• Title/Summary/Keyword: ITS Services

Search Result 4,799, Processing Time 0.037 seconds

A Study on the Artificial Intelligence (AI) Training Data Quality: Fuzzy-set Qualitative Comparative Analysis (fsQCA) Approach (인공지능 학습용 데이터 품질에 대한 연구: 퍼지셋 질적비교분석)

  • Hyunmok Oh;Seoyoun Lee;Younghoon Chang
    • Information Systems Review
    • /
    • v.26 no.1
    • /
    • pp.19-56
    • /
    • 2024
  • This study is empirical research to enhance understanding of AI (artificial intelligence) training data project in South Korea. It primarily focuses on the various concerns regarding data quality from policy-executing institutions, data construction companies, and organizations utilizing AI training data to develop the most reliable algorithm for society. For academic contribution, this study suggests a theoretical foundation and research model for understanding AI training data quality and its antecedents, as well as the unique data and ethical aspects of AI. For this purpose, this study proposes a research model with important antecedents related to AI training data quality, such as data attribute factors, data building environmental factors, and data type-related factors. The study collects 393 sample data from actual practitioners and personnel from companies building artificial intelligence training data and companies developing artificial intelligence services. Data analysis was conducted through Fuzzy Set Qualitative Comparative Analysis (fsQCA) and Artificial Neural Network analysis (ANN), presenting academic and practical implications related to the quality of AI training data.

Quality and Sensory Characteristics of Yanggaeng, a Healthy Snack Added with Pinus Koraiensis Needle Extract Powder for the Elderly

  • Eunbin Park;Soo In Ryu;Minho Lee;Hyo-Jeong Lee;Jean Kyung Paik
    • Journal of Food and Nutrition Research
    • /
    • v.10 no.3
    • /
    • pp.228-234
    • /
    • 2022
  • Korea has entered the aged society, with those aged over 65 years accounting for 14~20% of its population. Interest in the quality of life, nutrition, and health of the elderly is increasing. Since the energy intake of the elderly is lower than the estimated required amount, nutrient intake ratio of the elderly is related to mastication. Yanggaeng is a high-energy food made from agar, sugar, and red bean paste. Since it has a soft texture, it is highly utilized as a snack for the elderly who have inconvenience in mastication. Pinus koraiensis needle is known to possess antioxidant and antibacterial effects. The purpose of this study was to develop a functional snack added with Pinus koraiensis needle extract powder known to possess anti-inflammatory, anti-cancer, and antibacterial effects for the elderly that would be easy for them to chew. In this study, yanggaeng was manufactured with 0%, 2%, 4%, 6%, or 8% of Pinus koraiensis needle extract powder, white sediment, and agar. In the experiment, moisture contents, color values texture characteristics, antioxidant activities, and sensory preference results were evaluated. Moisture content was the highest in the group added 6% of the extract powder. It was the lowest in the group added 8% of the extract powder, showing a significant (p < 0.001) difference between the two. Hardness, cohesiveness, and springiness of texture characteristics were decreased significantly (p < 0.001) while the adhesiveness and chewiness of texture characteristics were increased significantly (p < 0.001) as the amount of addition increased. Regarding antioxidative activity measurements, levels of polyphenols were the highest (p < 0.001) in the group added with 8% of the extract powder. DPPH and ABTS radical scavenging activities were increased as the amount of addition increased (p < 0.001). Overall sensory preference was the highest for the 2% addition group. It decreased as the amount of addition increased (p < 0.001). Results of this study indicate that Pinus koraiensis needle extract powder with antioxidant and antibacterial effects can be used to manufacture yanggaeng to make functional snacks with improved quality characteristics for the elderly.

A Study on the Presenting Library Management Strategies through the Establishment of Mid-to Long-term Plans for the Libraries in Uiwang City (의왕시 도서관 중장기 계획 수립을 통한 도서관 경영 전략 제시에 관한 연구)

  • Hyojung Sim;Yonghun Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.3
    • /
    • pp.113-140
    • /
    • 2024
  • This study conducted an analysis of the regional status and characteristics of Uiwang City, library status, and other library vision analysis, major strategy SWOT analysis, civic discussions, library experts, and staff meetings to explore and present management strategies for the development of the Libraries in Uiwang City. The analysis results led to the establishment of the vision "Uiwang, which connects books and life, citizens who become happy in the library," and provided sufficient library infrastructure to citizens along with the core values of growth, togetherness, daily life, companionship, inclusiveness, and communication. The policy goals were set to provide customized knowledge information activities and support the realization of Uiwang City as a prestigious city. Expansion of library infrastructure, innovation to open the future, improvement of library service level, strengthening of cooperation with the local community, promotion of reading culture and promotion of 'Book Reading Uiwang', five Uiwang promotion strategies that continue the tradition of Hangeul, revision of library-related ordinances, library management Twenty-nine detailed tasks were presented, including system improvement and expansion of reading services for the information-underprivileged. In order to establish a comprehensive library development plan and ensure the effectiveness of its implementation, it was proposed that local governments disclose their library development plans and that city areas with a population of 500,000 or more and offices of education be required to establish comprehensive library development plans.

A Study on the System of Aircraft Investigation (항공기(航空機) 사고조사제도(事故調査制度)에 관한 연구(硏究))

  • Kim, Doo-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.9
    • /
    • pp.85-143
    • /
    • 1997
  • The main purpose of the investigation of an accident caused by aircraft is to be prevented the sudden and casual accidents caused by wilful misconduct and fault from pilots, air traffic controllers, hijack, trouble of engine and machinery of aircraft, turbulence during the bad weather, collision between birds and aircraft, near miss flight by aircrafts etc. It is not the purpose of this activity to apportion blame or liability for offender of aircraft accidents. Accidents to aircraft, especially those involving the general public and their property, are a matter of great concern to the aviation community. The system of international regulation exists to improve safety and minimize, as far as possible, the risk of accidents but when they do occur there is a web of systems and procedures to investigate and respond to them. I would like to trace the general line of regulation from an international source in the Chicago Convention of 1944. Article 26 of the Convention lays down the basic principle for the investigation of the aircraft accident. Where there has been an accident to an aircraft of a contracting state which occurs in the territory of another contracting state and which involves death or serious injury or indicates serious technical defect in the aircraft or air navigation facilities, the state in which the accident occurs must institute an inquiry into the circumstances of the accident. That inquiry will be in accordance, in so far as its law permits, with the procedure which may be recommended from time to time by the International Civil Aviation Organization ICAO). There are very general provisions but they state two essential principles: first, in certain circumstances there must be an investigation, and second, who is to be responsible for undertaking that investigation. The latter is an important point to establish otherwise there could be at least two states claiming jurisdiction on the inquiry. The Chicago Convention also provides that the state where the aircraft is registered is to be given the opportunity to appoint observers to be present at the inquiry and the state holding the inquiry must communicate the report and findings in the matter to that other state. It is worth noting that the Chicago Convention (Article 25) also makes provision for assisting aircraft in distress. Each contracting state undertakes to provide such measures of assistance to aircraft in distress in its territory as it may find practicable and to permit (subject to control by its own authorities) the owner of the aircraft or authorities of the state in which the aircraft is registered, to provide such measures of assistance as may be necessitated by circumstances. Significantly, the undertaking can only be given by contracting state but the duty to provide assistance is not limited to aircraft registered in another contracting state, but presumably any aircraft in distress in the territory of the contracting state. Finally, the Convention envisages further regulations (normally to be produced under the auspices of ICAO). In this case the Convention provides that each contracting state, when undertaking a search for missing aircraft, will collaborate in co-ordinated measures which may be recommended from time to time pursuant to the Convention. Since 1944 further international regulations relating to safety and investigation of accidents have been made, both pursuant to Chicago Convention and, in particular, through the vehicle of the ICAO which has, for example, set up an accident and reporting system. By requiring the reporting of certain accidents and incidents it is building up an information service for the benefit of member states. However, Chicago Convention provides that each contracting state undertakes collaborate in securing the highest practicable degree of uniformity in regulations, standards, procedures and organization in relation to aircraft, personnel, airways and auxiliary services in all matters in which such uniformity will facilitate and improve air navigation. To this end, ICAO is to adopt and amend from time to time, as may be necessary, international standards and recommended practices and procedures dealing with, among other things, aircraft in distress and investigation of accidents. Standards and Recommended Practices for Aircraft Accident Injuries were first adopted by the ICAO Council on 11 April 1951 pursuant to Article 37 of the Chicago Convention on International Civil Aviation and were designated as Annex 13 to the Convention. The Standards Recommended Practices were based on Recommendations of the Accident Investigation Division at its first Session in February 1946 which were further developed at the Second Session of the Division in February 1947. The 2nd Edition (1966), 3rd Edition, (1973), 4th Edition (1976), 5th Edition (1979), 6th Edition (1981), 7th Edition (1988), 8th Edition (1992) of the Annex 13 (Aircraft Accident and Incident Investigation) of the Chicago Convention was amended eight times by the ICAO Council since 1966. Annex 13 sets out in detail the international standards and recommended practices to be adopted by contracting states in dealing with a serious accident to an aircraft of a contracting state occurring in the territory of another contracting state, known as the state of occurrence. It provides, principally, that the state in which the aircraft is registered is to be given the opportunity to appoint an accredited representative to be present at the inquiry conducted by the state in which the serious aircraft accident occurs. Article 26 of the Chicago Convention does not indicate what the accredited representative is to do but Annex 13 amplifies his rights and duties. In particular, the accredited representative participates in the inquiry by visiting the scene of the accident, examining the wreckage, questioning witnesses, having full access to all relevant evidence, receiving copies of all pertinent documents and making submissions in respect of the various elements of the inquiry. The main shortcomings of the present system for aircraft accident investigation are that some contracting sates are not applying Annex 13 within its express terms, although they are contracting states. Further, and much more important in practice, there are many countries which apply the letter of Annex 13 in such a way as to sterilise its spirit. This appears to be due to a number of causes often found in combination. Firstly, the requirements of the local law and of the local procedures are interpreted and applied so as preclude a more efficient investigation under Annex 13 in favour of a legalistic and sterile interpretation of its terms. Sometimes this results from a distrust of the motives of persons and bodies wishing to participate or from commercial or related to matters of liability and bodies. These may be political, commercial or related to matters of liability and insurance. Secondly, there is said to be a conscious desire to conduct the investigation in some contracting states in such a way as to absolve from any possibility of blame the authorities or nationals, whether manufacturers, operators or air traffic controllers, of the country in which the inquiry is held. The EEC has also had an input into accidents and investigations. In particular, a directive was issued in December 1980 encouraging the uniformity of standards within the EEC by means of joint co-operation of accident investigation. The sharing of and assisting with technical facilities and information was considered an important means of achieving these goals. It has since been proposed that a European accident investigation committee should be set up by the EEC (Council Directive 80/1266 of 1 December 1980). After I would like to introduce the summary of the legislation examples and system for aircraft accidents investigation of the United States, the United Kingdom, Canada, Germany, The Netherlands, Sweden, Swiss, New Zealand and Japan, and I am going to mention the present system, regulations and aviation act for the aircraft accident investigation in Korea. Furthermore I would like to point out the shortcomings of the present system and regulations and aviation act for the aircraft accident investigation and then I will suggest my personal opinion on the new and dramatic innovation on the system for aircraft accident investigation in Korea. I propose that it is necessary and desirable for us to make a new legislation or to revise the existing aviation act in order to establish the standing and independent Committee of Aircraft Accident Investigation under the Korean Government.

  • PDF

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

Research for Space Activities of Korea Air Force - Political and Legal Perspective (우리나라 공군의 우주력 건설을 위한 정책적.법적고찰)

  • Shin, Sung-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.135-183
    • /
    • 2003
  • Aerospace force is a determining factor in a modem war. The combat field is expanding to space. Thus, the legitimacy of establishing aerospace force is no longer an debating issue, but "how should we establish aerospace force" has become an issue to the military. The standard limiting on the military use of space should be non-aggressive use as asserted by the U.S., rather than non-military use as asserted by the former Soviet Union. The former Soviet Union's argument is not even strongly supported by the current Russia government, and realistically is hard to be applied. Thus, the multi-purpose satellite used for military surveillance or a commercial satellite employed for military communication are allowed under the U.S. principle of peaceful use of space. In this regard, Air Force may be free to develop a military surveillance satellite and a communication satellite with civilian research institute. Although MTCR, entered into with the U.S., restricts the development of space-launching vehicle for the export purpose, the development of space-launching vehicle by the Korea Air Force or Korea Aerospace Research Institute is beyond the scope of application of MTCR, and Air Force may just operate a satellite in the orbit for the military purpose. The primary task for multi-purpose satellite is a remote sensing; SAR sensor with high resolution is mainly employed for military use. Therefore, a system that enables Air Force, the Korea Aerospace Research Institute, and Agency for Defense Development to conduct joint-research and development should be instituted. U.S. Air Force has dismantled its own space-launching vehicle step by step, and, instead, has increased using private space launching vehicle. In addition, Military communication has been operated separately from civil communication services or broadcasting services due to the special circumstances unique to the military setting. However, joint-operation of communication facility by the military and civil users is preferred because this reduces financial burden resulting from separate operation of military satellite. During the Gulf War, U.S. armed forces employed commercial satellites for its military communication. Korea's participation in space technology research is a little bit behind in time, considering its economic scale. In terms of budget, Korea is to spend 5 trillion won for 15 years for the space activities. However, Japan has 2 trillion won annul budget for the same activities. Because the development of space industry during initial fostering period does not apply to profit-making business, government supports are inevitable. All space development programs of other foreign countries are entirely supported by each government, and, only recently, private industry started participating in limited area such as a communication satellite and broadcasting satellite, Particularly, Korea's space industry is in an infant stage, which largely demands government supports. Government support should be in the form of investment or financial contribution, rather than in the form of loan or borrowing. Compared to other advanced countries in space industry, Korea needs more budget and professional research staff. Naturally, for the efficient and systemic space development and for the prevention of overlapping and distraction of power, it is necessary to enact space-related statutes, which would provide dear vision for the Korea space development. Furthermore, the fact that a variety of departments are running their own space development program requires a centralized and single space-industry development system. Prior to discussing how to coordinate or integrate space programs between Agency for Defense Development and the Korea Aerospace Research Institute, it is a prerequisite to establish, namely, "Space Operations Center"in the Air Force, which would determine policy and strategy in operating space forces. For the establishment of "Space Operations Center," policy determinations by the Ministry of National Defense and the Joint Chief of Staff are required. Especially, space surveillance system through using a military surveillance satellite and communication satellite, which would lay foundation for independent defense, shall be established with reference to Japan's space force plan. In order to resolve issues related to MTCR, Air Force would use space-launching vehicle of the Korea Aerospace Research Institute. Moreover, defense budge should be appropriated for using multi-purpose satellite and communication satellite. The Ministry of National Defense needs to appropriate 2.5 trillion won budget for space operations, which amounts to Japan's surveillance satellite operating budges.

  • PDF

Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window (랜드마크 윈도우 기반의 빈발 패턴 마이닝 기법의 분석 및 성능평가)

  • Pyun, Gwangbum;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.101-107
    • /
    • 2014
  • With the development of online service, recent forms of databases have been changed from static database structures to dynamic stream database structures. Previous data mining techniques have been used as tools of decision making such as establishment of marketing strategies and DNA analyses. However, the capability to analyze real-time data more quickly is necessary in the recent interesting areas such as sensor network, robotics, and artificial intelligence. Landmark window-based frequent pattern mining, one of the stream mining approaches, performs mining operations with respect to parts of databases or each transaction of them, instead of all the data. In this paper, we analyze and evaluate the techniques of the well-known landmark window-based frequent pattern mining algorithms, called Lossy counting and hMiner. When Lossy counting mines frequent patterns from a set of new transactions, it performs union operations between the previous and current mining results. hMiner, which is a state-of-the-art algorithm based on the landmark window model, conducts mining operations whenever a new transaction occurs. Since hMiner extracts frequent patterns as soon as a new transaction is entered, we can obtain the latest mining results reflecting real-time information. For this reason, such algorithms are also called online mining approaches. We evaluate and compare the performance of the primitive algorithm, Lossy counting and the latest one, hMiner. As the criteria of our performance analysis, we first consider algorithms' total runtime and average processing time per transaction. In addition, to compare the efficiency of storage structures between them, their maximum memory usage is also evaluated. Lastly, we show how stably the two algorithms conduct their mining works with respect to the databases that feature gradually increasing items. With respect to the evaluation results of mining time and transaction processing, hMiner has higher speed than that of Lossy counting. Since hMiner stores candidate frequent patterns in a hash method, it can directly access candidate frequent patterns. Meanwhile, Lossy counting stores them in a lattice manner; thus, it has to search for multiple nodes in order to access the candidate frequent patterns. On the other hand, hMiner shows worse performance than that of Lossy counting in terms of maximum memory usage. hMiner should have all of the information for candidate frequent patterns to store them to hash's buckets, while Lossy counting stores them, reducing their information by using the lattice method. Since the storage of Lossy counting can share items concurrently included in multiple patterns, its memory usage is more efficient than that of hMiner. However, hMiner presents better efficiency than that of Lossy counting with respect to scalability evaluation due to the following reasons. If the number of items is increased, shared items are decreased in contrast; thereby, Lossy counting's memory efficiency is weakened. Furthermore, if the number of transactions becomes higher, its pruning effect becomes worse. From the experimental results, we can determine that the landmark window-based frequent pattern mining algorithms are suitable for real-time systems although they require a significant amount of memory. Hence, we need to improve their data structures more efficiently in order to utilize them additionally in resource-constrained environments such as WSN(Wireless sensor network).

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

A Regression-Model-based Method for Combining Interestingness Measures of Association Rule Mining (연관상품 추천을 위한 회귀분석모형 기반 연관 규칙 척도 결합기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.127-141
    • /
    • 2017
  • Advances in Internet technologies and the proliferation of mobile devices enabled consumers to approach a wide range of goods and services, while causing an adverse effect that they have hard time reaching their congenial items even if they devote much time to searching for them. Accordingly, businesses are using the recommender systems to provide tools for consumers to find the desired items more easily. Association Rule Mining (ARM) technology is advantageous to recommender systems in that ARM provides intuitive form of a rule with interestingness measures (support, confidence, and lift) describing the relationship between items. Given an item, its relevant items can be distinguished with the help of the measures that show the strength of relationship between items. Based on the strength, the most pertinent items can be chosen among other items and exposed to a given item's web page. However, the diversity of the measures may confuse which items are more recommendable. Given two rules, for example, one rule's support and confidence may not be concurrently superior to the other rule's. Such discrepancy of the measures in distinguishing one rule's superiority from other rules may cause difficulty in selecting proper items for recommendation. In addition, in an online environment where a web page or mobile screen can provide a limited number of recommendations that attract consumer interest, the prudent selection of items to be included in the list of recommendations is very important. The exposure of items of little interest may lead consumers to ignore the recommendations. Then, such consumers will possibly not pay attention to other forms of marketing activities. Therefore, the measures should be aligned with the probability of consumer's acceptance of recommendations. For this reason, this study proposes a model-based approach to combine those measures into one unified measure that can consistently determine the ranking of recommended items. A regression model was designed to describe how well the measures (independent variables; i.e., support, confidence, and lift) explain consumer's acceptance of recommendations (dependent variables, hit rate of recommended items). The model is intuitive to understand and easy to use in that the equation consists of the commonly used measures for ARM and can be used in the estimation of hit rates. The experiment using transaction data from one of the Korea's largest online shopping malls was conducted to show that the proposed model can improve the hit rates of recommendations. From the top of the list to 13th place, recommended items in the higher rakings from the proposed model show the higher hit rates than those from the competitive model's. The result shows that the proposed model's performance is superior to the competitive model's in online recommendation environment. In a web page, consumers are provided around ten recommendations with which the proposed model outperforms. Moreover, a mobile device cannot expose many items simultaneously due to its limited screen size. Therefore, the result shows that the newly devised recommendation technique is suitable for the mobile recommender systems. While this study has been conducted to cover the cross-selling in online shopping malls that handle merchandise, the proposed method can be expected to be applied in various situations under which association rules apply. For example, this model can be applied to medical diagnostic systems that predict candidate diseases from a patient's symptoms. To increase the efficiency of the model, additional variables will need to be considered for the elaboration of the model in future studies. For example, price can be a good candidate for an explanatory variable because it has a major impact on consumer purchase decisions. If the prices of recommended items are much higher than the items in which a consumer is interested, the consumer may hesitate to accept the recommendations.

The effect of job stress on organizational commitment for senior welfare facility staffs suffering from emotional labor (노인복지시설 종사자의 감정노동으로 인한 직무스트레스가 조직몰입에 미치는 영향)

  • Cho, Jong-hyeon
    • Journal of Venture Innovation
    • /
    • v.1 no.1
    • /
    • pp.129-143
    • /
    • 2018
  • When consulting with senior service user or his or her family members, employees of senior welfare facilities face a vertical relationship due to age rather than a horizontal relationship. Despite few cases reported, service users and the families afflict physical and mental pain on the employees through irrational demands, physical abuses, and verbal abuses. In particular, the Korean society has advocated the notion of respecting elders and thus emphasized members of society to provide unconditional support to those of old age. In reality, however, people who work at senior welfare facilities report the difficulty of providing supports to heavy demands in selfish complaints that are often impossible to fulfill. Starting from May 2018, there has been a petition to the Korean Blue House, seeking protective measures for 'Senior welfare facility professions who are exposed to violence'. The study conduct researches on the effect of job stress on the organizational commitment for senior welfare facility employees from suffering emotional labor. Furthermore, it also aims to point the difficulties that the professions face and the solutions that alleviate the conflicts between the rights of services users of senior welfare facilities and its staffs. The study surveyed 178 staffs who work in senior welfare facilities in Seoul and Gyeonggi Province as its research method. The collected data was analyzed by using IBM SPSS Statistics 24.0 to derive the general characteristics of the sample, reliability, feasibility analysis, correlation analysis, and verification of the research hypothesis. The study was able to conclude the following: First, the frequency of emotional expression of senior welfare facility staffs had negative(-) influences on job stress. Second, the incongruity of emotions of senior welfare facility staffs had negative(-) influences on job stress. Third, the incongruity of emotions of senior welfare facility staffs had negative (-) influences on job stress. Fourth, the job stress showed mediating effects between emotional labor factors and organizational commitment