• Title/Summary/Keyword: use for information

Search Result 27,364, Processing Time 0.057 seconds

An Elementary-Function-Based Refinement Method for Use Cases to Improve Reliability of Use Case Points (유스케이스 점수 측정의 신뢰도 향상을 위한 단위기능 중심의 유스케이스 정제 방법)

  • Heo, Ryoung;Seo, Young-Duk;Baik, Doo-Kwon
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1117-1123
    • /
    • 2015
  • Use The Use Case Points method is a software estimation method that is based on user requirements. When requirement analysts elicit user requirements, they obtain different use cases because different levels of detail are possible for the Use Case, and this affects the Use Case Points. In this paper, we suggest a method to refine the level of detail of the Use Case by using the concept of an elementary function. This refinement method achieves the desired reliability for the Use Case Points because it produces less of a deviation in the Use Case Points for different requirement analysts than other methods that are based on the step, transaction, and narrative of the Use Case.

Develop and Deliver Essential Information Literacy Programs

  • Eisenderg, Michael B.
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.2
    • /
    • pp.5-21
    • /
    • 2011
  • There is an explosion of talk about crucial, new literacies for the 21st Century, for example critical thinking, problem-solving, media literacy, technology literacy, digital literacy, visual literacy. The other day, there was even an article about "gaming literacy!" How does one make sense of it all? The common factor in all these literacies is "information" - information seeking, information use, information processing, information presentation, and information evaluation. And, these "information" elements come together in information literacy: the ability to engage in effective and efficient information problem-solving. Information literacy is the overarching and unifying literacy, and all libraries have a unique and essential role to play in delivering meaningful information literacy programs to people of all ages. In this keynote paper and address, Professor and Dean Emeritus Mike Eisenberg will define the concept and structure of library-based information literacy programs and offer strategies for developing and implementing information literacy programs that are comprehensive(reaching all users), predictable (consistent over time), and accountable(measured and reported).

A Study of Influencing Factors Upon Using C4I Systems: The Perspective of Mediating Variables in a Structured Model (C4I 시스템 사용의 영향 요인에 관한 연구: 구조모형의 매개변수의 관점에서)

  • Kim, Chong-Man;Kim, In-Jai
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.73-94
    • /
    • 2009
  • The general aspects for the future warfare shows that the concept of firepower and maneuver centric warfare has been replacing with that of information and knowledge centric warfare. Thus, some developed countries are now trying to establish the information systems to perform intelligent warfare and innovate defense operations. The C4I(Command, Control, Communication, Computers and Intelligence for the Warrior) systems make it possible to do modern and systematic war operations. The basic idea of this study is to investigate how TAM(Technology Acceptance Model) can explain the acceptance behavior in military organizations. Because TAM is inadequate in explaining the acceptance processes forcomplex technologies and strict organizations, a revised research model based upon TAM was developed in order to assess the usage of the C4I system. The purpose of this study is to investigate factors affecting the usage of C4I in the Korean Army. The research model, based upon TAM, was extended through a belief construct such as self-efficacy as one of mediating variables. The self-efficacy has been used as a mediating variable for technology acceptance, and the variable was included in the research model. The external variables were selected on the basis of previous research. The external variables can be classified into following: 1) technological, 2) organizational, and 3) environmental factors on the basis of TOE(Technology-Organization-Environment) framework. The technological factor includes the information quality and the task-technology fitness. The organizational factor includes the influence of senior colleagues. The environmental factor includes the education/train data. The external variables are considered very important for explaining the behavior patterns of information technology or systems. A structured questionnaire was developed and administrated to those who were using the C4I system. Total 329 data were used for statistical data analyses. A confirmatory factor analysis and structured equation model were used as main statistical methods. Model fitness Indexes for measurement and structured models were verified before all 18 hypotheses were tested. This study shows that the perceived usefulness and the self-efficacy played their roles more than the perceived ease of use did in TAM. In military organizations, the perceived usefulness showed its mediating effects between external variables and dependent variable, but the perceived ease of use did not. These results imply that the perceived usefulness can explain the acceptance processes better than the perceived ease of use in the army. The self-efficacy was also used as one of the three mediating variables, and showed its mediating effects in explaining the acceptance processes. Such results also show that the self-efficacy can be selected as one possible belief construct in TAM. The perceived usefulness was influenced by such factors as senior colleagues, the information quality, and the task-technology fitness. The self-efficacy was affected by education/train and task-technology fitness. The actual usage of C4I was influenced not by the perceived ease of use but by the perceived usefulness and selfefficacy. This study suggests the followings: (1) An extended TAM can be applied to such strict organizations as the army; (2) Three mediation variables are included in the research model and tested at real situations; and (3) Several other implications are discussed.

A Method for Fault detecting on Power Transmission Network by use of M-sequence Correlation

  • Nishiyama, Eiji;Kuwanami, Kenshi;Owaki, Kosuke
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2570-2575
    • /
    • 2003
  • Monitoring a power transmission line is significant for power electric companies. In this paper, we propose a new method for detecting an fault point of power transmission line by use of M-sequence correlation technique. In this method, detecting signal is used as one or plural M-sequences ( same characteristic polynomial, including normal and reverse mark, synchronized ). In receiving point, we make same sequence with the input one and take crosscorrelation function between M-sequence and the received signal. We can see transfer fanctions of plural paths between inputs and a output taps separated from different of delay times on the crosscorrelation function, and from these transfer fanctions, so we compare them when fault occurred with in usual.

  • PDF

The effect of switching costs on resistance to change in the use of software

  • Perera, Nipuna;Kim, Hee-Woong
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.539-544
    • /
    • 2007
  • People tend to resist changing their software even alternatives are better then the current one. This study examines the resistance to change in the use of software from the switching costs perspective based on status quo bias theory. For this study, we select Web Browsers as software. Based on the classification of switching costs into three groups (psychological, procedural, and loss), this study identifies six types of switching costs (uncertainty, commitment, learning, setup, lost performance, and sunk costs). This study tests the effects of six switching costs on user resistance to change based on the survey of 204 web browser users. The results indicate that lost performance costs and emotional costs have significant effects on user resistance to change. This research contributes towards understanding of switching costs and the effects on user resistance to change. This study also offers suggestions to software vendors for retaining their users and to organizations for managing user resistance in switching and adopting software.

  • PDF

Euclidian Distance Minimization of Probability Density Functions for Blind Equalization

  • Kim, Nam-Yong
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.399-405
    • /
    • 2010
  • Blind equalization techniques have been used in broadcast and multipoint communications. In this paper, two criteria of minimizing Euclidian distance between two probability density functions (PDFs) for adaptive blind equalizers are presented. For PDF calculation, Parzen window estimator is used. One criterion is to use a set of randomly generated desired symbols at the receiver so that PDF of the generated symbols matches that of the transmitted symbols. The second method is to use a set of Dirac delta functions in place of the PDF of the transmitted symbols. From the simulation results, the proposed methods significantly outperform the constant modulus algorithm in multipath channel environments.

Toward the Application of a Critical-Chain-Project-Management-based Framework on Max-plus Linear Systems

  • Takahashi, Hirotaka;Goto, Hiroyuki;Kasahara, Munenori
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.3
    • /
    • pp.155-161
    • /
    • 2009
  • We focus on discrete event systems with a structure of parallel processing, synchronization, and no-concurrency. We use max-plus algebra, which is an effective approach for controller design for this type of system, for modeling and formulation. Since a typical feature of this type of system is that the initial schedule is frequently changed due to unpredictable disturbances, we use a simple model and numerical examples to examine the possibility of applying the concepts of the feeding buffer and the project buffer of critical chain project management (CCPM) on max-plus linear discrete event systems in order to control the occurrence of an undesirable state change. The application of a CCPM-based framework on a max-plus linear discrete event system was proven to be effective.

Key Distribution for Heterogeneous Public-Key Cryptosystems

  • Lv, Xixiang;Yi, Mu;Hui, Li
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.464-468
    • /
    • 2013
  • The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.

A Quality Control Method of Assembly Parts Based on Parts Inspection information (부품검사정보를 이용한 조립품 품질관리방안)

  • Chung, Dae-Kwon;Yun, Won-Young
    • Journal of Korean Society for Quality Management
    • /
    • v.23 no.3
    • /
    • pp.140-155
    • /
    • 1995
  • This paper proposes a quality control method of assembly parts based on parts inspection information. We use the parts inspection information for reduction of defective fraction in assembly and prediction of assembly quality. At first, we build the functional relationship between parts and assembled unit by regression analysis. Secondly, if we use the inspection informations of parts which are estimators of means and variances, we can predict the nonconforming probability of assembled unit and propose the best assembly method. In a case study, we showed the efficency of the proposed method in two part assembly.

  • PDF

Development of a Privacy-Preserving Big Data Publishing System in Hadoop Distributed Computing Environments (하둡 분산 환경 기반 프라이버시 보호 빅 데이터 배포 시스템 개발)

  • Kim, Dae-Ho;Kim, Jong Wook
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1785-1792
    • /
    • 2017
  • Generally, big data contains sensitive information about individuals, and thus directly releasing it for public use may violate existing privacy requirements. Therefore, privacy-preserving data publishing (PPDP) has been actively researched to share big data containing personal information for public use, while protecting the privacy of individuals with minimal data modification. Recently, with increasing demand for big data sharing in various area, there is also a growing interest in the development of software which supports a privacy-preserving data publishing. Thus, in this paper, we develops the system which aims to effectively and efficiently support privacy-preserving data publishing. In particular, the system developed in this paper enables data owners to select the appropriate anonymization level by providing them the information loss matrix. Furthermore, the developed system is able to achieve a high performance in data anonymization by using distributed Hadoop clusters.