• Title/Summary/Keyword: knowledge-based

Search Result 11,772, Processing Time 0.039 seconds

Case-based Software Project Network Generation by the Least Modification Principle (사례의 수정최소화 기법에 의한 소프트웨어 프로젝트 네트워크 생성시스템)

  • Lee, No-Bok;Lee, Jae-Kyu
    • Asia pacific journal of information systems
    • /
    • v.13 no.1
    • /
    • pp.103-118
    • /
    • 2003
  • Software project planning is usually represented by a project activity network that is composed of stages of tasks to be done and precedence restrictions among them. The project network is very complex and its construction requires a vast amount of field knowledge and experience. So this study proposes a case-based reasoning approach that can generate the project network automatically based on the past cases and modification knowledge. For the case indexing, we have adopted 17 factors, each with a few alternative values. A special structure of this problem is that the modification effort can be identified by each factor independently. Thus it is manageable to identify 85 primitive modification actions(add and delete activities) and estimate its modification efforts in advance. A specific case requires a combination of primitive modifications. Based on the modification effort knowledge, we have adopted the Least Modification approach as a metric of similarity between a new project and past cases. Using the Least Modification approach and modification knowledge base, we can automatically generate the project network. To validate the performance of Least Modification approach, we have compared its performance with an ordinary minimal distance approach for 21 test cases. The experiment showed that the Least Modification approach could reduce the modification effort significantly.

Development of Web-based Design Review System for Reliability and Safety Knowledge Management

  • Otsuka, Yuichi;Yukawa, Takashi;Mutoh, Yoshiharu
    • International Journal of Safety
    • /
    • v.9 no.2
    • /
    • pp.22-28
    • /
    • 2010
  • This paper describes a web-based design review system as a knowledge management system relating reliability and safety system design. Since people's consciousness for safety and security become sensitive and increases the need of establishing a proactive prevention method for internal failures and relating risks in products. It also means that prevailing tacit knowledge in retired workers, in order to transform them to be easily used to support new system development, become more important. When considering safety and reliability design, at least two data sheet are necessary; Failure Modes and Effects Analyses (FMEA) and Risk Assessment (RA). These two data are practically made separately. However, it includes the concerns that a risk by failures during long-term use may not be noticed. To overcome this insufficiency, a support tool for integrating reliability evaluation and risk assessment data simultaneously is expected to be revealed. The authors have then developed a web-based design review system for reliability and safety system design. The system include various profitable functions; making FMEA and RA sheet, retrieving past data sheet for engineering change management and new product development and web-based discussion to increase the efficiency of discussion. The system is applied to one practical development works in order to demonstrate its effectiveness that is to be made clear by interviewing user's qualitative comment.

Knowledge-Based Approach for an Object-Oriented Spatial Database System (지식기반 객체지향 공간 데이터베이스 시스템)

  • Kim, Yang-Hee
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.99-115
    • /
    • 2003
  • In this paper, we present a knowledge-based object-oriented spatial database system called KOBOS. A knowledge-based approach is introduced to the object-oriented spatial database system for data modeling and approximate query answering. For handling the structure of spatial objects and the approximate spatial operators, we propose three levels of object-oriented data model: (1) a spatial shape model; (2) a spatial object model; (3) an internal description model. We use spatial type abstraction hierarchies(STAHs) to provide the range of the approximate spatial operators. We then propose SOQL, a spatial object-oriented query language. SOQL provides an integrated mechanism for the graphical display of spatial objects and the retrieval of spatial and aspatial objects. To support an efficient hybrid query evaluation, we use the top-down spatial query processing method.

  • PDF

Intelligent Product Search Agent based on SWRL (시맨틱 웹 규칙 언어를 이용한 지능형 상품 정보 검색 에이전트 개발)

  • Kim, U-Ju;Kim, Jeong-Myeong;Choe, Dae-U
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.316-320
    • /
    • 2005
  • We developed Intelligent Product Search Agent based on SWRL, and this agent can search product information with knowledge(facts and rules) on the web, implement price comparison for searched products considering delivery rates. Existing keyword based product search engines is poor at searching intent products though a user has already prefect knowledge about intent produces. Furthermore if a user has insufficient knowledge, it is impossible to implement search. Also, existing price comparison shopping mall gives users comparison service considering total price(product prices, taxes, delivery rates), this service is valid to single product and has limitations of system expansion and up-dating because of not rule base but programming base. If there is appropriate knowledge on the Semantic web and this makes product information retrieval possible, above problems can be solved clearly. In this research, we developed Intelligent Product Search Agent based on SWRL that can search product information efficiently by making agent to handle facts and rules by itself.

  • PDF

Production Rules Based on the Rule-Based Model for Grinding Trouble-shooting (연삭가공 트러블슈팅을 위한 룰베이스 룰의 구성)

  • Lee, Jae-Kyung;Kim, Gun-Hoi;Song, Ji-Bok
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.8
    • /
    • pp.106-112
    • /
    • 2000
  • Cognition and control of grinding trouble occurring during the grinding process are classified into a quantitative knowledge which depends on experimental data and qualitative knowledge which relies on skiful engineers. grinding operations include a large number of functional parameters since there are several ways of coping with ginding trouble. One is the qualitative method which depends on empirical knowledge utilizing the skilful experts from the workshop the other is the quantitative method which utilizes the experimental data obtained by sensor. But they are all difficult to accomplish from the grinding trouble-shooting system The reason is that grinding troubles are not accomplish from the grinding trouble-shooting system,. The rason is that grinding troubles are not easily controlled in the quantitative method and therefore trouble-shooting has mainly relied on the knoledge of skiful engineers. Thus there is an important issue of how a grinding touble-shooting system can be designed and what knowledge is utilized among the large amount of grinding trouble information. In this paper basic strategy to develop the grinding database by taking rule-based model which is strongly depended upon experience and intuition is described.

  • PDF

The Characteristics of Evidence in Evidence-based Design Research and Their Implications to the Evidence-based Practice of Healthcare Architecture - Focused on Health Environments Research & Design Journal (근거기반설계 연구의 근거 특성과 의료건축의 근거기반실무를 위한 시사점 - HERD의 연구경향 분석을 중심으로)

  • Kim, Duksu
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.28 no.4
    • /
    • pp.21-30
    • /
    • 2022
  • Purpose: To prove the credibility of EBD, it is necessary to define concepts regarding the nature of credible knowledge and the hierarchy of evidence. In addition, the relationship between EBD and EBP needs to be addressed through a practical viewpoint. Methods: The systematic review is applied to define the nature of knowledge and the characteristics of research papers in architectural EBD while analyzing the field of study, knowledge focus and types of keywords of the first author. Results: As a whole, the types of research focus evaluated using the most frequent keywords include function(40.86%), specialized knowledge(30.52%), professional practice(21.37%), and health(5.78%). Empirical research(83.72%) is more likely to be found than theoretical research(13.95%). The EBD research papers ranked as top-tier are only 7(2.03%) among a total of 344, while the research papers ranked in the third to fourth tiers are 276(80.23%). Implications: There is a deficiency of reliable 1-2 tier research papers. From a practical viewpoint, it would be realistic to recommend that healthcare architects appropriately evaluate the quality of EBD research and apply it in practice, rather than to conduct EBD research themselves. This systematic review illustrates the nature of EBD research.

Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File (알려지지 않은 실행파일의 악의적인 특징들을 분석하기 위한 행위추적 프로그램)

  • Kim, Dae-Won;Kim, Ik-Kyun;Oh, Jin-Tae;Jang, Jong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.941-944
    • /
    • 2011
  • 컴퓨팅 환경에서 각종 보안 위협들의 핵심에는 악성 실행파일들이 있다. 전통적인 시그니처 기반의 보안 시스템들은 악의적인 실행파일들 중에서 알려지지 않은 것들에 대해서는 런타임 탐지에 어려움이 있다. 그러한 이유로 런타임 탐지를 위해 시그니처가 필요 없는 정적, 동적 분석 방법들이 다각도로 연구되어 왔으며, 특히 악성 실행파일을 실제 실행한 후 그 동작상태를 모니터링 하는 행위기반 동적 분석방법들이 많은 발전을 이루어왔다. 그러나 대부분의 행위기반 분석방법들은 단순히 몇 가지 행위나 비순차적인 분석정보를 제공하기 때문에, 차후 악성여부를 최종 판단하는 방법론에 적용하기에는 그 분석정보가 충분하지 않다. 본 논문에서는 악성 실행파일이 실행되는 동안 발생할 수 있는 행위들을 분류하고, 이를 모니터링 하는 프로토타입 프로그램을 구현하였다. 또한, 악성 실행파일을 직접 실행하는 것은 제한된 컴퓨팅 환경에서 이루어지기 때문에, 실제 악성 실행파일을 모니터링 한 결과를 토대로 행위기반 모니터링 방법이 극복해야 될 이슈들에 대해서도 언급하고 있다.

Evaluation of different attacks on Knowledge Based Authentication technique

  • Vijeet Meshram
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.111-115
    • /
    • 2023
  • Knowledge Based Authentication is the most well-known technique for user authentication in a computer security framework. Most frameworks utilize a straightforward PIN (Personal Identification Number) or psssword as an data authenticator. Since password based authenticators typically will be software based, they are inclined to different attacks and weaknesses, from both human and software.Some of the attacks are talked about in this paper.

A Study on the Relationship among Communication Competency, Social Network Centralities, Discussion Performance, and Online Boarding Activity in the Team Based Learning (팀 기반 토의 수업에서 의사소통능력, 사회연결망 중심도, 토론성과 및 온라인 게시활동의 관계 연구)

  • Heo, Gyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.27 no.1
    • /
    • pp.108-114
    • /
    • 2015
  • The purpose of this study is to find the relationships among communication competency, social network centrality(trust centrality and knowledge sharing centrality), discussion performance, and online boarding activity in the team based learning situation. For investigating this topic, 44 students are participated in the classes of educational technology. In order to find out the relationships among communication competency, social network centrality, discussion performance, and online boarding activity, compared t-test and path analysis are used. Followings are the results of the research: (a) Communication competency is improved significantly after team based learning. (b) Trust centrality effects significantly on the knowledge sharing centrality. (c) Knowledge sharing effects significantly on discussion performance. (d) Trust centrality effects on the online boarding activity in the team based learning.

Development of Web-based Automatic Demand Forecasting Module

  • Kang, Soo-Kil;Kang, Min-Gu;Park, Sun-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2490-2495
    • /
    • 2005
  • The scheduling of plant should be determined based on the product demands correctly forecasted by reasonable methods. However, because most existing forecasting packages need user's knowledge about forecasting, it has been hard for plant engineers without forecasting knowledge to apply forecasted demands to scheduling. Therefore, a forecasting module has been developed for plant engineers without forecasting knowledge. In this study, for the development of the forecasting module, an automatic method using the ARIMA model that is framed from the modified Box-Jenkins process is proposed. And a new method for safety inventory determination is proposed to reduce the penalty cost by forecasting errors. Finally, using the two proposed methods, the web-based automatic module has been developed.

  • PDF