• Title/Summary/Keyword: 데이터 마켓

Search Result 88, Processing Time 0.021 seconds

A Study on the Development of Product Planning Prediction Model Using Logistic Regression Algorithm (로지스틱 회귀 알고리즘을 활용한 상품 기획 예측 모형 개발에 관한 연구)

  • Ahn, Yeong-Hwil;Park, Koo-Rack;Kim, Dong-Hyun;Kim, Do-Yeon
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.39-47
    • /
    • 2021
  • This study was conducted to propose a product planning prediction model using logistic regression algorithm to predict seasonal factors and rapidly changing product trends. First, we collected unstructured data of consumers in portal sites and online markets using web crawling, and analyzed meaningful information about products through preprocessing for transformation of standardized data. The datasets of 11,200 were analyzed by Logistic Regression to analyze consumer satisfaction, frequency analysis, and advantages and disadvantages of products. The result of analysis showed that the satisfaction of consumers was 92% and the defective issues of products were confirmed through frequency analysis. The results of analysis on the use satisfaction, system efficiency, and system effectiveness items of the developed product planning prediction program showed that the satisfaction was high. Defective issues are very meaningful data in that they provide information necessary for quickly recognizing the current problem of products and establishing improvement strategies.

A Study on the Online Perception of Chabak Using Big Data Analysis (빅데이터 분석을 통한 차박의 온라인 인식에 대한 연구)

  • Kim, Sae-Hoon;Lee, Hwan-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.2
    • /
    • pp.61-81
    • /
    • 2021
  • In the era of untact, the "Chabak" using cars as accommodation spaces is attracting attention as a new form of travel. Due to the advantages, including low costs, convenience, and safety, as well as the characteristics of the vehicle enabling independent travel, the demand for Chabak is continuously increasing. Despite the rapid growth of the market and related industries, little academic has investigated this trend. To establish itself as a new type of travel culture and to sustain the growth of related industries, it is essential to understand the public perception of Chabak. Therefore, based on the marketing mix theory and big data analysis, this study analyzes the public perception of Chabak. The results showed that Chabak has established itself as a consumer-led travel culture, contributing to the aftermarket growth of the automobile industry. Additionally, consumers were found to be increasingly inclined to enjoy travel economically and wisely, and actively share information through social media. This initial study on the new travel trend of Chabak is significant in that it employs big data analysis on a theoretical basis.

A Strategic Analysis of Digital Transformation for Data Integration based on Platform Business Model: Focusing on Financial Industry (디지털 트랜스포메이션의 플랫폼 비즈니스 모델 기반 데이터 통합 관점 분석: 금융산업 사례를 중심으로)

  • Kim, Iljoo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.119-131
    • /
    • 2021
  • With the boom of platform businesses, digital transformation has become the most important topic for businesses. Digital transformation has now become the most urgent strategy for survival, from a strategy considered as an option to choose in the past. Many companies are desperately seeking the ways to be digitally transformed. Even though there have been many studies on digital transformation, most of them are on strategic and conceptual model levels based on simple case analyses. In this study, we analyze the benefits of data integration and network effects from it, based on platform business model at the core of digital transformation. The change based on platform can be categorized into the internal one for the integration of data and better decision making, and the external one for the expansion of the businesses and better prediction of consumer behaviors through the integration of external data sets by the platform business model based enterprises. While the progress for digital transformation is not mature enough yet, financial industry is one of the most promising industries for the change and realization of the aim of it with its relatively much more advanced IT infrastructure. Many companies are making various efforts for the integration of external data, and if the good results can be accomplished, financial industry will contribute to the advancement of digital transformation in other industries as well. For "My Data" project by Korean government, we suggest the data structure and transaction of data (of Korea) should be advanced and established more quickly.

Weighted Association Rule Discovery for Item Groups with Different Properties (상이한 특성을 갖는 아이템 그룹에 대한 가중 연관 규칙 탐사)

  • 김정자;정희택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1284-1290
    • /
    • 2004
  • In market-basket analysis, weighted association rule(WAR) discovery can mine the rules which include more beneficial information by reflecting item importance for special products. However, when items are divided into more than one group and item importance for each group must be measured by different measurement or separately, we cannot directly apply traditional weighted association rule discovery. To solve this problem, we propose a novel methodology to discovery the weighted association rule in this paper In this methodology, the items should be first divided into sub-groups according to the properties of the items, and the item importance is defined or calculated only with the items enclosed to the sub-group. Our algorithm makes qualitative evaluation for network risk assessment possible by generating risk rule set for risk factor using network sorority data, and quantitative evaluation possible by calculating risk value using statistical factors such as weight applied in rule generation. And, It can be widely used for new model of more delicate analysis in market-basket database in which the data items are distinctly separated.

SME Bakery's Marketing Strategies Based on Apriori Algorithm (Apriori 알고리즘 기반의 중소 베이커리 기업의 대응 전략)

  • Kim, Do Hoon;Lee, Hyeon June;Lee, Bong Gyou
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.328-337
    • /
    • 2022
  • The importance of online marketing is emerging due to the prevalence of COVID-19. In order to respond to the changing business environment, we have collected ten years of sales data of SME bakery company that have experienced a decrease in sales due to the COVID-19. As a result of the analysis, we found that switching from offline markets to omnichannel B2B and B2C markets and taking 'small quantity batch production' to 'mass production in a small variety can improve management. This study presented online and offline marketing strategies through data analysis of small and medium-sized bakery companies, which have relatively insufficient digital capabilities compared to large companies, and could be a guideline for many SMEs.

Framework Design for Malware Dataset Extraction Using Code Patches in a Hybrid Analysis Environment (코드패치 및 하이브리드 분석 환경을 활용한 악성코드 데이터셋 추출 프레임워크 설계)

  • Ki-Sang Choi;Sang-Hoon Choi;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.403-416
    • /
    • 2024
  • Malware is being commercialized and sold on the black market, primarily driven by financial incentives. With the increasing demand driven by these sales, the scope of attacks via malware has expanded. In response, there has been a surge in research efforts leveraging artificial intelligence for detection and classification. However, adversaries are integrating various anti-analysis techniques into their malware to thwart analytical efforts. In this study, we introduce the "Malware Analysis with Dynamic Extraction (MADE)" framework, a hybrid binary analysis tool devised to procure datasets from advanced malware incorporating Anti-Analysis techniques. The MADE framework has the proficiency to autonomously execute dynamic analysis on binaries, encompassing those laden with Anti-VM and Anti-Debugging defenses. Experimental results substantiate that the MADE framework can effectively circumvent over 90% of diverse malware implementations using Anti-Analysis techniques and can adeptly extract relevant datasets.

Development of a 3D Printing Open-market System for Copyright Protection and Remote 3D Printing (3D프린터용 설계데이터의 저작권보호와 원격출력을 지원하는 오픈 마켓 시스템 개발)

  • Kim, Sung Gyun;Yoo, Woosik
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.3
    • /
    • pp.253-258
    • /
    • 2015
  • The 3D printing is any of various processes for making a three dimensional object of almost any shape from a 3D model. Recently, a rapidly expanding hobbyist and home-use market has become established with the inauguration of the open-source RepRap and Fab@Home projects. However, this causes problems regarding copyright protection and usage of illegal 3D data. In this paper, we developed a 3D printing open-market system, which guarantees copyright protection using the remote 3D printing without direct distribution of 3D design data. Because most of the home-use 3D printers are FFF (Fused Filament Fabrication) based on NC code system, open-market system uses FFF 3D printers. Also, open-market system inspects the uploaded 3D model data, so the system can prevent distribution of illegal model data such as weapons, etc.

A Study on Geodata Trace of Navigation Application in Smart Devices (스마트 기기에 설치된 내비게이션 어플리케이션의 위치 정보 흔적 연구)

  • Yeon, KyuChul;Kim, Moon-Ho;Kim, Dohyun;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.109-115
    • /
    • 2016
  • Nowadays, smart devices are the target of the digital forensic investigation. Among various smart devices, we can obtain much information from smart phone which is provided with continuous power and used for data communication. This paper deals with the traces to be left in Android smart phones after using the navigation applications with the GPS function. We selected navigation applications(domestic and overseas) which have a high number of download times, anaylzed them and discussed the meaning of the analysis result in digital forensic investigation.

Third Party Application Analysis For Mobile Forensics Study (모바일 포렌식 연구를 위한 서드 파티 어플리케이션 분석)

  • Ryu, Jung Hyun;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.336-339
    • /
    • 2017
  • 스마트폰 서드 파티 애플리케이션에 대한 포렌식 분석은 최근 수 년 간 탐구되어야 할 새로운 영역으로 떠올랐다. 현재 스마트폰 시장은 그 규모를 측정하는 것이 무의미할 만큼 커졌으며 각 스마트폰 플랫폼의 앱(App)마켓에는 셀 수 없이 많은 서드 파티 애플리케이션이 존재한다. 모바일 포렌식 소프트웨어 도구들은 일반적으로 연락처, 문자메시지, 통화기록 등의 전형적인 데이터를 수집한다. 이러한 도구들은 서드 파티 애플리케이션이 기기 내부에 저장하는 정보들을 간과하기 쉽다. 여러 제조사 중, 애플사의 모바일 기기에 설치된 많은 서드 파티 애플리케이션은 수사에 도움이 되는 많은 정보와 관련있는 디지털 증거를 남긴다. 이런 잠재적 증거들은 기기 내부에 저장되기도 하며, 비교적 손쉬운 방법으로 법정에 제출 가능하다. 스마트폰으로 이루어지는 많은 활동은 상당 부분 서드 파티 애플리케이션으로 이루어지며, 사이버 범죄 사건의 중심에 스마트폰이 있다면 서드 파티 애플리케이션 분석을 통한 핵심 증거 획득이 사건을 해결할 가능성이 높아진다. 본 논문에서는 스마트폰에서 널리 쓰이고 있는 소셜네트워크 애플리케이션인 '인스타그램(Instagram)'에서 행해진 포렌식 분석에 초점을 맞추고, 기기는 전 세계 적으로 가장 사용자 점유율이 높은 스마트폰인 아이폰에서 이루어졌다.

Malicious Application Determination Using the System Call Event (시스템 콜 이벤트 분석을 활용한 악성 애플리케이션 판별)

  • Yun, SeokMin;Ham, YouJeong;Han, GeunShik;Lee, HyungWoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.169-176
    • /
    • 2015
  • Recently smartphone market is rapidly growing and application market has also grown significantly. Mobile applications have been provided in various forms, such as education, game, SNS, weather and news. And It is distributed through a variety of distribution channels. Malicious applications deployed with malicious objectives are growing as well as applications that can be useful in everyday life well. In this study, Events from a malicious application that is provided by the normal application deployment and Android MalGenome Project through the open market were extracted and analyzed. And using the results, We create a model to determine whether the application is malicious. Finally, model was evaluated using a variety of statistical method.