• Title/Summary/Keyword: 자원 배치

Search Result 412, Processing Time 0.03 seconds

Cultural Differences impact on the ERP System Implementation (문화 차이가 ERP 시스템 구현에 미치는 영향)

  • Kim, Kyung-Ihl;Park, Ji-Young
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.1-9
    • /
    • 2016
  • In the modern business environment, ERP System is a tool for efficient use of the resources of the company. Implementation of the ERP System is not a simple introduction of the unit system. The changes and innovation of the company will be made through the BPR. And then, the BPR is made based on the system design and implementation. Cultural difference creates a difference in the attitudes and relationships of members of company. and, Cultural difference produce differences in organizational culture and operating principles. Cultural differences can mention the differences in the cultures of East and West, and can mention the difference between each country within the same culture. In the paper, we determine the impact of cultural differences on the implementation of the ERP System. Cultural differences affect the implementation process and the decision-making process, user interface.

Analysis of Objects, Contents and Formative Evaluation for Computer Textbooks for Elementary School Grades in Korea (초등학교 저학년 컴퓨터 교과서 목표.내용 및 평가의 분석)

  • Lee, Jae-Mu
    • Journal of The Korean Association of Information Education
    • /
    • v.10 no.1
    • /
    • pp.67-74
    • /
    • 2006
  • This study attempts to analyze fifteen computer textbooks for the first and second grades. The textbooks were analyzed by the following characteristics: goals, contents, and formative evaluation. Evaluation criteria from previous works were selected for advantages and identify the problems. In addition, advice for teachers using these books is proposed. The results of the analyses of current computer textbooks are the following: Firstly, in the area of goals and contents, most textbooks clearly define learning goals for each unit. Secondly, in the area of content, some textbooks have a large volume for first and second grade students, and they do not provide enough integration with other subjects. Finally, they do not provide formative evaluation to achieve for goals.

  • PDF

A Study On Optimized Design of Decision Support Systems for Container Terminal Operations (컨테이너 터미널 운영을 위한 의사결정시스템 설계의 최적화에 관한 연구)

  • Hong, Dong-Hee;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.519-528
    • /
    • 2003
  • Container terminals need decisions in the course of daily-24 hour and 365 day - operations, and all these decisions are inter-related. The ultimate goal of Decision Support System is to minimize ship loading/unloading time, resources used to handle the workload, and congestion on the roads inside the terminal. It is also to make the best possible use of the storage space available. Therefore, the necessity of decision support tools are emphasized to enhance the operational efficiency of container shipping terminals more, because of limits and complexity of these decisions. So, in thia paper, we draw evaluation items for Decision Support Systems and suggest optimization strategy of evaluation items which have the greatest influence on Decision Support system, that is, yard stacking allocation, RTGC deployment among blocks, and YT allocation to QCs. We also estimate the efficiency of Decision Support System design by simulation using G2 language, comparing ship loading/unloading time.

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

Railroad accident analysis and countermeasure (철도사고 분석과 대책)

  • Ahn, Chang-Geun;Lee, Won-Young
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.658-670
    • /
    • 2007
  • Most railroad accidents are due to human errors. In particular, most of the causes of these accidents are faults of an engine driver, such as lack of signal confirmation, insecure braking, driving by guess or force of habit. This paper identifies a problem(s) by analyzing accidents for the past 10 years and also seeks a solution to train good engine drivers in order to prevent railroad accidents. In summary, what is needed are: 1) proper placement of various manpower, 2) proper training of engine drivers, 3) proper legislation for a 2-man on board system, and 4) proper reformation of personnel management.

  • PDF

A Study on the Model of School Digital Library Based Differentiated School′s Sizes (학교도서관 디지털자료실의 규모별 모형에 관한 연구)

  • Lee, Byeong-Ki
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.4
    • /
    • pp.49-67
    • /
    • 2002
  • School libraries are one of the essential parts for high quality education. The Seventh Educational Cumiculum emphasizes the development of creative and autonomous students who can solve problems in a self-directed way. The Ministry of Education and Human Resources Development come into forcing the installation of school digital library since 2001. Also, the Ministry of Education and Human Resources Development has presented the Master Plan of School's Activation in July 2002. In this situation, the research and discussion on effective model of school digital library are very important. Thus, This study aims to design a model of school digital library differentiated School's sizes depending on primary and secondary school's current status. This study is proposed 4 facility model of school digital library based differentiated school's sizes and designed A-type, B-Type model on individual model.

Development of Intuitive Author for 3D Game/Animation Contents (효율적인 3D 게임 및 애니메이션 콘텐츠 제작을 위한 직관적인 저작 기술 개발)

  • Ji, Su-Mi;Lee, Jeong-Joong;Kim, Sung-Gook;Woo, Kyeong-Deok;Baik, Sung-Wook
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.780-791
    • /
    • 2010
  • This paper presents a semi-autonomous authoring method which can intuitively create 3D game/ animation contents for unexperienced users. In particular, this method considers their convenience to provide them with easier authoring environments. The 3D game/animation contents created by this method consist of several scene components connected to each other in a logical flow structure. Thus, it is possible to easily understand the overview of 3D content description for its production and manipulate these scene components for efficient management. Four different genres of game/animation contents have been developed by using an authoring tool based on this method. According to results of a survey intended for game developers who created game contents with the authoring tool, this method is shown to save contents development cost/time as well as raise the efficiency and convenience of whole process of contents creation to the expected level.

Service Mobility Support Scheme in SDN-based Fog Computing Environment (SDN 기반 Fog Computing 환경에서 서비스 이동성 제공 방안)

  • Kyung, Yeun-Woong;Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.39-44
    • /
    • 2020
  • In this paper, we propose a SDN-based fog computing service mobility support scheme. Fog computing architecture has been attracted because it enables task offloading services to IoT(Internet of Things) devices which has limited computing and power resources. However, since static as well as mobile IoT devices are candidate service targets for the fog computing service, the efficient task offloading scheme considering the mobility should be required. Especially for the IoT services which need low-latency response, the new connection and task offloading delay with the new fog computing node after handover can occur QoS(Quality of Service) degradation. Therefore, this paper proposes an efficient service mobility support scheme which considers both task migration and flow rule pre-installations. Task migration allows for the service connectivity when the fog computing node needs to be changed. In addition, the flow rule pre-installations into the forwarding nodes along the path after handover enables to reduce the connection delay and service interruption time.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.