• Title/Summary/Keyword: Software service

Search Result 2,464, Processing Time 0.028 seconds

Web 2.0 and Strategic Service Quality Management (Web 2.0와 전략적인 서비스 품질경영)

  • Kim, Gye-Su
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2007.04a
    • /
    • pp.267-272
    • /
    • 2007
  • A business is an organized. profit-seeking activity that provides goods and service designed to satisfy customer' needs. For years, Internet users have been dream of intelligent software agents that automatically prowl the online world and bring back high-quality information. In the era of web2.0, Internet users can communicate each other on open platforms(e-mail, Naver Knowledge-In. Cyworld, Wikipedia, and blog etc.). The author investigate the impact of web2.0 user's perceived value. affective commitment. brand equity on loyalty intention. The results suggest that excellent service quality will be alternative solving in web2.0 business environment.

  • PDF

The Empirical Study on the Success Factors of IT Adoption in Korea Service Industry

  • Kim, Jin-Soo;Ka, Hoe-Gneung;Hwang, In-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.3
    • /
    • pp.71-82
    • /
    • 2010
  • This study is to present effective ways of IT adoption as a new growth engine for vitalizing service industry. The paper identifies key success factors of IT adoption and analyzes empirically its' impact on user satisfaction. Additional analysis of control effect by company sizes is conducted. For data sampling, among 1590 companies in IT systems, equipment, and software, 1570 companies participated and total 2,000 questionnaires were collected. In order to analyze main effect analysis and control effect, Structural Equation Modeling method was applied. The result show that there are significant effect between key success factors and user satisfaction. Based on the result, the paper suggests effective way of IT adoption according to company sizes.

  • PDF

Simulation Service and Model Generalization Technique for Satellite Simulators (위성 시뮬레이터를 위한 시뮬레이션 서비스와 모델 일반화 기법)

  • Lee, Hun-Gu;Lee, Sang-Uk;Cheong, Seong-Kyun;Bang, Jun-Sik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.9
    • /
    • pp.843-849
    • /
    • 2007
  • Recent progress on software engineering especially in object-oriented design concepts has enabled the development of the simulation models of satellite components in view of reliability and reusability. This paper proposes an useful satellite simulator framework using simulation service and generalized model design. The proposed method is verified by a prototyping in .NET/C# environment.

Modular and versatile platform for the benchmarking of modern actuators for robots

  • Garcia, Elena;Gonzalez-de-Santos, Pablo
    • Smart Structures and Systems
    • /
    • v.11 no.2
    • /
    • pp.135-161
    • /
    • 2013
  • This work presents a test platform for the assessment and benchmarking of modern actuators which have been specifically developed for the new field and service robotics applications. This versatile platform has been designed for the comparative analysis of actuators of dissimilar technology and operating conditions. It combines a modular design to adapt to linear and rotational actuators of different sizes, shapes and functions, as well as those with different load capacities, power and displacement. This test platform emulates the kinematics of robotic joints while an adaptive antagonist-load actuator allows reproducing the variable dynamic loads that actuators used in real robotics applications will be subjected to. A data acquisition system is used for monitoring and analyzing test actuator performance. The test platform combines hardware and software in the loop to allow actuator performance characterization. The use of the proposed test platform is demonstrated through the characterization and benchmarking of three controllable impedance actuators recently being incorporated into modern robotics.

Applying Formal Methods to Modeling and Analysis of Real-time Data Streams

  • Kapitanova, Krasimira;Wei, Yuan;Kang, Woo-Chul;Son, Sang-H.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.85-110
    • /
    • 2011
  • Achieving situation awareness is especially challenging for real-time data stream applications because they i) operate on continuous unbounded streams of data, and ii) have inherent realtime requirements. In this paper we showed how formal data stream modeling and analysis can be used to better understand stream behavior, evaluate query costs, and improve application performance. We used MEDAL, a formal specification language based on Petri nets, to model the data stream queries and the quality-of-service management mechanisms of RT-STREAM, a prototype system for data stream management. MEDAL's ability to combine query logic and data admission control in one model allows us to design a single comprehensive model of the system. This model can be used to perform a large set of analyses to help improve the application's performance and quality of service.

A Design of Infrastructure for Control/Monitoring System in the Distributed Computing Environment (분산 컴퓨팅 환경에서의 제어/감시 시스템 개발을 위한 기반 구조 설계)

  • 이원구;박재현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.547-547
    • /
    • 2000
  • Recently, due to the advance of computer, network and Internet technology, control/monitoring systems are required to process the massive data, At the same time, the software development environment uses more and more component-based methodology. This paper proposes the services for the control /monitoring domain. Especially we define domain-specific interfaces and categories to acquire compatibility between products, and implement architecture for lightweight event service. As it is very important to support compatibility between heterogeneous systems, the proposed system provides modules for the web service and communication protocols based on the XML. And as proposed architecture consists of cluster of servers and Windows 2000's NLB service, it can guarantee more stable operation,

  • PDF

Web-based CAE Service System for Collaborative Engineering Environment (협업 환경 기반 엔지니어링 해석 서비스 시스템 개발)

  • Kim K.I.;Kwon K.E.;Park J.H.;Choi Y.;Cho S.W.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.619-620
    • /
    • 2006
  • In this paper, the CAE Service System for Collaborative Engineering Environment with web services and Multi-frontal Method has been investigated and developed. The enabling technologies such as SOAP and .NET Framework play great roles in the development of integrated distributed application software. In addition to the distribution of analysis modules, numerical solution process itself is again divided into parallel processes using Multi-frontal Method for computational efficiency. We believe that the proposed approach for the analysis can be extended to the entire product development process for sharing and utilizing common product data in the distributed engineering environment.

  • PDF

A Study on the Policy Direction according to the Perception Change of the Welfare Service of the Aged

  • Kim, Jae-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.121-127
    • /
    • 2015
  • This study is about establishing the policy direction according to the perception change of the welfare service of the aged. To achieve this goal, this study analyzed the reprocessed result of the survey related to the welfare of the aged among the second and third community social welfare plans of D county, Southern Jeolla Province. The result shows the recipients of the welfare service of the aged have higher perception about spreading the hardware side such as the welfare facility of the aged than about practicing the software policy such as elder care services. It suggests significant implication in deciding the priority of the welfare policy of the aged from now on. But this result is confined in D county, so getting the generalized conclusion needs the comprehensive review toward more broad regions hereafter.

Perceptual Differences between IS Project Service Providers and Customers on Information System Project Risk Factors: a Koran case (정보시스템 프로젝트의 위험요인에 대한 현업인력과 서비스제공인력과의 인식도 차이)

  • Lee, Seog-Jun;Cho, Suk-Jin;Park, Jung-Sun;Hahm, Yu-Keun;Kim, Yong-Jae
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.79-94
    • /
    • 2007
  • Cases of botched information systems implementation have been surfaced due to poor IS project management and control. One major source of such failures is the perceptual difference between the participants of IS projects who should define potential risk factors well before considered IS projects are launched. Based on risk factors cited from prior works, this paper empirically examines the risk factors associated with IS service project management to analyze perceptual differences between the IS service providers and customers in Korea. Data analyses found significant differences in the area of scheduling/resource, technological newness, communications, and sponsorship/ownership while statistically significant differences were observed in eleven individual factors out of forty six risk factors. Risk factors are also ordered in terms of perceived importance to highlight the critical differences.

  • PDF

Realization of the Biba Security Model in an OSI-distributed (OSI-분산 시스템에서의 Biba Security 모델의 구현)

  • Park, Chong-Hwa
    • The Journal of Information Technology
    • /
    • v.5 no.2
    • /
    • pp.35-45
    • /
    • 2002
  • This paper discusses a distributed implementation of the Biba security policy model. Implementation of an service in the OSI-RM is not sufficient for enforcing the Biba model. Also confidentiality services are necessary. Public Key Systems(PKSs) are considered for the realization of these security services. In this paper symmetric & asymmetric cryptographic systems are considered for the realization of these security service. It is investigated how key-distributions can be found resulting in a minimum number of key.

  • PDF