• Title/Summary/Keyword: Store Data

Search Result 2,335, Processing Time 0.036 seconds

Estimation of Carbon Storages and Fluxes by Ecosystem Type in Korea (국내 생태계 유형별 탄소 저장 및 거동 산정 연구 현황 분석)

  • Inyoung Jang;Heon Mo Jeong;Sang-Hak Han;Na-Hyun Ahn;Dukyeop Kim;Sung-Ryong Kang
    • Journal of Wetlands Research
    • /
    • v.25 no.4
    • /
    • pp.417-425
    • /
    • 2023
  • As climate change gets severe, the ecosystem acts as an important carbon sink, therefore efforts are being made to utilize these functions to mitigate climate change. In this study, we inventoried and analyzed the previous studies related to carbon storage and flux by ecosystem type (forest, cropland, wetland, grassland, and settlement) and carbon pool (aboveground and belowground biomass, dead wood, Litter, soil organic carbon, and ecosystem) in Korean ecosystems. We also collected the results of previous studies and calculated the average value of carbon storage and flux for each ecosystem type and carbon pool. As a result, we found that most (66%) of Korea's carbon storage and fluxes studies were conducted in forests. Based on the results of forest studies, we estimated the storage by carbon stock. We found that much carbon is stored in vegetation (aboveground: 4,018.32 gC m-2 and belowground biomass: 4,095.63 gC m-2) and soil (4,159.43 gC m-2). In particular, a large amount of carbon is stored in the forest understory. For other ecosystem types, it was impossible to determine each carbon pool's storage and flux due to data limitations. However, in the case of soil organic carbon storage, the data for forests and grasslands were comparable, showing that both ecosystems store relatively similar amounts of carbon (4,159.43 gC m-2, 4,023.23 gC m-2, respectively). This study confirms the need to study carbon in rather diverse ecosystem types.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Design and Implementation of MongoDB-based Unstructured Log Processing System over Cloud Computing Environment (클라우드 환경에서 MongoDB 기반의 비정형 로그 처리 시스템 설계 및 구현)

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.71-84
    • /
    • 2013
  • Log data, which record the multitude of information created when operating computer systems, are utilized in many processes, from carrying out computer system inspection and process optimization to providing customized user optimization. In this paper, we propose a MongoDB-based unstructured log processing system in a cloud environment for processing the massive amount of log data of banks. Most of the log data generated during banking operations come from handling a client's business. Therefore, in order to gather, store, categorize, and analyze the log data generated while processing the client's business, a separate log data processing system needs to be established. However, the realization of flexible storage expansion functions for processing a massive amount of unstructured log data and executing a considerable number of functions to categorize and analyze the stored unstructured log data is difficult in existing computer environments. Thus, in this study, we use cloud computing technology to realize a cloud-based log data processing system for processing unstructured log data that are difficult to process using the existing computing infrastructure's analysis tools and management system. The proposed system uses the IaaS (Infrastructure as a Service) cloud environment to provide a flexible expansion of computing resources and includes the ability to flexibly expand resources such as storage space and memory under conditions such as extended storage or rapid increase in log data. Moreover, to overcome the processing limits of the existing analysis tool when a real-time analysis of the aggregated unstructured log data is required, the proposed system includes a Hadoop-based analysis module for quick and reliable parallel-distributed processing of the massive amount of log data. Furthermore, because the HDFS (Hadoop Distributed File System) stores data by generating copies of the block units of the aggregated log data, the proposed system offers automatic restore functions for the system to continually operate after it recovers from a malfunction. Finally, by establishing a distributed database using the NoSQL-based Mongo DB, the proposed system provides methods of effectively processing unstructured log data. Relational databases such as the MySQL databases have complex schemas that are inappropriate for processing unstructured log data. Further, strict schemas like those of relational databases cannot expand nodes in the case wherein the stored data are distributed to various nodes when the amount of data rapidly increases. NoSQL does not provide the complex computations that relational databases may provide but can easily expand the database through node dispersion when the amount of data increases rapidly; it is a non-relational database with an appropriate structure for processing unstructured data. The data models of the NoSQL are usually classified as Key-Value, column-oriented, and document-oriented types. Of these, the representative document-oriented data model, MongoDB, which has a free schema structure, is used in the proposed system. MongoDB is introduced to the proposed system because it makes it easy to process unstructured log data through a flexible schema structure, facilitates flexible node expansion when the amount of data is rapidly increasing, and provides an Auto-Sharding function that automatically expands storage. The proposed system is composed of a log collector module, a log graph generator module, a MongoDB module, a Hadoop-based analysis module, and a MySQL module. When the log data generated over the entire client business process of each bank are sent to the cloud server, the log collector module collects and classifies data according to the type of log data and distributes it to the MongoDB module and the MySQL module. The log graph generator module generates the results of the log analysis of the MongoDB module, Hadoop-based analysis module, and the MySQL module per analysis time and type of the aggregated log data, and provides them to the user through a web interface. Log data that require a real-time log data analysis are stored in the MySQL module and provided real-time by the log graph generator module. The aggregated log data per unit time are stored in the MongoDB module and plotted in a graph according to the user's various analysis conditions. The aggregated log data in the MongoDB module are parallel-distributed and processed by the Hadoop-based analysis module. A comparative evaluation is carried out against a log data processing system that uses only MySQL for inserting log data and estimating query performance; this evaluation proves the proposed system's superiority. Moreover, an optimal chunk size is confirmed through the log data insert performance evaluation of MongoDB for various chunk sizes.

Social Network Analysis for the Effective Adoption of Recommender Systems (추천시스템의 효과적 도입을 위한 소셜네트워크 분석)

  • Park, Jong-Hak;Cho, Yoon-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.305-316
    • /
    • 2011
  • Recommender system is the system which, by using automated information filtering technology, recommends products or services to the customers who are likely to be interested in. Those systems are widely used in many different Web retailers such as Amazon.com, Netfix.com, and CDNow.com. Various recommender systems have been developed. Among them, Collaborative Filtering (CF) has been known as the most successful and commonly used approach. CF identifies customers whose tastes are similar to those of a given customer, and recommends items those customers have liked in the past. Numerous CF algorithms have been developed to increase the performance of recommender systems. However, the relative performances of CF algorithms are known to be domain and data dependent. It is very time-consuming and expensive to implement and launce a CF recommender system, and also the system unsuited for the given domain provides customers with poor quality recommendations that make them easily annoyed. Therefore, predicting in advance whether the performance of CF recommender system is acceptable or not is practically important and needed. In this study, we propose a decision making guideline which helps decide whether CF is adoptable for a given application with certain transaction data characteristics. Several previous studies reported that sparsity, gray sheep, cold-start, coverage, and serendipity could affect the performance of CF, but the theoretical and empirical justification of such factors is lacking. Recently there are many studies paying attention to Social Network Analysis (SNA) as a method to analyze social relationships among people. SNA is a method to measure and visualize the linkage structure and status focusing on interaction among objects within communication group. CF analyzes the similarity among previous ratings or purchases of each customer, finds the relationships among the customers who have similarities, and then uses the relationships for recommendations. Thus CF can be modeled as a social network in which customers are nodes and purchase relationships between customers are links. Under the assumption that SNA could facilitate an exploration of the topological properties of the network structure that are implicit in transaction data for CF recommendations, we focus on density, clustering coefficient, and centralization which are ones of the most commonly used measures to capture topological properties of the social network structure. While network density, expressed as a proportion of the maximum possible number of links, captures the density of the whole network, the clustering coefficient captures the degree to which the overall network contains localized pockets of dense connectivity. Centralization reflects the extent to which connections are concentrated in a small number of nodes rather than distributed equally among all nodes. We explore how these SNA measures affect the performance of CF performance and how they interact to each other. Our experiments used sales transaction data from H department store, one of the well?known department stores in Korea. Total 396 data set were sampled to construct various types of social networks. The dependant variable measuring process consists of three steps; analysis of customer similarities, construction of a social network, and analysis of social network patterns. We used UCINET 6.0 for SNA. The experiments conducted the 3-way ANOVA which employs three SNA measures as dependant variables, and the recommendation accuracy measured by F1-measure as an independent variable. The experiments report that 1) each of three SNA measures affects the recommendation accuracy, 2) the density's effect to the performance overrides those of clustering coefficient and centralization (i.e., CF adoption is not a good decision if the density is low), and 3) however though the density is low, the performance of CF is comparatively good when the clustering coefficient is low. We expect that these experiment results help firms decide whether CF recommender system is adoptable for their business domain with certain transaction data characteristics.

Developments of Local Festival Mobile Application and Data Analysis System Applying Beacon (비콘을 활용한 위치기반 지역축제 모바일 애플리케이션과 데이터 분석 시스템 개발)

  • Kim, Song I;Kim, Won Pyo;Jeong, Chul
    • Korea Science and Art Forum
    • /
    • v.31
    • /
    • pp.21-32
    • /
    • 2017
  • Local festivals form the regional cultures and atmosphere of communication; they increase the demand of domestic tourism businesses and thus, have an important role in ripple effects (e.g. regional image improvement, tourist influx, job creation, regional contents development, and local product sales) and economic revitalization. IoT (Internet of Thing) technologies have been developed especially, beacon-one of the IoT services has been applied as plenty of types and forms both domestically and internationally. However, notwithstanding expansion of current digital mobile technologies, it still remains as difficult for the individual to track the information about all the local festivals and to fulfill the tourists' needs of enjoying festivals given the weak strategic approaches and advertisement activities. Furthermore, current festival-related mobile applications don't function well as delivering information and have numerous contents issues (e.g. ways of information delivery within the festival places, independent application usage for each festival, one time usage due to one time event). This research, based on the background mentioned above, aims to develop the local festival mobile application and data analysis system applying beacon technology. First of all, three algorithms were developed, namely, 'festival crowding algorithm', 'visitor stats algorithm', and 'customized information algorithm', and then beta test was followed with the developed application and data analysis system. As a result, they could form the database of visitors' types and behaviors, and provide functions and services, such as personalized information, waiting time for festival contents, and 'hot place' function. Besides, in Google Play store, they also got the titles given with more than 13,000 downloads within first three months and as the most exposed application related with festivals; and, thus, got credited with their marketability and excellence. This research follows this order: chapter 2 shows the literature review of local festival related with technology development, beacon service, and festival application. In Chapter 3, design plans and conditions are described of developing local festival mobile application and data analysis system with beacon. Chapter 4 evaluates the results of the beta performance test to verify applicability of the developed application and data analysis system, and lastly, chapter 5 explains the conclusion and suggests the future research.

The Development of an Aggregate Power Resource Configuration Model Based on the Renewable Energy Generation Forecasting System (재생에너지 발전량 예측제도 기반 집합전력자원 구성모델 개발)

  • Eunkyung Kang;Ha-Ryeom Jang;Seonuk Yang;Sung-Byung Yang
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.229-256
    • /
    • 2023
  • The increase in telecommuting and household electricity demand due to the pandemic has led to significant changes in electricity demand patterns. This has led to difficulties in identifying KEPCO's PPA (power purchase agreements) and residential solar power generation and has added to the challenges of electricity demand forecasting and grid operation for power exchanges. Unlike other energy resources, electricity is difficult to store, so it is essential to maintain a balance between energy production and consumption. A shortage or overproduction of electricity can cause significant instability in the energy system, so it is necessary to manage the supply and demand of electricity effectively. Especially in the Fourth Industrial Revolution, the importance of data has increased, and problems such as large-scale fires and power outages can have a severe impact. Therefore, in the field of electricity, it is crucial to accurately predict the amount of power generation, such as renewable energy, along with the exact demand for electricity, for proper power generation management, which helps to reduce unnecessary power production and efficiently utilize energy resources. In this study, we reviewed the renewable energy generation forecasting system, its objectives, and practical applications to construct optimal aggregated power resources using data from 169 power plants provided by the Ministry of Trade, Industry, and Energy, developed an aggregation algorithm considering the settlement of the forecasting system, and applied it to the analytical logic to synthesize and interpret the results. This study developed an optimal aggregation algorithm and derived an aggregation configuration (Result_Number 546) that reached 80.66% of the maximum settlement amount and identified plants that increase the settlement amount (B1783, B1729, N6002, S5044, B1782, N6006) and plants that decrease the settlement amount (S5034, S5023, S5031) when aggregating plants. This study is significant as the first study to develop an optimal aggregation algorithm using aggregated power resources as a research unit, and we expect that the results of this study can be used to improve the stability of the power system and efficiently utilize energy resources.

Intelligent VOC Analyzing System Using Opinion Mining (오피니언 마이닝을 이용한 지능형 VOC 분석시스템)

  • Kim, Yoosin;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.113-125
    • /
    • 2013
  • Every company wants to know customer's requirement and makes an effort to meet them. Cause that, communication between customer and company became core competition of business and that important is increasing continuously. There are several strategies to find customer's needs, but VOC (Voice of customer) is one of most powerful communication tools and VOC gathering by several channels as telephone, post, e-mail, website and so on is so meaningful. So, almost company is gathering VOC and operating VOC system. VOC is important not only to business organization but also public organization such as government, education institute, and medical center that should drive up public service quality and customer satisfaction. Accordingly, they make a VOC gathering and analyzing System and then use for making a new product and service, and upgrade. In recent years, innovations in internet and ICT have made diverse channels such as SNS, mobile, website and call-center to collect VOC data. Although a lot of VOC data is collected through diverse channel, the proper utilization is still difficult. It is because the VOC data is made of very emotional contents by voice or text of informal style and the volume of the VOC data are so big. These unstructured big data make a difficult to store and analyze for use by human. So that, the organization need to automatic collecting, storing, classifying and analyzing system for unstructured big VOC data. This study propose an intelligent VOC analyzing system based on opinion mining to classify the unstructured VOC data automatically and determine the polarity as well as the type of VOC. And then, the basis of the VOC opinion analyzing system, called domain-oriented sentiment dictionary is created and corresponding stages are presented in detail. The experiment is conducted with 4,300 VOC data collected from a medical website to measure the effectiveness of the proposed system and utilized them to develop the sensitive data dictionary by determining the special sentiment vocabulary and their polarity value in a medical domain. Through the experiment, it comes out that positive terms such as "칭찬, 친절함, 감사, 무사히, 잘해, 감동, 미소" have high positive opinion value, and negative terms such as "퉁명, 뭡니까, 말하더군요, 무시하는" have strong negative opinion. These terms are in general use and the experiment result seems to be a high probability of opinion polarity. Furthermore, the accuracy of proposed VOC classification model has been compared and the highest classification accuracy of 77.8% is conformed at threshold with -0.50 of opinion classification of VOC. Through the proposed intelligent VOC analyzing system, the real time opinion classification and response priority of VOC can be predicted. Ultimately the positive effectiveness is expected to catch the customer complains at early stage and deal with it quickly with the lower number of staff to operate the VOC system. It can be made available human resource and time of customer service part. Above all, this study is new try to automatic analyzing the unstructured VOC data using opinion mining, and shows that the system could be used as variable to classify the positive or negative polarity of VOC opinion. It is expected to suggest practical framework of the VOC analysis to diverse use and the model can be used as real VOC analyzing system if it is implemented as system. Despite experiment results and expectation, this study has several limits. First of all, the sample data is only collected from a hospital web-site. It means that the sentimental dictionary made by sample data can be lean too much towards on that hospital and web-site. Therefore, next research has to take several channels such as call-center and SNS, and other domain like government, financial company, and education institute.

Smoking Adolescents' Acquisition of Cigarettes and Status of Proof of Age (흡연을 하는 청소년의 담배 구입 경로 및 신분 확인의 유무)

  • Kim, Hee Ra;Kim, Ji Young;Lee, Gee Hyung;Choung, Ji Tae;Park, Sang Hee
    • Clinical and Experimental Pediatrics
    • /
    • v.48 no.4
    • /
    • pp.363-368
    • /
    • 2005
  • Purpose : The aim of this study is to identify where and how adolescents acquire cigarettes and how many were asked for identification while purchasing cigarettes. Methods : This study was conducted in 2003; participants were 2,200 students in middle and high schools, aged from 13 to 18 years old(males 1,098; females 1,102) in Ansan, Korea. The questionnaire assured them of anonymity, and self-administered in school. The data was analyzed with chisquare test for trends. Results : The prevalence of smoking was about 20 percent among respondents, was higher in males than in females, and in older students than in younger students(P<0.001). The most frequent source of cigarettes was purchased from a store(36.3 percent). About 29.2 percent of the students borrowed from friends or family members. By sex, the main sources of cigarettes were purchase from a store and borrowing. Younger students were borrowed more cigarettes; older students purchased more cigarettes from stores. Only 48.8 percent were asked for proof of age during their purchase. Of those asked for proof of age, about 73.3 percent answered that this made it difficult to buy cigarettes(P<0.001), and they thought that it was more difficult when asked for a photo ID than simply being asked their age(P=0.019). Conclusion : So far, there has been no systemic prevention of adolescents' smoking. It is difficult for minors to purchase cigarettes if asked for proof of age, but most minors go to stores to purchase cigarettes. Therefore, prevention efforts should include educating retailers not to sell cigarettes to minors and enforcing existing laws requiring youth to provide proof of age when attempting to buy cigarettes.

Personification of On-line Shopping Mall -Focusing on the Social Presence- (온라인 쇼핑몰의 의인화 전략 -사회적 실재감을 중심으로-)

  • Park, Ju-Sik
    • Management & Information Systems Review
    • /
    • v.31 no.2
    • /
    • pp.143-172
    • /
    • 2012
  • While e-commerce market(B2C) grows rapidly, many experts argue that EC(B2C) transactions have not reached its full potential. A notable difference between online and offline consumer markets that is suppressing the growth of EC(B2C) is the decreased presence of human and social elements in the online shopping environments. Generally online shopping lacks human warmth and sociability. In this study, social presence in online shopping mall was proposed as a substitute for face-to-face social interaction in the traditional commerce and author explored what variables affect social presence(human warmth and sociability) on online shopping malls and how human warmth and sociability can influence on online store loyalty. To achieve research objectives, we reviewed literatures related with marketing, psychology and communication research areas. Based on literature review, we proposed a research model on the online shopping mall. To examine the proposed research model, we gathered data by using a self-report questionnaire. Respondents consists of online shoppers with at least five or more times of purchase experience in online shopping malls. Because social presence is a feeling which needs frequent contacts with malls to experience, respondents must have enough purchase experiences. The empirical results are as follows : First, shopping mall's customization efforts influence perceived social presence on the mall significantly. Second, shopping mall's responsiveness influences perceived social presence significantly. Third, perceived activity of community of online shopping mall influences perceived social presence significantly. Mall managers have to activate their customer community to reinforce social presence, resulting in trust building. Finally, perceived social presence influences trust and enjoyment on the mall significantly. And then trust and enjoyment on the mall affect store loyalty significantly. From these findings it can be inferred that perceived social presence appears determinant which is critical to the formation of core variables(trust and loyalty) in existing online shopping papers.

  • PDF

A comparative study on the distribution transaction policy between Korea and Japan: focused on unfair transaction behavior prohibition (유통부문에 있어서 경쟁정책의 비교 연구 - 불공정거래행위에 대한 한국과 일본의 대응방식 -)

  • Yoo, Ki-Joon
    • Journal of Distribution Research
    • /
    • v.15 no.5
    • /
    • pp.103-126
    • /
    • 2010
  • The development of an industry including distribution sector is influenced by not only government policy but the related firms' behaviors. Recently the large-scale retailers have had more enormous channel power than any other distributors including monopolistic makers. Now is the time for government to prepare some policies against the unfair transaction behaviors by large-scale retailers. In this paper I tried to inquire into the distribution competition policy from a political correspondent point of view related with the transition of distribution system. For the purpose of this article I compared the case of Korea with Japan. According to the results so far inquired, there are some commons and differences in the cases of the two. Some suggestions are as follows. Considering the predominant position the concept of large-scale retailers is to be extended from a single store to numerous chain stores in the political level. Government needs to examine the standard propriety for large-scale retailer; the size of selling area and amount of sales a year. When a large-scale retailer store is to be established, it need to be taken a permit or a pre-inspection. The Fair Trade Commission have to secure the neutrality from Government's strategies. And government should find out the examples of unfair transaction behavior types and prepare some proper guidelines continually. For the last time statistical data by distributors are to be fitted out and the actual investigations for estimating the effects of government policies need to be enforced.

  • PDF