• Title/Summary/Keyword: information system development methodology

Search Result 809, Processing Time 0.035 seconds

Ontology Implementation and Methodology Revisited Using Topic Maps based Medical Information Retrieval System (토픽맵 기반 의학 정보 검색 시스템 구축을 통한 온톨로지 구축 및 방법론 연구)

  • Yi, Myong-Ho
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.35-51
    • /
    • 2010
  • Emerging Web 2.0 services such as Twitter, Blogs, and Wikis alongside the poorlystructured and immeasurable growth of information requires an enhanced information organization approach. Ontology has received much attention over the last 10 years as an emerging approach for enhancing information organization. However, there is little penetration into current systems. The purpose of this study is to propose ontology implementation and methodology. To achieve the goal of this study, limitations of traditional information organization approaches are addressed and emerging information organization approaches are presented. Two ontology data models, RDF/OW and Topic Maps, are compared and then ontology development processes and methodology with topic maps based medical information retrieval system are addressed. The comparison of two data models allows users to choose the right model for ontology development.

A Study on Analysis of the Template Component for the Development of BIM Template (BIM 템플릿 개발을 위한 템플릿 구성요소 분석에 관한 연구)

  • Lee, Sang Heon;Kim, Mi Kyoung;Choi, Hyun Ah;Jun, Han Jong
    • KIEAE Journal
    • /
    • v.11 no.2
    • /
    • pp.123-130
    • /
    • 2011
  • BIM based design methodology requires more information than traditional design methodology in order to insure efficiency throughout the project. BIM based design not only requires all building data in the form of 3D shapes, but also all other relevant data regarding building components. Information is typically grouped in a standard classification system such as by standardized material names. The development of a domestic BIM based standard classification system is yet to be created and deployed in the industry. Each designer is specifying their own building information classification systems which is causing inconsistency in the industry. Therefore BIM based designs, are causing confusion in the industry as each designer follow no guidelines for material standardization classification. The lack of information regarding this in the BIM template will continue to cause confusion about a projects building information data consistently. This study is that of preliminary research to develop a BIM template. First, overseas BIM templates were analyzed regarding BIM standards and documentation. Examination then followed regarding the element and characteristics needed for the development of a BIM template, a suggested hierarchy of elements required for a BIM template were then made. The result of this research is that it will be used to develop a "BIM template prototype", to support the generation of building information data regarding neighborhood facilities.

A Designing Method of Software Architecture for Information Security Business Model Selection using BMO Technique Base (BMO기법을 활용한 정보보안 비즈모델 평가시스템 소프트웨어 아키텍쳐 설계방법)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.71-77
    • /
    • 2013
  • In our country security industry biz model analysis methodology fragmentary theory exists, but it is hard to find a comprehensive analysis methodology. Biz model analysis IT companies the external factors and internal factors to integrate the information gathered about the comprehensive analysis of the development of an information system are required. Information support system early in the software architecture of the system design decisions early decision as the design, development, testing, maintenance, has a lasting impact on the project as a guideline in the development of a framework of design abstraction. BMO evaluation support information systems architecture designs system purposes. The mission must support the execution. Information system stakeholders to determine the mission and the environment. All information systems architecture shall have architecture. Technology architecture should be documented with each other can be used. Determine the architecture based architecture descriptions are presented.

Topic Modeling-based Book Recommendations Considering Online Purchase Behavior (온라인 구매 행태를 고려한 토픽 모델링 기반 도서 추천)

  • Jung, Youngjin;Cho, Yoonho
    • Knowledge Management Research
    • /
    • v.18 no.4
    • /
    • pp.97-118
    • /
    • 2017
  • Thanks to the development of social media, general users become information and knowledge providers. But customers also feel difficulty to decide their purchases due to numerous information. Although recommender systems are trying to solve these information/knowledge overload problem, it may be asked whether they can honestly reflect customers' preferences. Especially, customers in book market consider contents of a book, recency, and price when they make a purchase. Therefore, in this study, we propose a methodology which can reflect these characteristics based on topic modeling and provide proper recommendations to customers in book market. Through experiments, our methodology shows higher performance than traditional collaborative filtering systems. Therefore, we expect that our book recommender system contributes the development of recommender systems studies and positively affect the customer satisfaction and management.

The Use of Ontology in Knowledge Intensive Tasks: Ontology Driven Retrieval of Use Ca

  • Kim, Jongwoo;Conesa, Jordi;Ramesh, Balasubramaniam
    • Asia pacific journal of information systems
    • /
    • v.25 no.1
    • /
    • pp.25-60
    • /
    • 2015
  • Use cases are commonly used to represent customer requirements during systems development. In a large software development environment, finding relevant use cases from a library of past or related projects is a complex, error-prone and expensive task. This study proposes an ontological methodology to support use case retrieval in an interactive manner. The architecture of a prototype system that implements this methodology is presented. To evaluate whether the proposed approach can provide satisfactory results to users, this study develops a research model and hypotheses based on interaction theory. These hypotheses are empirically tested using a laboratory experiment which controls information filtering and perceived interaction. Our study suggests that a system which interacts with a user intelligently reduces cognitive load and increases self-efficacy and satisfaction.

An Evaluation methodology of cyber-Education system based on interdependent relationship (상호영향 관계를 고려한 가상교육 시스템 평가 방법론)

  • Han, Ki-Joon;Kim, Sung-Ok
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.2
    • /
    • pp.155-163
    • /
    • 2001
  • This study aims to suggest a evaluation methodology of cyber-education. In spite of rapid development of information technology for cyber-education, there are few research of evaluation methodology in cyber-education environment, we suggest a definition of criteria and a methodology of system solution selection for cyber-education system. Considering an interdependent relationship among criteria, we shows a process of an evaluation method or a selection method for evaluation of cyber-education system solution through an example.

  • PDF

The Development of Reusable SoC Platform based on OpenCores Soft Processor for HW/SW Codesign

  • Bin, Young-Hoon;Ryoo, Kwang-Ki
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.376-382
    • /
    • 2008
  • Developing highly cost-efficient and reliable embedded systems demands hardware/software co-design and co-simulation due to fast TTM and verification issues. So, it is essential that Platform-Based SoC design methodology be used for enhanced reusability. This paper addresses a reusable SoC platform based on OpenCores soft processor with reconfigurable architectures for hardware/software codesign methodology. The platform includes a OpenRISC microprocessor, some basic peripherals and WISHBONE bus and it uses the set of development environment including compiler, assembler, and debugger. The platform is very flexible due to easy configuration through a system configuration file and is reliable because all designed SoC and IPs are verified in the various test environments. Also the platform is prototyped using the Xilinx Spartan3 FPGA development board and is implemented to a single chip using the Magnachip cell library based on $0.18{\mu}m$ 1-poly 6-metal technology.

A Research on System Integration for National GIS Technology Development Methodology (국가 GIS 기술 개발을 위한 시스템통합 기법에 관한 연구)

  • Seo, Bo-Hwan
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.3 no.2 s.6
    • /
    • pp.183-197
    • /
    • 1995
  • The broad meaning of system integration is to satisfy user requirement, and to secure and offer Hardware, Software, network, System development, maintenance, education and manpower in his own responsibility for successful business. But the basic concept of system integration is not justified and the methodology of propel procedure is not established. Therefore, in this thesis. first, We established the bagic concept of system integration in practical view. second, We modeled the propel procedure of system integration with many large project examples in view of up to date IT (information technology) view. We can enhance the compatative advantage by liking organizational strategy and IT and executing GIS project in view of system integration

  • PDF

A Study on the Information Modeling of Defense R&D Process Using IDEF Methodology (IDEF 방법론을 이용한 국방 연구개발 프로세스의 정보모델링 연구)

  • Kim, Chul-Whan
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.41-60
    • /
    • 2005
  • IDEF(Integrated Definition) method, a standard methodology of CALS process modelling, was applied to the weapon system R&D process to provide information modelling by analysing about goal, input, output and constraints in the R&D process. The information to be managed in R&D institutes was identified by using SmartER which is the automation program of IDEF1/1X and obtained information modelling for TO-BE model. The work process of weapon system R&D consists of the concept study phase, the exploration development phase, the system development phase, the prototype manufacturing phase, and the report writing of R&D results phase. The information modelling of weapon system R&D is the R&D work process with information sharing by means of IWSDB Since IDEF is suitable for large scale system development like weapon system R&D, further studies on IDEF would be required to achieve the goal of defense CALS.

  • PDF

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.