• Title/Summary/Keyword: 기능-네트워크 매트릭스

Search Result 9, Processing Time 0.025 seconds

Architecture Description Model for Common IT Resource Identification in e-Government Systems (공동활용자원식별을 위한 전자정부 시스템 아키텍처 서술 방안)

  • Shin, Soo-Jeong;Choi, Young-Jin;Jung, Suk-Chun;Seo, Yong-Won
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.631-642
    • /
    • 2009
  • Although the Korean government is making great effort to prevent the redundancy in IT investment and efficiently allocate the IT budget, actual achievements are quite limited because of the variety of IT resources and different architecture description among organizations and projects. Thus, a standardized description model of the system architecture is strongly needed to identify the common resources and improve the efficiency of IT investment. Therefore, in this paper, we have developed the function-network matrix model which can be used as the basic template for a standard for architecture description of e-Government systems. The function-network matrix model integrates the function tiers and the network areas into a single unified framework, which enables the functionality of each component and the flow of information clearly visible. Moreover, we described the architectures of Korean e-government’s citizen service systems using our model, resulting in clear demonstration of the similarities and differences between different systems, and easy identification of the common resources. Using the architecture description model developed in this research, the consolidation of national IT resources can be promoted, and non-expert IT users can easily recognize the architecture of their systems. In addition, more efficient and systematic IT resource management can be achieved using our model.

Function Classification of tweets Citing Scholarly Articles (학술문헌을 인용하는 트윗의 기능 분석 연구)

  • Kim, Byungkyu;Kang, Ji-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.83-84
    • /
    • 2018
  • 개별논문 평가를 위해 제안된 altmetric가 주목받고 있다. altmetrics에서는 개별 논문의 트윗의 건수를 평가요소 중 하나로 활용한다. 그러나 여러가지 목적으로 작성된 트윗을 단일하게 처리하는 것은 문제가 있다. 본 논문은 과학 논문에 달린 트윗들을 분석하여 기능의 범주를 정의하고 분류체계를 제시하였으며, 기존의 논문의 인용기능 분류 실험을 실시하여 그 결과와 비교 분석을 수행하였다. 향후 도출한 트윗 기능 분류에 대한 개선과 추가적인 연구를 수행할 계획이다.

  • PDF

A Searching Technique of the Weak Connectivity Boundary using Small Unmanned Aerial Vehicle in Wireless Tactical Data Networks (무선 전술 데이터 네트워크에서 소형 무안항공기를 이용한 연결성 약화 지역 탐색 기법)

  • Li, Jin;Song, Ju-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.89-96
    • /
    • 2012
  • Since tactical robots are going to be grown and tactical data communications will be more network-centric, the reliability of wireless tactical data networks is going to be very important in the future. However, the connectivity of such wireless tactical data networks can be extremely uncertain in practical circumstances. In this paper, we propose a searching technique to find out the weak boundary area of the network connectivity using a small UAV(unmanned aerial vehicle) which has a simple polling access function to wireless nodes on the ground in wireless tactical data networks. The UA V calculates the network topology of the wireless tactical data networks and coverts it to the Lapalcian matrix. In the proposed algorithm, we iteratively search the eigenvalues and find a minimum cut in the network resulting in finding the weak boundary of the connectivity for the wireless tactical data networks. If a UAV works as a relay nodes for the weak area, we evaluate that the throughput performance of the proposed algorithm outperforms star connection method and MST(minimum Spanning Tree) connection method. The proposed algorithm can be applied for recovering the connectivity of wireless tactical data networks.

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

Components Clustering for Modular Product Design Using Network Flow Model (네트워크 흐름 모델을 활용한 모듈러 제품 설계를 위한 컴포넌트 군집화)

  • Son, Jiyang;Yoo, Jaewook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.263-272
    • /
    • 2016
  • Modular product design has contributed to flexible product modification and development, production lead time reduction, and increasing product diversity. Modular product design aims to develop a product architecture that is composed of detachable modules. These modules are constructed by maximizing the similarity of components based on physical and functional interaction analysis among components. Accordingly, a systematic procedure for clustering the components, which is a main activity in modular product design, is proposed in this paper. The first phase in this procedure is to build a component-to-component correlation matrix by analyzing physical and functional interaction relations among the components. In the second phase, network flow modeling is applied to find clusters of components, maximizing their correlations. In the last phase, a network flow model formulated with linear programming is solved to find the clusters and to make them modular. Finally, the proposed procedure in this research and its application are illustrated with an example of modularization for a vacuum cleaner.

A study on the User Experience at Unmanned Checkout Counter Using Big Data Analysis (빅데이터를 활용한 편의점 간편식에 대한 의미 분석)

  • Kim, Ae-sook;Ryu, Gi-hwan;Jung, Ju-hee;Kim, Hee-young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.375-380
    • /
    • 2022
  • The purpose of this study is to find out consumers' perception and meaning of convenience store convenience food by using big data. For this study, NNAVER and Daum analyzed news, intellectuals, blogs, cafes, intellectuals(tips), and web documents, and used 'convenience store convenience food' as keywords for data search. The data analysis period was selected as 3 years from January 1, 2019 to December 31, 2021. For data collection and analysis, frequency and matrix data were extracted using TEXTOM, and network analysis and visualization analysis were conducted using the NetDraw function of the UCINET 6 program. As a result, convenience store convenience foods were clustered into health, diversity, convenience, and economy according to consumers' selection attributes. It is expected to be the basis for the development of a new convenience menu that pursues convenience and convenience based on consumers' meaning of convenience store convenience foods such as appropriate prices, discount coupons, and events.

Managing Mobility - Enterprise Secure Wireless Control (이동성 관리 - 기업의 안전한 무선 네트워크 제어)

  • Lee Daniel H.
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.282-290
    • /
    • 2004
  • 80년대 초반에 등장한 퍼스널 컴퓨터에서부터 90년대에 급격히 확산된 클라이언트/서버 환경에 이르기까지 분산 컴퓨팅은 관리가 어렵다고 증명되었다. IBM의 Tivoli나 HP의 OpenView 등을 포함한 거대한 엔터프라이즈 관리 시스템 산업이 이러한 표면상의 극복하기 힘든 법칙처럼 여겨지는 것이 그 증거라고 하겠다. 이 후 무선의 개념이 등장했다. NOP World Technology가 Cisco사를 위해 2001년에 시행한 조사에 의하면 최종 사용자는 무선랜을 사용함으로써 생산성이 최고 22% 향상되었고 조사대상의 63%가 일상적인 직무에서 정확도가 향상되었다. 이 모든 것은 투자대비수익(ROI) 계산상 사용자 당 $550 해당한다. 현재 이동성과 IT 관리 기능의 딜레마를 동시에 고려하며 저렴한 몇몇 솔루션들이 소개되고 있다. 본 논문에서는 분산 컴퓨팅의 다음 진화 단계인 무선 네트워킹과 관련된 문제를 해결할 수 있는 혁신적이고 전체적인 접근법을 소개한다. 본 논문에서는 무선 컴퓨팅과 보안의 본질 및 무선랜이라는 새로운 컴퓨팅 패러다임으로 인하여 파생되는 운영과 관리의 어려움을 소개한다. 이러한 환경이 정의되면 본 논문은 이해하기 쉬운 5x5 레이어 매트릭스를 바탕으로 각 레이어의 독특한 본질을 고려한 혁신적인 무선랜 관리 방법에 대해 설명한다. 마지막으로 무선 네트워킹, 컨버젼스, 궁극적으로 분산 컴퓨팅만이 가지는 문제점을 해결할 수 있는 Red-M의 백 오피스 애플리케이션에 기반한 솔루션을 소개한다. 본 논문의 목표는 Red-M의 성공에 관한 두 가지 중요한 과정을 설명하고자 함이다. 이는 안전한 무선 네트워크 제어에서 비롯되는 무선 환경이 약속하는 장점들을 고루 제공하는 것과 나쁜 의도의 사용자를 차단할 뿐 아니라 올바른 사용자와 또한 나머지 일반 사용자를 총체적으로 관리할 수 있는, 안정적이고 확장 가능하며 직관적인 시스템을 제공하는 것이다.가 생성된다. $M_{C}$에 CaC $l_2$를 첨가한 경우 $M_{C}$는 완전히 $M_{Cl}$ 로 전이를 하였다. $M_{Cl}$ 에 CaC $l_2$를 첨가하였을 경우에는 아무런 수화물의 변화는 발생하지 않았다. 따라서 CaS $O_4$.2$H_2O$를 CaC $O_3$및 CaC $l_2$와 반응시켰을 때의 AFm상의 안정성 순서는 $M_{S}$ < $M_{C}$< $M_{Cl}$ 로 된다.phy. Finally, Regional Development and Regional Environmental Problems were highly correlated with accommodators.젼 공정을 거쳐 제조된다는 점을 고려할 때 이용가능한 에너지 함량계산에 직접 활용될 수는 없을 것이다.총단백질 및 AST에서 시간경과에 따른 삼투압 조절 능력에 문제가 있는 것으로 보여진다.c}C$에서 5시간 가열조리 후 잔존율은 각각 84.7% 및 73.3%였고, 질소가스 통기하에서는 잔존율이 88.9% 및 81.8%로 더욱 안정하였다.8% 및 12.44%, 201일 이상의 경우 13.17% 및 11.30%로 201일 이상의 유기의 경우에만 대조구와 삭제 구간에 유의적인(p<0.05) 차이를 나타내었다.는 담수(淡水)에서 10%o의 해수(海水)로 이주된지 14일(日) 이후에 신장(腎臟)에서 수축된 것으로 나타났다. 30%o의 해수(海水)에 적응(適應)된 틸라피아의 평균 신사구체(腎絲球體)의 면적은 담수(淡水)에 적응된 개체의 면적보다 유의성있게 나타났다. 해수(海水)에 적응(適應)된 틸라피아의 신단위(腎

  • PDF

Exploring the Thalamus of the Human Brain using Tractography Analysis at 3Tesla MRI (3 Tesla MRI에서 트랙토그래피 분석을 이용한 시상 탐색)

  • Im, Sang-Jin;Kim, Joo-Yeon;Baek, Hyeon-Man
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.4
    • /
    • pp.555-564
    • /
    • 2021
  • Thalamus is known to play an important role in the regulation of nerve function. Thalamus, located in the center of the brain, is involved in sleep, arousal, and emotional regulation, and has been reported to be associated with multiple sclerosis, essential tremors, and neurodegenerative diseases such as Parkinson's disease. In addition, it has been reported that iron deposits in the thalamus can cause depressive symptoms with age. Although there are discrepancies between studies, it can be deduced that the thalamus region has a clear effect on neurological disorders due to a strong relationship between the thalamus and neurological functions such as emotional control and processing. Through tractography analysis, the connectivity between the detailed areas of each subcortical region was investigated in the form of a matrix, showing strong connectivity and weak interhemispheric connectivity. In the 59> group, the WM connectivity of thalamus was found to be weaker than those of the two groups. Comparisons between the two groups showed that the young groups (10-39 and 40-59) had higher connection intensity than the 59> group and that statistically significant differences in 3 connection pathways were found in each hemisphere. A decrease in thalamus-related connection strength in aging has shown that it can affect emotional and neurological disorders such as anxiety and depression, and network measurements can help assess cognitive impairment across clinical conditions.

A study on the User Experience at Unmanned Checkout Counter Using Big Data Analysis (빅데이터 분석을 통한 무인계산대 사용자 경험에 관한 연구)

  • Kim, Ae-sook;Jung, Sun-mi;Ryu, Gi-hwan;Kim, Hee-young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.343-348
    • /
    • 2022
  • This study aims to analyze the user experience of unmanned checkout counters perceived by consumers using SNS big data. For this study, blogs, news, intellectuals, cafes, intellectuals (tips), and web documents were analyzed on Naver and Daum, and 'unmanned checkpoints' were used as keywords for data search. The data analysis period was selected as two years from January 1, 2020 to December 31, 2021. For data collection and analysis, frequency and matrix data were extracted through Textom, and network analysis and visualization analysis were conducted using the NetDraw function of the UCINET 6 program. As a result, the perception of the checkout counter was clustered into accessibility, usability, continuous use intention, and others according to the definition of consumers' experience factors. From a supplier's point of view, if unmanned checkpoints spread indiscriminately to solve the problem of raising the minimum wage and shortening working hours, a bigger employment problem will arise from a social point of view. In addition, institutionalization is needed to supply easy and convenient unmanned checkout counters for the elderly and younger generations, children, and foreigners who are not familiar with unmanned calculation.