• Title/Summary/Keyword: user groups

Search Result 865, Processing Time 0.028 seconds

Designing a Fuzzy Expert System with a Hybrid Approach to Select Operational Strategies in Project-Based Organizations with a Selected Competitive Priority

  • Javanrad, Ehsan;Pooya, Alireza;Kahani, Mohsen;Farimani, Nasser Motahari
    • Industrial Engineering and Management Systems
    • /
    • v.16 no.1
    • /
    • pp.129-140
    • /
    • 2017
  • This research was conducted in order to solve the problem of selecting an operational strategy for projects in project-based organizations by designing a fuzzy expert system. In the current research, we first determined the contributing parameters in operational strategy of project-based organizations based on existing research literature and experts' opinion. Next, we divided them into two groups of model inputs and outputs and the rules governing them were determined by referring to research literature and educational instances. In order to integrate rules, the revised Ternary Grid (revised TG) and expert opinions were applied according to a hybrid algorithm. The Ultimate rules were provided in Fuzzy Inference System format (FIS). In this FIS, proper manufacturing decisions are recommended to the user based on selected competitive priority and also project properties. This paper is the first study in which rules and relations governing the parameters contributing operational strategy in project-based organizations are acquired in a guided integrated process and in the shape of an expert system. Using the decision support system presented in this research, managers of project-based organizations can easily become informed of proper manufacturing decisions in proportion with selected competitive priority and project properties; and also be ensured that theoretical background and past experiences are considered.

Performance Analysis of Two-Way Relay NOMA Systems with Hardware Impairments and Channel Estimation Errors

  • Tian, Xinji;Li, Qianqian;Li, Xingwang;Zhang, Hui;Rabie, Khaled;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5370-5393
    • /
    • 2019
  • In this paper, we consider a two-way relay non-orthogonal multiple access (TWR-NOMA) system with residual hardware impairments (RHIs) and channel estimation errors (CEEs), where two group users exchange their information via the decode-and-forward (DF) relay by using NOMA protocol. To evaluate the performance of the considered system, exact analytical expressions for the outage probability of the two groups users are derived in closed-form. Moreover, the asymptotic outage behavior in the high signal-to-noise ratio (SNR) regime is examined and the diversity order is derived and discussed. Numerical simulation results verify the accuracy of theoretical analyses, and show that: i) RHIs and CEEs have a deleterious effects on the outage probabilities; ii) CEEs have significant effects on the performance of the near user; iii) Due to the RHIs, CEEs, inter-group interference and intra-group interference, there exists error floors for the outage probability.

A Study on the Satisfaction of User Groups of the Digital Library System (디지털자료실지원센터(DLS)의 이용자 집단간 만족도에 관한 연구)

  • Lee, Byeong-Ki
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.3 s.57
    • /
    • pp.129-145
    • /
    • 2005
  • DLS(Digital Library System) have been established by Ministry of Education and Human Resources Development for providing the application services to each school library managers(teacher librarian) and front end users such as students and teachers. DLS's are separately operated by 15 major metropolitan or provincial office of education to cover all elementary, middle and high schools in Korea. There is a necessity which it will analyze the current status of DLS because it's system after starting a service 2 years passed. This study suggested to improvements strategies of DLS by survey from teacher librarian, subject teacher, students of 308 schools.

A Multi-Layer Graphical Model for Constrained Spectral Segmentation

  • Kim, Tae Hoon;Lee, Kyoung Mu;Lee, Sang Uk
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.437-438
    • /
    • 2011
  • Spectral segmentation is a major trend in image segmentation. Specially, constrained spectral segmentation, inspired by the user-given inputs, remains its challenging task. Since it makes use of the spectrum of the affinity matrix of a given image, its overall quality depends mainly on how to design the graphical model. In this work, we propose a sparse, multi-layer graphical model, where the pixels and the over-segmented regions are the graph nodes. Here, the graph affinities are computed by using the must-link and cannot-link constraints as well as the likelihoods that each node has a specific label. They are then used to simultaneously cluster all pixels and regions into visually coherent groups across all layers in a single multi-layer framework of Normalized Cuts. Although we incorporate only the adjacent connections in the multi-layer graph, the foreground object can be efficiently extracted in the spectral framework. The experimental results demonstrate the relevance of our algorithm as compared to existing popular algorithms.

  • PDF

The Analysis of the Academic Information Seeking Behavior of Electronic Engineering Graduate Students (전자공학전공 대학원생들의 학술정보 이용행태 분석)

  • 박일종;백수연
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.3
    • /
    • pp.31-58
    • /
    • 2001
  • The objective of this study was to provide the basic information necessary for the efficient library service policy for the graduate students in engineering field as investigating the academic information seeking behavior and demands of users who major in electronic engineering at a graduate program. Literature studies and survey through questionnaire were conducted for the purpose. The established theories were synthetically examined through literature studies, and theoretical systematization and structure for positive research were framed. Graduate students in engineering field were classified into two groups: those who major in electronic engineering and the others, and their demands for information and its seeking behavior were comparatively analyzed in this thesis.

  • PDF

Analysis of Author Image Based on Book Recommendation from Readers (독자 추천도서 정보를 이용한 작가 이미지 분석 연구)

  • Choi, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.4
    • /
    • pp.153-171
    • /
    • 2017
  • Many readers tend to read books of a specific author and to expand their reading areas according to the author. This study chose Edgar Allan Poe and analyzed the image of the author using co-recommended authors and books by other readers. The frequencies of co-occurred authors and books were investigated and the relations of authors and books were analyzed with network analysis methods. As a result, genre images of Poe, related authors, and related books are discovered. This study also suggested the methods to identify the image of a author, related author groups, and related books for libraries' reading programs and book curation.

Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain

  • Pham, Giao N.;Kwon, Ki-Ryong;Lee, Eung-Joo;Lee, Suk-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.4
    • /
    • pp.152-159
    • /
    • 2017
  • Three-dimensional (3D) printing is applied to many areas of life, but 3D printing models are stolen by pirates and distributed without any permission from the original providers. Moreover, some special models and anti-weapon models in 3D printing must be secured from the unauthorized user. Therefore, 3D printing models must be encrypted before being stored and transmitted to ensure access and to prevent illegal copying. This paper presents a selective encryption algorithm for 3D printing models based on clustering and the frequency domain of discrete cosine transform. All facets are extracted from 3D printing model, divided into groups by the clustering algorithm, and all vertices of facets in each group are transformed to the frequency domain of a discrete cosine transform. The proposed algorithm is based on encrypting the selected coefficients in the frequency domain of discrete cosine transform to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The decrypting error is approximated to be zero. The proposed algorithm provides a better method and more security than previous methods.

Usability Assessment of an Integrated Cataloging and Metadata Services: an Exploratory Study of the OCLC Connexion System (통합 목록/메타데이터 서비스의 유저빌러티 평가: OCLC Connexion 시스템에 대한 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.4
    • /
    • pp.191-221
    • /
    • 2007
  • The goal of this study was to examine the relationships between usability and the searching experience, and to uncover where an integrated cataloging and metadata system lay the usability problems of its primary users, catalogers. This study showed that the most important aspect of usability in Connexion lay in the experience of information retrieval system. Also, it showed there are seventeen usability problems to be improved in Connexion. Needless to say, it is most important to note that usability is not an exclusive goal of such an integrated cataloging and metadata system. Other goals such as quality of catalogs, and the reliability of its cataloging and metadata system are equally its concern. This study also suggested more testing on diverse cataloging systems and specific user groups, especially catalogers.

OVERVIEW OF COMS GROUND SYSTEM AT METEOROLOGICAL SATELLITE CENTER OF KMA

  • Lee, Hyun-Kyoung;Lee, Bong-Ju;Lee, Yong-Sang;Shim, Jae-Myun;Suh, Ae-Sook;Kim, Hong-Sic;Je, Chang-Eon
    • Proceedings of the KSRS Conference
    • /
    • v.1
    • /
    • pp.159-162
    • /
    • 2006
  • This paper describes the ground system for COMS (Communication, Ocean, and Meteorological Satellite), the first Korean multi-purposed geostationary satellite, at MSC (Meteorological Satellite Center) in Korea. The overview of COMS MI (Meteorological Imager) will be introduced as well. KMA would implement mission planning for COMS MI operation and receive, process, interpret, disseminate, and archive MI data operationally for domestic and foreign user groups. Major missions of COMS MI are mitigation of natural hazard such as typhoon, dust storm, and heavy rain, and short-term warning of severe weather to protect human health and commerce. Moreover, research of climate variability and long-term changes will be supported. In accordance with those missions, the concept and design of COMPASS (COMS operation and meteorological products application service system), the ground system for COMS MI in MSC, have been setting up since 2004. Currently, COMPASS design is being progressed and will have finished the end of 2006. The development of COMPASS has three phases: first phase is development of fundamental COMPASS components in 2007, second phase is to integrate and test all of the COMPASS components in 2008, and the last phase is to operate COMPASS after COMS In-Orbit Tests in 2009.

  • PDF

Game Bot Detection Approach Based on Behavior Analysis and Consideration of Various Play Styles

  • Chung, Yeounoh;Park, Chang-Yong;Kim, Noo-Ri;Cho, Hana;Yoon, Taebok;Lee, Hunjoo;Lee, Jee-Hyong
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1058-1067
    • /
    • 2013
  • An approach for game bot detection in massively multiplayer online role-playing games (MMORPGs) based on the analysis of game playing behavior is proposed. Since MMORPGs are large-scale games, users can play in various ways. This variety in playing behavior makes it hard to detect game bots based on play behaviors. To cope with this problem, the proposed approach observes game playing behaviors of users and groups them by their behavioral similarities. Then, it develops a local bot detection model for each player group. Since the locally optimized models can more accurately detect game bots within each player group, the combination of those models brings about overall improvement. Behavioral features are selected and developed to accurately detect game bots with the low resolution data, considering common aspects of MMORPG playing. Through the experiment with the real data from a game currently in service, it is shown that the proposed local model approach yields more accurate results.