• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.041 seconds

Reviews on Customer Knowledge Management Researches

  • Lu, Qi-Cheng;Feng, Wei
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.202-208
    • /
    • 2007
  • As one of the key strategic resources, the customer knowledge not only improves the performance of customer relationship management, but fosters the sustained competitive advantages as it creates values for customers with customer knowledge management. On the basis of the general introduction of research on customer knowledge management, this paper develops the research on customer knowledge management from the perspective of strategic management, and discusses further relevant studies concerning concepts of customer knowledge and customer knowledge management, studying perspectives, key questions as well as development directions for research, and so on.

  • PDF

Analysis of Application Elements for improvement in the generated electric power performance of balcony BIPV System (발코니형 BIPV시스템의 발전성능 향상을 위한 적용요소기술 분석)

  • Kim Hyun-Il;Yu Gwon-Jong;Kang Gi-Hwan;So Jung-Hoon;Lee Kil-Song
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.1483-1485
    • /
    • 2004
  • Photovoltaic(PV) technology is a popular part of building vocabulary. It can be used today on both existing and new buildings. Its use in the building envelope is very varied and open ways, such as roofing materials, facades, skylights and shading systems, for creative designers. So, to activate this systems demand appropriate sources of information, performance data of elements and design tools offering architects and designer. Therefore this paper describe application elements for BIPV system and then predict improvement in the generated electric power performance of balcony BIPV system.

  • PDF

Understanding User Continuance of Stock Investment Information in an Online Trading Environment (온라인 거래 환경에서 주식 투자 정보의 지속 사용에 대한 이해)

  • Kim, Hye Min;Chung, Sunghun;Han, Ingoo;Kim, Byoungsoo
    • Knowledge Management Research
    • /
    • v.12 no.4
    • /
    • pp.41-54
    • /
    • 2011
  • Given the prevalence of home trading systems, it has become important to examine user behaviors in a stock investment environment. In this vein, this paper developed an integrated model to deeply understand the key determinants of user's continuance intention to use investment information through constructs prescribed by incorporating trust and perceived risk into expectation-confirmation model. The proposed research model was tested by using survey data collected from 160 users who have experience with stock investment. PLS (partial least squares) was employed for the analysis of the data. The findings of this study showed that the proposed framework provides a statistically significant explanation of the variation in continuance intention to search investment information. The findings revealed that trust and perceived risk are more prevalent predictors of continuance intention to use investment information compared to perceived usefulness. It was also found that user satisfaction serves as the salient antecedents of continuance intention to use investment information. The theoretical and practical implications of the findings were described.

  • PDF

MPEG-7 Visual Identifier

  • Oh, Weon-Geun
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.41-44
    • /
    • 2008
  • Digital visual information(image and video) plays an important role in our society, and everyday, more and more visual information is available from many sources around the world. And there is an increasing number of cases where the these visual informations are created, stored, retrieved, and re-used by computational systems. But information modification, distortion and compilation occurred through trans-coding or legal/illegal information processing often make these operations difficult. Subordinately, advanced technology or commercialized software for retrieving and identifying the desired information among these massive and diverse ones is strongly required. In the paper, some recent activities and technical content of MPEG-7 Visual Group are described, especially with regarding to Visual Identifier.

  • PDF

A Study for the Sharing and the Managing the STEP Data on the Heterogeneous Computing Environment

  • Lee, Hyung-Joo;Lee, Young-Han;Joo, Kyoung-Joon;Jung, Seoung-Woog;Kim, Deok-Soo
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1999.04a
    • /
    • pp.572-578
    • /
    • 1999
  • The product information is defined as the information that is obtained in the whole life cycle of a product from design and manufacturing to marketing and it carries out the important role under the changeful environment. It is necessary to use computers for efficient product data sharing. But, in practice, because of various product data types and heterogeneous computing environment, it is difficult to share the product information among different computer systems. This paper presents the methodology for sharing the product information without a hitch in he-terogeneous computing environment by using the international standard of the product information ISO-10303 STEP and CORBA.

  • PDF

Multi-Criteria Decision Making Procedure under Incompletely Identified Preference Information

  • Ahn, Byeong-Seok;Kim, Jae-Kyeong;Kim, Soung-Hie
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.3
    • /
    • pp.63-73
    • /
    • 1998
  • The paper deals with interactive multiple criteria decision making procedure when decision maker (DM) specifies her or his preference in incomplete ways. Usually DM is willing or able to provide only incomplete information, because of time pressure and lack of knowledge or data. Under incomplete information on utility and attribute weight, the pairwise dominance checks result in strict or weak dominance values. Considering only strict dominance values sometimes fails to Prioritize alternatives because of fuzziness of preference information. Further there exists some information loss useful if used, otherwise. In this paper, we consider the outranking concept which implies the willingness of DM's taking some risk under the least favorable situation because she has enough reasons to admit the results. By comparing the magnitude of net preference degree of alternatives which is defined by difference between outrankings and outranked degree of each alternative, we can prioritize alternatives.

  • PDF

An Efficient Implementation of Key Frame Extraction and Sharing in Android for Wireless Video Sensor Network

  • Kim, Kang-Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3357-3376
    • /
    • 2015
  • Wireless sensor network is an important research topic that has attracted a lot of attention in recent years. However, most of the interest has focused on wireless sensor network to gather scalar data such as temperature, humidity and vibration. Scalar data are insufficient for diverse applications such as video surveillance, target recognition and traffic monitoring. However, if we use camera sensors in wireless sensor network to collect video data which are vast in information, they can provide important visual information. Video sensor networks continue to gain interest due to their ability to collect video information for a wide range of applications in the past few years. However, how to efficiently store the massive data that reflect environmental state of different times in video sensor network and how to quickly search interested information from them are challenging issues in current research, especially when the sensor network environment is complicated. Therefore, in this paper, we propose a fast algorithm for extracting key frames from video and describe the design and implementation of key frame extraction and sharing in Android for wireless video sensor network.

A Study on the Information Security Plan for Network Centric Warfare : Development of Information Security Governance Assessment Index (네트워크 중심전(NCW)하의 정보보호체계 구축방안 연구 : 정보보호체계 평가지표 개발을 중심으로)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.83-91
    • /
    • 2007
  • Information security is a critical issue for network centric warfare(NCW). This paper provides a information security governance index for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military organization's planners determine the degree to which they have implemented an information systems governance framework at the strategic and tactical level within their organization.

  • PDF

Patome: Database of Patented Bio-sequences

  • Kim, SeonKyu;Lee, ByungWook
    • Genomics & Informatics
    • /
    • v.3 no.3
    • /
    • pp.94-97
    • /
    • 2005
  • We have built a database server called Patome which contains the annotation information for patented bio-sequences from the Korean Intellectual Property Office (KIPO). The aims of the Patome are to annotate Korean patent bio-sequences and to provide information on patent relationship of public database entries. The patent sequences were annotated with Reference Sequence (RefSeq) or NCBI's nr database. The raw patent data and the annotated data were stored in the database. Annotation information can be used to determine whether a particular RefSeq ID or NCBI's nr ID is related to Korean patent. Patome infrastructure consists of three components­the database itself, a sequence data loader, and an online database query interface. The database can be queried using submission number, organism, title, applicant name, or accession number. Patome can be accessed at http://www.patome.net. The information will be updated every two months.

A Study on the Vulnerability Analysis Methodology of Node.js (Node.js 취약점 분석 방법론에 대한 연구)

  • Lee, Beomjin;Mun, Siwoo;You, Jaewook;Shin, Jeonghoon;Kim, Kyounggon
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.479-482
    • /
    • 2019
  • Node.js 는 자바스크립트 런타임으로 확장성 있는 웹 애플리케이션 개발에 주로 사용되는 플랫폼이다. 자바스크립트는 수 년에 걸쳐 많은 발전을 이뤘으며 현재는 Node.js 로 서버 사이드까지 자리 잡아 웹이라는 생태계에서 빼놓을 수 없는 요소가 되었다. 본 논문은 Node.js 에 관한 전반적인 이론을 포함하여 자바스크립트 특성으로 인하여 Node.js 에서 자주 발견되는 취약점의 탐색 방법을 모듈 관점에서 다뤄보고자 한다. 또한 취약점이 발생하는 다양한 패턴과 해당 패턴을 막기 위하여 적용된 Mitigation 을 실제 모듈을 예시로 살펴보며 분석해보고자 한다.