• Title/Summary/Keyword: Interest Level

Search Result 2,640, Processing Time 0.037 seconds

Memory Organization for a Fuzzy Controller.

  • Jee, K.D.S.;Poluzzi, R.;Russo, B.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1041-1043
    • /
    • 1993
  • Fuzzy logic based Control Theory has gained much interest in the industrial world, thanks to its ability to formalize and solve in a very natural way many problems that are very difficult to quantify at an analytical level. This paper shows a solution for treating membership function inside hardware circuits. The proposed hardware structure optimizes the memoried size by using particular form of the vectorial representation. The process of memorizing fuzzy sets, i.e. their membership function, has always been one of the more problematic issues for the hardware implementation, due to the quite large memory space that is needed. To simplify such an implementation, it is commonly [1,2,8,9,10,11] used to limit the membership functions either to those having triangular or trapezoidal shape, or pre-definite shape. These kinds of functions are able to cover a large spectrum of applications with a limited usage of memory, since they can be memorized by specifying very few parameters ( ight, base, critical points, etc.). This however results in a loss of computational power due to computation on the medium points. A solution to this problem is obtained by discretizing the universe of discourse U, i.e. by fixing a finite number of points and memorizing the value of the membership functions on such points [3,10,14,15]. Such a solution provides a satisfying computational speed, a very high precision of definitions and gives the users the opportunity to choose membership functions of any shape. However, a significant memory waste can as well be registered. It is indeed possible that for each of the given fuzzy sets many elements of the universe of discourse have a membership value equal to zero. It has also been noticed that almost in all cases common points among fuzzy sets, i.e. points with non null membership values are very few. More specifically, in many applications, for each element u of U, there exists at most three fuzzy sets for which the membership value is ot null [3,5,6,7,12,13]. Our proposal is based on such hypotheses. Moreover, we use a technique that even though it does not restrict the shapes of membership functions, it reduces strongly the computational time for the membership values and optimizes the function memorization. In figure 1 it is represented a term set whose characteristics are common for fuzzy controllers and to which we will refer in the following. The above term set has a universe of discourse with 128 elements (so to have a good resolution), 8 fuzzy sets that describe the term set, 32 levels of discretization for the membership values. Clearly, the number of bits necessary for the given specifications are 5 for 32 truth levels, 3 for 8 membership functions and 7 for 128 levels of resolution. The memory depth is given by the dimension of the universe of the discourse (128 in our case) and it will be represented by the memory rows. The length of a world of memory is defined by: Length = nem (dm(m)+dm(fm) Where: fm is the maximum number of non null values in every element of the universe of the discourse, dm(m) is the dimension of the values of the membership function m, dm(fm) is the dimension of the word to represent the index of the highest membership function. In our case then Length=24. The memory dimension is therefore 128*24 bits. If we had chosen to memorize all values of the membership functions we would have needed to memorize on each memory row the membership value of each element. Fuzzy sets word dimension is 8*5 bits. Therefore, the dimension of the memory would have been 128*40 bits. Coherently with our hypothesis, in fig. 1 each element of universe of the discourse has a non null membership value on at most three fuzzy sets. Focusing on the elements 32,64,96 of the universe of discourse, they will be memorized as follows: The computation of the rule weights is done by comparing those bits that represent the index of the membership function, with the word of the program memor . The output bus of the Program Memory (μCOD), is given as input a comparator (Combinatory Net). If the index is equal to the bus value then one of the non null weight derives from the rule and it is produced as output, otherwise the output is zero (fig. 2). It is clear, that the memory dimension of the antecedent is in this way reduced since only non null values are memorized. Moreover, the time performance of the system is equivalent to the performance of a system using vectorial memorization of all weights. The dimensioning of the word is influenced by some parameters of the input variable. The most important parameter is the maximum number membership functions (nfm) having a non null value in each element of the universe of discourse. From our study in the field of fuzzy system, we see that typically nfm 3 and there are at most 16 membership function. At any rate, such a value can be increased up to the physical dimensional limit of the antecedent memory. A less important role n the optimization process of the word dimension is played by the number of membership functions defined for each linguistic term. The table below shows the request word dimension as a function of such parameters and compares our proposed method with the method of vectorial memorization[10]. Summing up, the characteristics of our method are: Users are not restricted to membership functions with specific shapes. The number of the fuzzy sets and the resolution of the vertical axis have a very small influence in increasing memory space. Weight computations are done by combinatorial network and therefore the time performance of the system is equivalent to the one of the vectorial method. The number of non null membership values on any element of the universe of discourse is limited. Such a constraint is usually non very restrictive since many controllers obtain a good precision with only three non null weights. The method here briefly described has been adopted by our group in the design of an optimized version of the coprocessor described in [10].

  • PDF

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Understanding User Motivations and Behavioral Process in Creating Video UGC: Focus on Theory of Implementation Intentions (Video UGC 제작 동기와 행위 과정에 관한 이해: 구현의도이론 (Theory of Implementation Intentions)의 적용을 중심으로)

  • Kim, Hyung-Jin;Song, Se-Min;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.125-148
    • /
    • 2009
  • UGC(User Generated Contents) is emerging as the center of e-business in the web 2.0 era. The trend reflects changing roles of users in production and consumption of contents on websites and helps us to understand new strategies of websites such as web portals and social network websites. Nowadays, we consume contents created by other non-professional users for both utilitarian (e.g., knowledge) and hedonic values (e.g., fun). Also, contents produced by ourselves (e.g., photo, video) are posted on websites so that our friends, family, and even the public can consume those contents. This means that non-professionals, who used to be passive audience in the past, are now creating contents and share their UGCs with others in the Web. Accessible media, tools, and applications have also reduced difficulty and complexity in the process of creating contents. Realizing that users create plenty of materials which are very interesting to other people, media companies (i.e., web portals and social networking websites) are adjusting their strategies and business models accordingly. Increased demand of UGC may lead to website visits which are the source of benefits from advertising. Therefore, they put more efforts into making their websites open platforms where UGCs can be created and shared among users without technical and methodological difficulties. Many websites have increasingly adopted new technologies such as RSS and openAPI. Some have even changed the structure of web pages so that UGC can be seen several times to more visitors. This mainstream of UGCs on websites indicates that acquiring more UGCs and supporting participating users have become important things to media companies. Although those companies need to understand why general users have shown increasing interest in creating and posting contents and what is important to them in the process of productions, few research results exist in this area to address these issues. Also, behavioral process in creating video UGCs has not been explored enough for the public to fully understand it. With a solid theoretical background (i.e., theory of implementation intentions), parts of our proposed research model mirror the process of user behaviors in creating video contents, which consist of intention to upload, intention to edit, edit, and upload. In addition, in order to explain how those behavioral intentions are developed, we investigated influences of antecedents from three motivational perspectives (i.e., intrinsic, editing software-oriented, and website's network effect-oriented). First, from the intrinsic motivation perspective, we studied the roles of self-expression, enjoyment, and social attention in forming intention to edit with preferred editing software or in forming intention to upload video contents to preferred websites. Second, we explored the roles of editing software for non-professionals to edit video contents, in terms of how it makes production process easier and how it is useful in the process. Finally, from the website characteristic-oriented perspective, we investigated the role of a website's network externality as an antecedent of users' intention to upload to preferred websites. The rationale is that posting UGCs on websites are basically social-oriented behaviors; thus, users prefer a website with the high level of network externality for contents uploading. This study adopted a longitudinal research design; we emailed recipients twice with different questionnaires. Guided by invitation email including a link to web survey page, respondents answered most of questions except edit and upload at the first survey. They were asked to provide information about UGC editing software they mainly used and preferred website to upload edited contents, and then asked to answer related questions. For example, before answering questions regarding network externality, they individually had to declare the name of the website to which they would be willing to upload. At the end of the first survey, we asked if they agreed to participate in the corresponding survey in a month. During twenty days, 333 complete responses were gathered in the first survey. One month later, we emailed those recipients to ask for participation in the second survey. 185 of the 333 recipients (about 56 percentages) answered in the second survey. Personalized questionnaires were provided for them to remind the names of editing software and website that they reported in the first survey. They answered the degree of editing with the software and the degree of uploading video contents to the website for the past one month. To all recipients of the two surveys, exchange tickets for books (about 5,000~10,000 Korean Won) were provided according to the frequency of participations. PLS analysis shows that user behaviors in creating video contents are well explained by the theory of implementation intentions. In fact, intention to upload significantly influences intention to edit in the process of accomplishing the goal behavior, upload. These relationships show the behavioral process that has been unclear in users' creating video contents for uploading and also highlight important roles of editing in the process. Regarding the intrinsic motivations, the results illustrated that users are likely to edit their own video contents in order to express their own intrinsic traits such as thoughts and feelings. Also, their intention to upload contents in preferred website is formed because they want to attract much attention from others through contents reflecting themselves. This result well corresponds to the roles of the website characteristic, namely, network externality. Based on the PLS results, the network effect of a website has significant influence on users' intention to upload to the preferred website. This indicates that users with social attention motivations are likely to upload their video UGCs to a website whose network size is big enough to realize their motivations easily. Finally, regarding editing software characteristic-oriented motivations, making exclusively-provided editing software more user-friendly (i.e., easy of use, usefulness) plays an important role in leading to users' intention to edit. Our research contributes to both academic scholars and professionals. For researchers, our results show that the theory of implementation intentions is well applied to the video UGC context and very useful to explain the relationship between implementation intentions and goal behaviors. With the theory, this study theoretically and empirically confirmed that editing is a different and important behavior from uploading behavior, and we tested the behavioral process of ordinary users in creating video UGCs, focusing on significant motivational factors in each step. In addition, parts of our research model are also rooted in the solid theoretical background such as the technology acceptance model and the theory of network externality to explain the effects of UGC-related motivations. For practitioners, our results suggest that media companies need to restructure their websites so that users' needs for social interaction through UGC (e.g., self-expression, social attention) are well met. Also, we emphasize strategic importance of the network size of websites in leading non-professionals to upload video contents to the websites. Those websites need to find a way to utilize the network effects for acquiring more UGCs. Finally, we suggest that some ways to improve editing software be considered as a way to increase edit behavior which is a very important process leading to UGC uploading.

A study on the Success Factors and Strategy of Information Technology Investment Based on Intelligent Economic Simulation Modeling (지능형 시뮬레이션 모형을 기반으로 한 정보기술 투자 성과 요인 및 전략 도출에 관한 연구)

  • Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.35-55
    • /
    • 2013
  • Information technology is a critical resource necessary for any company hoping to support and realize its strategic goals, which contribute to growth promotion and sustainable development. The selection of information technology and its strategic use are imperative for the enhanced performance of every aspect of company management, leading a wide range of companies to have invested continuously in information technology. Despite researchers, managers, and policy makers' keen interest in how information technology contributes to organizational performance, there is uncertainty and debate about the result of information technology investment. In other words, researchers and managers cannot easily identify the independent factors that can impact the investment performance of information technology. This is mainly owing to the fact that many factors, ranging from the internal components of a company, strategies, and external customers, are interconnected with the investment performance of information technology. Using an agent-based simulation technique, this research extracts factors expected to affect investment performance on information technology, simplifies the analyses of their relationship with economic modeling, and examines the performance dependent on changes in the factors. In terms of economic modeling, I expand the model that highlights the way in which product quality moderates the relationship between information technology investments and economic performance (Thatcher and Pingry, 2004) by considering the cost of information technology investment and the demand creation resulting from product quality enhancement. For quality enhancement and its consequences for demand creation, I apply the concept of information quality and decision-maker quality (Raghunathan, 1999). This concept implies that the investment on information technology improves the quality of information, which, in turn, improves decision quality and performance, thus enhancing the level of product or service quality. Additionally, I consider the effect of word of mouth among consumers, which creates new demand for a product or service through the information diffusion effect. This demand creation is analyzed with an agent-based simulation model that is widely used for network analyses. Results show that the investment on information technology enhances the quality of a company's product or service, which indirectly affects the economic performance of that company, particularly with regard to factors such as consumer surplus, company profit, and company productivity. Specifically, when a company makes its initial investment in information technology, the resultant increase in the quality of a company's product or service immediately has a positive effect on consumer surplus, but the investment cost has a negative effect on company productivity and profit. As time goes by, the enhancement of the quality of that company's product or service creates new consumer demand through the information diffusion effect. Finally, the new demand positively affects the company's profit and productivity. In terms of the investment strategy for information technology, this study's results also reveal that the selection of information technology needs to be based on analysis of service and the network effect of customers, and demonstrate that information technology implementation should fit into the company's business strategy. Specifically, if a company seeks the short-term enhancement of company performance, it needs to have a one-shot strategy (making a large investment at one time). On the other hand, if a company seeks a long-term sustainable profit structure, it needs to have a split strategy (making several small investments at different times). The findings from this study make several contributions to the literature. In terms of methodology, the study integrates both economic modeling and simulation technique in order to overcome the limitations of each methodology. It also indicates the mediating effect of product quality on the relationship between information technology and the performance of a company. Finally, it analyzes the effect of information technology investment strategies and information diffusion among consumers on the investment performance of information technology.

An Examination into the Illegal Trade of Cultural Properties (문화재(文化財)의 국제적 불법 거래(不法 去來)에 관한 고찰)

  • Cho, Boo-Keun
    • Korean Journal of Heritage: History & Science
    • /
    • v.37
    • /
    • pp.371-405
    • /
    • 2004
  • International circulation of cultural assets involves numerous countries thereby making an approach based on international law essential to resolving this problem. Since the end of the $2^{nd}$ World War, as the value of cultural assets evolved from material value to moral and ethical values, with emphasis on establishing national identities, newly independent nations and former colonial states took issue with ownership of cultural assets which led to the need for international cooperation and statutory provisions for the return of cultural assets. UNESCO's 1954 "Convention for the Protection of Cultural Property in the Event of Armed Conflict" as preparatory measures for the protection of cultural assets, the 1970 "Convention on the Means of Prohibiting and Preventing the Illicit Import and Transfer of Ownership of Cultural Property" to regulate transfer of cultural assets, and the 1995 "Unidroit Convention on Stolen or Illegally Exported Cultural Objects" which required the return of illegally acquired cultural property are examples of international agreements established on illegal transfers of cultural assets. In addition, the UN agency UNESCO established the Division of Cultural Heritage to oversee cultural assets related matters, and the UN since its 1973 resolution 3187, has continued to demonstrate interest in protection of cultural assets. The resolution 3187 affirms the return of cultural assets to the country of origin, advises on preventing illegal transfers of works of art and cultural assets, advises cataloguing cultural assets within the respective countries and, conclusively, recommends becoming a member of UNESCO, composing a forum for international cooperation. Differences in defining cultural assets pose a limitation on international agreements. While the 1954 Convention states that cultural assets are not limited to movable property and includes immovable property, the 1970 Convention's objective of 'Prohibiting and preventing the illicit import, export and transfer of ownership of cultural property' effectively limits the subject to tangible movable cultural property. The 1995 Convention also has tangible movable cultural property as its subject. On this point, the two conventions demonstrate distinction from the 1954 Convention and the 1972 Convention that focuses on immovable cultural property and natural property. The disparity in defining cultural property is due to the object and purpose of the convention and does not reflect an inherent divergence. In the case of Korea, beginning with the 1866 French invasion, 36 years of Japanese colonial rule, military rule and period of economic development caused outflow of numerous cultural assets to foreign countries. Of course, it is neither possible nor necessary to have all of these cultural properties returned, but among those that have significant value in establishing cultural and historical identity or those that have been taken symbolically as a demonstration of occupational rule can cause issues in their return. In these cases, the 1954 Convention and the ratification of the first legislation must be actively considered. In the return of cultural property, if the illicit acquisition is the core issue, it is a simple matter of following the international accords, while if it rises to the level of diplomatic discussions, it will become a political issue. In that case, the country requesting the return must convince the counterpart country. Realizing a response to the earnest need for preventing illicit trading of cultural assets will require extensive national and civic societal efforts in the East Asian area to overcome its current deficiencies. The most effective way to prevent illicit trading of cultural property is rapid circulation of information between Interpol member countries, which will require development of an internet based communication system as well as more effective deployment of legislation to prevent trading of illicitly acquired cultural property, subscription to international conventions and cataloguing collections.

The Relationship between Daesoon Thought and Prophecies of Jeong Gam: Emphasizing the Chinese Poetic Sources Transfigured by Jeungsan (대순사상과 『정감록』의 관계 - 증산이 변용한 한시 전거(典據)를 중심으로 -)

  • Park, Sang-kyu
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.36
    • /
    • pp.1-34
    • /
    • 2020
  • It has been suggested that Jeungsan's prophetic poem that starts with the verse "For about seven or eight years, there will be a castle in the ancient country [七八年間古國城] ⋯" originally comes from Prophecies of Jeong Gam (鄭鑑錄). Despite Jeungsan, himself, obviously having been critical of that text, this claim has become the basic grounds for discourse suggesting that Jeungsan was not only interested in Prophecies of Jeong Gam but also considerably influenced by the text. However, the claim itself was formulated due to misunderstandings of the Chinese poems that had been included in A Compilation of Secret Prophecies Hidden in the Family-clan of Seogye (西溪家臧訣). These poems pursue a different ideological orientation than the poem from Prophecies of Jeong Gam. Ultimately, the Chinese poem in the verse 84 the chapter titled, Prophetic Elucidations in The Canonical Scripture of Daesoon Jinrihoe cannot provide a basis for the claim that Jeungsan was strongly influenced by Prophecies of Jeong Gam. This claim that Prophecies of Jeong Gam made a deep impact on Jeungsan and Daesoon Thought was based on three other texts outside of those that appear within verse 84 of Prophetic Elucidations. The first supposedly-related line is: "Heaven opens at the period of the Rat (Ja 子), Earth opens at the period of the Ox (Chuk 丑), humankind starts at the period of the Tiger (Ihn 寅)." This line comes from from Shao Kangjie's Book of Supreme World Ordering Principles (皇極經世), and the line could be quoted idiomatically as an expression in the Joseon Dynasty. Accordingly, attempts to relate Daesoon Thought to Prophecies of Jeong Gam are a distortion that arise from the assumption that Jeungsan had a significant interest in Prophecies of Jeong Gam. The second related line is "At the foot of Mount Mother (母岳山), a golden icon of Buddha has the ability to speak [母岳山下 金佛能言]." That line is nearly identical to the verse "On the summit of Mount Mother, a golden icon of Buddha has the ability to speak [母岳山頭 金佛能言]." Yet, Jeungsan changed '頭 (du, the summit)' to '下 (ha, the foot or under)' and express his own unique religious prophecy. This allusion to the prophecies of Jeong Gam is actually a criticism designed to disprove the earlier prophecy. Third, is the verse, "The form of Buddhism, creation of daoism, and propriety of Confucianism [佛之形體仙之造化儒之凡節]," which is characteristically related to Daesoon Thought. This verse can only be found in the prophetic text, Prophecies of Chochang (蕉蒼訣), and it is provided a main source when alleging that Prophecies of Jeong Gam was an influence on Daesoon Thought. However, considering the context of Prophecies of Chochang and the year of its publication (it is assumed to be compiled after 1950s), this does not hold water as Jeungsan had already passed into Heaven several decades before that time. This disqualifies the verse from being a basis for asserting Prophecies of Jeong Gam as an influence on Daesoon Thought. Contrary to the original assertion, there is a considerable amount of evidence that Prophecies of Chochang absorbed aspects of Daesoon Thought, which were simply revised in a novel way. There is no truly compelling evidence underpinning the argument that Prophecies of Jeong Gam had a unilateral impact on Daesoon Thought. There seems to be a great deal of confusion and numerous misinterpretations on this matter. Therefore, the claim that Daesoon Thought, as developed by Jeungsan, was influenced by the discourse on dynastic revolution and feng shui contained in Prophecies of Jeong Gam should be re-examined at the level of its very premise.

Optimization of Cultivational Conditions of Rice(Oryza sativa L.) by a Central Composite Design Applied to an Early Cultivar in Southern Region (중심합성계획법에 의한 남부 조생벼 재배요인의 최적조건 구명)

  • Shon, Gil-Man;Kim, Jeung-Kyo;Choe, Zhin-Ryong;Lee, Yu-Sik;Park, Joong-Yang
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.34 no.1
    • /
    • pp.60-73
    • /
    • 1989
  • Two field experiments were carried out to assess the applicability of a central composite design (CCD) in determining optimum culture condition of an early rice cultivar, Unbongbyeo in southern Korea. A central composite design with two replicates was applied to five levels of five factors such as the number of hills per 3.3m2, the number of seedlings per hill, the levels of nitrogen, the transplanting date and the seedling age (Experiment 1). The levels of planting density were ranged from 30 hills to 150 hills per 3.3m2 ; the number of seedlings per hill from 1 seedling to 9 seedlings per hill; the levels of nitrogen application from 1 kg/l0a to 21 kg/l0a; the transplanting date from June 15 to July 5; the seedling age from 25 days to 45 days. A fractional factorial design was applied to three levels of five factors tested in CCD (Experiment 2). Yield per hill and per unit area were examined and the results obtained from both experiments were compared. The benefits from the central composite design were discussed. Maximum yield of brown rice per unit area was obtained at the combination of the central levels of one of five factors when the other four factors were fixed at central point. Furthermore, brown rice yield per unit area affected by interaction of two factors was maximized at the central point when the remain three factors being fixed at the central level. The responses of five factors to brown rice yield per hill and unit area were found to be a saddle point in both designs. Actual values of the stationary points were 107 hills per 3.3 m2, 4 seedlings per hill, 10 kg nitrogen per l0a, transplanting date of rice on June 26 and 33 days of seedling age in the central composite design. Brown rice yield per unit area at the stationary points were estimated 439 kg/l0a in the central composite design and 442 kg/l0a in the fractional factorial design. Considering the number of experimental treatment combinations, the central composite design was rather convenient in reducing the number of treatment combinations for similar information. It was more convenient for an experimenter to present the results from the central composite design than those from the fractional factorial design. Considering the optimum yields of brown rice per unit area at the stationary points being verified as saddle points in both designs. inter-heterogeneity of each of the factors should be avoided in setting up factors in pursuit of inducing unidirectional response of the factors to yield. Even though both the lower and higher levels in the central composite design being beyond the region of an experimenter's interest. they were considered highly valued in interpretation of the results. Conclusively. the central composite design was found to be more beneficial to optimize culture condition of paddy rice even with several levels of various factors were involved.

  • PDF

Perceptional Change of a New Product, DMB Phone

  • Kim, Ju-Young;Ko, Deok-Im
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.3
    • /
    • pp.59-88
    • /
    • 2008
  • Digital Convergence means integration between industry, technology, and contents, and in marketing, it usually comes with creation of new types of product and service under the base of digital technology as digitalization progress in electro-communication industries including telecommunication, home appliance, and computer industries. One can see digital convergence not only in instruments such as PC, AV appliances, cellular phone, but also in contents, network, service that are required in production, modification, distribution, re-production of information. Convergence in contents started around 1990. Convergence in network and service begins as broadcasting and telecommunication integrates and DMB(digital multimedia broadcasting), born in May, 2005 is the symbolic icon in this trend. There are some positive and negative expectations about DMB. The reason why two opposite expectations exist is that DMB does not come out from customer's need but from technology development. Therefore, customers might have hard time to interpret the real meaning of DMB. Time is quite critical to a high tech product, like DMB because another product with same function from different technology can replace the existing product within short period of time. If DMB does not positioning well to customer's mind quickly, another products like Wibro, IPTV, or HSPDA could replace it before it even spreads out. Therefore, positioning strategy is critical for success of DMB product. To make correct positioning strategy, one needs to understand how consumer interprets DMB and how consumer's interpretation can be changed via communication strategy. In this study, we try to investigate how consumer perceives a new product, like DMB and how AD strategy change consumer's perception. More specifically, the paper segment consumers into sub-groups based on their DMB perceptions and compare their characteristics in order to understand how they perceive DMB. And, expose them different printed ADs that have messages guiding consumer think DMB in specific ways, either cellular phone or personal TV. Research Question 1: Segment consumers according to perceptions about DMB and compare characteristics of segmentations. Research Question 2: Compare perceptions about DMB after AD that induces categorization of DMB in direction for each segment. If one understand and predict a direction in which consumer perceive a new product, firm can select target customers easily. We segment consumers according to their perception and analyze characteristics in order to find some variables that can influence perceptions, like prior experience, usage, or habit. And then, marketing people can use this variables to identify target customers and predict their perceptions. If one knows how customer's perception is changed via AD message, communication strategy could be constructed properly. Specially, information from segmented customers helps to develop efficient AD strategy for segment who has prior perception. Research framework consists of two measurements and one treatment, O1 X O2. First observation is for collecting information about consumer's perception and their characteristics. Based on first observation, the paper segment consumers into two groups, one group perceives DMB similar to Cellular phone and the other group perceives DMB similar to TV. And compare characteristics of two segments in order to find reason why they perceive DMB differently. Next, we expose two kinds of AD to subjects. One AD describes DMB as Cellular phone and the other Ad describes DMB as personal TV. When two ADs are exposed to subjects, consumers don't know their prior perception of DMB, in other words, which subject belongs 'similar-to-Cellular phone' segment or 'similar-to-TV' segment? However, we analyze the AD's effect differently for each segment. In research design, final observation is for investigating AD effect. Perception before AD is compared with perception after AD. Comparisons are made for each segment and for each AD. For the segment who perceives DMB similar to TV, AD that describes DMB as cellular phone could change the prior perception. And AD that describes DMB as personal TV, could enforce the prior perception. For data collection, subjects are selected from undergraduate students because they have basic knowledge about most digital equipments and have open attitude about a new product and media. Total number of subjects is 240. In order to measure perception about DMB, we use indirect measurement, comparison with other similar digital products. To select similar digital products, we pre-survey students and then finally select PDA, Car-TV, Cellular Phone, MP3 player, TV, and PSP. Quasi experiment is done at several classes under instructor's allowance. After brief introduction, prior knowledge, awareness, and usage about DMB as well as other digital instruments is asked and their similarities and perceived characteristics are measured. And then, two kinds of manipulated color-printed AD are distributed and similarities and perceived characteristics for DMB are re-measured. Finally purchase intension, AD attitude, manipulation check, and demographic variables are asked. Subjects are given small gift for participation. Stimuli are color-printed advertising. Their actual size is A4 and made after several pre-test from AD professionals and students. As results, consumers are segmented into two subgroups based on their perceptions of DMB. Similarity measure between DMB and cellular phone and similarity measure between DMB and TV are used to classify consumers. If subject whose first measure is less than the second measure, she is classified into segment A and segment A is characterized as they perceive DMB like TV. Otherwise, they are classified as segment B, who perceives DMB like cellular phone. Discriminant analysis on these groups with their characteristics of usage and attitude shows that Segment A knows much about DMB and uses a lot of digital instrument. Segment B, who thinks DMB as cellular phone doesn't know well about DMB and not familiar with other digital instruments. So, consumers with higher knowledge perceive DMB similar to TV because launching DMB advertising lead consumer think DMB as TV. Consumers with less interest on digital products don't know well about DMB AD and then think DMB as cellular phone. In order to investigate perceptions of DMB as well as other digital instruments, we apply Proxscal analysis, Multidimensional Scaling technique at SPSS statistical package. At first step, subjects are presented 21 pairs of 7 digital instruments and evaluate similarity judgments on 7 point scale. And for each segment, their similarity judgments are averaged and similarity matrix is made. Secondly, Proxscal analysis of segment A and B are done. At third stage, get similarity judgment between DMB and other digital instruments after AD exposure. Lastly, similarity judgments of group A-1, A-2, B-1, and B-2 are named as 'after DMB' and put them into matrix made at the first stage. Then apply Proxscal analysis on these matrixes and check the positional difference of DMB and after DMB. The results show that map of segment A, who perceives DMB similar as TV, shows that DMB position closer to TV than to Cellular phone as expected. Map of segment B, who perceive DMB similar as cellular phone shows that DMB position closer to Cellular phone than to TV as expected. Stress value and R-square is acceptable. And, change results after stimuli, manipulated Advertising show that AD makes DMB perception bent toward Cellular phone when Cellular phone-like AD is exposed, and that DMB positioning move towards Car-TV which is more personalized one when TV-like AD is exposed. It is true for both segment, A and B, consistently. Furthermore, the paper apply correspondence analysis to the same data and find almost the same results. The paper answers two main research questions. The first one is that perception about a new product is made mainly from prior experience. And the second one is that AD is effective in changing and enforcing perception. In addition to above, we extend perception change to purchase intention. Purchase intention is high when AD enforces original perception. AD that shows DMB like TV makes worst intention. This paper has limitations and issues to be pursed in near future. Methodologically, current methodology can't provide statistical test on the perceptual change, since classical MDS models, like Proxscal and correspondence analysis are not probability models. So, a new probability MDS model for testing hypothesis about configuration needs to be developed. Next, advertising message needs to be developed more rigorously from theoretical and managerial perspective. Also experimental procedure could be improved for more realistic data collection. For example, web-based experiment and real product stimuli and multimedia presentation could be employed. Or, one can display products together in simulated shop. In addition, demand and social desirability threats of internal validity could influence on the results. In order to handle the threats, results of the model-intended advertising and other "pseudo" advertising could be compared. Furthermore, one can try various level of innovativeness in order to check whether it make any different results (cf. Moon 2006). In addition, if one can create hypothetical product that is really innovative and new for research, it helps to make a vacant impression status and then to study how to form impression in more rigorous way.

  • PDF

A Study on the Effect of Booth Recommendation System on Exhibition Visitors Unplanned Visit Behavior (전시장 참관객의 계획되지 않은 방문행동에 있어서 부스추천시스템의 영향에 대한 연구)

  • Chung, Nam-Ho;Kim, Jae-Kyung
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.175-191
    • /
    • 2011
  • With the MICE(Meeting, Incentive travel, Convention, Exhibition) industry coming into the spotlight, there has been a growing interest in the domestic exhibition industry. Accordingly, in Korea, various studies of the industry are being conducted to enhance exhibition performance as in the United States or Europe. Some studies are focusing particularly on analyzing visiting patterns of exhibition visitors using intelligent information technology in consideration of the variations in effects of watching exhibitions according to the exhibitory environment or technique, thereby understanding visitors and, furthermore, drawing the correlations between exhibiting businesses and improving exhibition performance. However, previous studies related to booth recommendation systems only discussed the accuracy of recommendation in the aspect of a system rather than determining changes in visitors' behavior or perception by recommendation. A booth recommendation system enables visitors to visit unplanned exhibition booths by recommending visitors suitable ones based on information about visitors' visits. Meanwhile, some visitors may be satisfied with their unplanned visits, while others may consider the recommending process to be cumbersome or obstructive to their free observation. In the latter case, the exhibition is likely to produce worse results compared to when visitors are allowed to freely observe the exhibition. Thus, in order to apply a booth recommendation system to exhibition halls, the factors affecting the performance of the system should be generally examined, and the effects of the system on visitors' unplanned visiting behavior should be carefully studied. As such, this study aims to determine the factors that affect the performance of a booth recommendation system by reviewing theories and literature and to examine the effects of visitors' perceived performance of the system on their satisfaction of unplanned behavior and intention to reuse the system. Toward this end, the unplanned behavior theory was adopted as the theoretical framework. Unplanned behavior can be defined as "behavior that is done by consumers without any prearranged plan". Thus far, consumers' unplanned behavior has been studied in various fields. The field of marketing, in particular, has focused on unplanned purchasing among various types of unplanned behavior, which has been often confused with impulsive purchasing. Nevertheless, the two are different from each other; while impulsive purchasing means strong, continuous urges to purchase things, unplanned purchasing is behavior with purchasing decisions that are made inside a store, not before going into one. In other words, all impulsive purchases are unplanned, but not all unplanned purchases are impulsive. Then why do consumers engage in unplanned behavior? Regarding this question, many scholars have made many suggestions, but there has been a consensus that it is because consumers have enough flexibility to change their plans in the middle instead of developing plans thoroughly. In other words, if unplanned behavior costs much, it will be difficult for consumers to change their prearranged plans. In the case of the exhibition hall examined in this study, visitors learn the programs of the hall and plan which booth to visit in advance. This is because it is practically impossible for visitors to visit all of the various booths that an exhibition operates due to their limited time. Therefore, if the booth recommendation system proposed in this study recommends visitors booths that they may like, they can change their plans and visit the recommended booths. Such visiting behavior can be regarded similarly to consumers' visit to a store or tourists' unplanned behavior in a tourist spot and can be understand in the same context as the recent increase in tourism consumers' unplanned behavior influenced by information devices. Thus, the following research model was established. This research model uses visitors' perceived performance of a booth recommendation system as the parameter, and the factors affecting the performance include trust in the system, exhibition visitors' knowledge levels, expected personalization of the system, and the system's threat to freedom. In addition, the causal relation between visitors' satisfaction of their perceived performance of the system and unplanned behavior and their intention to reuse the system was determined. While doing so, trust in the booth recommendation system consisted of 2nd order factors such as competence, benevolence, and integrity, while the other factors consisted of 1st order factors. In order to verify this model, a booth recommendation system was developed to be tested in 2011 DMC Culture Open, and 101 visitors were empirically studied and analyzed. The results are as follows. First, visitors' trust was the most important factor in the booth recommendation system, and the visitors who used the system perceived its performance as a success based on their trust. Second, visitors' knowledge levels also had significant effects on the performance of the system, which indicates that the performance of a recommendation system requires an advance understanding. In other words, visitors with higher levels of understanding of the exhibition hall learned better the usefulness of the booth recommendation system. Third, expected personalization did not have significant effects, which is a different result from previous studies' results. This is presumably because the booth recommendation system used in this study did not provide enough personalized services. Fourth, the recommendation information provided by the booth recommendation system was not considered to threaten or restrict one's freedom, which means it is valuable in terms of usefulness. Lastly, high performance of the booth recommendation system led to visitors' high satisfaction levels of unplanned behavior and intention to reuse the system. To sum up, in order to analyze the effects of a booth recommendation system on visitors' unplanned visits to a booth, empirical data were examined based on the unplanned behavior theory and, accordingly, useful suggestions for the establishment and design of future booth recommendation systems were made. In the future, further examination should be conducted through elaborate survey questions and survey objects.

Liability of the Compensation for Damage Caused by the International Passenger's Carrier by Air in Montreal Convention (몬트리올조약에 있어 국제항공여객운송인의 손해배상책임)

  • Kim, Doo-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.9-39
    • /
    • 2003
  • The rule of the Warsaw Convention of 1929 are well known and still being all over the world. The Warsaw Convention is undoubtedly the most widely accepted private international air law treaty with some 140 countries. In the international legal system for air transportation, the Warsaw Convention has played a major role for more than half century, and has been revised many times in consideration of the rapid developments of air high technology, changes of social and economic circumstances, need for the protection of passengers. Some amendments became effective, but others are still not effective. As a result, the whole international legal system for air transportation is at past so complicated and tangled. However, the 'Warsaw system' consists of the Warsaw Convention of 1929 the Guadalajara Convention of 1961, a supplementary convention, and the following six protocols: (1) the Hague Protocol of 1955, (2) the Guatemala Protocol of 1971, (3) the Montreal Additional Protocols, No.1, (4) the Montreal Additional Protocol No.2, (5) the Montreal Additional Protocol No.3, and (6) the Montreal Additional Protocol No.4. of 1975. As a fundamental principle of the air carrier's liability in the international convention and protocols, for instance in the Warsaw Convention and the Hague Protocol, the principle of limited liability and a presumed fault system has been adopted. Subsequently, the Montreal Inter-carrier Agreement of 1966, the Guatemala City Protocol, the Montreal Additional Protocol No.3, and the Montreal Additional Protocol No. 4 of 1975 maintained the limited liability, but substituted the presumed liability system by an absolute liability, that is, strict liability system. The Warsaw System, which sets relatively low compensation limits for victims of aircraft accidents and regulates the limited liability for death and injury of air passengers, had become increasingly outdated. Japanese Airlines and Inter-carrier Agreement of International Air Transport Association in 1995 has been adopted the unlimited liability of air carrier in international flight. The IATA Inter-Carrier Agreement, in which airlines in international air transportation agree to waive the limit of damages, was long and hard in coming, but it was remarkable achievement given the political and economic realities of the world. IATA deserves enormous credit for bringing it about. The Warsaw System is controversial and questionable. In order to find rational solution to disputes between nations which adopted differing liability systems in international air transportation, we need to reform the liability of air carriers the 'Warsaw system' and fundamentally, to unify the liability system among the nations. The International Civil Aviation Organization(ICAO) will therefore reinforce its efforts to further promote a legal environment that adequately reflects the public interest and the needs of the parties involved. The ICAO Study Group met in April, 1998, together with the Drafting Committee. The time between the "Special Group on the Modernization and Consolidation of the 'Warsaw system'(SGMW)" and the Diplomatic Conference must be actively utilized to arrange for profound studies of the outstanding issues and for wide international consultations with a view to narrowing the scope of differences and preparing for a global international consensus. From 11 to 28 May 1999 the ICAO Headquarters at Montreal hosted a Diplomatic Conference convened to consider, with a view to adoption, a draft Convention intended to modernize and to integrate replace the instruments of the Warsaw system. The Council of ICAO convened this Conference under the Procedure for the Adoption of International Conventions. Some 525 participants from 121 Contracting States of ICAO attended, one non-contracting State, 11 observer delegations from international organizations, a total of 544 registered participants took part in the historic three-week conference which began on 10 May. The Conference was a success since it adopted a new Convention for the Unification of Certain Rules for International Carriage by Air. The 1999 Montreal Convention, created and signed by representatives of 52 countries at an international conference convened by ICAO at Montreal on May 28, 1999, came into effect on November 4, 2003. Representatives of 30 countries have now formally ratified the Convention under their respective national procedures and ratification of the United States, which was the 30th country to ratify, took place on September 5, 2003. Under Article 53.6 of the Montreal Convention, it enters into force on the 60th day following the deposit of the 30th instrument of ratification or acceptation. The United States' ratification was deposited with ICAO on September 5, 2003. The ICAO have succeeded in modernizing and consolidating a 70-year old system of international instruments of private international law into one legal instrument that will provide, for years to come, an adequate level of compensation for those involved in international aircraft accidents. An international diplomatic conference on air law by ICAO of 1999 succeeded in adopting a new regime for air carrier liability, replacing the Warsaw Convention and five other related legal instruments with a single convention that provided for unlimited liability in relation to passengers. Victims of international air accidents and their families will be better protected and compensated under the new Montreal Convention, which modernizes and consolidates a seventy-five year old system of international instruments of private international law into one legal instrument. A major feature of the new legal instrument is the concept of unlimited liability. Whereas the Warsaw Convention set a limit of 125,000 Gold Francs (approximately US$ 8,300) in case of death or injury to passengers, the Montreal Convention introduces a two-tier system. The first tier includes strict liability up to l00,000 Special Drawing Rights (SDR: approximately US$ 135,000), irrespective of a carrier's fault. The second tier is based on presumption of fault of a carrier and has no limit of liability. The 1999 Montreal Convention also includes the following main elements; 1. In cases of aircraft accidents, air carriers are called upon to provide advance payments, without delay, to assist entitled persons in meeting immediate economic needs; the amount of this initial payment will be subject to national law and will be deductable from the final settlement; 2. Air carriers must submit proof of insurance, thereby ensuring the availability of financial resources in cases of automatic payments or litigation; 3. The legal action for damages resulting from the death or injury of a passenger may be filed in the country where, at the time of the accident, the passenger had his or her principal and permanent residence, subject to certain conditions. The new Montreal Convention of 1999 included the 5th jurisdiction - the place of residence of the claimant. The acceptance of the 5th jurisdiction is a diplomatic victory for the US and it can be realistically expected that claimants' lawyers will use every opportunity to file the claim in the US jurisdiction - it brings advantages in the liberal system of discovery, much wider scope of compensable non-economic damages than anywhere else in the world and the jury system prone to very generous awards. 4. The facilitation in the recovery of damages without the need for lengthy litigation, and simplification and modernization of documentation related to passengers. In developing this new Montreal Convention, we were able to reach a delicate balance between the needs and interests of all partners in international civil aviation, States, the travelling public, air carriers and the transport industry. Unlike the Warsaw Convention, the threshold of l00,000 SDR specified by the Montreal Convention, as well as remaining liability limits in relation to air passengers and delay, are subject to periodic review and may be revised once every five years. The primary aim of unification of private law as well as the new Montreal Convention is not only to remove or to minimize the conflict of laws but also to avoid conflict of jurisdictions. In order to find a rational solution to disputes between nations which have adopted differing liability systems in international air transport, we need fundamentally to reform their countries's domestic air law based on the new Montreal Convention. It is a desirable and necessary for us to ratify rapidly the new Montreal Convention by the contracting states of lCAO including the Republic of Korea. According to the Korean and Japanese ideas, airlines should not only pay compensation to passengers immediately after the accident, but also the so-called 'condolence' money to the next of kin. Condolence money is a gift to help a dead person's spirit in the hereafter : it is given on account of the grief and sorrow suffered by the next of kin, and it has risen considerably over the years. The total amount of the Korean and Japanese claims in the case of death is calculated on the basis of the loss of earned income, funeral expenses and material demage (baggage etc.), plus condolence money. The economic and social change will be occurred continuously after conclusion of the new Montreal Convention. In addition, the real value of life and human right will be enhanced substantially. The amount of compensation for damage caused by aircraft accident has increased in dollar amount as well as in volume. All air carrier's liability should extend to loss of expectation of leisure activities, as well as to damage to property, and mental and physical injuries. When victims are not satisfied with the amount of the compensation for damage caused by aircraft accident for which an airline corporation is liable under the current liability system. I also would like to propose my opinion that it is reasonable and necessary for us to interpret broadly the meaning of the bodily injury on Article 17 of the new Montreal Convention so as to be included the mental injury and condolence. Furthermore, Korea and Japan has not existed the Air Transport Act regulated the civil liability of air carrier such as Air Transport Act (Luftverkehrsgestz) in Germany. It is necessary for us to enact "the Korean Air Transport Contract Act (provisional title)" in order to regulate the civil liability of air carrier including the protection of the victims and injured persons caused by aircraft accident.

  • PDF