• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.038 seconds

A Research Model for Measuring ERP Performance

  • Kang, Yang-Suk;Hong, Soon-Goo;Choi, Hyung-Rim;Kim, Jong-Weon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.160-162
    • /
    • 2007
  • The overall objective of this paper is to suggest the research model for measuring the ERP performance in Korean manufacturing firms. To this end, the previous research papers on the ERP measurement were reviewed and the 356 questionnaires are collected. In particular, the effects of mediation variables including a firm size, user satisfaction, and usage will be tested.

  • PDF

A Study on the Korean Romanization Systems and Cataloging Korean Information Resources (한글의 로마자표기법과 한글 정보자원 목록업무에 관한 연구)

  • Oh Kyung-Mook
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.27-44
    • /
    • 2005
  • Over sixty Korean romanization systems have introduced in the course of history since 1800, but not most of them have experienced the test of proper duration. At present two major systems are introduced and focused in the bibliographic fields : Mccune-Reischauer system and Ministry of Culture & Tourism system(2000). Few libraries nay be driven to the new romanization schemes, however library users require a practical and easy-to-use Korean romanization system for searching the Korean items. From the view of bibliographic control for Korean information resources, the advantage and disadvantages for converting romanization systems have been shown as the result of the research.

  • PDF

SINR loss and user selection in massive MU-MISO systems with ZFBF

  • Hu, Mengshi;Chang, Yongyu;Zeng, Tianyi;Wang, Bin
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.637-647
    • /
    • 2019
  • Separating highly correlated users can reduce the loss caused by spatial correlation (SC) in multiuser multiple-input multiple-output (MU-MIMO) systems. However, few accurate analyses of the loss caused by SC have been conducted. In this study, we define signal-to-interference-plus-noise ratio (SINR) loss to characterize it in multiuser multiple-input single-output (MU-MISO) systems, and use coefficient of correlation (CoC) to describe the SC between users. A formula is deduced to show the accurate relation between SINR loss and CoC. Based on this relation, we propose a user selection method that utilizes CoC to minimize the average SINR loss of users in massive MU-MISO systems. Simulation results verify the correctness of the relation and show that the proposed user selection method is very effective at reducing the loss caused by SC in massive MU-MISO systems.

Implementing Rule-based Healthcare Edits

  • Abdullah, Umair;Shaheen, Muhammad;Ujager, Farhan Sabir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.116-132
    • /
    • 2022
  • Automated medical claims processing and billing is a popular application domain of information technology. Managing medical related data is a tedious job for healthcare professionals, which distracts them from their main job of healthcare. The technology used in data management has a sound impact on the quality of healthcare data. Most of Information Technology (IT) organizations use conventional software development technology for the implementation of healthcare systems. The objective of this experimental study is to devise a mechanism for use of rule-based expert systems in medical related edits and compare it with the conventional software development technology. A sample of 100 medical edits is selected as a dataset to be tested for implementation using both technologies. Besides empirical analysis, paired t-test is also used to validate the statistical significance of the difference between the two techniques. The conventional software development technology took 254.5 working hours, while rule-based technology took 81 hours to process these edits. Rule-based technology outperformed the conventional systems by increasing the confidence value to 95% and reliability measure to 0.462 (which is < 0.5) which is three times more efficient than conventional software development technology.

Integrated Management of Geographic Data and Vehicular Images in Geographic Information Systems

  • Yoo JaeJun
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.242-244
    • /
    • 2004
  • In this paper, we design and implement an integrated management system for geographic data and vehicular images using a Geographic Information System (GIS). Integrated management of geographic data and vehicular images is very important to manage and to provide them to users effectively because of a large volume of vehicular images. To manipulate these data together, we consider a vehicular image as a polygon which is a type of popular geographic data types. The polygon represents a region in which spatial objects appear the vehicular image.

  • PDF

Implementation Plan of Integrated Medical Information System for Ubiquitous Healthcare Service (U-Healthcare 서비스를 위한 통합의료정보시스템의 구축방안)

  • Jung, Yong-Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.115-126
    • /
    • 2010
  • Modern society can be described as ubiquitous computing over the concept of information. Information technology(IT) has been developing in a way that relative technologies are integrated to each other. Especially in ubiquitous environment, medical information industry shows significant interest in the U-healthcare service area. This paper will first look into U-healthcare service environment and component of Integrated Medical Information Systems(IMIS). Secondly, it examines the basic technological factors for integrated medical information systems, which is datawarehouse, network, communication standards and technology related U-healthcare service. Finally it proposes how to implement and operate new integrated medical information system for ubiquitous health care service. The system will do point of care(POC) for customers by real time and diagnose them using their various and personal medical data. The information will be communicated back to the customers, which will improve their satisfaction.

Protection System Against The Infringement of Information Signals in Fiber Communication System (광섬유 통신 시스템의 정보 신호 침해에 대한 보호 시스템)

  • Ugli, Sobirov Asilzoda Alisher;Umaralievich, Nishonov Ilhomjon;Kim, Daeik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.219-228
    • /
    • 2022
  • One of the most pressing and demanding issues today in the conditions of widespread transformation and digitalization of spheres of human activity is information security and ensuring the integrity of data. The main research and development in the field of information security is aimed at improving efficiency and rationalization. One of the main means of data transmission and operation of information complexes are fiber-optic systems. To date, there have been incidents of illegal intrusion and theft of information, passing through this type of communication. Thus, today there is a problem associated with insufficient information security in fiber-optic data transmission systems. One of the most effective tools to counter acts of illegal interference in systems are artificial intelligence and cryptographic algorithms of information protection. It is the symbiosis of these two tools that can qualitatively improve the level of information security in fiber-optic data transmission systems. Thus, the authors of this article pursue the goal associated with the description of an innovative system for protecting information from violations in fiber-optic data transmission systems based on the integration of intelligent cryptographic algorithms.

Pose and Expression Invariant Alignment based Multi-View 3D Face Recognition

  • Ratyal, Naeem;Taj, Imtiaz;Bajwa, Usama;Sajid, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4903-4929
    • /
    • 2018
  • In this study, a fully automatic pose and expression invariant 3D face alignment algorithm is proposed to handle frontal and profile face images which is based on a two pass course to fine alignment strategy. The first pass of the algorithm coarsely aligns the face images to an intrinsic coordinate system (ICS) through a single 3D rotation and the second pass aligns them at fine level using a minimum nose tip-scanner distance (MNSD) approach. For facial recognition, multi-view faces are synthesized to exploit real 3D information and test the efficacy of the proposed system. Due to optimal separating hyper plane (OSH), Support Vector Machine (SVM) is employed in multi-view face verification (FV) task. In addition, a multi stage unified classifier based face identification (FI) algorithm is employed which combines results from seven base classifiers, two parallel face recognition algorithms and an exponential rank combiner, all in a hierarchical manner. The performance figures of the proposed methodology are corroborated by extensive experiments performed on four benchmark datasets: GavabDB, Bosphorus, UMB-DB and FRGC v2.0. Results show mark improvement in alignment accuracy and recognition rates. Moreover, a computational complexity analysis has been carried out for the proposed algorithm which reveals its superiority in terms of computational efficiency as well.

Exploring Undergraduate Education of Industrial Engineers:Result of Survey for Graduates with Industrial Engineering Degree (산업공학 학부교육의 탐색:졸업생 설문조사 결과를 중심으로)

  • Park, Yang-Byung;Rim, Suk-Chul;Hong, Sung-Jo;Kim, Kwang-Jae;Yun, Myung-Hwan;Kim, Jong-Hwa;Lee, Deok-Joo;Cho, Nam-Wook;Suh, Young-Bo
    • IE interfaces
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2007
  • The main purpose of this research is to find out whether curriculums of industrial engineering (IE) departments meet the demand of IE graduates working in various fields. The research was conducted as an online questionnaire survey selecting IE Graduates working in industries as practising engineers. 1,324 participants were validated among 1,477 participants. 13 fields were selected and used in the survey. Those were; 1) Mathematical statistics, 2) Computer, 3) Purchase, 4) Production system, 5) Logistics, 6) Marketing, 7) Monetary, 8) Experiment methods, 9) Operations Research (OR), 10) Human Factors, 11) Quality, 12) Engineering management, and 13) Information systems. Using the 5-scale Likert rating, each education subject was assessed both in terms of its usefulness in practices and the amount it being taught in school. As a result, courses such as motion/time study, linear programming that IE has traditionally focused showed less usefulness in practices while it is taught in relatively large amount in schools. However, courses such as 6 sigma, CRM which are closely related to industrial practices showed high usefulness in practices compared with low degree of teaching in school. This was the first ever large scalesurvey conducted for IE graduates in Korea. The result of survey displayed many helpful information on current status and future direction of IE education in Korea.

Difference between Information Security Education Demand of Information Security Employees and Curriculum of Information Security Education Center (교육기관 정보보호 담당자의 정보보호 교육수요와 정보보호 교육센터의 교육과정과의 차이)

  • Kang, Mi-Hwa;Jun, Hyo-Jung;Kim, Tae-Sung
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.179-190
    • /
    • 2014
  • Because personal information files held by educational institutions include sensitive information such as personal school affairs information or health information, damages resulted from personal information leakage of educational institutions are expected to be serious. In order to respond to this problem, the Ministry of Education has expanded information security education targeting (personal) information security officers in educational institutions. However, a number of personal information leakage cases of public institutions occurred at educational institutions. Thus, this study, targeting information security education centers, through an empirical research, tries to confirm whether information security education supply is being properly provided for (personal) information security officers in educational institutions, and suggest the appropriate balance between education supply and education demand as the implication for the educational direction of information security education centers.