• Title/Summary/Keyword: Account Management System

Search Result 601, Processing Time 0.028 seconds

The Application of Operations Research to Librarianship : Some Research Directions (운영연구(OR)의 도서관응용 -그 몇가지 잠재적응용분야에 대하여-)

  • Choi Sung Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.4
    • /
    • pp.43-71
    • /
    • 1975
  • Operations research has developed rapidly since its origins in World War II. Practitioners of O. R. have contributed to almost every aspect of government and business. More recently, a number of operations researchers have turned their attention to library and information systems, and the author believes that significant research has resulted. It is the purpose of this essay to introduce the library audience to some of these accomplishments, to present some of the author's hypotheses on the subject of library management to which he belives O. R. has great potential, and to suggest some future research directions. Some problem areas in librianship where O. R. may play a part have been discussed and are summarized below. (1) Library location. It is usually necessary to make balance between accessibility and cost In location problems. Many mathematical methods are available for identifying the optimal locations once the balance between these two criteria has been decided. The major difficulties lie in relating cost to size and in taking future change into account when discriminating possible solutions. (2) Planning new facilities. Standard approaches to using mathematical models for simple investment decisions are well established. If the problem is one of choosing the most economical way of achieving a certain objective, one may compare th althenatives by using one of the discounted cash flow techniques. In other situations it may be necessary to use of cost-benefit approach. (3) Allocating library resources. In order to allocate the resources to best advantage the librarian needs to know how the effectiveness of the services he offers depends on the way he puts his resources. The O. R. approach to the problems is to construct a model representing effectiveness as a mathematical function of levels of different inputs(e.g., numbers of people in different jobs, acquisitions of different types, physical resources). (4) Long term planning. Resource allocation problems are generally concerned with up to one and a half years ahead. The longer term certainly offers both greater freedom of action and greater uncertainty. Thus it is difficult to generalize about long term planning problems. In other fields, however, O. R. has made a significant contribution to long range planning and it is likely to have one to make in librarianship as well. (5) Public relations. It is generally accepted that actual and potential users are too ignorant both of the range of library services provided and of how to make use of them. How should services be brought to the attention of potential users? The answer seems to lie in obtaining empirical evidence by controlled experiments in which a group of libraries participated. (6) Acquisition policy. In comparing alternative policies for acquisition of materials one needs to know the implications of each service which depends on the stock. Second is the relative importance to be ascribed to each service for each class of user. By reducing the level of the first, formal models will allow the librarian to concentrate his attention upon the value judgements which will be necessary for the second. (7) Loan policy. The approach to choosing between loan policies is much the same as the previous approach. (8) Manpower planning. For large library systems one should consider constructing models which will permit the skills necessary in the future with predictions of the skills that will be available, so as to allow informed decisions. (9) Management information system for libraries. A great deal of data can be available in libraries as a by-product of all recording activities. It is particularly tempting when procedures are computerized to make summary statistics available as a management information system. The values of information to particular decisions that may have to be taken future is best assessed in terms of a model of the relevant problem. (10) Management gaming. One of the most common uses of a management game is as a means of developing staff's to take decisions. The value of such exercises depends upon the validity of the computerized model. If the model were sufficiently simple to take the form of a mathematical equation, decision-makers would probably able to learn adequately from a graph. More complex situations require simulation models. (11) Diagnostics tools. Libraries are sufficiently complex systems that it would be useful to have available simple means of telling whether performance could be regarded as satisfactory which, if it could not, would also provide pointers to what was wrong. (12) Data banks. It would appear to be worth considering establishing a bank for certain types of data. It certain items on questionnaires were to take a standard form, a greater pool of data would de available for various analysis. (13) Effectiveness measures. The meaning of a library performance measure is not readily interpreted. Each measure must itself be assessed in relation to the corresponding measures for earlier periods of time and a standard measure that may be a corresponding measure in another library, the 'norm', the 'best practice', or user expectations.

  • PDF

Technological Development Trends for Underground Safety in Urban Construction (도심지 공사시 지하안전 확보를 위한 기술개발 동향)

  • Baek, Yong;Kim, Woo Seok
    • Tunnel and Underground Space
    • /
    • v.27 no.6
    • /
    • pp.343-350
    • /
    • 2017
  • Amid increasingly saturated ground space, development of underground space has been booming throughout the world and excavation has been underway near the structure above or under the ground level. But the ground subsidence caused by improper or poor construction technologies, underground water leakage, sudden changes of stratum and the problem with earth retaining system component has been emerged as hot social issue. To deal with such problems nationwide, establishment of preventive and proactive disaster management and rapid restoration system has been pushed now. In this study, collection of the data on technology development trend to secure the underground safety was made, taking into account of internal change elements (changing groundwater level, damage to underground utilities, etc) and external change elements (vehicle load, earthquake and ground excavation, etc) during excavation. Amid the growing need of ground behavior analysis, ground subsidence evaluation technology, safe excavation to prevent ground subsidence and reinforcement technology, improvement of rapid restoration technology in preparation for ground subsidence and development of independent capability, this study is intended to introduce the technology development in a bid to prevent the ground subsidence during excavation. It's categorized into prediction/evaluation technology, complex detect technology, waterproof reinforcement technology, rapid restoration technology and excavation technology which, in part, has been in process now.

How Science-Engineering Graduates Become so Powerful Elites in China? (중국의 이공계 강세 현상에 대한 고찰)

  • ;Bak Hee-Je
    • Journal of Science and Technology Studies
    • /
    • v.4 no.2 s.8
    • /
    • pp.1-32
    • /
    • 2004
  • Korean scientific community has recently argued that, in order to attract talented young people to the science and engineering fields, more ranking positions in the governmental office should be filled in by science and engineering majors. In this context, a special attention has been paid to the Chinese case where science and engineering majors have taken the highest places in Chinese political hierarchy. This paper examines historical and social background of the salience of science and engineering fields in modem China. A closer examination shows that the salience of science and engineering fields was resulted by the distinct historical experiences of China-the socialist reform of higher education system and Cultural Revolution. The former shaped the social conviction that humanities and social sciences are less useful than science and engineering fields. The latter even spread the idea that majoring in humanities or social sciences run the risk of political oppressions. Thus, the salience of science and engineering in China is a social phenomenon reflecting an academic hierarchy forced by the radical politics of modem China. Also, the higher proportion of science and engineering majors in the raking governmental officers has been resulted by a unique Chinese political system, in particular the personnel management system of the Chinese Communist Party that emphasizes practical experiences after college graduation. The comparison of the social position of science and engineering majors in China and Korea without taking account of such historical and social background may therefore mislead our understanding of the cause of and counterplan to the decreasing popularity of science and engineering fields in Korean universities.

  • PDF

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

Multi-Criteria Group Decision Making under Imprecise Preference Judgments : Using Fuzzy Logic with Linguistic Quantifier (불명료한 선호정보 하의 다기준 그룹의사결정 : Linguistic Quantifier를 통한 퍼지논리 활용)

  • Choi, Duke Hyun;Ahn, Byeong Seok;Kim, Soung Hie
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.15-32
    • /
    • 2006
  • The increasing complexity of the socio-economic environments makes it less and less possible for single decision-maker to consider all relevant aspects of problem. Therefore, many organizations employ groups in decision making. In this paper, we present a multiperson decision making method using fuzzy logic with linguistic quantifier when each of group members specifies imprecise judgments possibly both on performance evaluations of alternatives with respect to the multiple criteria and on the criteria. Inexact or vague preferences have appeared in the decision making literatures with a view to relaxing the burdens of preference specifications imposed to the decision-makers and thus taking into account the vagueness of human judgments. Allowing for the types of imprecise judgments in the model, however, makes more difficult a clear selection of alternative(s) that a group wants to make. So, further interactions with the decision-makers may proceed to the extent to compensate for the initial comforts of preference specifications. These interactions may not however guarantee the selection of the best alternative to implement. To circumvent this deadlock situation, we present a procedure for obtaining a satisfying solution by the use of linguistic quantifier guided aggregation which implies fuzzy majority. This is an approach to combine a prescriptive decision method via a mathematical programming and a well-established approximate solution method to aggregate multiple objects.

  • PDF

Development of a Gridded Simulation Support System for Rice Growth Based on the ORYZA2000 Model (ORYZA2000 모델에 기반한 격자형 벼 생육 모의 지원 시스템 개발)

  • Hyun, Shinwoo;Yoo, Byoung Hyun;Park, Jinyu;Kim, Kwang Soo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.19 no.4
    • /
    • pp.270-279
    • /
    • 2017
  • Regional assessment of crop productivity using a gridded simulation approach could aid policy making and crop management. Still, little effort has been made to develop the systems that allows gridded simulations of crop growth using ORYZA 2000 model, which has been used for predicting rice yield in Korea. The objectives of this study were to develop a series of data processing modules for creating input data files, running the crop model, and aggregating output files in a region of interest using gridded data files. These modules were implemented using C++ and R to make the best use of the features provided by these programming languages. In a case study, 13000 input files in a plain text format were prepared using daily gridded weather data that had spatial resolution of 1km and 12.5 km for the period of 2001-2010. Using the text files as inputs to ORYZA2000 model, crop yield simulations were performed for each grid cell using a scenario of crop management practices. After output files were created for grid cells that represent a paddy rice field in South Korea, each output file was aggregated into an output file in the netCDF format. It was found that the spatial pattern of crop yield was relatively similar to actual distribution of yields in Korea, although there were biases of crop yield depending on regions. It seemed that those differences resulted from uncertainties incurred in input data, e.g., transplanting date, cultivar in an area, as well as weather data. Our results indicated that a set of tools developed in this study would be useful for gridded simulation of different crop models. In the further study, it would be worthwhile to take into account compatibility to a modeling interface library for integrated simulation of an agricultural ecosystem.

A study of Airport ground Service staffs on behavior factors turnover of the organization -Focusing on the mediating effect of organizational commitment- (공항 지상직 서비스 근무자의 이직행동 요인에 관한 연구 -조직헌신의 매개효과를 중심으로-)

  • Lee, Young-Suk;Lee, Jung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.147-157
    • /
    • 2016
  • The opening of a second new airport is urgently needed to meet the growing number of visitors to Incheon International Airport. This study focused on effectiveness of mediating effects on the dedication to organization in order to determine why manpower resources of the airport service sector should take job-changing into account and to focus on staff who provide service to customers visiting Incheon International Airport management of airport service quality by providing a better service and preventing them from leaving their job. The results show that, first, only obligation conflicts and heavy workload affect the dedication to organization in terms of task-related causes. Second, compensation and relationships with seniors also affect the dedication to organization in terms of organization-related causes. Third, if more dedication is required, more employees will leave their job. Fourth, role conflict is the only reason to leave the job related to task. Fifth, only compensation and decision making affect the cause of the dedication to organization. The employer urgently needs to make a system to develop a relationship with colleagues and seniors, make a better work environment so that employees can work for a longer period and monetary or valuable compensation should be provided as indicated above in order to keep them employed.

Management Automation Technique for Maintaining Performance of Machine Learning-Based Power Grid Condition Prediction Model (기계학습 기반 전력망 상태예측 모델 성능 유지관리 자동화 기법)

  • Lee, Haesung;Lee, Byunsung;Moon, Sangun;Kim, Junhyuk;Lee, Heysun
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.4
    • /
    • pp.413-418
    • /
    • 2020
  • It is necessary to manage the prediction accuracy of the machine learning model to prevent the decrease in the performance of the grid network condition prediction model due to overfitting of the initial training data and to continuously utilize the prediction model in the field by maintaining the prediction accuracy. In this paper, we propose an automation technique for maintaining the performance of the model, which increases the accuracy and reliability of the prediction model by considering the characteristics of the power grid state data that constantly changes due to various factors, and enables quality maintenance at a level applicable to the field. The proposed technique modeled a series of tasks for maintaining the performance of the power grid condition prediction model through the application of the workflow management technology in the form of a workflow, and then automated it to make the work more efficient. In addition, the reliability of the performance result is secured by evaluating the performance of the prediction model taking into account both the degree of change in the statistical characteristics of the data and the level of generalization of the prediction, which has not been attempted in the existing technology. Through this, the accuracy of the prediction model is maintained at a certain level, and further new development of predictive models with excellent performance is possible. As a result, the proposed technique not only solves the problem of performance degradation of the predictive model, but also improves the field utilization of the condition prediction model in a complex power grid system.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.