• Title/Summary/Keyword: Time Integration Method

Search Result 1,165, Processing Time 0.028 seconds

Development of a Probabilistic Model for the Estimation of Yearly Workable Wave Condition Period for Offshore Operations - Centering on the Sea off the Ulsan Harbor (해상작업 가능기간 산정을 위한 확률모형 개발 - 울산항 전면 해역을 중심으로)

  • Choi, Se Ho;Cho, Yong Jun
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.31 no.3
    • /
    • pp.115-128
    • /
    • 2019
  • In this study, a probabilistic model for the estimation of yearly workable wave condition period for offshore operations is developed. In doing so, we first hindcast the significant wave heights and peak periods off the Ulsan every hour from 2003.1.1 to 2017.12.31 based on the meteorological data by JMA (Japan Meterological Agency) and NOAA (National Oceanic and Atmospheric Administration), and SWAN. Then, we proceed to derive the long term significant wave height distribution from the simulated time series using a least square method. It was shown that the agreements are more remarkable in the distribution in line with the Modified Glukhovskiy Distribution than in the three parameters Weibull distribution which has been preferred in the literature. In an effort to develop a more comprehensive probabilistic model for the estimation of yearly workable wave condition period for offshore operations, wave height distribution over the 15 years with individual waves occurring within the unit simulation period (1 hour) being fully taken into account is also derived based on the Borgman Convolution Integral. It is shown that the coefficients of the Modified Glukhovskiy distribution are $A_p=15.92$, $H_p=4.374m$, ${\kappa}_p=1.824$, and the yearly workable wave condition period for offshore work is estimated to be 319 days when a threshold wave height for offshore work is $H_S=1.5m$. In search of a way to validate the probabilistic model derived in this study, we also carry out the wave by wave analysis of the entire time series of numerically simulated significant wave heights over the 15 years to collect every duration periods of waves the height of which are surpassing the threshold height which has been reported to be $H_S=1.5m$ in the field practice in South Korea. It turns out that the average duration period is 45.5 days from 2003 to 2017, which is very close to 46 days from the probabilistic model derived in this study.

A study on Yang Shi Tai Chi Chuan in Bartenieff Fundamentals Perspectives (바티니에프 기본원리를 통해 본 양식 태극권에 관한 연구)

  • Wang, Zhiquan
    • Trans-
    • /
    • v.8
    • /
    • pp.95-127
    • /
    • 2020
  • This research is based on using Bartenieff Fundamentals to analyze the fundamentals of Tai Chi Chuan's movements in order to develop the methods of relaxation from Tai Chi Chuan's principle movement movements It also shows that the two techniques have commonalities in many ways. First of all, taking a philosophical approach on the body movements of Tai Chi Chuan and Bartenieff, for both methods the ultimate goal is the integration of mind and body. In other words, there is a thread of connection between the East's body and mind monism and the west's Body Awareness. Secondly, looking at it from a Breath Support standpoint as used in the Bartenieff method, the two methods both use the breathing to naturally move the body and relax the body. In Tai Chi Chuan the Breath is the basis of life and the strength of the Body. So the breathing of Tai Chi chuan is what makes body and mind communicate, harmonize and integrate. In other words, Breathing in Tai Chi is realized through mental fusion and affects the movements. This is the same as the Breath Support of Bartenieff. It is said that in every aspect the Breath Support of Bartenieff influences the movement and changes both the inner and outer form of the body. Thirdly, looking at the Core Support used in the Bartenieff method, both methods emphasize core. At the same time of moving and being conscious of one's core, the usage of muscles can be deeper rather than superficial and this enables strong and flexible movement. In Tai Chi Chuan abdominal muscles used when one coughs are consciously engaged through abdominal breathing and so strength is collected in the core. When one exercises like that the core becomes more stable and breathing becomes more smooth. Fourthly, analyzing the Rotary Factor used in the Bartenieff Fundamentals, they both use rotary movement to reach the goal of physical relaxation. The rotation factor of Bartenieff allows movement to be easier and more free because of the characteristic of joint exercise where the center axis moved in three dimensions, this is the same in Tai Chi chuan. According to Tai Chi chuan's circle and Spiral Movements, it can achieve the relaxation through switching into a seamless flow and access space as much as possible. Finally, when looking at Developmental Patterning through Bonnie Bainbridge Cohen's Body-Mind Centering Work theory, presented from Bartenieff developmental model are similar with the developmental process of Tai Chi chuan Breath, Core-Distal Connectivity/Navel Radiation, Head-Tail Connectivity/Spinal Movement, Upper-Lower Connectivity/Homologous, Body-Half Connectivity/Homo-Lateral Connectivity, Cross-Lateral Connectivity/Contra-Lateral Connectivity. They are all similar. In other words, in Tai Chi Chuan energy is gathered in the core through breathing, upper and lower body are connected through the spine, not only homo-laterally but also cross-laterally. Through this study the expression of the dance movements can be more natural. Additionally based on the Body Awareness balance usage of the central axis, joints and body can develop the relax technique.

  • PDF

학교교육과정의 인구교육내용분석

  • 박덕규
    • Korea journal of population studies
    • /
    • v.11 no.1
    • /
    • pp.50-57
    • /
    • 1988
  • This study focused on the anding of Inchon's identity The empirical method and ethnomethodological approaches were used to collect the data. Among members ofcitizen movement groups,government workers,and students who are living inInchon were selected as 613 samples using a purposive sampling method. MultipleClassification Analysis (MCA) and cross-tabulation methods were used in theanalysisThe study of identity in an area is important in terms of providing the solution ofthe problem in a region and social integration of the citizens. The scores of the indexabout Inchon's identity are quite low and more than half of the respondents to allthree groups showed the middle position of the scores from the identity index. By thecharacteristics of the respondents,female,unmarried single,30 years or more,lowerincome groups showed relatively higher identity index scores than other counter-parts . And professional,administrative,clerical workers'identity index scores werehigher than people who work at sales,service,and agricultural sectors. Respondentswith 2 years of college or more,with intentions to donate special monies for cultural, social welfare, environmental reform,persons who want to live in Inchon for along period of time equipped with a stronger identity index.For the character of Inchon's identity,there are no identity,making it fromnow on,capacity or broad-minded city,vanguard pioneer,displeased, Oiversity/multiplicity of the city,defense spirit from foreign invasion,entrancecity from the world in that order. Therefore,it is hard to say what exactly Inchon'simage is in a single word. However,Inchon can be characterized as a diverse citywith capacity to live together without any serious conflicts among citizens who come from Seoul,Kyunggi-Do,Chungchung-Do,Chunla-Do,Kyungsang-Do,and foreign countries including North Korea. These facts imply that Inchon should continue topursue this image as a diverse city with capacity as an identity pursuing towardsworld city and hub city of North East Asia.ty as an identity pursuing towardsworld city and hub city of North East Asia. East Asia.

  • PDF

Preliminary Study on the Development of a Performance Based Design Platform of Vertical Breakwater against Seismic Activity - Centering on the Weakened Shear Modulus of Soil as Shear Waves Go On (직립식 방파제 성능기반 내진 설계 Platform 개발을 위한 기초연구 - 전단파 횟수 누적에 따른 지반 강도 감소를 중심으로)

  • Choi, Jin Gyu;Cho, Yong Jun
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.30 no.6
    • /
    • pp.306-318
    • /
    • 2018
  • In order to evaluate the seismic capacity of massive vertical type breakwaters which have intensively been deployed along the coast of South Korea over the last two decades, we carry out the preliminary numerical simulation against the PoHang, GyeongJu, Hachinohe 1, Hachinohe 2, Ofunato, and artificial seismic waves based on the measured time series of ground acceleration. Numerical result shows that significant sliding can be resulted in once non-negligible portion of seismic energy is shifted toward the longer period during its propagation process toward the ground surface in a form of shear wave. It is well known that during these propagation process, shear waves due to the seismic activity would be amplified, and non-negligible portion of seismic energy be shifted toward the longer period. Among these, the shift of seismic energy toward the longer period is induced by the viscosity and internal friction intrinsic in the soil. On the other hand, the amplification of shear waves can be attributed to the fact that the shear modulus is getting smaller toward the ground surface following the descending effective stress toward the ground surface. And the weakened intensity of soil as the number of attacking shear waves are accumulated can also contribute these phenomenon (Das, 1993). In this rationale, we constitute the numerical model using the model by Hardin and Drnevich (1972) for the weakened shear modulus as shear waves go on, and shear wave equation, in the numerical integration of which $Newmark-{\beta}$ method and Modified Newton-Raphson method are evoked to take nonlinear stress-strain relationship into account. It is shown that the numerical model proposed in this study could duplicate the well known features of seismic shear waves such as that a great deal of probability mass is shifted toward the larger amplitude and longer period when shear waves propagate toward the ground surface.

A PLS Path Modeling Approach on the Cause-and-Effect Relationships among BSC Critical Success Factors for IT Organizations (PLS 경로모형을 이용한 IT 조직의 BSC 성공요인간의 인과관계 분석)

  • Lee, Jung-Hoon;Shin, Taek-Soo;Lim, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.207-228
    • /
    • 2007
  • Measuring Information Technology(IT) organizations' activities have been limited to mainly measure financial indicators for a long time. However, according to the multifarious functions of Information System, a number of researches have been done for the new trends on measurement methodologies that come with financial measurement as well as new measurement methods. Especially, the researches on IT Balanced Scorecard(BSC), concept from BSC measuring IT activities have been done as well in recent years. BSC provides more advantages than only integration of non-financial measures in a performance measurement system. The core of BSC rests on the cause-and-effect relationships between measures to allow prediction of value chain performance measures to allow prediction of value chain performance measures, communication, and realization of the corporate strategy and incentive controlled actions. More recently, BSC proponents have focused on the need to tie measures together into a causal chain of performance, and to test the validity of these hypothesized effects to guide the development of strategy. Kaplan and Norton[2001] argue that one of the primary benefits of the balanced scorecard is its use in gauging the success of strategy. Norreklit[2000] insist that the cause-and-effect chain is central to the balanced scorecard. The cause-and-effect chain is also central to the IT BSC. However, prior researches on relationship between information system and enterprise strategies as well as connection between various IT performance measurement indicators are not so much studied. Ittner et al.[2003] report that 77% of all surveyed companies with an implemented BSC place no or only little interest on soundly modeled cause-and-effect relationships despite of the importance of cause-and-effect chains as an integral part of BSC. This shortcoming can be explained with one theoretical and one practical reason[Blumenberg and Hinz, 2006]. From a theoretical point of view, causalities within the BSC method and their application are only vaguely described by Kaplan and Norton. From a practical consideration, modeling corporate causalities is a complex task due to tedious data acquisition and following reliability maintenance. However, cause-and effect relationships are an essential part of BSCs because they differentiate performance measurement systems like BSCs from simple key performance indicator(KPI) lists. KPI lists present an ad-hoc collection of measures to managers but do not allow for a comprehensive view on corporate performance. Instead, performance measurement system like BSCs tries to model the relationships of the underlying value chain in cause-and-effect relationships. Therefore, to overcome the deficiencies of causal modeling in IT BSC, sound and robust causal modeling approaches are required in theory as well as in practice for offering a solution. The propose of this study is to suggest critical success factors(CSFs) and KPIs for measuring performance for IT organizations and empirically validate the casual relationships between those CSFs. For this purpose, we define four perspectives of BSC for IT organizations according to Van Grembergen's study[2000] as follows. The Future Orientation perspective represents the human and technology resources needed by IT to deliver its services. The Operational Excellence perspective represents the IT processes employed to develop and deliver the applications. The User Orientation perspective represents the user evaluation of IT. The Business Contribution perspective captures the business value of the IT investments. Each of these perspectives has to be translated into corresponding metrics and measures that assess the current situations. This study suggests 12 CSFs for IT BSC based on the previous IT BSC's studies and COBIT 4.1. These CSFs consist of 51 KPIs. We defines the cause-and-effect relationships among BSC CSFs for IT Organizations as follows. The Future Orientation perspective will have positive effects on the Operational Excellence perspective. Then the Operational Excellence perspective will have positive effects on the User Orientation perspective. Finally, the User Orientation perspective will have positive effects on the Business Contribution perspective. This research tests the validity of these hypothesized casual effects and the sub-hypothesized causal relationships. For the purpose, we used the Partial Least Squares approach to Structural Equation Modeling(or PLS Path Modeling) for analyzing multiple IT BSC CSFs. The PLS path modeling has special abilities that make it more appropriate than other techniques, such as multiple regression and LISREL, when analyzing small sample sizes. Recently the use of PLS path modeling has been gaining interests and use among IS researchers in recent years because of its ability to model latent constructs under conditions of nonormality and with small to medium sample sizes(Chin et al., 2003). The empirical results of our study using PLS path modeling show that the casual effects in IT BSC significantly exist partially in our hypotheses.

Development of Multimedia Annotation and Retrieval System using MPEG-7 based Semantic Metadata Model (MPEG-7 기반 의미적 메타데이터 모델을 이용한 멀티미디어 주석 및 검색 시스템의 개발)

  • An, Hyoung-Geun;Koh, Jae-Jin
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.573-584
    • /
    • 2007
  • As multimedia information recently increases fast, various types of retrieval of multimedia data are becoming issues of great importance. For the efficient multimedia data processing, semantics based retrieval techniques are required that can extract the meaning contents of multimedia data. Existing retrieval methods of multimedia data are annotation-based retrieval, feature-based retrieval and annotation and feature integration based retrieval. These systems take annotator a lot of efforts and time and we should perform complicated calculation for feature extraction. In addition. created data have shortcomings that we should go through static search that do not change. Also, user-friendly and semantic searching techniques are not supported. This paper proposes to develop S-MARS(Semantic Metadata-based Multimedia Annotation and Retrieval System) which can represent and extract multimedia data efficiently using MPEG-7. The system provides a graphical user interface for annotating, searching, and browsing multimedia data. It is implemented on the basis of the semantic metadata model to represent multimedia information. The semantic metadata about multimedia data is organized on the basis of multimedia description schema using XML schema that basically comply with the MPEG-7 standard. In conclusion. the proposed scheme can be easily implemented on any multimedia platforms supporting XML technology. It can be utilized to enable efficient semantic metadata sharing between systems, and it will contribute to improving the retrieval correctness and the user's satisfaction on embedding based multimedia retrieval algorithm method.

Effect of Protein Kinase C Inhibitor (PKCI) on Radiation Sensitivity and c-fos Transcription Activity (Protein Kinase C Inhibitor (PKCI)에 의한 방사선 민감도 변화와 c-fos Proto-oncogene의 전사 조절)

  • Choi Eun Kyung;Chang Hyesook;Rhee Yun-Hee;Park Kun-Koo
    • Radiation Oncology Journal
    • /
    • v.17 no.4
    • /
    • pp.299-306
    • /
    • 1999
  • Purpose : The human genetic disorder ataxia-telangiectasia (AT) is a multisystem disease characterized by extreme radiosensitivity. The recent identification of the gene mutated in AT, ATM, and the demonstration that it encodes a homologous domain of phosphatidylinositol 3-kinase (PI3-K), the catalytic subunit of an enzyme involved in transmitting signals from the cell surface to the nucleus, provide support for a role of this gene in signal transduction. Although ionizing radiation was known to induce c-fos transcription, nothing is known about how ATM or PKCI mediated signal transduction pathway modulates the c-fos gene transcription and gene expression. Here we have studied the effect of PKCI on radiation sensitivity and c-fos transcription in normal and AT cells. Materials and Methods: Normal (LM217) and AT (AT5BIVA) cells were transfected with PKCI expression plasmid and the overexpression and integration of PKCI was evaluated by northern blotting and polymerase chain reaction, respectively. 5 Gy of radiation was exposed to LM and AT cells transfected with PKCI expression plasmid and cells were harvested 48 hours after radiation and investigated apoptosis with TUNEL method. The c-fos transcription activity was studied by performing CAT assay of reporter gene after transfection of c-fos CAT plasmid into AT and LM cells. Results: Our results demonstrate for the first time a role of PKCI on the radiation sensitivity and c-fos expression in LM and AT cells. PKCI increased radiation induced apoptosis in LM cells but reduced apoptosis in AT cells. The basal c-fos transcription activity is 70 times lower in AT cells than that in LM cells. The c-fos transcription activity was repressed by overexpression of PKCI in LM cells but not in AT cells. After induction of c-fos by Ras protein, overexpression of PKCI repressed c-fos transcription in LM cells but not in AT cells Conclusion: Overexpression of PKCI increased radiation sensitivity and repressed c-fos transcription in LM cells but not in AT cells. The results may be a. reason of increased radiation sensitivity of AT cells. PKCI may be involved in an ionizing radiation induced signal transduction pathway responsible for radiation sensitivity and c-fos transcription. The data also provided evidence for novel transcriptional difference between LM and AT cells.

  • PDF

A Study on the Accessability of the Bikeway Networks in the South of the Han River Using Space Syntax (Space Syntax를 이용한 한강이남 자전거도로망의 접근성 분석)

  • Oh, Chung-Won;Lim, Dong-Wook;Kim, Hyun-Jin;Park, Jun-Tae
    • International Journal of Highway Engineering
    • /
    • v.14 no.3
    • /
    • pp.97-110
    • /
    • 2012
  • In case of the axial line bikeway, the residents in the riverside use it frequently but those in the city center hardly do as the axis is formed along the riverside of the Han river. This situation happens due to the inefficient connectivity between the bikeway that leads to the riverside and that in the city center, which means the administrative policies have been focused on the facilities rather than on raising connectivity of the bikeway networks in the south of the Han River. Also, this is the point of time when a reasonable improvement plan is needed to raise the accessibilities of the bikeways in Seoul, not just a utilization of those in the south of the Han River. This study intends to analyse the connectivity between Gangseo (west of the Han River) and Gangdong (East of the Han River) districts by comparing the current spatial structure in the southern areas of the Han River and that after the installation of the axial line, and that after installation of the ordinary bikeway respectively with use of the Space Syntax Model, and to predict resultant changes there of. The Space Syntax Model was used as the major method of analysis in this study to find out characteristics of the bikeways in the south of the Han River. Consequently, as the analysis shows that when the bikeways in the Gangseo and Gangdong-gu districts are connected, the accessibility of the bikeways in the south of the Han River will improve while the spatial structure intelligibility will be lowered, it can be said the prediction rate in the all areas is low compared with the current status. It is analyzed that the intelligibility of the current bikeways in the south of the Han River appeared highest when compared with those of plans for installation of the axial line and ordinary bikeway because they don't interconnect with other areas.

An Examination of Knowledge Sourcing Strategies Effects on Corporate Performance in Small Enterprises (소규모 기업에 있어서 지식소싱 전략이 기업성과에 미치는 영향 고찰)

  • Choi, Byoung-Gu
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.57-81
    • /
    • 2008
  • Knowledge is an essential strategic weapon for sustaining competitive advantage and is the key determinant for organizational growth. When knowledge is shared and disseminated throughout the organization, it increases an organization's value by providing the ability to respond to new and unusual situations. The growing importance of knowledge as a critical resource has forced executives to pay attention to their organizational knowledge. Organizations are increasingly undertaking knowledge management initiatives and making significant investments. Knowledge sourcing is considered as the first important step in effective knowledge management. Most firms continue to make an effort to realize the benefits of knowledge management by using various knowledge sources effectively. Appropriate knowledge sourcing strategies enable organizations to create, acquire, and access knowledge in a timely manner by reducing search and transfer costs, which result in better firm performance. In response, the knowledge management literature has devoted substantial attention to the analysis of knowledge sourcing strategies. Many studies have categorized knowledge sourcing strategies into intemal- and external-oriented. Internal-oriented sourcing strategy attempts to increase firm performance by integrating knowledge within the boundary of the firm. On the contrary, external-oriented strategy attempts to bring knowledge in from outside sources via either acquisition or imitation, and then to transfer that knowledge across to the organization. However, the extant literature on knowledge sourcing strategies focuses primarily on large organizations. Although many studies have clearly highlighted major differences between large and small firms and the need to adopt different strategies for different firm sizes, scant attention has been given to analyzing how knowledge sourcing strategies affect firm performance in small firms and what are the differences between small and large firms in the patterns of knowledge sourcing strategies adoption. This study attempts to advance the current literature by examining the impact of knowledge sourcing strategies on small firm performance from a holistic perspective. By drawing on knowledge based theory from organization science and complementarity theory from the economics literature, this paper is motivated by the following questions: (1) what are the adoption patterns of different knowledge sourcing strategies in small firms (i,e., what sourcing strategies should be adopted and which sourcing strategies work well together in small firms)?; and (2) what are the performance implications of these adoption patterns? In order to answer the questions, this study developed three hypotheses. First hypothesis based on knowledge based theory is that internal-oriented knowledge sourcing is positively associated with small firm performance. Second hypothesis developed on the basis of knowledge based theory is that external-oriented knowledge sourcing is positively associated with small firm performance. The third one based on complementarity theory is that pursuing both internal- and external-oriented knowledge sourcing simultaneously is negatively or less positively associated with small firm performance. As a sampling frame, 700 firms were identified from the Annual Corporation Report in Korea. Survey questionnaires were mailed to owners or executives who were most erudite about the firm s knowledge sourcing strategies and performance. A total of 188 companies replied, yielding a response rate of 26.8%. Due to incomplete data, 12 responses were eliminated, leaving 176 responses for the final analysis. Since all independent variables were measured using continuous variables, supermodularity function was used to test the hypotheses based on the cross partial derivative of payoff function. The results indicated no significant impact of internal-oriented sourcing strategies while positive impact of external-oriented sourcing strategy on small firm performance. This intriguing result could be explained on the basis of various resource and capital constraints of small firms. Small firms typically have restricted financial and human resources. They do not have enough assets to always develop knowledge internally. Another possible explanation is competency traps or core rigidities. Building up a knowledge base based on internal knowledge creates core competences, but at the same time, excessive internal focused knowledge exploration leads to behaviors blind to other knowledge. Interestingly, this study found that Internal- and external-oriented knowledge sourcing strategies had a substitutive relationship, which was inconsistent with previous studies that suggested complementary relationship between them. This result might be explained using organizational identification theory. Internal organizational members may perceive external knowledge as a threat, and tend to ignore knowledge from external sources because they prefer to maintain their own knowledge, legitimacy, and homogeneous attitudes. Therefore, integrating knowledge from internal and external sources might not be effective, resulting in failure of improvements of firm performance. Another possible explanation is small firms resource and capital constraints and lack of management expertise and absorptive capacity. Although the integration of different knowledge sources is critical, high levels of knowledge sourcing in many areas are quite expensive and so are often unrealistic for small enterprises. This study provides several implications for research as well as practice. First this study extends the existing knowledge by examining the substitutability (and complementarity) of knowledge sourcing strategies. Most prior studies have tended to investigate the independent effects of these strategies on performance without considering their combined impacts. Furthermore, this study tests complementarity based on the productivity approach that has been considered as a definitive test method for complementarity. Second, this study sheds new light on knowledge management research by identifying the relationship between knowledge sourcing strategies and small firm performance. Most current literature has insisted complementary relationship between knowledge sourcing strategies on the basis of data from large firms. Contrary to the conventional wisdom, this study identifies substitutive relationship between knowledge sourcing strategies using data from small firms. Third, implications for practice highlight that managers of small firms should focus on knowledge sourcing from external-oriented strategies. Moreover, adoption of both sourcing strategies simultaneousiy impedes small firm performance.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.