• Title/Summary/Keyword: Design of Information Systems

Search Result 7,658, Processing Time 0.034 seconds

On Stability for Design of Repetitive Controllers in Frequency Domain (주파수 영역에서 연속반복학습제어기 설계 안정성 해석)

  • Lee, Soo-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.4
    • /
    • pp.126-130
    • /
    • 2007
  • This paper presents a method to design a repetitive controller that is specified in the specified trajectory for the repetitive works. With the single-model design approach, the controller is derived by minimizing a frequency-domain based cost function that produces monotonic convergence of the tracking error as a function of repetition number. Numerical illustrations show how the proposed single-model design method produces a repetitive controller in a single nominal model of the system.

  • PDF

The Effects of Organizational Factors and GSCM Practices on BSC Performance (GSCM의 조직적 요인과 실행요인이 BSC 성과에 미치는 영향연구)

  • Noh, Mi Jin;Jang, Sung Hee
    • The Journal of Information Systems
    • /
    • v.24 no.1
    • /
    • pp.169-191
    • /
    • 2015
  • Green supply chain management(GSCM) has emerged as an organizational system which helps organizations and their parter to achieve corporate profit by reducing environmental risk and cost. The main objective of this study is to investigate the relationship among organizational factors(manager support and organizational learning), GSCM practices(investment recovery and eco-design) and GSCM performance based on the BSC. Using a sample of 125 Korean companies, path analysis is used to test the research model. The results shows that the manager support has a positive effect on the investment recovery and eco-design. The results also suggest that the organizational learning directly affect the investment recovery, but do not affect the eco-design. The investment recovery and eco-design have effect on the GSCM performance. In addition, the competitive pressure has moderating effects on most of the relationships between the organizational factors and GSCM practices. This findings provides useful insights for managers seeking to adopt GSCM practices, and also provide useful guidelines for researchers to study GSCM performance.

An Integrated Modeling Methodology Based on Object-oriented IDEF (Application of the CIMS for Ship Production) (객체지향 IDEF 기반의 통합모형화 방법론 : 조선 CIMS 분야 사례연구)

  • Hwang, Sung-Ryoung;Moon, Chi-Ung;Kim, Jae-Gyun;Jang, Gil-Sang
    • Asia pacific journal of information systems
    • /
    • v.9 no.3
    • /
    • pp.47-73
    • /
    • 1999
  • Nowadays, the modeling of information systems have been enabled by various models and methodologies that are used for different purposes and perspectives upon the systems. The integrated modeling methodology that integrates these models and methodologies has become important concerns in system integration such as CIM and PDM. The primary objective of this paper is to propose a comprehensive integrated modeling methodology that integrates the OOIDEFO function model, OOIDEFO information model, node model, user interface model, and organization model for an effective analysis, design and implementation for system integration. This methodology covers the generic requirements of modeling methodology such as graphical notations, modeling processes, and abstraction mechanisms. Also, this methodology uses an 00 paradigm throughout the entire systems development life cycle. In order to prove the consistency and efficiency of the proposed methodology, the CIMS for ship production is modeled and prototyped.

  • PDF

Analytical Validation of the SDL Metrics Set (SDL 메트릭 집합의 분석적 검증)

  • Hong, Ui-Seok;Jeong, Myeong-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1112-1121
    • /
    • 2000
  • Design metrics that quantify the design phase play an important role in reducing system development cost because the problems in early phases of software development seriously affected the quality of the late products. Real-time systems such as telecommunication systems are so large that design quantification is more important in real-time system design. Although many metrics have been proposed, few of them are correctly validated. This paper revises the SDL metrics set proposed in earlier study [9] and perform an analytical validation o the metrics set. Axiomatic approach and dimensional analysis are used for metrics validation and the old metrics are revised ot satisfy the validation criteria.

  • PDF

Design of Collaborative BOM Management System for Small and Medium Enterprises (중소 제조기업을 위한 협업환경지원 BOM 관리 시스템 설계)

  • Kim, Bo-Hyun;Jung, So-Young;Baek, Jae-Yong;Lee, Sung-Jin;Lee, Seok-Woo;Choi, Hun-Zong
    • Korean Journal of Computational Design and Engineering
    • /
    • v.14 no.4
    • /
    • pp.254-260
    • /
    • 2009
  • Most commercial PDM (product data management) systems, which have been released recently by overseas famous software vendors, are still expensive and heavy to apply to small and medium enterprises (SMEs). Proposed in this paper are an architecture and functions of collaborative BOM (bill-of-material) management system (cBOM-MS) which supports the internal BOM management by BOM Navigator, provides SMEs with constructing the collaborative BOM via Collaborative BOM Portal, and proposes an interface to extract BOM automatically from commercial CAD systems. In the design of cBOM-MS, BOM Navigator and cBOM Portal are positioned separately to reinforce the information security about product data during product development process.

Software Architecture Analysis for Risk Management

  • Kang, Byeong-Do;Lee, Roger Y.
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.83-89
    • /
    • 2009
  • Management of risks is critical issue in the project management and it is important to ensure that risk management is done in a sensible way. Risk analysis is an activity geared towards risk mitigation in risk management technique. Many techniques to manage, analyze and reduce risks have been done previously but only few have addressed the design analysis to reduce risk and none have attempted to analyze architecture to manage risks. In this paper we try to find a solution through various analyzing various software architectural design concepts. We follow Pressman's method of analyzing architecture design, and then alter it to identify risks which are used in risk analysis process further in risk management process. The risks assessed are analyzed later in the risk management cycle.

Design of the TDMG pulse generator for ultra-wideband systems (UWB 시스템을 위한 TDMG 펄스 발생기의 설계)

  • Park Jin-Hwan;Bae Bag Geun;Ko Young Eun;Bang Sung Il
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.27-30
    • /
    • 2004
  • This paper has been designed the TDMG(Time Delay Multiple Gaussian) pulse generator for UWB systems and analyzed the characteristics of UWB impulse. Composite two equal Gaussian pulses in a difference time lag, and then investigated TDMG pulse and modeled mathematically. Designed the TDMG pulse generator by ADS(Advanced Design System) to embody by using actual element with such mathematical model. As well as, this paper finally proved an excellence of the TDMG pulse generator by performing analysis through simulation.

  • PDF

Virtual World-Based Information Security Learning: Design and Evaluation

  • Ryoo, Jungwoo;Lee, Dongwon;Techatassanasoontorn, Angsana A.
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.3
    • /
    • pp.6-27
    • /
    • 2016
  • There has been a growing interest and enthusiasm for the application of virtual worlds in learning and training. This research proposes a design framework of a virtual world-based learning environment that integrates two unique features of the virtual world technology, immersion and interactivity, with an instructional strategy that promotes self-regulatory learning. We demonstrate the usefulness and assess the effectiveness of our design in the context of information security learning. In particular, the information security learning module implemented in Second Life was incorporated into an Introduction to Information Security course. Data from pre- and post- learning surveys were used to evaluate the effectiveness of the learning module. Overall, the results strongly suggest that the virtual world-based learning environment enhances information security learning, thus supporting the effectiveness of the proposed design framework. Additional results suggest that learner traits have an important influence on learning outcomes through perceived enjoyment. The study offers useful design and implementation guidelines for organizations and universities to develop a virtual world-based learning environment. It also represents an initial step towards the design and explanation theories of virtual world-based learning environments.

Design Procedure and Analysis of Ramp Profile in SFF HDD (초소형 하드디스크에서 램프 형상 분석 및 설계 프로세스 연구)

  • Lee, Yong-Hyun;Park, Kyoung-Su;Park, No-Cheol;Yang, Hyun-Seok;Park, Young-Pil
    • Transactions of the Society of Information Storage Systems
    • /
    • v.2 no.2
    • /
    • pp.150-155
    • /
    • 2006
  • Vertical L/UL (Load/Unload) velocity is very important parameter to determine the L/UL performance, and the vertical velocity is determined by the actuator velocity and the ramp profile. However, it is not easy to precisely control the actuator rotating velocity during the L/UL process. Especially in emergency parking, servo system doesn't operate, it is impossible to control an actuator velocity. Then, the vertical unloading velocity depends on only ramp profile. The ramp height and the sliding length for L/UL process in SFF (Small Form Factor) HDD are restricted due to slimness and small media. For these reasons, it is very difficult to design the ramp profile in SFF HDD. Therefore, this study analyzes the unloading dynamic characteristics for various ramp profiles and makes the thesis for ramp profile design.

  • PDF

Toward Developing An Enterprise Architecture Orientation Model: Mapping the Present and Future Enterprise Architecture from the Alignment and Integration Perspective (엔터프라이즈 아키텍처 지향 모델 개발: 연계와 통합 관점에서 본 엔터프라이즈 현재와 미래 아키텍처 사상)

  • Son, Jeong-Son;Juhn, Sung-Hyun
    • Information Systems Review
    • /
    • v.12 no.2
    • /
    • pp.1-23
    • /
    • 2010
  • Most enterprise information systems today are silo systems in that they are not properly aligned nor integrated with one another. Such silo systems result because enterprises lack an architectural perspective in the planning and development of the systems. This paper proposes an Enterprise Architecture Orientation Model as a framework for the analysis, planning and design of the architectural quality of enterprise information systems. The model decomposes enterprise architecture into two dimensions-alignment and integration, and specifies for each dimension the general development and evolution stages enterprises may traverse. The alignment dimension represents the vertical strategic alignment of the systems with the vision, mission, strategy and goals of the enterprise, and is analyzed in terms of the performance, capability, and strategy of the enterprise. The integration dimension, on the other hand, represents the horizontal and functional integration among the systems that span organizational functions and boundaries, and is analyzed in terms of such technological components as IT infrastructure, data, application, and business processes. The model combines the alignment and integration dimensions to form a two-dimensional conceptual space for mapping the architectural quality of the enterprise. It is proposed that an enterprise use the model to identify and understand its position now and in the future in the architectural quality of the enterprise information systems. It is also proposed that the model provides a tool for the planning and design of the transition from one stage to the next in the alignment and integration of the systems to reach an architectural maturity. At the end, the paper discusses how the model can be applied differently according to the strategic orientation of the enterprise. An example of the usage of the model is presented.