• 제목/요약/키워드: Case research methodologies

Search Result 221, Processing Time 0.02 seconds

A Study on Approximate and Exact Algorithms to Minimize Makespan on Parallel Processors (병렬처리리례 상에서 동작업완료시간의 최소화해법에 관한 연구)

  • Ahn, Sang-Hyung;Lee, Song-Kun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.2
    • /
    • pp.13-35
    • /
    • 1991
  • The purpose of this study is to develop an efficient exact algorithm for the problem of scheduling n in dependent jobs on m unequal parallel processors to minimize makespan. Efficient solutions are already known for the preemptive case. But for the non-preemptive case, this problem belongs to a set of strong NP-complete problems. Hence, it is unlikely that the polynomial time algorithm can be found. This is the reason why most investigations have bben directed toward the fast approximate algorithms and the worst-case analysis of algorithms. Recently, great advances have been made in mathematical theories regarding Lagrangean relaxation and the subgradient optimization procedure which updates the Lagrangean multipliers. By combining and the subgradient optimization procedure which updates the Lagrangean multipliers. By combining these mathematical tools with branch-and-bound procedures, these have been some successes in constructing pseudo-polynomial time algorithms for solving previously unsolved NP-complete problems. This study applied similar methodologies to the unequal parallel processor problem to find the efficient exact algorithm.

  • PDF

Agile Risk Mitigation Framework

  • Naz, Anum;Khan, Ahmad Salman;Atif, Muhammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.586-596
    • /
    • 2021
  • Software organisations follow different methodologies for the development of software. The software development methodologies are mainly divided into two categories, including plan-driven and agile development. To attain project success, it is very significant to consider risk management during whole project. Agile development is considered risk-driven, but many risks are unreported at the industrial level. The risks can be divided into three categories, including (i) development risks, (ii) organisations risks, and (iii) people-oriented risks. This paper deals with Development risks specifically. Several risks related to development are faced by people working in the industry while dealing with agile development. Their management among the industry is a big issue, so this paper emphasises ARMF based on development-related risks by following agile development. This research work will help software organisations to prevent different project-related risks during agile development. The risks are elicited at two-level, (i) literature-based and (ii) IT industry based. A systematic literature review was performed for eliciting the agile risks from the literature. Detailed case studies and survey research methods were applied for eliciting risks from IT industry. Finally, we merged the agile development risks from literature with standard industrial risks. Hence, we established an agile risk mitigation framework ARMF based on agile development and present a groundwork established in light of empirical examination for extending it in future research.

A Study on the Mechanism Governing the Use of Makeup-type Digital Shadow Work: A Case of Profile Picture Management (메이크업형 디지털그림자노동 사용을 지배하는 기제에 관한 연구: 프로필 사진 관리 사례)

  • Lee, Woong Kyu;Cho, Ara
    • The Journal of Information Systems
    • /
    • v.31 no.3
    • /
    • pp.1-18
    • /
    • 2022
  • Purpose The purpose of this study is to analize a psychological and behavioral mechanism for using profile picture management in digital service such as social network service. Profile picture management falls under metadata management and is performed only by those who want it. This means that it, is one of the typical makeup-type digital shadow works (DSWs) which have not been studied yet. Design/methodology/approach This study adopts ground theory method(GTM) as research methodology. GTM, which is one of qualitative methodologies, is for developing theories while most survey based methodologies, which are well adopted in much research for information systems, are for validation of theories. By interviewing ten users, the data are collected and analyzed by open coding, axis coding with paradigm model, and selective coding. Findings In result, 39 codes are found and classified into 29 sub classes and 15 classes. These 15 classes are organized by paradigm model which derives core code of profile picture management as 'voluntary management tasks to experience small pleasures with intermittent attention'. Finally, based on the paradigm model and the core code, the story line, which can explain profile picture management, is suggested.

A Case Study of Information System Auditing of CBD Project (CBD프로젝트의 정보시스템감리 사례연구)

  • 조남재;박기호;전순천;박준호
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.167-178
    • /
    • 2004
  • Different from traditional development methodologies like waterfall model, the CBD (component based development) methodology relies on a building block approach in the design and development of information system. The audit procedure and checklist for the traditional IS development methodology are required to be modified to be suitable for CBD. This research reviewed IS audit guidelines for the existing development process and analyzed multiple projects that employed the by component based development process. For the purpose of this study, we chose a governmental project and a next-generation IS project of a financial agency as sample cases. By comparing existing IS audit checklists and items actually reviewed in audit projects, this study identified appropriate check items for the CBD-centric audit program. New items were proposed as additional items such as project control in management phase, usage case and conceptual model establishment, component evaluation and design, in implementation phase, and so forth. The result of the research provides new guidelines for the audit CBD projects for the purposed of increased efficiency and qualify of application development projects.

  • PDF

A Performance Evaluation Mode1 for Information Systems using the Balanced Scorecard and the Value Chain : A Case Study (BSC와 가치사슬을 이용한 정보시스템의 성과 측정 방법 : 제조업체 사례분석)

  • 최경현;김태균
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.27 no.2
    • /
    • pp.63-79
    • /
    • 2002
  • During the last decade many enterprises spent a huge amount of money for investment on Information Technology (IT) & Information System (IS) to attain competitive advantage and to maximize their business performance by satisfying the various requirements of customers. Under such circumstances, methodologies for evaluating IT impact on business performance are very important issues for strategic decision making on investment. In this study, we propose a performance evaluation model that adopts the concept of the Balanced Scorecard (BSC) and the Value Chain to analyze the financial impact and non-financial impact of IT & IS at each critical work area. This model combines the 4 evaluation areas from BSC and 6 critical work areas from Value Chain and measures the Key Performance Indicator (HPI) and the effect of KPI. Also, we present a case study of which the evaluation model has been conducted on a major manufacturing company. finally. we address some important notes to improve the IT & IS performances in the real-world.

Case Study on the Compatibility of Measurement Systems with Part-to-part Variations in Automobile Industry

  • Lee, Myung-Duk;Lim, Ik-Sung;Sung, Chun-Ja
    • International Journal of Reliability and Applications
    • /
    • v.9 no.1
    • /
    • pp.17-30
    • /
    • 2008
  • Analysis of measurement systems is important to determine if the measurement process is adequate to measure the part-to-part variability in the process. Control chart techniques provide an effective, and easy-to-use method for performing this analysis. However, application with the real data for the evaluation procedure for multiple measurement systems have not been demonstrated. This research will provide a methodology for the evaluation of part-to-part variation and variation of different measurement systems step by step followed by number of case studies for each methodologies provided.

  • PDF

A Case Study on the Compatibility Analysis of Measurement Systems in Automobile Body Assembly

  • Lee, Myung-Duk;Lim, Ik-Sung;Sung, Chun-Ja
    • International Journal of Reliability and Applications
    • /
    • v.9 no.1
    • /
    • pp.7-15
    • /
    • 2008
  • The dimensional measurement equipment, such as Coordinate Measurement Machine (CMM), Optical Coordinate Measurement Machine (OCMM), and Checking Fixture (CF), take multiple dimensional measurements for each part in an automobile industry. Measurements are also recorded under different measurement systems to see if the responses differ significantly over these systems. Each measurement system (CMM, OCMM, and CF) will be considered as different treatments. This set-up provides massive amounts of process data which are multivariate in nature. Therefore, the multivariate statistical analysis is required to analyze data that are dependent on each other. This research provides step by step methodology for the evaluation procedure of the compatibility of measurement systems and clarify a systematic analyzation among the different measurement system's compatibility followed by number of case studies for each methodologies provided.

  • PDF

Feed Resources for Animals in Asia: Issues, Strategies for Use, Intensification and Integration for Increased Productivity

  • Devendra, C.;Leng, R.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.24 no.3
    • /
    • pp.303-321
    • /
    • 2011
  • The availability and efficient use of the feed resources in Asia are the primary drivers of performance to maximise productivity from animals. Feed security is fundamental to the management, extent of use, conservation and intensification for productivity enhancement. The awesome reality is that current supplies of animal proteins are inadequate to meet human requirements in the face of rapidly depleting resources: arable land, water, fossil fuels, nitrogenous and other fertilisers, and decreased supplies of cereal grains. The contribution of the ruminant sector lags well behind that of non-ruminant pigs and poultry. It is compelling therefore to shift priority for the development of ruminants (buffaloes, cattle, goats and sheep) in key agro-ecological zones (AEZs), making intensive use of the available biomass from the forage resources, crop residues, agro-industrial by-products (AIBP) and other non-conventional feed resources (NCFR). Definitions are given of successful and failed projects on feed resource use. These were used to analyse 12 case studies, which indicated the value of strong participatory efforts with farmers, empowerment, and the benefits from animals of productivity-enhancing technologies and integrated natural resource management (NRM). However, wider replication and scaling up were inadequate in project formulation, including systems methodologies that promoted technology adoption. There was overwhelming emphasis on component technology applications that were duplicated across countries, often wasteful, the results and relevance of which were not clear. Technology delivery via the traditional model of research-extension linkage was also inadequate, and needs to be expanded to participatory research-extension-farmer linkages to accelerate diffusion of technologies, wider adoption and impacts. Other major limitations concerned with feed resource use are failure to view this issue from a farming systems perspective, strong disciplinary bias, and poor links to real farm situations. It is suggested that improved efficiency in feed resource use and increased productivity from animals in the future needs to be cognisant of nine strategies. These include priorities for feed resource use; promoting intensive use of crop residues; intensification of integrated ruminant-oil palm systems and use of oil palm by-products; priority for urgent, wider technology application, adoption and scaling up; rigorous application of systems methodologies; development of adaptation and mitigation options for the effects of climate change on feed resources; strengthening research-extension-farmer linkages; development of year round feeding systems; and striving for sustainability of integrated farming systems. These strategies together form the challenges for the future.

Structural effects on stock price forecasting

  • Kim, Steven H.;Kang, Dae-Suk
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.207-210
    • /
    • 1996
  • Learning methodologies such as neural networks or genetic algorithms usually require long training times. Case based reasoning, however, attains peak performance swiftly and is often appropriate for learning even with small data sets. Previous work has shown that an extended case reasoning methodology can yield superior performance in the task of predicting financial data series. This paper examines the impact of reasoning procedures on stock price prediction. The following characteristics are evaluated: size of input vector, multiplicity of neighboring states, and a scaling factor for growth. The concepts are illustrated in the context of predicting the price of an individual price.

  • PDF

Identification of Authors and ethics of Research based on KODISA Case

  • ZHANG, Fan;SU, Shuai;YOUN, Myoung-KIl
    • Journal of Research and Publication Ethics
    • /
    • v.1 no.2
    • /
    • pp.11-13
    • /
    • 2020
  • Purpose: The author wants to specify scope of research, identify without giving burden, prevent unfair identification of the author, admit of production of the outcome, enact rules of identification, and build up foundation of development. Also, this study defines scope of publication of outcome of research to prevent unfair identification of authors and admit of them. Research design, data and methodology: The study described literary research, standard research, phenomenon research, and empirical result without methodologies, statistical analysis and scientific test and investigated operation system of KODISA cases. Results: At publication of findings of the research, researchers shall identify the ones of production of the finding to allocate help of the research. Conclusions: Scientific journals shall be controlled to develop ability and to grow up and have a system. Researchers shall give direction of other scientific journals. The study made efforts to be a model. KODISA Edition Team shall make an effort to keep and develop. So far, no regulation of identification of authors has produced disturbance so terminologies should be uniformed. Researchers shall keep rules of identification of authors to uniform and regulate identification of authors, conditions of authors, and order and correspondent authors. KODISA enacted rules of identification of authors for the first time in Korea to develop science.