• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.039 seconds

Analysis of Spatial Distributions of Rainfall Rate for Satellite Site Diversity in Korea (위성망 이중화를 위한 국내 강우율 공간분포 분석)

  • Kwon, Yong-Ki;Park, Jung-Kyu;Yoon, Dae-Whan;Nho, Hyunjun;Park, Sungchun;Lee, Whangjae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.11
    • /
    • pp.985-991
    • /
    • 2015
  • This paper proposes appropriate locations for site diversity to provide stable satellite communication service in Korea. For this purpose, we analyzed rainfall rate data measured by KMA for 5 years at 88 sites, and the variations of simultaneous occurrence of rainfall rate in pairs of sites using the correlation coefficient. This paper provided contour maps of the spatial ditstribution of rainfall rate correlation, and proposed information on the optimum sites/regions for the operation of muti-uplink satellite systems, in 4 cities which were principal in field of satellite communication in Korea.

Analysis of Safety Management Condition & Accident Type in Domestic and Foreign Laboratory

  • Cho, Nam Joon;Ji, Yong Gu
    • Journal of the Ergonomics Society of Korea
    • /
    • v.35 no.2
    • /
    • pp.97-109
    • /
    • 2016
  • Objective: The aim of this study is to identify the domestic and foreign laboratory safety management system and to suggest domestic laboratory safety management policy priority. Background: Various types of accidents are occurred in research laboratories according to a variety of laboratory safety risks. However, there are only lists of incidents without any precise accident analysis. Method: We analyzed statistically the survey on current status of laboratory safety management of universities, research institutes, and industrial research institutions carried out by Ministry of Science, ICT and Future Planning in Korea. We also investigated laboratory safety management systems and safety organization carried out mainly in overseas countries such as USA, Japan, Switzerland and France. In addition, we analyze the UCLA College laboratory explosion occurred in the US in 2010. Results: More than 75 percent of 2015 domestic laboratory accidents were occurred in the field of operation management and chemistry research. Also, approximately 55% of accidents took place due to careless use mechanical instruments & dangerous chemicals. In addition, common difficulties of lab safety act applicable organizations are overlapping and comprehensive application of legal requirements. Conclusion: There is a need for laboratory safety professional organizations. Also, the high frequency of use of hazardous substances in the high-risk, such as the chemical field must be strengthened the laboratory safety management. In addition, it is needed to minimize the problems of the research organizations through close cooperation between related ministries and government support policy such as professional development program. Application: The result of this analysis might help to present a differentiated safety management policy and advanced safety management system in laboratory.

Differences of Blood Oxygen Saturation between Male and Female due to Change of Supply Rate of Highly Concentrated Oxygen (고농도 산소 공급량 변화에 따른 남/녀 혈중 산소 포화도의 차이)

  • Yi, Jeong-Han;Choi, Mi-Hyun;Kim, Ji-Hye;Lee, Su-Jeong;Yang, Jae-Woong;Chung, Soon-Cheol;Lim, Dae-Woon;Lee, Dong-Hyung;Min, Byung-Chan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.4
    • /
    • pp.203-207
    • /
    • 2009
  • The purpose of this study was to examine differences between male and female in blood oxygen saturation due to 93% oxygen administration of the three levels (1L/min, 3L/min, 5L/min). Ten healthy male ($25.0{\pm}1.8$ years) and ten female ($23.7{\pm}1.9$ years) college students were selected as the subjects for this study. The experiment consisted of three runs, i.e., the three levels of 93% oxygen administration, respectively. The each run consisted of three phases, i.e., Rest 1 (5 min), Hyperoxia (10 min), and Rest 2 (5 min). Blood oxygen saturation were measured throughout the three phases. By increasing the supply rate of highly concentrated oxygen, rising rate of blood oxygen saturation was increased. Blood oxygen saturation of female was higher than male regardless of supply rate of highly concentrated oxygen and phases.

A Study on Measurements of IT Security Service Quality : Feasibility of Quantitative Measures (IT 보안 서비스 품질의 측정 방법에 관한 연구 : 정량 지표의 사용 가능성)

  • Kyung, Ji Hoon;Kim, Chong Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.30-38
    • /
    • 2015
  • IT security service provides customers with the capability of protecting the networked information asset and infrastructures, and the scope of security service is expanding from a technology-intensive task to a comprehensive protection system for IT environment. To improve the quality of this service, a research model which help assess the quality is required. Several research models have been proposed and used in various service areas, but few cases are found for IT security service. In this work, a research model for the IT security quality has been proposed, based on research models such as SERVQUAL and E-S-QUAL. With the proposed model, factors which affect the service quality and the best quality measure have been identified. And the feasibility of using quantitative measures for quality has been examined. For analysis, structural equation modeling and various statistical methods such as principal component analysis were used. The result shows that satisfaction is the most significant measure affected by the proposed quality factors. Two quality factors, fulfillment and empathy, are the main determinants of the service quality. This leads to a strategy of quality improvement based on factors of emotion and perception, not of technology. The quantitative measures are considered as promising alternative measures, when combined with other measures. In order to design reliable quantitative measures, more work should be done on target processing time and users' expectation. It is hoped that work of this research will provide efficient tools and methods to improve the quality of IT security service and help future research works for other IT service areas.

Research of the Efficient Grid-based Path Planning for Large-Scale Delivery in the Urban Environment (광역 도심 배송을 위한 Efficient Grid 기반 경로 계획 알고리즘 연구)

  • Hanseob Lee;Hoon Jung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.47 no.2
    • /
    • pp.147-154
    • /
    • 2024
  • This study focuses on the path planning algorithm for large-scale autonomous delivery using drones and robots in urban environments. When generating delivery routes in urban environments, it is essential that avoid obstacles such as buildings, parking lots, or any other obstacles that could cause property damage. A commonly used method for obstacle avoidance is the grid-based A* algorithm. However, in large-scale urban environments, it is not feasible to set the resolution of the grid too high. If the grid cells are not sufficiently small during path planning, inefficient paths might be generated when avoiding obstacles, and smaller obstacles might be overlooked. To solve these issues, this study proposes a method that initially creates a low-resolution wide-area grid and then progressively reduces the grid cell size in areas containing registered obstacles to maintain real-time efficiency in generating paths. To implement this, obstacles in the operational area must first be registered on the map. When obstacle information is updated, the cells containing obstacles are processed as a primary subdivision, and cells closer to the obstacles are processed as a secondary subdivision. This approach is validated in a simulation environment and compared with the previous research according to the computing time and the path distance.

Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident (정보보안사고가 투자주체별 투자성과에 미치는 영향: 개인정보유출사고 중심으로)

  • Eom, Jae-Ha;Kim, Min-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.463-474
    • /
    • 2016
  • As IT environment has changed, paths of information security in financial environment which is based on IT have become more diverse and damage caused by information leakage has been more serious. Among security incidents, personal information leakage incident is liable to give the greatest damage. Personal information leakage incident is more serious than any other types of information leakage incidents in that it may lead to secondary damage. The purpose of this study is to find how much personal information leakage incident influences corporate value by analyzing 21 cases of personal information leakage incident for the last 15 years 1,899 listing firm through case research method and inferring investors' response of to personal information leakage incident surveying a change in transaction before and after personal information leakage incident. This study made a quantitative analysis of what influence personal information leakage incident has on outcome of investment by types of investors by classifying types of investors into foreign investors, private investors and institutional investors. This study is significant in that it helps improve awareness of importance of personal information security by providing data that personal information leakage incident can have a significant influence on outcome of investment as well as corporate value in Korea stock market.

A Fundamental Study on the Classification Criteria and Properties by Detail Type of Archival Information on Architectural Heritage of Korea (건조물 문화재 기록정보의 유형 구분 기준과 세부유형별 속성에 관한 기초 연구)

  • Lim, Cholong;Joo, Sanghun
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.2
    • /
    • pp.88-109
    • /
    • 2020
  • This study aimed to distinguish categories of archival information and identify properties by their detail types, so that the various forms of architectural heritage information generated can be managed based on their attributes and characteristics. First, the specific uses of terms in the legal system were reviewed and their associated concepts specifically defined. "Architectural heritage" was defined as architecture belonging to the category of tangible cultural heritage as designated by law, and "architectural heritage archival information" was defined as all kinds of material expressed by electronic processing of the actual status for preservation and management. Next, the production status of architectural heritage archival information was reviewed in relation to the legal system. This confirmed that relevant legal systems were organized hierarchically and that various types of archival information were generated in a single project. Furthermore, it was confirmed that even archival information produced in the same form contained differing contents depending on the specific purpose and method, and that there was no classification by which to cover all archival information. Finally, it was also confirmed that detailed drawing types could be categorized according to the purpose of production and the target of the records. Based on the findings of this review, the type and properties of archival information were presented as the primary classification criteria, and the architectural heritage archival information was divided into 6 general types and 27 detailed types. Specifically, the linguistic form, dimension, temporal property, and graphic form of archival information were applied as criteria for the classification of general types, and the target, production purpose, production method of archival information, and content characteristics of archival information properties of archival information by type were comprehensively reviewed.

Recommending Core and Connecting Keywords of Research Area Using Social Network and Data Mining Techniques (소셜 네트워크와 데이터 마이닝 기법을 활용한 학문 분야 중심 및 융합 키워드 추천 서비스)

  • Cho, In-Dong;Kim, Nam-Gyu
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.127-138
    • /
    • 2011
  • The core service of most research portal sites is providing relevant research papers to various researchers that match their research interests. This kind of service may only be effective and easy to use when a user can provide correct and concrete information about a paper such as the title, authors, and keywords. However, unfortunately, most users of this service are not acquainted with concrete bibliographic information. It implies that most users inevitably experience repeated trial and error attempts of keyword-based search. Especially, retrieving a relevant research paper is more difficult when a user is novice in the research domain and does not know appropriate keywords. In this case, a user should perform iterative searches as follows : i) perform an initial search with an arbitrary keyword, ii) acquire related keywords from the retrieved papers, and iii) perform another search again with the acquired keywords. This usage pattern implies that the level of service quality and user satisfaction of a portal site are strongly affected by the level of keyword management and searching mechanism. To overcome this kind of inefficiency, some leading research portal sites adopt the association rule mining-based keyword recommendation service that is similar to the product recommendation of online shopping malls. However, keyword recommendation only based on association analysis has limitation that it can show only a simple and direct relationship between two keywords. In other words, the association analysis itself is unable to present the complex relationships among many keywords in some adjacent research areas. To overcome this limitation, we propose the hybrid approach for establishing association network among keywords used in research papers. The keyword association network can be established by the following phases : i) a set of keywords specified in a certain paper are regarded as co-purchased items, ii) perform association analysis for the keywords and extract frequent patterns of keywords that satisfy predefined thresholds of confidence, support, and lift, and iii) schematize the frequent keyword patterns as a network to show the core keywords of each research area and connecting keywords among two or more research areas. To estimate the practical application of our approach, we performed a simple experiment with 600 keywords. The keywords are extracted from 131 research papers published in five prominent Korean journals in 2009. In the experiment, we used the SAS Enterprise Miner for association analysis and the R software for social network analysis. As the final outcome, we presented a network diagram and a cluster dendrogram for the keyword association network. We summarized the results in Section 4 of this paper. The main contribution of our proposed approach can be found in the following aspects : i) the keyword network can provide an initial roadmap of a research area to researchers who are novice in the domain, ii) a researcher can grasp the distribution of many keywords neighboring to a certain keyword, and iii) researchers can get some idea for converging different research areas by observing connecting keywords in the keyword association network. Further studies should include the following. First, the current version of our approach does not implement a standard meta-dictionary. For practical use, homonyms, synonyms, and multilingual problems should be resolved with a standard meta-dictionary. Additionally, more clear guidelines for clustering research areas and defining core and connecting keywords should be provided. Finally, intensive experiments not only on Korean research papers but also on international papers should be performed in further studies.

An Empirical Study on Perceived Value and Continuous Intention to Use of Smart Phone, and the Moderating Effect of Personal Innovativeness (스마트폰의 지각된 가치와 지속적 사용의도, 그리고 개인 혁신성의 조절효과)

  • Han, Joonhyoung;Kang, Sungbae;Moon, Taesoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.53-84
    • /
    • 2013
  • With rapid development of ICT (Information and Communications Technology), new services by the convergence of mobile network and application technology began to appear. Today, smart phone with new ICT convergence network capabilities is exceedingly popular and very useful as a new tool for the development of business opportunities. Previous studies based on Technology Acceptance Model (TAM) suggested critical factors, which should be considered for acquiring new customers and maintaining existing users in smart phone market. However, they had a limitation to focus on technology acceptance, not value based approach. Prior studies on customer's adoption of electronic utilities like smart phone product showed that the antecedents such as the perceived benefit and the perceived sacrifice could explain the causality between what is perceived and what is acquired over diverse contexts. So, this research conceptualizes perceived value as a trade-off between perceived benefit and perceived sacrifice, and we need to research the perceived value to grasp user's continuous intention to use of smart phone. The purpose of this study is to investigate the structured relationship between benefit (quality, usefulness, playfulness) and sacrifice (technicality, cost, security risk) of smart phone users, perceived value, and continuous intention to use. In addition, this study intends to analyze the differences between two subgroups of smart phone users by the degree of personal innovativeness. Personal innovativeness could help us to understand the moderating effect between how perceptions are formed and continuous intention to use smart phone. This study conducted survey through e-mail, direct mail, and interview with smart phone users. Empirical analysis based on 330 respondents was conducted in order to test the hypotheses. First, the result of hypotheses testing showed that perceived usefulness among three factors of perceived benefit has the highest positive impact on perceived value, and then followed by perceived playfulness and perceived quality. Second, the result of hypotheses testing showed that perceived cost among three factors of perceived sacrifice has significantly negative impact on perceived value, however, technicality and security risk have no significant impact on perceived value. Also, the result of hypotheses testing showed that perceived value has significant direct impact on continuous intention to use of smart phone. In this regard, marketing managers of smart phone company should pay more attention to improve task efficiency and performance of smart phone, including rate systems of smart phone. Additionally, to test the moderating effect of personal innovativeness, this research conducted multi-group analysis by the degree of personal innovativeness of smart phone users. In a group with high level of innovativeness, perceived usefulness has the highest positive influence on perceived value than other factors. Instead, the analysis for a group with low level of innovativeness showed that perceived playfulness was the highest positive factor to influence perceived value than others. This result of the group with high level of innovativeness explains that innovators and early adopters are able to cope with higher level of cost and risk, and they expect to develop more positive intentions toward higher performance through the use of an innovation. Also, hedonic behavior in the case of the group with low level of innovativeness aims to provide self-fulfilling value to the users, in contrast to utilitarian perspective, which aims to provide instrumental value to the users. However, with regard to perceived sacrifice, both groups in general showed negative impact on perceived value. Also, the group with high level of innovativeness had less overall negative impact on perceived value compared to the group with low level of innovativeness across all factors. In both group with high level of innovativeness and with low level of innovativeness, perceived cost has the highest negative influence on perceived value than other factors. Instead, the analysis for a group with high level of innovativeness showed that perceived technicality was the positive factor to influence perceived value than others. However, the analysis for a group with low level of innovativeness showed that perceived security risk was the second high negative factor to influence perceived value than others. Unlike previous studies, this study focuses on influencing factors on continuous intention to use of smart phone, rather than considering initial purchase and adoption of smart phone. First, perceived value, which was used to identify user's adoption behavior, has a mediating effect among perceived benefit, perceived sacrifice, and continuous intention to use smart phone. Second, perceived usefulness has the highest positive influence on perceived value, while perceived cost has significant negative influence on perceived value. Third, perceived value, like prior studies, has high level of positive influence on continuous intention to use smart phone. Fourth, in multi-group analysis by the degree of personal innovativeness of smart phone users, perceived usefulness, in a group with high level of innovativeness, has the highest positive influence on perceived value than other factors. Instead, perceived playfulness, in a group with low level of innovativeness, has the highest positive factor to influence perceived value than others. This result shows that early adopters intend to adopt smart phone as a tool to make their job useful, instead market followers intend to adopt smart phone as a tool to make their time enjoyable. In terms of marketing strategy for smart phone company, marketing managers should pay more attention to identify their customers' lifetime value by the phase of smart phone adoption, as well as to understand their behavior intention to accept the risk and uncertainty positively. The academic contribution of this study primarily is to employ the VAM (Value-based Adoption Model) as a conceptual foundation, compared to TAM (Technology Acceptance Model) used widely by previous studies. VAM is useful for understanding continuous intention to use smart phone in comparison with TAM as a new IT utility by individual adoption. Perceived value dominantly influences continuous intention to use smart phone. The results of this study justify our research model adoption on each antecedent of perceived value as a benefit and a sacrifice component. While TAM could be widely used in user acceptance of new technology, it has a limitation to explain the new IT adoption like smart phone, because of customer behavior intention to choose the value of the object. In terms of theoretical approach, this study provides theoretical contribution to the development, design, and marketing of smart phone. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy formulation for acquiring and retaining long-term customers related to smart phone business. Since potential customers are interested in both benefit and sacrifice when evaluating the value of smart phone, marketing managers in smart phone company has to put more effort into creating customer's value of low sacrifice and high benefit so that customers will continuously have higher adoption on smart phone. Especially, this study shows that innovators and early adopters with high level of innovativeness have higher adoption than market followers with low level of innovativeness, in terms of perceived usefulness and perceived cost. To formulate marketing strategy for smart phone diffusion, marketing managers have to pay more attention to identify not only their customers' benefit and sacrifice components but also their customers' lifetime value to adopt smart phone.

Characteristics of Solar Desalination System Using Refrigerant-123 As a Heating Source (R123 열원 적용 증발식 담수 시스템 특성 연구)

  • Yun, Sang-Kook;Kwak, Hee-Youl
    • Journal of the Korean Solar Energy Society
    • /
    • v.30 no.3
    • /
    • pp.33-38
    • /
    • 2010
  • The evaporative desalination system using solar thermal energy would be the efficient and attractive method to get fresh water from brine due to low carbon dioxide generation. In this research the solar desalination system as a heating source of refrigerant R123 in the evaporator was considered. The circulation of refrigerant in the evaporator can reduce the energy consumption of the system, because of using the latent heat of the refrigerant 123 instead of the sensible heat of present hot water. The system was comprised of the single-stage fresh water production unit on the capacity of 1ton/day with shell and tube type evaporator, heaters instead of solar collector to supply the proper heat to refrigerant, and refrigerant and brine circulation systems. Various operating flowrate and temperature ranges were varied in the experiments to get the optimum design data. The results showed that the optimum flow rate of brine feed rate to evaporator was 1.2Liter/min, and the yield of fresh water was increased as higher temperature of feed brine. It was confirmed that the circulation flowrate of heating source of refrigerant was decrease of one fifth of the present warm water system, and very efficient system for solar desalination.