• Title/Summary/Keyword: structure-role model

Search Result 687, Processing Time 0.023 seconds

Synthesis of the Fault-Causality Graph Model for Fault Diagnosis in Chemical Processes Based On Role-Behavior Modeling (역할-거동 모델링에 기반한 화학공정 이상 진단을 위한 이상-인과 그래프 모델의 합성)

  • 이동언;어수영;윤인섭
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.5
    • /
    • pp.450-457
    • /
    • 2004
  • In this research, the automatic synthesis of knowledge models is proposed. which are the basis of the methods using qualitative models adapted widely in fault diagnosis and hazard evaluation of chemical processes. To provide an easy and fast way to construct accurate causal model of the target process, the Role-Behavior modeling method is developed to represent the knowledge of modularized process units. In this modeling method, Fault-Behavior model and Structure-Role model present the relationship of the internal behaviors and faults in the process units and the relationship between process units respectively. Through the multiple modeling techniques, the knowledge is separated into what is independent of process and dependent on process to provide the extensibility and portability in model building, and possibility in the automatic synthesis. By taking advantage of the Role-Behavior Model, an algorithm is proposed to synthesize the plant-wide causal model, Fault-Causality Graph (FCG) from specific Fault-Behavior models of the each unit process, which are derived from generic Fault-Behavior models and Structure-Role model. To validate the proposed modeling method and algorithm, a system for building FCG model is developed on G2, an expert system development tool. Case study such as CSTR with recycle using the developed system showed that the proposed method and algorithm were remarkably effective in synthesizing the causal knowledge models for diagnosis of chemical processes.

Role-Based Application Model for Supporting Spontaneous Interoperation in Ubiquitous Environments (유비쿼터스 환경에서 자발적 상호연동을 지원하는 역할 기반 응용 모델)

  • Jung, Jong-Yun;Ryu, Ki-Yeol;Lee, Jung-Tae
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.269-285
    • /
    • 2012
  • The spontaneous interoperation is an important characteristic of ubiquitous applications and is closely related with mobility. The mobile components in ubiquitous environments are liable to appear in and disappear from one physical space to another. Because this characteristic certainly influences the structure and behavior of applications, they should adapt themselves to the changed environments by configuring their structure and behaviors. Consequently, developers are faced with the above challenging issue when they design and implement ubiquitous applications. The role concept is an efficient tool to model participant entities, their relationship, and collaboration, so role-based model are appropriate to describe a structure and behavior of software system. But, little attention has been given to reflect characteristics of ubiquitous applications. To tackle the problem, this study considers a ubiquitous application as a software organization which consists of software components and proposes an enhanced role-based application model for supporting spontaneous interoperation.

A Model of Role Hierarchies providing Restricted Permission Inheritance (권한상속 제한 기능을 제공하는 역할계층 모델)

  • 이용훈;김용민;이형효;진승헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.37-45
    • /
    • 2003
  • Role-based Access Control(RBAC) model has advantage of easy management of access control with constraints such as permission inheritance and separation of duty in role hierarchy. However, previous RBAC studies could not properly reflect the real-world organization structure with its role hierarchy. User who is a member of senior role can perform all permissions because senior role inherits all permissions of junior roles in the role hierarchy. Therefore there is a possibility for senior role members to abuse permissions due to violation of the least privilege principle. In this paper, we present a new model of role hierarchy, which restricts the unconditional permission inheritance. In the proposed model, a role is divided into sub roles(unconditional inheritance. restricted inheritance, private role), keeping organization structure in corporate environment. With restricted inheritance, the proposed model prevents permission abuse by specifying the degree of inheritance in role hierarchy.

The Perceived Causal Structure Model on Stress Experienced by Nursing Students during Clinical Practice (간호학생의 임상실습스트레스에 관한 인지적 인과구조모형)

  • Park, Mi-Young
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.10 no.1
    • /
    • pp.54-63
    • /
    • 2004
  • The purpose of this study is to identify the factors that influence stress experienced by nursing students and to provide a perceived causal structure model among these variables. The ultimate goal of this study is to develop efficient guidance to clinical nursing education in this population. This study intends to apply perceived causal structure: network analysis method which was developed by Kelly(1983), and has been applied in nursing research. This method is selected to show dynamic relationship of stressor using network method. Data was collected from convenient sample of 186 junior college nursing students who had the clinical practice experience during 10 weeks. Data collection and analysis was conducted in 2 steps from December, 9, 2002 to February, 8, 2003. Step 1.: Data was collected using literature review(10 articles) to identify the causes of stress. Nine causes of stress were extracted. Step 2.: As perceived casual structure network study, data was collected using questionnaires which included 9 extracted cause and stress. The questionnaire contained a 10 X 10 grid table with 10 causes and effects printed. In network analysis, 'Yes' was scored as 1, 'No' was scored as 0, and the mean(maximum 1, minimum 0) was calculated. Construction of the network under inductive eliminative analysis which stopped the construction of the network when the consensual agreement level dropped near 50% was proceeded by adding causes in order of the mean rating level. In this study, construction of the final network was stopped by consensual agreement level of 52% of the total subjects. The results are summarized as follows : Step 1: Investigation of the causes of stress ; The extracted causes of stress from quality data was identified 9 categories ; negative nurse, lack of clinical practice opportunity, ambiguous role, negative patient, lack of nursing knowledge and skill, difficult of personal relations, inefficient clinical practice guidance, gap of theory and practice, lack of support. Step 2 : Construction of the perceived causal structure model ; 1) The most central cause of stress is ambiguous role in the systems of causation. 2) The distal cause of stress is inefficient clinical practice guidance 3) The causes that have a number of outgoing link are negative nurse, ambiguous role. 4) The causes that have a number of incoming link are ambiguous role, gap of theory- practice, lack of clinical practice opportunity, lack of nursing knowledge- skill. 5) There is a mutual relationship between stress and difficult of personal relations, stress and ambiguous role, ambiguous role and negative nurse, ambiguous role and lack of clinical practice opportunity, ambiguous role and lack of nursing knowledge-skill, lack of nursing knowledge-skill and gap of theory- practice. In conclusion, the network suggests that the first centre cause is related on ambiguous role and the second on negative nurse, inefficient clinical practice guidance in the systems of causation

  • PDF

Logistics Business Model for Win-Win Strategy : Logister & Velcro Structure (윈윈전략을 위한 물류비즈니스 모델 : Logister와 벨크로 조직)

  • Paik, Si-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.29 no.3
    • /
    • pp.33-42
    • /
    • 2006
  • From middle of 90's, SCM had emphasized the importance of connection of all companies which participate to a market, and outsourcing has emphasizes the slim structure of companies for pursing cost reduction and service improvement. But outsourcing as '2-1=1' and integration as '1+1=2' not adapt to the advanced market but return to the former state. Besides, it is impossible of subcontractors and logistics companies to execute these strategies which are win-win strategy and outsourcing. So many logistics companies have sharp competition in price recently. Therefore logistics companies have increased the need for a profitable business model and strategy. This paper researches the limitations of logistics market and redefines the role of logistics through the evolution of logistics. Also this paper proposes new role(Logister) and structure(Velcro structure) for not maker-oriented logistics but market-oriented logistics. The introductory case study will help to understand 2 terms(logister and velcro structure).

A MATHEMATICAL MODEL FOR HISTORY-BASED ACCESS CONTROL

  • Kim, Hee-Young
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.8 no.1
    • /
    • pp.11-30
    • /
    • 2004
  • Access Control is one of essential branches to provide system's security. Depending on what standards we apply, in general, there are Role-based access control, History-based access control. The first is based on subject's role, The later is based on subject's history. In fact, RBAC has been implemented, we are using it by purchasing some orders through the internet. But, HBAC is so complex that there will occur some errors on the system. This is more and more when HBAC is used with other access controls. So HBAC's formalization and model which are general enough to encompass a range of policies in using more than one access control model within a given system are important. To simplify these, we design the mathematical model called non-access structure. This Non-access structure contains to historical access list. If it is given subjects and objects, we look into subject grouping and object relation, and then we design Non-access structure. Then we can determine the permission based on history without conflict.

  • PDF

Relational Database Structure for Preserving Multi-role Topics in Topic Map (토픽맵의 다중역할 토픽 보존을 위한 관계형 데이터베이스 구조)

  • Jung, Yoonsoo;Y., Choon;Kim, Namgyu
    • The Journal of Information Systems
    • /
    • v.18 no.3
    • /
    • pp.327-349
    • /
    • 2009
  • Traditional keyword-based searching methods suffer from low accuracy and high complexity due to the rapid growth in the amount of information. Accordingly, many researchers attempt to implement a so-called semantic search which is based on the semantics of the user's query. Semantic information can be described using a semantic modeling language, such as Topic Map. In this paper, we propose a new method to map a topic map to a traditional Relational Database (RDB) without any information loss. Although there have been a few attempts to map topic maps to RDB, they have paid scant attention to handling multi-role topics. In this paper, we propose a new storage structure to map multi-role topics to traditional RDB. The proposed structure consists of a mapping table, role tables, and content tables. Additionally, we devise a query translator to convert a user's query to one appropriate to the proposed structure.

  • PDF

Neuropsychology of Memory (기억의 신경심리학)

  • Rhee, Min-Kyu
    • Sleep Medicine and Psychophysiology
    • /
    • v.4 no.1
    • /
    • pp.1-14
    • /
    • 1997
  • This paper reviewed models to explain memory and neuropsychological tests to assess memory. Memory was explained in cognitive and neuroanatomical perspectives, Cognitive model describes memory as structure and process. In structure model, memory is divided into three systems: sensory memory, short-term memory(working memory), and long-term memory. In process model, there are broadly three categories of memory process: encoding, storage, and retrieval. Memory process work in memory structure. There are two prominent models of the neuroanatomy of memory, derived from the work of Mishkin and Appenzeller and that of Squire and Zola-Morgan. These two models are the most useful for the clinician in part because they take into account the connections between the limbic and frontal cortical regions. The major difference between the two models concerns the role of the amygdala in memory processess. Mishkin and his colleagues believe that the amygdala plays a significant role while Squire and his colleagues do not. The most popular and widely used tests of memory ability such as WMS-R, AVLT, CVLT, HVLT. RBMT, CFT, and BVRT-R, were reviewed.

  • PDF

A Study on a Model of Defense Information Resource Management Structure from the Viewpoint of System's Approach (시스템적 관점에서 본 국방정보관리 구조 모델에 관한 연구)

  • 권문택
    • Journal of the military operations research society of Korea
    • /
    • v.24 no.2
    • /
    • pp.17-29
    • /
    • 1998
  • This paper is to aimed to design a model of Korea defense information resource management structure from the viewpoint of system's approach, especially focusing on planning/programming procedures, organizational structure and business process re-engineering. The author analyzed current projects and plans on the field of Korea defense information systems, for finding what kinds of problems and why the problems occurred. The author concluded that many problems came from wrong approach of previous information resource management. Highlights of the proposed model are as follows: 1) Planning and programming structure must be considered as a major information resources and it must be managed as a key role through the whole system life cycle; 2) Organizational structure should be properly set up for managing and implementing information system projects; 3) Business process should also be analyzed thoroughly for re-engineering and innovating current inefficient organizational structure. These three additional viewpoints added to previous model for improving Korea defense information resource management.

  • PDF

An Integrated Management Model of OS-RBAC and Separation Of Duty Policy (OS-RBAC과 임무분리 정책의 통합 관리 모델)

  • Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.167-175
    • /
    • 2010
  • Like most large organizations, there are business rules such as 'separation of duty' and 'delegation' which should be considered in access control. From a SOD point of view, previous SOD models built on the (Administrative) Role-Based Access Control model cannot present the best solution to security problems such as information integrity by the limited constituent units such as role hierarchy and role inheritance. Thus, we propose a new integrated management model of administration role-based access control model and SOD policy, which is called the OS-SoDAM. The OS-SoDAM defines the authority range in an organizational structure that is separated from role hierarchy and supports a decentralized security officer-level SOD policy in which a local security officer can freely perform SOD policies within a security officer's authority range without the security officer's intervention.