• Title/Summary/Keyword: Systems Performance

Search Result 25,977, Processing Time 0.053 seconds

A Study on the Elaboration of Request for Proposal of Localization Parts using AHP method (AHP 기법을 적용한 부품국산화 제안요청서 정교화 연구)

  • Song, Hyeong-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.35-44
    • /
    • 2020
  • The purpose of this study is to elaborate the request for proposal (RFP) for the localization parts development support project of core parts carried out by the Defense Agency for Technology and Quality. The RFP is the most important document throughout the localization parts project, including project announcement and developer selection, design and test of the development product, final evaluation, and standardization of the project. However, if the RFP is not established at the beginning of the project, there is an increased risk of business failure due to frequent changes by various reasons. In this study, we recognized the necessity of elaboration of RFP and applied the AHP method for quantitative elaboration. Eight requirements of the RFP related to the mechanical/electrical performance of localized development products and three elaboration methods for each requirement were designed in a hierarchical structure, and each weight was calculated by applying the 5-point scale AHP method. The AHP survey was conducted with 20 developers participating in the localization parts project, and the consistency ratio of the AHP survey result was less than 0.1. The elaboration method with the highest value among the calculated weights is classified, and the analysis results and future research directions of the elaboration method are presented.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

Does Online Social Network Contribute to WOM Effect on Product Sales? (온라인 소셜네트워크의 제품판매 관련 구전효과에 대한 기여도 분석)

  • Lee, Ju-Yoon;Son, In-Soo;Lee, Dong-Won
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.85-105
    • /
    • 2012
  • In recent years, IT advancement has brought out the new Internet communication environment such as online social network services, where people are connected in global network without temporal and spatial limitation. The popular use of online social network helps people share their experience and preference for specific products and services, thus holding large potential to significantly affect firms' business performance through Word-of-Mouth (WOM). This study examines the role of online social network in raising WOM effect on the movie industry by comparing with the similar role of Internet portal, another major online communication channel. Analyzing 109 movies and data from both Twitter and Naver movie, we found that significant WOM effect exists simultaneously in both Twitter and Naver movie. However, we also found that different figures of online viral effects exist depending on the popularity of movies. In the hit movie group, before the movie release, the WOM effect occurs only in Twitter while the WOM effect arises in both Twitter and Naver movie at the same time after the movie release. In the less-popular (or niche) movie group, the WOM effect occurs in both Twitter and Naver movie only before the movie release. Our findings not only deepen theoretical insights into different roles of the two online communication channels in provoking the WOM effect on entertainment products but also provide practitioners with incentive to utilize SNS as strategic marketing platform to enhance their brand reputations.

Study of the Acceptance of Interested Parties(Auditor /Auditee) in the Information System Audit Technologies Based Technology Acceptance Model(TAM) (정보시스템 감리기술에 대해 이해관계자(감리인/피감리인)의 수용에 관한 연구 -기술수용모델(TAM)을 중심으로-)

  • Kim, Hak-Joon;Jeon, Soon-Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1403-1413
    • /
    • 2015
  • An information System Audit by the recognition of a problem and suggestions for solutions for overall matters about constructing and managing information systems is needed in order to contribute to the improvement of an information system's quality and improving the performance of projects. In reality, however, the general cognition is that audit is biased by subjective opinions. For this, an auditor needs to measure the level of recognition of the usability and convenience of the technologies of automating audit by applying TAM in the information system audit, and to analyze the relationship with recognition and availability of the interested parties for the technology (tool) of the audit. By the hypothesis verification result, an auditor needs to present objective corroborative facts that back up the level of recognition and usability for the information technology in the field of audit. This study verified that the phenomenon of technology application can be explained and predicted by applying TAM in the field of audit. Through an empirical study of the recognition level of audit and contractor, the developer suggests that the audit plan stage is similar to the audit corrective action stage, but the audit action stage is different from the audit review stage. This research can verify the audit technology preferred for the availability and intention of use and usability.

A Ubiquitous Home Network System for Managing Environment-Information Sensors using Image Processing (영상 처리를 이용하여 주변 환경 센서를 관리하기 위한 유비쿼터스 홈 네트워크 시스템)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.931-942
    • /
    • 2010
  • A home network provides users with a variety of information services. The kind and quality of the services can be substantially enhanced by utilizing a variety of data from sensors. However, home networks currently limit their potential by focusing on providing multimedia services rather than services utilizing sensor data. Outdoor electronics are frequently made in a form that emphasizes only certain limited functions in contrast to home appliances. Thus, sensors with one or two functions rather than many can be used in outdoor systems and their use will be more economical than using sensor nodes indoors with more complex home appliances. In this study, we chose to work with motion sensors as they have many potential uses, and we selected a parking lot control system with to use the motion sensors. This parking lot control system was implemented and applied as part of a home network. For this purpose, we defined and implemented a protocol to manage the network in a ubiquitous sensor network environment for the wireless home network in this study. Although a network management system in a Ubiquitous Sensor Network (USN) related to this study is being advanced for other projects, the protocol interface and message system have not yet been clearly defined for use in a general purpose network or in an extension into heterogeneous kinds of networks, communication support, etc. Therefore, USN network management should be conducted for management of faults, composition, power, and applications. To verify the performance of the protocol interface designed in this study, we designed and implemented the necessary units (sensor nodes, sensor gateway, and server) for each network section and, with them, proved the validity of this study.

A Wireless Sensor Network Systems to Identify User and Detect Location Transition for Smart Home (지능형 주택을 위한 구성원 식별 및 위치 이동 감지 센서 네트워크 시스템)

  • Lee, Seon-Woo;Yang, Seung-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.396-402
    • /
    • 2010
  • The tracking of current location of residents is an essential requirement for context-aware service of smart houses. This paper presents a wireless sensor network system which could detect location transition such as entrance and exit to a room and also identify the user who passed the room, without duty of wearing any sort of tag. We designed new sensor node to solve the problem of short operation lifetime of previous work[1] which has two pyroelectric infrared (PIR) sensors and an ultrasonic sensor, as well as a 2.4 GHz radio frequency wireless transceiver. The proposed user identification method is to discriminate a person based on his/her height by using an ultrasonic sensor. The detection idea of entering/exiting behavior is based on order of triggering of two PIR sensors. The topology of the developed wireless sensor network system is simple star structure in which each sensor node is connected to one sink node directly. We evaluated the proposed sensing system with a set of experiments for three subjects in a model house. The experimental result shows that the averaged recognition rate of user identification is 81.3% for three persons. and perfect entering/exiting behavior detection performance.

Efficient Fault-Tolerant Multicast on Hypercube Multicomputer System (하이퍼 큐브 컴퓨터에서 효과적인 오류 허용 다중전송기법)

  • 명훈주;김성천
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.273-279
    • /
    • 2003
  • Hypercube multicomputers have been drawing considerable attention from many researchers due to their regular structure and short diameter. One of keys to the performance of Hypercube is the efficiency of communication among processors. Among several communication patterns, multicast is important, which is found in a variety of applications as data replication and signal processing. As the number of processors increases, the probability of occurrences of fault components also increases. So it would be desirable to design an efficient scheme that multicasts messages in the presence of faulty component. In fault-tolerant routing and multicast, there are local information based scheme, global information based scheme and limited information based scheme in terms of information. In general, limited information is easy to obtain and maintain by compressing information in a concise format. In this paper, we propose a new routing scheme and a new multicast scheme using recently proposed fully reachability information scheme and new local information scheme. The proposed multicast scheme increases multicast success possibility and reduce deroute cases. Experiments show that multicast success possibility can increase at least 15% compared to previous method.

An Efficient Real-Time Concrrency Control Algorithm using the Feasibility Test (실행가능성검사를 이용한 효율적인 실시간 동시성제어알고리즘)

  • Lee, Seok-Jae;Sin, Jae-Ryong;Song, Seok-Il;Yu, Jae-Su;Jo, Gi-Hyeong;Lee, Byeong-Yeop
    • Journal of KIISE:Databases
    • /
    • v.29 no.4
    • /
    • pp.297-310
    • /
    • 2002
  • The 2PL-HP(Two Phase Locking with High Priority) method has been used to guarantee preceding process of a high priority transaction(HPT) in real-time database systems. The method resolves a conflict through aborting or blocking of a low priority transaction(LPT). However, if HPT is eliminated in a system because of its deadline missing, an unnecessary aborting or blocking of LPT is occurred. Recently, to resolve the problem, a concurrency control algorithm using alternative version was proposed. However, the algorithm must always create the alternative version and needs an addtional technique to manage complex alternative versions. In this paper, we propose an efficient concurrency control algorithm that prevents needless wastes of resources and eliminates unnecessary aborting or blocking of LTP. And it is shown through the performance evaluation that the proposed concurrency control algorithm outperforms the existing concurrency control algorithm using alternative version.

Prediction of Power Consumption for Improving QoS in an Energy Saving Server Cluster Environment (에너지 절감형 서버 클러스터 환경에서 QoS 향상을 위한 소비 전력 예측)

  • Cho, Sungchoul;Kang, Sanha;Moon, Hungsik;Kwak, Hukeun;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.47-56
    • /
    • 2015
  • In an energy saving server cluster environment, the power modes of servers are controlled according to load situation, that is, by making ON only minimum number of servers needed to handle current load while making the other servers OFF. This algorithm works well under normal circumstances, but does not guarantee QoS under abnormal circumstances such as sharply rising or falling loads. This is because the number of ON servers cannot be increased immediately due to the time delay for servers to turn ON from OFF. In this paper, we propose a new prediction algorithm of the power consumption for improving QoS under not only normal but also abnormal circumstances. The proposed prediction algorithm consists of two parts: prediction based on the conventional time series analysis and prediction adjustment based on trend analysis. We performed experiments using 15 PCs and compared performance for 4 types of conventional time series based prediction methods and their modified methods with our prediction algorithm. Experimental results show that Exponential Smoothing with Trend Adjusted (ESTA) and its modified ESTA (MESTA) proposed in this paper are outperforming among 4 types of prediction methods in terms of normalized QoS and number of good reponses per power consumed, and QoS of MESTA proposed in this paper is 7.5% and 3.3% better than that of conventional ESTA for artificial load pattern and real load pattern, respectively.

Planning Evacuation Routes with Load Balancing in Indoor Building Environments (실내 빌딩 환경에서 부하 균등을 고려한 대피경로 산출)

  • Jang, Minsoo;Lim, Kyungshik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.7
    • /
    • pp.159-172
    • /
    • 2016
  • This paper presents a novel algorithm for searching evacuation paths in indoor disaster environments. The proposed method significantly improves the time complexity to find the paths to the evacuation exit by introducing a light-weight Disaster Evacuation Graph (DEG) for a building in terms of the size of the graph. With the DEG, the method also considers load balancing and bottleneck capacity of the paths to the evacuation exit simultaneously. The behavior of the algorithm consists of two phases: horizontal tiering (HT) and vertical tiering (VT). The HT phase finds a possible optimal path from anywhere of a specific floor to the evacuation stairs of the floor. Thus, after finishing the HT phases of all floors in parallel the VT phase begins to integrate all results from the previous HT phases to determine a evacuation path from anywhere of a floor to the safety zone of the building that could be the entrance or the roof of the building. It should be noted that the path produced by the algorithm. And, in order to define the range of graph to process, tiering scheme is used. In order to test the performance of the method, computing times and evacuation times are compared to the existing path searching algorithms. The result shows the proposed method is better than the existing algorithms in terms of the computing time and evacuation time. It is useful in a large-scale building to find the evacuation routes for evacuees quickly.