• Title/Summary/Keyword: 경쟁기법

Search Result 859, Processing Time 0.033 seconds

Design of Contact Scheduling System(CSS) for Customer Retention (고객유지를 위한 접촉스케줄링시스템의 설계)

  • Lee, Jee-Sik;Cho, You-Jung
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.3
    • /
    • pp.83-101
    • /
    • 2005
  • Customer retention is one of the major issues in life insurance industry, in which competition is increasingly fierce. There are many things for the life insurers to do many things to retain the customers. One of those things is to make sure to keep in touch with all customers. When an insurance-planner resigned, his/her customers must be taken care of by some planner-assistants. This article outlines the design of Contact Scheduling System (CSS) that supports planner-assistants for contacting the customers. Planner-assistants are unable to share the resigned insurance-planner's experience and knowledge regarding the customer relationship management. The CSS developed by employing both Classification And Regression Tree (CART) technique and Sequential Pattern Mining (SPM) technique has a two-stage process. In the first stage, it segments the customers into eight groups by CART model. Then it generates contact scheduling information consisting of contact-purpose, contact-interval and contact-channel, according to the segment's typical contact pattern. Contact-purpose is derived by schedule-driven, event-driven, or business-rule-driven. Schedule-driven contact is determined by SPM model. In the operation of CSS in a realistic situation, it shows a practicality in supporting planner-assistants to keep in touch with the customers efficiently and effectively.

  • PDF

The Mobile Cartoons Authoring Method Using Scene Flow Mode (Scene flow 방식을 이용한 모바일 만화 저작 기법)

  • Cho, Eun-Ae;Koh, Hee-Chang;Mo, Hae-Gyu
    • Cartoon and Animation Studies
    • /
    • s.19
    • /
    • pp.113-126
    • /
    • 2010
  • The digital cartoons market is looking for a new growth momentum as the radical increases of the demands and markets about the mobile contents with portable instrument popularization. The conventional digital cartoons markets which are based on web-toon, page viewer cartoons and e-paper cartoons have been studied various fields to overcome some limitations such as the traditional cartoons had. The mobile cartoons which have been changed more and more, have some canvas limitations due to the mobile screen size. These limitations lead to the communication problems between the cartoonists and the subscribers and resulting some obstacles of mobile cartoons activations. In this paper, we developed a authoring tool applied the Screen Flow method to overcome inefficiency of conventional authoring methods. This proposed method can reflect the cartoonists' during the process of authoring mobile cartoons, thereafter we studied about the authoring method of mobile cartoons and its effects. For the convenience of users creating and distributing content in a way has been studied.

  • PDF

A Study of Business Model Based on Intelligent Agents for Optimal Contract (최적의 매매계약을 위한 지능형 에이전트 기반의 비즈니스 모형에 관한 연구)

  • 정종진
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.131-146
    • /
    • 2004
  • As Electronic Commerce(EC) has been emerged and has developed, many researchers have tried to establish EC framework for automated contract and negotiation using agent technologies. Traditional researches, however, often had limitations. They often enforced the user's participations during the automated contract process of agents. They also could only consider a few of the user's requirements for a specific goods and did not have supported the procedures and methodologies for making the best contract. In this paper, we propose business model on EC based on multiagents to overcome the defects of the previous researches. We apply CSP techniques to brokerage process to satisfy various preferential requirements from the user. We also propose efficient negotiation mechanism using negotiation model of game theory. The contract candidates automatically negotiate and mediate in terms of their benefits through the proposed negotiation mechanism. For the optimal brokerage and automated negotiation, the agents process activities for contract on three layers, which are called competition layer, constraint satisfaction layer and negotiation layer in the proposed model. We also design the message driven communication protocol to support the automated contract among the agents. Finally, we have implemented prototype systems applying the proposed model and have shown the various experimental results for efficiency of the proposed model.

  • PDF

Study on the Efficient Operation of Private Security Guarding System (한국 민간경호시스템의 효율적 운영방안)

  • Kim, Tae-Min;Kim, Dong-Je
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.117-147
    • /
    • 2006
  • This study aims to propose efficient way to operate the security guarding system from the perspective of administration, policy, law, institution and operation as to the private security guarding system as the Korean security guarding system needs multifaced analysis and measure to ensure efficient operation. The growth strategy has to be restructured and segmentation market needs to be driven in order to cope with the changing conditions of company from the perspective of administration. And private security guarding service companies must refrain from excessive competition while improving the contracting method such as minimum price bidding, etc. From the perspective of policy, the functions of relevant organizations such as the National Police Agency, security association, etc, and mutual cooperation must expand. Also, the profit generation event needs to be privatized and the more positive perception toward the private security guarding service is necessary. In addition, security exhibition and seminar can be expanded to lay the groundwork for the advancement of private security system. From the legal and institutional perspective, the security guarding service related law must be revised and the certification system must b introduced to cope with the changing requirement. The security guarding instructor system must be strengthened to ensure a faithful and earnest implementation of duty to instruct, supervise and educate security guarding personnel. From the perspective of security guarding system's operation, professional security technique must be introduced and applied, and the volunteer application system must be established. In addition, standard 'security guarding manual' must be crafted, and the equipment for security guarding must be modernized to ensure an efficient operation of private security guarding services.

  • PDF

Vegetation Characteristics of Geumnamhonam·Honam Ridge Areas Understood through Quantitative Vegetation Analysis (정량적 식생분석을 통한 금남호남·호남정맥 마루금 일대의 식생 특성)

  • Park, Seok-Gon;Kang, Hyun-Mi
    • Korean Journal of Environment and Ecology
    • /
    • v.34 no.4
    • /
    • pp.304-317
    • /
    • 2020
  • This study conducted selected two sites in Geumnamhonam and four sites in Honam-Jeongmaek for vegetation survey with consideration to the location environment and anthropogenic impacts to investigate the vegetation structures of the Geumnamhonam-Jeongmaek·Honam-Jeongmaek ridge areas. Using TWINSPAN (two-way indicator species analysis), each of the two ridge areas were categorized into seven plant communities. The differential species in the TWINSPAN technique indirectly represent the environmental factors of plant communities, and the community types of the two ridge areas were divided based on environmental factors such as altitudes above sea level, soil moisture, and disturbance. These results were in harmony with the environmental factors of the DCA (detrended correspondence analysis) axis 1. In the low-lying areas of both ridge areas, afforestation tree species such as Pinus rigida and P. thunbergii were in competition with native tree species. As such, in the low-lying areas, artificial vegetation disturbance was severe due to afforestation and development projects. In relatively highland areas, such as upper slopes, and top areas, in the ridge, the vegetation type with the dominance of Quercus mongolica, Q. variabilis, and P. densiflora was preserved well. As for differences between the two ridge areas, communities dominated by Q. mongolica were distributed widely in Geumnamhonam-Jeongmaek because of the altitudes above sea level, and the latitude of this ridge area are higher than those of Honam-Jeongmaek. On the other hand, communities dominated by P. densiflora were distributed along with communities dominated by Q. mongolica, and communities dominated by Q. variabilis appeared in Honam-Jeongmaek because it is adjacent to the south coast. In quantitative vegetation analysis such as TWINSPAN and DCA, changes in species composition and the extracting environmental factors that cause the changes are important. To that end, the removal of accidental emergent species, the establishment of an investigation plan that assumes environmental factors, and the selection of the optimal analytical method suitable for the characteristics of the survey data are necessary.

Design of Adaptive DCF algorithm for TCP Performance Enhancement in IEEE 802.11 based Mobile Ad-hoc Networks (IEEE 802.11 기반 이동 ad-hoc 망에서 TCP 성능 향상을 위한 적응적 DCF 알고리즘 설계)

  • Kim, Han-Jib;Lee, Gi-Ra;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.79-89
    • /
    • 2006
  • TCP is the most widely used transport protocol in Internet applications that guarantees a reliable data transfer. But, in the wireless multi-hop networks, TCP performance is degraded because it is designed for wired networks. The main reasons of TCP performance degradation are contention for wireless medium at the MAC layer, hidden terminal problem, exposed terminal problem, packet losses in the link layer, unfairness problem, reordering problem caused by path disconnection, bandwidth waste caused by exponential backoff of retransmission timer due to node's mobility and so on. Specially, in the mobile ad-hoc networks, discrepancy between a station's transmission range and interference range produces hidden terminal problem that decreases TCP performance greatly by limiting simultaneous transmission at a time. In this paper, we propose a new MAC algorithm for mobile ad-hoc networks to solve the problem that a node can not transmit and just increase CW by hidden terminal. In the IEEE 802.11 MAC DCF, a node increases CW exponentially when it fails to transmit, but the proposed algorithm, changes CW adaptively according to the reason of failure so we get a TCP performance enhancement. We show by ns-2 simulation that the proposed algorithm enhances the TCP performance by fairly distributing the transmission opportunity to the failed nodes by hidden terminal problems.

New Contention Window Control Algorithm for TCP Performance Enhancement in IEEE 802.11 based Wireless Multi-hop Networks (IEEE 802.11 기반 무선 멀티홉 망에서 TCP의 성능향상을 위한 새로운 경쟁 윈도우 제어 알고리즘)

  • Gi In-Huh;Lee Gi-Ra;Lee Jae-Yong;Kim Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.165-174
    • /
    • 2006
  • In this paper, we propose a new contention window control algorithm to increase TCP performance in wireless multi-hop networks. The new contention window control algorithm is suggested to reduce the hidden and exposed terminal problems of wireless multi-hop networks. Most of packet drops in wireless multi-hop networks results from hidden and exposed terminal problems, not from collisions. However, in normal DCF algorithm a failed user increases its contention window exponentially, thus it reduces the success probability of fined nodes. This phenomenon causes burst data transmissions in a particular node that already was successful in packet transmission, because the success probability increases due to short contention window. However, other nodes that fail to transmit packet data until maximum retransmission attempts try to set up new routing path configuration in network layer, which cause TCP performance degradation and restrain seamless data transmission. To solve these problems, the proposed algorithm increases the number of back-of retransmissions to increase the success probability of MAC transmission, and fixes the contention window at a predetermined value. By using ns-2 simulation for the chain and grid topology, we show that the proposed algorithm enhances the TCP performance.

A Study on the Development Methodology of the U-City Service Scenarios which Apply the Scenario Management Techniques (시나리오 경영기법을 적용한 U-City 서비스 시나리오 개발 방안 연구: u-수질 모니터링 서비스를 중심으로)

  • Seo, Hyun-Sik;Lee, Jong-Myun;Oh, Jay-In
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.23-44
    • /
    • 2009
  • U-Services are inevitably essential for the realization of u-Cities. Most local governments in Korea have expressed much interest in introducing u-Cites and related u-Services. Since researchers anticipate that developing u-Cities will produce economic effects, the Korea government has support local governments to develop u-Cities and necessary u-Services. However, the technology issues have been dominiated in the field of U-City services and most of the U-City services do not reflects all the complicated and pluralistic sides of environment, which are caused by future uncertainties in developing u-Cites. For the purpose of addressing the above uncertainties, this paper attempts to develop the possible scenarios for U-City services through a scenario planning approach. A focus group interview and survey with professionals in the field of planning u-Cities was performed to identify these uncertainties. Then, in order to investigate the validity of the scenario planning methodology, the u-Service "u-Water purity monitoring" is adopted. After considering the relevant issues, we developed two possible scenarios: a mutual linkage service among u-Service related organization and a cooperating and coordinating service among local governments. On the basis of these scenarios, the strategies for potential U-City services are formulated. Various participants in developing U -City services are encouraged to use the scenarios as the foundation of predicting future features of u-Cities and developing the framework of the U-City service scenarios effectively.

Terms Based Sentiment Classification for Online Review Using Support Vector Machine (Support Vector Machine을 이용한 온라인 리뷰의 용어기반 감성분류모형)

  • Lee, Taewon;Hong, Taeho
    • Information Systems Review
    • /
    • v.17 no.1
    • /
    • pp.49-64
    • /
    • 2015
  • Customer reviews which include subjective opinions for the product or service in online store have been generated rapidly and their influence on customers has become immense due to the widespread usage of SNS. In addition, a number of studies have focused on opinion mining to analyze the positive and negative opinions and get a better solution for customer support and sales. It is very important to select the key terms which reflected the customers' sentiment on the reviews for opinion mining. We proposed a document-level terms-based sentiment classification model by select in the optimal terms with part of speech tag. SVMs (Support vector machines) are utilized to build a predictor for opinion mining and we used the combination of POS tag and four terms extraction methods for the feature selection of SVM. To validate the proposed opinion mining model, we applied it to the customer reviews on Amazon. We eliminated the unmeaning terms known as the stopwords and extracted the useful terms by using part of speech tagging approach after crawling 80,000 reviews. The extracted terms gained from document frequency, TF-IDF, information gain, chi-squared statistic were ranked and 20 ranked terms were used to the feature of SVM model. Our experimental results show that the performance of SVM model with four POS tags is superior to the benchmarked model, which are built by extracting only adjective terms. In addition, the SVM model based on Chi-squared statistic for opinion mining shows the most superior performance among SVM models with 4 different kinds of terms extraction method. Our proposed opinion mining model is expected to improve customer service and gain competitive advantage in online store.

Adversarial learning for underground structure concrete crack detection based on semi­supervised semantic segmentation (지하구조물 콘크리트 균열 탐지를 위한 semi-supervised 의미론적 분할 기반의 적대적 학습 기법 연구)

  • Shim, Seungbo;Choi, Sang-Il;Kong, Suk-Min;Lee, Seong-Won
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.22 no.5
    • /
    • pp.515-528
    • /
    • 2020
  • Underground concrete structures are usually designed to be used for decades, but in recent years, many of them are nearing their original life expectancy. As a result, it is necessary to promptly inspect and repair the structure, since it can cause lost of fundamental functions and bring unexpected problems. Therefore, personnel-based inspections and repairs have been underway for maintenance of underground structures, but nowadays, objective inspection technologies have been actively developed through the fusion of deep learning and image process. In particular, various researches have been conducted on developing a concrete crack detection algorithm based on supervised learning. Most of these studies requires a large amount of image data, especially, label images. In order to secure those images, it takes a lot of time and labor in reality. To resolve this problem, we introduce a method to increase the accuracy of crack area detection, improved by 0.25% on average by applying adversarial learning in this paper. The adversarial learning consists of a segmentation neural network and a discriminator neural network, and it is an algorithm that improves recognition performance by generating a virtual label image in a competitive structure. In this study, an efficient deep neural network learning method was proposed using this method, and it is expected to be used for accurate crack detection in the future.