• 제목/요약/키워드: Evaluation methodology

Search Result 212, Processing Time 0.112 seconds

A Study on the Case Study and Evaluation Methodology of Operational Availability for a Naval Ship using OT&E Data (운용시험평가 데이터를 활용한 함정 운용가용도 평가 방안 및 사례 연구)

  • Paik, Soonhuem
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.471-478
    • /
    • 2014
  • Navy forces of ROK asked for more than 90% operational availability in the requirement document of combat ship. This study proposes the evaluation methodology of operational availability with the evaluation process, calculation formula, analysis of operational test data. As the case study, the developed methodology is proved to apply for 00 batch-I naval ship using the data to be acquired during the operational test period. The operational availability by test data was 90.03%, and it was satisfied with objective value 90%. The paper will contribute not only to establish the evaluation methodology of operational availability for combat ship but also other general weapon system.

An Evaluation methodology of cyber-Education system based on interdependent relationship (상호영향 관계를 고려한 가상교육 시스템 평가 방법론)

  • Han, Ki-Joon;Kim, Sung-Ok
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.2
    • /
    • pp.155-163
    • /
    • 2001
  • This study aims to suggest a evaluation methodology of cyber-education. In spite of rapid development of information technology for cyber-education, there are few research of evaluation methodology in cyber-education environment, we suggest a definition of criteria and a methodology of system solution selection for cyber-education system. Considering an interdependent relationship among criteria, we shows a process of an evaluation method or a selection method for evaluation of cyber-education system solution through an example.

  • PDF

An Evaluation Methodology of Information Systems in Business Contingency Planning (업무연속성 계획 수립을 위한 정보시스템 평가 연구)

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.1
    • /
    • pp.119-128
    • /
    • 2016
  • Growing threats from environments and natural disasters cause information systems to suspend the operation of business. To assure the continuity of business, information systems should not halt in the emergency. This paper suggests an evaluation method for importance of information systems and verifies the method in a real organization. The results to the study can be utilized for establishing business continuity of organizations.

A Study on the Alternative Technology Evaluation Based on LCA and ″extended″ Energy I/O Technique (LCA와 에너지수지비 개념의 확장을 통한 대체에너지기술의 평가방법론)

  • 박찬국;박영구;최기련
    • Journal of Energy Engineering
    • /
    • v.8 no.2
    • /
    • pp.317-324
    • /
    • 1999
  • This study suggests the effectiveness of an "extended" power system evaluation methodology based on LCA and energy input-output analysis techniques. This "extended" evaluation methodology is designed to incorporate total energy system costs through fuel cycle and external costs, including CO$_2$abatement cost. As an empirical test, we applied the methodology to orimulsion-fired power generation technology and found that orimulsion could be considered as in attractive base-load power generation fuel in terms of economic and environmental aspects, compared to conventional coal-fired power plant.

  • PDF

Investigation of Stroke Evaluation Methodology and Related Factors Through the Literature Review (문헌조사를 통한 뇌졸중 평가 방법론 및 관련 변수 조사)

  • Min, Seung Nam;Kim, Dong Joon;Park, Se Jin;Lee, Kyung-Sun
    • Journal of the Ergonomics Society of Korea
    • /
    • v.36 no.6
    • /
    • pp.693-704
    • /
    • 2017
  • Objective: The aim of this study is to investigation of stroke evaluation methodology and related factors through the literature review for prediction of pre-symptom. Background: Stroke is the second leading cause of death worldwide and remains an important health burden both for individuals and for national healthcare systems The incidence rate of stroke is rapidly increasing due to aging phenomenon and incidence aging are diversifying. Thus, the research of stroke prediction is preemptively necessary. Method: Procedures of literature reviews are classified in to six step such as 1) Choosing the target databases), 2) Selecting the keyword in the last 10 years, 3) Evaluation of titles, 4) Evaluation the abstract, 5) Available full-test articles, 6) evaluation methodology and related factors review and arrangement. Results: In summary of previous studies, studies of evaluation stroke diagnosis and symptom level are divided in to Questionnaire evaluation, Behavioral Characteristics evaluation, Individual characteristics evaluation, Physiological characteristics evaluation. Conclusion: We investigated the stroke evaluation methodology and related factors through literature review. This information can be utilized as a practical information for the study related with stroke evaluation and prediction. Application: The results of this study can be used as basic data for the variables needed to evaluate stroke.

Development of a User Experience Evaluation Methodology for Smart Safety Living Lab (스마트안전 리빙랩 환경에서의 사용자경험 평가를 위한 방법론 개발)

  • Choi, Jae-Rim;Ryu, Do-Hyeon;Kim, Kwang-Jae;Yun, Jung-Min;Kim, Min-Sun
    • Journal of the Korean Society for Quality Management
    • /
    • v.49 no.2
    • /
    • pp.127-143
    • /
    • 2021
  • Purpose: Smart Safety Living Lab is a Living Lab facility, constructed and operated by KITECH in Korea, to support the user experience(UX) evaluation, planning and certification of smart safety products and services. The purpose of this study is to develop a UX evaluation methodology that accommodates the characteristics of the Living Lab and smart safety products and services for a systematic and efficient UX evaluation in the Smart Safety Living Lab. Methods: A generic model of UX evaluation was first derived based on a review of related literature. Then, the generic model is revised to accommodate the characteristics of the Smart Safety Living Lab and smart safety products and services, resulting in the UX Evaluation Methodology for Smart Safety Living Lab (SSLL-UXEM). Results: The developed SSLL-UXEM consists of a structured process for UX evaluation, a guideline for conducting each step of the process, and a set of forms for recording the major evaluation results in each step. Conclusion: SSLL-UXEM can help to enhance the efficiency of the UX evaluation process and the consistency of the UX evaluation results. SSLL-UXEM is also expected to serve as a basis for UX evaluation in various living lab environments in the future.

Performance Evaluation Method of Tunnel Scanner for Lining Crack Detection (터널 균열 검출에 활용되는 터널스캐너의 성능검증 방법론)

  • Bae, Sung-Jae;Jung, Wook;Chamrith, Sereivatana;Kim, Chan-Jin;Kim, Young-Min;Hong, Sung-Ho;Kim, Jung-Gon;Kim, Jung-Yeol
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.39-52
    • /
    • 2021
  • Purpose: Recently, due to increasing usage of high-tech equipment for facility inspection, the need of verifying high-tech equipment is being emphasized. Therefore, the purpose of this paper is to develop performance evaluation methodology of tunnel scanners that inspect tunnel facilities. Method: This paper describes literature reviews regarding the performance evaluation methodology of high-tech based equipment for facility inspection. Based on these investigations and expert advisory meetings, this paper suggests a performance evaluation methodology of tunnel scanner. Result: First evaluation indicator states minimum performance standards of tunnel scanners. Second evaluation indicator is related to tunnel scanner quality. Conclusion: The performance evaluation methodology can provide reliable equipment performance catalogues, helping users to make a proper selection of equipment. Also, developers of equipment can get authorized verification of performances, preventing poor maintenance of facilities.

A Study on Security Evaluation Methodology for Industrial Control Systems (제어시스템 보안성 평가 방법에 관한 연구)

  • Choi, Myeonggil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.287-298
    • /
    • 2013
  • Industrial Control systems which are operated in the industrial infrastructure adopts the various functions and face various threats in these days. To assure the security of the industrial control systems, the security evaluation methodology should be necessarily developed. This study suggests the processes and methodology for evaluating control systems, verifies the effectiveness of processes and methodologies through development of security checklists. The results of the study will be utilized for operators, evaluators and obtainers of industrial controls and be basis for developing and assuring the industrial controls systems.

An Evaluation Methodology for Selection of IT Outsourcing Service Vendors (IT 아웃소싱 서비스 수행업체 선정을 위한 평가 방법론 개발)

  • Jeong, Seon-Phil;Kim, Yeong-Real
    • Journal of the Korea Industrial Information Systems Research
    • /
    • v.12 no.4
    • /
    • pp.153-163
    • /
    • 2007
  • Many organizations have been outsourcing not only simple tasks but Information Systems and business processes rapidly. IT outsourcing is considered as a critical strategy of businesses these days. Anyhow, many companies still have IT solution problems even though they have been outsourcing their IT department or functions. Moreover, many companies have difficulties when it comes to the selection a proper IT outsourcing service vendor. This study focused on evaluation methodology for small and medium sized organizational selection of IT outsourcing provider. This study's results is a presentation of an evaluation methodology using the AHP weighted value of the factors and the factors' variables. Small and medium sized organizational managers can refer to this study's result as an evaluation index and methodology at the beginning of their IT outsourcing project or for changing their vendors.

  • PDF