• 제목/요약/키워드: violations

검색결과 354건 처리시간 0.032초

Continuous Audits Using Decision Support Systems

  • Mohammadi, Shaban
    • 산경연구논집
    • /
    • 제6권3호
    • /
    • pp.5-8
    • /
    • 2015
  • Purpose - This article's aim is to examine how the utilization of existing and future decision-support systems will lead to a change in the auditing process. Research design, data, and methodology - An information system is a special decision-support system that combines information obtained from various sources and communicates among them to help in assessing appropriate complex financial decisions. This paper analyzes techniques such as data and text mining as components of decision-support systems to be used in the auditing process. Results - We present views about how existing decision-support systems will lead to a change in audits. Auditors, who currently collect significant data manually, will in the future move towards management through complex decision-support systems. Conclusions - Although some internal audit functions are integrated into systems of continuous monitoring, the use of such systems remains limited. Thus, instead of multiple decision-support systems, a unified decision-support system can be deployed for this that includes sensors integrated within a company in different contexts (e.g., production, sales, and accounting) that continually monitors violations of controls, unusual patterns, and unusual transactions.

Energy-aware Multi-dimensional Resource Allocation Algorithm in Cloud Data Center

  • Nie, Jiawei;Luo, Juan;Yin, Luxiu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4320-4333
    • /
    • 2017
  • Energy-efficient virtual resource allocation algorithm has become a hot research topic in cloud computing. However, most of the existing allocation schemes cannot ensure each type of resource be fully utilized. To solve the problem, this paper proposes a virtual machine (VM) allocation algorithm on the basis of multi-dimensional resource, considering the diversity of user's requests. First, we analyze the usage of each dimension resource of physical machines (PMs) and build a D-dimensional resource state model. Second, we introduce an energy-resource state metric (PAR) and then propose an energy-aware multi-dimensional resource allocation algorithm called MRBEA to allocate resources according to the resource state and energy consumption of PMs. Third, we validate the effectiveness of the proposed algorithm by real-world datasets. Experimental results show that MRBEA has a better performance in terms of energy consumption, SLA violations and the number of VM migrations.

디지털 문서 콘텐츠 보호를 위한 문서 복제 탐지 시스템에 관한 연구 (A Study on the Document Copy Detection System for Protection of Digital Document Contents)

  • 김헌
    • 디지털콘텐츠학회 논문지
    • /
    • 제7권3호
    • /
    • pp.199-205
    • /
    • 2006
  • 컴퓨터 기술의 향상과 정보의 중요성이 더해지면서 갈수록 지적재산권에 대한 침해와 표절이 증가하고 있다. 표절과 불법 복제가 성행하고 있지만 이에 대한 대처 방법과 연구가 국내외적으로 아직까지 미흡한 실정이다. 표절의 판별과 감정에는 일일이 사람들의 손을 거쳐야 하며 많은 시간과 자원의 소요가 뒤 따른다. 따라서 좀 더 효율적인 방법론과 객관적이고 시스템적인 접근이 필요하다고 본다. 또한 불법적인 지적재산권 침해에 대응한 관리 및 탐지 기술이 더욱 중요해졌음을 의미한다. 본 논문에서는 소중한 지적재산권을 효과적으로 관리 및 탐지하는 기술과 이론을 제시하고자 한다. 또한 기존 DRM 솔루션들이 가지고 있는 장단점들을 분석하여 좀 더 효율적인 디지털 콘텐츠 관리 및 탐지 시스템을 제안하게 되었다.

  • PDF

Study on the Use of Slightly Enriched Uranium Fuel Cycle in an Existing CANDU 6 Reactor

  • Yeom, Choong-Sub;Kim, Hyun-Dae
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1997년도 추계학술발표회논문집(1)
    • /
    • pp.152-157
    • /
    • 1997
  • To test the viability of CANFLEX-SEU bundles in an existing CANDU 6 reactor, core follow-up simulation has been carried out using the reactor fueling simulation program of the CANDU 6, RFSP computer code, and a lattice physics code, WIMS-AECL. During the core follow-up, bundle and channel powers and zone levels have been checked against their operating limits at each simulation. It is observed from the simulation results that an equilibrium core loaded with 0.9 w/o CANFLEX-SEU bundles could be refueled ,and maintained for 550 FPD without any significant violations in the channel and bundle power limits and the permissible operating range of the liquid zone controllers.

  • PDF

DDS 기반 자율 주행 시스템의 시간적 제약 위반 탐지 기법 (Detection Mechanisms for Timing Constraint Violations in DDS-Based Autonomous Driving System)

  • 안재호;노순현
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2018년도 제58차 하계학술대회논문집 26권2호
    • /
    • pp.123-126
    • /
    • 2018
  • 자율 주행 자동차는 다수의 센서와 ECU 등으로 구성된 분산 시스템이다. 이 시스템은 다양한 시간적 제약사항들을 갖는 자율주행 응용들을 구동하며 각 응용들에 대한 시간적 제약사항 위반을 탐지해야한다. 이러한 분산 시스템에서 응용들 간의 통신을 위해 사용되는 미들웨어들 중 대표적인 것은 DDS이다. DDS는 높은 확장성을 지원하는 발행-구독 통신 모델을 기반으로 하며, 실시간성을 고려한 다양한 QoS 정책들을 제공한다. 하지만 DDS는 자율주행 응용이 요구하는 시간적 제약사항들 중 deadline과 correlation 제약 사항에 대한 위반 여부를 탐지하지 못한다. 본 논문은 DDS 기반 시스템에서 deadline과 correlation 제약 사항 위반 여부를 런타임에서 탐지하는 기법을 제안한다. 본 연구진은 제안된 기법을 DDS의 구현들 중 하나인 Vortex 사의 OpenSplice 기반 시스템에 구현하였다. 실험을 통해 검증한 결과, deadline과 correlation 제약 사항에 대한 위반 여부를 적은 오버헤드와 함께 성공적으로 탐지하였다.

  • PDF

Timing violation의 효율적인 수정을 위한 closure 방법의 제안 (A New Closure Method for Efficient Modification of Timing Violation)

  • 서영호;박성호;최현준;김동욱
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2007년도 하계종합학술대회 논문집
    • /
    • pp.317-318
    • /
    • 2007
  • In this paper, we propose an efficient timing closure methodology during physical implementation. Many types of slacks and closure solutions were introduced case-by-case. The major part of violations was managed by specified tools, but the exceptionally generated minor violation which was occurred through correlation error between tools was manually corrected by ASIC engineer. From the proposed method, we identified that the best effective method is to decrease the sum of intrinsic delay in case of setup time violation.

  • PDF

전자 거래에서 보호 영역을 기반으로 하는 정보 흐름 보안 방법 (An Information Flow Security Based on Protected Area in eCommerce)

  • 서양진;한상용
    • 한국전자거래학회지
    • /
    • 제15권1호
    • /
    • pp.1-16
    • /
    • 2010
  • Confidentiality is one of the most important requirements of information protection systems. The access control technique has been used to provide confidentiality, but it has fundamental problems in that it cannot prevent violations of confidentiality committed by authorized users. Information flow control is a technique introduced to resolve such problems, and many approaches based on programming languages have been proposed. However, it is not easy for a programmer to implement the technique at the source code level. Furthermore, the practicality of information flow control is difficult to demonstrate because it does not provide control over programs that have already been developed. This paper proposes a method that enables a practical information flow control through using a protected area, a separate part of computer system storage. Case studies are given to show its usefulness.

송전계통 고조파 유입/유출 분석 (Analysis of Harmonic Incoming and Outgoing for Transmission System)

  • 왕용필;최선영;곽노홍;전영수;박상호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 제38회 하계학술대회
    • /
    • pp.561-562
    • /
    • 2007
  • A method is proposed in this paper to determine the harmonic contributions of a customer at the point of common coupling. The method can quantify customer and utility responsibilities for limit violations caused by either harmonic source changes or harmonic impedance changes. It can be implemented in current power quality monitors and digital revenue meters. The method is comparison of measurement phase angles between harmonic voltage and current. The proposed method has been applied to the test system. The study results have indicated the accuracy of harmonic injection and emission for customer and utility.

  • PDF

Healthcare Security based on Blockchain

  • Almalki, Taghreed;Alzahrani, Shahad;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.149-160
    • /
    • 2021
  • One of the most important inventions and developments in the digital world today is the healthcare system based on blockchain technology. Healthcare is an important field that requires the application of security mechanisms due to the sensitivity of patient data. The association of blockchain with healthcare contributed to achieving better security mechanisms than the traditional approach. The new approach operates in a decentralized system, which in turn, improves security in the healthcare environment. Consequently, blockchain technology has emerged as one of the most crucial solutions to security violations and challenges in the healthcare industry. This paper provides a comprehensive review of several experts' recent protection and detection approaches in this domain. It is also imperative to note that the paper focuses only on the recent techniques that have been published during 2017-2020. The sophisticated procedures have been investigated and discussed in terms of similarities and differences to highlight the significance of the protection needed to secure the healthcare environment.

스위스 치즈 모델을 적용한 철도 감전사고 발생형태에 관한 연구 (A Study on the Form of Electric Shock Accident Using Swiss Cheese Model)

  • 유기성;김재문
    • 전기학회논문지
    • /
    • 제67권12호
    • /
    • pp.1711-1716
    • /
    • 2018
  • Unlike conventional transmission and distribution lines, catenary system for operating electric railway vehicles are composed of multi-conductor groups (feeder line, contact wire, messenger wire, protection wire) and are used for railway employees, public or passengers in the station yards. Electric shock hazards are exposed and electric shocks such as death or serious injury are occurring in electric railway vehicles, railway high-voltage distribution lines, and catenary system. In order to analyze the types of electric shock accidents on railway by systematic approach method, we modeled 'unsafe behavior classification' method using swiss cheese model. Based on this method, we derived the type of electric shock accidents about railway accidents during the last 5 years by analyzing the frequency of occurrence of human errors and unsafe acts, laws and regulations related to violations, and so on.