• Title/Summary/Keyword: Utility software

Search Result 145, Processing Time 0.02 seconds

Review on the Quality Attributes of an Integrated Simulation Software for Weapon Systems (무기체계 통합시뮬레이션 소프트웨어의 품질 속성 검토)

  • Oh, Hyun-Shik;Kim, Dohyung;Lee, Sunju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.4
    • /
    • pp.408-417
    • /
    • 2021
  • This paper describes the quality attributes of an integrated simulation software for weapon systems named Advanced distributed simulation environment(AddSIM). AddSIM is developed as a key enabler for Defense Modeling & Simulation(M&S) systems which simulate battlefields and used for battle experiments, analyses, military exercises, training, etc. AddSIM shall provide a standard simulation framework of the next Defense M&S systems. Therefore AddSIM shall satisfy not only functional but also quality requirements such as availability, modifiability, performance, testability, usability, and others. AddSIM consists of operating softwares of hierarchical components including graphical user interface, simulation engines, and support services(natural environment model, math utility, etc.), and separated weapon system models executable on the operating softwares. The relation between software architectures and their quality attributes are summarized from previous works. And the AddSIM architecture and its achievements in the aspect of quality attributes are reviewed.

Mediator Agent System for Reciprocity and Negotiation using Multi-attributes (다중 속성 협상과 상호 이익을 위한 중개 에이전트 시스템)

  • 박상현;양성봉
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.3
    • /
    • pp.308-316
    • /
    • 2004
  • This paper proposed mediator agent system that guarantees reciprocity to attendances in bilateral negotiations for electronic commerce that is different from regular commercial transactions. The optimal agreement was supposed to provide the total maximum profits and the minimum difference in profits of both attendances in negotiations. In the mediator agent system, mediator agent conducted the negotiations considering multi attributes of product and Multi Attribute Utility Theory(MAUT) was applied to evaluate the profits of buyer and seller. 1'he negotiation model in mediator agent system was transformed into linear programming according to the information of bargain for attendances in negotiations. In order to compare with mediator agent system under the same conditions of reciprocity, another negotiation agent system was implemented using trade-off mechanism that is an algorithm for agent interactions in negotiation. The negotiation agent system using trade-off mechanism did not guarantee the optimal agreement, whereas mediator agent system provided attendances in negotiations with optimal agreement rapidly in comparison with trade-off mechanism.

A Study on the Evaluation of Commercial Softwares for Bank Risk Management by AHP (AHP 기법에 의한 금융위험관리 소프트웨어 평가에 관한 연구)

  • 최희성;황규승
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.2
    • /
    • pp.51-51
    • /
    • 1991
  • Recently financial institutions in Korea are experiencing an unfamiliar challenge in terms of their operational risk management due to the volatility of global financial market and the incessant development of new financial products. In this paper, we present an AHP(Analytic Hierarchy Process) model to evaluate the effectiveness of commercial softwares for risk management in banking. The AHP model considers software's performance. utility, serviceability and durability as major evaluation criteria. The weight of each criterion is generated by the questionnaire survey given to practitioners in risk management in domestic commercial banks.

A Study on the Evaluation of Commercial Softwares for Bank Risk Management by AHP (AHP 기법에 의한 금융위험관리 소프트웨어 평가에 관한 연구)

  • 최희승;황규승
    • Korean Management Science Review
    • /
    • v.16 no.2
    • /
    • pp.51-59
    • /
    • 1999
  • Recently financial institutions in Korea are experiencing an unfamiliar challenge in terms of their operational risk management due to the volatility of global financial market and the incessant development of new financial products. In this paper, we present an AHP(Analytic Hierarchy Process) model to evaluate the effectiveness of commercial softwares for risk management in banking. The AHP model considers software's performance. utility, serviceability and durability as major evaluation criteria. The weight of each criterion is generated by the questionnaire survey given to practitioners in risk management in domestic commercial banks.

  • PDF

De-identifying Unstructured Medical Text and Attribute-based Utility Measurement (의료 비정형 텍스트 비식별화 및 속성기반 유용도 측정 기법)

  • Ro, Gun;Chun, Jonghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.121-137
    • /
    • 2019
  • De-identification is a method by which the remaining information can not be referred to a specific individual by removing the personal information from the data set. As a result, de-identification can lower the exposure risk of personal information that may occur in the process of collecting, processing, storing and distributing information. Although there have been many studies in de-identification algorithms, protection models, and etc., most of them are limited to structured data, and there are relatively few considerations on de-identification of unstructured data. Especially, in the medical field where the unstructured text is frequently used, many people simply remove all personally identifiable information in order to lower the exposure risk of personal information, while admitting the fact that the data utility is lowered accordingly. This study proposes a new method to perform de-identification by applying the k-anonymity protection model targeting unstructured text in the medical field in which de-identification is mandatory because privacy protection issues are more critical in comparison to other fields. Also, the goal of this study is to propose a new utility metric so that people can comprehend de-identified data set utility intuitively. Therefore, if the result of this research is applied to various industrial fields where unstructured text is used, we expect that we can increase the utility of the unstructured text which contains personal information.

Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering

  • Hong, Do-Won;Mohaisen, Abedelaziz
    • ETRI Journal
    • /
    • v.32 no.3
    • /
    • pp.351-361
    • /
    • 2010
  • Multiple rotation-based transformation (MRBT) was introduced recently for mitigating the apriori-knowledge independent component analysis (AK-ICA) attack on rotation-based transformation (RBT), which is used for privacy-preserving data clustering. MRBT is shown to mitigate the AK-ICA attack but at the expense of data utility by not enabling conventional clustering. In this paper, we extend the MRBT scheme and introduce an augmented rotation-based transformation (ARBT) scheme that utilizes linearity of transformation and that both mitigates the AK-ICA attack and enables conventional clustering on data subsets transformed using the MRBT. In order to demonstrate the computational feasibility aspect of ARBT along with RBT and MRBT, we develop a toolkit and use it to empirically compare the different schemes of privacy-preserving data clustering based on data transformation in terms of their overhead and privacy.

The Implementation of the IPC Network using the Reserved Bus Topology (통신 예약 버스 방식을 이용한 IPC 통신망 구성에 관한 연구)

  • 김호건;박영덕;김선형;조규섭;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.1
    • /
    • pp.28-40
    • /
    • 1988
  • Nowadays, the needs for intelligence of communication equipments and the cost down of micro processor are showing a tendency to have multi0processor in a single system. In this paper, based on the Reserved Bus Topology which is propoed in "A study on he Communication Method between the adjacent processor", the software and hardware is designed and developed. And tha validity of this method and the utility of designed software and hardware functions are also verified through exepriments.epriments.

  • PDF

Design of Multi-Attribute Agent-Mediated Electronic Commerce Negotiation Model and its Framework (다중변소 기반 에이전트 중재 전자상거래 협상 모델 및 프레임워크 설계)

  • Chung, Mokdong
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.11
    • /
    • pp.842-854
    • /
    • 2001
  • Today\`s first generation shopping agent is limited to comparing merchant offerings usually on price instead of their full range of attributes. Even in the full range comparison, there is not a good model which considers the overall features in the negotiation process. Therefore, the negotiation model needs to be extended to include negotiations over the more attributes. In this paper, we propose a negotiation model in the agent-mediated electronic commerce to negotiate over prices, product features, warranties and service policies based on utility theory and simple heuristics. We will describe a prototype agent-mediated electronic commerce framework called Pmart. This framework provides the software reuse and the extensibility based on the object-oriented technology. It is implemented on Windows-based platforms using Java and CORBA for the network transparency and platform independence.

  • PDF

P2P Based Collision Solving Technique for Effective Concurrency Control in a Collaborative Development Environment (협업개발 환경에서의 효율적 동시성 제어를 위한 P2P기반 충돌해결 기법)

  • Park, Hyun-Soo;Kim, Dae-Yeob;Youn, Cheong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.571-582
    • /
    • 2009
  • This paper provides a way to overcome limitations of general collaborative software development tools that completely restrict co-ownership of resources among individuals in a team oriented developmental environment. It also provides a solution for users to co-own resources and at the same time manage version control and collision problems that may occur due to the co-ownership of resources.The cooperative development support tool of developed software uses the conventional optimistic technique but employs the algorithm which is improved to reduce costs and efforts required for solving collision. The collaborative software development tool presented in this paper is made up of the classical client/server structure with the P2P(peer to peer) method which supports information exchange among individuals. This tool is developed based on open source software CVS(Concurrent Version System). Functional efficiency was confirmed by comparing it to the utility of prior existing collaborative software development tools.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.