• Title/Summary/Keyword: real-time issues

Search Result 646, Processing Time 0.022 seconds

Implementation Strategy for the Real-Time Enterprise in Fashion Industry (패션산업에서의 실시간기업 도입 방안)

  • Park, Young-Jae;Choi, Hyung-Rim;Kim, Hyun-Soo;Hong, Soon-Gu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.5
    • /
    • pp.105-118
    • /
    • 2006
  • Zara and Limited Brands in the fashion industry are two leading companies that satisfy the clients' needs and the trend of fashion. The agile organizations which response to the change of business environment or adaptive enterprises which monitor the customer's desires have been studied over the long time in the academic world. Recently these management concepts have been extended to the Real-Time Enterprise. In this paper how to implement the RTE in the fashion industry is suggested. To implement the RTE, the end-to-end process should be continuously operated without delays. Also, the three main attributes of RTE, -visibility, intelligence, and agility-should be achieved. Further more based on the cyclone model and the RTE attributes, important issues to be considered for the successful RTE implementation are discussed.

  • PDF

Change of Value Chain and Current Issues in Game Items Real Money Trade (게임아이템 현금거래의 가치사슬 변화와 동향분석)

  • Han, Chang-Hee;Kim, Jung-Min;Park, Chae-Hee;Hong, Yu-Jin;Kim, Min-Kwan
    • Journal of Korea Game Society
    • /
    • v.11 no.2
    • /
    • pp.45-56
    • /
    • 2011
  • The concept, means, value chain, the persons concerned and possible issues of game item trading in cash are analyzed in this study. The trading is characterized by not only being performed with its own unique business model but also causing issues related to delicate social problems, such as digital contents distribution, work place and gambling. The way of game item trading in cash and its value chain have been changed with game market growth for the past years. I analyzed in this article the new concept of game item trading in cash that is different from the past. Also, analysis on several issues related to game item trading in cash is conducted.

Evaluation on Creep Life Prediction of Aircraft Gas Turbine Material by AE (음향방출법에 의한 항공기용 가스터빈 재료의 크리프 수명예측 평가)

  • Kong, Y.S.;Yoon, H.K.;Oh, S.K.
    • Journal of Power System Engineering
    • /
    • v.6 no.1
    • /
    • pp.55-60
    • /
    • 2002
  • There has been no report on the life prediction for gas turbine materials at high temperatures based on the creep properties and their relationship with the AE(acoustic emission) properties as a means of real-time non-destructive testing. One of the important issues is thus to develop a reliable method of evaluating creep properties by the AE technique. In this paper, the real-time evaluation of high temperature creep time and AE cumulative counts for nickel-based superalloy Udimet 720 was performed on round-bar type specimens under pure load at the temperatures of 811, 922 and 977K. The total AE cumulative counts until the starting point of secondary creep($N_1$) and that of tertiary creep($N_2$) have quantitative relationship with the tertiary creep time and the rupture time. It is thus possible to construct the life prediction system based on creep and the prevention system of tertiary creep by using AE technique.

  • PDF

A New Algorithm for Automated Modeling of Seasonal Time Series Using Box-Jenkins Techniques

  • Song, Qiang;Esogbue, Augustine O.
    • Industrial Engineering and Management Systems
    • /
    • v.7 no.1
    • /
    • pp.9-22
    • /
    • 2008
  • As an extension of a previous work by the authors (Song and Esogbue, 2006), a new algorithm for automated modeling of nonstationary seasonal time series is presented in this paper. Issues relative to the methodology for building automatically seasonal time series models and periodic time series models are addressed. This is achieved by inspecting the trend, estimating the seasonality, determining the orders of the model, and estimating the parameters. As in our previous work, the major instruments used in the model identification process are correlograms of the modeling errors while the least square method is used for parameter estimation. We provide numerical illustrations of the performance of the new algorithms with respect to building both seasonal time series and periodic time series models. Additionally, we consider forecasting and exercise the models on some sample time series problems found in the literature as well as real life problems drawn from the retail industry. In each instance, the models are built automatically avoiding the necessity of any human intervention.

How does the General Public Understand Science and Technology Issues?: A Case on the Nuclear Power Issue Using Topic Modeling Approach (과학기술이슈에 대한 일반인의 인식분석: 토픽모델링을 활용한 원자력발전 사례)

  • Choi, Hyundo;Ahn, Jongwuk
    • Journal of Technology Innovation
    • /
    • v.23 no.4
    • /
    • pp.151-175
    • /
    • 2015
  • The general public is a key stakeholder in the science and technology domain. However, traditional approaches require substantial efforts and resources to analyze how does the general public understand science and technology issues. We applied the topic modeling, a form of text clustering, to the texts about the nuclear power which were posted on an online space in order to explore the general public's thoughts on the issue. This study investigates the extent to which macro-level events influence understandings of the general public on the science and technology issues and weather these changes in understandings are sustained over time. It examines the possibility of applying topic modeling in narrowing a perception gap between the general public and the experts through a near-real-time monitoring of the public interests and perceptions about the science and technology issues.

The Effects of both Social Class of Adolescents Formed in Online Game World and Gaming Time on the Acceptance of Moral Issues (온라인 게임세계에서 형성된 청소년의 사회적 지위와 게임 시간이 도덕적 문제 수용에 미치는 효과)

  • Lee, Guk-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.759-778
    • /
    • 2021
  • This study was carried out to verify whether there were any differences in accepting moral issues between adolescents who played using characters of high status (either objectively or subjectively highly ranked within a game) in the online game world and those who played using characters of low status (either objectively or subjectively lowly ranked). It also investigated whether there were moderating interactional effects for the amount of time spent on playing games and the influence of adolescents' social statuses in games over accepting moral issues. Results showed that, overall, adolescents who played using a lower-ranking character in the game world displayed a higher acceptance of moral issues than those who played using characters of the two other categories (equal to average level or higher). Furthermore, interactional effects were observed for those who played using a low-ranking character and spent longer hours playing games, as they were more likely to accept moral issues. This study is significant in that it offers many implications, as a rare study that verified the effects of cyberspace status on moral judgements made in the real world.

TK-Indexing : An Indexing Method for SNS Data Based on NoSQL (TK-Indexing : NoSQL 기반 SNS 데이터 색인 기법)

  • Shim, Hyung-Nam;Kim, Jeong-Dong;Seol, Kwang-Soo;Baik, Doo-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.19D no.4
    • /
    • pp.271-280
    • /
    • 2012
  • Currently, contents generated by SNS services are increasing exponentially, as the number of SNS users increase. The SNS is commonly used to post personal status and individual interests. Also, the SNS is applied in socialization, entertainment, product marketing, news sharing, and single person journalism. As SNS services became available on smart phones, the users of SNS services can generate and spread the social issues and controversies faster than the traditional media. The existing indexing methods for web contents have limitation in terms of real-time indexing for SNS contents, as they usually focus on diversity and accuracy of indexing. To overcome this problem, there are real-time indexing techniques based on RDBMSs. However, these techniques suffer from complex indexing procedures and reduced indexing targets. In this regard, we introduce the TK-Indexing method to improve the previous indexing techniques. Our method indexes the generation time of SNS contents and keywords by way of NoSQL to indexing SNS contents in real-time.

Implementation of Real-time Wireless Remote Control System Based on Public Key Infrastructure (PKI를 기반으로 한 실시간 무선 원격제어 시스템의 구현)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.71-79
    • /
    • 2003
  • Existing web-based system management software solutions show some limitations in time and space. Moreover, hey possess such as shortcomings unreliable error message announcements and difficulties with real-time assistance supports and emergency measures. In order to solve these deficiencies, Wireless Remote Control System(W-RCS) was designed and implemented. W-RCS is able to manage and monitor remote systems by using mobile communication devices for instantaneous control. The implementation of W-RCS leads to these security problems as well as solutions to aforementioned issues with existing web-based system management software solutions. Therefore, this paper has focused on the security matters related to W-RCS. The security functions based on public key infrastructure include mobile device user authentication and target system access control. The W-RCS allows real-time user authentication, increases the flexibility of resource administrators and mobile device non, and provides not only uninterrupted services, but also safe mobile office environments.

On A New Framework of Autoregressive Fuzzy Time Series Models

  • Song, Qiang
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.4
    • /
    • pp.357-368
    • /
    • 2014
  • Since its birth in 1993, fuzzy time series have seen different classes of models designed and applied, such as fuzzy logic relation and rule-based models. These models have both advantages and disadvantages. The major drawbacks with these two classes of models are the difficulties encountered in identification and analysis of the model. Therefore, there is a strong need to explore new alternatives and this is the objective of this paper. By transforming a fuzzy number to a real number via integrating the inverse of the membership function, new autoregressive models can be developed to fit the observation values of a fuzzy time series. With the new models, the issues of model identification and parameter estimation can be addressed; and trends, seasonalities and multivariate fuzzy time series could also be modeled with ease. In addition, asymptotic behaviors of fuzzy time series can be inspected by means of characteristic equations.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.