• Title/Summary/Keyword: 서비스 요구사항 분석

Search Result 1,015, Processing Time 0.025 seconds

A Comparative Analysis of Bioinformation Website Services (생명정보 분야 웹사이트 서비스에 대한 비교.분석에 관한 연구)

  • Ahn, Bu-Young;Lee, Eung-Bong
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.157-181
    • /
    • 2009
  • As the information technology is evolved and the human genome project is finalized over the world, the Bioinformatics - the integration of abundant Biological science and information technology - has shown up and is continuously being advanced. Together with the evolution of Bioinformatics, the websites dealing with Bioinformation have been set up to provide relevant information to the Bioscientists. Among the numerous global websites, the preferred websites by the majority of domestic Bioscientists are BRIC (Biological Research Information Center) of POSTECH(Pohang University of Science and Technology) in Korea, CCBB(Center for Computational Biology and Bioinformatics) of KISTI(Korea Institute of Science and Technology Information), KOBIC(Korean Bioinformation Center) of KRIBB(Korea Research Institute of Bioscience and Biotechnology), NCBI(National Center for Biotechnology Information) in USA, EBI(European Bioinformatics Institute) in Europe and DDBJ(DNA Data Bank of Japan) in Japan. In this paper, the comparative analysis was executed by investigating contents status and functions of the above-mentioned 6 websites. In addition, questionnaire survey of Bioscience Researchers' utilization status and their needs to those 6 websites was conducted.

Content Analysis of Collaborative Digital Reference Service Knowledge Information Database (협력형 디지털 참고서비스(CDRS) 지식정보DB 내용분석 연구)

  • Jang, Su Hyun;Nam, Young Joon
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.2
    • /
    • pp.101-123
    • /
    • 2021
  • This study analyses the questions and answers contained in the Knowledge Information Database of the collaborative digital reference service, 'Ask a librarian'. And based on the results of status of user requests, this study draws information usage behavior in the early stages of the service was derived. 1,124 Knowledge Information Database items out of 3,506 cases was analyzed by nine criterion. ① Number of questions and whether to be reference questions, ② Subject and keywords of the question, ③ Purpose of the question, ④ Type of question, ⑤ User's information request, ⑥ Information source and reference services provided by the librarian, ⑦ Number of days to answer, ⑧ Level of the participating library, ⑨ Question type by topic. As a results of analysis, first, users asked for reference questions from various topics as needed, rather than one from a similar topic at a time, but more than half of the total pure reference questions were from the field of library information science. Second, about 71.35% of users were using the 'Ask a librarian' service to recommend a list of information resources related to a particular topic or research problem, and there were also questions that required consultation on the reading situation. Third, the most preferred sources of information for users were bibliography, and in the case of online information sources, users did not relatively prefer them. Fourth, the number of days required to answer was able to confirm significant differences depending on the type of question and the level of the participating library. Fifth, 31.33% of the purpose of the general field question showed that were self-generated.

Investigation on Library Services for Visually Imparied at Public Libraries (공공도서관 시각장애인실 서비스에 관한 조사 연구 - 한밭도서관 시각장애인실을 중심으로 -)

  • Kim Young-Shin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.38 no.3
    • /
    • pp.177-199
    • /
    • 2004
  • Information technology and internet became necessities of life facilitating communication and information access. Physically handicapped people, who cannot access to new Information easily due to economic, technical and physical handicaps, are likely to live with severe disadvantage in the high-speed information society in which information access right is considered as one of the basic human rights. Therefore, It is highly desirable to develop and improve library service programs for visually imparied at public libraries. In this study, the analyse of service activities for the visually unpaired at Hanbat Public Library and the investigation of user's needs and provider's points of view of staff members through individual Interviews were followed by the propositions gor the Improvement of services at local public libraries. And the consrtuction of cooperative networks with proper role-shares among service rooms for visually Imparired In public libraries, special libranes, social welfare organigations and government offices was confrimed to be the most urgent task.

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

자동차 대리점 영업사원의 개인역량이 자동차 판매 성과에 미치는 영향 연구

  • Kim, Mi-Hoe;Bae, Byeong-Yun;Jeon, Gi-Seok
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2018.04a
    • /
    • pp.79-92
    • /
    • 2018
  • 영업사원들은 자동차산업에서 유통시스템의 핵심적인 역할을 담당하고 있다. 자동차라는 상품의 특성상 고객들은 구매의사 결정과정에 있어 높은 수준의 정보와 지원을 요구한다. 영업사원들은 고객의 요구사항에 맞춰 서비스를 제공함으로써 고객의 결정과정을 돕는다. 따라서 자동차 영업사원의 개인적 역량은 자동차 판매 성과를 높이는데 있어 매우 중요한 영향을 미치게 된다. 이와 같은 배경을 바탕으로 본 연구는 자동차 영업사원의 개인역량과 판매성과 사이에 정(+)의 상관관계가 있을 것으로 보고 실증 분석하였다. 본 연구에서는 개인역량을 1) 판매기술 전문성 2) 영업사원의 태도 및 고객과의 관계형성 3) 감성활용 4) 감성조절 네 가지의 독립변수로 구분하여 종속변수인 판매성과와의 상관관계를 측정하였다. 연구 가설을 검증하기 위해 기존의 선행연구와 문헌을 토대로 가설을 설정하고 검증하였으며 경기도와 강원지역의 자동차 대리점에 근무하는 영업사원 300명을 대상으로 설문조사를 실시하였다. 회부된 유효 설문지 268부는 통계 프로그램 SPSS WIN24.0를 이용해 분석하였다. 실증분석 결과 자동차 영업사원의 개인역량의 요인으로 판매기술 전문성과 감성활용은 영업사원의 판매성과에 정(+)의 영향을 미치는 것으로 나타났다. 반면, 태도 및 관계형성과 감정조절이 판매성과에 정의적인 영향을 미칠 것이라는 가설은 기각되었다. 이와 같은 결과는 개인역량은 영업사원을 채용하는데 있어 고려해야할 중요한 요소임을 시사한다.

  • PDF

An Efficient Data Traffic Estimation Technique in Defense Information Network through Network Simulation (네트워크 시뮬레이션을 통한 군 통신 정보유통량의 효율적 예측 기법)

  • An, Eun-Kyung;Lee, Seung-Jong
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.1
    • /
    • pp.133-158
    • /
    • 2006
  • The change of information and communications technology affects into many parts of military battlefield as the future warfare will be information-oriented warfare, relying on information technology. The more IT-based military systems are deployed the more multimedia data traffic increase. To accommodate such user's requirements the bandwidth capacity of military communications network must be upgraded. The cost of upgrading network capacity is increasing as well. But there has no systematic estimation approach to analyze the amount of data traffic in the military network. In this paper we suggest an efficient data traffic estimation technique using network simulation with the respect of Input and output, scenario, toolset and technique, and experimental environments.

A Study on an WiBro and WiFi Interworking Architecture design and performance analysis for Service Continuity (서비스 연속성 지원을 위한 WiBro-WiFi 상호연동 아키텍쳐 설계 및 성능 분석에 관한 연구)

  • Mok, Kyungyul;Lee, Gowoon;Joh, Hangki;Ryoo, Intae
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.471-479
    • /
    • 2013
  • WiBro technology provide mobile devices with a transmission speed of more than 1 Mbps even under the condition of high mobility (120 km/h). In a building, however, there is more demand for high bandwidth for various activities, and WiBro services may not be available. In order to guaranteeing a seamless service continuity and high transmission capability for mobile users within a specific establishment that has deployed WiBro network, we should secure an internetworking platform for WiBro and WiFi networks. This paper introduces WiMax forum and 3GPP standards, proposes WiBro-WiFi Interworking (WWI) architecture, its implementation details, and finally verifies validity of the proposal by using OPNet simulations.

Function verification and demonstration of mobile Gallery-Auction using NFC-based 2-Factor electronic payment (NFC 기반 2 Factor 전자결제를 이용한 모바일 갤러리-옥션의 기능 검증 및 시현)

  • Cha, Yoon Seok;Oh, Soo Hee;Kim, YongIl;Noh, SunKuk
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.24-30
    • /
    • 2018
  • Acquisition of the FIDO authentication technology in pursuit of improved security function of the NFC-based 2 factor electronic payment system enabled GenoTech Ch., Ltd. to develop its new service, Gallery-Auction, demoed at Daegu Exhibition. The demonstration was followed by the improvement requests in banner creation & installation, changes in UI, changes in order of operation, etc, which were taken into account for the succeeding update. During the second demonstration held at 'Art: Gwangju: 17,' it analyzed and visualized the number of visitors per hour there.

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

A study on the security threat and security requirements for multi unmanned aerial vehicles (무인기 군집 비행 보안위협 및 보안요구사항 연구)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.195-202
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) have mostly been used for military purposes but with the progress in ICT and reduced manufacturing costs, they are increasingly used for various private services. UAVs are expected to carry out autonomous flying in the future. In order to carry out complex tasks, swarm flights are essential. Although the swarm flights has been researched a lot due to its different network and infrastructure from the existing UAV system, There are still not enough study on security threats and requirements for the secure swarm flights. In this paper, to solve these problems, UAV autonomous flight technology is defined based on US Army Corps of Engineers (USACE) and Air Force Research Laboratory (AFRL), and swarm flights and security threat about it are classified. And then we defined and compared security requirements according to security threats of each swarm flights so as to contribute to the development of secure UAC swarm flights in the future.