• Title/Summary/Keyword: Online Network

Search Result 1,282, Processing Time 0.024 seconds

A Study on Recognition of Robot Barista Using Social Media Text Mining (소셜미디어 텍스트마이닝을 활용한 로봇 바리스타 인식 탐색 연구)

  • Han Jangheon;An Kabsoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.37-47
    • /
    • 2024
  • The food tech market, which uses artificial intelligence robots for the restaurant industry, is gradually expanding. Among them, the robot barista, a representative food tech case for the restaurant industry, is characterized by increasing the efficiency of operators and providing things for visitors to see and enjoy through a 24-hour unmanned operation. This research was conducted through text mining analysis to examine trends related to robot baristas in the restaurant industry. The research results are as follows. First, keywords such as coffee, cafe, certification, ordering, taste, interest, people, robot cafe, coffee barista expert, free, course, unmanned, and wine sommelier were highly frequent. Second, time, variety, possibility, people, process, operation, service, and thought showed high closeness centrality. Third, as a result of CONCOR analysis, a total of 5 keyword clusters with high relevance to the restaurant industry were formed. In order to activate robot barista in the future, it is necessary to pay more attention to functional development that can strengthen its functions and features, as well as online promotion through various events and SNS in the robot barista cafe.

Crowd Psychological and Emotional Computing Based on PSMU Algorithm

  • Bei He
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2119-2136
    • /
    • 2024
  • The rapid progress of social media allows more people to express their feelings and opinions online. Many data on social media contains people's emotional information, which can be used for people's psychological analysis and emotional calculation. This research is based on the simplified psychological scale algorithm of multi-theory integration. It aims to accurately analyze people's psychological emotion. According to the comparative analysis of algorithm performance, the results show that the highest recall rate of the algorithm in this study is 95%, while the highest recall rate of the item response theory algorithm and the social network analysis algorithm is 68% and 87%. The acceleration ratio and data volume of the research algorithm are analyzed. The results show that when 400,000 data are calculated in the Hadoop cluster and there are 8 nodes, the maximum acceleration ratio is 40%. When the data volume is 8GB, the maximum scale ratio of 8 nodes is 43%. Finally, we carried out an empirical analysis on the model that compute the population's psychological and emotional conditions. During the analysis, the psychological simplification scale algorithm was adopted and multiple theories were taken into account. Then, we collected negative comments and expressions about Japan's discharge of radioactive water in microblog and compared them with the trend derived by the model. The results were consistent. Therefore, this research model has achieved good results in the emotion classification of microblog comments.

The Relationships among Social Influence, Use-Diffusion, Continued Usage and Brand Switching Intention of Mobile Services (사회적 영향력과 모바일 서비스의 사용-확산, 그리고 지속적 사용 및 상표 전환의도 간의 관계에 대한 연구)

  • Sang-Hoon Kim;Hyun Jung Park;Bang-Hyung Lee
    • Asia Marketing Journal
    • /
    • v.12 no.3
    • /
    • pp.1-24
    • /
    • 2010
  • Typically, marketing literature on innovation diffusion has focused on the pre-adoption process and only a few studies explicitly examined consumers' post-adoption behavior of innovative mobile services. Besides, prior use diffusion research has considered the variables that determine the consumers' initial adoption in explaining the post adoption usage behavior. However, behavioral sciences and individual psychology suggest that social influences are a potentially important determinant of usage behavior as well. The purpose of this study is to investigate into the effects of network factor and brand identification as social influences on the consumers' use diffusion or continued usage intention of a mobile service. Network factor designates consumer perception of the usefulness of a network, which embraces the concept of network externality and that of critical mass. Brand identification captures distinct aspects of social influence on technology acceptance that is not captured by subjective norm in situations where the technology use is voluntary. Additionally, this study explores the effect of the use diffusion on the brand switching intention, a generally unexplored form of post-adoption behavior. There are only a few empirical studies in the literature addressing the issue of IT user switching. In this study, the use diffusion comprises of rate of use and variety of use. The research hypotheses are as follows; H1. Network factor will have a positive influence on the rate of use of mobile services. H2. Network factor will have a positive influence on variety of use of mobile services. H3. Network factor will have a positive influence on continued usage intention. H4. Brand identification will have a positive influence on the rate of use. H5. Brand identification will have a positive influence on variety of use. H6. Brand identification will have a positive influence on continued usage intention. H7. Rate of use of mobile services are positively related to continued usage intention. H8. Variety of Use of mobile services are positively related to continued usage intention. H9. Rate of use of mobile services are negatively related to brand switching intention. H10. Variety of Use of mobile services are negatively related to brand switching intention. With the assistance of a marketing service company, a total of 1023 questionnaires from an online survey were collected. The survey was conducted only on those who have received or given a mobile service called "Gifticon". Those who answered insincerely were excluded from the analysis, so we had 936 observations available for a further stage of data analysis. We used structural equation modeling and overall fit was good enough (CFI=0.933, TLI=0.903, RMSEA=0.081). The results show that network factor and brand identification significantly increase the rate of use. But only brand identification increases variety of use. Also, network factor, brand identification and the use diffusion are positively related to continued usage intention. But the hypotheses that the use diffusion are positively related to brand switching intention were rejected. This result implies that continued usage intention cannot guarantee reducing brand switching intention.

  • PDF

Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window (랜드마크 윈도우 기반의 빈발 패턴 마이닝 기법의 분석 및 성능평가)

  • Pyun, Gwangbum;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.101-107
    • /
    • 2014
  • With the development of online service, recent forms of databases have been changed from static database structures to dynamic stream database structures. Previous data mining techniques have been used as tools of decision making such as establishment of marketing strategies and DNA analyses. However, the capability to analyze real-time data more quickly is necessary in the recent interesting areas such as sensor network, robotics, and artificial intelligence. Landmark window-based frequent pattern mining, one of the stream mining approaches, performs mining operations with respect to parts of databases or each transaction of them, instead of all the data. In this paper, we analyze and evaluate the techniques of the well-known landmark window-based frequent pattern mining algorithms, called Lossy counting and hMiner. When Lossy counting mines frequent patterns from a set of new transactions, it performs union operations between the previous and current mining results. hMiner, which is a state-of-the-art algorithm based on the landmark window model, conducts mining operations whenever a new transaction occurs. Since hMiner extracts frequent patterns as soon as a new transaction is entered, we can obtain the latest mining results reflecting real-time information. For this reason, such algorithms are also called online mining approaches. We evaluate and compare the performance of the primitive algorithm, Lossy counting and the latest one, hMiner. As the criteria of our performance analysis, we first consider algorithms' total runtime and average processing time per transaction. In addition, to compare the efficiency of storage structures between them, their maximum memory usage is also evaluated. Lastly, we show how stably the two algorithms conduct their mining works with respect to the databases that feature gradually increasing items. With respect to the evaluation results of mining time and transaction processing, hMiner has higher speed than that of Lossy counting. Since hMiner stores candidate frequent patterns in a hash method, it can directly access candidate frequent patterns. Meanwhile, Lossy counting stores them in a lattice manner; thus, it has to search for multiple nodes in order to access the candidate frequent patterns. On the other hand, hMiner shows worse performance than that of Lossy counting in terms of maximum memory usage. hMiner should have all of the information for candidate frequent patterns to store them to hash's buckets, while Lossy counting stores them, reducing their information by using the lattice method. Since the storage of Lossy counting can share items concurrently included in multiple patterns, its memory usage is more efficient than that of hMiner. However, hMiner presents better efficiency than that of Lossy counting with respect to scalability evaluation due to the following reasons. If the number of items is increased, shared items are decreased in contrast; thereby, Lossy counting's memory efficiency is weakened. Furthermore, if the number of transactions becomes higher, its pruning effect becomes worse. From the experimental results, we can determine that the landmark window-based frequent pattern mining algorithms are suitable for real-time systems although they require a significant amount of memory. Hence, we need to improve their data structures more efficiently in order to utilize them additionally in resource-constrained environments such as WSN(Wireless sensor network).

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.

A Study on the Effect of Network Centralities on Recommendation Performance (네트워크 중심성 척도가 추천 성능에 미치는 영향에 대한 연구)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.23-46
    • /
    • 2021
  • Collaborative filtering, which is often used in personalization recommendations, is recognized as a very useful technique to find similar customers and recommend products to them based on their purchase history. However, the traditional collaborative filtering technique has raised the question of having difficulty calculating the similarity for new customers or products due to the method of calculating similaritiesbased on direct connections and common features among customers. For this reason, a hybrid technique was designed to use content-based filtering techniques together. On the one hand, efforts have been made to solve these problems by applying the structural characteristics of social networks. This applies a method of indirectly calculating similarities through their similar customers placed between them. This means creating a customer's network based on purchasing data and calculating the similarity between the two based on the features of the network that indirectly connects the two customers within this network. Such similarity can be used as a measure to predict whether the target customer accepts recommendations. The centrality metrics of networks can be utilized for the calculation of these similarities. Different centrality metrics have important implications in that they may have different effects on recommended performance. In this study, furthermore, the effect of these centrality metrics on the performance of recommendation may vary depending on recommender algorithms. In addition, recommendation techniques using network analysis can be expected to contribute to increasing recommendation performance even if they apply not only to new customers or products but also to entire customers or products. By considering a customer's purchase of an item as a link generated between the customer and the item on the network, the prediction of user acceptance of recommendation is solved as a prediction of whether a new link will be created between them. As the classification models fit the purpose of solving the binary problem of whether the link is engaged or not, decision tree, k-nearest neighbors (KNN), logistic regression, artificial neural network, and support vector machine (SVM) are selected in the research. The data for performance evaluation used order data collected from an online shopping mall over four years and two months. Among them, the previous three years and eight months constitute social networks composed of and the experiment was conducted by organizing the data collected into the social network. The next four months' records were used to train and evaluate recommender models. Experiments with the centrality metrics applied to each model show that the recommendation acceptance rates of the centrality metrics are different for each algorithm at a meaningful level. In this work, we analyzed only four commonly used centrality metrics: degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality. Eigenvector centrality records the lowest performance in all models except support vector machines. Closeness centrality and betweenness centrality show similar performance across all models. Degree centrality ranking moderate across overall models while betweenness centrality always ranking higher than degree centrality. Finally, closeness centrality is characterized by distinct differences in performance according to the model. It ranks first in logistic regression, artificial neural network, and decision tree withnumerically high performance. However, it only records very low rankings in support vector machine and K-neighborhood with low-performance levels. As the experiment results reveal, in a classification model, network centrality metrics over a subnetwork that connects the two nodes can effectively predict the connectivity between two nodes in a social network. Furthermore, each metric has a different performance depending on the classification model type. This result implies that choosing appropriate metrics for each algorithm can lead to achieving higher recommendation performance. In general, betweenness centrality can guarantee a high level of performance in any model. It would be possible to consider the introduction of proximity centrality to obtain higher performance for certain models.

The Analysis of the Successful Factors from User Side of MMORPG (사용자 측면에서의 MMORPG <월드 오브 워크래프트> 성공요인 분석)

  • Baek, Jaeyong;Kim, Kenneth Chi Ho
    • Cartoon and Animation Studies
    • /
    • s.42
    • /
    • pp.151-175
    • /
    • 2016
  • The game industry has evolved from mobile games to PC online games after the smart-phone industry was opened up. In this environment, the game industry has rather been negatively developing its commercials means than the sufficient fundamental entertainment to the users. Especially, many games were released with better graphic qualities yet poor originality, continuing to be popular without enhancing the market itself. Moreover, the user's recognition level has improved. The users share their online gaming experience easily with the development of network environment. They receive the feedbacks on the quality of the game through the online channels and media by sharing them together. The high margin of the game industry will lead to the negative feedbacks of the users, effecting them to critique the content although the market looks good for now. The game industry's evolution has to be reviewed in the perspective of users, to look back at the successful cases of the past before the mobile era by analyzing and indicating the quality of the games and content's direction. This research is focused on the success factors of from the user's point of view, which has been widely claimed as a popular game franchise publicly before the mobile games had risen. WOW has been the most successful MMORPG game with its user record of 1.2 million till now. For these reasons, this study analyzes 's success factors from the user's point of view by configuring five expert groups, sequentially applying expert group survey, interview, Jobs-to-be-done and Fishbein Model as UX methodologies based on the business model to see through its long term rein in the industry. Consequently, The success factors from the user side of MMORPG provides an opportunity for the users to interact deeply with the game by (1) using well designed 'world view' over 10 years, (2) providing 'national policy' that is based on the locations of the users' culture and language, (3) providing 'expansions' with changes in time to give the digging elements to the users.

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF