• Title/Summary/Keyword: IT-based Society

Search Result 64,834, Processing Time 0.077 seconds

3-D Topology Optimization by a Nodal Density Method Based on a SIMP Algorithm (SIMP 기반 절점밀도법에 의한 3 차원 위상최적화)

  • Kim, Cheol;Fang, Nan
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.412-417
    • /
    • 2008
  • In a traditional topology optimization method, material properties are usually distributed by finite element density and visualized by a gray level image. The distribution method based on element density is adequate for a great mass of 2-D topology optimization problems. However, when it is used for 3-D topology optimization, it is always difficult to obtain a smooth model representation, and easily appears a virtualconnect phenomenon especially in a low-density domain. The 3-D structural topology optimization method has been developed using the node density instead of the element density that is based on SIMP (solid isotropic microstructure with penalization) algorithm. A computer code based on Matlab was written to validate the proposed method. When it was compared to the element density as design variable, this method could get a more uniform density distribution. To show the usefulness of this method, several typical examples of structure topology optimization are presented.

  • PDF

A Study on the Thesaurus of Korean medical information for developing search engine (한의학정보 검색엔진 개발을 위한 시소러스 연구)

  • Baik, You-Sang
    • Journal of Korean Medical classics
    • /
    • v.19 no.1 s.32
    • /
    • pp.155-167
    • /
    • 2006
  • From th Study on A Study on the Thesaurus of Korean medical information for developing search engine, the conclusion is as follow. Knowledge based information system consists of concepts, facts and relation. The final goal of developing the Knowledge based information system is to select, store and control the knowledge and information of Oriental Medicine. Considering limitation of organizing the knowledge system, it is difficult to realize complete basic system and application method. In order to work, it is necessary to combine experts in each part, for example Domain experts, Information and Knowledge engineer. Through the development of knowledge based information system, we can construct EMR(Electronic Medical Record) system in the near future, and it is possible to make semi-expert system. To make Knowledge based information system, we need to establish standards of information that make the distribution of Knowledge and information easily.

  • PDF

The Implementation of A XML/PKI based Digital Tax Invoice System (XML/PKI기반의 전자세금계산서 시스템 구현)

  • Kim, Jin-Cheol;Oh, Young-Whan
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.85-98
    • /
    • 2004
  • As the e-Commerce based on the XML technology is getting bigger, user authentication, integrity, non-repudiation and confidentiality has become important for security. Since the XML technology is widely used for exchanging information among the Internet e-business systems, the security of XML documents is essentially required and XML digital signature should be supported. To support the digital signature of XML documents, W3C proposed the XML-Signature specification as an international standard that describes five transform algorithms. In this paper, we design and implement a XML/PKI based digital tax invoice system. Our system supports the five transforming algorithms defined in the XML-Signature specification and exchanges digital tax invoices among enterprises securely. We design and implement the flexible and efficient system consists of reusable components using CBD(Component Based Development).

A Study of Hyungsang Medicine's definition and features (형상의학(形象醫學)의 정의(定義)와 특징(特徵)에 대한 고찰(考察))

  • Park, Jun Gyu;Kim, Nam Il
    • The Journal of Korean Medical History
    • /
    • v.20 no.2
    • /
    • pp.87-92
    • /
    • 2007
  • Hyungsang Medicine is a medical theory a Korean traditional medical doctor Park In Kyu established based on the contents of "Donguibogam" that is currently practiced commonly today in Korean TKM clinics. Although it is based on "Donguibogam", the most basic text of TKM, it differs from "Donguibogam" in that its diagnosis, treatment, and treatment methods of illnesses are based on the person's appearance. This study organizes the medical theory by considering its relation to other medical theories and organizing the theoretical backgrounds through examining documents that it is based on.

  • PDF

The Effects of Subjective Norm and Social Interactivity on Usage Intention in WBC Learning Systems (웹기반 협동학습 시스템에서의 주관적 규범과 사회적 상호작용이 지속적 사용의도에 미치는 영향)

  • Lee, Dong-Hoon;Lee, Sang-Kon;Lee, Ji-Yeon
    • Journal of Information Technology Services
    • /
    • v.7 no.4
    • /
    • pp.21-43
    • /
    • 2008
  • This paper develops the research model for the understanding of learner's usage intention in web based collaborative learning(WBCL) system. This model is based on the Davis' Technology Acceptance Model(TAM) and Social Interactivity Theory. Data is collected 225 University students from two different institutions. They were divided into 46 groups and asked to complete an online TOEIC preparation module using WBCL systems over 4 weeks. Data were collected at three points for each participant-before, 3 weeks after, and at the end of the online module. The result show that TAM based Belief factors(Usefulness, Ease of use, Playfulenss) are important determinants of usage intention in WBCL systems. The study also found the external factors of the extended TAM to be subjective norm, leader's enthusiasm in WBCL context.

A rule based file management tool for facility log files integration in disaster environments

  • Lee, Young-Geol;Lee, Younlae;Kim, Hyunah;Jang, Yeonyi;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.73-82
    • /
    • 2018
  • We often experience complex presence of files within the compute environment. It could be an end-user's desktop environment or a professional part of file management. We would like to suggest one way to manage these different cases of duplicate files. It is a rule-based file management tool, and we want to use it as a tool to consolidate facility management log files. In this paper, we will describe the rule-based file management tools and show examples of how files are managed using them. We are interested in the management of the disaster environment and would like to apply this method to the management of log data related to facilities to be considered in the event of a disaster.

Evaluation of Subtractive Clustering based Adaptive Neuro-Fuzzy Inference System with Fuzzy C-Means based ANFIS System in Diagnosis of Alzheimer

  • Kour, Haneet;Manhas, Jatinder;Sharma, Vinod
    • Journal of Multimedia Information System
    • /
    • v.6 no.2
    • /
    • pp.87-90
    • /
    • 2019
  • Machine learning techniques have been applied in almost all the domains of human life to aid and enhance the problem solving capabilities of the system. The field of medical science has improved to a greater extent with the advent and application of these techniques. Efficient expert systems using various soft computing techniques like artificial neural network, Fuzzy Logic, Genetic algorithm, Hybrid system, etc. are being developed to equip medical practitioner with better and effective diagnosing capabilities. In this paper, a comparative study to evaluate the predictive performance of subtractive clustering based ANFIS hybrid system (SCANFIS) with Fuzzy C-Means (FCM) based ANFIS system (FCMANFIS) for Alzheimer disease (AD) has been taken. To evaluate the performance of these two systems, three parameters i.e. root mean square error (RMSE), prediction accuracy and precision are implemented. Experimental results demonstrated that the FCMANFIS model produce better results when compared to SCANFIS model in predictive analysis of Alzheimer disease (AD).

Intrusion Detection System for Home Windows based Computers

  • Zuzcak, Matej;Sochor, Tomas;Zenka, Milan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4706-4726
    • /
    • 2019
  • The paper is devoted to the detailed description of the distributed system for gathering data from Windows-based workstations and servers. The research presented in the beginning demonstrates that neither a solution for gathering data on attacks against Windows based PCs is available at present nor other security tools and supplementary programs can be combined in order to achieve the required attack data gathering from Windows computers. The design of the newly proposed system named Colander is presented, too. It is based on a client-server architecture while taking much inspiration from previous attempts for designing systems with similar purpose, as well as from IDS systems like Snort. Colander emphasizes its ease of use and minimum demand for system resources. Although the resource usage is usually low, it still requires further optimization, as is noted in the performance testing. Colander's ability to detect threats has been tested by real malware, and it has undergone a pilot field application. Future prospects and development are also proposed.

Empirical Investigation of the Relationship between Information Technology Development Modes and Firm Performance from the Resource-based Theory Perspective (정보기술 개발 유형과 기업성과 간의 관계에 대한 실증적 고찰: 자원준거 이론 관점에서)

  • Choi, Byounggu
    • Knowledge Management Research
    • /
    • v.17 no.4
    • /
    • pp.163-189
    • /
    • 2016
  • The importance of Information technology (IT) has been growing. Thus, it is critical for firms to choose the optimal information technology development mode in order to ensure that maximum benefit is derived from IT. Despite its importance, however, there is little comprehensive research on choosing the IT development mode that firms undertake. To fill this gap, this study attempts to propose a parsimonious as well as comprehensive IT development framework based on strategic value and the uniqueness of IT resources. In addition, this study analyzes the impact of the fit between the theoretically proposed IT development mode and the actually used mode on the performance of Korean firms. This study contributes to and expands the literature on IT development modes by considering various development modes in real time. Moreover, the results serve as a stepping stone for managers who want to develop or adopt IT effectively.

An Empirical Study on Pricing Model for Software Operation (소프트웨어 운영 대가산정 방식에 대한 실증적 연구)

  • Kim, Heungshik;Kim, Choong Nyoung;Seo, Yongwon
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.67-82
    • /
    • 2019
  • The purpose of this study is to improve the calculation method of the software operation pricing proposed by the software business price calculation guide from 'input manpower method' to 'rate calculation method'. The software operation pricing of the input manpower method is not objectively calculated in the domestic IT outsourcing situation where the statistical data based on the activity based estimating is insufficient and it is decided by agreement between the owner and the client. In addition, there was no standard for adjusting the productivity according to the characteristics of the operation service. In order to improve this, an operational correction factor item that can affect the software operation productivity was selected based on foreign and domestic standards, and it was confirmed through the first questionnaire to IT operation managers. In order to determine the level of difficulty of the fixed operational correction factors, the operational correction factor using AHP technique was confirmed through a second questionnaire for pairwise comparison. The operational difficulty calculation table was developed with reference to COCOMO and ITIL standards. Finally, we propose a new pricing scheme that reflects the operating rate. Regression analysis was carried out by collecting the data of the domestic public institutions on the estimated cost and the actual cost calculated from the new rate method software operation pricing. The results of the regression analysis show that the estimated cost and the actual cost are related to each other. Mean magnitude of relative error(MMRE) and PRED[25] analysis were added for accuracy analysis. MMRE and PRED also showed satisfactory results, confirming the possibility of replacing the rate method software operation pricing.