• Title/Summary/Keyword: Information analysis system

Search Result 18,880, Processing Time 0.046 seconds

Modeling a Business Performance Information System with Knowledge Discovery in Databases (데이터베이스 지식발견체계에 기반한 경영성과 정보시스템의 구축)

  • Cho, Seong-Hoon;Chung, Min-Yong;Kim, Jong-Hwa
    • IE interfaces
    • /
    • v.14 no.2
    • /
    • pp.164-171
    • /
    • 2001
  • We suggest a Business Performance Information System with Knowledge Discovery in Databases(KDD) as a key component of integrated information and knowledge management system. The proposed system measures business performance by considering both VA(Value-Added), which represents stakeholder's point of view and EVA(Economic Value-Added), which represents shareholder's point of view. In modeling of Business Performance Information System, we apply the following KDD processes : Data Warehouse for consistent management of a performance data, On-Line Analytic Processing(OLAP) for multidimensional analysis, Genetic Algorithms for exploring and finding dominant managing factors and Analytic Hierarchy Process(AHP) for applying expert's knowledge and experience. To demonstrate the performance of the system, we conducted a case study using financial data of Korean automobile industry over 16 years from 1981 to 1996, which is taken from database of KISFAS(Korea Investors Services Financial Analysis System).

  • PDF

A development of weakness calculation method for information system (정보시스템 취약도 계산 방법 개발)

  • Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.131-139
    • /
    • 2007
  • Vulnerability analysis helps to remove discriminating vulnerabilities that exist in various equipment that composes operating information system. It is possible to explain representation and exclusion method about vulnerabilities of each equipment by vulnerability analysis. But it is difficult to display the weakness of whole information system. To do this, analyst synthesizes several information that achieved by vulnerability analysis. But the existing method does not provide fair evaluation because operators' personal opinion. In this paper, we explain about method that unites discriminatively vulnerable point and expresses whole weakness degree in numerical value by equipment, by system class, or by overall system.

Analysis of Hydrologic Geo-Spatial Information Using Runoff-Management Model (유출관리모형을 활용한 수문학적 공간정보 분석)

  • Lee, Sang-Jin;Noh, Joon-Woo;Ahn, Jung-Min;Kim, Joo-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.97-104
    • /
    • 2009
  • GIS (Geographic Information System) is very useful in describing basin wide geographic characteristics and hydrologic analysis. This study estimated long term hydrologic variations in the Geum river basin using the SSARR rainfall runoff simulation model to provide reliable hydrologic information associated with rainfall runoff management module. Calibrated various hydrologic information such as soil moisture index, water use, direct and base flow are generated using GIS tools to display spatial hydrologic information in the unit of subbasin of target watershed. In addition, the graphic user interface toolkit designed for data compilation is expected to support efficient basin wide rainfall runoff analysis.

  • PDF

Correlation Analysis between Distributed Generation Maximum Hosting Capacity of Target and Non-Target Bus (목표 및 비 목표 모선의 분산전원 최대 Hosting capacity 간의 상관관계 분석)

  • Kim, Ji-Soo;Oh, Yun-Sik;Cho, Gyu-Jung;Kim, Min-Sung;Kim, Chul-Hwan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.9
    • /
    • pp.1317-1324
    • /
    • 2017
  • These days, a penetration of distributed generation(DG) has increased in power system. Due to increased penetration of DG, a whole system is forced to install the maximum hosting capacity of DG. Therefore analysis between the maximum hosting capacity of DG at the target bus and the whole system is important. If we know the maximum hosting capacity, it will be able to satisfy the demand of system planner and customer. In this paper, we use a genetic algorithm to calculate the hosting capacity with optimization program using Design Analysis Kit for Optimization and Terascale Applications(DAKOTA). To consider a real system, we establish constraints and use IEEE 34 node test system. In addition, through the correlation coefficient between the target bus and the other buses, when capacity of DG at the target bus increases, we analyze which capacity of DG at the other buses will be decreased.

Construction of the Honam Culture Information System(HCIS) using Web GIS (WebGIS를 이용한 호남문화정보시스템(HCIS) 구축)

  • Yang, Hea-Kun;Shin, Hye-Jin
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.2
    • /
    • pp.291-304
    • /
    • 2006
  • Individual culture information has been the mainstream in studies on culture information so far, and the studies have focused on zones using paper map. As a result, intuitive analysis in map and extremely restricted measuring space analysis are limited in summarizing and utilizing complicated and huge cultural materials systematically and scientifically. Introduction of GIS can be regarded as an indispensable element for solution of this problem as it can analyze temporal-spatial dynamics of culture information as a whole and to construct effective management system for regional culture information. In particular, supply of two-way information rather than one-way information becomes more and more important in the society structure where value is diversified and the culture gets faster owing to high-level information industry like today. Accordingly, this study is considered to be meaningful in that WebGIS-based regional culture information system allows temporal-spatial analysis and spatial analysis for various culture information for the users using internet. Regional culture information system like culture information system in Honam region can not only contribute to comparative study between regions and to creation of new information through analysis of statistics between culture elements but also allow easy and comprehensive approach to regional information.

  • PDF

RAM and Performance Analysis for System Effectiveness Inestigations (시스템 효율성 추정을 위한 RAM과 성능 분석)

  • 이강원
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1985.10a
    • /
    • pp.3.2-6
    • /
    • 1985
  • There are two major fields for system effectiveness investogations-RAM analysis and performance(capacity) analysis. The investgation methods for system effectiveness are discussed. And two prototypes are presented for RAM analysis and performance analysis.

  • PDF

Exploratory Autopsy on Digital Payment Models

  • Wang, Tao;Kim, Chang-Su;Kim, Ki-Su
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.646-651
    • /
    • 2007
  • Secure digital payment is critical in the successful shaping of global digital business. Digital payments are increasingly being used as a substitute to traditional payments, contributing markedly to the efficiency of the economy. The focus of every digital business transaction is to minimize risks arising from transactions. It is essential to ensure the security of digital payment whether used in internal networks or over wireless Internet. This paper analyses secure digital payment methods from the viewpoint of systemic security and transaction security. According to comparative analysis of digital payment models, this paper proposes a comparative analysis framework to investigate and evaluate secure digital payment. In conclusion, the comparative analysis framework, comparison of digital payment models and mobile payment models proposes a useful academic and practical foundation to enhance the understanding of secure digital payment methods. It also provides academic background and practical guidelines for the development of secure digital payment systems.

  • PDF

User Requirement Analysis on Risk Management of Architectural Heritage in Virtual Reality

  • Lee, Jongwook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.69-75
    • /
    • 2019
  • We propose a method to analyze user requirements to design a virtual reality-based risk management system. This paper presents surveys, interviews, prototype evaluation methods, and implementation process. Architectural heritage is easily exposed to natural and artificial dangers caused by various material combinations and structural features. So, risk management of cultural heritage plays a key role in preserving and managing cultural heritage. However, risk management has been carried out through empirical methods using distributed data. This study analyzes user requirements for designing functions and interfaces of VR-based risk management system and evaluates prototypes to overcome the above problems. As a result, most heritage managers wanted a system function to support risk analysis and response. They also found that they prefer 2D information such as existing drawings and photos rather than 3D information. The results of the user requirements analysis derived from this study will be used to create risk management applications.

Development a Spatial Analysis System using the Case-based Reasoning Approach (사례기반 추론방법을 적용한 공간분석 시스템)

  • 오규식;최준영
    • Spatial Information Research
    • /
    • v.9 no.2
    • /
    • pp.171-184
    • /
    • 2001
  • The nature of ill-defined planning problems makes expert systems difficult to acquire and represent knowledge for decision making in urban planning processes. In order to resolve these problems, a case-based reasoning method was applied to develop a spatial analysis system for urban planning. A case study was conducted in a residential land use planning process. The result of the study revealed the effectiveness of reasoning by the spatial analysis system and the possibility of its future application. More accumulation of information on other successful cases should be sought to yield better results

  • PDF

Research on Efficient Live Evidence Analysis System Based on User Activity Using Android Logging System (안드로이드 로그 시스템을 이용한 효율적인 사용자 행위기반 라이브 증거수집 및 분석 시스템 연구)

  • Hong, Il-Young;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.67-80
    • /
    • 2012
  • Recently as the number of smartphone user is growing rapidly, android is also getting more interest in digital forensic. However, there is not enough research on digital data acquisition and analysis based on android platform's unique characteristics so far. Android system stores all the related recent systemwide logs from the system components to applications in volatile memory, and therefore, the logs can potentially serve as important evidences. In this paper, we propose a digital data acquisition and analysis system for android which extracts meaningful information based on the correlation of android logs and user activities from a device at runtime. We also present an efficient search scheme to facilitate realtime analysis on site. Finally, we demonstrate how the proposed system can be used to reconstruct the sequence of user activities in a more intuitive manner, and show that the proposed search scheme can reduce overall search and analysis time approximately 10 times shorter than the normal regular search method.