• Title/Summary/Keyword: package information

Search Result 1,294, Processing Time 0.041 seconds

Performance Analysis of AAL2 Packet Dropping Algorithm using PDV on Virtual Buffer (PDV를 이용한 가상 버퍼상의 AAL2 패킷 폐기 알고리즘과 성능분석)

  • Jeong, Da-Wi;Jo, Yeong-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.1
    • /
    • pp.20-33
    • /
    • 2002
  • Usage of ATM AAL2 packets becomes dominant to increase transmission efficiency of voice traffic in the backbone network. In case of voice service that uses AAL2 mechanism, if resources of network are enough, connection of new call is accepted. However, due to packets generated by the new call, transmission delay of packets from old calls can increase sharply. To control this behavior, in this paper we present an AAL2 buffer management scheme that allocates a virtual buffer to each call and after calculating its propagation delay variation(PDV), decides to drop packets coming from each call according to the PDV value. We show that this packet dropping algorithm can effectively prevent abrupt QoS degradation of old calls. To do this, we analyze AAL2 packet composition process to find a critical factor in the process that influences the end-to-end delay behavior and model the process by K-policy M/D/1 queueing system and MIN(K, Tc)-policy M/D/1 queueing system. From the mathematical model, we derive the probability generating function of AAL2 packets in the buffer and mean waiting time of packets in the AAL2 buffer. Analytical results show that the AAL2 packet dropping algorithm can provide stable AAL2 packetization delay and ATM cell generation time even if the number of voice sources increases dramatically. Finally we compare the analytical result to simulation data obtained by using the COMNET Ⅲ package.

A Job Analysis of Acute Care Hospitals' Formal Caregiver (급성기병원 간병인의 직무분석)

  • Kwon, Jin;Yang, Misook
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.639-651
    • /
    • 2013
  • This study aims to improve caregiver's labor conditions, to provide a high-quality care service and to offer basic research information for developing a standardized job content of caregiver. The study establishes basic principles for a standardized job content with a literature review and then collects basic information of caregiver's task with an observation technique. The study based on the observation technique develops 11 job categories and 72 duty categories expected to do by the caregiver. The study examines acute care hospitals that provide joint care services in Seoul and Gyeonggi province. Sixty caregivers who work at these hospitals are carried out a survey regarding a specific task of caregiver, an importance of task and a frequency of task. Collected data is analyzed using statistical package SPSS 18.0, and descriptive statistics (frequency, percentage, average, standard deviation) is reported. An analysis of frequency is used to analyze target for research. From the collected information, tasks of caregiver are sorted into 10 job categories and 60 duty categories. As a result of the study, tasks of caregiver are sorted into 10 job categories and 68 duty categories based on the observations technique. One job category and four duty categories are added to the final survey based on an interview with professionals and officials in the field of care service but, one additional job category and four duty categories based on the interview are excepted from the result of the analysis. The interview with professionals and officials is nothing meaningful on the task analysis of caregiver.

A Study on the Critical Factors for Successful AIS Implementation (회계정보시스템의 성공적 도입을 위한 요인분석)

  • Ha, Dae-Yong;Oh, Sang-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1364-1370
    • /
    • 2006
  • Recently, Adopting Accounting Information Systems(AIS) has spread rapidly for efficient and rational making decision in the business organization. There are many types of AIS. These are from simple package to integrated packages which are including HR, Product, Sales and Distribute. In case of big enterprises, ERP systems have been implemented and attention is now being directed as to AIS module. AIS module is not easy to change its form, therefore this module need to be considered enough when it comes to the corporations. However there we few standard fer this module as a successful information systems. This study analyze critical factors of certain companies when the companies were implementing AIS and based on this analysis, this study suggest a framework for successful implementation of AIS Using Case Study. 42 AIS adopted companies are surveyed and their factors' correlations are analyzed by mean analysis and factor analysis in this study. As a result of this study, when a company adopt AIS, criteria or particularities for the adoption are more important than environment of the company. Thus, it is significant to empirically prove previous studies' factors relation and importance relations for successful AIS implementation through empirical method in this study.

  • PDF

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

Development of Information Extraction System from Multi Source Unstructured Documents for Knowledge Base Expansion (지식베이스 확장을 위한 멀티소스 비정형 문서에서의 정보 추출 시스템의 개발)

  • Choi, Hyunseung;Kim, Mintae;Kim, Wooju;Shin, Dongwook;Lee, Yong Hun
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.111-136
    • /
    • 2018
  • In this paper, we propose a methodology to extract answer information about queries from various types of unstructured documents collected from multi-sources existing on web in order to expand knowledge base. The proposed methodology is divided into the following steps. 1) Collect relevant documents from Wikipedia, Naver encyclopedia, and Naver news sources for "subject-predicate" separated queries and classify the proper documents. 2) Determine whether the sentence is suitable for extracting information and derive the confidence. 3) Based on the predicate feature, extract the information in the proper sentence and derive the overall confidence of the information extraction result. In order to evaluate the performance of the information extraction system, we selected 400 queries from the artificial intelligence speaker of SK-Telecom. Compared with the baseline model, it is confirmed that it shows higher performance index than the existing model. The contribution of this study is that we develop a sequence tagging model based on bi-directional LSTM-CRF using the predicate feature of the query, with this we developed a robust model that can maintain high recall performance even in various types of unstructured documents collected from multiple sources. The problem of information extraction for knowledge base extension should take into account heterogeneous characteristics of source-specific document types. The proposed methodology proved to extract information effectively from various types of unstructured documents compared to the baseline model. There is a limitation in previous research that the performance is poor when extracting information about the document type that is different from the training data. In addition, this study can prevent unnecessary information extraction attempts from the documents that do not include the answer information through the process for predicting the suitability of information extraction of documents and sentences before the information extraction step. It is meaningful that we provided a method that precision performance can be maintained even in actual web environment. The information extraction problem for the knowledge base expansion has the characteristic that it can not guarantee whether the document includes the correct answer because it is aimed at the unstructured document existing in the real web. When the question answering is performed on a real web, previous machine reading comprehension studies has a limitation that it shows a low level of precision because it frequently attempts to extract an answer even in a document in which there is no correct answer. The policy that predicts the suitability of document and sentence information extraction is meaningful in that it contributes to maintaining the performance of information extraction even in real web environment. The limitations of this study and future research directions are as follows. First, it is a problem related to data preprocessing. In this study, the unit of knowledge extraction is classified through the morphological analysis based on the open source Konlpy python package, and the information extraction result can be improperly performed because morphological analysis is not performed properly. To enhance the performance of information extraction results, it is necessary to develop an advanced morpheme analyzer. Second, it is a problem of entity ambiguity. The information extraction system of this study can not distinguish the same name that has different intention. If several people with the same name appear in the news, the system may not extract information about the intended query. In future research, it is necessary to take measures to identify the person with the same name. Third, it is a problem of evaluation query data. In this study, we selected 400 of user queries collected from SK Telecom 's interactive artificial intelligent speaker to evaluate the performance of the information extraction system. n this study, we developed evaluation data set using 800 documents (400 questions * 7 articles per question (1 Wikipedia, 3 Naver encyclopedia, 3 Naver news) by judging whether a correct answer is included or not. To ensure the external validity of the study, it is desirable to use more queries to determine the performance of the system. This is a costly activity that must be done manually. Future research needs to evaluate the system for more queries. It is also necessary to develop a Korean benchmark data set of information extraction system for queries from multi-source web documents to build an environment that can evaluate the results more objectively.

A Study on Development of Market Oriented MIS Curriculum (시장지향적 MIS 교육과정 개편을 위한 연구)

  • Lee, Ji-Myoun;Bock, Gee-Woo
    • Information Systems Review
    • /
    • v.10 no.3
    • /
    • pp.207-222
    • /
    • 2008
  • In recent business environment, we realize that MIS is taking important role in which it has been involved. However, we are having difficulty to find out the identity of MIS in business studies since MIS is derived from Micro Economics, Operations Research, Computer Science and so on. And there is no clear boundary in order to classify with other business area in consisting curriculums. Furthermore, IT staffs in the field are facing difficulties to utilize what they have learned MIS curriculums provided from business studies. In this research, we would like to present implications for development of market oriented MIS curriculums, which can be the actual needs of IT fields, through analysis of System Integration project for recent three years, analysis of IT capability based on the survey of IT consultants and analysis of application S/W technology trend in global vendor referred to "MIS Curriculum: The Current State of the Art and a Proposed Future Model (Lee et al, 2007)". As enterprise application software technology develop, the system integration can be achieved through special system solutions such as ERP, CRM, SCM, BI, etc. We also have acknowledged that solution consultants who have the ability of packaged S/W application are in demand since S/W vendors have become larger and more practical through M&A. Therefore, we have come to a conclusion regarding new direction of curriculum for increasing human power in IT industry which we demonstrated in detail through this research.

Relationship between Pursuit Benefit and Behavior by Spectators Participating Security Exhibition (보안엑스포 참관객의 추구편익과 참관 후 행동의 관계)

  • Kim, In-Jae
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.35-56
    • /
    • 2014
  • The purpose of this study was aimed to identify the relationship between pursuit benefit and behavior by spectators participating security exhibition. The result of study is significant because it may provide more effective and aggressive marketing strategies to the future companies participating security exhibition, and suggest developmental direction by actively responding spectators' needs. The subject for this study was spectators who participating World Security Expo 2014 held three days from March 12 to 14 in 2014. 300 samples were selected by convenience sampling for subject of this study. 283 out of 300 surveys, excluded 17 unfaithful and defected surveys, were used for data analysis. Research tool was questionnaire which was based on and recomposed by previous researches home and abroad. The collected data were treated for analysis of frequency, reliability, factor analysis, correlation, and regression by using SPSS statistic package version of 18.0. Through the above research method and procedure, the results were as followings. First, the relationship between pursuit benefit and behavior after participating exhibition appeared positively. It was found that there was high relationship between pursuit benefit and behavior. Second, analyzing relationship of factors between pursuit benefit and behaviors resulted to effect information exploration, good use of spare time, and product purchase on word of mouth. Third, analyzing relationship of factors between pursuit benefit and behaviors resulted to effect good use of spare time, information exploration, and product purchase on re-participation.

  • PDF

The Present Status and Outlook of Nano Technology (나노기술의 국내외 현황과 전망)

  • 김용태
    • Proceedings of the International Microelectronics And Packaging Society Conference
    • /
    • 2001.11a
    • /
    • pp.37-39
    • /
    • 2001
  • 21세기의 벽두부터 국내외적으로 활발히 논의되고 있는 나노기술에 대한 정의를 생각해보는 것으로부터 우리가 나아갈 방향을 살펴보고자 한다. 나노기술이란, 원자 하나 하나 혹은 분자단위의 조작을 통해 1~100nm정도의 범위 안에서 근본적으로 새로운 물질이나 구조체를 만들어 내는 기술을 말한다. 즉 앞으로 우리는 경험해 보지 못한 새로운 현상에 대한 이해를 할 수 있어야 하고, 새로운 물질 자체를 다룰 수 있는 방법이 우리가 해야 할 구체적인 일이 될 것이란 말이 된다. 뿐만 아니라 나노기술은 종래의 정보.통신.전자 분야에서 주로 추구하던 마이크로화와 달리 재료, 기계, 전자, 의학, 약학, 에너지, 환경, 화학, 생물학, 농학, 정보, 보안기술 등 과학기술 분야 전반을 위시하여 사회분야가지 새로운 인식과 철학적인 이해가 필요하게 되었다. 21세기를 맞은 인류가 나아갈 방향을 나노세계에 대한 도전으로 보아야 하며, 과학기술의 새로운 틀을 제공할 것 임에 틀림 없다. 그러나, 이와 같은 나노기술의 출발점을 살펴보면 VLSI기술로 통칭할 수 있는 마이크로전자소자 기술이란 점이다. 국내의 VLSI기술은 메모리기술이라고 해도 과언이 아닐 것이다. 문제는 종래의 메모리기술은 대규모 투자와 집중적인 인력양성을 통해서 세계 최고 수준에 도달 할 수 있었다. 그러나 여기까지 오는 동안 사식 우리는 선진국의 뒷꽁무니를 혼신의 힘을 다해 뒤쫓아 온 결과라고 보아도 틀리지 않는다. 즉, 앞선자를 보고 뒤쫓는 사람은 갈방향과 목표가 분명하므로 최선을 다하면 따라 잡을 수 있다. 그런데 나노기술은 앞선 사람이 없다는 점이 큰 차이이다 따라서 뒷껑무니를 쫓아가는 습성을 가지고는 개척해 나갈 수 없다는 점을 깨닫지 않으면 안된다. 그런 점에서 이 시간 나노기술의 국내외 현황을 살펴보고 우리가 어떻게 할 것인가를 생각해 보는데 의미가 있을 것이다.하여 분석한 결과 기존의 제한된 RICH-DP는 실시간 서비스에 대한 처리율이 낮아지며 서비스 시간이 보장되지 못했다. 따라서 실시간 서비스에 대한 새로운 제안된 기법을 제안하고 성능 평가한 결과 기존의 RICH-DP보다 성능이 향상됨을 확인 할 수 있었다.(actual world)에서 가상 관성 세계(possible inertia would)로 변화시켜서, 완수동사의 종결점(ending point)을 현실세계에서 가상의 미래 세계로 움직이는 역할을 한다. 결과적으로, IMP는 완수동사의 닫힌 완료 관점을 현실세계에서는 열린 미완료 관점으로 변환시키되, 가상 관성 세계에서는 그대로 닫힌 관점으로 유지 시키는 효과를 가진다. 한국어와 영어의 관점 변환 구문의 차이는 각 언어의 지속부사구의 어휘 목록의 전제(presupposition)의 차이로 설명된다. 본 논문은 영어의 지속부사구는 논항의 하위간격This paper will describe the application based on this approach developed by the authors in the FLEX EXPRIT IV n$^{\circ}$EP29158 in the Work-package "Knowledge Extraction & Data mining"where the information captured from digital newspapers is extracted and reused in tourist information context.terpolation performance of CNN was relatively better than NN.콩과 자연 콩이 성분 분석에서 차이를 나타내지 않았다는 점, 네 번째. 쥐를 통한 다양섭취 실험에서 아무런 이상 반응이 없었다는 점등의 결과를 기준으로 알레르기에 대한 개별 검사 없이 안전한

  • PDF

A Study on Long-tail Shape of e-journal Usage - focused on a case of K academic library - (전자학술지 이용의 롱테일현상에 관한 연구 - K 대학도서관의 이용 사례를 중심으로 -)

  • Kim, Sun-Ae
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.4
    • /
    • pp.203-221
    • /
    • 2019
  • How has the use of academic journals changed since the academic library purchase policy changed from selective journals based on core journals to package purchases by big deal? The purpose of this study is to analyze the effect of supply and size of academic journals in university libraries on the use of journals. For this purpose, this study used the actual usage statistics of e-journals of K Academic Libraries during 2013-2015. The analysis shows that there is a so-called long-tail shape in which demand shifts to niche products that are effective in online platforms. Analysis of the use of academic journals by year for three years showed that the use of electronic journals in K Academic Libraries appeared to be a perfect Pareto shape, which is concentrated in the top 20% of journals. In particular, in 2015, the top 5% of journals accounted for nearly 80% of the total usage. Despite the changes in the supply method and size of academic journals, users' use of journals was still concentrated in core journals.