• 제목/요약/키워드: modeling perspective

검색결과 462건 처리시간 0.022초

정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로 (The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness)

  • 김종기;전진환;임호섭
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제15권1호
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

Power Modeling Approach for GPU Source Program

  • Li, Junke;Guo, Bing;Shen, Yan;Li, Deguang;Huang, Yanhui
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권1호
    • /
    • pp.181-191
    • /
    • 2018
  • Rapid development of information technology makes our environment become smarter and massive high performance computers are providing powerful computing for that. Graphics Processing Unit (GPU) as a typical high performance component is being widely used for both graphics and general-purpose applications. Although it can greatly improve computing power, it also delivers significant power consumption and need sufficient power supplies. To make high performance computing more sustainable, the important step is to measure it. Current power technologies for GPU have some drawbacks, such as they are not applicable for power estimation at the early stage. In this article, we present a novel power technology to correlate power consumption and the characteristics at the programmer perspective, and then to estimate power consumption of source program without prerunning. We conduct experiments on Nvidia's GT740 platform; the results show that our power model is more accurately than regression model and has an average error of 2.34% and the maximum error of 9.65%.

Model of Simultaneous Travel time and Activity Duration for worker with Transportation Panel Data

  • Kim Soon-Gwan
    • 대한교통학회:학술대회논문집
    • /
    • 대한교통학회 1998년도 Proceedings The 4th International Transport Symposium
    • /
    • pp.160-167
    • /
    • 1998
  • Recent world-wide interest in activity-based travel behavior modeling has generated an entirely new perspective on how the profession views the travel demand process. This paper seeks to further promote the case of activity-based travel behavior models by providing some empirical evidence of relationship between travel time and activity duration decision for worker with transportation panel data. The travel time from home to work and from work to home, without activity involvement, is estimated by the Ordinary Least Squares (OLS) method. And, the travel time to and from the selected activity and the activity duration are modeled simultaneously by the Three Stage Least Squares (3SLS) method due to the endogenous relationship between travel time and activity duration. Two kinds of models, OLS and 3SLS, include selectivity bias corrections in a discrete/continuous framework, because of the inter-relationship between the choice of activity type/travel mode (discrete) and the travel time/activity duration (continuous). Estimation is undertaken using a sample of over 1300 household two-day trip diaries collected from the same travelers in the Seattle area in 1989. The behavioral consequences of these models provide interesting and provocative findings that should be of value to transportation policy formulation and analysis.

  • PDF

지식공유 의도와 지식관리시스템의 사용 (Does Knowledge-sharing Intent Matter in the Use of Knowledge Management Systems?)

  • 김경규;김범수;송세정;신호경
    • Asia pacific journal of information systems
    • /
    • 제15권3호
    • /
    • pp.65-90
    • /
    • 2005
  • One of the major goals of using knowledge management systems(KMS) is the sharing of knowledge. The intent of an individual to share his/her knowledge plays a crucial role in sharing quality knowledge in corporations. However, there is little research that addresses this relationship between the intent to share and the use of KMS both from a holistic perspective and with empirical data analyses. To understand major factors that affect both knowledge sharing intent and the use of KMS, we conducted a field study from eight companies in four different industries which had been using KMS for at least a year. Using confirmatory factor analysis and structured equation modeling techniques, we have analyzed the relationships among top management support, trust among peers, trust in the organizational hierarchy, incentives and rewards, knowledge-sharing intent, KMS quality, knowledge quality, and the use of KMS. The research results show that top management support and trust between peers enhance the intent of sharing knowledge. We also found that top management support, knowledge-sharing intent, incentives and rewards, and the quality of knowledge have positive relationships with the use of KMS.

Analytical Study on Inter-Cell Handover via Non-Concentric Circles in Wireless Heterogeneous Small Cell Networks

  • Gu, Hangyu;Li, Shuangchun;Havyarimana, Vincent;Wang, Dong;Xiao, Zhu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권5호
    • /
    • pp.2029-2043
    • /
    • 2018
  • In this paper, we propose a novel inter-cell handover approach from a new perspective in dense Heterogeneous and Small Cell Networks (HetSNets). We first devise a cell selection mechanism to choose a proper candidate small cell for the UEs that tend to implement inter-small cell handover (ICH). By exploiting the property of a typical non-concentric circle, i.e., circle of Apollonius, we then propose a novel analytical method for modeling inter-cell handover regions and present mathematical derivation to prove that the inter-small cell handover issues fit the property of the circle of Apollonius. We design an inter-cell handover algorithm (ICHA) by means of our proposed handover model to dynamically configure hysteresis margin and properly implement handover decision in terms of UE's mobility. Simulation results demonstrate that the proposed ICHA yields lower call drop rate and radio link failure rate than the conventional methods and hence achieve high Handover Performance Indicator (HPI).

Microgrid energy scheduling with demand response

  • Azimian, Mahdi;Amir, Vahid;Haddadipour, Shapour
    • Advances in Energy Research
    • /
    • 제7권2호
    • /
    • pp.85-100
    • /
    • 2020
  • Distributed energy resources (DERs) are essential for coping with growing multiple energy demands. A microgrid (MG) is a small-scale version of the power system which makes possible the integration of DERs as well as achieving maximum demand-side management utilization. Hence, this study focuses on the analysis of optimal power dispatch considering economic aspects in a multi-carrier microgrid (MCMG) with price-responsive loads. This paper proposes a novel time-based demand-side management in order to reshape the load curve, as well as preventing the excessive use of energy in peak hours. In conventional studies, energy consumption is optimized from the perspective of each infrastructure user without considering the interactions. Here, the interaction of energy system infrastructures is considered in the presence of energy storage systems (ESSs), small-scale energy resources (SSERs), and responsive loads. Simulations are performed using GAMS (General Algebraic modeling system) to model MCMG, which are connected to the electricity, natural gas, and district heat networks for supplying multiple energy demands. Results show that the simultaneous operation of various energy carriers, as well as utilization of price-responsive loads, lead to better MCMG performance and decrease operating costs for smart distribution grids. This model is examined on a typical MCMG, and the effectiveness of the proposed model is proven.

RI-Biomics 기술 직무역량 개발을 위한 역량모델 재정립 및 활용 (Competency Re-modelling & Application Plans for Development of Job Competency in RI-Biomics)

  • 신우호;박태진
    • 방사선산업학회지
    • /
    • 제11권1호
    • /
    • pp.33-38
    • /
    • 2017
  • RI-Biomics technology is advanced convergence technologies that can be measured in real time and track in vivo behavior and metabolism of substances using characteristics of the radioactive isotope. Its application fields are increasing such as drug development, agriculture, development of new materials and their utilization, etc. In addition, according to domestic and international developments and changes in the RI-Biomics environment, RI-Biomics professionals are needed to train continuously. To develop systematic human resources basement and competency-based curriculum, we perform competency modeling of pedagogical perspective to targeted at high-performance on RI-Biomics. Furthermore, we redefine the competency model and verified by industry experts with focus group interviews. In the result, two general competencies and three professional competencies were extracted by interview. Each competencies are organized six sub-competencies and nine sub-competencies. In the finial steps, the same procedures were repeated to obtain the consensus of experts on derived competencies and behavioral objectives. The results of the study are applicable to enhance human resource management and to develop the curriculum for RI-Biomics expert training. It is expected to be used as reference material of long term-planning for RI-Biomics professional.

FROM THE DIRECT NUMERICAL SIMULATION TO SYSTEM CODES - PERSPECTIVE FOR THE MULTI-SCALE ANALYSIS OF LWR THERMALHYDRAULICS

  • Bestion, D.
    • Nuclear Engineering and Technology
    • /
    • 제42권6호
    • /
    • pp.608-619
    • /
    • 2010
  • A multi-scale analysis of water-cooled reactor thermalhydraulics can be used to take advantage of increased computer power and improved simulation tools, including Direct Numerical Simulation (DNS), Computational Fluid Dynamics (CFD) (in both open and porous mediums), and system thermalhydraulic codes. This paper presents a general strategy for this procedure for various thermalhydraulic scales. A short state of the art is given for each scale, and the role of the scale in the overall multi-scale analysis process is defined. System thermalhydraulic codes will remain a privileged tool for many investigations related to safety. CFD in porous medium is already being frequently used for core thermalhydraulics, either in 3D modules of system codes or in component codes. CFD in open medium allows zooming on some reactor components in specific situations, and may be coupled to the system and component scales. Various modeling approaches exist in the domain from DNS to CFD which may be used to improve the understanding of flow processes, and as a basis for developing more physically based models for macroscopic tools. A few examples are given to illustrate the multi-scale approach. Perspectives for the future are drawn from the present state of the art and directions for future research and development are given.

Knowledge Model for Disaster Dataset Navigation

  • Hwang, Yun-Young;Yuk, Jin-Hee;Shin, Sumi
    • Journal of Information Science Theory and Practice
    • /
    • 제9권4호
    • /
    • pp.35-49
    • /
    • 2021
  • In a situation where there are multiple diverse datasets, it is essential to have an efficient method to provide users with the datasets they require. To address this suggestion, necessary datasets should be selected on the basis of the relationships between the datasets. In particular, in order to discover the necessary datasets for disaster resolution, we need to consider the disaster resolution stage. In this paper, in order to provide the necessary datasets for each stage of disaster resolution, we constructed a disaster type and disaster management process ontology and designed a method to determine the necessary datasets for each disaster type and disaster management process step. In addition, we introduce a method to determine relationships between datasets necessary for disaster response. We propose a method for discovering datasets based on minimal relationships such as "isA," "sameAs," and "subclassOf." To discover suitable datasets, we designed a knowledge exploration model and collected 651 disaster-related datasets for improving our method. These datasets were categorized by disaster type from the perspective of disaster management. Categorizing actual datasets into disaster types and disaster management types allows a single dataset to be classified as multiple types in both categories. We built a knowledge exploration model on the basis of disaster examples to ensure the configuration of our model.

DevOps와 DevSecOps의 컴포넌트 분석 (Component Analysis of DevOps and DevSecOps)

  • 홍진근
    • 한국융합학회논문지
    • /
    • 제10권9호
    • /
    • pp.47-53
    • /
    • 2019
  • 본 논문은 소프트웨어 및 제품의 개발운영 및 개발보안운영에 대한 특성을 검토하고 소프트웨어 코드 관점에서 사용 분석도구를 고찰하였다. 또한 보안 설계규칙을 고려할 때 인적인 요소의 중요성과 이를 강화해야 할 필요성이 강조되었다. 본 논문에서는 개발보안운영을 고려할 때 절차적인 요소의 관점에서 신속하고 정확한 의사결정에 중점을 두고 변화를 관리하는 안전한 프로세스에 대해 분석하였다. 또한 본 논문에서는 개발보안운영 특성과 관련하여 성숙도 모델 분석의 필요성을 논의하였고, 이에 따른 동적인 요소와 정적인 요소의 강도 및 통합 요소에 대한 세부 절차를 통해 분석요소의 의미를 분석하였다. 본 논문에서는 위협모델링 및 컴플라이언스 그리고 통제를 위한 스캔 활동이나 코드 분석과 같은 요소에 대해서도 분석하였다.