• Title/Summary/Keyword: Research Information Systems

Search Result 12,210, Processing Time 0.039 seconds

클라이언트/서버 시스템의 정보시스템 효율성에 미치는 영향에 관한 연구

  • Kim, Myoung-Jong;Park, Ho-Sung;Han, In-Goo
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.235-238
    • /
    • 1996
  • In recently, the influence of client-server systems on organizations and how to estimates the efficiency or productivity of organizations and departments has come to be more concerned by many researchers. Especially, information systems(IS) of the financial institutions are greatly used than any other industries. Therefore, the efficiency of IS departments in financial institutions is relatively important. The overall objectives of this research are to estimate the effects of client-server systems and to evaluate whether the client-serve systems really improve the efficiency of information system. The research method used in this research is DEA(Data Envelopment Analysis) estimation method which based on linear programming is used for the efficiency of managerial organizations and other nonprofit organizations. The results of this research showed that the efficiency of IS department was promoted after implementation of client-server systems.

  • PDF

An Investigation of Satellite Radio Access Technology for Beyond IMT-2000 Systems

  • Kang Kunseok;Ryoo Sunheui;Kim Byoung Gi;Kim Sooyoung;Ahn Do Seob
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.135-143
    • /
    • 2005
  • This paper presents an investigation of satellite radio access technology for beyond IMT-2000 systems. Although we could not see any active role of a satellite system in the 3G networks, satellite system will provide strong advantages in future systems for certain applications. Because a satellite link has longer round trip delay than a terrestrial link, we need technologies that would make the satellite component especially efficient. After presenting the satellite radio interface of the 3G system, we suggest several points which need to be considered in the beyond 3G systems. We also suggest a few candidate technologies with various simulation results.

A Study on the How IT Governance Decision Making Knowledge Sharing between CEO and CIO Influences the Effectiveness of the Information Systems (IT 거버넌스 의사결정 영역에 대한 CEO와 CIO의 지식공유 정도가 정보시스템 효과성에 미치는 영향에 관한 연구)

  • Kim, Min-Sun;Hong, Shin-Hye;Lee, Jae-Bum
    • The Journal of Information Systems
    • /
    • v.17 no.4
    • /
    • pp.129-156
    • /
    • 2008
  • This study empirically tested a research model and hypothesis extracted and based on IT governance and knowledge sharing theories. In this study we targeted CIO and IS managers to find the effects of the degree of knowledge sharing between CEO and CIO regarding five areas of IT governance decision-making: IT principles, IT architecture, IT infrastructure, business application needs, and IT investment and prioritization, on IT and business alignment. Additionally we studied the effects of business alignment on the effectiveness of information systems. Results showed that the degree of knowledge sharing in CEO and CIO on IT principles, IT infrastructure, IT investment and prioritization had a positive influence on IT and business alignment, ultimately showing a positive influence on the effectiveness of information systems. This research has shown that fording the preferable relationship between IT and business affected by performing high quality decision making based on knowledge sharing and consequently it also is a basis to provide a positive influence to the effectiveness of the information system.

Cognitive Factors in Adaptive Information Access

  • Park, Minsoo
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.309-316
    • /
    • 2018
  • The main purpose of this study is to understand how cognitive factors influence the way people interact with information/information systems, by conducting comprehensive and in-depth literature reviews and a theoretical synthesis of related research. Adaptive systems have been built around an individual user's characteristics, such as interests, preferences, knowledge and goals. Individual differences in the ability to use new information and communication technology have been an important issue in all fields. Performance differences in utilizing new information and communication technology are sufficiently predictable that we can begin to coordinate them. Therefore, it is necessary to understand cognitive mechanisms to explain differences between individuals as well as the levels of performance. The theoretical synthesis from this study can be applied to design intelligent (i.e., human friendly) systems in our everyday lives. Further research should explore optimization design for user, by integrating user's individual traits (such as emotion and intent) and system modules to improve the interactions of human-system in data-driven environments.

Face Mask Detection Model Using Convolution Neural Network

  • A. A. Abd El-Aziz; Nesrine A. Azim;Mahmood A. Mahmood;Hamoud Alshammari
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.91-96
    • /
    • 2024
  • Corona Virus is a big threat to humanity. Now, the whole world is struggling to reduce the spread of Corona virus. Wearing masks is one of the practices that help to control the spread of the virus according to the world health organization. However, ensuring all people wear facemask is not an easy task. In this paper, we propose a simple and effective model for real-time monitoring using the convolution neural network to detect whether an individual wears a face mask or not. The model is trained, validated, tested upon two datasets. Corresponding to dataset 1, the accuracy of the model was 95.77% and, it was 94.58% for dataset 2.

Evaluation Life Cycle Management Model on the Basis of Result to Evaluate Information Systems (정보시스템 평가를 위한 결과 기반 평가생명주기 모형 설계)

  • Lee, Sangwon;Kim, Sunghyun;Park, Sungbum;Ahn, Hyunsup
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.93-94
    • /
    • 2014
  • Enterprises or public organizations have invested in development of their information systems and operated them repeatedly. Since these information systems projects have unique characteristics such as technology sensitiveness, network effectiveness, embeddedness, and externality, these investment projects have been not taken care of in the field of administration and evaluation. And then, it is difficult to manage and monitor them. In this research, we propose a evaluation life cycle management model on the basis of result to evaluate information systems. This life cycle model with ten stages would furnish a guide to introduction of total evaluation systems.

  • PDF

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

Text-Mining Analysis of Korea Government R&D Trends in Construction Machinery Domains (텍스트 마이닝을 통한 건설기계분야 국내 정부 R&D 연구동향 분석)

  • Bom Yun;Joonsoo Bae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.spc
    • /
    • pp.1-8
    • /
    • 2023
  • To investigate the national science and technology policy direction in the field of construction machinery, an analysis was conducted on projects selected as national research and development (R&D) initiatives by the government. Assuming that the project titles contain key keywords, text mining was employed to substantiate this assumption. Project information data spanning nine years from 2014 to 2022 was collected through the National Science & Technology Information Service (NTIS). To observe changes over time, the years were divided into three-year sections. To analyze research trends efficiently, keywords were categorized into groups: 'equipment,' 'smart,' and 'eco-friendly.' Based on the collected data, keyword frequency analysis, N-gram analysis, and topic modeling were performed. The research findings indicate that domestic government R&D in the construction machinery field primarily focuses on smart-related research and development. Specifically, investments in monitoring systems and autonomous operation technologies are increasing. This study holds significance in analyzing objective research trends through the utilization of big data analysis techniques and is expected to contribute to future research and development planning, strategic formulation, and project management.

A Study on the Functions and Activities of National Scholar Information Network Systems (우리나라 국가적 학술정보 유통체제의 기능 및 활동에 관한 연구)

  • Shin, Dong-Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.16 no.1
    • /
    • pp.285-314
    • /
    • 2005
  • The purpose of this study is to review and analyze the overlapping functions and activities of the nationwide scientific and technical information network system This study is helpful for users to gather information and for librarians and nations to reduce wastage of budgets through discarding the duplicated expenses of performing activities of the network systems. The research targets are KISTI and KERIS, which are functioning as the information network systems in the fields of science and technology. The research methods are literary reviews for theory background and analysis of their activities from internet homepages. As a result of the research, it is found and confirmed that there are some overlapping and duplicating functions and activities in the network systems.

  • PDF