• Title/Summary/Keyword: Customer Arrival Information

Search Result 21, Processing Time 0.022 seconds

Ubiquitous Computing-Driven Business Models : An Analytical Structure & Empirical Validations (유비쿼터스 컴퓨팅 기반의 비즈니스 모델에 관한 연구 : 연구 분석 프레임워크 수립 및 실증 분석)

  • Hwang Kyung Tae;Shin Bongsik;Kim Kyoung-jae
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.105-121
    • /
    • 2005
  • Ubiquitous computing(UC) is an emerging paradigm. Its arrival as a mainstream is expected to trigger innovative UC-driven business models (UCBMs). Currently, there is no Parsimonious methodology to analyze and provide diagnostics for UCBMs. With this research, we propose a analytical architecture that enables the assessment of an UCBM in its structural strengths and weaknesses. With value logic as the cornerstone, the architecture is composed of value actors, value assets, value context, business value Propositions, customer value propositions, value creation logics, and value assumptions. Dimensional variables are initially Identified based on the review of business model literature. Then, their significance is empirically examined through 14 UCBM scenarios, and variables that are expected to Play an important role in the UCBM assessment are decided. Finally, by analyzing the scenarios in terms of the dimensional variables, we attempted to summarize general characteristics of emerging UCBMs.

  • PDF

A Customer Arrival Prediction System based on Web Platform (웹 기반의 고객 도착 시각 예측 시스템 구현)

  • Kim, Ji-Young;Park, Young-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1281-1283
    • /
    • 2013
  • 최근 커피에 대한 수요와 스마트기기를 이용한 어플리케이션의 사용률이 급증하고 있다. 기존의 시스템들은 예측 기능이 없었기 때문에 고객들은 정확한 시간에 서비스를 제공받기 어려웠다. 그러나 바쁜 현대인들에게 시간 개념은 매우 중요하다. 본 논문에서는 고객의 도착 시각을 예측하여 고객이 카페에 도착하자마자 따뜻한 커피를 바로 제공할 수 있는 커피앤코(Coffee&Co) 시스템을 제안한다. 커피앤코 시스템은 도착 시각 예측 시스템을 의미하며, 본 논문에서는 웹의 인터페이스 구현과 내부적인 기능을 소개한다. 커피앤코 시스템을 통하여 사용자들은 미리 주문한 커피를 카페에 도착하자마자 바로 제공받을 수 있고, 카페 입장에서는 매출을 올릴 수 있는 수단이 될 것으로 기대한다.

A Recursive Procedure for the Queue Length Distribution of a Coxian Queueing Network (회귀적 방법을 이용한 Coxian 대기 네트워크의 대기길이 분포 계산)

  • Park, Doo-Yeong
    • The Journal of Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.85-95
    • /
    • 1998
  • In this study, we consider a recursive procedure to obtain the stationary probability distribution for analyzing Coxian queueing networks with finite queues. This network deals with multiple class customers. Due to the state space representing multiple class customers, the sub-matrices corresponding to states can not be square matrices and can not be inverted. Therefore, we introduce more complex recursive method to avoid the singular problem. The open queueing network that we study consists of 3 parallel first-level sources linked to a single second level queue. We consider two types of schemes for entering a queue. The first scheme is assumed to be the first-blocked-first-enter (FBFE) and the second scheme is the higher-priority-first-enter (HPFE). Arrival and service times are assume to have a Coxian distribution with two phases. Comparison between the resulting using Gauss-Seidel method and recursive procedure will be shown.

  • PDF

PERFORMANCE ANALYSIS OF TWO FINITE BUFFERS QUEUEING SYSTEM WITH PRIORITY SCHEDULING DEPENDENT UPON QUEUE LENGTH

  • Choi Doo-Il
    • Journal of applied mathematics & informatics
    • /
    • v.22 no.1_2
    • /
    • pp.523-533
    • /
    • 2006
  • We analyze two finite buffers queueing system with priority scheduling dependent upon queue length. Customers are classified into two types ( type-l and type-2 ) according to their characteristics. Here, the customers can be considered as traffics such as voice and data in telecommunication networks. In order to support customers with characteristics of burstiness and time-correlation between interarrival, the arrival of the type-2 customer is assumed to be an Markov- modulated Poisson process(MMPP). The service order of customers in each buffer is determined by the queue length of two buffers. Methods of embedded Markov chain and supplementary variable give us information for queue length of two buffers. Finally, performance measures such as loss and mean delay are derived.

Service Innovation By Using Service Blueprinting : A Case Study of Inchon Airport (서비스 청사진을 이용한 서비스 혁신 : 인천공항 사례를 중심으로)

  • Kang, Min-Soo;Baek, Seung-Ik;Choi, Hyung-K.;Song, Yun-Young;Choi, Yoon-Jeong
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.199-214
    • /
    • 2008
  • Unlike physical goods, service consists of a chain of activities that allow the service to function effectively. In order to enhance customer experiences, service providers should innovate service processes. Service innovation refers to new or considerably changed service processes that deliver added value to the customers. Unfortunately, many of the activities are invisible to both service providers and consumers. In terms of service innovation, service visualization is very critical. When we visualize the current service process, we can identify its problems. This study suggests service blueprinting as a service innovation methodology. In order to demonstrate the usage of the methodology, this study examines departure/arrival services at the airport.

Analysis of an M/M/1 Queue with an Attached Continuous-type (s,S)-inventory ((s,S)-정책하의 연속형 내부재고를 갖는 M/M/1 대기행렬모형 분석)

  • Park, Jinsoo;Lee, Hyeon Geun;Kim, Jong Hyeon;Yun, Eun Hyeuk;Baek, Jung Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.5
    • /
    • pp.19-32
    • /
    • 2018
  • This study focuses on an M/M/1 queue with an attached continuous-type inventory. The customers arrive into the system according to the Poisson process, and are served in their arrival order; i.e., first-come-first-served. The service times are assumed to be independent and identically distributed exponential random variable. At a service completion epoch, the customer consumes a random amount of inventory. The inventory is controlled by the traditional (s, S)-inventory policy with a generally distributed lead time. A customer that arrives during a stock-out period assumed to be lost. For the number of customers and the inventory size, we derive a product-form stationary joint probability distribution and provide some numerical examples. Besides, an operational strategy for the inventory that minimizes the long-term cost will also be discussed.

The Arrival of the Industry 4.0 and the Importance of Corporate Big Data Utilization

  • AN, Haeri
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.10 no.2
    • /
    • pp.105-113
    • /
    • 2022
  • Purpose - An increase in automation has been as a result of digital technologies. The data will be instrumental in the determination of the services that are more necessary so that more resources can be allocated for them. The purpose of the current research is to investigate how big data utilization will help increase the profitability in the industry 4.0 era. Research design, Data, and methodology - The present research has conducted the comprehensive literature content analysis. Quantitative approaches allow respondents to decide, but qualitative methods allow them to offer more information. In the next step, respondents are given data collection equipment, and information is collected. Result - The According to qualitative literature analysis, there are five ways in which big data utilization will help increase the profitability in the industry 4.0 era. The five solutions are (1) Better Customer Insight, (2) Increased Market Intelligence, (3) Smarter Recommendations and Audience Targeting, (4) Data-driven innovation, (5) Improved Business Operations. Conclusion - Modern companies have been seeking a competitive advantage so that they can have the edge over other companies in the same industries providing the same services and products. Big data is that technology that businesses have always wanted for an extended period of time to revolutionize their operations, making their businesses more profitable.

A Study on the successful model of the e-business for management renovation (경영혁신을 이한 e-비즈니스의 성공모델에 대한 연구)

  • Jo, Jae-Wan
    • Journal of Digital Convergence
    • /
    • v.4 no.2
    • /
    • pp.109-126
    • /
    • 2006
  • The United States Intel company and these enterprises which Andy Grove President talks exception are without coming out at the Internet enterprise and the hereafter 5 year back side separately it means the necessity which will write the word which is a Internet enterprise will lose. When that time about, it puts upper volume from the Internet territory which is will open the competition where the relation enterprises are keen the winner will be undertaken the existing enterprises and the place where it receives the footlights where the e-business is many in this recent times which it talks, the reason the whole world becomes connection with the Internet, the frame of the social whole changes and the arrival result completeness sincerity pursuit of information comes to be possible simultaneously, it is changing as the product army which is complicatedly diversified from the product army where the craving of the customer becomes simplification. The consequently quick doctor decision and efficient manufacturing environment construction are demanded and Product Life cycle becomes shortening, the e-Business from the digital management environment which changes suddenly the necessity is plentifully raising its head with plan of competitive power security of the enterprise and management renovation. Successful of the e-business model and failure instances there is a depth from the research which it sees and after trying to investigate, it originated to the advancement of digital environment the strategies and to sleep against the successful model of the e-business for a new management renovation presentation it tries it does.

  • PDF

Airport Security Process Improving for Advanced Operation and Smart Airport Framework Design (공항 운영 효율성 향상을 위한 보안검색 프로세스 개선 및 스마트 공항 프레임워크 설계)

  • Lee, Jaewhan;Im, Hyeonu;Sohn, Seichang;Ko, Seungyoon;Hong, Ki-Sung;Choi, Sanggyun;Seo, Sangwon;Lee, Chulung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.2
    • /
    • pp.129-134
    • /
    • 2013
  • The airport processes are restricted by some limits of performance objects as size of airport, ability of human resources, capacity of facilities and operational rules. These limitations make passenger handling difficult when passenger numbers increase. In order to solve this problem, we modeled the airport process and analyzed departure passenger arrival, scheduled security manpower under specific customer service level maintenance with mixed integer programming and validate the efficiency with simulation with adapting smart airport framework. We concluded that the airport management with information techniques can reduce waiting time within security and immigration process.

Dimensioning leaky bucket parameters considering the cell delay variation (셀 지연 변이를 고려한 리키 버킷 계수 결정 방법)

  • 이준원;이병기
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.8
    • /
    • pp.31-38
    • /
    • 1995
  • In this paper, we consider the leaky bucket parameter dimensioning problem in the presence of the cell delay variation(CDV) which arises at the customer premises network dud to the multiplexing with other traffic streams. We consider an ATM multiplexer in which a single CBR stream and several heterogeneous VBR traffic streams are multiplexed. Choosing an MMPP model for the bursty traffic streams, we derive an (MMPP+DD)/D/1/K queueing model for the evaluation of the CDV experienced by the CBR stream. We first evaluate the equilibrium queue length distribution embedded at tagged-cell arrival-time instants, based on whcih we calcuate the inter-cell time distribution and the distribution kof the number of tagged-cell departures in an arbitrary interval. Then we apply the analysis to the dimensionging problem of the leaky bucket parameters, examining how the employed traffic model affects the determination of the bucket size. Through numerical examples, we confirm that the Poisson traffic model can underestimate the bucket size, thus causing a considerable blocking probability for compliant use cells while the MMPP model can optimally design the bucket size which keeps the blocking probability under the target value.

  • PDF