• Title/Summary/Keyword: it analysis

Search Result 113,407, Processing Time 0.142 seconds

Dynamic Behavior Analysis of Railway Bridge considering Track Stiffness (궤도구조를 고려한 철도교량의 동적거동 분석)

  • Kang, Duck-Man;An, Hea-Young;Sung, Deok-Yong;Kim, Sung-Il;Park, Yong-Gul
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.55-65
    • /
    • 2009
  • This study is objected by analyzing whether it is applied to the analysis model considering the track stiffness or not when the railway bridge is designed or reviewed for the dynamic stability. It is performed that the analysis model is verified by comparing the field test result with the analysis result. Also, The dynamic response of railway bridge through the existing analysis model is compared with the analysis model considered the track stiffness. In addition, it is performed by analyzing the model considering the stiffness of concrete track. Therefore, this study is suggested that the design of railway bridge apply to the existing analysis model considering the mass of track and the dynamic stability review of railway bridge apply to it considered the stiffness & mass of track. Also, it is suggested that the stiffness of concrete slab on the bridge must consider when it is designed or checked over the dynamic stability.

  • PDF

A Study on Factors for Influence SW Development Productivity on The IT Service Company (IT Service기업의 Software개발 생산성 영향 요인에 관한 실증 연구 : SW개발 방법론 중심으로)

  • Song, Young-Woon;Kim, Wanki
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.195-217
    • /
    • 2014
  • This paper has explored when implementing SW development project of the IT service corporations, what factors affect its productivity in SW development methodology. The importance of the AHP analysis surveyed from the experts in IT service companies and related committee, was shown in the order of the following processes : 1) Deployment process 2) Management process 3) Establishment process. It is measured the methodology levels of establishment, deployment and management in each project using the survey results collected from project execution members and analyzed the productivity of projects that have been executed within 2 years. Using project methodology level, productivity correlation analysis, and regression analysis, this study confirms that the methodology deployment level brings positive effects significantly to SW development productivity. The significance of this study would be not only to research and analyze SW development productivity using the real project execution data but also to underline the necessities and the importance of steady research, deployment and support for SW development productivity improvement.

Perception in IT Investment Cost/Benefit Analysis (정보화 비용/이익 분석요인에 대한 인식도 연구)

  • Lee, Seog-Jun
    • Asia pacific journal of information systems
    • /
    • v.13 no.2
    • /
    • pp.67-85
    • /
    • 2003
  • This study was conducted to analyze Korean companie's perception in IT investment cost-benefit analysis(CBA), and to see if various user group's perception is different. Literature was reviewed to classify and define variables in IT CBA, and questionnaire was distributed to CEOs, CIOs, IT managers, and general managers in Korean companies. Respondent's priority ranking in IT CBA was shown to be tangible benefit, direct cost/intangible benefit, and indirect cost/risk. Data analysis showed that Korean companie's actual practice in CBA was generally aligned with their perception. User group's(Executives vs. mangers, and IT managers vs. general managers) perception was not shown to be statistically different. Survey result also showed that IT CBA was not well practiced in the companies although respondents perceive the analysis very important. These findings suggest that more education and practical experience is needed for Korean companies to perform IT CBA.

The Qualifications for the Application of the Rainfall Spatial Distribution Analysis Technique (강우량 공간분포 분석기법의 적용조건에 관한 연구)

  • Hwang Sye-Woon;Park Seung-Woo;Cho Young-Kyoung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.943-947
    • /
    • 2005
  • This study was intended to interpose an objection about the analysis of rainfall spatial distribution without a proper standard, and offer the improved approach using 1,he geostatistical analysis method to analyze it. For this, spatially distributed daily rainfall data sets were collected for 41 weather stations in study area, and variogram and correlation analysis were conducted. In the results of correlation analysis, it was found that the longer distance between the stations reduces the correlation of the rainfall data, and maltes the characteristics of the rainfall spatial distribution. The variogram analysis shows that correlation range was less than 50 km for the 17 daily rainfall data sets of total 91 sets. It says that it involves some rike, to determine the application method for rainfall spatial distribution without some qualifications, hence the Application standards of the Rainfall Spatial Distribution Analysis Technique, were essential and that was contingent on characteristics of rainfall and landscape.

  • PDF

Refining software vulnerbility Analysis under ISO/IEC 15408 and 18045 (ISO/IEC 15408, 18045 기반 소프트웨어 취약성 분석 방법론)

  • Im, Jae-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.969-974
    • /
    • 2014
  • CC (Common Criteria) requires collecting vulnerability information and analyzing them by using penetration testing for evaluating IT security products. Under the time limited circumstance, developers cannot help but apply vulnerability analysis at random to the products. Without the systematic vulnerability analysis, it is inevitable to get the diverse vulnerability analysis results depending on competence in vulnerability analysis of developers. It causes that the security quality of the products are different despite of the same level of security assurance. It is even worse for the other IT products that are not obliged to get the CC evaluation to be applied the vulnerability analysis. This study describes not only how to apply vulnerability taxonomy to IT security vulnerability but also how to manage security quality of IT security products practically.

Deriving a Strategy for Resolving the Inter-and Intra-generational Digital Divide based on the Continuous Core-periphery Network Model (연속형 중심-주변 네트워크 모형을 통한 세대 간 세대 내 디지털 격차 해소를 위한 전략 도출)

  • Yoo, In Jin;Ha, Sang Jip;Park, Do Hyung
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.115-146
    • /
    • 2022
  • Purpose The purpose of this study is to find meaningful insights using regression analysis to resolve the digital divide between generations. In the analysis process of this study, social network analysis was applied to approach it with a perspective differentiated from the existing statistical techniques. Design/methodology/approach This study used a social network analysis methodology that transforms and analyzes government-led survey data into relational data. First, the cross-sectional data were converted into relational data, and a continuous core-periphery model and multidimensional scaling method were applied. Afterwards, the relationship between various factors affecting the digital divide and the difference in influence were analyzed by generation. Findings According to the network analysis results, it can be seen that all generations commonly use 'information and news search' and 'living information service'. However, it can be seen that the centrally used services of each generation are clearly different from each other, and the degree of linkage between the services is also clearly different. In addition, it can be seen that the relationship between factors influencing the digital divide by generation is also different.

Development of Activity Pattern Analysis and its Application to the Health Check-up Service Organization (활동패턴분석방법론의 개발과 적용 : 종합건강검진서비스 적용사례를 중심으로)

  • Moon, Jae Ung;Ahn, Joong Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.69-92
    • /
    • 2013
  • Activity Pattern Analysis(APA) is the methodology to Design the functions of information systems, to Estimate the monetary value of IS based on Activity Based Costing, to Acquire feasibility of IT Project. This study shows APA case in Health Check-up Service Organization (G-Center) and the Utility of APA. G-Center had acquired Five Outcomes through APA: (1) IT Strategy, (2) IT Project Goals, (3) Transformed Business Process, (4) Functional Blueprint of Information Systems, (5) IT Project budget and its feasibility. APA consists of three analysis processes; Activity Separation, Activity Rearrangement, Activity Costing. APA is flexible in determinating the range and the time of analysis, and is able to expand the Actors(as analysis objects) based on the purpose of analysis by researcher. Eventually APA can be used to do internal IT Management effectively.

A Study on the Investment Strategy of the IT R&D using Portfolio Analysis and AHP Method (포트폴리오 분석과 계층화분석기법(AHP)을 활용한 정부 IT분야 연구개발 투자 전략 연구)

  • Kim, Yun-Jong;Jung, Uk;Yim, Seong-Min;Jeong, Sang-Ki
    • Korean Management Science Review
    • /
    • v.26 no.1
    • /
    • pp.37-51
    • /
    • 2009
  • Korean IT industry has been given much weight in national R&D management. A negative side of this fact is that Korean economy is likely to become vulnerable to a condition of the export business in certain items of IT industry which has a serious influence on the national economy. A customized investment strategy through the analysis of technology competitiveness and R&D status in each technology of IT field is required in order to rectify the structural vulnerability and pursue a continuous growth. In this research, a strategic direction to set up an efficient investment strategy is presented. In this process, it draws a portfolio analysis with two axes of technology level and technology life cycle. It also derives a priority order of the national investment considering the degree of technological impact, marketability, and adequacy of public support from AHP (Analytic Hierarchy Process) method by a survey of IT experts. A portfolio analysis in the prior stage helps the respondents in AHP become more familiar with the alternatives' characteristics so that their decision making process more corresponds with national R&D strategies.

Priority Analysis for Software Functions Using Social Network Analysis and DEA(Data Envelopment Analysis) (사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구)

  • Huh, Sang Moo;Kim, Woo Je
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.171-189
    • /
    • 2018
  • To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance.

A Study on the Dataset of the Korean Multi-class Emotion Analysis in Radio Listeners' Messages (라디오 청취자 문자 사연을 활용한 한국어 다중 감정 분석용 데이터셋연구)

  • Jaeah, Lee;Gooman, Park
    • Journal of Broadcast Engineering
    • /
    • v.27 no.6
    • /
    • pp.940-943
    • /
    • 2022
  • This study aims to analyze the Korean dataset by performing Korean sentence Emotion Analysis in the radio listeners' text messages collected personally. Currently, in Korea, research on the Emotion Analysis of Korean sentences is variously continuing. However, it is difficult to expect high accuracy of Emotion Analysis due to the linguistic characteristics of Korean. In addition, a lot of research has been done on Binary Sentiment Analysis that allows positive/negative classification only, but Multi-class Emotion Analysis that is classified into three or more emotions requires more research. In this regard, it is necessary to consider and analyze the Korean dataset to increase the accuracy of Multi-class Emotion Analysis for Korean. In this paper, we analyzed why Korean Emotion Analysis is difficult in the process of conducting Emotion Analysis through surveys and experiments, proposed a method for creating a dataset that can improve accuracy and can be used as a basis for Emotion Analysis of Korean sentences.