• Title/Summary/Keyword: Information System Types

Search Result 3,565, Processing Time 0.035 seconds

Computation of Blocking Probability in a Loss System

  • Na, Seong-Ryong
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2005.05a
    • /
    • pp.203-207
    • /
    • 2005
  • A loss system where two types of customers arrive in accordance with two independent Poisson processes is considered. An efficient recursive formula is developed for calculating the loss probability when the number of servers is large. Some practical examples regarding the performance evaluation of telecommunications networks are discussed.

  • PDF

An Empirical Study of Logistics Performance and Outsourcing Types of Korean Distributors (유통업체의 정보물류시스템 아웃소싱 유형과 물류성과에 관한 실증연구)

  • Yoo, Chang-Kwon
    • Journal of Distribution Science
    • /
    • v.12 no.4
    • /
    • pp.41-46
    • /
    • 2014
  • Purpose - This study focused on providing strategic findings that make significant sense for companies that are looking for a future outsourcing strategy. The study analyzes the results of outsourcing in the information logistics systems field and verifies the results through experimental study of the performance delivered by logistics outsourcing types. Research design, data, and methodology - The study sample was assembled based on a random sampling method used to extract the initial 451 companies from a list of Korean distributors, wholesalers, and retailers. Following that sample process, 423 companies were confirmed by verifying their e-mail address and contacts (telephone and fax numbers), and were selected as initial research subjects. We reduced that number to 331 companies for the survey sample through telephone interviews in advance with the 423 companies that were targeted, in order to verify whether they are in the field of outsourcing of information logistics systems. The period of the survey extended from November 10, 2013 to January 10, 2014. The number of collected surveys totaled 181. We reviewed the contents of the survey responses, and reduced the number of research subjects to 175. In this study, we used a standard analysis to investigate whether there is a difference in distribution results based on different types of outsourcing information in the logistics system field and, through T-verification, we investigated whether the difference between distribution results in each group resulting from that standard analysis is statistically significant. Results - These results show that there is a difference in distribution outcome, based upon type of distribution outsourcing. In addition, we determined that they are meaningful results by confirming that, for usability and to improve the capabilities of a third-party logistics service supplier, both the choice of reasonable outsourcing types and the enhancement of various types of alliances are very important success factors. Taken together these study results, with a goal of enhancing the distribution capabilities of a Korean distributor, can be implemented to enhance management results achievable by supplying an information logistics system in the form of strategic outsourcing rather than in the form of simple outsourcing. In addition, the outcomes of logistics distributors in Korea that are using outsourcing in the logistics information systems field show high performance results in commercial endeavors in the following order: competitive, pre-competitive, non-competitive, and pro-competitive. Conclusions - This study focused on providing strategic findings. However, in the case of outsourcing in the field of information logistics systems of Korean distributors, there has been a focus on simple outsourcing rather than on strategic outsourcing; furthermore, there has been a concentration on non-competitive forms instead of pro-competitive forms, which could achieve better distribution results. This discussion is presented in more detail in the analysis results of this study.

개인 정보 역량 평가시스템 개발에 관한 연구

  • 윤취영;임춘성
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.148-154
    • /
    • 2003
  • An Evaluation System of Personal Information Competency was developed to evaluate individual Information competency and maturity levels in the enterprises of the information environment. The Evaluation System measures the requirements of information knowledge, skills, and mindset with the evaluation indices of personal information maturity. The indices are customized to four types of business departments - strategy Planning, development/maintenance, business applications, and administration support. Also, a maturity model of personal information competency is defined for interpretation of the evaluation results. The system was applied to assessment of actual human resources, 124 workers in an enterprise, to testify to its practical value. The case evaluation procedures include a series of questionnaires, written tests and application tests.

  • PDF

A Study on Interpretations of Children's Cognitive Information Processing in Reading Environment of Library (도서관 열람환경에서의 어린이 인지정보처리에 관한 연구)

  • Han, Gui-Yeun;Yoon, Sung-Kyu;Han, Young-Ho
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.1
    • /
    • pp.104-114
    • /
    • 2015
  • The library means to children a place where they find information necessary for them among a variety of knowledge and information to address their intellectual curiosity, which makes their lives wise and mature. There are not enough research materials understanding children's cognitive systems and behaviors in studies of a children's library with this necessity. This study divided and analyzed the behaviors of children, who were users into three types of reading in terms of information processing. First, it observed the types of reading depending on the stage of their cognitive development; Second, it analyzed the patterns of their behaviors through plays; and lastly, it presented the phases of their behaviors depending on the degree of an assistant's intervention. As a result of the study, the sensory system used and the space preferred differed depending on the stage of their cognition; there were differences in the patterns of their behaviors in each age group depending on the type of play; and there were differences in the children's ability of information processing depending on the assistant's ability. It is anticipated that there will be improvements of children's reading ability at the reading room in a better environment if the three types are considered in terms of information processing.

A study of the existing problems of digital libraries and their future environment (현존하는 디지털도서관의 문제점과 미래환경에 관한 연구)

  • 박일종
    • Journal of Korean Library and Information Science Society
    • /
    • v.27
    • /
    • pp.391-421
    • /
    • 1997
  • Information scientists need not to answer whether future libraries will be a digital library or not, but to answer how they are structured and served effectively to users currently. 'The library with walls' or 'the library as place' need to be existed in the future, but 'digital library without the wall' or 'virtual library' will need to be studied continuously. This study has tried to reveal the existing problems of digital libraries and their future environment after considering the ambiguous concepts of various types of electronic libraries and their efforts for library automation, and the changed information retrieval circumstances during the last 30 to 40 years through a qualitative document study. As a result, the major findings and suggestions are prepared. The library of the future will be a part of local and national cooperative systems, be filled with the intelligent use of old and new technologies, and be able to su n.0, pport both a place with extensive collections and convenient, easy, & free access to remote intellectual resources. Also, the information storage and retrieval (ISAR) to the future library system would easily provide users with any types of data retrieval system by anybody rather than by an expert or a specialist, so called 'A&E retrieval' in the coming 21th century. It will be highly possible that the future society changes to the information marketplace whose data may be recognized as an intangible assets.

  • PDF

Design of Traffic Data Acquisition System with Loop Defector and Piezo-Electric Sensor (루프검지기와 피에조 센서를 이용한 차량정보 수집 시스템 설계)

  • 한경호;양승훈
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.16 no.6
    • /
    • pp.102-108
    • /
    • 2002
  • This paper handles the design of a real time traffic data acquisition system using loop detector and piezo-electric sensor to acquire the vehicle information EISA compatible parallel I/O interface card is designed to sample 30 I/O channels at variable rates for raw traffic data acquisition. The control software is designed to generate the traffic data informations from the raw data. The traffic data information provides vehicle length, speed, number of axles, etc. Vehicle types are detected and categorized into eleven types from the vehicle length, axles positions and axle counts information. The traffic information is formed into packet and transferred to the remote hosts through serial communications for ITS applications.

The Mediating Effects of Bidirectional Knowledge Transfer on System Implementation Success

  • Kim, Jong Uk;Kim, Hyo Sin;Park, Sang Cheol
    • Asia pacific journal of information systems
    • /
    • v.25 no.3
    • /
    • pp.445-472
    • /
    • 2015
  • Although knowledge transfer between two different parties occurs in IS development projects, the majority of prior studies focused on knowledge transfer from IT consultants to clients. Considering two parts of knowledge transfer in IS development projects, we must consider both 'where knowledge is transferred from' and 'where it is transferred to'. Therefore, in this study, we attempt to describe two different routes of knowledge transfer, such as knowledge transfer from an IT consultant to a client and knowledge transfer from a client to an IT consultant. In this regard, we have examined the effect of two different routes of knowledge transfer on system implementation success in IS development project. Specifically, we adopted the knowledge stock-flow theory to examine the causal relationship between IT consulting firms and clients in terms of knowledge transfer and eventual system implementation success. Survey data collected from 213 pairs of individuals (both clients and IT consultants) were used to test the model using three different analytic approaches such as PLS (partial least squares) and two types of mediated regression techniques. We found that knowledge transfers partially mediated both the relationships between IT consultants' IT skills (project members' business knowledge) and system implementation success. Furthermore, the effects of each knowledge transfer were distinguished by depending on the types of system, such as ERP or groupware. Our attempts have significant implications for both research and practice given the importance of effective knowledge transfer to IT consulting.

Meta Data Modeling for Weapon System Design/Configuration Data Management System (무기체계 설계/형상정보 관리 시스템을 위한 메타 데이터 모델링)

  • Kim Ghiback
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.2 s.17
    • /
    • pp.65-73
    • /
    • 2004
  • In general, weapon system design/configuration data consist of system structure information which is linked to Part information, documents and drawings. For configuration management, version and revision control are necessary and access control of users to information should be managed for information security. Configuration data of weapon systems have various kinds of different meta data which are contained in the structure as well as attributes of parts and documents information. If neutral types of meta data models be used for building configuration management system, they can be applied to many different kinds of weapon systems with a little customization. In this paper, five meta data models are supposed and implementation results of them by using CBD(component based design) methodology are presented.

Case Based Reasoning in a Complex Domain With Limited Data: An Application to Process Control (복잡한 분야의 한정된 데이터 상황에서의 사례기반 추론: 공정제어 분야의 적용)

  • 김형관
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10c
    • /
    • pp.75-77
    • /
    • 1998
  • Perhaps one of the most versatile approaches to learning in practical domains lies in case based reasoning. To date, however, most case based reasoning systems have tended to focus on relatively simple domains. The current study involves the development of a decision support system for a complex production process with a limited database. This paper presents a set of critical issues underlying CBR, then explores their consequences for a complex domain. Finally, the performance of the system is examined for resolving various types of quality control problems.

  • PDF

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF