• Title/Summary/Keyword: analysis methodology

Search Result 9,321, Processing Time 0.036 seconds

Development of a Program for Estimating warship manpower using Systems Engineering and Component Based Development Methodology (시스템엔지니어링과 CBD 방법론을 활용한 함정 승조원 수 추정 프로그램 개발)

  • Hwang, In Hyuck
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.17 no.2
    • /
    • pp.61-68
    • /
    • 2021
  • A decrease in the fertility rate leads to a reduction of troops, so the need to efficiently operate the troops is growing. Therefore, it is necessary to develop a system for estimating warship manpower. In this study, system development was performed according to the CBD methodology. The user requirements were defined and the system function that satisfies the requirements was derived. And through the development process, the CBD methodology and the systems engineering process were compared. As a result, similarities were confirmed in the analysis and concept design stages, so the possibility of merging the two processes was suggested.

A Case Study on an Application of the Event-Driven Scenario-Based Methodology of Developing Information Systems (이벤트 중심의 시나리오 기반 정보시스템 개발 방법론의 적용에 관한 사례 연구)

  • Jang, Gil-Sang;Lee, Won-Jo
    • Journal of the Korea Safety Management & Science
    • /
    • v.20 no.2
    • /
    • pp.65-76
    • /
    • 2018
  • Recently, most of the information system use environment is changing to GUI environment based on windows and web. Most of the development tools for building such a GUI-based information system support object-oriented and event-driven programming concepts. However, there is still a lack of a development methodology that systematically supports event-based information system construction. From a business perspective, an information system is one that supports business processes efficiently and effectively to improve business performance. These business processes are composed of business activities which involve a series of business events. A business event is executed according to a business scenario. Therefore, it is necessary to grasp these events in the requirements analysis stage and to apply it on the system development methodology. However, information systems development methodology which systematically reflect the event processing concept still is insufficient. From this viewpoint, this paper proposes an event-driven scenario-based development methodology that can meet the recent development environment of information systems, and applies the proposed methodology to a small scale information system development case.

Structural Analysis on the Leaflet Motion Interacted with Blood Flow for Thickness Minimization Design of a Bileaflet Mechanical Heart Valve (기계식 인공심장판막의 경량화 구조설계를 위한 혈액유동과 상호작용하는 판막거동의 구조역학적 특성연구)

  • 권영주;방혜철;김창녕
    • Korean Journal of Computational Design and Engineering
    • /
    • v.6 no.1
    • /
    • pp.59-68
    • /
    • 2001
  • This paper investigates the structural analysis and design of mechanical heart valve through the numerical analysis methodology. In a numerical analysis methodology application to the thickness minimization structural design of mechanical heart valve, fluid analysis is performed for the blood flow through a bileaflet mechanical heart valve. Simultaneously the kinetodynamic analysis is carried out to obtain the appropriate structural condition for the structural analysis. Thereafter the structural static analysis is also carried out to confirm the thickness minimization structural condition(minimum thickness shape of leaflet).

  • PDF

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

A Study on the Introduction Methodology of Knowledge Management (지식경영의 도입방법론에 관한 연구 -L기업의 사례를 중심으로-)

  • Oh, Jae-In;Seo, Hyun-Sik
    • IE interfaces
    • /
    • v.13 no.1
    • /
    • pp.44-53
    • /
    • 2000
  • While knowledge management (KM) needs to be introduced in order to enhance the competitiveness of Korean firms, most of the current literature focuses on defining the concept of KM and developing its framework. This research attempts to develop an introduction methodology of KM, based on four dimensions such as organization, information technology, process, and culture. The methodology was applied to firm L, which recently adopted KM. A result from the analysis of this case study shows that firm L performed well in the dimensions of organization, information technology, and culture.

  • PDF

A Study on the Alternative Technology Evaluation Based on LCA and ″extended″ Energy I/O Technique (LCA와 에너지수지비 개념의 확장을 통한 대체에너지기술의 평가방법론)

  • 박찬국;박영구;최기련
    • Journal of Energy Engineering
    • /
    • v.8 no.2
    • /
    • pp.317-324
    • /
    • 1999
  • This study suggests the effectiveness of an "extended" power system evaluation methodology based on LCA and energy input-output analysis techniques. This "extended" evaluation methodology is designed to incorporate total energy system costs through fuel cycle and external costs, including CO$_2$abatement cost. As an empirical test, we applied the methodology to orimulsion-fired power generation technology and found that orimulsion could be considered as in attractive base-load power generation fuel in terms of economic and environmental aspects, compared to conventional coal-fired power plant.

  • PDF

A Customer Oriented Internet Business Implementation Methodology (고객 우선 인터넷 비즈니스 구축 방법론)

  • 이충석;이희석
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.87-90
    • /
    • 2001
  • One of the most important challenges facing companies in the age of internet business is the proper alignment customers needs with internet business system that allaws them to react rapidly and continuously. This paper proposes a methodo1ogy to align analyzing customer's requirements with implementing Internet business system The methodology consists of five Phases. It covers from customer analysis to Internet business system implementation, and each of the five phases has its own activities and outputs. A real- world case is proposed to illustrate the application of the methodology.

  • PDF

Efficient Generation of Image Identifiers for Image Database (정지영상 데이터베이스의 효율적 인식자 생성)

  • Park, Je-Ho
    • Journal of the Semiconductor & Display Technology
    • /
    • v.10 no.3
    • /
    • pp.89-94
    • /
    • 2011
  • The image identification methodology associates an image with a unique identifiable representation. Whenever the methodology regenerates an identifier for the same image, moreover, the newly created identifier needs to be consistent in terms of representation value. In this paper, we discuss a methodology for image identifier generation utilizing luminance correlation. We furthermore propose a method for performance enhancement of the image identifier generation. We also demonstrate the experimental evaluations for uniqueness and similarity analysis and performance improvement that have shown favorable results.

Analysis of Qualitative Research Published by Korean Journal of Adult Nursing (1989-2011) (성인간호학회지(1989-2011)에 게재된 질적 연구의 동향 분석)

  • Kim, Yeong-Kyeong;Hwang, Sun-Young;Shin, Su-Jin
    • Korean Journal of Adult Nursing
    • /
    • v.23 no.6
    • /
    • pp.633-641
    • /
    • 2011
  • Purpose: This study was to examine the trend of qualitative study published by Korean Journal of Adult Nursing from 1989 to 2011, and to suggest future directions through identifying its strength and weakness. Methods: Ninety one published qualitative studies were analyzed focusing on research methodology and research themes using descriptive statistics. Results: During the last 22 years, the number of qualitative studies has rapidly increased and the methodology used to analyze qualitative data has been diversified. The most frequently used analytic method was a phenomenology (48.4%) and the frequency of conducting a content analysis has increased. The prevailing data collection settings were community (61.5%), followed by hospital (35.2%). Especially, many researches showed specific description on researcher's efforts to get validity and reliability of studies in individual studies presented within recent 10 years. However, it was noted that meta study using mixed methodology and secondary analysis of qualitative studies are rarely used and need to be facilitated. Conclusion: Nursing Researchers utilizing qualitative research should continuously make efforts to increase the validity and reliability of their studies and to find knowledges or strategies applicable to practice through using mixed methods or secondary analysis of individual studies.

Development of an Efficient Method to Consider Weld Distortion in Tolerance Analysis (용접변형을 고려한 효율적 공차해석 기법 개발)

  • Yim Hyunjune;Lee Dongyul;Lee Jaeyeol;Kwon Ki Eak;Shin Jong-Gye
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.29 no.10 s.241
    • /
    • pp.1377-1383
    • /
    • 2005
  • A general and efficient methodology has been developed to analyze dimensional variations of an assembly, taking into account of weld distortion. Weld distortion is generally probabilistic because of the random nature of welding parameters such as the welding speed, maximum welding temperature, ambient temperature, etc. The methodology is illustrated through a very simple example of two perpendicular plates fillet-welded to each other. Two steps comprise the methodology: establishment of a weld-distortion database, and tolerance analysis using the database. To establish the database, thermo-elasto-plastic finite element analyses are conducted to compute the weld distortion for all combinations of discrete values of major welding parameters. In the second step of tolerance analysis, the weld distortion retrieved from the database is used in addition to the dimensional tolerances of the parts. As a result of such an analysis, sensitivities of the assembly's dimensional variations to the part tolerances and weld distortion are obtained, which can be help improve the dimensional quality of the assembly.