• Title/Summary/Keyword: tree diagram

Search Result 115, Processing Time 0.028 seconds

A Study on Disassembly Path Generation Using Petri Net (페트리네트를 이용한 분해경로 생성에 관한 연구)

  • 이화조;주해호;경기현
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.2
    • /
    • pp.176-184
    • /
    • 2000
  • Possible representation methods for the product structure have been compared and analyzed to determine optimal disassembly path of a product. Petri net is selected as the most optimal method to represent disassembly path of the product. In this method, a reachability tree for the product is generated and disassembly time for each path is calculated. A path with the smallest disassembly time is selected as the optimal path. A software far DPN(Disassembly Petri Net) has been developed and applied to search the optimal disassembly path for a ballpoint pen disassembly process as an example.

  • PDF

Protein-ligand interactions from the perspective of binding specificity

  • Ahmad, Shandar
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2003.10a
    • /
    • pp.4-4
    • /
    • 2003
  • A large number of in-vitro experiments on the inhibition of kinases and pretenses are reported in literature, and compiled by ProLINT database. Using this powerful wealth of knowledge, we have carried our an analysis of ligand specificity of these two classes of proteins. Each of the pretenses and kinases included in the database has been assigned a consensus ligand fragment signature, based on the available information about its interaction with different ligands. A set of 43 fragments efficiently represent every ligand. We have then organized the consensus fragment signatures for every protein in form of a cluster-tree diagram. This tree is also constructed from other sequence, structure and physical considerations. Cluster-cluster comparison between these analyzes provide a valuable information about ligand specific interactions and similarities between proteins.

  • PDF

Forecasting low-probability high-risk accidents (저 빈도 대형 사고의 예측기법에 관한 연구)

  • Yang, Hee-Joong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.3
    • /
    • pp.37-43
    • /
    • 2007
  • We use influence diagrams to describe event trees used in safety analyses of low-probability high-risk incidents. This paper shows how the branch parameters used in the event tree models can be updated by a bayesian method based on the observed counts of certain well-defined subsets of accident sequences. We focus on the analysis of the shared branch parameters, which may frequently often in the real accident initiation and propagation to more severe accident. We also suggest the way to utilize different levels of accident data to forecast low-probability high-risk accidents.

Tree Size Distribution Modelling: Moving from Complexity to Finite Mixture

  • Ogana, Friday Nwabueze;Chukwu, Onyekachi;Ajayi, Samuel
    • Journal of Forest and Environmental Science
    • /
    • v.36 no.1
    • /
    • pp.7-16
    • /
    • 2020
  • Tree size distribution modelling is an integral part of forest management. Most distribution yield systems rely on some flexible probability models. In this study, a simple finite mixture of two components two-parameter Weibull distribution was compared with complex four-parameter distributions in terms of their fitness to predict tree size distribution of teak (Tectona grandis Linn f) plantations. Also, a system of equation was developed using Seemingly Unrelated Regression wherein the size distributions of the stand were predicted. Generalized beta, Johnson's SB, Logit-Logistic and generalized Weibull distributions were the four-parameter distributions considered. The Kolmogorov-Smirnov test and negative log-likelihood value were used to assess the distributions. The results show that the simple finite mixture outperformed the four-parameter distributions especially in stands that are bimodal and heavily skewed. Twelve models were developed in the system of equation-one for predicting mean diameter, seven for predicting percentiles and four for predicting the parameters of the finite mixture distribution. Predictions from the system of equation are reasonable and compare well with observed distributions of the stand. This simplified mixture would allow for wider application in distribution modelling and can also be integrated as component model in stand density management diagram.

A Comparative Study on Louis L Kahn's Architectural Philosophy and Kabbalah based on Psychoanalysis (정신분석학에 의한 루이스 칸의 건축철학과 카발라와의 비교 연구)

  • Choi, Hyo-Sik
    • Journal of architectural history
    • /
    • v.18 no.2
    • /
    • pp.85-105
    • /
    • 2009
  • This study set out to compare and analyze the influences Kabbalah, which was Louis I. Kahn's faith as a Jew, on his architecture based on Freud's psychoanalysis that had many exchanges with modernism and contemporary architecture and theories. The specific goals of the study were to shed light to Kahn's presence in contemporary architecture anew and establish the methodology of using psychoanalysis in building new theories of architectural planning. When the theories of psychoanalysis were introduced for comparison and analysis purposes, Kahn tried to differentiate his buildings by placing a function or symbolic central space at the heart of a building even though he did adopt a characteristic of modernism architecture, which was placing a core at the centre of plan, for a while. Such a tendency of his was based on Jung's opinions rather than Freud's and affected by Ecole des Beaux-Art. The analysis results also indicate that he conceived "Served Space & Servant Space," "architecture of connection" and "silence and light" that made up the essence of his architectural theory from the relationships between Ayin-Sof, Kabbalah's absolute god, and Sefiroth. It's also very likely that his often use of triangles and circles in his architecture was affected by the Tree of Sefiroth diagram of Kabbalah. His tendency is well reflected in Salk Institute and Philips Exeter Academy Library, where he placed a laboratory or courtyard at the center where a core was supposed to be, created a corridor or courtyard space between those central spaces and the core, and connected them one another with to perceive the being of Ayin-Sof into an architectural space, which is well proven with Mikveh Israel Synagogue where he directly applied the Tree of Sefiroth diagram. The synagogue also contained a hollow column that served as an important concept in his late architecture. The hollow column was also the result of him applying the concept of Sefiroth of the place where Ayin-Sof Was reduced in Kabbalah.

  • PDF

Safety Assessments for the IS(Iodine Sulfur) Process in a Hydrogen Production Facility (수소생산시설에서의 요오드-황 공정에 대한 안전성 평가연구)

  • Lee, Hyon-Woo;Jae, Moo-Sung;Cho, Nam-Chul;Yang, Jon-Eon;Lee, Won-Jae
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.3
    • /
    • pp.54-58
    • /
    • 2009
  • A substitute energy development has been required due to the exhaust of the fossil fuel and an environmental problem. Consequently, possible technologies producing hydrogen from water that does not release carbon is a very promising technology. Also, Iodine-Sulfur(IS) thermochemical water decomposition is one of the promising processes that are used to produce hydrogen efficiently using the high temperature gas-cooled reactor(HTGR) as an energy source that is possible to supply heat over 900$^{\circ}C$. In this study, to make a initiating events identification for the IS process, Master Logic Diagram(MLD) is used and 9 initiating events that cause a leakage of the chemical material are identified. Also, 6 events are identified among 9 initiating events above and are quantified using event tree.

A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling (위협모델링을 이용한 전기차 충전 인프라의 보안요구사항에 대한 연구)

  • Cha, Ye-Seul;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1441-1455
    • /
    • 2017
  • In order to build a secure electric vehicle charging infrastructure, security research is required because various data including charging and payment data are transmitted in the electric vehicle charging infrastructure. However, previous researches have focused on smart grid related security research such as power system infrastructure rather than charging infrastructure for electric vehicle charging. In addition, research on charging infrastructure is still lacking, and research using a systematic methodology such as threat modeling is not yet under way. Therefore, it is necessary to apply threat modeling to identify security threats and systematically analyze security requirements to build a secure electric vehicle charging infrastructure. In this paper, we analyze the electric vehicle charging infrastructure by accurately identifying possible threats and deriving objective security requirements using threat modeling including Data Flow Diagram, STRIDE, and Attack Tree.

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.

Trustworthy Smart Band: Security Requirements Analysis with Threat Modeling (위협 모델링을 통한 스마트밴드 보안 요구사항 분석)

  • Kang, Suin;Kim, Hye Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1355-1369
    • /
    • 2018
  • As smart bands make life more convenient and provide a positive lifestyle, many people are now using them. Since smart bands deal with private information, security design and implementation for smart band system become necessary. To make a trustworthy smart band, we must derive the security requirements of the system first, and then design the system satisfying the security requirements. In this paper, we apply threat modeling techniques such as Data Flow Diagram, STRIDE, and Attack Tree to the smart band system to identify threats and derive security requirements accordingly. Through threat modeling, we found the vulnerabilities of the smart band system and successfully exploited smart bands with them. To defend against these threats, we propose security measures and verify that they are secure by using Scyther which is a tool for automatic verification of security protocol.

The Study on Applying Ankle Joint Load Variable Lower-Knee Prosthesis to Development of Terrain-Adaptive Above-Knee Prosthesis (노면 적응형 대퇴 의족개발을 위한 발목 관절 부하 가변형 하퇴 의족 적용에 대한 연구)

  • Eom, Su-Hong;Na, Sun-Jong;You, Jung-Hwun;Park, Se-Hoon;Lee, Eung-Hyuk
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.883-892
    • /
    • 2019
  • This study is the method which is adapted to control ankle joint movement for resolving the problem of gait imbalance in intervals where gait environments are changed and slope walking, as applying terrain-adaptive technique to intelligent above-knee prosthesis. In this development of above-knee prosthesis, to classify the gait modes is essential. For distinguishing the stance phases and the swing phase depending on roads, a machine learning which combines decision tree and random forest from knee angle data and inertial sensor data, is proposed and adapted. By using this method, the ankle movement state of the prosthesis is controlled. This study verifies whether the problem is resolved through butterfly diagram.