• Title/Summary/Keyword: University Information Systems

Search Result 21,689, Processing Time 0.05 seconds

Sum Transmission Rate Maximization Based Cooperative Spectrum Sharing with Both Primary and Secondary QoS-Guarantee

  • Lu, Weidang;Zhu, Yufei;Wang, Mengyun;Peng, Hong;Liu, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2015-2028
    • /
    • 2016
  • In this paper, we propose a sum transmission rate maximization based cooperative spectrum sharing protocol with quality-of-service (QoS) support for both of the primary and secondary systems, which exploits the situation when the primary system experiences a weak channel. The secondary transmitter STb which provides the best performance for the primary and secondary systems is selected to forward the primary signal. Specifically, STb helps the primary system achieve the target rate by using a fraction of its power to forward the primary signal. As a reward, it can gain spectrum access by using the remaining power to transmit its own signal. We study the secondary user selection and optimal power allocation such that the sum transmission rate of primary and secondary systems is maximized, while the QoS of both primary and secondary systems can be guaranteed. Simulation results demonstrate the efficiency of the proposed spectrum sharing protocol and its benefit to both primary and secondary systems.

A Comparative Study of Unauthorized Software Copying: Information Systems Faculty Members' VS. Practicing Managers' Perceptions (경영정보 시스템에서 소프트웨어의 무단복제에 관한 비교연구 - MIS 교수와 경영자를 중심으로 -)

  • Shim, Jeong-Pil;Taylor, G. Stephen
    • Asia pacific journal of information systems
    • /
    • v.1 no.1
    • /
    • pp.17-29
    • /
    • 1991
  • The topic of microcoputer sofrware ethics in the field of information systems (IS) has gained an increasing amount of attention from IS researchers and practicing managers. This paper compares the attitudes of IS faculty members with those of IS managers toward microcomputer software pirating. This study also examines professional related ethical attitudes in detail.

  • PDF

A Study on The Development of The University Curriculum for Education of Management Information System (경영정보학과 교과과정 모형의 개발에 관한 연구)

  • Yu, Sang-Jin;Kim, Yeong-Mun
    • Asia pacific journal of information systems
    • /
    • v.5 no.2
    • /
    • pp.5-36
    • /
    • 1995
  • This paper talks about the university curriculum for the education of management information systems in Korea. This paper especially develops a new model of the university curriculum based on the questionnaire from the fifteen universities, students, professors and field managers in information system development areas. This paper finally compares a new model with the existing curriculum of the domestic four-year universities.

  • PDF

Toward the Application of a Critical-Chain-Project-Management-based Framework on Max-plus Linear Systems

  • Takahashi, Hirotaka;Goto, Hiroyuki;Kasahara, Munenori
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.3
    • /
    • pp.155-161
    • /
    • 2009
  • We focus on discrete event systems with a structure of parallel processing, synchronization, and no-concurrency. We use max-plus algebra, which is an effective approach for controller design for this type of system, for modeling and formulation. Since a typical feature of this type of system is that the initial schedule is frequently changed due to unpredictable disturbances, we use a simple model and numerical examples to examine the possibility of applying the concepts of the feeding buffer and the project buffer of critical chain project management (CCPM) on max-plus linear discrete event systems in order to control the occurrence of an undesirable state change. The application of a CCPM-based framework on a max-plus linear discrete event system was proven to be effective.

ENHANCEMENT OF FACE DETECTION USING SPATIAL CONTEXT INFORMATION

  • Min, Hyun-Seok;Lee, Young-Bok;Lee, Si-Hyoung;Ro, Yong-Man
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.108-113
    • /
    • 2009
  • Significant attention has recently been drawn to digital home photo albums that use face detection technology. The tendency can be found in home photo albums that people prefer to allocate concerned objects in the center of the image rather than the boundary when they take a picture. To improve detection performance and speed that are important factors of face detection task, this paper proposes a face detection method that takes spatial context information into consideration. Experiments were performed to verify the usefulness of the proposed method and results indicate that the proposed face detection method can efficiently reduce the false positive rate as well as the runtime of face detection.

  • PDF

A Study on Automated Negotiation Methodology for Multi-lateral Concurrent Negotiation

  • Cho Min-Je;Choi Hyung Rim;Kim Hyun Soo;Hong Soon Goo;Park Young Jae;Shim Jung Hoon
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.89-96
    • /
    • 2005
  • Though studies on negotiations have actively been conducted in the field of e-Commerce so far, some problems have yet to be solved and many application fields of negotiation systems exist. Currently, many businesses shift from various fields to e-Commerce market, due to recent social changes and expansion of e-Commerce market; however, we need to develop the study of automated agents to resolve the issue of negotiation, which is an essential element in the e-Commerce, by minimizing human interference under the e-Commerce environment. In this study, we intend to propose a new negotiation protocol considering the negotiation alternatives through continuous negotiation rounds in relation to an automated negotiation issue whose participants are one to N (seller to buyers). We also present an agent-facilitated negotiation methodology by which negotiation alternative generation process is automated, in consideration of buyer's negotiation attributes and strategies in the negotiation system.

  • PDF

An Application of RASA Technology to Design an AI Virtual Assistant: A Case of Learning Finance and Banking Terms in Vietnamese

  • PHAM, Thi My Ni;PHAM, Thi Ngoc Thao;NGUYEN, Ha Phuong Truc;LY, Bao Tuyen;NGUYEN, Truc Linh;LE, Hoanh Su
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.5
    • /
    • pp.273-283
    • /
    • 2022
  • Banking and finance is a broad term that incorporates a variety of smaller, more specialized subjects such as corporate finance, tax finance, and insurance finance. A virtual assistant that assists users in searching for information about banking and finance terms might be an extremely beneficial tool for users. In this study, we explored the process of searching for information, seeking opportunities, and developing a virtual assistant in the first stages of starting learning and understanding Vietnamese to increase effectiveness and save time, which is also an innovative business practice in Use-case Vietnam. We built the FIBA2020 dataset and proposed a pipeline that used Natural Language Processing (NLP) inclusive of Natural Language Understanding (NLU) algorithms to build chatbot applications. The open-source framework RASA is used to implement the system in our study. We aim to improve our model performance by replacing parts of RASA's default tokenizers with Vietnamese tokenizers and experimenting with various language models. The best accuracy we achieved is 86.48% and 70.04% in the ideal condition and worst condition, respectively. Finally, we put our findings into practice by creating an Android virtual assistant application using the model trained using Whitespace tokenizer and the pre-trained language m-BERT.

On-line Shared Platform Evaluation Framework for Advanced Persistent Threats

  • Sohn, Dongsik;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2610-2628
    • /
    • 2019
  • Advanced persistent threats (APTs) are constant attacks of specific targets by hackers using intelligent methods. All current internal infrastructures are constantly subject to APT attacks created by external and unknown malware. Therefore, information security officers require a framework that can assess whether information security systems are capable of detecting and blocking APT attacks. Furthermore, an on-line evaluation of information security systems is required to cope with various malicious code attacks. A regular evaluation of the information security system is thus essential. In this paper, we propose a dynamic updated evaluation framework to improve the detection rate of internal information systems for malware that is unknown to most (over 60 %) existing static information security system evaluation methodologies using non-updated unknown malware.