• Title/Summary/Keyword: information analysis framework

Search Result 1,805, Processing Time 0.04 seconds

A DNA Microarray LIMS System for Integral Genomic Analysis of Multi-Platform Microarrays

  • Cho, Mi-Kyung;Kang, Jason Jong-ho;Park, Hyun-Seok
    • Genomics & Informatics
    • /
    • v.5 no.2
    • /
    • pp.83-87
    • /
    • 2007
  • The analysis of DNA microarray data is a rapidly evolving area of bioinformatics, and various types of microarray are emerging as some of the most exciting technologies for use in biological and clinical research. In recent years, microarray technology has been utilized in various applications such as the profiling of mRNAs, assessment of DNA copy number, genotyping, and detection of methylated sequences. However, the analysis of these heterogeneous microarray platform experiments does not need to be performed separately. Rather, these platforms can be co-analyzed in combination, for cross-validation. There are a number of separate laboratory information management systems (LIMS) that individually address some of the needs for each platform. However, to our knowledge there are no unified LIMS systems capable of organizing all of the information regarding multi-platform microarray experiments, while additionally integrating this information with tools to perform the analysis. In order to address these requirements, we developed a web-based LIMS system that provides an integrated framework for storing and analyzing microarray information generated by the various platforms. This system enables an easy integration of modules that transform, analyze and/or visualize multi-platform microarray data.

A Conceptual Information Model of Mechanical Assemblies Incorporating Assembly and Kinematic Constraints, and Tolerances (조립 및 기구학 구속 조건, 공차를 포함하는 기계 조립체의 개념적 정보 모델)

  • Han Y,-H.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.10 no.2
    • /
    • pp.133-142
    • /
    • 2005
  • This paper proposes an object-oriented conceptual information model of mechanical assemblies, named open assembly model (OAM). The proposed assembly model primarily defines hierarchical relationships between parts and subassemblies. Together with the assembly hierarchy. the model also provides a way to represent tolerances, kinematic information, and parametric assembly constraints. Relational information such as mating conditions and degree of freedom between parts and subassemblies is captured via assembly features and relationships thereof. The information model is described using class diagrams of the Unified Modeling Language (UML), and instance diagrams are used to exemplify the proposed information model. The conceptual model presented in this paper is an integrated information model for assembly representation, which could supply necessary information for tolerance analysis and synthesis, kinematic simulation, and assembly simulation. Such a conceptual information model plays an important role for the exchange of information between modeling, analysis and planning systems. Hence, the proposed model could serve as a framework for developing data exchange standards of mechanical assemblies. The proposed model is demonstrated through a case study of a planetary gear assembly.

Understanding the Employee's Intention to Use Information System: Technology Acceptance Model and Information System Success Model Approach

  • MARTONO, S.;NURKHIN, Ahmad;MUKHIBAD, Hasan;ANISYKURLILLAH, Indah;WOLOR, Christian Wiradendi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.1007-1013
    • /
    • 2020
  • This study aims to understand the determinant of the employee's intention to use information system within the framework of the Technology Acceptance Model (TAM) and Information System Success Model (ISSM). This paper also aims to examine the influence of ISSM dimension on the perceived usefulness and the perceived ease of use. The research respondents were 248 employees of Universitas Negeri Semarang (UNNES) who are users of the Financial Information System (SIKEU). Data was obtained using a questionnaire that was distributed online via Google form. The data analysis method used is Structural Equation Model (SEM) analysis using the Warp-PLS software. The results showed that the dimensions of TAM (perceived ease of use and perceived usefulness) had a positive and significant influence on the employee's intention to use SIKEU. The ISSM dimension (system quality and information quality) also had a significant influence, although other ISSM dimensions (service quality) had not been proven to have a significant influence on the employee's intention to use SIKEU. Moreover, the results showed that the employee's intention to use is a determinant of SIKEU's actual usage. Perceived ease of use was significantly determined by system quality, information quality, and service quality. In addition, the perceived usefulness was significantly determined by system quality and information quality.

Development and Validation of an Instrument to Measure Nursing Information Literacy Competency

  • Jo, Meanjung;Ha, Yeongmi
    • Research in Community and Public Health Nursing
    • /
    • v.30 no.1
    • /
    • pp.25-37
    • /
    • 2019
  • Purpose: The purpose of this study was to develop an instrument for measuring nursing information literacy competency, and then to examine the validity and reliability of the instrument. Methods: The developmental process of the instrument includes construction of a conceptual framework, generation of initial items, verification of content validity, preliminary study, extraction of final items, and psychometric testing. Its content validity was verified by three experts from nursing and nursing informatics. Its construct, convergent, and discriminant validity was examined in confirmatory factor analysis. Finally, its criterion validity was measured with Pearson's correlation. The tool's reliability was examined by Cronbach's ${\alpha}$. The participants include 382 nurses from four hospitals and one university hospital. Results: Twenty seven items in total were selected for the final scale, and the results of the confirmatory factor analysis were supported with acceptable model fit, which were named competency for identifying problem, potential sources for information, searching fine information, evaluating information, acquising and managing of information, using information ethically, and integrating new information. The convergent, discriminant and criterion validities were also supported. The Cronbach's ${\alpha}$ coefficient was .93. Conclusion: The instrument is valid and reliable to comprehensively assess nurses' information literacy competency, and to provide a basic direction for developing nursing information literacy program.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Analysis on the current status of standardization in MPEC (정보 부호화 방식 표준화 동향 분석)

  • 김성한;오행석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.406-411
    • /
    • 2000
  • Currently, many kinds of multimedia Services are provided for users using internet and broadcasting infrastructure because of advanced technology Progression of network technology, digital communication and broadcasting technology. In future, Information technology might be important. Information retrieval, Information extraction technology and multimedia service framework standardization make it possible to extract necessary information from a great deal of information. And Interactive service and knowledge library also will provide user-friendly interface technology on soon. In this paper, we describe current standard technology, products and market trends.

  • PDF

CONVERGENCE ANALYSIS OF BROADBAND, INTERNET AND INFORMATION FLOW FOR 43 AFRICAN COUNTRIES FOR 1991-2015

  • Shamba, Kudzai;Jang, Yu-Sang
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2017.11a
    • /
    • pp.155-161
    • /
    • 2017
  • In the field of information technology, broadband, internet and information flow have been found to be the primary elements to indicate access to information in this current information age. We examine whether the country difference in Broadband use, Internet use and information flow existing in 1991 has been reduced and if so how fast. Convergence framework had been utilised to answer these questions for 43 African countries. The results indicated that all the three chosen information technology indicators for 43 African countries are converging toward a reduction of dispersion and a catch-up process during the period 1991-2015. However, there are marked differences exhibited in the convergence processes for the Total groups and for the subgroups of countries by income level.

  • PDF

Digital Libraries: Analysis of Delos Reference Model and 5S Theory

  • Isah, Abdulmumin;Mutshewa, Athulang;Serema, Batlang Comma;Kenosi, Lekoko
    • Journal of Information Science Theory and Practice
    • /
    • v.1 no.4
    • /
    • pp.38-47
    • /
    • 2013
  • The proliferation of digital libraries (DL) in the twenty-first century has revolutionized the way information is generated and disseminated. This has led to various practical and research models of DLs. This paper discusses the concept and development of digital libraries, and examines various components and characteristics of DLs. It further identifies various models and theories of digital libraries with a special focus on the DELOS Reference Model and 5S Theory. The relationship between the two focused frameworks is analyzed for better understanding of their application in the DL universe.

A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks

  • Shon, Tae-Shik;Park, Yong-Suk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.597-611
    • /
    • 2009
  • With the advent of ubiquitous computing society, many advanced technologies have enabled wireless sensor networks which consist of small sensor nodes. However, the sensor nodes have limited computing resources such as small size memory, low battery life, short transmission range, and low computational capabilities. Thus, decreasing energy consumption is one of the most significant issues in wireless sensor networks. In addition, numerous applications for wireless sensor networks are recently spreading to various fields (health-care, surveillance, location tracking, unmanned monitoring, nuclear reactor control, crop harvesting control, u-city, building automation etc.). For many of them, supporting security functionalities is an indispensable feature. Especially in case wireless sensor networks should provide a sufficient variety of security functions, sensor nodes are required to have more powerful performance and more energy demanding features. In other words, simultaneously providing security features and saving energy faces a trade-off problem. This paper presents a novel energy-efficient security architecture in an IEEE 802.15.4-based wireless sensor network called the Hybrid Adaptive Security (HAS) framework in order to resolve the trade off issue between security and energy. Moreover, we present a performance analysis based on the experimental results and a real implementation model in order to verify the proposed approach.

Intention to Adopt Cloud Accounting: A Conceptual Model from Indonesian MSMEs Perspectives

  • HAMUNDU, Ferdinand Murni;HUSIN, Mohd Heikal;BAHARUDIN, Ahmad Suhaimi;KHALEEL, Muhammad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.749-759
    • /
    • 2020
  • Over the years, numerous Micro, Small, and Medium Enterprises (MSMEs) have been vigorously established across many countries. Even though the Internet of Things (IoT) has enabled companies to anchorage business returns, most Indonesian MSMEs are highly susceptible to failure and one of the main issues is the inability to manage their financials effectively. The literature on accounting points out that the success of MSMEs owing to the usage of cloud-based Accounting Information Systems (AIS) or Cloud Accounting (CA) could reduce the rate of failure by managing multiple accounting information at a low cost. Although many benefits exist, Indonesian MSMEs are not adopting these platforms in their daily business activities. This study investigates the factors that influence Indonesian MSMEs' intention to adopt CA. The study is directed by unstructured in-depth interviews with seven bestseller MSMEs where a thematic analysis technique was employed to identify them. The interview findings and prevailing literature on the influencing factors based on the TOE (technological, organizational, and environmental) framework to adopt CA in Indonesian MSMEs context are perceived benefits outweighing the cost, perceived compatibility, perceived complexity, owner-manager knowledge on accounting, organization size, competitive pressure, and informal network. The conceptual model further includes government intervention as a moderator in the model.