• Title/Summary/Keyword: IT Management Systems

Search Result 9,033, Processing Time 0.041 seconds

A Study on fostering strategy for Port Equipment industry (스마트항만 구축을 위한 항만장비산업 육성 방안 연구)

  • 김보경;한승훈;안승현
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.108-109
    • /
    • 2023
  • The purpose of this study is to set a policy that can be specifically promoted according to the recently announced domestic equipment industry fostering strategy, and to suggest a plan that can be implemented. As a plan to foster the equipment industry, a new technology certification system and a new technology test and verification area operation and vitalization plan were set as alternatives. And a survey was conducted on companies conducting R&D to derive specific demand and introduction plans. As a result of the survey, it was found that there was a high demand for the use of new technology certification systems and testing and verification area. Also demonstration in connection with port equipment, testing and evaluation in connection with accredited verification agency, and preparation of dedicated agencies were derived to foster the equipment industry. Based on this, this study suggests a new technology certification system specialized for port equipment was established and a plan to institutionalize. In addition, in connection with the survey results and certification system, the basic functions and roles of the new technology testing and verification area was established. For future activation, incentives with effective certificates such as exemption of certification costs and issuance of performance confirmation certificates are needed, and efficient operation and management through dedicated organization and certification center were suggested.

  • PDF

A study about the effects of online commerce on the local retail commercial area (온라인 거래의 증가가 지역 소매 상권에 미치는 영향에 관한 연구)

  • Lee, Kangbae
    • Economic Analysis
    • /
    • v.25 no.2
    • /
    • pp.54-95
    • /
    • 2019
  • The purpose of this study is to analyze quantitatively and qualitatively the effects of the increase in online shopping and its effects on real-world commercial outlets. The empirical analysis of this study is based on the results of "Census on Establishments" and "Online Shopping Survey" that cover 15 years, from 2002 to 2016. According to the results of this study, the increase in the number of online transactions affects the decrease in the number of stores in the real-world retail sector. However, non-specialized large stores and chain convenience stores showed an increase in the number of stores. In addition, the number of F&B stores increased the most in line with the increase in online transactions. This is because the increase in online transactions and in internet users led to the use of more delivery applications and the introduction of popular places on blogs or through social media. Street-level rents for medium and large-sized locations increased. In other words, it is seen that the demand for differentiated real-world stores that provide a good user experience increases, even though online transactions also increase. These results suggest that real-world stores should provide good user experiences in their physical locations with a certain size and assortment of goods.

Implementation of IoT-Based Irrigation Valve for Rice Cultivation (벼 재배용 사물인터넷 기반 물꼬 구현)

  • Byeonghan Lee;Deok-Gyeong Seong;Young Min Jin;Yeon-Hyeon Hwang;Young-Gwang Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.93-98
    • /
    • 2023
  • In paddy rice farming, water management is a critical task. To suppress weed emergence during the early stages of growth, fields are deeply flooded, and after transplantation, the water level is reduced to promote rooting and stimulate stem generation. Later, water is drained to prevent the production of sterile tillers. The adequacy of water supply is influenced by various factors such as field location, irrigation channels, soil conditions, and weather, requiring farmers to frequently check water levels and control the ingress and egress of water. This effort increases if the fields are scattered in remote locations. Automated irrigation systems have been considered to reduce labor and improve productivity. However, the net income from rice production in 2022 was about KRW 320,000/10a on average, making it financially unfeasible to implement high-cost devices or construct new infrastructure. This study focused on developing an IoT-Based irrigation valve that can be easily integrated into existing agricultural infrastructure without additional construction. The research was carried out in three main areas: Firstly, an irrigation valve was designed for quick and easy installation on existing agricultural pipes. Secondly, a power circuit was developed to connect a low-power Cat M1 communication modem with an Arduino Nano board for remote operation. Thirdly, a cloud-based platform was used to set up a server and database environment and create a web interface that users can easily access.

Impact of customer experience characteristics on perceived value and revisit intention: Focusing on offline home appliance stores (고객체험특성이 지각된 가치와 재방문 의도에 미치는 영향: 가전 오프라인 매장을 중심으로)

  • Hosun Jeong;Jungmin Park;Hyoung-Yong Lee
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.395-413
    • /
    • 2023
  • This research studied the effect of customer experience characteristics in offline home appliance stores on perceived value and revisit intention. Among the offline distribution of home appliances with more than 100 stores nationwide, two home appliance retailers (HiMart, E-Land), three hypermarkets (E-Mart, Homeplus, Lotte Hi-Mart), and two home appliance stores (LG Best Shop, Samsung Digital Plaza) were selected, and a survey was conducted on men and women in their 20s or older in Seoul, Gyeonggi, and Incheon who had visited and purchased the home appliance store within the last 6 months. As a result of the survey, a statistical analysis was conducted on a total of 330 samples using the PLS (Partial Least Squares) structural equation model and SPSS statistical package. Through this study, the following research results can be obtained. First, educational experience, deviant experience, and aesthetic experience had a positive (+) effect on the functional value. However, entertainment experience did not affect functional value. Second, educational experience, deviant experience, and aesthetic experience all had a positive (+) effect on emotional value. Third, both functional and sensory values had a positive (+) effect on the revisit intention. Fourth, it was confirmed that brand loyalty had no moderating effect between functional value and sensory value revisit intention. The results of this study show the structural relationship between customer experience characteristics, perceived value (functional value, sensory value), and revisit intention. This result provides guidelines on what activities home appliance offline stores should do at a time when online channels threaten the survival of offline channels.

The Prediction of the Helpfulness of Online Review Based on Review Content Using an Explainable Graph Neural Network (설명가능한 그래프 신경망을 활용한 리뷰 콘텐츠 기반의 유용성 예측모형)

  • Eunmi Kim;Yao Ziyan;Taeho Hong
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.309-323
    • /
    • 2023
  • As the role of online reviews has become increasingly crucial, numerous studies have been conducted to utilize helpful reviews. Helpful reviews, perceived by customers, have been verified in various research studies to be influenced by factors such as ratings, review length, review content, and so on. The determination of a review's helpfulness is generally based on the number of 'helpful' votes from consumers, with more 'helpful' votes considered to have a more significant impact on consumers' purchasing decisions. However, recently written reviews that have not been exposed to many customers may have relatively few 'helpful' votes and may lack 'helpful' votes altogether due to a lack of participation. Therefore, rather than relying on the number of 'helpful' votes to assess the helpfulness of reviews, we aim to classify them based on review content. In addition, the text of the review emerges as the most influential factor in review helpfulness. This study employs text mining techniques, including topic modeling and sentiment analysis, to analyze the diverse impacts of content and emotions embedded in the review text. In this study, we propose a review helpfulness prediction model based on review content, utilizing movie reviews from IMDb, a global movie information site. We construct a review helpfulness prediction model by using an explainable Graph Neural Network (GNN), while addressing the interpretability limitations of the machine learning model. The explainable graph neural network is expected to provide more reliable information about helpful or non-helpful reviews as it can identify connections between reviews.

A Study on the Separation Minima for Urban Air Mobility in Low-Density Operation Environments (저밀도 운용 환경에서의 도심항공교통 분리 기준에 관한 연구)

  • Hyoseok Chang;Dohyun Kim;Jaewoo Kim;Daniel Kim;Heeduk Cho
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.710-715
    • /
    • 2023
  • Urbanization brings many challenges such as traffic, housing, and environment. To solve these problems, researchers are working on new transportation systems like urban air mobility (UAM). UAM aircraft should fly safely without burdening the existing air traffic system in the early stage of low-density operation. The airspace should also be managed and operated efficiently. Therefore it is important to make urban air traffic predictable by using corridors and collecting data on low-density operations in the early stage. For this purpose various simulations are needed before operation to create scenarios that estimate potential collisions between UAM aircraft and to evaluate the risks of aircraft spacing, loss of separation (LoS), and near mid air collision (NMAC). This paper focuses on identifying the requirements and considerations for setting separation standards for urban air traffic based on the results of studies.

An Experimental Analysis of Ultrasonic Cavitation Effect on Ondol Pipeline Management (온돌 파이프라인 관리를 위한 초음파 캐비테이션 효과에 대한 실험적 분석)

  • Lee, Ung-Kyun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.24 no.1
    • /
    • pp.67-75
    • /
    • 2024
  • In the context of Korean residential heating systems, Ondol pipelines are a prevalent choice. However, the maintenance of these pipelines becomes a complex task once they are embedded within concrete structures. As time progresses, the accumulation of sludge, corrosive oxides, and microorganisms on the inner surfaces of these pipelines diminishes their heating efficiency. In extreme scenarios, this accumulation can induce corrosion and scale formation, compromising the system's integrity. Consequently, this research introduces an ultrasonic generation system tailored for the upkeep of Ondol pipelines, with the objective of empirically assessing its practicality. This investigation delineates three variants of ultrasonic generating apparatuses: those employing surface vibration, external generation, and internal generation techniques. To emulate the presence of contaminants within the pipelines, substances in powder, slurry, and liquid forms were employed. The efficacy of the cleaning process post-ultrasonic wave application was scrutinized over time, with image analysis methodologies being utilized to evaluate the outcomes. The findings indicate that ultrasonic waves, whether generated externally or internally, exert a beneficial effect on the cleanliness of the pipelines. Given the inherent characteristics of Ondol pipelines, external generation proves impractical, thereby rendering internal generation a more viable solution for pipeline maintenance. It is anticipated that future endeavors will pave the way for innovative maintenance strategies for Ondol pipelines, particularly through the advancement of internal generation technologies for pipeline applications.

Analysis of shopping website visit types and shopping pattern (쇼핑 웹사이트 탐색 유형과 방문 패턴 분석)

  • Choi, Kyungbin;Nam, Kihwan
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.85-107
    • /
    • 2019
  • Online consumers browse products belonging to a particular product line or brand for purchase, or simply leave a wide range of navigation without making purchase. The research on the behavior and purchase of online consumers has been steadily progressed, and related services and applications based on behavior data of consumers have been developed in practice. In recent years, customization strategies and recommendation systems of consumers have been utilized due to the development of big data technology, and attempts are being made to optimize users' shopping experience. However, even in such an attempt, it is very unlikely that online consumers will actually be able to visit the website and switch to the purchase stage. This is because online consumers do not just visit the website to purchase products but use and browse the websites differently according to their shopping motives and purposes. Therefore, it is important to analyze various types of visits as well as visits to purchase, which is important for understanding the behaviors of online consumers. In this study, we explored the clustering analysis of session based on click stream data of e-commerce company in order to explain diversity and complexity of search behavior of online consumers and typified search behavior. For the analysis, we converted data points of more than 8 million pages units into visit units' sessions, resulting in a total of over 500,000 website visit sessions. For each visit session, 12 characteristics such as page view, duration, search diversity, and page type concentration were extracted for clustering analysis. Considering the size of the data set, we performed the analysis using the Mini-Batch K-means algorithm, which has advantages in terms of learning speed and efficiency while maintaining the clustering performance similar to that of the clustering algorithm K-means. The most optimized number of clusters was derived from four, and the differences in session unit characteristics and purchasing rates were identified for each cluster. The online consumer visits the website several times and learns about the product and decides the purchase. In order to analyze the purchasing process over several visits of the online consumer, we constructed the visiting sequence data of the consumer based on the navigation patterns in the web site derived clustering analysis. The visit sequence data includes a series of visiting sequences until one purchase is made, and the items constituting one sequence become cluster labels derived from the foregoing. We have separately established a sequence data for consumers who have made purchases and data on visits for consumers who have only explored products without making purchases during the same period of time. And then sequential pattern mining was applied to extract frequent patterns from each sequence data. The minimum support is set to 10%, and frequent patterns consist of a sequence of cluster labels. While there are common derived patterns in both sequence data, there are also frequent patterns derived only from one side of sequence data. We found that the consumers who made purchases through the comparative analysis of the extracted frequent patterns showed the visiting pattern to decide to purchase the product repeatedly while searching for the specific product. The implication of this study is that we analyze the search type of online consumers by using large - scale click stream data and analyze the patterns of them to explain the behavior of purchasing process with data-driven point. Most studies that typology of online consumers have focused on the characteristics of the type and what factors are key in distinguishing that type. In this study, we carried out an analysis to type the behavior of online consumers, and further analyzed what order the types could be organized into one another and become a series of search patterns. In addition, online retailers will be able to try to improve their purchasing conversion through marketing strategies and recommendations for various types of visit and will be able to evaluate the effect of the strategy through changes in consumers' visit patterns.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Term Mapping Methodology between Everyday Words and Legal Terms for Law Information Search System (법령정보 검색을 위한 생활용어와 법률용어 간의 대응관계 탐색 방법론)

  • Kim, Ji Hyun;Lee, Jong-Seo;Lee, Myungjin;Kim, Wooju;Hong, June Seok
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.137-152
    • /
    • 2012
  • In the generation of Web 2.0, as many users start to make lots of web contents called user created contents by themselves, the World Wide Web is overflowing by countless information. Therefore, it becomes the key to find out meaningful information among lots of resources. Nowadays, the information retrieval is the most important thing throughout the whole field and several types of search services are developed and widely used in various fields to retrieve information that user really wants. Especially, the legal information search is one of the indispensable services in order to provide people with their convenience through searching the law necessary to their present situation as a channel getting knowledge about it. The Office of Legislation in Korea provides the Korean Law Information portal service to search the law information such as legislation, administrative rule, and judicial precedent from 2009, so people can conveniently find information related to the law. However, this service has limitation because the recent technology for search engine basically returns documents depending on whether the query is included in it or not as a search result. Therefore, it is really difficult to retrieve information related the law for general users who are not familiar with legal terms in the search engine using simple matching of keywords in spite of those kinds of efforts of the Office of Legislation in Korea, because there is a huge divergence between everyday words and legal terms which are especially from Chinese words. Generally, people try to access the law information using everyday words, so they have a difficulty to get the result that they exactly want. In this paper, we propose a term mapping methodology between everyday words and legal terms for general users who don't have sufficient background about legal terms, and we develop a search service that can provide the search results of law information from everyday words. This will be able to search the law information accurately without the knowledge of legal terminology. In other words, our research goal is to make a law information search system that general users are able to retrieval the law information with everyday words. First, this paper takes advantage of tags of internet blogs using the concept for collective intelligence to find out the term mapping relationship between everyday words and legal terms. In order to achieve our goal, we collect tags related to an everyday word from web blog posts. Generally, people add a non-hierarchical keyword or term like a synonym, especially called tag, in order to describe, classify, and manage their posts when they make any post in the internet blog. Second, the collected tags are clustered through the cluster analysis method, K-means. Then, we find a mapping relationship between an everyday word and a legal term using our estimation measure to select the fittest one that can match with an everyday word. Selected legal terms are given the definite relationship, and the relations between everyday words and legal terms are described using SKOS that is an ontology to describe the knowledge related to thesauri, classification schemes, taxonomies, and subject-heading. Thus, based on proposed mapping and searching methodologies, our legal information search system finds out a legal term mapped with user query and retrieves law information using a matched legal term, if users try to retrieve law information using an everyday word. Therefore, from our research, users can get exact results even if they do not have the knowledge related to legal terms. As a result of our research, we expect that general users who don't have professional legal background can conveniently and efficiently retrieve the legal information using everyday words.