• Title/Summary/Keyword: information Offering

Search Result 852, Processing Time 0.031 seconds

A Study on the Appling National ITS Standardization for Advanced Traffic Information System (통합교통정보체계 추진을 위한 표준안 활용방안 연구)

  • Cho Young-Sung;Lee Sang-Keon;Moon Young-Jun;Jung Hee-Woon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.1 s.2
    • /
    • pp.15-24
    • /
    • 2003
  • While public institutions and privite coperations have constructed the data collecting infrastructure and commercialized it to service traffic information, inaccuracy with information, insufficiency with the public sector, overapping investment and the rest are arising from the differences of data treatment, offering method, communication protocal and the like. For these reasons, we need standardization it as a national enterprise. In this paper, we would like to present the unity management and joint method of traffic information based on the present position of system construction and national ITS standardization. At first, we presented the relation between data elements and message sets and then analyzed how message sets have been used to message sets to share traffic information so far in public institutions and private coperations like Korea freeway cooperation-ITS model city-Cheonan-Nonsan expressway, In-cheon international airport expressway-Korea freeway cooperation and Seoul metropolitan police agency-Seoul metropolitan government. As the results of analyzing message sets, it had disclosed that data transmission is impossible or a system is unchangeable because data form and each items to transmission were different from each other and its own address and link IDS were not determined yet. Also it showed these message sets did not abidy by The Draft of National ITS Standards. First of all, we proposed data basic form and elements which were form by items used in each center in common and the elements to manage traffic information suggested by Standards based on the results of analyses.

  • PDF

THE DISTRIBUTION OF SIGNS AND PEDESTRIANS' WALKING BEHAVIORS IN UNDERGROUND SPACE -A CASE STUDY OF THE UNDERGROUND SHOPPING CENTRE IN TENJIN, FUKUOKA- (지하공간에 있어서 사인의 분포 특성과 보행특성에 관한 연구)

  • Choi, Ji-Sook;Yoo, Byun-Bae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.246-250
    • /
    • 2006
  • The objective of this research was to investigate the way information is used by pedestrians in underground space. Furthermore, we wanted to know how pedestrians utilize information from signage of signs by pedestrians. Thus, we conducted an investigation on the pedestrians' walking behavior in Fukuoka City, Tenjin underground shopping centers, and 1) checked routes taken by the subjects; and 2) categorized the signs that were observed, the pedestrians' movement patterns, the way information from signage isused by the pedestrians, the signs' locations, the relationship between the spaces, the heights of the signs and the types of signs offering directions. The results showed that there is a need to solve certain problems related to the locations of the signs and the walking behaviors of the subjects. To solve the problems exhibited by the subjects' walking behaviors, we came up with a variety of guidance information that could be used. The contents of the guidance information differ depending on the specified heights for the placement of signs and the information used depending on the location. The results also showed that the continuity between places needs to be shown more effectively by the guidance system, and that too many signs are positioned in places where the frequency of use is low.

  • PDF

Object Classification List for BIM-based Maintenance Information Modeling in Electrical and Telecommunications Field of Architecture (BIM 기반 유지관리정보 모델링을 위한 객체분류목록 개발 -건축 전기/정보통신 분야를 중심으로-)

  • Song, Jong-Kwan;Cho, Gen-Ha;Won, Ji-Sun;Ju, Ki-Beom;Bea, Si-Hwa
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3183-3191
    • /
    • 2014
  • It is essential to effectively manage facilities because operating and maintenance cost for them accounts for more than 83% of lifecycle cost. This study developed BIM Object-based classification list to manage information required to operating and maintenance phase of them from design and construction phase. In order to develop this classification list, Construction Information Classification System, Design Criteria for Architectural Electrical Installations, commodity list classification of PPS(Public Procurement Service) were analyzed. and problems for consisting of object classification list were drawn. And each materials is classified that drawings discipline code (KSF 1540:2010 (Principle and criteria for CAD Drawing) was classified as level 1 to cover main areas and construction information classification system was classified as level 2 to cover elements also UNSPSC was classified as level 3 to cover objects for devices and equipments. this classification criteria was given code. This study is expected to be useful to exchange and share information in operating and maintenance phase by offering object point of view classification in design and construction phase. besides, it is looking forward to effective operating and maintenance of facilities by enabling management of devices and equipments by function, space, use.

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

A Study on the Financing Decision of Retail Firms Listed on Korean Stock Markets (유통 상장기업들의 자본조달 특징에 관한 연구)

  • Yoon, Bo-Hyun
    • Journal of Distribution Science
    • /
    • v.12 no.10
    • /
    • pp.75-84
    • /
    • 2014
  • Purpose - This article aims to examine whether the stock issuance of firms in the retail industry follows Myers' (1984) pecking order theory, which is based on information asymmetry. According to the pecking order model, firms have a sequence of financing decisions, of which the first choice is to use retained earnings, the second one is to get into safe debt, the next involves risky debt, and the last involves finance with outside equity. Since the 2000s, the polarization of the LEs (Large enterprises) and SMEs (Small and Medium Enterprises) arose in the retail industry. The LEs exhibited an improvement in growth and profitability, whereas SMEs had a tendency to degenerate. This study contributes to corroborating the features of financing decisions in the retail industry distinguished from the other industries. Research design, data, and methodology - This study considers the stocks listed on the KOSPI and KOSDAQ markets from 1991 to 2013, and is more concentrated on the stocks in the retail industry. The data were collected from the financial information company, WISEfn. The empirical analysis is conducted by employing two measures of net equity issues (and), which were introduced in Fama and French (2005), and can be calculated from firms' accounting information. All variables are generated as the aggregate value of the numerator divided by aggregate assets, which, in effect, treats the entire sample as a single firm. Substantially, the financing decisions of the firms were analyzed by examining how often and under what circumstances firms issue and repurchase equity. Then, this study compares the features of the retail industry with those of the other industries. Results - The proportion of sample firms that show annual net stock issues reaching the level of the year's average was 54.33% for the 1990s, and fell to 39.93% per year for the 2000s. In detail, the fraction of the small firms actually increases from 45.08% to 51.04%, whereas that of large firms shows a dramatic decline from 58.94% to 24.76%. Considering the fact that the large firms' rapid increase in growth after the 2000s may lead to an increase in equity issues, this result is rather surprising. Meanwhile, net stock repurchases of assets are considerably disproportionate between the large (-50.11%) and the small firms (-15.66%) for the 2000s. Conclusions - Stock issuance of retail firms is not in line with the traditional seasoned equity offering based on information asymmetry. The net stock issuance of the small firms in the retail industry can be interpreted as part of an effort to reorganize business and solicit new investment to resolve degenerating business performance. For large firms, on the other hand, the net repurchase can be regarded as part of an effort to rearrange business for efficiency and amplifying synergy across business sections through spin-off. These results can help the government establish a support policy on retail industry according to size.

An Exploration of Career Competency Mobility Map (CCMM) Focusing on Engineering Students in K University (경력역량이동지도(CCMM) 적용사례 연구: K 대학을 중심으로)

  • Park, Jiwon;Woo, Heajung;Noh, Kyungwon;Yi, Yejih;Hwang, Seong-jun;Kim, Woocheol
    • Journal of Practical Engineering Education
    • /
    • v.11 no.2
    • /
    • pp.195-206
    • /
    • 2019
  • Accelerated technological advances and the convergence of information and communication technologies have led to changes of career concepts from one of lifetime employment to that of lifetime career. Given the importance of continuous career development for workers these days, systematic supports for workers' career development at the national level is necessary. Accordingly, a conceptual model of career competency mobility map (CCMM) has been proposed to support the development of workers' career competencies. The purpose of this study is to identify key issues that we should consider for real implementation by applying to each stage of the CCMM conceptual model as a case study. Based on the procedure presented in the conceptual model, the research process which includes collecting user information, conducting self-diagnosis of NCS-based job competencies, deriving necessary training competency, offering the guidance of training programs and job information were conducted. The results of the case study showed our participants' scores of competencies required further development and ranged from 1.83 to 4.52. Sequentially, a personalized information profile was offered for competency development, including training, certificates, and job information. Participants stated that the diagnosis results and profiles were meaningful and helped to explore further career development. Based on the results, implications are suggested.

A Study on Library Engagement and Models for Support of MOOC (온라인 대중공개강좌(MOOC)를 위한 도서관 지원 서비스 모델 연구)

  • Son, Taeik
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.50 no.3
    • /
    • pp.293-308
    • /
    • 2016
  • Many universities are offering some of their offline courses for anyone to learn free online as an MOOC format. University libraries In response to changing university conditions, foreign university libraries are struggling to redefine their roles and provide new services. This study aimed to find the trends and models to support MOOCs in foreign libraries and Library and information science domain by conducting a systematic review of studies on foreign library and information journals which have been published from 2012 to 2015. A total of 34 out of 348 studies were included in the final analysis. This study also aimed to present the limits and the future models of MOOC support direction. The relevant articles could be identified, two criteria: 24 MOOCs studies relating to Libraries and 10 MOOCs studies related to LIS. The selected articles were summarized and analyzed yearly. The study identifies elements of library MOOC support models in 5 areas including MOOC design (copyright clearance and consulting, content licensing, open content), production support (course production, video editing, librarian MOOC production), management support (instructional design and content creation, students support), evaluation (MOOC data collection, analysis), reuse (MOOC metadata management, archive structure). Based on these findings, this study suggested the models of library MOOC support and set the theoretical fundamentals.

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

An Implementation of the Report View Generator using Program Performance Log Information (프로그램 성능 평가 로그 정보를 이용한 레포트 뷰 생성기 구현)

  • Cho Yong-Yoon;Yoo Chae-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.35-44
    • /
    • 2005
  • A software developer can use a performance evaluation tool to elevate development speed and improve qualify of softwares. But, evaluation results that most performance evaluation tools offer are complicated strings. Therefore, a developer cannot intuitively understand the meanings of the results and must make much times and efforts in analysing the result. In this paper, we propose a report view generator that can transform and provide the text-based performance evaluation results for softwares with various graphic-based views. Our proposed generator consists of a screen generator that creates a structural XML document about the text-based performance evaluation results and a log analyzer that makes various report view through the created XML evaluation document. Because the XML evaluation result document can express the result information structured according to performance evaluation items for resources of softwares, it can have flexibility in offering and integrating the result information for the items. Through the suggested report view generator, developers can intuitively understand and analysis performance evaluation results of embedded software. And they can easily and quickly improve software quality and improve development efficiency of softwares.

  • PDF

An Analysis of the Librarians' Perception of Providing CHI Services in Public Libraries (공공도서관에서 소비자건강정보를 제공하는 것에 대한 사서의 인식 조사연구)

  • Noh, Young-Hee;Oh, Sang-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.3
    • /
    • pp.25-55
    • /
    • 2011
  • These results of surveying public librarians can contribute to clearly identifying the status of CHI(consumer health information) services in Korea and to exploring future developments in CHI services. In this study, we investigated whether or not currently Korean public libraries are offering CHI services, whether or not they provide CHI reference services and the frequency of their use, and analyzed librarians' recognition of the need for Korean public libraries to provide the CHI services. The findings are as follows: 1) 70% of Korean public libraries are equipped with health-related books and medical journals, but the rate of libraries that are building CHI-related websites was very low at 5%. 2) The rate of providing the CHI reference services was only 30% of the surveyed public libraries. 3) 82.1% of public libraries did not provide educational programs related to CHI. 4) 82.1% of public libraries did not provide CHI-related services for vulnerable groups. 5) The rate of providing the CHI-related outreach programs and collaborating with CHI-related institutions was no more than about 20% each. These research findings can induce public librarians to provide CHI services in public libraries, and will contribute to activate the CHI-related research in Korea.