• Title/Summary/Keyword: Information analysis system

Search Result 18,913, Processing Time 0.045 seconds

Study on Personalization to Improve Usage Intention of Corporate Information System : An Empirical Analysis in Using Intranet System (기업 정보시스템 사용의도 향상을 위한 개인화 연구)

  • Lee, Sung-Woo;Chang, Won-Kyung;Kim, Tae-Kyun
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.4
    • /
    • pp.57-82
    • /
    • 2010
  • Many companies today use information systems to maintain competitive advantage and to give immediate responses to customer requests. Over time, however, many of these companies failed to make the most of such information systems because the users stopped utilizing the system. While many reasons offer explanations to the phenomenon, this study analyzes how usage intention of information system can be enhanced by changing the environment and usefulness of the system from the user's perspective. Active and wide-ranging researches using the Technology Acceptance Model (TAM) have been carried out on an individual's tendency to using new technology. But, many of the studies remain focused on improving user intention by enhancing the ease of use and usefulness of the system under PC applications or Enterprise applications. The personalized intranet system is not only bringing about sweeping changes to a company's information systems environment but also providing users with freedom to design their own working environment, personalization, to Corporate Information Systems (CIS). Results from empirical tests on intranet systems verify that through personalization, a more voluntary information system environment can be created and that by increasing the ease of use and usefulness of the system, users can become more favorable to accepting new technologies and ultimately result in improved usage intention. This study suggests personalization variables and model for implementing a voluntary CIS for information system developers.

  • PDF

A Schedulability analysis and Recovery Technique of Real-Time System using TCPN (TCPN을 이용한 실시간 시스템의 스케쥴가능성 분석 및 회복기법)

  • Kim, Chun-Bae;Park, Heung-Bok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2797-2808
    • /
    • 1999
  • Timing Constraint Petri Nets(TCPN) extend petri nets by adding timing constraints, it is provide a formal method for the modeling and analysis of real-time system. A real-time schedulability analysis decide that a set of concurrent processes will always meet its deadline. In this paper, we present TCPN model for real-time system include timing constraints and propose a schedulability analysis algorithm using them. Also, When the TCPN model is unscheduleable under the imposed timing constraints, we propose a recovery technique that will be scheduleable by the system specification modifying or timing constraints relaxing in the optimized time.

  • PDF

Design and Implementation of Chronic Disease Risk Analysis System according to Personalized Food Intake Preferences (개인 식품섭취 선호도에 따른 만성질환 발생 위험도 분석 시스템 설계 및 구현)

  • Jeon, So Hye;Kim, Nam Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.147-155
    • /
    • 2014
  • While variety of content on the internet has increased with the development of IT and person's needs about suitable information are increasing rapidly, studies for personalized service have been actively performed. In the study, we proposed the Hypertension and Diabetes risk analysis system according to personal food intake preference using the analysis method of buying preferences in product recommendation system. For the analysis of food intake preference, the Pearson correlation coefficient is used to calculate similarity weights between each reference analysis data and sample data and then reference data should be grouping into the similarity weights and calculating risk of hypertension and diabetes each group. To evaluate the significance of this system, 1,021 subjects are applied the system. Hypertension and diabetes groups' risk is significant higher than normal group statistically so, it is confirmed that food intake preference and the diseases were relevant. In this paper, we verify the validity of hypertension and diabetes risk analysis system using a personal food intake preference.

Implementation of Human Spine Database System for Realizing e-Spine

  • Roh, Hyun Sook;Choi, Boongki;Bae, Kook-jin;Park, Jinseo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.06a
    • /
    • pp.193-194
    • /
    • 2014
  • This paper provides the market opportunity analysis process and technology providing matching process based on the efficient quantitative analysis of a large amount of papers and network analysis. In the future, it is required to analyze and complement the quantitative analysis result by commercialization experts and to build emerging issue database.

  • PDF

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.

A Study on Developing and Refining a Large Citation Service System

  • Kim, Kwang-Young;Kim, Hwan-Min
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.1
    • /
    • pp.65-80
    • /
    • 2013
  • Today, citation index information is used as an outcome scale of spreading technology and encouraging research. Article citation information is an important factor to determine the authority of the relevant author. Google Scholar uses the article citation information to organize academic article search results with a rank algorithm. For an accurate analysis of such important citation index information, large amounts of bibliographic data are required. Therefore, this study aims to build a fast and efficient system for large amounts of bibliographic data, and to design and develop a system for quickly analyzing cited information for that data. This study also aims to use and analyze citation data to be a basic element for providing various advanced services to the academic article search system.

A study for agricultural information system in Korea (우리 나라의 농업정보시스템설립을 위한 일연구)

  • Yoo Soyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.12
    • /
    • pp.225-267
    • /
    • 1985
  • This study is aimed to assure that the agricultural technical information which is the important factor to increase rural production should be widely used by rural communities, and for the wide circulation for the technical information, the appropriate information system is available for the farmers and extention workers who are responsible for the information transfer to farmers. The study is also aimed to find out an outline of a structure and characteristic of the appropriate information system for the rural communities in Korea. The method used to accomplish the purpose of the study, the modernization theory of agriculture of T. W. Schultz was examined and assertions of the information specialists regarding the issues of information transfer and agricultural information system :in developing countries were analyzed. Through the above literary research, the author tried to create the most suitable characteristic and structure of agricultural information system in rural communities in Korea. To justify the author's assertion, a survey through questionniares for a typical rural province was attempted. The assertion that the author tried to convey as the most suitable agricultural information system of this country is the establishment agricultural information analysis center mainly for the extention workers and designing information system which has affiliation between the rural guidance office which is already situated every unit of administractive districts all over the country and public library which is now not properly located and functioned.

  • PDF

Design and Implementation of Web Interface for Internet management System Using SNMP MIB-II (SNMP MIB-II를 이용한 인터넷 관리 시스템의 웹 인터페이스 설계 및 구현)

  • Yu, Seung-Geun;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.699-709
    • /
    • 1999
  • This paper is aimed at defining items of analysis using SNMP MIB-II for the purpose of managing the Internet based network running on TCP/IP protocol, and then utilize these items, in conjunction with various Web technology and JAVA to design and implement a Web based interface of a management system to analyze the performance and status of the Internet. Among the required items in order to accomplish this task are utilization, interface packet transmission rate, I/O traffic ratio, and so on. Based on these items, the actual analysis is carried out by the Web interface according to the type of analysis. For instance, the interface executes the function of real-time analysis, collection processing, elementary analysis and detailed analysis. The demand of the user is fed into the Web interface which carried out a real-time analysis with the client system which in turn will eventually produce the results of the analysis. In order words, the interface acts as a mediator server for the analysis system. Furthermore, a protocol for exchange of data and messages between the server and the analysis system, the MATP protocol, was also designed. Finally, the results obtained through the system presented in this paper were displayed on screen according to the type of analysis. The system realized in this paper uses We technology and is independent of platform and allows the user to determine the performance of Internet at his/her own host according to the selected items of analysis.

  • PDF

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.