• 제목/요약/키워드: Potential Fields

검색결과 1,172건 처리시간 0.03초

딥러닝을 활용한 고대 수막새 이미지 분류 검토 (Application of Deep Learning for Classification of Ancient Korean Roof-end Tile Images)

  • 김영현
    • 헤리티지:역사와 과학
    • /
    • 제57권3호
    • /
    • pp.24-35
    • /
    • 2024
  • 최근 의료, 제조, 자율주행, 보안 등 다양한 분야에서 인공지능과 컨볼루션 신경망 등 딥러닝 기술을 활용한 연구들이 활발하게 진행되고 있으며, 사회 전반에 적지 않은 영향을 미치고 있다. 본 연구 또한 이러한 흐름에 맞춰서 고고학 유물 분류에 딥러닝을 활용해 보았다. 즉, 연구는 고고학 조사를 통해 출토된 고대 수막새의 이미지 분류에 딥러닝 기술을 적용하는 초보적 시도로서, 고구려, 백제, 신라 시대의 수막새 이미지를 CNN 모델로 학습시켜 분류를 진행하였다. 고구려, 백제, 신라 수막새 이미지 각각 100장씩 총 300장을 기반으로 기본 데이터셋을 형성하였고, 데이터 증강 기법을 활용하여 4배를 증가시킴으로써 총 1,200장을 데이터셋으로 구축하였다. 사전 훈련된 EfficientNetB0 모델의 전이학습을 통하여 모델을 구축한 후, 5겹 교차검증을 실시한 결과 평균 학습 정확도 98.06%, 검증 정확도 97.08%를 기록하였다. 또한 학습된 모델을 240장의 테스트 데이터셋으로 성능을 평가한 결과, 최소 91% 이상의 높은 정확도로 삼국의 수막새 이미지를 시대별로 구분할 수 있음을 확인하였다. 특히 학습률 0.0001에서 정확도 92.92%, 정밀도 92.96%, 재현율 92.92%, F1 점수 92.93%로 가장 우수한 성능을 보였는데, 이는 다양한 학습률 설정을 통하여 과적합과 과소적합 문제를 방지함과 동시에 최적의 매개변수를 찾는 과정에서 이루어졌다. 본 연구의 결과는 한국 고고학 자료의 분류에 딥러닝 기술 활용 가능성을 확인했다는 점에서 의의가 있다고 생각된다. 또한 기존에 축적·제작된 ImageNet 데이터셋 및 파라미터가 고고 자료 분석에도 긍정적으로 적용할 수 있음을 확인하였다. 이러한 접근은 향후 고고학 데이터베이스 축적이나 활용, 박물관의 유물 분류 및 정리 등 다양한 방식의 모델을 창출할 수 있을 것이다.

U-마켓에서의 사용자 정보보호를 위한 매장 추천방법 (A Store Recommendation Procedure in Ubiquitous Market for User Privacy)

  • 김재경;채경희;구자철
    • Asia pacific journal of information systems
    • /
    • 제18권3호
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Brief Introduction of Research Progresses in Control and Biocontrol of Clubroot Disease in China

  • He, Yueqiu;Wu, Yixin;He, Pengfei;Li, Xinyu
    • 한국균학회소식:학술대회논문집
    • /
    • 한국균학회 2015년도 춘계학술대회 및 임시총회
    • /
    • pp.45-46
    • /
    • 2015
  • Clubroot disease of crucifers has occurred since 1957. It has spread to the whole China, especially in the southwest and nourtheast where it causes 30-80% loss in some fields. The disease has being expanded in the recent years as seeds are imported and the floating seedling system practices. For its effective control, the Ministry of Agriculture of China set up a program in 2010 and a research team led by Dr. Yueqiu HE, Yunnan Agricultural University. The team includes 20 main reseachers of 11 universities and 5 institutions. After 5 years, the team has made a lot of progresses in disease occurrence regulation, resources collection, resistance identification and breeding, biological agent exploration, formulation, chemicals evaluation, and control strategy. About 1200 collections of local and commercial crucifers were identified in the field and by artificiall inoculation in the laboratories, 10 resistant cultivars were breeded including 7 Chinese cabbages and 3 cabbages. More than 800 antagostic strains were isolated including bacteria, stretomyces and fungi. Around 100 chemicals were evaluated in the field and greenhouse based on its control effect, among them, 6 showed high control effect, especially fluazinam and cyazofamid could control about 80% the disease. However, fluzinam has negative effect on soil microbes. Clubroot disease could not be controlled by bioagents and chemicals once when the pathogen Plasmodiophora brassicae infected its hosts and set up the parasitic relationship. We found the earlier the pathogent infected its host, the severer the disease was. Therefore, early control was the most effective. For Chinese cabbage, all controlling measures should be taken in the early 30 days because the new infection could not cause severe symptom after 30 days of seeding. For example, a biocontrol agent, Bacillus subtilis Strain XF-1 could control the disease 70%-85% averagely when it mixed with seedling substrate and was drenching 3 times after transplanting, i.e. immediately, 7 days, 14 days. XF-1 has been deeply researched in control mechanisms, its genome, and development and application of biocontrol formulate. It could produce antagonistic protein, enzyme, antibiotics and IAA, which promoted rhizogenesis and growth. Its The genome was sequenced by Illumina/Solexa Genome Analyzer to assembled into 20 scaffolds then the gaps between scaffolds were filled by long fragment PCR amplification to obtain complet genmone with 4,061,186 bp in size. The whole genome was found to have 43.8% GC, 108 tandem repeats with an average of 2.65 copies and 84 transposons. The CDSs were predicted as 3,853 in which 112 CDSs were predicted to secondary metabolite biosynthesis, transport and catabolism. Among those, five NRPS/PKS giant gene clusters being responsible for the biosynthesis of polyketide (pksABCDEFHJLMNRS in size 72.9 kb), surfactin(srfABCD, 26.148 kb, bacilysin(bacABCDE 5.903 kb), bacillibactin(dhbABCEF, 11.774 kb) and fengycin(ppsABCDE, 37.799 kb) have high homolgous to fuction confirmed biosynthesis gene in other strain. Moreover, there are many of key regulatory genes for secondary metabolites from XF-1, such as comABPQKX Z, degQ, sfp, yczE, degU, ycxABCD and ywfG. were also predicted. Therefore, XF-1 has potential of biosynthesis for secondary metabolites surfactin, fengycin, bacillibactin, bacilysin and Bacillaene. Thirty two compounds were detected from cell extracts of XF-1 by MALDI-TOF-MS, including one Macrolactin (m/z 441.06), two fusaricidin (m/z 850.493 and 968.515), one circulocin (m/z 852.509), nine surfactin (m/z 1044.656~1102.652), five iturin (m/z 1096.631~1150.57) and forty fengycin (m/z 1449.79~1543.805). The top three compositions types (contening 56.67% of total extract) are surfactin, iturin and fengycin, in which the most abundant is the surfactin type composition 30.37% of total extract and in second place is the fengycin with 23.28% content with rich diversity of chemical structure, and the smallest one is the iturin with 3.02% content. Moreover, the same main compositions were detected in Bacillus sp.355 which is also a good effects biocontol bacterial for controlling the clubroot of crucifer. Wherefore those compounds surfactin, iturin and fengycin maybe the main active compositions of XF-1 against P. brassicae. Twenty one fengycin type compounds were evaluate by LC-ESI-MS/MS with antifungal activities, including fengycin A $C_{16{\sim}C19}$, fengycin B $C_{14{\sim}C17}$, fengycin C $C_{15{\sim}C18}$, fengycin D $C_{15{\sim}C18}$ and fengycin S $C_{15{\sim}C18}$. Furthermore, one novel compound was identified as Dehydroxyfengycin $C_{17}$ according its MS, 1D and 2D NMR spectral data, which molecular weight is 1488.8480 Da and formula $C_{75}H_{116}N_{12}O_{19}$. The fengycin type compounds (FTCPs $250{\mu}g/mL$) were used to treat the resting spores of P. brassicae ($10^7/mL$) by detecting leakage of the cytoplasm components and cell destruction. After 12 h treatment, the absorbencies at 260 nm (A260) and at 280 nm (A280) increased gradually to approaching the maximum of absorbance, accompanying the collapse of P. brassicae resting spores, and nearly no complete cells were observed at 24 h treatment. The results suggested that the cells could be lyzed by the FTCPs of XF-1, and the diversity of FTCPs was mainly attributed to a mechanism of clubroot disease biocontrol. In the five selected medium MOLP, PSA, LB, Landy and LD, the most suitable for growth of strain medium is MOLP, and the least for strains longevity is the Landy sucrose medium. However, the lipopeptide highest yield is in Landy sucrose medium. The lipopeptides in five medium were analyzed with HPLC, and the results showed that lipopeptides component were same, while their contents from B. subtilis XF-1 fermented in five medium were different. We found that it is the lipopeptides content but ingredients of XF-1 could be impacted by medium and lacking of nutrition seems promoting lipopeptides secretion from XF-1. The volatile components with inhibition fungal Cylindrocarpon spp. activity which were collect in sealed vesel were detected with metheds of HS-SPME-GC-MS in eight biocontrol Bacillus species and four positive mutant strains of XF-1 mutagenized with chemical mutagens, respectively. They have same main volatile components including pyrazine, aldehydes, oxazolidinone and sulfide which are composed of 91.62% in XF-1, in which, the most abundant is the pyrazine type composition with 47.03%, and in second place is the aldehydes with 23.84%, and the third place is oxazolidinone with 15.68%, and the smallest ones is the sulfide with 5.07%.

  • PDF

웹기반 지능형 기술가치평가 시스템에 관한 연구 (A Study on Web-based Technology Valuation System)

  • 성태응;전승표;김상국;박현우
    • 지능정보연구
    • /
    • 제23권1호
    • /
    • pp.23-46
    • /
    • 2017
  • 2000년대 이전부터 북미 유럽의 선진국을 중심으로 특정 기업이나 사업(프로젝트)에 관한 가치를 평가하는 사례는 있어 왔으나, 개별 기술(특허)의 경제적 가치를 산정하는 체계나 방법론은 국내를 중심으로 최근 들어 활성화되어 왔다. 이러한 기술가치평가 분야는 기술이전(거래), 현물출자, 사업타당성 분석, 투자유치, 세무/소송 등의 다양한 용도로 활용되고 있다. 물론 기술보증기금의 KTRS, 발명진흥회의 SMART 3.1과 같이, 평가대상기술에 대한 기술력(등급) 평가 혹은 특허등급평가를 정성적으로 수행하는 온라인 시스템은 존재해 왔으나, 대상기술의 정량적인 가치금액까지 산출해 주는 웹기반 지능형 기술가치평가 시스템은 한국과학기술정보연구원(KISTI)에 의해 유일하게 개발 및 공식 오픈되어 확산 활용되고 있다. 본 고에서는 KISTI에서 개발 운영중인 웹기반 'STAR-Value' 시스템을 중심으로, 탑재된 방법론 및 평가모델의 유형, 이를 지원하는 참조정보 및 데이터베이스(D/B)가 어떻게 연계 활용되는지를 소개한다. 특히 미래에 발생할 경제적 수익을 추정하여 현재가치화하는 소득접근법 기반의 대표 모델인 현금흐름할인(DCF) 모델과 특정 로열티율을 기반으로 로열티수입료의 현재가치를 기술료 대가로 산정하는 로열티절감모델을 포함한 6개 모델, 그리고 관련 지원정보(기술수명, 기업(업종)재무정보, 할인율, 산업기술요소 등)의 데이터 기반 연계 방식에 대해 살펴본다. STAR-Value 시스템은 평가대상기술에 대한 국제특허분류(IPC) 혹은 한국표준산업분류(KSIC) 등의 분류 정보로부터 기술순환주기(TCT) 지수, 유사업종(혹은 유사기업)의 매출액 성장률 및 수익성 데이터, 업종별 가중평균자본비용(WACC) 및 산업기술요소 지수 등 메타데이터값을 자동적으로 불러오고 여기에 조정요인을 반영하여 기술가치의 산출결과가 높은 신뢰성 및 객관성을 가지도록 한다. 나아가 대상기술의 잠재적 시장규모와 해당 사업화주체의 시장점유율에 대한 정보까지 보유 재무데이터 기반으로 참조값을 제시하거나 기존에 완료된 평가사례 축적 기반으로 업종별 유사 기술의 가치범위값을 제시해 준다면, 본 시스템이 보다 지능형으로 지원 모듈을 연계 활용하고 실시간으로 손쉽게 고(高)정확도의 기술가치범위를 제시해 줄 수 있을 것으로 기대된다. 본 고에서는 웹기반 STAR-Value 시스템이 참조데이터 기반으로 지능형 연계를 수행하도록 해주는 모형선택 가이드라인 지원기능, 기술가치범위 추론 지원기능, 유사기업 선정 기반의 시장점유율 산정 지원기능의 내부 로직 구성을 설명한다. 상기 지원기능을 통해 비전문가(또는 초보자) 수준에서 최적의 평가모형 선택, 기술가치 범위 추론, 유사기업 선택 및 시장점유율 산정에 대한 정보지원이 데이터 사이언스 및 기계학습 기반으로 수행될 수 있다. 본 연구는 기술가치평가 분야의 이론적 타당성을 평가실무에서 활용할 수 있는 평가모델 및 지원정보를 실제 탑재한 웹기반 시스템의 소개에 의미가 있으며, 추가적으로 보다 객관적이고 손쉬운 지능형 지원시스템의 활용성을 높임으로써, 앞으로 기술사업화의 제 분야에서 다양하게 활용할 수 있을 것으로 기대된다.

Word2Vec을 활용한 제품군별 시장규모 추정 방법에 관한 연구 (A Study on Market Size Estimation Method by Product Group Using Word2Vec Algorithm)

  • 정예림;김지희;유형선
    • 지능정보연구
    • /
    • 제26권1호
    • /
    • pp.1-21
    • /
    • 2020
  • 인공지능 기술의 급속한 발전과 함께 빅데이터의 상당 부분을 차지하는 비정형 텍스트 데이터로부터 의미있는 정보를 추출하기 위한 다양한 연구들이 활발히 진행되고 있다. 비즈니스 인텔리전스 분야에서도 새로운 시장기회를 발굴하거나 기술사업화 주체의 합리적 의사결정을 돕기 위한 많은 연구들이 이뤄져 왔다. 본 연구에서는 기업의 성공적인 사업 추진을 위해 핵심적인 정보 중의 하나인 시장규모 정보를 도출함에 있어 기존에 제공되던 범위보다 세부적인 수준의 제품군별 시장규모 추정이 가능하고 자동화된 방법론을 제안하고자 한다. 이를 위해 신경망 기반의 시멘틱 단어 임베딩 모델인 Word2Vec 알고리즘을 적용하여 개별 기업의 생산제품에 대한 텍스트 데이터를 벡터 공간으로 임베딩하고, 제품명 간 코사인 거리(유사도)를 계산함으로써 특정한 제품명과 유사한 제품들을 추출한 뒤, 이들의 매출액 정보를 연산하여 자동으로 해당 제품군의 시장규모를 산출하는 알고리즘을 구현하였다. 실험 데이터로서 통계청의 경제총조사 마이크로데이터(약 34만 5천 건)를 이용하여 제품명 텍스트 데이터를 벡터화 하고, 한국표준산업분류 해설서의 산업분류 색인어를 기준으로 활용하여 코사인 거리 기반으로 유사한 제품명을 추출하였다. 이후 개별 기업의 제품 데이터에 연결된 매출액 정보를 기초로 추출된 제품들의 매출액을 합산함으로써 11,654개의 상세한 제품군별 시장규모를 추정하였다. 성능 검증을 위해 실제 집계된 통계청의 품목별 시장규모 수치와 비교한 결과 피어슨 상관계수가 0.513 수준으로 나타났다. 본 연구에서 제시한 모형은 의미 기반 임베딩 모델의 정확성 향상 및 제품군 추출 방식의 개선이 필요하나, 표본조사 또는 다수의 가정을 기반으로 하는 전통적인 시장규모 추정 방법의 한계를 뛰어넘어 텍스트 마이닝 및 기계학습 기법을 최초로 적용하여 시장규모 추정 방식을 지능화하였다는 점, 시장규모 산출범위를 사용 목적에 따라 쉽고 빠르게 조절할 수 있다는 점, 이를 통해 다양한 분야에서 수요가 높은 세부적인 제품군별 시장정보 도출이 가능하여 실무적인 활용성이 높다는 점에서 의의가 있다.

모바일 위치기반서비스(LBS) 관련한 새로운 견해: 서비스사용으로 이끄는 요인들과 사생활염려의 모순 (New Insights on Mobile Location-based Services(LBS): Leading Factors to the Use of Services and Privacy Paradox)

  • 천은영;박용태
    • 지능정보연구
    • /
    • 제23권4호
    • /
    • pp.33-56
    • /
    • 2017
  • 위치기반서비스는 이동기기의 위치정보를 바탕으로 한 향상된 서비스로 최근 스마트폰을 활용한 모바일 응용프로그램에서 부각되고 있다. 하지만 이와 관련한 기술 및 서비스 개발에 비해 위치기반서비스의 사용의도에 관한 실증연구는 아직까지 부족하다. 또한 선행연구들은 어느 한 요인을 중심으로 단편적으로 수행되었으며 사용의도와의 직접적인 영향 관계에 대해 제시하지 못한 한계점을 가지고 있다. 이에 본 연구는 빠른 성장이 기대되는 위치기반서비스 시장에서 위치기반서비스 사용자의 위치기반서비스 수용의도 및 사용에 영향을 미치는 요인들에 관한 모델을 제시하였고 330명을 대상으로 하여 설문조사를 실시하여 이를 조사하였다. 자료를 분석한 결과 서비스 맞춤화, 서비스 품질과 개인적 혁신성은 위치기반서비스의 사용의도에 긍정적인 영향을 미치며 사용의도는 실제사용에 긍정적인 영향을 미치는 것으로 나타났다. 하지만 위치기반서비스의 맥락 하에 서비스 맞춤화와 개인적 혁신성은 사생활보호염려에 영향을 미치지 않으며 사생활보호염려는 위치기반서비스 사용의도에도 영향을 주지 않는 것으로 나타났다. 실제로 위치기반서비스에서 사용자에게 요구되는 정보는 위치에 관한 정보로 금융거래에 관련한 정보에 비해 민감하지 않기 때문에 이러한 결과가 나왔다고 추측할 수 있으면 위치기반서비스 사용자들은 전자상거래와 같은 정보시스템 사용자들에 비해 사생활보호에 대해서 예민하게 받아들이기 보다는 위치기반서비스 사용의 이점을 더 중시한다고 이해할 수 있다. 위치기반서비스의 맞춤화가 사용자의 사용의도에 긍정적인 영향을 미친다는 실증적 결과는 인공지능 등의 기술을 활용하여 사용자의 위치기반 서비스 사용 패턴을 분석함으로써 사용자의 정보수요 특성을 효과적으로 충족시켜줄 수 있는 맞춤화된 서비스의 제공으로 사용자의 사용의도를 강화시킬 수 있음을 시사하고 있다. 본 연구는 모바일 위치기반서비스 사용자의 사용의도와 실제사용에 미치는 요인들을 새롭게 다면적인 측면에서 실증적으로 조사하여 위치기반서비스와 관련하여 새로운 쟁점을 제시했으며 위치기반서비스 사용자의 사용의도와 실제사용에 대한 이해의 폭을 넓혔다는 점에서 의의가 있다. 또한 본 연구의 결과는 위치기반서비스 시장의 성장과 사용자들에 대한 효과적 대응 전략을 수립하는데 도움이 될 것으로 기대된다.

회사채 신용등급 예측을 위한 SVM 앙상블학습 (Ensemble Learning with Support Vector Machines for Bond Rating)

  • 김명종
    • 지능정보연구
    • /
    • 제18권2호
    • /
    • pp.29-45
    • /
    • 2012
  • 회사채 신용등급은 투자자의 입장에서는 수익률 결정의 중요한 요소이며 기업의 입장에서는 자본비용 및 기업 가치와 관련된 중요한 재무의사결정사항으로 정교한 신용등급 예측 모형의 개발은 재무 및 회계 분야에서 오랫동안 전통적인 연구 주제가 되어왔다. 그러나, 회사채 신용등급 예측 모형의 성과와 관련된 가장 중요한 문제는 등급별 데이터의 불균형 문제이다. 예측 문제에 있어서 데이터 불균형(Data imbalance) 은 사용되는 표본이 특정 범주에 편중되었을 때 나타난다. 데이터 불균형이 심화됨에 따라 범주 사이의 분류경계영역이 왜곡되므로 분류자의 학습성과가 저하되게 된다. 본 연구에서는 데이터 불균형 문제가 존재하는 다분류 문제를 효과적으로 해결하기 위한 다분류 기하평균 부스팅 기법 (Multiclass Geometric Mean-based Boosting MGM-Boost)을 제안하고자 한다. MGM-Boost 알고리즘은 부스팅 알고리즘에 기하평균 개념을 도입한 것으로 오분류된 표본에 대한 학습을 강화할 수 있으며 불균형 분포를 보이는 각 범주의 예측정확도를 동시에 고려한 학습이 가능하다는 장점이 있다. 회사채 신용등급 예측문제를 활용하여 MGM-Boost의 성과를 검증한 결과 SVM 및 AdaBoost 기법과 비교하여 통계적으로 유의적인 성과개선 효과를 보여주었으며 데이터 불균형 하에서도 벤치마킹 모형과 비교하여 견고한 학습성과를 나타냈다.

한국 인터넷사이트들의 산업별 경쟁유형에 대한 탐색적 연구 (An Exploratory Study on the Competition Patterns Between Internet Sites in Korea)

  • 박윤서;김용식
    • Asia Marketing Journal
    • /
    • 제12권4호
    • /
    • pp.79-111
    • /
    • 2011
  • 정보통신기술의 발달로 인해 도래한 디지털 경제는 인터넷 비즈니스라는 새로운 사업영역을 창출하였다. 인터넷 비즈니스는 다른 사업과 달리 매우 유동적인 시장점유율 변동이 나타나는 비즈니스 영역으로, 기업들은 시장 내의 경쟁 환경 및 경쟁 구조를 정확히 이해하여야만 불안정한 인터넷 시장 환경에 효과적으로 대처해 나갈 수 있게 되었다. 이에, 본 연구는 한국 인터넷 비즈니스내의 인터넷 사이트 간 경쟁을 각 사업 분야 별 시장점유율에 기초하여 실증분석 하였다. 이를 통해 인터넷 사이트들의 점유율 변동 추이를 살펴보고, 시장 선도 사이트들의 시장 지배력과 개별 시장의 경쟁 구도 등을 살펴보았다. 이러한 연구결과는 각 기업의 인터넷 사이트 담당자에게는 해당 시장의 경쟁양상과 경쟁구조를 파악할 수 있는 기회를 제공하고, 인터넷 분야로 새롭게 진출하려는 기업의 마케터들에게는 자사의 사업 진출 방향에 대한 기초자료로 활용될 수 있을 것이다.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

쇼핑 가치 추구 성향에 따른 쇼핑 목표와 공유 의도 차이에 관한 연구 - 전자제품 구매고객을 중심으로 (Shopping Value, Shopping Goal and WOM - Focused on Electronic-goods Buyers)

  • 박경원;박주영
    • 마케팅과학연구
    • /
    • 제19권2호
    • /
    • pp.68-79
    • /
    • 2009
  • The interplay between hedonic and utilitarian attributes has assumed special significance in recent years; it has been proposed that consumption offerings should be viewed as experiences that stimulate both cognitions and feelings rather than as mere products or services. This research builds on previous work on hedonic versus utilitarian benefits, regulatory focus theory, customer satisfaction to address two question: (1) Is the shopping goal at the point of purchase different from the shopping value? and (2) Is the customer loyalty after the use different from the shopping value and shopping goal? We surveyed 345 peoples those who have bought the electronic-goods within 6 months. This research dealt with the shopping value which is consisted of 2 types, hedonic and utilitarian. Those who pursue the hedonic shopping value may prefer the pleasure of purchasing experience to the product itself. They tend to prefer atmosphere, arousal of the shopping experience. Consistent with previous research, we use the term "hedonic" to refer to their aesthetic, experiential and enjoyment-related value. On the contrary, Those who pursue the utilitarian shopping value may prefer the reasonable buying. It may be more functional. Consistent with previous research, we use the term "utilitarian" to refer to the functional, instrumental, and practical value of consumption offerings. Holbrook(1999) notes that consumer value is an experience that results from the consumption of such benefits. In the context of cell phones for example, the phone's battery life and sound volume are utilitarian benefits, whereas aesthetic appeal from its shape and color are hedonic benefits. Likewise, in the case of a car, fuel economics and safety are utilitarian benefits whereas the sunroof and the luxurious interior are hedonic benefits. The shopping goals are consisted of the promotion focus goal and the prevention focus goal, based on the self-regulatory focus theory. The promotion focus is characterized into focusing ideal self because they are oriented to wishes and vision. The promotion focused individuals are tend to be more risk taking. They are more sensitive to hope and achievement. On the contrary, the prevention focused individuals are characterized into focusing the responsibilities because they are oriented to safety. The prevention focused individuals are tend to be more risk avoiding. We wanted to test the relation among the shopping value, shopping goal and customer loyalty. Customers show the positive or negative feelings comparing with the expectation level which customers have at the point of the purchase. If the result were bigger than the expectation, customers may feel positive feeling such as delight or satisfaction and they would want to share their feelings with other people. And they want to buy those products again in the future time. There is converging evidence that the types of goals consumers expect to be fulfilled by the utilitarian dimension of a product are different from those they seek from the hedonic dimension (Chernev 2004). Specifically, whereas consumers expect the fulfillment of product prevention goals on the utilitarian dimension, they expect the fulfillment of promotion goals on the hedonic dimension (Chernev 2004; Chitturi, Raghunathan, and Majahan 2007; Higgins 1997, 2001) According to the regulatory focus theory, prevention goals are those that ought to be met. Fulfillment of prevention goals in the context of product consumption eliminates or significantly reduces the probability of a painful experience, thus making consumers experience emotions that result from fulfillment of prevention goals such as confidence and securities. On the contrary, fulfillment of promotion goals are those that a person aspires to meet, such as "looking cool" or "being sophisticated." Fulfillment of promotion goals in the context of product consumption significantly increases the probability of a pleasurable experience, thus enabling consumers to experience emotions that result from the fulfillment of promotion goals. The proposed conceptual framework captures that the relationships among hedonic versus utilitarian shopping values and promotion versus prevention shopping goals respectively. An analysis of the consequence of the fulfillment and frustration of utilitarian and hedonic value is theoretically worthwhile. It is also substantively relevant because it helps predict post-consumption behavior such as the promotion versus prevention shopping goals orientation. Because our primary goal is to understand how the post consumption feelings influence the variable customer loyalty: word of mouth (Jacoby and Chestnut 1978). This research result is that the utilitarian shopping value gives the positive influence to both of the promotion and prevention goal. However the influence to the prevention goal is stronger. On the contrary, hedonic shopping value gives influence to the promotion focus goal only. Additionally, both of the promotion and prevention goal show the positive relation with customer loyalty. However, the positive relation with promotion goal and customer loyalty is much stronger. The promotion focus goal gives the influence to the customer loyalty. On the contrary, the prevention focus goal relates at the low level of relation with customer loyalty than that of the promotion goal. It could be explained that it is apt to get framed the compliment of people into 'gain-non gain' situation. As the result, for those who have the promotion focus are motivated to deliver their own feeling to other people eagerly. Conversely the prevention focused individual are more sensitive to the 'loss-non loss' situation. The research result is consistent with pre-existent researches. There is a conceptual parallel between necessities-needs-utilitarian benefits and luxuries-wants-hedonic benefits (Chernev 2004; Chitturi, Raghunathan and Majaha 2007; Higginns 1997; Kivetz and Simonson 2002b). In addition, Maslow's hierarchy of needs and the precedence principle contends luxuries-wants-hedonic benefits higher than necessities-needs-utilitarian benefits. Chitturi, Raghunathan and Majaha (2007) show that consumers are focused more on the utilitarian benefits than on the hedonic benefits of a product until their minimum expectation of fulfilling prevention goals are met. Furthermore, a utilitarian benefit is a promise of a certain level of functionality by the manufacturer or the retailer. When the promise is not fulfilled, customers blame the retailer and/or the manufacturer. When negative feelings are attributable to an entity, customers feel angry. However in the case of hedonic benefit, the customer, not the manufacturer, determines at the time of purchase whether the product is stylish and attractive. Under such circumstances, customers are more likely to blame themselves than the manufacturer if their friends do not find the product stylish and attractive. Therefore, not meeting minimum utilitarian expectations of functionality generates a much more intense negative feelings, such as anger than a less intense feeling such as disappointment or dissatisfactions. The additional multi group analysis of this research shows the same result. Those who are unsatisfactory customers who have the prevention focused goal shows higher relation with WOM, comparing with satisfactory customers. The research findings in this article could have significant implication for the personal selling fields to increase the effectiveness and the efficiency of the sales such that they can develop the sales presentation strategy for the customers. For those who are the hedonic customers may be apt to show more interest to the promotion goal. Therefore it may work to strengthen the design, style or new technology of the products to the hedonic customers. On the contrary for the utilitarian customers, it may work to strengthen the price competitiveness. On the basis of the result from our studies, we demonstrated a correspondence among hedonic versus utilitarian and promotion versus prevention goal, WOM. Similarly, we also found evidence of the moderator effects of satisfaction after use, between the prevention goal and WOM. Even though the prevention goal has the low level of relation to WOM, those who are not satisfied show higher relation to WOM. The relation between the prevention goal and WOM is significantly different according to the satisfaction versus unsatisfaction. In addition, improving the promotion emotions of cheerfulness and excitement and the prevention emotion of confidence and security will further improve customer loyalty. A related potential further research could be to examine whether hedonic versus utilitarian, promotion versus prevention goals improve customer loyalty for services as well. Under the budget and time constraints, designers and managers are often compelling to choose among various attributes. If there is no budget or time constraints, perhaps the best solution is to maximize both hedonic and utilitarian dimension of benefits. However, they have to make trad-off process between various attributes. For the designers and managers have to keep in mind that without hedonic benefit satisfaction of the product it may hard to lead the customers to the customer loyalty.

  • PDF