• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.045 seconds

Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features (국방 사이버 무기체계와 기존 재래식 무기체계의 핵심기술 수준 및 특성 비교 연구)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.985-994
    • /
    • 2016
  • Since the inauguration of Defense Acquisition Program Administration(DAPA) in 2006, the national defense core technology research & development business has not only pertained to the weapons systems development but also to the improvement of the national science & technology capability via the acquisition of cutting-edge technologies. Furthermore, it has been closely related to the promotion of the defense industry and the mutual improvements of defense and civil technologies. The cyber warfare weapon system, a newly added national defense weapon system field since 2015, has become a promising weapon system branch for improving the national defense power as well as the national defense industry as shown in the case of Israel. By utilizing the existing result of the national defense core technology level, in order to establish the direction of technology planning of the cyber warfare weapon system, this paper analyzes the technology level and features of the cyber warfare weapon system in various aspects via comparisons with other weapons systems. The result of these analyses shows that the cyber warfare weapon system possesses a relatively high technology level due to the technology accumulation in the civilian sector while the relatively slow inclusion to the national weapons systems and the lack of the correspondence case regarding aggressive cyber responses in the defense sector yields a relatively low national rank. However, the technological gap between South Korea and the most advanced country in the field of cyber warfare technology is analyzed to be among the lowest, which indicates that with efficient and effective pursuits in terms of pthe weapons systems acquisitions as well as the core technologies research & development business, an outstanding cyber warfare capacity can be obtained in a short time.

A Study on Improvement of Legal System for Harmful Chemical Substance Response Management System (유해화학물질 대응시스템 적용을 위한 제도 개선 연구)

  • Oak, Young-Suk;Lee, Young-Sub
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.216-223
    • /
    • 2017
  • Chemicals are an indispensable element of modern society to the extent that more than 15 million species are commercially available worldwide. However, among them are chemicals whose toxicityposes a threat to public health and the environment, as illustrated by past cases of chemical accidents, which revealed their danger to human life. Chemical accidents can spread and cause huge damage in a short time because of their characteristics. Therefore, it is important to do as much as possible to prevent them in advance and to respond promptly after an accident. The legal system pertaining to domestic chemical substances is the "Toxic Chemical Control Act", which is made up of the "Act on the Registration and Evaluation of Chemicals" and the "Chemical Control Act" since 2015. Under this law, the Comprehensive Chemical Information System and Chemical Substance Data Processing system were established and are still operating;however, chemical accidents are still occurring. These systems are comprehensive information systems aimed at providing chemical information rather than acting as chemical response systems, which has limited the effectiveness of accident response. This study is intended to analyze the information management systems, response management systems and the basis of chemical substance management support for hazardous chemicals and suggest ways to improve the legal system for developing and operating chemical response systemswithin a municipality.

Analysis of experimental studies on Insamyangyoung-tang (인삼양영탕을 이용한 실험연구 분석)

  • Choi, Song Ie;Kim, Yun Hee;Lee, Hye Won
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.19 no.2
    • /
    • pp.145-157
    • /
    • 2015
  • Objective : This study aimed to analyze a comprehensive feature of experimental research on Insamyangyoungtang and develop a strategy that can be used for experimental studies on Insamyangyoung-tang in the future. Method : The journal search was performed using six databases : PubMed, Chinese database (China Network Knowledge Infrastructure, [CNKI]), Japan database (Japan Science and Technology Information Aggregator, Electronic, [J-STAGE]) and three Korean databases (Oriental Medicine Advanced Searching Integrated System [OASIS], Research Information Service System [RISS], and Korean Studies Information Service System [KISS]). We used limited keywords and analyzed studies by publication year, experimental models, and the subjects of biological activities. The mechanism of pharmacological activity in accordance with the therapeutic effects of Insamyangyoung-tang was noted. Results and Conclusion : A total of 43 studies (6 domestic studies and 37 foreign ones) were examined according to the inclusion criteria of the experimental study. Research on the pharmacological activities of Insamyangyoung-tang showed its therapeutic effects on the nervous and immune systems, as well as its anti-aging, anti-fatigue, and hematopoietic effects. Additional efficacy and safety assessments and experimental and clinical studies should be performed to evaluate the mechanism of Insamyangyoung-tang. The present review has provided preliminary information for further studies on Insamyangyoung-tang.

An Enhanced Network-based Mobility Management Protocol for Fast Mobility Support

  • Lee, Sung-Kuen;Lee, Kyoung-Hee;Lee, Hyun-Woo;Hong, Seng-Phil;Park, Jin-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1997-2015
    • /
    • 2011
  • In this paper, we propose the enhanced network-based mobility management protocol, called enhanced proxy mobile ipv6 (E-PMIPv6), which can provide mobile nodes (MNs) with a fast and efficient mobility service in PMIPv6 domain. The proposed scheme can provide a fast and efficient mobility service to MNs and also the strength of network scalability and stability to an access network by proposing the dynamic virtual hierarchical network architecture. In addition, the pre-authentication procedure for an MN, based on the information of neighbor mobile access gateway (MAG) list in the enhanced-policy server (E-PS), is proposed to support seamless handover by reducing MN's handover latency. Through performance evaluations of numerical analyses and simulations, we have confirmed and verified the superiority of the proposed scheme compared to the conventional proxy mobile ipv6 (PMIPv6).

An ICN In-Network Caching Policy for Butterfly Network in DCN

  • Jeon, Hongseok;Lee, Byungjoon;Song, Hoyoung;Kang, Moonsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1610-1623
    • /
    • 2013
  • In-network caching is a key component of information-centric networking (ICN) for reducing content download time, network traffic, and server workload. Data center network (DCN) is an ideal candidate for applying the ICN design principles. In this paper, we have evaluated the effectiveness of caching placement and replacement in DCN with butterfly-topology. We also suggest a new cache placement policy based on the number of routing nodes (i.e., hop counts) through which travels the content. With a probability inversely proportional to the hop counts, the caching placement policy makes each routing node to cache content chunks. Simulation results lead us to conclude (i) cache placement policy is more effective for cache performance than cache replacement, (ii) the suggested cache placement policy has better caching performance for butterfly-type DCNs than the traditional caching placement policies such as ALWASYS and FIX(P), and (iii) high cache hit ratio does not always imply low average hop counts.

협업적 의사소통을 통한 B2C 웹사이트 정보 프라이버시 보호 활동의 성과에 관한 연구: 장기 관계적 성과 관점을 중심으로

  • Lee, Sang-Hun;Lee, Ho-Geun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.493-517
    • /
    • 2008
  • The purpose of this research is to identify effect of communication strategy as effectively communication method which is decreasing Internet Web site users' perceived information privacy concerns as important factor affecting to positive behavior or behavioral intentions on long-term relational outcome perspectives. This study suggests alternatives concepts and causal relationship about information privacy issues. First, it addressed collaborative communication strategy (CCS) model of effective communication method for Web site's IPP to users. Second, it provided comparing and integrating streams of information privacy research on long-term relational outcomes perspective. Third, it assessed effectiveness of Web site's IPP on organization legitimacy ensured continuous survival of organization. A research model was proposed and subsequent hypotheses were empirically tested with partial least square (PLS) based on 684 responses from the users of 21 Internet Website among entirely finance, recruit, portal /e-store Web site. It was learned that CCS(as a communication method) and relationship quality(representing long-term relational outcomes)was positively associated with decreasing user's IPC more than privacy risk. Also, legitimacy to information privacy practice positively associated with willingness to information providing more than negative effect of IPC. Lastly, their association strength was partially moderated by the type of real information sensitivity.

  • PDF

State of the Art 3GPP M2M Communications toward Smart Grid

  • Kwon, Young-Min;Kim, Jun-Suk;Chung, Min-Young;Choo, Hyun-Seung;Lee, Tae-Jin;Kim, Mi-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.468-479
    • /
    • 2012
  • Recent advances in wireless communications and electronics has enabled the development of machine-to-machine (M2M) communications. This communication paradigm has been expected as an automated control and report solution for smart grid. The smart grid enables customers and operators to utilize the collected usage information from a large number of meters with transceivers for efficiency and safety. In this paper, we introduce architecture, requirements and challenges of M2M communications for smart grid. We extract technical issues that should be resolved in M2M communications to support the smart grid via third-generation partnership project (3GPP) cellular networks. We then present the current state of the art of research results to deal with such issues. Finally, we outline the open research issues.

IPC-CNN: A Robust Solution for Precise Brain Tumor Segmentation Using Improved Privacy-Preserving Collaborative Convolutional Neural Network

  • Abdul Raheem;Zhen Yang;Haiyang Yu;Muhammad Yaqub;Fahad Sabah;Shahzad Ahmed;Malik Abdul Manan;Imran Shabir Chuhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2589-2604
    • /
    • 2024
  • Brain tumors, characterized by uncontrollable cellular growths, are a significant global health challenge. Navigating the complexities of tumor identification due to their varied dimensions and positions, our research introduces enhanced methods for precise detection. Utilizing advanced learning techniques, we've improved early identification by preprocessing clinical dataset-derived images, augmenting them via a Generative Adversarial Network, and applying an Improved Privacy-Preserving Collaborative Convolutional Neural Network (IPC-CNN) for segmentation. Recognizing the critical importance of data security in today's digital era, our framework emphasizes the preservation of patient privacy. We evaluated the performance of our proposed model on the Figshare and BRATS 2018 datasets. By facilitating a collaborative model training environment across multiple healthcare institutions, we harness the power of distributed computing to securely aggregate model updates, ensuring individual data protection while leveraging collective expertise. Our IPC-CNN model achieved an accuracy of 99.40%, marking a notable advancement in brain tumor classification and offering invaluable insights for both the medical imaging and machine learning communities.

What happens after IT adoption?: Role of habits, confirmation, and computer self-efficacy formed by the experiences of use (정보기술 수용 후 주관적 지각 형성: 사용 경험에서 형성된 습관, 기대일치, 자기효능감의 역할)

  • Kim, Yong-Young;Oh, Sang-Jo;Ahn, Joong-Ho;Jahng, Jung-Joo
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.25-51
    • /
    • 2008
  • Researchers have been continuously interested in the adoption of information technology (IT) since it is of great importance to the information systems success and it is also an important stage to the success. Adoption alone, however, does not ensure information systems success because it does not necessarily lead to achieving organizational or individual objectives. When an organization or an individual decide to adopt certain information technologies, they have objectives to accomplish by using those technologies. Adoption itself is not the ultimate goal. The period after adoption is when users continue to use IT and intended objectives can be accomplished. Therefore, continued IT use in the post-adoption period accounts more for the accomplishment of the objectives and thus information systems success. Previous studies also suggest that continued IT use in the post-adoption period is one of the important factors to improve long-term productivity. Despite the importance there are few empirical studies focusing on the user behavior of continued IT use in the post-adoption period. User behavior in the post-adoption period is different from that in the pre-adoption period. According to the technology acceptance model, which explains well about the IT adoption, users decide to adopt IT assessing the usefulness and the ease of use. After adoption, users are exposed to new experiences and they shape new beliefs different from the thoughts they had before. Users come to make decisions based on their experiences of IT use whether they will continue to use it or not. Most theories about the user behaviors in the pre-adoption period are limited in describing them after adoption since they do not consider user's experiences of using the adopted IT and the beliefs formed by those experiences. Therefore, in this study, we explore user's experiences and beliefs in the post-adoption period and examine how they affect user's intention to continue to use IT. Through deep literature reviews on the construction of subjective beliefs by experiences, we draw three meaningful constructs which theoretically have great impacts on the continued use of IT: perceived habit, confirmation, and computer self-efficacy. Then, we examine the role of the subjective beliefs on the cognitive/affective attitudes and intention to continue to use that IT. We set up a research model and conducted survey research. Since IT use implies interactions among a user, IT, and a task, we carefully selected the sample of users using same/similar IT to perform same/similar tasks, to exclude unwanted influences of other factors than subjective beliefs on the IT use. We also considered that the sample of users were able to make decisions to continue to use IT volitionally or at least quasi-volitionally. For each construct, we used measurement items recognized for reliability and widely used in the previous research. We slightly modified some items proper to the research context and a pilot test was carried out for forty users of a portal service in a university. We performed a full-scale survey after verifying the reliability of the measurement. The results show that the intention to continue to use IT is strongly influenced by cognitive/affective attitudes, perceived habits, and computer self-efficacy. Confirmation affects the intention to continue indirectly through cognitive/affective attitudes. All the constructs representing the subjective beliefs built by the experiences of IT use have direct and/or indirect impacts on the intention of users. The results also show that the attitudes in the post-adoption period are formed, at least partly, by the experiences of IT use and newly shaped beliefs after adoption. The findings suggest that subjective beliefs built by the experiences have deep impacts on the continued use. The results of the study signify that while experiencing IT in the post-adoption period users form new beliefs, attitudes, and intentions which may be different from those of the pre-adoption period. The results of this study partly demonstrate that the beliefs shaped by the behaviors, those are the experiences of IT use, influence users' attitudes and intention. The results also suggest that behaviors (experiences) also change attitudes while attitudes shape behaviors. If we combine the findings of this study with the results of the previous research on IT adoption, we can propose a cycle of IT adoption and use where behavior shapes attitude, the attitude forms new behavior, and that behavior shapes new attitude. Different from the previous research, the study focused on the user experience after IT adoption and empirically demonstrated the strong influence of the subjective beliefs formed in the post-adoption period on the continued use. This partly confirms the differences between attitudes in the pre-adoption and in the post-adoption period. Users continuously change their attitudes and intentions while experiencing (using) IT. Therefore, to make users adopt IT and to make them use IT after adoption is a different problem. To encourage users to use IT after adoption, experiential variables such as perceived habit, confirmation, and computer self-efficacy should be managed properly.

Estimation of value of freeway traffic information using Contingent Valuation Method (조건부가치측정법을 이용한 고속도로 교통정보의 가치 산정에 관한 연구)

  • Lee Eui-Eun;Kim Jun-jung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.2 s.5
    • /
    • pp.55-68
    • /
    • 2004
  • On this research, Contingent Valuation Method which is universally applicable to non market goods and being developed in a field of the environmental economics is used to estimate appropriate value of freeway traffic information. Imaginary scenario is designed to estimate appropriate value of freeway traffic information and major in traffic-related field is used & man-to-man interview carried out to enhance a reliance of questionnaire. Open-ended question and a way of payment card are in use each other. make use of Multiple Regression Model in Contingent Valuation Method of traffic information and find an effect on the value of the traffic information. As a result of research, intention to pay for usage per information is regarded as a somewhat higher but monthly cost is lower than they have to. It is concluded that value and usefulness of the individual information is nod in approval but a majority of user's recognition that publish information must be provided free of charge lowers intention of payment.

  • PDF