the stable stage of start-up firms. In this study, we models the start-up processes based on the survey collected by the start-up companies, and analyze the start-up process of ICT service companies with process mining techniques. Through process mining analysis, we can draw a sequential flow of tasks for start-ups and the characteristics of them. The analysis of start-up businessman, idea derivation, creating business model, business diversification processes are resulted as important processes, but marketing activity and managing investment funds are not. This result means that marketing activity and managing investment funds are activities that need ongoing attention. Moreover, we can find temporal and complementary tasks which could not be captured by independent individual-level activity analysis. Our process analysis results are expected to be used in simulation-based web-intelligent system to support start-up business, and more cumulated start-up business cases will be helpful to give more detailed individual-level personalization service. And our proposed process model and analyzing results can be used to solve many difficulties for start-up companies.

A study on the Success Factors and Strategy of Information Technology Investment Based on Intelligent Economic Simulation Modeling (지능형 시뮬레이션 모형을 기반으로 한 정보기술 투자 성과 요인 및 전략 도출에 관한 연구)

  • Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.35-55
    • /
    • 2013
  • Information technology is a critical resource necessary for any company hoping to support and realize its strategic goals, which contribute to growth promotion and sustainable development. The selection of information technology and its strategic use are imperative for the enhanced performance of every aspect of company management, leading a wide range of companies to have invested continuously in information technology. Despite researchers, managers, and policy makers' keen interest in how information technology contributes to organizational performance, there is uncertainty and debate about the result of information technology investment. In other words, researchers and managers cannot easily identify the independent factors that can impact the investment performance of information technology. This is mainly owing to the fact that many factors, ranging from the internal components of a company, strategies, and external customers, are interconnected with the investment performance of information technology. Using an agent-based simulation technique, this research extracts factors expected to affect investment performance on information technology, simplifies the analyses of their relationship with economic modeling, and examines the performance dependent on changes in the factors. In terms of economic modeling, I expand the model that highlights the way in which product quality moderates the relationship between information technology investments and economic performance (Thatcher and Pingry, 2004) by considering the cost of information technology investment and the demand creation resulting from product quality enhancement. For quality enhancement and its consequences for demand creation, I apply the concept of information quality and decision-maker quality (Raghunathan, 1999). This concept implies that the investment on information technology improves the quality of information, which, in turn, improves decision quality and performance, thus enhancing the level of product or service quality. Additionally, I consider the effect of word of mouth among consumers, which creates new demand for a product or service through the information diffusion effect. This demand creation is analyzed with an agent-based simulation model that is widely used for network analyses. Results show that the investment on information technology enhances the quality of a company's product or service, which indirectly affects the economic performance of that company, particularly with regard to factors such as consumer surplus, company profit, and company productivity. Specifically, when a company makes its initial investment in information technology, the resultant increase in the quality of a company's product or service immediately has a positive effect on consumer surplus, but the investment cost has a negative effect on company productivity and profit. As time goes by, the enhancement of the quality of that company's product or service creates new consumer demand through the information diffusion effect. Finally, the new demand positively affects the company's profit and productivity. In terms of the investment strategy for information technology, this study's results also reveal that the selection of information technology needs to be based on analysis of service and the network effect of customers, and demonstrate that information technology implementation should fit into the company's business strategy. Specifically, if a company seeks the short-term enhancement of company performance, it needs to have a one-shot strategy (making a large investment at one time). On the other hand, if a company seeks a long-term sustainable profit structure, it needs to have a split strategy (making several small investments at different times). The findings from this study make several contributions to the literature. In terms of methodology, the study integrates both economic modeling and simulation technique in order to overcome the limitations of each methodology. It also indicates the mediating effect of product quality on the relationship between information technology and the performance of a company. Finally, it analyzes the effect of information technology investment strategies and information diffusion among consumers on the investment performance of information technology.

A Study on Scenario to establish Coastal Inundation Prediction Map due to Storm Surge (폭풍해일에 의한 해안침수예상도 작성 시나리오 연구)

  • Moon, Seung-Rok;Kang, Tae-Soon;Nam, Soo-Yong;Hwang, Joon
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.19 no.5
    • /
    • pp.492-501
    • /
    • 2007
  • Coastal disasters have become one of the most important issues in every coastal country. In Korea, coastal disasters such as storm surge, sea level rise and extreme weather have placed many coastal regions in danger of being exposed or damaged during subsequent storms and gradual shoreline retreat. A storm surge is an onshore gush of water associated with a tow pressure weather system, typically in typhoon season. However, it is very difficult to predict storm surge height and inundation due to the irregularity of the course and intensity of a typhoon. To provide a new scheme of typhoon damage prediction model, the scenario which changes the central pressure, the maximum wind radius, the track and the proceeding speed by corresponding previous typhoon database, was composed. The virtual typhoon scenario database was constructed with individual scenario simulation and evaluation, in which it extracted the result from the scenario database of information of the hereafter typhoon and information due to climate change. This virtual typhoon scenario database will apply damage prediction information about a typhoon. This study performed construction and analysis of the simulation system with the storm surge/coastal inundation model at Masan coastal areas, and applied method for predicting using the scenario of the storm surge.

Sensitivity of Simulated Water Temperature to Vertical Mixing Scheme and Water Turbidity in the Yellow Sea (수직 혼합 모수화 기법과 탁도에 따른 황해 수온 민감도 실험)

  • Kwak, Myeong-Taek;Seo, Gwang-Ho;Choi, Byoung-Ju;Kim, Chang-Sin;Cho, Yang-Ki
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.18 no.3
    • /
    • pp.111-121
    • /
    • 2013
  • Accurate prediction of sea water temperature has been emphasized to make precise local weather forecast and to understand change of ecosystem. The Yellow Sea, which has turbid water and strong tidal current, is an unique shallow marginal sea. It is essential to include the effects of the turbidity and the strong tidal mixing for the realistic simulation of temperature distribution in the Yellow Sea. Evaluation of ocean circulation model response to vertical mixing scheme and turbidity is primary objective of this study. Three-dimensional ocean circulation model(Regional Ocean Modeling System) was used to perform numerical simulations. Mellor- Yamada level 2.5 closure (M-Y) and K-Profile Parameterization (KPP) scheme were selected for vertical mixing parameterization in this study. Effect of Jerlov water type 1, 3 and 5 was also evaluated. The simulated temperature distribution was compared with the observed data by National Fisheries Research and Development Institute to estimate model's response to turbidity and vertical mixing schemes in the Yellow Sea. Simulations with M-Y vertical mixing scheme produced relatively stronger vertical mixing and warmer bottom temperature than the observation. KPP scheme produced weaker vertical mixing and did not well reproduce tidal mixing front along the coast. However, KPP scheme keeps bottom temperature closer to the observation. Consequently, numerical ocean circulation simulations with M-Y vertical mixing scheme tends to produce well mixed vertical temperature structure and that with KPP vertical mixing scheme tends to make stratified vertical temperature structure. When Jerlov water type is higher, sea surface temperature is high and sea bottom temperature is low because downward shortwave radiation is almost absorbed near the sea surface.

The Comparative Study on Incentive System for Integrated Design of Low-Energy Buildings (저에너지건물 통합설계 인센티브 체계 비교 연구)

  • Lee, Byungyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.6
    • /
    • pp.129-139
    • /
    • 2016
  • The purpose of this paper was to comparatively investigate the efficient building incentives in Korea and foreign countries and to seek strategies to enhance low energy building integrated design market infrastructure in Korea. The structure of incentive policies were composed of four main component: 1) types of financial aids and beneficiaries, 2) energy performance criteria and verification methods, 3) supports for low energy building integrated design, and 4) funding sources for incentive programs. Every overseas incentive program has adopted a design team incentive along with building owners incentive and the range of target buildings have been extended from new construction to remodeling projects. The main system of the program is the performance standard through which projects were investigated and the level of incentive are decided. Initially, the integrated performance has been investigated through simulation methods, but the construction performance evaluation and energy monitoring methods are emerging. In addition, the direct support and educational support for integrated design has been provided to enhance the foundation of relative markets. Financial funding is also a key component of the program and more aggressive funding strategies have been adopted.

Compensation of Phase Noise and IQ Imbalance in the OFDM Communication System of DFT Spreading Method (DFT 확산 방식의 OFDM 통신 시스템에서 위상잡음과 직교 불균형 보상)

  • Ryu, Sang-Burm;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.1
    • /
    • pp.21-28
    • /
    • 2009
  • DFT-spread OFDM(Discrete Fourier Transform-Spread Orthogonal Frequency Division Multiplexing) is very effective for solving the PAPR(Peak-to-Average Power Ratio) problem. Therefore, the SC-FDMA(Single Carrier-Frequency Division Multiple Access) which is basically same to the DFT spread OFDM was adopted as the uplink standard of the 3GPP LTE ($3^{rd}$ Generation Partnership Project Long Term Evolution). Unlike the ordinary OFDM system, the SC-FDMA using DFT spreading method is vulnerable to the ICI(Inter-Carrier Interference) problem caused by the phase noise and IQ(In-phase/Quadrature) imbalance and effected FDE(Frequency Domain Equalizer). In this paper, the ICI effects from the phase noise and IQ imbalance which can be problems in uplink transmission are analyzed according the back-off level of HPA. Next, we propose the equalizer algorithm to remove the ICI effects. This proposed equalizer based on the FDE can be considered as up-graded and improved version of PNS(Phase Noise Suppression) algorithm. This proposed equalizer effectively compensates the ICI resulting from the phase noise and IQ imbalance. Finally, through the computer simulation, it can be shown that about SNR=14 dB is required for the $BER=10^{-4}$ after ICI compensation when the back-off is 4.5 dB, $\varepsilon=0.005$, $\phi=5^{\circ}$, and $pn=0.06\;rad^2$.

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.

Hardware Architecture of High Performance Cipher for Security of Digital Hologram (디지털 홀로그램의 보안을 위한 고성능 암호화기의 하드웨어 구조)

  • Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.374-387
    • /
    • 2012
  • In this paper, we implement a new hardware for finding the significant coefficients of a digital hologram and ciphering them using discrete wavelet packet transform (DWPT). Discrete wavelet transform (DWT) and packetization of subbands is used, and the adopted ciphering technique can encrypt the subbands with various robustness based on the level of the wavelet transform and the threshold of subband energy. The hologram encryption consists of two parts; the first is to process DWPT, and the second is to encrypt the coefficients. We propose a lifting based hardware architecture for fast DWPT and block ciphering system with multi-mode for the various types of encryption. The unit cell which calculates the repeated arithmetic with the same structure is proposed and then it is expanded to the lifting kernel hardware. The block ciphering system is configured with three block cipher, AES, SEED and 3DES and encrypt and decrypt data with minimal latency time(minimum 128 clocks, maximum 256 clock) in real time. The information of a digital hologram can be hided by encrypting 0.032% data of all. The implemented hardware used about 200K gates in $0.25{\mu}m$ CMOS library and was stably operated with 165MHz clock frequency in timing simulation.

Prediction of Structural Performance of an Automotive Ball Joint (자동차용 볼조인트의 구조적 성능 예측)

  • Kim, Seong-Uk;Jeong, Gyeong-Il;Lee, Kwon-Hee;Lee, Dong-Jin;Lee, Myeong-Gon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.705-713
    • /
    • 2018
  • An automotive ball joint connects the suspension system to the steering system and helps to enable rotational and linear motion between the two elements for steering. This study examines a ball joint used in medium and large-sized pickup trucks. Ball joints consist of a stud, socket, bearing, and plug. The main structural performance metrics of ball joints are the pull-out strength and push-out strength. These structural parameters must meet certain criteria to avoid serious accidents. Test and simulation methods are used to investigate the design requirements, but tests are time-consuming and costly. In this study, we modeled ball joints in SolidWorks and performed a finite element analysis in Abaqus to predict structural performance. The analysis was used to obtain the structural performance required for the static analysis of a 2D axisymmetric model. The uncertainties in the manufacturing of the ball joint were assumed to be the manufacturing tolerances, and the dimensional design variables were identified through case studies. The manufacturing tolerances at each level were defined, and the results were compared with experimental results.

Regional Realtime Ocean Tide and Storm-surge Simulation for the South China Sea (남중국해 지역 실시간 해양 조석 및 폭풍해일 시뮬레이션)

  • Kim, Kyeong Ok;Choi, Byung Ho;Lee, Han Soo;Yuk, Jin-Hee
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.30 no.2
    • /
    • pp.69-83
    • /
    • 2018
  • The South China Sea (SCS) is a typical marginal sea characterized with the deep basin, shelf break, shallow shelf, many straits, and complex bathymetry. This study investigated the tidal characteristics and propagation, and reproduced typhoon-induced storm surge in this region using the regional real-time tide-surge model, which was based on the unstructured grid, resolving in detail the region of interest and forced by tide at the open boundary and by wind and air pressure at the surface. Typhoon Haiyan, which occurred in 2013 and caused great damage in the Philippines, was chosen as a case study to simulate typhoon's impact. Amplitudes and phases of four major constituents were reproduced reasonably in general, and the tidal distributions of four constituents were similar to the previous studies. The modelled tide seemed to be within the acceptable levels, considering it was difficult to reproduce the tide in this region based on the previous studies. The free oscillation experiment results described well the feature of tide that the diurnal tide is prevailing in the SCS. The tidal residual current and total energy dissipation were discussed to understand the tidal and sedimentary environments. The storm-surge caused by typhoon Haiyan was reasonably simulated using this modeling system. This study established the regional real-time barotropic tide/water level prediction system for the South China Sea including the seas around the Philippines through the validation of the model and the understanding of tidal characteristics.