• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.046 seconds

A Study on the Effect of the Information System Factors and the Organizational Factors of Venture Firms on Procedural Management Performance (벤처기업의 정보시스템 특성과 조직특성이 과정적 경영성과에 미치는 영향)

  • Kim, Gi-Jung;Yi, Seon-Gyu
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.209-218
    • /
    • 2018
  • The purpose of this study is to analyze the influence of information system factors and organizational factors on procedural management performance in small and medium-sized venture companies in the Seoul metropolitan area. In the previous study was conducted mainly on large companies and general SMEs. In this study, the research was conducted considering the characteristics of SMEs. The results showed that system suitability, system quality, and IT assets had a positive effect on procedural management performance, and manager perception and human resource capacity had a positive effect on procedural management performance. But the evaluation and compensation did not have a positive effect on procedural management performance. The results of this study showed almost the same results as those of the previous studies. Venture firms have poor financial ability, technology, and organizational management ability than general SMEs. However, the introduction and diffusion factors of new information systems were not significantly different from those of general SMEs.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

Optimal sensor placement for cable force monitoring using spatial correlation analysis and bond energy algorithm

  • Li, Shunlong;Dong, Jialin;Lu, Wei;Li, Hui;Xu, Wencheng;Jin, Yao
    • Smart Structures and Systems
    • /
    • v.20 no.6
    • /
    • pp.769-780
    • /
    • 2017
  • Cable force monitoring is an essential and critical part of the safety evaluation of cable-supported bridges. A reasonable cable force monitoring scheme, particularly, sensor placement related to accurate safety assessment and budget cost-saving becomes a major concern of bridge administrative authorities. This paper presents optimal sensor placement for cable force monitoring by selecting representative sensor positions, which consider the spatial correlativeness existing in the cable group. The limited sensors would be utilized for maximizing useful information from the monitored bridges. The maximum information coefficient (MIC), mutual information (MI) based kernel density estimation, as well as Pearson coefficients, were all employed to detect potential spatial correlation in the cable group. Compared with the Pearson coefficient and MIC, the mutual information is more suitable for identifying the association existing in cable group and thus, is selected to describe the spatial relevance in this study. Then, the bond energy algorithm, which collects clusters based on the relationship of surrounding elements, is used for the optimal placement of cable sensors. Several optimal placement strategies are discussed with different correlation thresholds for the cable group of Nanjing No.3 Yangtze River Bridge, verifying the effectiveness of the proposed method.

Development of Ontology for Intelligent Document Transformation System (지능형 문서변환시스템을 위한 온톨로지구축)

  • Lim, Sung-Shin;Lee, Seok-Yong;Park, Nam-Kyu;Seo, Chang-Gab
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1128-1131
    • /
    • 2005
  • The document transformation system is more widely used in order to transform business documents efficiently in diverse organization. In established researches on document transformation systems have been carried mainly focused on XML however, it is not only transformed XML form but also EDI or local form in realistic import and export process. Particularly, in the most completed research relate on document transformation, they used ontology to get rid of non-efficiency in the connection of XML schema by manual. Hence, those researches are lack of features, which are construct and modify the domain ontology automatically and the size wasn't enough to realize itself. In this paper we study development of ontology and basic system, which is critical in intelligent document conversion system. And we develop an ontology with editor can be modified and complemented by users, as well as we make it used in real import and export business process.

  • PDF

Django based ChatBot System Using KakaoTalk API (카카오톡 API를 이용한 Django 기반 챗봇 시스템)

  • Ko, Heungchan;Kim, Minsu;Lee, Solbi;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.4 no.1
    • /
    • pp.31-36
    • /
    • 2018
  • In this paper, we developed a chatbot system using the Django framework using the KakaoTalk API so that college students can easily search for important information in their university. Unlike existing chatbot systems that provide only specific information, the chatbot developed in this research automatically provides search results for various types of user queries such as weather, YouTube, Naver real-time ranking search and language translation as well as important information within their own university. We developed a module using Apache, Python and Django in AWS Ubuntu server and developed a chatbot system that automatically responds to user queries by communicating with KakaoTalk server using KakaoTalk API and BeautifulSoup. The system developed in this study is expected to be applicable to the future university entrance information promotion and election promotion system.

An Active Co-Training Algorithm for Biomedical Named-Entity Recognition

  • Munkhdalai, Tsendsuren;Li, Meijing;Yun, Unil;Namsrai, Oyun-Erdene;Ryu, Keun Ho
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.575-588
    • /
    • 2012
  • Exploiting unlabeled text data with a relatively small labeled corpus has been an active and challenging research topic in text mining, due to the recent growth of the amount of biomedical literature. Biomedical named-entity recognition is an essential prerequisite task before effective text mining of biomedical literature can begin. This paper proposes an Active Co-Training (ACT) algorithm for biomedical named-entity recognition. ACT is a semi-supervised learning method in which two classifiers based on two different feature sets iteratively learn from informative examples that have been queried from the unlabeled data. We design a new classification problem to measure the informativeness of an example in unlabeled data. In this classification problem, the examples are classified based on a joint view of a feature set to be informative/non-informative to both classifiers. To form the training data for the classification problem, we adopt a query-by-committee method. Therefore, in the ACT, both classifiers are considered to be one committee, which is used on the labeled data to give the informativeness label to each example. The ACT method outperforms the traditional co-training algorithm in terms of f-measure as well as the number of training iterations performed to build a good classification model. The proposed method tends to efficiently exploit a large amount of unlabeled data by selecting a small number of examples having not only useful information but also a comprehensive pattern.

A Distinction Technology for Harmful Web Documents by Rates (등급에 따른 웹 유해 문서 분류 기술)

  • Kim, Yong-Soo;Nam, Taek-Yong;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.859-864
    • /
    • 2006
  • The openness of the Web allows any user to access almost any type of information easily at any time and anywhere. However, with function of easy access for useful information, internet has dysfunctions of providing users with harmful contents indiscriminately. Some information, such as adult content, is not appropriate for all users, notably children. Additionally for adults, some contents included in abnormal porn sites can do ordinary people's mental health harm. In the meantime, since Internet is a worldwide open network it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse way, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies.

Vehicle Routing Based on Pickup and Delivery in a Ubiquitous Environment : u-MDPDPTW (유비쿼터스 기반의 적하와 하역 배송경로문제: u-MDPDPTW)

  • Chang, Yong-Sik;Lee, Hyun-Jung
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.1
    • /
    • pp.49-58
    • /
    • 2007
  • MDPDPTW (Multi-Depot Pickup and Delivery Problem with Time Windows) is a typical model among the optimization models based on the pickup and delivery flow in supply chains. It is based on multi-vehicles in multi-depots and does not consider moving vehicles near pickup and delivery locations. In ubiquitous environments, it is possible to obtain information on moving vehicles and their baggage. Providing the proper context from the perspective of moving vehicles and their baggage allows for more effective vehicle routings. This study proposes Integer Programming-based MDPDPTW including the information on moving vehicles and their baggage in a ubiquitous environment: u-MDPDPTW, and shows the viability and effectiveness of u-MDPDPTW through comparative experiments of MDPDPTW and u-MDPDPTW.

  • PDF

A Study of Rapid Prototyping Based on GOMS Model (GOMS 모델을 기반으로 한 Rapid Prototyping에 관한 연구)

  • Cha, Yeon-Joo;Jo, Sung-Sik;Myung, Ro-Hae
    • IE interfaces
    • /
    • v.24 no.1
    • /
    • pp.1-7
    • /
    • 2011
  • The purpose of this research was to develop an integrated interface for the usability test of systems or products in the design process. It is capable of automatically creating GOMS models which can predict human task performances. It can generate GOMS models to be interacted with the prototype interfaces. It can also effectively manage various design information and various usability test results to be implemented into the new product and/or system design. Thus we can perform usability test for products or system prototypes more effectively and also reduce time and effort required for this test. For usability tests, we established an integrated interface based on GOMS model by the LabVIEW program. We constructed the system that the linkage to GOMS model is available. Using this integrated interface, the menu structure of mobile phone can be constructed easily. User can design a depth and a breath that he want. The size of button and the label of the button is changable. The path to the goal can be defined by the user. Using a designed menu structure, the experiment could be performed. The results of GOMS model and the actual time are presented. Besides, values of operators of GOMS model can be defined as the value that user wants. Using the integrated interface that we developed, the optimal menu structure deducted. The menu structure that user wants can be established easily. The optimal layout and button size can be decided by comparison of numerous menu structures. User can choose the method of usability test among GOMS model and empirical data. Using this integrated interface, the time and costs can be saved and the optimal menu structure can be found easily.

A Design and Implementation of Smartphone-Based AAC System (스마트폰 기반 보완 의사 대체 시스템의 설계와 구현)

  • Ghatkamble, Rajlakshmi;Son, JinHan;Park, DongGyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.1895-1903
    • /
    • 2014
  • Smartphone have become the very important devices in our daily life and provide various roles on impairment and communications of developmental disabilities, acquired neurogenic disorders and autisms. Due to the growth of the technology, an Augmentative and Alternative Communication (AAC) also meets needs and wants, including user customization, configurable layouts and registration of new core vocabulary for individual users. This paper describes the research conducted to design the smartphone-based AAC system. This AAC comprises of a form of communication types such as picture communication boards and sophisticated computer and mobile based devices that can speak in the phrases and sentences for their users. We deployed our AAC system on various sports situations using smartphone systems and also provided user customization method for AAC user's disability levels.