• Title/Summary/Keyword: 소프트웨어 기업

Search Result 1,000, Processing Time 0.025 seconds

Software Size Measurement from Information Strategy Planning With the Function Point Method (정보전략계획 단계에서의 정보시스템 규모 예측:기능점수모형을 중심으로)

  • Bae, Joon-Soo;Jung, Jae-Yoon
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.3
    • /
    • pp.153-168
    • /
    • 2009
  • Many companies and governments perform information technology (IT) projections repeatedly for higher competitiveness and efficiency. Moreover, as the sizes of IT projects increase, the manpower and cost estimation of the projects are getting more important. In this research, we present a size estimation method of information system development projects on the basis of the function point method at the stage of information strategy planning(ISP), and illustrate the size calculation of an example IT project. According to the method, we first identify the types of projects, the scope and boundaries of size estimation, then count data and transaction functions from the artifacts of the ISP project. The unadjusted function points are adjusted to function point by the table of the Early Function Point. The way of calculating the sizes of IT projects will support successful IT projects by estimating reasonable manpower and cost for the projects.

  • PDF

Developing the Linkage System Between Statistical Quality Control and ISO 9000 Series (통계적 품질관리와 ISO 9000 시리즈와의 연결시스템 개발)

  • 김형준;오성균
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.174-192
    • /
    • 1998
  • These day in the Quality Assurance System, it required that computer system is able to utilize SQC and ISO 9000 series, just then. However. because SQC is necessary to special branch of statistical experience, it is very hard to use and have a bound in that apply to practical business. Therefor in this paper, we proposed the software system which is control, at the same time, SQC and ISO 9000 series, in addition to avail without statistical knowledge. For the shake of this point, the substance of this study is largely separated dual part that ISO 9000 system for which is limited to use design of basic system, test, experiment, tracking incongruent part, analysis condemned goofs, and SQC system for which is to limited to use control chart, estimate, statistical testing, design of experiment(DOE) which used to commonly in Quality Control System. Expected efficiency of this paper is to set Qualify Management System, transfer qualify consciousness, satisfy the customer, increase reliability, in particular, it is expected that it is very useful to minor enterprises of manufacturing-centered.

  • PDF

New developmental direction of telecommunications for Disabilities Welfare (장애인복지를 위한 정보통신의 발전방향)

  • 박민수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.35-43
    • /
    • 2000
  • This paper was studied on developmental direction of telecommunications for disabilities welfare. Method of this study is delphi method. Persons with disabilities is classed as motor disability, visual handicap, hearing impairment, and language and speech disorders. Persons with motor disability is needs as follow, speed recognition technology, video recognition technology, breath capacity recognition technology. Persons with visual handicap is needs as follow, display recognition technology, speed recognition technology, text recognition technology, intelligence conversion handling technology, video recognition - speed synthetic technology. Persons with hearing impairment and language - speech disorders is needs as follow, speed signal handling technology, speed recognition technology, intelligence conversion handling technology, video recognition technology, speed synthetic technology the results of this study is as follow: first, disabilities telecommunications organization must be constructed. Second, persons with disabilities in need of universal service. Third, Persons with disabilities in need of information education, Fourth, studying for telecommunications in need of support. Fifth, small telecommunications company in need of support. Sixth, software industry in need of new development. Seventh, Persons with disabilities in need of standard guideline for telecommunications.

  • PDF

Implementation of Mobile Computing based RFID Reconition System (모바일 컴퓨팅 환경의 RFID 인식 시스템 구현)

  • Jung, Sung-Hun;Lee, Bong-Keun;Yim, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.119-122
    • /
    • 2005
  • RFID(Radio Frequency IDentification) is appearing by point technology by Ubiquitous environment of new paradigm and Logistics' application. But, RFID chip of this is high price and short bandwidth, low power and interference etc. can become technological problem. This is getting into obstacle in common use. Reader and tag, Embedded software etc.. that is accomplishing standardization is imported paying most expensive Royalty. This paper is RFID cognition system that use PDA in Ubiquitous environment to apply to Logistics system. RFID cognition system processes input/output of fundamental information attaching tag to Logistics of products. And RFID cognition system supports quick and correct and safe synthetic Logistics managerial system through construction of database. This can prove minimization and customer service of Logistics expense. RFID cognition system is advantage that can widen range of application to area that cognition system of existent fixing style can not do. Also, It can expect economical effect through inexpensive system construction.

  • PDF

Design of Spark SQL Based Framework for Advanced Analytics (Spark SQL 기반 고도 분석 지원 프레임워크 설계)

  • Chung, Jaehwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.10
    • /
    • pp.477-482
    • /
    • 2016
  • As being the advanced analytics indispensable on big data for agile decision-making and tactical planning in enterprises, distributed processing platforms, such as Hadoop and Spark which distribute and handle the large volume of data on multiple nodes, receive great attention in the field. In Spark platform stack, Spark SQL unveiled recently to make Spark able to support distributed processing framework based on SQL. However, Spark SQL cannot effectively handle advanced analytics that involves machine learning and graph processing in terms of iterative tasks and task allocations. Motivated by these issues, this paper proposes the design of SQL-based big data optimal processing engine and processing framework to support advanced analytics in Spark environments. Big data optimal processing engines copes with complex SQL queries that involves multiple parameters and join, aggregation and sorting operations in distributed/parallel manner and the proposing framework optimizes machine learning process in terms of relational operations.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

A case study on algorithm development and software materialization for logistics optimization (기업 물류망 최적 설계 및 운영을 위한 알고리즘 설계 및 소프트웨어 구현 사례)

  • Han, Jae-Hyun;Kim, Jang-Yeop;Kim, Ji-Hyun;Jeong, Suk-Jae
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.153-168
    • /
    • 2012
  • It has been recognized as an important issue to design optimally a firm's logistics network for minimizing logistics cost and maximizing customer service. It is, however, not easy to get an optimal solution by analyzing trade-off of cost factors, dynamic and interdependent characteristics in the logistics network decision making. Although there has been some developments in a system which helps decision making for logistics analysis, it is true that there is no system for enterprise-wise's on-site support and methodical logistics decision. Specially, E-biz process along with information technology has been made dramatic advance in a various industries, there has been much need for practical education closely resembles on-site work. The software developed by this study materializes efficient algorithm suggested by recent studies in key topics of logistics such as location and allocation problem, traveling salesman problem, and vehicle routing problem and transportation and distribution problem. It also supports executing a variety of experimental design and analysis in a way of the most user friendly based on Java. In the near future, we expect that it can be extended to integrated supply chain solution by adding decision making in production in addition to a decision in logistics.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Numerical Analysis of Sufficient Condition on Larger Rate Volume of CIS/non-SIC over IIS/SIC in 3-User NOMA (삼중 사용자 비직교 다중 접속에서 IIS/SIC에 대한 CIS/non-SIC의 확대 전송률 용적의 충분조건의 수치 해석)

  • Chung, Kyuhyuk
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.29-35
    • /
    • 2021
  • Since a sufficient condition on the larger rate volume of 3-user correlated information sources (CIS)/non-successive interference cancellation (SIC) non-orthogonal multiple access (NOMA) over independent information sources (IIS)/SIC NOMA has not been investigated, this paper analyzes such a sufficient condition. First, we demonstrates that the rate volume of 3-user CIS/SIC NOMA is the same as a portion of the rate volume of 3-user IIS/SIC NOMA. Then, by identifying a dominant rate region, we calculate the sufficient condition on the larger rate volume of 3-user CIS/non-SIC NOMA over 3-user IIS/SIC NOMA. We also show that with such condition, the rate volume of 3-user CIS/non-SIC NOMA can be larger than that of 3-user IIS/SIC NOMA.

A model for preventing the spread of infectious diseases using beacons (비콘을 활용한 감염병 확산 방지 시스템에 관한 모델)

  • Kim, Ho-Yoon;Kim, Hyo-Jong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.14-22
    • /
    • 2021
  • As the Covid-19 outbreak spreads and prolongs around the world, visitor lists are prepared in various ways when entering the facility to prevent infection and identify confirmed people. In this study, we propose an access management system using beacons to solve the problems with the preparation and management of existing visitor lists. The research method searches the laws related to the collection of personal information and compares the current status of personal information collection and trends in the beacons. The proposed system compares and analyzes existing methods and security and efficiency, which confirm accurate and rapid access registration. By using Beacon access management system, it is effective in preventing and responding to the spread of new infectious diseases in the future.