• 제목/요약/키워드: SW(software)

Search Result 714, Processing Time 0.026 seconds

Models of Database Assets Valuation and their Life-cycle Determination (데이터베이스 자산 가치평가 모형과 수명주기 결정)

  • Sung, Tae-Eung;Byun, Jeongeun;Park, Hyun-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.676-693
    • /
    • 2016
  • Although the methodology and models to assess the economic value of technology assets such as patents are being presented in various ways, there does not exist a structured assessment model which enables to objectively assess a database property's value, and thus there is a need to enhance the application feasibility of practical purposes such as licensing of DB assets, commercialization transfer, security, etc., through the establishment of the valuation model and the life-cycle decision logic. In this study, during the valuation process of DB assets, the size of customer demand group expected and the amount of demand, the size and importance of data sets, the approximate degree of database' contribution to the sales performance of a company, the life-cycle of database assets, etc. will be analyzed whether they are appropriate as input variables or not. As for most of DB assets, due to irregular updates there are hardly cases their life-cycle expires, and thus software package's persisting period, ie. 5 years, is often considered the standard. We herein propose the life-cycle estimation logic and valuation models of DB assets based on the concept of half life for DB usage frequency under the condition that DB assets' value decays and there occurs no data update over time.

A Research on the Mid- and Long-term Strategic Plan for Developing Gangwon Metropolitan Office of Education (강원도 교육문화관(도서관) 운영 활성화를 위한 중·장기 발전계획 연구)

  • Kwack, Dong-Chul;Yoon, Cheong-Ok;Kim, Yong-hwan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.3
    • /
    • pp.21-39
    • /
    • 2020
  • The purpose of this research is to build a mid- and long-term strategic plan for strengthening the status of Gangwon Metropolitan Office of Education as public libraries with the main functions of education, knowledge and culture in the community and helping facilitate the local growth. The current status and needs of Gangwon Metropolitan Office of Education was analyzed with a review of literature and websites, various library statistics, and user surveys and professional focus group interviews conducted during November and December 2019. Based on this analysis, a mission, vision, objectives, strategies, and main tasks of Gangwon Metropolitan Office of Education were established, and 4 strategic goals and 16 major projects were drawn to strengthen the strategic basis of 22 libraries, build specialized collections with a focus on education, recreate user-friendly spaces, and promote services, distinguished from public libraries under the supervision of Gangwon local government. It was necessary for Gangwon Metropolitan Office of Education to enhance and strengthen all of Hardware, Software and Human-ware, equipped with well-organized library building and facilities, collection and services, and professional librarians. In this research, the direction of a mid- and long-term strategic plan was presented for its dynamic operation and sustainable development in the future.

The Ethical Regime and Technological Citizenship in Software Oriented Society (SW(소프트웨어)중심사회의 윤리적 체제와 기술 시티즌십)

  • Kim, Seungeun;Kim, Hyomin
    • Journal of Science and Technology Studies
    • /
    • v.15 no.2
    • /
    • pp.263-301
    • /
    • 2015
  • Digital inclusion is the ability or opportunities of individuals and groups to access and use information technology (IT). Digital inclusion strategies aims to ensure that all citizens regardless of their gender, race and class benefit from IT. Discourse of digital inclusion is notable in that it proposes a desirable relationship between the state, individuals, and the market within the shifting topology of technoscience. Throughout broad discourse analysis of media coverages, in-depth interviews and reports on Korean IT industry, this research argues that dialogues on digital inclusion have substantially influenced the formation of a specific ethical regime. In this regime, individuals should become subjects embodying IT expertise and acceptable codes of conducts. We further discuss that such government-driven ethical regime conflicts with technological citizenship practiced by IT experts and semi-experts. We make theoretical contribution to STS by expanding the concept of technological citizenship to include the rights and obligations of heterogeneous expert and semi-expert groups to form, propose and socially demand alternative developmental pathways of technoscience. We also note that, amid the conflict between ethical regime and technological citizenship, alternative interpretations of gender gap can be forged, providing competing perspectives on women's under-representation and labor conditions in the IT industry. Further research is required to capture the emergence of multiple identities--differentiated by gender, race, class, and more--within the clashing interface between the ethical regime and technological citizenship.

Basin modelling with a MATLAB-based program, BasinVis 2.0: A case study on the southern Vienna Basin, Austria (MATLAB 기반의 프로그램 BasinVis 2.0을 이용한 분지 모델링: 오스트리아 비엔나 분지의 남부 지역에 대한 사례 연구)

  • Lee, Eun Young;Wagreich, Michael
    • Journal of the Geological Society of Korea
    • /
    • v.54 no.6
    • /
    • pp.615-630
    • /
    • 2018
  • Basin analysis is a research field to understand the formation and evolution of sedimentary basins. This task requires various geoscientific datasets as well as numerical and graphical modelling techniques to synthesize results dimensionally in time and space. For basin analysis and modelling in a comprehensive workflow, BasinVis 1.0 was released as a MATLAB-based program in 2016, and recently the software has been extended to BasinVis 2.0, with new functions and revised user-interface. As a case study, this work analyses the southern Vienna Basin and visualizes the sedimentation setting and subsidence evolution to introduce the basin modelling functions of BasinVis 2.0. This is a preliminary study for a basin-scale modelling of the Vienna Basin, together with our previous studies using BasinVis 1.0. In the study area, during the late Early Miocene, sedimentation and subsidence are significant along strike-slip and en-echelon listric normal faults. From the Middle Miocene onwards, however, subsidence decreases abruptly over the area and this situation continues until the Late Miocene. This is related to the development of the pull-apart system and corresponds to the episodic tectonic subsidence in strike-slip basins. The subsidence of the Middle Miocene is confined mainly to areas along the strike-slip faults, while, from the late Middle Miocene, the depocenter shifts to a depression along the N-S trending listric normal faults. This corresponds to the regional paleostress regime transitioning from NE-SW trending transtension to E-W trending extension. This study applies various functions and techniques to this case study, and the modelled results demonstrate that BasinVis 2.0 is effective and applicable to the basin modelling.

A Study on HILS for Performance Analysis of Airborne EOTS for Aircraft (항공기용 EOTS 성능분석을 위한 HILS시스템 구축에 관한 연구)

  • Chun, Seungwoo;Baek, Woonhyuk;La, Jongpil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.55-64
    • /
    • 2013
  • In this paper, the HILS (Hardware In-the-Loop Simulation) system to analyze and to verify the performance of the targeting pod is addressed. The main functions of the targeting pod is acquiring and tracking targets to guide a LGB (Laser Guided Bomb) to the targets. For the analysis of targeting pod, the real time simulate images generation of IR and daylight cameras, sever control technology, and the analysis of laser transfer characteristics are necessary. For the real time image generation and the laser transfer characteristics analysis, off-the-shelf SDK(Software Development Kit) OKTAL-SE is used. For the servo controller, well-proven mechanism in the previous program is applied to increase servo control accuracy. To analyze the performance of a targeting pod in a realistic environment, 1553B, ARINK818 interface and etc. which are actually implemented in real combat aircrafts are applied in the system. By using the developed HILS system, the performance of currently operating targeting pods in real combat aircrafts can be analyzed and predicted. Additionally, the relationship between overall system performance and each module performance can be analyzed, the currently developed HILS system is expected to be a very useful tool to generate system development requirements of targeting pods and to reduce any possible future development risks.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Risk Factors Identification and Priority Analysis of Bigdata Project (빅데이터 프로젝트의 위험요인 식별과 우선순위 분석)

  • Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.25-40
    • /
    • 2019
  • Many companies are executing big data analysis and utilization projects to legitimize the development of new business areas or conversion of management or technical strategies. In Korea and abroad, however, such projects are failing because they are not completed within specified deadlines, which is not unrelated to the current situation in which the knowledge base for big data project risk management from an engineering perspective is grossly lacking. As such, the current study analyzes the risk factors of big data implementation and utilization projects, in addition to finding risk factors that are highly important. To achieve this end, the study extracts project risk factors via literature review, after which they are grouped using affinity methodology and sifted through expert surveys. The deduced risk factors are structuralize using factor analysis to develop a table that categorizes various types of big data project risk factors. The current study is significant that in it provides a basis for developing basic control indicators related to risk identification, risk assessment, and risk analysis. The findings from the study contribute greatly to the success of big data projects, by providing theoretical basis regarding efficient big data project risk management.

An Exploratory Study on Sales and Operations Planning as SCM Supporting Tool (공급망 관리 지원도구로서의 S&OP 운영에 관한 탐색적 연구)

  • Park, Seong Taek;Kim, Tae Ung;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.93-103
    • /
    • 2021
  • S&OP(Sales and Operations Planning) is an ongoing process of periodic planning, reviewing, and evaluation through the involvement of all key stakeholders. Within this process, performance is regularly reviewed and early warning signals are generated, so that the company can react quickly to changing market and operational environment. This paper presents a framework for effective S&OP for fair alignment, accountability, teamwork, visibility, and risk management. This framework focuses on supply chain information governance, level of information sharing through S&OP, role of S&OP as coordination mechanism, APS effectivesness as a planning tool and SCM performance. In addition, a brief case study on the operating characteristics of S&OP at three Korean firms is presented. Implications of the study finding are also provided. It will also make companies that are considering the introduction of S&OP aware of the importance of S&OP, which will provide practical guidelines for the introduction of S&OP.

Network Performance Verification for Next-Generation Power Distribution Management System Using FRTU Simulator (FRTU 시뮬레이터를 이용한 차세대 배전지능화시스템 네트워크 성능검증)

  • Yeo, Sang-Uk;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.523-529
    • /
    • 2020
  • Power distribution management system is essential for the efficient management and operation of power distribution networks. The power distribution system is a system that manages the distribution network based on IT, and has been evolving along with the development of the power industry. The current power distribution system is designed to operate at a relatively low network transmission speed based on the independent operation of the main equipment. However, due to distributed resources such as photovoltaic or energy storage devices, which are rapidly increasing in popularity in recent years, the operation of future distribution environments is becoming more complex, and various information needs to be collected in real time. In this study, the requirements of the next-generation power distribution system were derived to overcome the limitations of the existing power distribution system, and based on this, the communication network system and performance requirements for the distribution system were defined. In order to verify the performance of the designed system, a software-based terminal device simulator was developed because it takes excessive time and cost to introduce a large-scale system such as a power distribution system. Using the simulator, a test environment similar to the actual operation was established, and the number of terminal devices was increased up to 1,000. The proposed system was shown to satisfy the requirements to support the functions of the next-generation power distribution system, recording less than 10 % of the communication network bandwidth.

A Study on Court Auction System using Ethereum-based Ether (이더리움 기반의 이더를 사용한 법원 경매 시스템에 관한 연구)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.31-40
    • /
    • 2021
  • Blockchain technology is also actively studied in the real estate transaction field, and real estate transactions have various ways. In this paper, we propose a model that simplifies the authentication procedure of auction systems using Ethereum's Ether to solve the problem of offline court auctions. The proposed model is written in Ethereum's Solidity language, the court registers the sale date and the sale date with the DApp browser, and the bidder accesses the address of the individual's wallet created through Metamask's private key. The bidder then selects the desired sale and enters the bid price amount to participate in the auction. The bidder's record of the highest bid price for the sale he wants is written on the Ethereum test network as a smart contract. and creates a block. Finally, smart contracts written on the network are distributed by the court auction manager to all nodes in the blockchain network, and each node in the blockchain network can be viewed and contract verified. As a result of analyzing the smart contracts of the proposed model and the performance of the system, there are fees incurred due to the creation and use of Ether on platforms using Ethereum, and participation. Ether's changes in value affect the price of the sale, resulting in inconsistent fees in smart contracts each time. However, in future work, we issue our own tokens to solve the market volatility problem and commission problem with the value change of Ether, and refine complex court auction systems.