• Title/Summary/Keyword: Customer communication

Search Result 948, Processing Time 0.028 seconds

Development of the 3D Hair Style Simulator using Augmented Reality (증강현실을 이용한 3D 헤어스타일 시뮬레이터의 개발)

  • Kim, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.249-255
    • /
    • 2015
  • Recent, there is increasing interest in AR(Augmented Reality). And various AR application programs using the latest Augmented Reality technology have been developed. In particular, researches about hair style simulator have been conducted for a long time. It can experience real-time a variety of hair styles to fit the taste of the customer. And some company has conducted the hair style simulator services. However, the most service products are the 2D hair style simulator did not apply the AR technology. Even though 3D hair style simulator has applied AR technology, a function of the NUI was lack. Therefore, in this paper have developed the 3D hair style simulator based on the core technology of AR like NUI as well as EHCI. 10 people was experienced the 3D hair style simulator. Finally, in this paper verifies the effectiveness of the 3D hair style simulator.

Mobile Shopping Motives and Fashion Application Acceptance (모바일 쇼핑동기와 패션애플리케이션 수용)

  • Lee, Mi-Jin;Lee, Kyu-Hye
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.153-163
    • /
    • 2013
  • The application demand has been rapidly increasing along the growth of smart devices. Companies actively use the application as marketing tools. In particular, fashion businesses expect the improvement of customer loyalty and brand image by using the applications as the communication channel with consumers. This paper investigated the relationship between mobile shopping motives and mobile shopping acceptance. Influence of such variables on perceived importance of various fashion application attributes was also accessed. Data from male and female respondents were analyzed for the empirical study. Results indicated that mobile shopping motives were classified into convenience, ubiquity, impulsiveness and economic motives. Fashion application attribute was classified into contents, continuous management, design/visibility, downloading and community. Mobile shopping motives had significant correlation with fashion application acceptance. Shopping motives and fashion application acceptance had significant impacts on perceived importance of various fashion application attributes.

Efficient Method of Processing Long-term Transactions for Distributed Environment (분산 환경에서 장기 트랜잭션의 효율적인 처리 방안)

  • 정지호;엄기환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1498-1508
    • /
    • 2003
  • It is important to integrate an enterprise application for automating of the business process, which is responded by a flow of market environment. There are two categories of method that integrate enterprise applications. One is Synchronous Integration, and the other is Asynchronous Integration. EAI(Enterprise Application Integration) and Web service which of the asynchronous integration is focused in the automating method of the business process. After we construct the application integration for automating of the business process, we have to concern about managing of the business transaction. Many Organizations have proposed the process method of business transaction based on 2-phase commit protocol. But this method can't supply the phase that classify the transaction by transaction weight. In this Paper, we Propose an efficient method of transaction process for business transactions, which is composed by ‘Classify Phase’ that classify transactions. We called this model “3-Phase Commit Method Applied by Classify Phase”, we design this model to manage an resource of enterprise efficiently. The proposed method is compared by the method based on 2-Phase commit that could be a problem of management the resource of enterprise, and the advantage of this method is certified to propose the solution of that problem.

Web based Customer Power Demand Variation Estimation System using LSTM (LSTM을 이용한 웹기반 수용가별 전력수요 변동성 평가시스템)

  • Seo, Duck Hee;Lyu, Joonsoo;Choi, Eun Jeong;Cho, Soohwan;Kim, Dong Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.4
    • /
    • pp.587-594
    • /
    • 2018
  • The purpose of this study is to propose a power demand volatility evaluation system based on LSTM and not to verify the accuracy of the demand module which is a core module, but to recognize the sudden change of power pattern by using deeplearning in the actual power demand monitoring system. Then we confirm the availability of the module. Also, we tried to provide a visualized report so that the manager can determine the fluctuation of the power usage patten by applying it as a module to the web based system. It is confirmed that the power consumption data shows a certain pattern in the case of government offices and hospitals as a result of implementation of the volatility evaluation system. On the other hand, in areas with relatively low power consumption, such as residential facilities, it was not appropriate to evaluate the volatility.

Omni Channel System for Efficient Fitting Service and Shipping Process (효율적인 피팅 서비스와 배송 프로세스를 위한 옴니채널 시스템에 대한 연구)

  • Lim, Ji-yong;Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.373-378
    • /
    • 2017
  • While on-line shopping markets are growing, consumer's procurement processes are being confused regardless of on or off line market and, smart consumers who want intelligent tailored services have emerged. Depending on the changeable pattern of consumer, most of related companies provide various Omni channel and O2O service. However, reactions of the fashion companies are tend to be late. Recently, the IoT environment has changed to standards-based open platform and it requires a variety of intelligent services depending on the type of environment and objects. This thesis proposes fashion O2O system using smart fitting display that is adaptable to fashion companies. This proposed system provides fitting information which is performed on off-line by users after constructing the database, it also support the works as on-line status, thus, it makes users' procurements to maintain continuously. For the more, customer oriented intelligent fitting service would be expected by the information connection with the shop and delivery systems.

Requirements Redundancy and Inconsistency Analysis for Use Case Modeling (유스케이스 모델링을 위한 요구사항 중복 및 불일치 분석)

  • 최진재;황선영
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.869-882
    • /
    • 2004
  • This paper proposes an effective method to create logically consistent and structured requirement model by applying consistency control approach of the formal method to the use-case modeling. This method integrates the multi-perspective scattered requirement segments that may overlap and conflict each other into a structured requirement model. The model structure can be analyzed based on context goal and concerned area overlap analysis. The model consistency can be achieved by using specification overlap-based consistency checking method as an integration vehicle. An experimental application to case study shows that the Proposed method can successfully identify requirement overlaps and inconsistency. It can also transfer multi-viewpoint requirement segments into a consistently integrated use-case model to clarify software behaviors and functionality This method helps users to enhance capability to identify specification inconsistency in the use-case modeling at the early stage of software engineering development. The proposed approach can also facilitate communication between users and developers to ensure customer satisfaction.

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

An SNS and Web based BDAS design for On-Line Marketing Strategy (온라인 마케팅 전략을 위한 SNS와 Web기반 BDAS(Big data Data Analysis Scheme) 설계)

  • Jeong, Yi-Na;Lee, Byung-Kwan;Park, Seok-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.141-148
    • /
    • 2015
  • This paper proposes the BDAS(Big Data analysis Scheme) design that extracts the real time shared information from SNS and Web, analyzes the extracted data rapidly for customers, and makes an on-line marketing strategy efficiently. First, the BDAS collects the data shared in SNS and Web. Second, it provides the result of visualization by analyzing the semantics of the collected data as positive or negative. Therefore, because the BDAS ensures an average 90% accuracy in judging the semantics about the shared SNA and Web data, it can judge customer's propensity accurately and be used for on-line marketing strategy efficiently.

Design of Automatic Guided Vehicle Controller with Built-in Programmable Logic Controller (PLC 내장형 무인 반송차(AGV) 제어기 설계)

  • Lee, Ju-Won;Lee, Byeong-Ro
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.3
    • /
    • pp.118-124
    • /
    • 2019
  • Recently, the industrial field has been changed to the smart factory system based on information and communication technology (ICT) in order to improve productivity, quality and customer satisfaction. The most important machine to realize the smart factory is the AGV(automatic guided vehicle) and the adoption of AGV is increasing. Generally, AGV is developed using general purpose PLC(Programmable Logic controller), but the price of AGV is expensive and its volume is large. On the other hand, the industrial field due to space constraints in the workplace is required the low cost AGV which can be minimization, expansion of function, and easily reconfiguration. Therefore, in order to solve these problems, this study is proposed a design method of AGV controller with built-in PLC, and evaluated its performance. In the results of the experimentation, it showed good performance (speed control error = 0.021[m/s], posture control error=2.1[mm]) for the speed and posture control. In this way, when applying the proposed AGV controller in this study to the industrial filed, it is possible to reduce the size and reconfigure at low cost.

Implementation of Data Integrity Module in Wireless Internet Terminal for Mobile Customer Relationship Management(m-CRM) (m-CRM을 위한 무선인터넷단말기의 데이터무결성 모듈의 구현)

  • Park, Hyun-Cheol;Kim, Dong-Gyu
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.485-494
    • /
    • 2004
  • Recently, the wireless internet terminals like mobile phones or PDAs prevail in the management of customers. With such terminals, businessmen can get business data and information of customers in real time, in connection with mobile group wares. By the wireless terminals, customers can conveniently get information of goods, search purchase sites, and give orders and do settlement. This paper aims to present the safe data integrity modules of the wireless internet terminal, for service providing correct real-time promotion information, by using users' disposition, situation, Purchase information. This study aims to suggest an implementation methodology of security module for data integrity of mobile internet terminal. This is based on the WTLS of WAP Protocol. This security module is expected to achieve central role in conversion of wireless internet environment and emphasis of encryption technology and safe and calculable wireless communication environment construction