• Title/Summary/Keyword: Asset-based approach

Search Result 115, Processing Time 0.022 seconds

A Recommendation System Based-on Interactive Evolutionary Computation with Data Grouping (데이터 그룹화를 이용한 상호진화연산 기반의 추천 시스템)

  • Kim, Hyun-Tae;Ahn, Chang-Wook;An, Jin-Ung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.8
    • /
    • pp.739-746
    • /
    • 2011
  • Recently, recommender systems have been widely applied in E-commerce websites to help their customers find the items what they want. A recommender system should be able to provide users with useful information regarding their interests. The ability to immediately respond to the changes in user's preference is a valuable asset of recommender systems. This paper proposes a novel recommender system which aims to effectively adapt and respond to the immediate changes in user's preference. The proposed system combines IEC (Interactive Evolutionary Computation) with a content-based filtering method and also employs data grouping in order to improve time efficiency. Experiments show that the proposed system makes acceptable recommendations while ensuring quality and speed. From a comparative experimental study with an existing recommender system which uses the content-based filtering, it is revealed that the proposed system produces more reliable recommendations and adaptively responds to the changes in any given condition. It denotes that the proposed approach can be an alternative to resolve limitations (e.g., over-specialization and sparse problems) of the existing methods.

A supervised-learning-based spatial performance prediction framework for heterogeneous communication networks

  • Mukherjee, Shubhabrata;Choi, Taesang;Islam, Md Tajul;Choi, Baek-Young;Beard, Cory;Won, Seuck Ho;Song, Sejun
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.686-699
    • /
    • 2020
  • In this paper, we propose a supervised-learning-based spatial performance prediction (SLPP) framework for next-generation heterogeneous communication networks (HCNs). Adaptive asset placement, dynamic resource allocation, and load balancing are critical network functions in an HCN to ensure seamless network management and enhance service quality. Although many existing systems use measurement data to react to network performance changes, it is highly beneficial to perform accurate performance prediction for different systems to support various network functions. Recent advancements in complex statistical algorithms and computational efficiency have made machine-learning ubiquitous for accurate data-based prediction. A robust network performance prediction framework for optimizing performance and resource utilization through a linear discriminant analysis-based prediction approach has been proposed in this paper. Comparison results with different machine-learning techniques on real-world data demonstrate that SLPP provides superior accuracy and computational efficiency for both stationary and mobile user conditions.

A Study on Asset Value Evaluation Process to Develop AIS on Social Infrastructure (사회기반 시설 회계정보시스템 구현을 위한 자산가치평가 프로세스 연구)

  • Nam, Hye Jeong;Lee, Young Jae
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.215-242
    • /
    • 2014
  • This paper investigates accounting principles about social infrastructure on Korean National Accounting Standard and on National Accounting Standards from other countries that adopted a accruals- based national accounting standards. Social infrastructure as assets has important value in financial statements of Korea and deterioration or insufficient management of social infrastructure accompanies a huge social cost. Therefore, understanding the characteristics and related accounting standard for social infrastructure is necessary. To do this, we examine the accounting standards of U.S., New Zealand, and Australia. We also review the financial statement of local government. Based on these findings, this paper suggests that a preventive-asset management approach should be applied and alternative depreciation method for social infrastructures is developed. Moreover, a local government needs to provide important accounting information to the public in a timely and reliably manner.

The Relationship between Employee's Work-Related Stress and Work Ability based on Qualitative Literature Analysis

  • KIM, Jee-Hye
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.7
    • /
    • pp.15-25
    • /
    • 2021
  • Purpose: The greatest asset to all organizations is the employees and they should be guarded against factors hindering their work ability. Nevertheless, most organizations are always more concerned about making profits to the extent of forgetting their employee's welfare. On this point, this study aims to examine employee's work-related stress and its relationship with work ability. Research design, data and methodology: This study focused on obtaining mostly peer-reviewed works to suggest research findings, assuming that qualitative literature approach allows researchers to explore in-depth information concerning complex issues in a standard life setting. Numerous prior researchers applied their research design in content analysis, especially where various concepts are present for analysis. Results: Based on numerous qualitative textual resources, this study found that human resource practitioners should plan stress management strategies for their employees to apply five kinds of solutions that the current study suggests because it is vital to ensure their wellbeing towards sustaining their performance. Conclusions: All in all, based on the findings, this study concludes that employee's work stress negatively impacts their work ability with affecting their mental health. As a result, there is little doubt that practitioners should regularly monitor the working environment for stress-related factors besides creating a healthy working environment for all employees.

Comparative Analysis for Clustering Based Optimal Vehicle Routes Planning (클러스터링 기반의 최적 차량 운행 계획 수립을 위한 비교연구)

  • Kim, Jae-Won;Shin, KwangSup
    • The Journal of Bigdata
    • /
    • v.5 no.1
    • /
    • pp.155-180
    • /
    • 2020
  • It takes the most important role the problem of assigining vehicles and desigining optimal routes for each vehicle in order to enhance the logistics service level. While solving the problem, various cost factors such as number of vehicles, the capacity of vehicles, total travelling distance, should be considered at the same time. Although most of logistics service providers introduced the Transportation Management System (TMS), the system has the limitation which can not consider the practical constraints. In order to make the solution of TMS applicable, it is required experts revised the solution of TMS based on their own experience and intuition. In this research, different from previous research which have focused on minimizing the total cost, it has been proposed the methodology which can enhance the efficiency and fairness of asset utilization, simultaneously. First of all, it has been adopted the Cluster-First Route-Second (CFRS) approach. Based on the location of customers, we have grouped customers as clusters by using four different clustering algorithm such as K-Means, K-Medoids, DBSCAN, Model-based clustering and a procedural approach, Fisher & Jaikumar algorithm. After getting the result of clustering, it has been developed the optiamal vehicle routes within clusters. Based on the result of numerical experiments, it can be said that the propsed approach based on CFRS may guarantee the better performance in terms of total travelling time and distance. At the same time, the variance of travelling distance and number of visiting customers among vehicles, it can be concluded that the proposed approach can guarantee the better performance of assigning tasks in terms of fairness.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Applicability of Statistical Evaluation to Power Quality Analysis (통계적 방법을 이용한 전력품질 관리방안)

  • Cho, Soo-Hwan;Jang, Gil-Soo;Kwon, Sae-Hyuk;Park, Sang-Ho;Jeon, Young-Soo;Kwak, No-Hong
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.22-24
    • /
    • 2006
  • The installations of power quality monitoring system have increased drastically over the past several decades. These systems have been effectively used to monitor, analyze and diagnose the conditions of power system, and furthermore can be used to improve the present asset maintenance policy, scheduled (time-based) method, into the advanced, cost-effective and labor-effective maintenance methods, such as condition-based maintenance, predictive maintenance and reliability centered maintenance. As an approach to this, this paper introduces the statistical methods, three kinds of control charts (Shewhart chart, CUSUM chart and EWMA chart), and discusses the applicability of these methods to recognize the changing trends of power quality indices and to estimate the system's condition, using Matlab.

  • PDF

Analysis of Factors Affecting Successful Bid Price in Public Construction Technical Bidding (공공공사 기술형 입찰에서의 낙찰가격에 미치는 요인 분석)

  • Lee, Jung-Woong;Yi, Sung-Wook
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.1
    • /
    • pp.213-230
    • /
    • 2022
  • Purpose - The purpose of this study is to find out any potential factors for explanatory variables when calculating the virtual successful bid rate in case of no collusion. Design/methodology/approach - An empirical analysis was conducted in this study with a regression analysis that included 725 bid samples under the public construction technical type bidding. Findings - The result of the basic analysis showed that there are several factors affecting the successful bid rate. First, collusion variable; second, government variable; third, successful bidder design score variable and the number of bidder variable among bidding features; fourth, turnkey variable based on the alternative method; fifth, civil works variable and plant works variable based on building work; sixth, asset variable and the fourth-quarter performance difference variable. However, the technical proposal method variable among bidding features was found to be statistically insignificant in column(4). Research implications or Originality - The significance of this research is that new variable such as the government variable and the fourth-quarter performance difference variable were added in the regression model, which showed statistically significant research results.

What Drives Consumer Purchase Behavior of Non-Fungbile Token(NFT) Collectibles?: the Moderating Role of Psychological Ownership (Non-Fungible Token(NFT) 소비자의 구매행동을 이끄는 요인은 무엇인가?: 심리적 소유감의 조절효과를 중심으로)

  • Na, Hwa Seong;Lee, Sang Woo
    • The Journal of Information Systems
    • /
    • v.32 no.1
    • /
    • pp.53-84
    • /
    • 2023
  • Purpose The purpose of this study is to understand the factors that influence the purchasing behavior of NFT collectibles consumers, using the value-based acceptance model (VAM). As the use of NFTs is predicted to become more widespread in the near future, it is important to explore how these consumers make purchasing decisions. Design/methodology/approach This study employed text analysis and in-depth interviews to identify the factors of benefits and sacrifices perceived by consumers. Based on the results of the exploratory study, a research model and hypotheses were established. To test the hypotheses, an online survey was conducted, and the data was analyzed using a structural equation model. Findings The major findings of this study showed that perceived benefit factors had a significant positive impact on consumers' perceived value of NFT collectibles, whereas perceived sacrifice factors did not have a significant effect on perceived value. Also, when consumers' social needs were met, their perceived value was highest. Lastly, the effect of perceived value on purchase intention was not affected by the level of psychological ownership.

Cluster-Based Similarity Calculation of IT Assets: Method of Attacker's Next Targets Detection

  • Dongsung Kim;Seon-Gyoung Shon;Dan Dongseong Kim;Huy-Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Attackers tend to use similar vulnerabilities when finding their next target IT assets. They also continuously search for new attack targets. Therefore, it is essential to find the potential targets of attackers in advance. Our method proposes a novel approach for efficient vulnerable asset management and zero-day response. In this paper, we propose the ability to detect the IT assets that are potentially infected by the recently discovered vulnerability based on clustering and similarity results. As the experiment results, 86% of all collected assets are clustered within the same clustering. In addition, as a result of conducting a similarity calculation experiment by randomly selecting vulnerable assets, assets using the same OS and service were listed.