• Title/Summary/Keyword: Web-base

Search Result 597, Processing Time 0.026 seconds

Customer Satisfaction Improvement by Combining the Blue Print and Reliability Technique: Education Service Case Study (Blue Print와 신뢰성 기법을 혼합한 고객만족도 향상에 관한 연구: 교육서비스 사례)

  • Baek, Chun-Joo;Koo, Il-Seob;Lim, Ik-Sung;Kwon, Hong-Kyu
    • Journal of Applied Reliability
    • /
    • v.12 no.1
    • /
    • pp.13-24
    • /
    • 2012
  • This paper applied the Blue Print and FMEA (Failure Mode and Effect Analysis) to education service in order to raise the education service satisfaction. First, the Blue Print is deployed to come up with strategies to overcome the fail possibility point and waiting point. Next, in order to analyze the fail factors and alternative strategies, the Blue Print of education service is applied to FMEA. The results are as follows; first, the ommission from information document by web-mail or e-mail, Second, thing that selected in spite of company uneducated, thing that omitted despite the company is target, and the unsatisfaction of attendee about training contents. Third, the delay of counsel at the telephone reply, erroneous list of course name and attendee at HRD (Human Resource Development), omission of check whether attends or not. Except for unsatisfaction of attendee, all appears at the process that service delivered. And the unsatisfaction of attendee is about education contents. Both is the factor which have influence on the education service quality. The strategies to remove the failure mode are training and manual development on service and work, a thorough management and check of information system like as ERP (Enterprise Resoure Planning), HRD, education institution list DB (Data Base), on-line application system, a development of education program to offer best education that reflect the user needs and continuously changing environment.

Research of a Development Plan on the Integrated Weapon System Database based on Integrated Operation and Management System for the Aircraft Development Management (항공기 체계운영관리시스템 기반의 통합무기체계데이터베이스 발전 방안 연구)

  • Chung, Joon-Young;Kim, Cheon-Youn;Kim, Jong-Jin;Lee, Sang-Bum
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.269-276
    • /
    • 2007
  • National defense research and development is trying to develop the weapon system to satisfy users' requirements at minimum cost, high quality and the shortest period. Under integrated database computer environments, development processes and tools have been developed to implement system engineering and concurrent engineering systematically. In the aerospace defense weapon system, the fixed wing development department has developed and operated the integrated operation and management information system based on web technology to manage efficiently the technical information generated by the R&D process. When this system was applied to the existing R&D project for the aircraft weapon system, it proved and verified its efficiency. In this paper, we describe the future development plan of an integrated R&D framework and an integrated weapon system database based on the integrated operation and management information system which are able to centrol the technical information of KF-X, UAV(Unmanned Aerial Vehicles) and UCAV(Unmanned Combat Aerial Vehicles) programs. We also describe an interoperability and integration plan with WISEMAN which will be operated soon in our research Institute.

  • PDF

Full-scale tests and finite element analysis of arched corrugated steel roof under static loads

  • Wang, X.P.;Jiang, C.R.;Li, G.Q.;Wang, S.Y.
    • Steel and Composite Structures
    • /
    • v.7 no.4
    • /
    • pp.339-354
    • /
    • 2007
  • Arched Corrugated Steel Roof (ACSR) is a kind of thin-walled steel shell, composing of arched panels with transverse small corrugations. Four full-scale W666 ACSR samples with 18m and 30m span were tested under full and half span static vertical uniform loads. Displacement, bearing capacities and failure modes of the four samples were measured. The web and bottom flange in ACSR with transverse small corrugations are simplified to anisotropic curved plates, and the equivalent tensile modulus, shear modulus and Poisson's ratio of 18m span ACSR were measured. Two 18 m-span W666 ACSR samples were analyzed with the Finite Element Analysis program ABAQUS. Base on the tests, the limit bearing capacity of ACSR is low, and for half span loading, it is 74-75% compared with the full span loading. When the testing load approached to the limit value, the bottom flange at the sample's bulge place locally buckled first, and then the whole arched roof collapsed suddenly. If the vertical loads apply along the full span, the deformation shape is symmetric, but the overall failure mode is asymmetric. For half span vertical loading, the deformation shape and the overall failure mode of the structure are asymmetric. The ACSR displacement under the vertical loads is large and the structural stiffness is low. There is a little difference between the FEM analysis results and testing data, showing the simplify method of small corrugations in ACSR and the building techniques of FEM models are rational and useful.

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

An Implementation of Smart Laundry Management System Using Wrieless RFID Reader (무선 RFID 리더기를 이용한 스마트 세탁물 관리 시스템 개발)

  • Lee, Seung-Joon;Lee, Chang-Won;Nghia, Troung Van;Kim, Joo-Woong;Jung, Kyung-Kwon;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.811-814
    • /
    • 2011
  • This paper presents smart laundry management system using wireless Radio Frequnecy Identification (RFID) reader for efficient managing a large amount of laundry and clothing. The proposed system is comprised of wireless RFID hanger, base module connected on PC, and server system. The wireless RFID hanger with RFID reader read RFID tag attached on clothes and transmit tag information using wireless communication. The server system manage customers and his clothing using Database (DB) and display the information on the web page and smart phone devices. Since the proposed system operates with battery, we can evaluate its lifetime to measure current consumption. The designed system can be utilized to manage quantities of clothes and also it will be a good service to improve efficiency of laundry process.

  • PDF

Influence of autoclave sterilization procedures on the cyclic fatigue resistance of heat-treated nickel-titanium instruments: a systematic review

  • Silva, Emmanuel Joao Nogueira Leal;Zanon, Mayara;Hecksher, Fernanda;Belladonna, Felipe Goncalves;de Vasconcelos, Rafaela Andrade;da Silva Fidalgo, Tatiana Kelly
    • Restorative Dentistry and Endodontics
    • /
    • v.45 no.2
    • /
    • pp.25.1-25.12
    • /
    • 2020
  • Objectives: This systematic review evaluated the influence of autoclave sterilization procedures on the cyclic fatigue resistance of heat-treated nickel-titanium (NiTi) instruments. Materials and Methods: A systematic search without restrictions was conducted in the following electronic databases: PubMed, Scopus, Web of Science, ScienceDirect, Cochrane, and Open Grey. The hand search was also performed in the main endodontic journals. The eligible studies were submitted to the methodological assessment and data extraction. Results: From 203 abstracts, a total of 10 articles matched the eligible criteria. After reading the full articles, 2 were excluded because of the absence of the heat-treated instruments in the experimental design and 3 due to the lack of a control group using heat-treated instruments without autoclave sterilization. From the 5 included studies, 1 presented a low risk of bias, 3 presented moderate and 1 high risk. It was observed heterogeneous findings in the included studies, with autoclave sterilization cycles increasing, decreasing or not affecting the cyclic fatigue life of heat-treated NiTi instruments. However, the retrieved studies evaluating the cyclic fatigue resistance of endodontic instruments presented different protocols and assessing outcomes, this variability makes the findings less comparable within and also between groups and preclude the establishment of an unbiased scientific evidence base. Conclusions: Considering the little scientific evidence and considerable risk of bias, it is still possible to conclude that autoclave sterilization procedures appear to influence the cyclic fatigue resistance of heat-treated NiTi instruments.

Effect of On/off-line Acquaintance's Recommendation Message on Product Attitude and Purchase Intention (온·오프라인 지인의 추천메시지가 제품태도와 구매의도에 미치는 영향)

  • Lee, Jung-Woo;Kim, Mi Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.40 no.6
    • /
    • pp.1010-1024
    • /
    • 2016
  • This study identifies the influence of on/off-line acquaintances' recommendation messages on fashion product attitude and purchase intention on the online purchase of fashion products in two-sided word of mouth situations as well as compares the difference in influence according to bond-base with equidistance. This study was conducted for one month on university students in their 20s who were believed to be active in smartphone use. Out of the collected 174 copies of the questionnaire, 162 copies were used for analysis. The questionnaire was classified into online and offline recommendation messages of an acquaintance. We present two-sided fashion product reviews made similar to the type found in an actual shopping mall web-site. As for analysis, confirmatory factory analysis, structural equation modeling, and multi-group analysis were conducted using AMOS 19.0. The analysis results are as follows. First, on/off-line acquaintances' recommendation messages had significant influences on product attitude in the situation where two-sided reviews on fashion products were presented; however, those messages did not influence purchase intention. Recommendation messages positively increased product attitude and enhanced purchase intention if acquaintances' recommendation messages were mediated between on/off-line acquaintances' recommendation messages and purchase intention. Consequently, a mediating effect on product attitude was revealed. Second, there was no difference between online acquaintances and offline acquaintances in terms of the influence of acquaintances' recommendation messages on product attitude and purchase intention, in the situation where two-sided reviews were presented on online fashion products. Therefore, no control effect according to the type of acquaintance was confirmed.

A Study of Internet Address Collision Detection Method (인터넷 주소 충돌 감지에 관한 연구)

  • 위선정;임영희;이태헌;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.545-547
    • /
    • 2004
  • Currently possibility of the change of seal computer it increases geometrical progression and the general individuals the knowledge which is special regarding the ip are using the flow child blood which it Provides without from the isp enterprise. But most of the case peon of the school which uses the fixation child blood or the company because is not the knowledge against a TCP/IP address is not oneself at deliberation or real income and it will use the TCP/IP address of the different user and the network whole it will paralyze, the original user will not be able to use the network and it makes. With information where address information where the network administrator present time after data base anger one uses address information of the civil official objective personal computers and network systems of the watch inside in the dictionary is stored will be same from the dissertation which it sees hereupon and the web which it will yell it leads and packet it detects, the use of the TCP/IP address which goes wrong in the user and it notifies the method which is the possibility of closing the paralysis of the network system which it follows in the IP address fringe land due to a deliberation or a real income to sleep it presents it does.

  • PDF

Constructing a Metadata Database to Enhance Internet Retrieval of Educational Materials

  • Oh Sam-Gyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.143-156
    • /
    • 1998
  • This paper reports the GEM (Gateway to Educational Materials) project whose goal is to develop an operational framework to provide the K-12 teachers in the world with 'one-stop/any-stop' access to thousands of lesson plans, curriculum units and other Internet-based educational resources. To the IS-element Dublin Core base package, the GEM project added an 8-element, domain-specific GEM package. The GEM project employed the conceptual data modeling approach to designing the GEM database, used the Sybase relational database management system (RDBMS) to construct the backend database for storing the metadata of educational resources, and also employed the active server page (ASP) technology to provide Web interfaces to that database. The consortium members catalog lesson plans and other Internet-based educational resources using a cataloging module program that produces HTML meta tags. A harvest program collects these meta tags across the Internet and outputs an ASCII file that conforms to the standard agreed by the consortium members. A parser program processes this file to enter meta tags automatically into appropriate relational tables in the Sybase database. The conceptual/logical schemas of Dublin Core and GEM profile are presented. The advantages of conceptual modeling approach to manage metadata are discussed. A prototype system that provides access to the GEM metadata is available at http://lis.skku.ac.kr/gem/.

  • PDF

An Ontology-based Semantic Blog Model for Supporting System Queries to Recommend Interest Community (관심 커뮤니티 추천을 위한 시스템 질의를 지원하는 온톨로지 기반 시맨틱 블로그 모델)

  • Yang, Kyung-Ah;Yang, Jae-Dong;Choi, Wan
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.4
    • /
    • pp.219-233
    • /
    • 2008
  • This paper suggests an intelligent semantic blog model to systematically analyze and manage biogosphere with ontology as its conceptual knowledge base. In the model, the system managers may support users to easily find appropriate blog resources by tracking and analyzing various relationships between ontology - they may intelligently recommend Interest blog communities to relevant users by monitoring interaction activities in blogoshpere, dynamically grouping the communities with the ontology. To systematically specify the functionality of our model, 1) we first express the structure of blog resources in terms of objects and relationships between them and then 2) we formalize a set of operators designed to be applied to the resources. System queries are implemented by the combination of the operators.