• Title/Summary/Keyword: techniques chain

Search Result 429, Processing Time 0.024 seconds

Application of Critical Chain Project Management to Construction Project by a Case Study (사례연구를 통한 건설프로젝트에 CCPM의 적용)

  • Park Jeong-Hyun;Lee Young-Dae;Kim Young;Kim Sa-Myung;Park Hyeok
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.274-277
    • /
    • 2003
  • The Theory of Constraints (TOC) is an approach and a philosophy that is used to develop specific management techniques. It was first popularized by the novel, The Goal, that applied the principles to operations management. Since 1997 it has found application in two areas within project management. The first application is scheduling of a single project to reduce project duration and simplify project control. there is a further application to allocate resources that are shared by concurrent project. It is the objective of this paper to explore the fundamentals of critical chain and to pursue an application of critical chain method to construction project by a case study.

  • PDF

Object-oriented Simulation Modeling for Service Supply Chain (서비스 공급사슬을 위한 객체지향 시뮬레이션 모델링)

  • Moon, Jong-Hyuk;Lee, Young-Hae;Cho, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.55-68
    • /
    • 2012
  • Recently it is important to understand service supply chain because the economy moves from manufacturing to services. However, most of existing supply chain research focuses exclusively on the manufacturing sector. To overcome this situation, it needs to investigate and analyze service supply chain. Simulation is one of the most frequently used techniques for analysis and design of complex system. Service supply chain is complex and large systems that require an accurate designing phase. Especially, it is important to examine closely the dynamically interactive behavior of the different service supply chain components in order to predict the performance of the servcie supply chain. In this paper, we develop a conceptual model of service supply chain. Then, we present a new procedure to develop simulation model for the developed conceptual model of service supply chain, based on the UML analysis and design tools and on the ARENA simulation language. The two main characteristics of the proposed procedure are the definition of a systematic procedure to design service supply chain and of a set of rules for the conceptual model translation in an ARENA simulation language. The goal is to improve the knowledge on service supply chain management and support the simulation model development efficiency on service supply chain.

On-chip Smart Functions for Efficiency Enhancement of MMIC Power Amplifiers for W-CDMA Handset Applications

  • Youn S. Noh;Kim, Ji H.;Kim, Joon H.;Kim, Song G.;Park, Chul S.
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.3 no.1
    • /
    • pp.47-54
    • /
    • 2003
  • New efficiency enhancement techniques have been devised and implemented to InGaP/GaAs HBT MMIC power amplifiers for W-CDMA mobile terminals applications. Two different types of bias current control circuits that select the efficient quiescent currents in accordance with the required output power levels are proposed for overall power efficiency improvement. A dual chain power amplifier with single matching network composed of two different parallel-connected power amplifier is also introduced. With these efficiency enhancement techniques, the implemented MMIC power amplifiers presents power added efficiency (PAE) more than 14.8 % and adjacent channel leakage ratio(ACLR) lower than -39 dBc at 20 dBm output power and PAE more than 39.4% and ACLR lower than -33 dBc at 28 dBm output power. The average power usage efficiency of the power amplifier is improved by a factor of more than 1.415 with the bias current control circuits and even up to a factor of 3 with the dual chain power amplifier.

Full Waveform Inversion Using Automatic Differentiation (자동 미분을 이용한 전파형 역산)

  • Wansoo, Ha
    • Geophysics and Geophysical Exploration
    • /
    • v.25 no.4
    • /
    • pp.242-251
    • /
    • 2022
  • Automatic differentiation automatically calculates the derivatives of a function using the chain rule once the forward operation of a function is defined. Given the recent development of computing libraries that support automatic differentiation, many researchers have adopted automatic differentiation techniques to solve geophysical inverse problems. We analyzed the advantages, disadvantages, and performances of automatic differentiation techniques using the gradient calculations of seismic full waveform inversion objective functions. The gradients of objective functions can be expressed as multiplications of the derivatives of the model parameters, wavefields, and objective functions using the chain rule. Using numerical examples, we demonstrated the speed of analytic differentiation and the convenience of complex gradient calculations for automatic differentiation. We calculated derivatives of model parameters and objective functions using automatic differentiation and derivatives of wavefields using analytic differentiation.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

Heterogeneous Chain-mail Model for CPU-based Volume Deformation (CPU 기반의 볼륨 변형을 위한 다형질 Chainmail 모델)

  • Lee, Sein;Kye, Heewon
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.7
    • /
    • pp.759-769
    • /
    • 2019
  • Since a surgery simulation should be able to represent the internal structure of the human body, it is advantageous to adopt volume based techniques rather than polygon based techniques. However, the volume based techniques induce large computation to deform heterogeneous volume datasets such as bones and muscles. In this study, we propose a new method to deform volume data using multi-core CPUs. By improving previous studies, the proposed method minimizes unnecessary propagation operations. Moreover, we propose an efficient task-partitioning method for volume deformation using multi-core CPUs. As a result, we can simulate the deformation of heterogeneous volume data at an interactive speed without special hardware.

Access efficiency of small sized files in Big Data using various Techniques on Hadoop Distributed File System platform

  • Alange, Neeta;Mathur, Anjali
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.359-364
    • /
    • 2021
  • In recent years Hadoop usage has been increasing day by day. The need of development of the technology and its specified outcomes are eagerly waiting across globe to adopt speedy access of data. Need of computers and its dependency is increasing day by day. Big data is exponentially growing as the entire world is working in online mode. Large amount of data has been produced which is very difficult to handle and process within a short time. In present situation industries are widely using the Hadoop framework to store, process and produce at the specified time with huge amount of data that has been put on the server. Processing of this huge amount of data having small files & its storage optimization is a big problem. HDFS, Sequence files, HAR, NHAR various techniques have been already proposed. In this paper we have discussed about various existing techniques which are developed for accessing and storing small files efficiently. Out of the various techniques we have specifically tried to implement the HDFS- HAR, NHAR techniques.

Rapid Detection Methods for Food-Borne Pathogens in Dairy Products by Polymerase Chain Reaction (PCR 방법을 이용한 우유 및 유제품에서 발생하는 식중독 균의 신속 검출법)

  • Kwak, Hyelim;Han, Seonkyeong;Kim, Eiseul;Hong, Yeun;Kim, Haeyeong
    • Journal of Dairy Science and Biotechnology
    • /
    • v.31 no.2
    • /
    • pp.171-177
    • /
    • 2013
  • The dairy industry has consistently grown via the expansion of dairy-based food categories. Dairy product consumption is stable since the nutrient composition in dairy products is ideal for human health. However, dairy products are highly susceptible to food-borne pathogens. Controlling the safety of dairy products is thus important when considering the nutrient-rich matrix of this food category. Currently, immunoassays or molecular biology techniques have been used to evaluate the safety of dairy products in Korea. These methods are based on the detection of proteins and thus have low reproducibility and sensitivity. Recent techniques to detect food-borne pathogens have focused on genetic analyses. Rapid detection methods for food-borne pathogens in milk and dairy products using polymerase chain reaction (PCR) techniques, such as conventional PCR, real-time PCR, repetitive sequence-based (rep)-PCR, PCR-denaturing gradient gel electrophoresis (DGGE), and digital PCR, are reviewed in this article. The aim of this review was to contribute knowledge of the relationship between microflora and the quality of dairy products. This study will also assist in the immediate monitoring of food-borne pathogens in milk and dairy products when an outbreak related to this food category occurs.

  • PDF

Study on the Fourth Industrial Revolution and Clinical Laboratory Science Techniques (4차 산업혁명과 임상검사과학기술에 관한 연구)

  • Sung, Hyun Ho;Choi, Kwang-Mo;Jung, You Hyun;Cho, Eun Kyung
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.51 no.3
    • /
    • pp.386-395
    • /
    • 2019
  • The aim of this study was to introduce clinical laboratory science techniques with the core technology of the 4th Industrial Revolution. Among the core technologies of the 4th Industrial Revolution, AI, IOT, block-chain, robotics, and nanotechnology were analyzed and linked by themes. The scope of the job of clinical laboratory technologists (also known as medical laboratory technologists and medical technologists) is laboratory medicine testing, pathology testing, and clinical physiology testing. Through a number of previous papers, 73 linkages in the laboratory medicine area, 27 linkages in the pathology area, and 47 linkages in the clinical physiology area were examined. In the 4th industrial revolution and clinical laboratory science techniques, AI (4), IOT (3), block-chain (4), robotics (3) and nanotechnology (15) sectors were surveyed. The limitation of this study was the limitation in collecting and analyzing all the data and non-clinical areas were not analyzed. In addition, there was no validity test and no similar study. In conclusion, the core technologies of the 4th industrial revolution and clinical laboratory science techniques are closely related. Therefore, further research on the future and social benefits of clinical laboratory science techniques is needed.