• Title/Summary/Keyword: Information analysis system

Search Result 18,915, Processing Time 0.044 seconds

Stability Analysis of NCS(Networked Control System) with Network Uncertainties (네트워크 불확실성을 고려한 NCS(Networked Control System)의 안정도 분석)

  • Jung, Joon-Hong;Lee, Jong-Sung;Park, Ki-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2383-2385
    • /
    • 2004
  • Network uncertainties can vary the stability property of networked control system. Therefore, the performance and the stability variation of networked control system due to network uncertainties must be considered first in designing networked control system. In this paper, we present a new stability analysis method of networked control system with data loss and time delay. The proposed method can determine maximum allowable time delay and allowable transmission rate that preserves stability performance of networked control system. The results of the simulation validate effectiveness of our stability analysis methods.

  • PDF

An Analysis of Multi-processor System Performance Depending on the Input/Output Types (입출력 형태에 따른 다중처리기 시스템의 성능 분석)

  • Moon, Wonsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.71-79
    • /
    • 2016
  • This study proposes a performance model of a shared bus multi-processor system and analyzes the effect of input/output types on system performance and overload of shared resources. This system performance model reflects the memory reference time in relation to the effect of input/output types on shared resources and the input/output processing time in relation to the input/output processor, disk buffer, and device standby places. In addition, it demonstrates the contribution of input/output types to system performance for comprehensive analysis of system performance. As the concept of workload in the probability theory and the presented model are utilized, the result of operating and analyzing the model in various conditions of processor capability, cache miss ratio, page fault ratio, disk buffer hit ratio (input/output processor and controller), memory access time, and input/output block size. A simulation is conducted to verify the analysis result.

A Study on the Information Environment and SWOT Analysis of e-Plant Portal System (e-Plant 포털 시스템 정보화 환경 및 SWOT 분석)

  • Ahn, Jang-Won;Jee, Sang-Bok;Jeon, Yong-Bae
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.539-542
    • /
    • 2006
  • According as acceptance an order results of plant industry increases, ability of plant project management is required and necessity about information technology is augmented. For required information technology, developing information present conditions that consist of partial or unit system of domestic plant companies by synthetic system, development of systematic plant information system that supply standard direction presentation, tools and know-how about information technology need. This study achieved basic research that set information strategy and target by reflect trend of such plant industry, analyze future IT technology trend, international information environment, policy trend etc. and execute SWOT analysis of plant information system through this and present confrontation ways. It is presented confrontation ways by SWOT analysis through this research; (1) Development of education contents that can come forth competent person of plant industry, (2) Practical use of communication means that can offer by real time about informations connected with plant, (3) Offer of knowledge contents that supply various and useful inside and outside of the country's plant knowledge

  • PDF

A Design and Implementation of Web-based Traffic Monitoring System for Management of Small-scale PC-room (소규모 실습실 관리를 위한 웹기반 트래픽 모니터링 시스템의 설계 및 구현)

  • Lee Kang-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.127-131
    • /
    • 2004
  • In this paper, I propose the web-based network traffic monitoring system to monitor computers running MS Windows in the small-scale PC-room. The system can support network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The whole system consists of two parts: analysis server for collection and analysis of the network information. and supports real-time monitoring of network traffic, and the web-based interface system. a client system shows user a graphical data that analyzed a returned result from the server. This system implements web-based technology using java and contributes to enhance the effectiveness of network administrator's management activities in PC-room by controlling and monitoring.

  • PDF

The Impact of Organizational Context on the Performance of ERP Systems (조직적 상황이 ERP시스템의 도입 성과에 미치는 영향)

  • 정경수;김상진;송정희
    • The Journal of Information Systems
    • /
    • v.12 no.1
    • /
    • pp.19-45
    • /
    • 2003
  • The ERP system comes to existence in the period of change. In other words, the ERP system is adopted to the company with BPR project. In general, the ERP system is introduced to companies as packages rather than in-housing systems. There are several researches in IS literatures which have a conclusion that organizational context affects the performance of ERP system. This study attempts to review the organizational context from the prospective of organizational structure and change management. Regarding the organizational structure, we choose some widely known variables such as the degree of formalization and centralization. For the analysis of change management, we set the variables, which are the most importantly considered, such as the power of CEO's promotion and user participation. The extent of customizing is introduced as moderating variables between the organizational context and the implementation performance. With collected data, we performed the reliability test, the factor analysis and the regression analysis. In summary, the introduction of an information system such as ERP system has a behavioral and organizational impact. The organizational change may breed resistance and opposition and can lead to the failure of the system. Therefore, implementation of the system requires careful change management, active involvement of users and high level of management support.

  • PDF

A Strategy Study on Sensitive Information Filtering for Personal Information Protect in Big Data Analyze

  • Koo, Gun-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.101-108
    • /
    • 2017
  • The study proposed a system that filters the data that is entered when analyzing big data such as SNS and BLOG. Personal information includes impersonal personal information, but there is also personal information that distinguishes it from personal information, such as religious institution, personal feelings, thoughts, or beliefs. Define these personally identifiable information as sensitive information. In order to prevent this, Article 23 of the Privacy Act has clauses on the collection and utilization of the information. The proposed system structure is divided into two stages, including Big Data Processing Processes and Sensitive Information Filtering Processes, and Big Data processing is analyzed and applied in Big Data collection in four stages. Big Data Processing Processes include data collection and storage, vocabulary analysis and parsing and semantics. Sensitive Information Filtering Processes includes sensitive information questionnaires, establishing sensitive information DB, qualifying information, filtering sensitive information, and reliability analysis. As a result, the number of Big Data performed in the experiment was carried out at 84.13%, until 7553 of 8978 was produced to create the Ontology Generation. There is considerable significan ce to the point that Performing a sensitive information cut phase was carried out by 98%.

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System

  • Deng, Shengzhong;Youn, Chan-Hyun;Liu, Qi;Kim, Hoe-Young;Yu, Taoran;Kim, Young-Hun
    • Journal of Information Processing Systems
    • /
    • v.4 no.3
    • /
    • pp.103-112
    • /
    • 2008
  • This paper proposes a policy adjuster-driven Grid workflow management system for collaborative healthcare platform, which supports collaborative heart disease diagnosis applications. To select policies according to service level agreement of users and dynamic resource status, we devised a policy adjuster to handle workflow management polices and resource management policies using policy decision scheme. We implemented this new architecture with workflow management functions based on policy quorum based resource management system for providing poincare geometrycharacterized ECG analysis and virtual heart simulation service. To evaluate our proposed system, we executed a heart disease identification application in our system and compared the performance to that of the general workflow system and PQRM system under different types of SLA.

An Application of the Rough Set Approach to credit Rating

  • Kim, Jae-Kyeong;Cho, Sung-Sik
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.10a
    • /
    • pp.347-354
    • /
    • 1999
  • The credit rating represents an assessment of the relative level of risk associated with the timely payments required by the debt obligation. In this paper, we present a new approach to credit rating of customers based on the rough set theory. The concept of a rough set appeared to be an effective tool for the analysis of customer information systems representing knowledge gained by experience. The customer information system describes a set of customers by a set of multi-valued attributes, called condition attributes. The customers are classified into groups of risk subject to an expert's opinion, called decision attribute. A natural problem of knowledge analysis consists then in discovering relationships, in terms of decision rules, between description of customers by condition attributes and particular decisions. The rough set approach enables one to discover minimal subsets of condition attributes ensuring an acceptable quality of classification of the customers analyzed and to derive decision rules from the customer information system which can be used to support decisions about rating new customers. Using the rough set approach one analyses only facts hidden in data, it does not need any additional information about data and does not correct inconsistencies manifested in data; instead, rules produced are categorized into certain and possible. A real problem of the evaluation of the evaluation of credit rating by a department store is studied using the rough set approach.

  • PDF

A Study on Security Audit Checking Items for the RFID-Based Information System (RFID 기반 정보시스템을 위한 보안감리 점검항목 연구)

  • Jeon, Sang-Duk;Lim, Ji-Young;Lee, Ki-Young;Han, Ki-Joon
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.107-121
    • /
    • 2012
  • The core infra-technology in the ubiquitous era, RFID which has taken action from the public institution with the pilot projects as well as the practical projects is gradually extending its spectrum to the private enterprises. Along with its expansion, the audit required on the RFID-based information system is also growing in the industry. Especially, since RFID-based information systems, especially compared to other information systems, are likely to be exposed to many threats, the security audit for them is being emphasized. This paper suggests security audit checking items for the RFID-based information system, which can be used to perform the efficient security audit. The security audit checking items consist of eight basic checking items, each of which consists of detailed review items and can be applied for each building steps of the system(analysis, design, implementation, testing, and development). Finally, this paper confirmed the efficiency of the security audit checking items proposed in this paper through survey by the experienced auditors and analysis of practical audit cases.

User Physical Information Analysis based Fitness System (사용자 신체 정보 분석에 기반 피트니스 시스템)

  • Lee, Jong-Won;Kang, Hee-Beom;Park, Byung-Don;Kim, Ho-Sung;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.784-786
    • /
    • 2016
  • Recent research has been related to the health of the various systems. In contrast the system are the level insufficient for accurate analysis that the body of the user information and service information. In this paper, in order to solve this problem, we propose a fitness system based on the algorithm for analyzing the body of the user information. Algorithm to analyze the user's body information by analyzing the user's height and weight to calculate the BMI(Body Mass Index) index and BMR(Basal Metabolic Rate) value. The proposed system is considered to be able to give recommendations to the user for the exercise on the basis of the calculated BMI index and BMR value.

  • PDF