• Title/Summary/Keyword: Demand for Research Information

Search Result 1,699, Processing Time 0.039 seconds

Reliability Growth Modeling in the Vehicles Developement Stage

  • Won Jung;Park, Sukhwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.3 no.1
    • /
    • pp.67-77
    • /
    • 1998
  • Reliability growth testing used to evaluate reliability in the automobile industry have not always been able to correctly address reliability concerns with increased confidence. The demand to confirm to all product performance requirements under various operating environments has added to the complexity of accurately assessin theproduct's reliability in the required development time. In addition, it is often desired to determine the relationship of a product's reliability to cost, development time, design, manufacturability and assembly. This paper presents the methods for reliability growth modeling to evaluate and interpret reliability concerns to support the reliability analysis of automobile assemblies and systems. This reliability growth modeling process is a mechanism to help "build in" reliability during early phases in the vehicle devleopment stage.

A Research on the Internet-based Cyber-insurance Service (인터넷상의 사이버보험의 현황과 발전 방향에 관한 연구)

  • Nam, Sang-Zo;Lee, Jung-Ho
    • Asia pacific journal of information systems
    • /
    • v.8 no.3
    • /
    • pp.165-180
    • /
    • 1998
  • In this study, we analysed the current situation of Internet-based insurance services which can provide a non-traditional and cost effective communication channel between the customers and insurance companies. The service of Internet-based cyber-insurance extends from mere advertisement to on-line contracts through planning simulations and, furthermore, to customer monitoring. This cyber-insurance is the demand of the times and is not to be overlooked-by the Korean insurance companies which are suffering from accumulated loss and are facing severe economic depression. We performed a comparative analysis between the domestic cyber-insurance service and pioneers'. Also, we suggested future possibilities of cyber-insurance services, presenting an architecture for the construction of a cyber-insurance management module within the meta financial investment system.

  • PDF

Direct Sequence Spread Spectrum Transmitter using FPGAs

  • Abhijit S. Pandya;Souza, Ralph-D′;Chae, Gyoo-Yong
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.2
    • /
    • pp.76-79
    • /
    • 2004
  • The DS-SS (Direct Sequence Spread Spec1nun) transmitter is part of a low data rate (∼150 kbps - burst rate and 64 bps - average data rate) wireless communication system. It is traditionally implemented using Digital Signal processing chip (DSP). However, with rapid increase in variety of services through cell phones, such as, web access, video transfer, online games etc. demand for higher rate is increasing steadily. Since the chip rate and thereby the sampling rate requirements of the system are fairly high, the transmitter should implemented using Field programmable Gate Arrays FPGAs instead of a DSP. This paper shows the steps taken to get a working prototype of the transmitter unit on a FPGA based platform.

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.

The Rights of Patients as Consumers (환자의 소비자로서 권리)

  • Kwon, Yong Jin;Son, Sang Sik;Lim, Young Deok
    • Health Policy and Management
    • /
    • v.22 no.3
    • /
    • pp.315-346
    • /
    • 2012
  • The legal relationship between patient and physician is legally equal relationship. But, in times past, patients be compelled to sign an unequal contract, substantially. Because of the imbalance between supply and demand in the health care market. Today, the law of supply and demand in the health care market is running well. And as the cognition of citizens' rights grows, the relationship between patient and physician can also get a lot of changes. Patients have the right to know the information about medical care, and to decide whether or not to get treatment including invasions against their own bodies. In other words, Doctors have an obligation to explain to their patients. If doctors did not provide patients sufficient explanation or information, it violates the right of patients. This is a tort, or a breach of contract. To improve the remedy for violation of patient's right, patient is able to be protected by status as consumer. If patient is a kind of consumer in terms of medical consumption, he/she as consumer can enjoy supplementally the consumer's right. The patient as a consumer can exercise now a consumer's right as a constitutional right. In addition, with respect to consumer's rights, Framework Act on Consumers was enacted. This Act is based on constitutional provisions of Article 124 and the Act can be seen as a law that embodies consumer right because the provision of the constitutional law delegates specific contents. In the health care field, patients need to win recognition the statue of the consumer to hold the sovereignty of the consumer. In particular, if patients are consumers, they may be able to make good use of the quickly and efficiently collective dispute resolution and association lawsuit to rescue their damage, the Alternative Dispute Resolution(ADR) of Framework Act on Consumers.

Generating Alternative Sewers Based on GIS and Simulation Technique (GIS 및 Simulation 기법에 의한 하수도관거 대안 생성)

  • 김형복;김경민
    • Spatial Information Research
    • /
    • v.5 no.2
    • /
    • pp.185-194
    • /
    • 1997
  • Spatial decision support systems(SDffi), a new class of decision support system(DSS), result from the melding together of GIS and DSS, Planning support systems(PS5) add more advanced spatial analysis functions than GIS and intertemporal functions to the functions of SDSS. This paper reports the development of a planning support system providing a framework that facilitates urban planners and civil engineers in conducting coherent deliberations about the generation of satisficing sewers. 1he planning support system for the generation of satisficing sewers(PS5/GSS) was designed from the understanding that land use and development drive the demand for storm and sanitary sewers. Through four stages of supply, demand, alternative generation, and evaluation, PSS/GSS integrates basic planning, preliminary design, and engineering design of sewer. GIS and graphic user interface are excellent toolboxes for designing sewer networks, estimating the quantity of wastewater, and showing generated alternative sewers. A sewer model using simulation tedmique can generate an initial sewer. Users can define alternative sewers by the direct manipulation of sewer networks or by the manipulation of parameters in the sewer model. The sewer model evaluates the performance of the user defined alternatives.

  • PDF

A Study on How to Introduce Subject-Oriented Service to University Libraries Based on Their Size in Korea (대학도서관의 규모별 주제전문사서체제 도입방안에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.1
    • /
    • pp.101-117
    • /
    • 2009
  • It has been demonstrated through previous demand analysis that the subject-oriented service system in university libraries are in higher demand than the function-oriented system. Despite of the increasing number of studies that prove cost-effectiveness and operational efficiency of the subject-oriented library service, there are virtually no university libraries in Korea that fully operate subject-oriented service. This study aims to propose a set of practical guidelines for university libraries to introduce subject-oriented service in the midst of many existing constraints, namely staff shortage. The study describes responsibilities of subject specialist librarians and analyzes best practices of subject-oriented service. Also it shows current standing of university libraries of difference size based on web site research of four-year university libraries.

An Economic Analysis of Alternative Mechanisms for Optimal IT Security Provision within a Firm (기업 내 최적 정보기술보안 제공을 위한 대체 메커니즘에 대한 경제적 분석)

  • Yu, Seunghee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.107-117
    • /
    • 2013
  • The main objective of this study lies at examining economic features of IT security investment and comparing alternative mechanisms to achieve optimal provision of IT security resources within a firm. There exists a paucity of economic analysis that provide useful guidelines for making critical decisions regarding the optimal level of provision of IT security and how to share the costs among different users within a firm. As a preliminary study, this study first argues that IT security resources share some unique characteristics of pure public goods, namely nonrivalry of consumption and nonexcludability of benefit. IT security provision problem also suffers from information asymmetry problem with regard to the valuation of an individual user for IT security goods. Then, through an analytical framework, it is shown that the efficient provision condition at the overall firm level is not necessarily satisfied by individual utility maximizing behavior. That is, an individual provision results in a suboptimal solution, especially an underprovision of the IT security good. This problem is mainly due to the nonexcludability property of pure public goods, and is also known as a free-riding problem. The fundamental problem of collective decision-making is to design mechanisms that both induce the revelation of the true information and choose an 'optimal' level of the IT security good within this framework of information asymmetry. This study examines and compares three alternative demand-revealing mechanisms within the IT security resource provision context, namely the Clarke-Groves mechanism, the expected utility maximizing mechanism and the Groves-Ledyard mechanism. The main features of each mechanism are discussed along with its strengths, weaknesses, and different applicability in practice. Finally, the limitations of the study and future research are discussed.

  • PDF

Strategies for Increasing Library Inclusion by Analyzing Local-based Demands of Vulnerable Population (지역기반 지식정보 취약계층의 수요 분석을 통한 도서관 포용성 강화 전략)

  • Kang, Ji Hei;Bae, Kyung-Jae
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.2
    • /
    • pp.295-318
    • /
    • 2020
  • This study was conducted to grasp the changing user needs, especially the changing information needs of the vulnerable groups of knowledge and information. The study analyzed the information needs of the migrants in Area A by introducing a community-based participatory research methodology. The authors cooperated with the local community throughout the entire course of the study and proposed an inclusive library strategy for the underprivileged in the A region. Migrants were in demand for easy writing materials, reading activities programs, leisure culture programs, and literacy programs. In particular, it was analyzed that services should be provided through cooperation with related organizations. As a result of the study, it was suggested to provide experiences of deeply participating in the current library and to provide various information sources (resource guides) and to promote through children.

A Study on Customer's Satisfaction and Economic Valuation Model of Information Analysis Report (정보분석 보고서의 이용자 만족도 및 경제적 가치평가 측정에 관한 연구)

  • Jeong, Yion-Il;Moon, Yeong-Ho;Bae, Sang-Jin;Kim, Yoon-Jong
    • Journal of Information Management
    • /
    • v.36 no.3
    • /
    • pp.167-182
    • /
    • 2005
  • This study is to provide the customer's satisfaction and the economic evaluation model for the KISTI S&T Informaion Analysis Report with the results of the survey. Recently the important issue for the informaion analysis service is make policies that reflect the proper demand and satisfaction of customers. In this paper, we explain how the evaluate of information analysis service in the customer's satisfaction and the economic valuation model can be estimated using survey. In such a setting, the customer's satisfaction and the economic evaluation model are important methods for the reflection of monitored information in national scientific and technological policies.