• Title/Summary/Keyword: Electronic Cooperation

Search Result 831, Processing Time 0.033 seconds

A Software Reliability Cost Model Based on the Shape Parameter of Lomax Distribution (Lomax 분포의 형상모수에 근거한 소프트웨어 신뢰성 비용모형에 관한 연구)

  • Yang, Tae-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.2
    • /
    • pp.171-177
    • /
    • 2016
  • Software reliability in the software development process is an important issue. Software process improvement helps in finishing with reliable software product. Infinite failure NHPP software reliability models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. In this study, reliability software cost model considering shape parameter based on life distribution from the process of software product testing was studied. The cost comparison problem of the Lomax distribution reliability growth model that is widely used in the field of reliability presented. The software failure model was used the infinite failure non-homogeneous Poisson process model. The parameters estimation using maximum likelihood estimation was conducted. For analysis of software cost model considering shape parameter. In the process of change and large software fix this situation can scarcely avoid the occurrence of defects is reality. The conditions that meet the reliability requirements and to minimize the total cost of the optimal release time. Studies comparing emissions when analyzing the problem to help kurtosis So why Kappa efficient distribution, exponential distribution, etc. updated in terms of the case is considered as also worthwhile. In this research, software developers to identify software development cost some extent be able to help is considered.

The Status of e-Business in Korea Forest Product Industries (한국목재산업에 있어 e-Business의 활용)

  • Kim, Se-Bin;Kwak, Kyung-Ho
    • Korean Journal of Agricultural Science
    • /
    • v.30 no.1
    • /
    • pp.20-30
    • /
    • 2003
  • This study was carried out to examine the e-Business status of Korea Forest Product Industries and to propose the development. The use level of e-Business in korea forest product industries have stayed in internal company information network integration stages. But lots of companies located in the insufficient of e-Business models, the lack of qualified staffs, and the shortage of e-Business operating technology and implementation. As the result of this study, the followings must be considered; 1. For the promotion of e-Business use, it is needed to maintain price competitiveness, quality competitiveness, and market correspondence capacity. 2. For the settlement of e-Business models, it is important to connect information network among cooperation companies as like forest products standardize, common database, and standard electronic catalogue. Also, it needed developing program to strengthen the competitiveness of forest product industries, expanding to outsourcing and affiliated companies.

  • PDF

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

An Information Sharing Platform for Eurasia Transportation Logistics Network from Korean perspective (유라시아 교통물류 네트워크 기반 구축을 위한 한국적 시각에서의 정보공유 플랫폼 도입방안)

  • Shin, Seungjin;Roh, Hong-Seung;Hur, Sung-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.5
    • /
    • pp.100-116
    • /
    • 2018
  • Recently, with the US protection trade trend, South Korea 's exports to the US have shrunk and the need to pioneer emerging markets in Eurasia has increased. Due to the bankruptcy of Hanjin Shipping, a large Korean national shipping company, the necessity of securing transportation that can replace the Asian - European shipping route has emerged. Moreover, as the international trade and logistics environment is rapidly changing due to the spread of electronic commerce, it is time to prepare for the environment where IT technology is applied to international logistics activities. Therefore, this study was carried out to establish information strategy of Eurasia logistics information sharing platform from Korean perspective through comparison of logistics information level of Eurasian countries. This study aims at standardization direction for supporting logistics activities between Eurasian countries, providing customs clearance and logistics services without interruption, providing information for expanding business of trade companies, and building information linkage infrastructure for expanding cooperation between logistics companies across countries. Through this study, it is expected that logistics activities through information sharing among countries will be actively carried out.

Performance of Cooperative NOMA Systems with Cognitive User Relay (상황인지 사용자 릴레이를 채택한 협동 NOMA 시스템의 성능)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • Recently, Non-orthogonal multiple access (NOMA) has been focused for the next generation multiple access, which has more spectral efficiency under the limited spectrum bandwidth. Moreover, the spectrum efficiency can be improved by cognitive radio in which the unlicensed secondary users can access the spectrum that is used by the licensed primary user under the limited interference. Hence, we consider the combination of NOMA and cognitive radio, and derive the performance of the cognitive cooperative NOMA system. For the cooperation, a relay is selected among near users, and the selection combining is assumed at a far user. The outage probability of the selected relay and the far user is derived in closed-form, respectively. The provided numerical results are matched well with the Monte Carlo simulation. Numerical results showed that the performance of the relay is affected from the power allocation coefficient, the minimum outage probability is observed at 0.86 of the power allocation coefficient for far user under the given conditions. More than 15 dB of signal-to-noise ratio is required to meet the outage probability of $1{\times}10^{-13}$ for the far user with the frequency acquisition probability of 0.5 compared to that of 1. It shows that the performance of the far user is very sensitive to the acquisition probability of the cognitive relay.

A Study on Personalized Advertisement System Using Web Mining (웹 마이닝을 이용한 개인 광고기법에 관한 연구)

  • 김은수;송강수;이원돈;송정길
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.92-103
    • /
    • 2003
  • Great many advertisements are serviced in on-line by development of electronic commerce and internet user's rapid increase recently. However, this advertisement service is stopping in one-side service of relevant advertisement rather than doing users' inclination analysis to basis. Therefore, want advertisement service that many websites are personalized for efficient service of relevant advertisement and service through relevant server's log analysis research and enforce. Take advantage of log data of local system that this treatise is not analysis of server log data and analyze user's Preference degree and inclination. Also, try to propose advertisement system personalized by making relevant site tributary category and give weight of relevant tributary. User's preference user preference which analysis is one part of cooperation fielder ring of web personalized techniques use information in visit site tributary and suppose internet user's action in visit number of times of relevant site and try inclination analysis of mixing form. Express user's preference degree by vector, and inclination analysis result uninterrupted data that simplicity application form is not regarded and techniques that propose inclination analysis change of data since with move data use and analyze newly and proposed so that can do continuous renewal and application as feedback Sikkim. Presented method that can choose advertisements of relevant tributary through this result and provide personalized advertisement service by applying process such as user inclination analysis in advertisement chosen.

  • PDF

Modeling and Analysis of Radiation Patterns of High Power LED Package for Luminarie (루미나리에(Luminarie)용 고출력 LED패키지 배광분포 모델링 및 광학적 특성 분석)

  • Cho, Jae-Moon;Kim, Byung-Il;Kwak, Joon-Seop;Yoon, Dong-Joo;Yu, Jin-Yeul
    • Korean Journal of Optics and Photonics
    • /
    • v.18 no.4
    • /
    • pp.264-269
    • /
    • 2007
  • Today's research has been focused on changing the light source from filament to LED for luminarie illumination to overcome the shortcoming of a filament. The purpose of this research is to make an appropriate high power LED package structure for luminarie. We simulated radiation patterns of the various structures by the ray tracing simulator (Light Tools), and also analyzed the radiation patterns using an LED test system (OL770). As we increased an inner reflector angle, the radiation pattern split into two peaks and the angle between two peaks became larger. In addition, when we increased an outer reflector angle, the angle between side peaks gradually decreased, while it increased again when the angle reach $50^{\circ}$. These results could be understood from the ray tracing of the light reflected from two reflectors. We made the high power LED package for luminarie on the condition of the optimized structure which was made by ray tracing simulation results, and we measured the radiation patterns by using an LED test system, and these results were well matched to the simulation results.

A Study on the Utilization of Private Security for Preventing School Violence (학교폭력 예방을 위한 민간경비의 활용방안)

  • Jung, Eui-Lom
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.387-411
    • /
    • 2014
  • School violence is now considered not only as a problem for a victim and a offender themselves, but also as a social problem that requires responsibilities of school, home, society, and even nation. Crimes and risk factors are various inside and outside of school. In terms of solving those problems, this study examines the actual condition of school violence among students. In addition, it is considered what efforts are conducted by police to establish a safe school environment and the problems that derive from it. Futhermore, this study aims to discuss the ways of using the private security with regard to dealing with school violence. In this society, the expectation of security service from the police is increased as time passed. However, police has limited resources, thus it is beyond their practice. Policing has changed from being monopolized by government to cooperating with various security agents. Community is not considered as the subject for enforcing the law anymore, but as the cooperator for effective policing. With regard to the limitation of police force, using the private security is an effective alternative. Therefore, it is required that private security should be assigned legal authority and shared information with schools in order to patrol the blind spot. Finally, school violence prevention efforts should be conducted by applying physical and electronic security.

  • PDF

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Treatment of Patients with Cancer in a Secondary Hospital in Korea (국내 일개 2차 병원의 암환자 치료 실태)

  • Son, Myoung Kyun
    • Journal of Hospice and Palliative Care
    • /
    • v.21 no.3
    • /
    • pp.84-91
    • /
    • 2018
  • Purpose: This study aims to investigate treatment of cancer patients at a secondary hospital. Methods: A retrospective analysis was performed with electronic medical records of cancer patients admitted to a secondary hospital from January 1, 2009 through September 31, 2017. Results: A total of 223 patients were studied. Sixty-nine patients were hospitalized for supportive care after receiving a surgery, chemotherapy, and radiotherapy at a tertiary hospital, 58 patients for other supportive care, 53 patients for symptom control, 16 patients with a decision not to take active cancer treatment, and 27 patients for treatment of cancer that was diagnosed during their hospital stay. Among 75 patients who were discharged to other institutions, 50 were transferred to tertiary hospitals, 10 to long-term care hospitals, eight to hospice hospitals, four to nursing homes and two to secondary hospitals. Comorbidities were found in 120 patients (53.8%). For patients who consulted with more than one department, more consultations were for non-cancer diseases than cancer. Seventy-three patients had a do-not-resuscitate order. Conclusion: For treatment of cancer patients, it is needed to establish a cooperation system among medical institutions and provide comprehensive management including treatment of comorbidities.