• Title/Summary/Keyword: Method of Information System

Search Result 20,538, Processing Time 0.054 seconds

Generating a Category Set of Words Using a Hierarchical Part-of-speech System and Tagged Corpus

  • Kojima, Takeyuki;Kotani, Yoshiyuki
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2002.02a
    • /
    • pp.217-226
    • /
    • 2002
  • In this paper, we propose a method of generating a proper categorization of morphemes by giving a hierarchical part-of-speech system and a corpus tagged using this part-of-speech system. Our method use hierarchical information in the part-of-speech system and statistical information in the corpus to generate a category set. The statistical information is based on the context of occurrence of categories. First, we specify the format of given information. Then, we describe an algorithm to generate a proper categorization. Finally, we present the results of our experiments in applying this method. We obtained a moderately proper categorization and found several candidates for improvement .

  • PDF

A Study on the Methodology in Classifying the Importance of Information System (정보시스템 중요도 분류 방법론에 관한 연구)

  • Choi, Myeonggil;Cho, Kang-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1329-1335
    • /
    • 2014
  • The importance of information security is increasing in the public and private organizations. The interruption of the information system might cause massive disorder. To protect information systems effectively, information systems would be categorized and managed in terms of degree of importance. In this study, we suggest a new evaluation method that categorizes information systems based on the three nature of security, confidentiality, integrity and availability. For validation of the method, we use a case study in a public sector. Through the validation of method, the availability of applying the method for categorization information systems to other domains could be suggested.

An Exploratory Study on Capacity Sizing Method for Information System: Focus on H/W Sizing in Pubic Sector (정보시스템 용량산정방식에 관한 탐색적 연구: 공공부문 H/W 규모산정을 중심으로)

  • Ra, Jong-Hei;Choi, Kwang-Don
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.9-23
    • /
    • 2004
  • Interest about Information infrastructure construction is enlarged socially according to arrival of information age, and various information systems are constructed for efficient business processing, customer service in public sector. According to subjective method for performance improvement for information system of public sector and engine that propel information system construction because it is no definite hardware sizing guidelines for information system caterer, is calculating resource volume of information system. It is situation that problem of excess of scale or reduce sizing is happening and is causing various kind of problems that is waste of information budget and service decline thereby. In this research, we proposed hardware sizing framework for information system that is applied to pubic sector.

Method for Train Information Transmission using PHS (PHS를 이용한 열차정보 전송 방안)

  • Cho, B.K.
    • Proceedings of the KIEE Conference
    • /
    • 2004.10a
    • /
    • pp.240-241
    • /
    • 2004
  • JP Nagoya. Inc started special work(passenger order} to transmit information to the passenger from 2001 following the eastern area' heavy rain in 2000. They introduced 'Passenger Information System' which uses self communication network(LAN, PHS) mainly and wire/wireless and internet jointly. As an information transmission method of this system, there is "train information transmission using PHS" which transmits info to LED display in special train. This system configured by adding new equipments and using existing equipments, network in maximum, this study reviewed the system, which transmits real time operation condition unified by these passenger order to passenger in high quality, more promptly.

  • PDF

A Study on the PCA base Face Authentication System for Untact Work (비대면(Untact) 업무를 위한 화상인식 PCA 사용자 인증 시스템 연구)

  • Park, jongsoon;Park, chankil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.67-74
    • /
    • 2020
  • As the information age develops, Online education and Non-face-to-face work are becoming common. Telecommuting such as tele-education and video conferencing through the application of information technology is also becoming common due to the COVID-19. Unexpected information leakage can occur online when the company conducts work remotely or holds meetings. A system to authenticate users is needed to reduce information leakage. In this study, there are various ways to authenticate remote access users. By applying burn authentication using a biometric system, a method to identify users is proposed. The method used in the study was studied the main component analysis method, which recognizes several characteristics in facial recognition and processes interrelationships. It proposed a method that can be easily utilized without additional devices by utilizing a camera connected to a computer by authenticating the user using the shape and characteristics of the face by using the PCA method.

A Robust PID Control Method with Neural Network

  • Kang, Seong-Ho;Lee, Yong-Gu;Eom, Ki-Hwan
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.1
    • /
    • pp.46-51
    • /
    • 2004
  • The problem of reducing the effect of an unknown disturbance on a dynamical system is one of the most fundamental issues in control design. We propose a robust PID (Proportional Integral Derivative) control method with neural network for improving the performance due to the rejection of an unknown disturbance. The proposed system consists of a model of the plant, a conventional PID controller and a multi-layer neural network, and is composed of two loop; the first loop enables the system to achieve stability of system, the second loop rejects an unknown disturbance. Simulation and experiment results show that the proposed method improves considerably on the performance of the conventional PID control method and the typical IMC method using neural network.

Text Partitioned Indexing Method for Educational Documents (교육용 문서의 텍스트분할 색인)

  • Kang, Mu-Yeong;Lee, Sang-Gu
    • Journal of The Korean Association of Information Education
    • /
    • v.3 no.2
    • /
    • pp.72-84
    • /
    • 2000
  • Information retrieval system plays a key role in the information society to store digital documents with efficiency and to provide user with the information through the retrieval very fast. Especially, indexing is a prerequisite function for the information retrieval system in order to retrieve the information of the documents effectively which are saved in database. In this paper, we propose an indexing method using text partition. This method can retrieve educational documents in short processing time. We applied the suggested indexing method to real information retrieval system, and proved its excellent functions through the demonstration.

  • PDF

A Standardized Design Method of Weapon Information Exchange for Interoperability with Several Kinds of Command and Control System (이기종 지휘통제체계 연동을 위한 무장정보 처리 표준화 설계 방안)

  • Shin, JinBeom;Bae, JungIl;Lee, DongGowan;Koh, Hye-Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.771-778
    • /
    • 2015
  • In this paper, we have proposed a design method for standardization of weapon information exchange between a weapon control computer of guided missile system and a high echelon command and control system. Because the weapon control computer based on diverse combat platforms is operated with several kinds of a high echelon system, it is necessary to provide a standardized design method for weapon information exchange between mutual system. In fact, it is possible to standardize a interface design specification of weapon information message because weapon information message is closely related to standard tactical data link message. It is essential that the interface design specification of weapon information is submitted to that of tactical data link information. It seems that this interface design specification is very useful in development process of the future weapon system.

Integration of UTIS and WIS information for Determining Speed Limits of Variable Speed Limit System (가변속도제한시스템의 제한속도 결정을 위한 UTIS 정보와 기상정보 연계방안)

  • Son, Hyun-Ho;Lee, Choul-Ki;Lee, Sang-Soo;Yun, Il-Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.111-122
    • /
    • 2012
  • There has been a strong demand for providing diverse services to drivers utilizing existing ITS infrastructure. To this end, this study is aiming at improving the accuracy of a variable speed limit system by determining recommended speeds for the system utilizing the information from Urban Traffic Information System(UTIS) and Weather Information System(WIS). In order to determine appropriate speed limits under inclement weather conditions for the variable speed limit system, this study examined three methods: i) the method utilizing the information from WIS, ii) the method utilizing the information from UTIS, and iii) the method which combines the information from WIS and UTIS using different weights for diverse weather conditions. Finally, this study selected the third method which determines an appropriate speed limit using the relationship between the vehicle operating speed and the minimum stopping distance which is estimated using the existing speed limit, surface coefficient of friction and superelevation.

Online Face Avatar Motion Control based on Face Tracking

  • Wei, Li;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.804-814
    • /
    • 2009
  • In this paper, a novel system for avatar motion controlling by tracking face is presented. The system is composed of three main parts: firstly, LCS (Local Cluster Searching) method based face feature detection algorithm, secondly, HMM based feature points recognition algorithm, and finally, avatar controlling and animation generation algorithm. In LCS method, face region can be divided into many small piece regions in horizontal and vertical direction. Then the method will judge each cross point that if it is an object point, edge point or the background point. The HMM method will distinguish the mouth, eyes, nose etc. from these feature points. Based on the detected facial feature points, the 3D avatar is controlled by two ways: avatar orientation and animation, the avatar orientation controlling information can be acquired by analyzing facial geometric information; avatar animation can be generated from the face feature points smoothly. And finally for evaluating performance of the developed system, we implement the system on Window XP OS, the results show that the system can have an excellent performance.

  • PDF