• Title/Summary/Keyword: 기술정보 공유

Search Result 2,648, Processing Time 0.034 seconds

Business Process Model for Progress Phase of Design-Build Project (설계시공일괄방식 사업의 진행단계별 업무프로세스 모델)

  • Song, Young-Woong;Son, Bo-Sik;Chun, Jae-Youl;Choi, Yoon-Ki
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.4
    • /
    • pp.38-49
    • /
    • 2009
  • In public project market, design-build projects have been increased because of market trend change which enables technical competition. In this condition, its importance is also getting important. Generally, life cycle of design-build project consists of planning, preliminary design, procurement, contract, detail design, start of construction, construction, end of construction, and evaluation. From contractor's viewpoint, it has problems such as difficulties in project management and information sharing because of frequent change of charged division. To solve these problems, it is desirable to change from function-based management system to process-based management system. The purpose of this study is to develop management process model for design-build project by progress phases. This study analyzed main conflicts and decision making factors of each stage in design-build projects, then systemized management subjects' responsibilities and management points' change. And also this study defined the key information that is the key point by project characteristics and progress phases. Based on this analysis, this study did business process modeling from planning stage to construction design check stage. At last, we proposed the way to manage business process by design-build project progress.

Preference-based Supply Chain Partner Selection Using Fuzzy Ontology (퍼지 온톨로지를 이용한 선호도 기반 공급사슬 파트너 선정)

  • Lee, Hae-Kyung;Ko, Chang-Seong;Kim, Tai-Oun
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.37-52
    • /
    • 2011
  • Supply chain management is a strategic thinking which enhances the value of supply chain and adapts more promptly for the changing environment. For the seamless partnership and value creation in supply chains, information and knowledge sharing and proper partner selection criteria must be applied. Thus, the partner selection criteria are critical to maintain product quality and reliability. Each part of a product is supplied by an appropriate supply partner. The criteria for selecting partners are technological capability, quality, price, consistency, etc. In reality, the criteria for partner selection may change according to the characteristics of the components. When the part is a core component, quality factor is the top priority compared to the price. For a standardized component, lower price has a higher priority. Sometimes, unexpected case occurs such as emergency order in which the preference may shift on the top. Thus, SCM partner selection criteria must be determined dynamically according to the characteristics of part and its context. The purpose of this research is to develop an OWL model for the supply chain partnership depending on its context and characteristics of the parts. The uncertainty of variable is tackled through fuzzy logic. The parts with preference of numerical value and context are represented using OWL. Part preference is converted into fuzzy membership function using fuzzy logic. For the ontology reasoning, SWRL (Semantic Web Rule Language) is applied. For the implementation of proposed model, starter motor of an automobile is adopted. After the fuzzy ontology is constructed, the process of selecting preference-based supply partner for each part is presented.

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

Comparative Study of Machine learning Techniques for Spammer Detection in Social Bookmarking Systems (소셜 복마킹 시스템의 스패머 탐지를 위한 기계학습 기술의 성능 비교)

  • Kim, Chan-Ju;Hwang, Kyu-Baek
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.345-349
    • /
    • 2009
  • Social bookmarking systems are a typical web 2.0 service based on folksonomy, providing the platform for storing and sharing bookmarking information. Spammers in social bookmarking systems denote the users who abuse the system for their own interests in an improper way. They can make the entire resources in social bookmarking systems useless by posting lots of wrong information. Hence, it is important to detect spammers as early as possible and protect social bookmarking systems from their attack. In this paper, we applied a diverse set of machine learning approaches, i.e., decision tables, decision trees (ID3), $na{\ddot{i}}ve$ Bayes classifiers, TAN (tree-augment $na{\ddot{i}}ve$ Bayes) classifiers, and artificial neural networks to this task. In our experiments, $na{\ddot{i}}ve$ Bayes classifiers performed significantly better than other methods with respect to the AUC (area under the ROC curve) score as veil as the model building time. Plausible explanations for this result are as follows. First, $na{\ddot{i}}ve$> Bayes classifiers art known to usually perform better than decision trees in terms of the AUC score. Second, the spammer detection problem in our experiments is likely to be linearly separable.

A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths (4가지 운영모드와 128/256-비트 키 길이를 지원하는 ARIA-AES 통합 암호 프로세서)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.795-803
    • /
    • 2017
  • This paper describes a dual-standard cryptographic processor that efficiently integrates two block ciphers ARIA and AES into a unified hardware. The ARIA-AES crypto-processor was designed to support 128-b and 256-b key sizes, as well as four modes of operation including ECB, CBC, OFB, and CTR. Based on the common characteristics of ARIA and AES algorithms, our design was optimized by sharing hardware resources in substitution layer and in diffusion layer. It has on-the-fly key scheduler to process consecutive blocks of plaintext/ciphertext without reloading key. The ARIA-AES crypto-processor that was implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,658 gate equivalents (GEs), and it can operate up to 95 MHz clock frequency. The estimated throughputs at 80 MHz clock frequency are 787 Mbps, 602 Mbps for ARIA with key size of 128-b, 256-b, respectively. In AES mode, it has throughputs of 930 Mbps, 682 Mbps for key size of 128-b, 256-b, respectively. The dual-standard crypto-processor was verified by FPGA implementation using Virtex5 device.

Extending a WebDAV Protocol to Efficiently Support the Management of User Properties (사용자 속성 관리의 효율적 지원을 위한 WebDAV 프로토콜의 확장)

  • Jung Hye-Young;Kim Dong-Ho;Ahn Geon-Tae;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1057-1066
    • /
    • 2005
  • WebDAV(Web-based Distributed Authoring and Versioning), a protocol which supports web-based distributed authoring and versioning, provides a standard infrastructure for asynchronous collaboration on various contents through the Internet. A WebDAV property management is a function to set and manage the main information of the resources as properties, and a user property, one kind of the WebDAV properties, has the ability to be freely defined by users. This free definition of user property makes it very useful to develop web-based applications like a collaboration system based on WebDAV However, with an existing WebDAV property management scheme, there is a limit to develop various applications. This paper describes a DavUP(WebDAV User property design Protocol) protocol which extended the original WebDAV and its uti-lization which efficiently supports management of WebDAV user properties. DavUP needs the definition of the collection structure and type definition properties for an application. To do this, we added a new header md appropriated WebDAV method functions to the WebDAV protocol. To show the usefulness of DavUP protocols, we extended our DAVinci WebDAV server to support DavUP Protocols and experimentally implemented a general Open Workspace, which provides effective functions to share and exchange open data among general users, on the DAVinci.

An Item Pool System for Leveled Assessment (수준별 평가를 위한 문제은행 시스템)

  • Hong, Jong-Gee;Jun, Woo-Chun
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.3
    • /
    • pp.298-307
    • /
    • 2002
  • Recent advances in the Web technology have been changing our life in various aspects. These advances have brought us new paradigms of education. The Web provides teachers with many opportunities to implement wide ranges of new teaching and learning practices, which supplement the traditional classroom teaching-learning. Especially, the Web enables so-called WBI (Web-based instruction) system as a teaching aid. Now the WBI system can incorporate multimedia information with various communication and collaborative tools. In order for the WBI system to be successful, various supports are necessary. One of such supports comes from assessment. In this work, an item pool system for leveled assessment is designed and implemented. The proposed system has the following characteristics. First, the item pool is classified into three categories subject, semester, and chapter. This categorization makes lookup easier and faster. Second, any teacher can use the item pool system and enter their questions into the item pool. Third, the proposed system reflects various levels of students for each course. Thus, students can select their exams based on their progress and background. Finally, it can make difficulty of each item to be objective by repeated tests and refinements.

  • PDF

The Possibility of E-Books' and Digital Libraries' Coexistence with the Current Legal System (전자책과 디지털도서관, 그리고 현행법의 상생 가능성)

  • Lee, Young-Dae;Kim, Hanah
    • Informatization Policy
    • /
    • v.18 no.4
    • /
    • pp.85-102
    • /
    • 2011
  • The world is focusing on e-books as the e-book market is growing rapidly as a fused industry at the crossroads of information technology and digital content. Many countries are actively participating in this new market and leveraging on its potential and growth, while Korea's market is still in its preliminary stage. There is a good reason to be concerned over the fact that access to digitalized materials that are the most relevant to the current time are not readily available. Therefore, the strategy in collecting and utilizing content must be newly refurbished. In order to do this, the legal issues and policies related to digital libraries must be considered. The most relevant examples from abroad are Google Book Search and the EU's Europeana project. Then, what are the necessary measures for Korea to materialize its own digital library? Digital libraries can significantly influence social welfare and bring forth economic effects. Social preparation surrounding this subject should continue to increase because digital libraries will change the manner in which people share and use information. Therefore, this paper aims to examine the legal and economic problems and issues related to the establishment of digital libraries as well as to provide policy recommendations.

  • PDF

A Preliminary Study of Prototype for Improving VE Workshop Phase based on BIM (BIM 기반 VE 워크샵 단계의 업무 향상을 위한 프로토타입 개발에 관한 기초연구)

  • Kim, Hojun;Park, Heetaek;Park, Chansik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.3
    • /
    • pp.113-122
    • /
    • 2015
  • VE workshop is performed based on VE expert' experiences without retrieving VE data of similar previous projects. Moreover, it usually omitted or applied for the sake of formality due to insufficiently understanding VE function, limited time, space and budget. Even though many studies have established VE databases for retrieving and reusing VE data, VE workshop is still inefficient and ineffective to improve projects' values. With this regard, this study proposes a preliminary prototype for improving VE workshop, which utilizes the state-of-the-art information communication technologies(ICTs) including Building Information Modeling(BIM), Mobile Computing(MC), Network Service System(NSS), and Database Management System(DBMS) for better managing, storing and reusing VE data. The prototype was developed to evaluate advantages and limitations. The results show that the proposed prototype can support visual VE data retrieval from similar previous projects, enhance communication among VE team and save much time and cost comparing to traditional VE. Through this, the productivity of VE workshop can improve efficiently and effectively.

A Study on Development of Common Criteria for Evaluation of Internet Ethics Index (인터넷윤리 지수의 평가를 위한 공통 기준 개발에 관한 연구)

  • Lee, Young-Han;Kim, Jeong-Dong;Park, Jeong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.75-85
    • /
    • 2016
  • Changes in the distribution and sharing information using the Internet is changing the most part in our daily life, Utilizing the Internet of our lives to the rapid development of IT technology, are living in the off-line (off-line) and online (on-line) a mix of life, We expect now online life specific gravity is further increased. However, do not systematically implement the education of Internet ethics awareness deficiencies of objective indicators to assess the current knowledge level of the Internet ethics is the actual situation. Therefore, in this paper, it provides a development process in order to establish a common standard for the evaluation of Internet ethics index. Development procedure of Internet ethics index in order to establish a common standard, "evaluation item (draft) derivation", "Creating a questionnaire", "the calculation of the analysis and item-by-item weight of the questionnaire", and a common reference determination of the stage having. Was also a questionnaire that target 46 people to calculate the weight of the common reference. Internet ethics index evaluation model through the establishment of the common standards developed in this paper, municipal road Office of Education, related organizations, high school, such as small, medium, can be utilized as an indicator to measure the Internet ethics education level.