• Title/Summary/Keyword: Technology Framework

Search Result 4,231, Processing Time 0.033 seconds

Universal Ethics and Pragmatic Pluralism (보편윤리학과 실용주의적 다원론)

  • Kwon, Su-Hyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.446-453
    • /
    • 2021
  • This paper deals with two methods regarding fact and value. One is the method of H. Putnam, which is to break the boundary between fact and value and to make a world where the two have an inherent connection. The other is the method of J. Habermas, which regards fact and value as the product of an intersubjective agreement based on argumentation. Putnam, through his position of internal realism, moves from realism to pragmatism, especially by combining the rationalist tradition of Kant and Dewey's pragmatic views. Habermas also stands in the tradition of rationalism and universalism in Kant, at the same time emphasizing the practicability of truth in Hegel's tradition of historical reason. The significance of the strategy of Putnam and Habermas is that they have attempted to revive the realm of value against the strict dichotomy of facts and values and the subsequent devaluation of rationality in the realm of value. The starting point of this attempt is that the practical foundation of rationality is laid on life and practice. This could provide the room for escaping from rationality, which prioritizes only truths that reveal facts, that is, instrument-reduced rationality, the room for the revival of practical rationality through reflection on what is the purpose of life, and, in turn, the room for resisting to pass the realm of values and norms to the logic of habitual routines or customs. However, despite such common goal, there are clear limitations to Putnam's approach due to the differences in the strategies taken on facts and values. Putnam's method can demolish the whole universal framework that is the foundation where pragmatic pluralism will be fostered, eliminating the difference between the specificity of values and the universality of norms and shaking up the status of universal ethics. Therefore, Habermas' ethical theory is proposed as an alternative to establish a basis for universal ethics by relying on communication rationality and to secure the coercion of norms and blossom cultural pluralism as a diverse lifestyle based on this coercion.

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

Changes in the Linear Compressibility and Bulk Modulus of Natural Stilbite Under Pressure with Varying Pressure-Transmitting Media (천연 스틸바이트의 압력전달매개체에 따른 선형압축률 및 체적탄성률 비교 연구)

  • Hwang, Huijeong;Lee, Hyunseung;Lee, Soojin;Jung, Jaewoo;Lee, Yongmoon
    • Korean Journal of Mineralogy and Petrology
    • /
    • v.35 no.3
    • /
    • pp.367-376
    • /
    • 2022
  • This study is a preliminary step to understand the reaction between various liquids and zeolite in the subduction zone environment. Stilbite, NaCa4(Al9Si27)O72·28(H2O), was selected and high pressure study was conducted on compressional behavior by the pressure-transmitting medium (PTM). Water and NaHCO3 solution that can exist in the subduction zone was used as PTM, and samples were pressurized from ambient to a maximum of 2.5 GPa. Below 1.0 GPa, both experiments show a low linear compressibility in the range of 0.001 to 0.004 GPa-1 and a high bulk modulus of 220(1) GPa. This is presumably because the structure of the stilbite becomes very dense due to insertion of water molecules or cations into the channel. On the other hand, at 1.0 GPa or higher, the trends of the two experiments are different. In the water run, the linear compressibility of the c-axis is increased to 0.006(1) GPa-1. In the NaHCO3 run, the linear compressibility of the b- and c-axis is increased to 0.006(1) GPa-1. The bulk modulus after 1.0 GPa shows values of 40(1) and 52(7) GPa in water and NaHCO3 run, respectively, confirming that stilbite becomes more compressible than that before 1.0 GPa. It is caused by the migration of cations and water molecules inside the channel, as the water molecules in the PTM start to freeze and stop to insert toward the channel at 1.0 GPa or more. In the NaHCO3 run, it is assumed that the distribution of extra-framework species inside the structure is changed by substitution of the Na+ cation. It can be expected from tendency of the relative intensity ratio of the (001) and (020) peaks which show a different from that of the water run.

Digital Archives of Cultural Archetype Contents: Its Problems and Direction (디지털 아카이브즈의 문제점과 방향 - 문화원형 콘텐츠를 중심으로 -)

  • Hahm, Han-Hee;Park, Soon-Cheol
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.17 no.2
    • /
    • pp.23-42
    • /
    • 2006
  • This is a study of the digital archives of Culturecontent.com where 'Cultural Archetype Contents' are currently in service. One of the major purposes of our study is to point out problems in the current system and eventually propose improvements to the digital archives. The government launched a four-year project for developing the cultural archetype content sources and establishing its related business with the hope of enhancing the nation's competitiveness. More specifically, the project focuses on the production of source materials of cultural archetype contents in the subjects of Korea's history. tradition, everyday life. arts and general geographical books. In addition, through this project, the government also intends to establish a proper distribution system of digitalized culture contents and to control copyright issues. This paper analyzes the digital archives system that stores the culture content data that have been produced from 2002 to 2005 and evaluates the current system's weaknesses and strengths. The summary of our findings is as follows. First. the digital archives system does not contain a semantic search engine and therefore its full function is 1agged. Second, similar data is not classified into the same categories but into the different ones, thereby confusing and inconveniencing users. Users who want to find source materials could be disappointed by the current distributive system. Our paper suggests a better system of digital archives with text mining technology which consists of five significant intelligent process-keyword searches, summarization, clustering, classification and topic tracking. Our paper endeavors to develop the best technical environment for preserving and using culture contents data. With the new digitalized upgraded settings, users of culture contents data will discover a world of new knowledge. The technology we introduce in this paper will lead to the highest achievable digital intelligence through a new framework.

Consumer Responses to Retailer's Location-based Mobile Shopping Service : Focusing on PAD Emotional State Model and Information Relevance (유통업체의 위치기반 모바일 쇼핑서비스 제공에 대한 소비자 반응 : PAD 감정모델과 정보의 상황관련성을 중심으로)

  • Lee, Hyun-Hwa;Moon, Hee-Kang
    • Journal of Distribution Research
    • /
    • v.17 no.2
    • /
    • pp.63-92
    • /
    • 2012
  • This study investigated consumer intention to use a location-based mobile shopping service (LBMSS) that integrates cognitive and affective responses. Information relevancy was integrated into pleasure-arousal-dominance (PAD) emotional state model in the present study as a conceptual framework. The results of an online survey of 335 mobile phone users in the U.S. indicated the positive effects of arousal and information relevancy on pleasure. In addition, there was a significant relationship between pleasure and intention to use a LBMSS. However, the relationship between dominance and pleasure was not statistically significant. The results of the present study provides insight to retailers and marketers as to what factors they need to consider to implement location-based mobile shopping services to improve their business performance. Extended Abstract : Location aware technology has expanded the marketer's reach by reducing space and time between a consumer's receipt of advertising and purchase, offering real-time information and coupons to consumers in purchasing situations (Dickenger and Kleijnen, 2008; Malhotra and Malhotra, 2009). LBMSS increases the relevancy of SMS marketing by linking advertisements to a user's location (Bamba and Barnes, 2007; Malhotra and Malhotra, 2009). This study investigated consumer intention to use a location-based mobile shopping service (LBMSS) that integrates cognitive and affective response. The purpose of the study was to examine the relationship among information relevancy and affective variables and their effects on intention to use LBMSS. Thus, information relevancy was integrated into pleasure-arousal-dominance (PAD) model and generated the following hypotheses. Hypothesis 1. There will be a positive influence of arousal concerning LBMSS on pleasure in regard to LBMSS. Hypothesis 2. There will be a positive influence of dominance in LBMSS on pleasure in regard to LBMSS. Hypothesis 3. There will be a positive influence of information relevancy on pleasure in regard to LBMSS. Hypothesis 4. There will be a positive influence of pleasure about LBMSS on intention to use LBMSS. E-mail invitations were sent out to a randomly selected sample of three thousand consumers who are older than 18 years old and mobile phone owners, acquired from an independent marketing research company. An online survey technique was employed utilizing Dillman's (2000) online survey method and follow-ups. A total of 335 valid responses were used for the data analysis in the present study. Before the respondents answer any of the questions, they were told to read a document describing LBMSS. The document included definitions and examples of LBMSS provided by various service providers. After that, they were exposed to a scenario describing the participant as taking a saturday shopping trip to a mall and then receiving a short message from the mall. The short message included new product information and coupons for same day use at participating stores. They then completed a questionnaire containing various questions. To assess arousal, dominance, and pleasure, we adapted and modified scales used in the previous studies in the context of location-based mobile shopping service, each of the five items from Mehrabian and Russell (1974). A total of 15 items were measured on a seven-point bipolar scale. To measure information relevancy, four items were borrowed from Mason et al. (1995). Intention to use LBMSS was captured using two items developed by Blackwell, and Miniard (1995) and one items developed by the authors. Data analyses were conducted using SPSS 19.0 and LISREL 8.72. A total of usable 335 data were obtained after deleting the incomplete responses, which results in a response rate of 11.20%. A little over half of the respondents were male (53.9%) and approximately 60% of respondents were married (57.4%). The mean age of the sample was 29.44 years with a range from 19 to 60 years. In terms of the ethnicity there were European Americans (54.5%), Hispanic American (5.3%), African-American (3.6%), and Asian American (2.9%), respectively. The respondents were highly educated; close to 62.5% of participants in the study reported holding a college degree or its equivalent and 14.5% of the participants had graduate degree. The sample represents all income categories: less than $24,999 (10.8%), $25,000-$49,999 (28.34%), $50,000-$74,999 (13.8%), and $75,000 or more (10.23%). The respondents of the study indicated that they were employed in many occupations. Responses came from all 42 states in the U.S. To identify the dimensions of research constructs, Exploratory Factor Analysis (EFA) using a varimax rotation was conducted. As indicated in table 1, these dimensions: arousal, dominance, relevancy, pleasure, and intention to use, suggested by the EFA, explained 82.29% of the total variance with factor loadings ranged from .74 to .89. As a next step, CFA was conducted to validate the dimensions that were identified from the exploratory factor analysis and to further refine the scale. Table 1 exhibits the results of measurement model analysis and revealed a chi-square of 202.13 with degree-of-freedom of 89 (p =.002), GFI of .93, AGFI = .89, CFI of .99, NFI of .98, which indicates of the evidence of a good model fit to the data (Bagozzi and Yi, 1998; Hair et al., 1998). As table 1 shows, reliability was estimated with Cronbach's alpha and composite reliability (CR) for all multi-item scales. All the values met evidence of satisfactory reliability in multi-item measure for alpha (>.91) and CR (>.80). In addition, we tested the convergent validity of the measure using average variance extracted (AVE) by following recommendations from Fornell and Larcker (1981). The AVE values for the model constructs ranged from .74 through .85, which are higher than the threshold suggested by Fornell and Larcker (1981). To examine discriminant validity of the measure, we again followed the recommendations from Fornell and Larcker (1981). The shared variances between constructs were smaller than the AVE of the research constructs and confirm discriminant validity of the measure. The causal model testing was conducted using LISREL 8.72 with a maximum-likelihood estimation method. Table 2 shows the results of the hypotheses testing. The results for the conceptual model revealed good overall fit for the proposed model. Chi-square was 342.00 (df = 92, p =.000), NFI was .97, NNFI was .97, GFI was .89, AGFI was .83, and RMSEA was .08. All paths in the proposed model received significant statistical support except H2. The paths from arousal to pleasure (H1: ${\ss}$=.70; t = 11.44), from information relevancy to intention to use (H3 ${\ss}$ =.12; t = 2.36), from information relevancy to pleasure (H4 ${\ss}$ =.15; t = 2.86), and pleasure to intention to use (H5: ${\ss}$=.54; t = 9.05) were significant. However, the path from dominance to pleasure was not supported. This study investigated consumer intention to use a location-based mobile shopping service (LBMSS) that integrates cognitive and affective responses. Information relevancy was integrated into pleasure-arousal-dominance (PAD) emotional state model as a conceptual framework. The results of the present study support previous studies indicating that emotional responses as well as cognitive responses have a strong impact on accepting new technology. The findings of this study suggest potential marketing strategies to mobile service developers and retailers who are considering the implementation of LBMSS. It would be rewarding to develop location-based mobile services that integrate information relevancy and which cause positive emotional responses.

  • PDF

A Study on Improvements on Legal Structure on Security of National Research and Development Projects (과학기술 및 학술 연구보고서 서비스 제공을 위한 국가연구개발사업 관련 법령 입법론 -저작권법상 공공저작물의 자유이용 제도와 연계를 중심으로-)

  • Kang, Sun Joon;Won, Yoo Hyung;Choi, San;Kim, Jun Huck;Kim, Seul Ki
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.05a
    • /
    • pp.545-570
    • /
    • 2015
  • Korea is among the ten countries with the largest R&D budget and the highest R&D investment-to-GDP ratio, yet the subject of security and protection of R&D results remains relatively unexplored in the country. Countries have implemented in their legal systems measures to properly protect cutting-edge industrial technologies that would adversely affect national security and economy if leaked to other countries. While Korea has a generally stable legal framework as provided in the Regulation on the National R&D Program Management (the "Regulation") and the Act on Industrial Technology Protection, many difficulties follow in practice when determining details on security management and obligations and setting standards in carrying out national R&D projects. This paper proposes to modify and improve security level classification standards in the Regulation. The Regulation provides a dual security level decision-making system for R&D projects: the security level can be determined either by researcher or by the central agency in charge of the project. Unification of such a dual system can avoid unnecessary confusions. To prevent a leakage, it is crucial that research projects be carried out in compliance with their assigned security levels and standards and results be effectively managed. The paper examines from a practitioner's perspective relevant legal provisions on leakage of confidential R&D projects, infringement, injunction, punishment, attempt and conspiracy, dual liability, duty of report to the National Intelligence Service (the "NIS") of security management process and other security issues arising from national R&D projects, and manual drafting in case of a breach. The paper recommends to train security and technological experts such as industrial security experts to properly amend laws on security level classification standards and relevant technological contents. A quarterly policy development committee must also be set up by the NIS in cooperation with relevant organizations. The committee shall provide a project management manual that provides step-by-step guidance for organizations that carry out national R&D projects as a preventive measure against possible leakage. In the short term, the NIS National Industrial Security Center's duties should be expanded to incorporate national R&D projects' security. In the long term, a security task force must be set up to protect, support and manage the projects whose responsibilities should include research, policy development, PR and training of security-related issues. Through these means, a social consensus must be reached on the need for protecting national R&D projects. The most efficient way to implement these measures is to facilitate security training programs and meetings that provide opportunities for communication among industrial security experts and researchers. Furthermore, the Regulation's security provisions must be examined and improved.

  • PDF

The Main Contents and Task in Future for the Air Transport Law Established Newly in the Korean Revised Commercial Law

  • Kim, Doo-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.1
    • /
    • pp.75-101
    • /
    • 2012
  • As the Reublic of Korea revised the Commercial Code including 40 articles of air transport enacted newly on May 23, 2011, so Korea became first legislative examples in the Commercial Code of the developed and developing countries. I would like to explain briefly the main contents of my paper such as (1) history of enacting newly Part VI (air transport) in the Korea's revised commercial law, (2) legal background enacting newly Part VI (air transport) in the Korea's revised commercial law and the problems on the conditions of air transport, (3) every countries' legislative examples on the civil liability of aircraft's operator, (4) unlawful Interference Convention and general risk convention of 2009, (5) main contents and prospects of the revised Commercial Code for the liability of aircraft's operator etc as the followings. Meanwhile as the Aviation Act, Commercial Code and Civil Code in Korea and Japan did not regulated at all the legal basis of solution on the disputes between victims and offender for the amount of compensation for damage due to personal or property damage caused by aircraft accidents in Korea and Japan, so it has been raised many legal problems such as protection of victims, standard of decision in trial in the event of aircraft accident's lawsuit case. But the Korean Revised Commercial Code including Part VI, air transport regulations was passed by the majority resolution of the Korean National Assembly on April 29, 2011 and then the South Korean government proclaimed it on May 23 same year. The Revised Commercial Code enforced into tothe territory of the South Korea from November 24, 2011 after six month of the proclaimed date by the Korean Government. Thus, though Korean Commercial Code regulated concretely and respectively the legal relations on the liability of compensation for damage in the contract of transport by land in it's Part II (commercial activities) and in the contract of transport by sea in its Part V (marine commerce), but the Amended Commercial Act regulated newly 40 articles in it's Part VI (air transport) relating to the air carrier's contract liability on the compensation for damage caused by aircraft accidents in the air passengers and goods transport and aircraft operator's tort liability on compensation for damage caused by the sudden falling or collision of aircraft to third parties on the surface and so it was equipped with reasonable and unified system among the transport by land, marine and air. The ICAO adopted two new air law conventions setting out international compensation and liability rules for damage caused by aircraft to third parties at a diplomatic conference hosted by it from April 20 to May 2, 2009. The fight against the effects of terrorism and the improvement of the status of victims in the event of damage to third parties that may result either from acts of unlawful interference involving aircraft or caused by ordinary operation of aircraft, forms the cornerstone of the two conventions. One legal instrument adopted by the Conference is "the Convention on Compensation for Damage to Third Parties, Resulting from Acts of Unlawful Interference Involving Aircraft" (Unlawful Interference Convention). The other instrument, "the Convention on Compensation for Damage Caused by Aircraft to Third Parties" (General Risk Convention), modernizes the current legal framework provided for under the 1952 Rome Convention and related Protocol of 1978. It is desirable for us to ratify quickly the abovementioned two conventions such as Unlawful Interference Convention and General Risk Convention in order to settle reasonably and justly as well as the protection of the South Korean peoples.

  • PDF

A Study on the Precedents Changing Related to International Jurisdiction in Electronic Commerce-Focused on U.S. Cases- (전자상거래의 국제재판관할 관련 판례변화에 관한 연구)

  • Woo, Kwang-Myung
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.3-29
    • /
    • 2011
  • The Internet has become a medium through which people engage in increasingly sophisticated transactions. Businesses and consumers now use the Internet to communicate and engage in commercial transactions creating a virtual worldwide marketplace. They fear that the determination of Internet jurisdiction could be uncertain because electronic commerce is not executed in one particular place. Until now, there are no specific rules in the model laws and conventions dealing with international jurisdiction in electronic commerce. Due to the fact that U.S. companies are at the forefront of Internet technology, litigation regarding electronic commerce in the U.S. is more advanced than anywhere else in the world This paper analysis the basic framework for personal jurisdiction and approach for determining international jurisdiction in electronic commerce cases and explain the differences of several approaches involving interactions over the Internet. According to jurisdiction approach test, the U.S. employs sliding scale, effects and targeting test in electronic commerce. In recent many research views the targeting test as a global standard for determining international electronic commerce jurisdiction. However, there is still no clear indication of conclusive test of jurisdiction determination for electronic commerce. Therefore, it is a changing and process of jurisdiction test in the U.S. cases. In Korea, there is jurisdiction related clause in Private International Law, but it may be asked whether applicable in electronic commerce. Accordingly, analysis of the precedents changing related to electronic commerce jurisdiction of U.s. is full of suggestions in Korean companies, consumers and helps an enactment of code of civil procedure that containing many group's demands.

  • PDF

Development of Agent-based Platform for Coordinated Scheduling in Global Supply Chain (글로벌 공급사슬에서 경쟁협력 스케줄링을 위한 에이전트 기반 플랫폼 구축)

  • Lee, Jung-Seung;Choi, Seong-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.213-226
    • /
    • 2011
  • In global supply chain, the scheduling problems of large products such as ships, airplanes, space shuttles, assembled constructions, and/or automobiles are complicated by nature. New scheduling systems are often developed in order to reduce inherent computational complexity. As a result, a problem can be decomposed into small sub-problems, problems that contain independently small scheduling systems integrating into the initial problem. As one of the authors experienced, DAS (Daewoo Shipbuilding Scheduling System) has adopted a two-layered hierarchical architecture. In the hierarchical architecture, individual scheduling systems composed of a high-level dock scheduler, DAS-ERECT and low-level assembly plant schedulers, DAS-PBS, DAS-3DS, DAS-NPS, and DAS-A7 try to search the best schedules under their own constraints. Moreover, the steep growth of communication technology and logistics enables it to introduce distributed multi-nation production plants by which different parts are produced by designated plants. Therefore vertical and lateral coordination among decomposed scheduling systems is necessary. No standard coordination mechanism of multiple scheduling systems exists, even though there are various scheduling systems existing in the area of scheduling research. Previous research regarding the coordination mechanism has mainly focused on external conversation without capacity model. Prior research has heavily focuses on agent-based coordination in the area of agent research. Yet, no scheduling domain has been developed. Previous research regarding the agent-based scheduling has paid its ample attention to internal coordination of scheduling process, a process that has not been efficient. In this study, we suggest a general framework for agent-based coordination of multiple scheduling systems in global supply chain. The purpose of this study was to design a standard coordination mechanism. To do so, we first define an individual scheduling agent responsible for their own plants and a meta-level coordination agent involved with each individual scheduling agent. We then suggest variables and values describing the individual scheduling agent and meta-level coordination agent. These variables and values are represented by Backus-Naur Form. Second, we suggest scheduling agent communication protocols for each scheduling agent topology classified into the system architectures, existence or nonexistence of coordinator, and directions of coordination. If there was a coordinating agent, an individual scheduling agent could communicate with another individual agent indirectly through the coordinator. On the other hand, if there was not any coordinating agent existing, an individual scheduling agent should communicate with another individual agent directly. To apply agent communication language specifically to the scheduling coordination domain, we had to additionally define an inner language, a language that suitably expresses scheduling coordination. A scheduling agent communication language is devised for the communication among agents independent of domain. We adopt three message layers which are ACL layer, scheduling coordination layer, and industry-specific layer. The ACL layer is a domain independent outer language layer. The scheduling coordination layer has terms necessary for scheduling coordination. The industry-specific layer expresses the industry specification. Third, in order to improve the efficiency of communication among scheduling agents and avoid possible infinite loops, we suggest a look-ahead load balancing model which supports to monitor participating agents and to analyze the status of the agents. To build the look-ahead load balancing model, the status of participating agents should be monitored. Most of all, the amount of sharing information should be considered. If complete information is collected, updating and maintenance cost of sharing information will be increasing although the frequency of communication will be decreasing. Therefore the level of detail and updating period of sharing information should be decided contingently. By means of this standard coordination mechanism, we can easily model coordination processes of multiple scheduling systems into supply chain. Finally, we apply this mechanism to shipbuilding domain and develop a prototype system which consists of a dock-scheduling agent, four assembly- plant-scheduling agents, and a meta-level coordination agent. A series of experiments using the real world data are used to empirically examine this mechanism. The results of this study show that the effect of agent-based platform on coordinated scheduling is evident in terms of the number of tardy jobs, tardiness, and makespan.

Opportunity Tree Framework Design For Optimization of Software Development Project Performance (소프트웨어 개발 프로젝트 성능의 최적화를 위한 Opportunity Tree 모델 설계)

  • Song Ki-Won;Lee Kyung-Whan
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.417-428
    • /
    • 2005
  • Today, IT organizations perform projects with vision related to marketing and financial profit. The objective of realizing the vision is to improve the project performing ability in terms of QCD. Organizations have made a lot of efforts to achieve this objective through process improvement. Large companies such as IBM, Ford, and GE have made over $80\%$ of success through business process re-engineering using information technology instead of business improvement effect by computers. It is important to collect, analyze and manage the data on performed projects to achieve the objective, but quantitative measurement is difficult as software is invisible and the effect and efficiency caused by process change are not visibly identified. Therefore, it is not easy to extract the strategy of improvement. This paper measures and analyzes the project performance, focusing on organizations' external effectiveness and internal efficiency (Qualify, Delivery, Cycle time, and Waste). Based on the measured project performance scores, an OT (Opportunity Tree) model was designed for optimizing the project performance. The process of design is as follows. First, meta data are derived from projects and analyzed by quantitative GQM(Goal-Question-Metric) questionnaire. Then, the project performance model is designed with the data obtained from the quantitative GQM questionnaire and organization's performance score for each area is calculated. The value is revised by integrating the measured scores by area vision weights from all stakeholders (CEO, middle-class managers, developer, investor, and custom). Through this, routes for improvement are presented and an optimized improvement method is suggested. Existing methods to improve software process have been highly effective in division of processes' but somewhat unsatisfactory in structural function to develop and systemically manage strategies by applying the processes to Projects. The proposed OT model provides a solution to this problem. The OT model is useful to provide an optimal improvement method in line with organization's goals and can reduce risks which may occur in the course of improving process if it is applied with proposed methods. In addition, satisfaction about the improvement strategy can be improved by obtaining input about vision weight from all stakeholders through the qualitative questionnaire and by reflecting it to the calculation. The OT is also useful to optimize the expansion of market and financial performance by controlling the ability of Quality, Delivery, Cycle time, and Waste.