• Title/Summary/Keyword: Ubiquitous application service

Search Result 276, Processing Time 0.021 seconds

Context Prediction Using Right and Wrong Patterns to Improve Sequential Matching Performance for More Accurate Dynamic Context-Aware Recommendation (보다 정확한 동적 상황인식 추천을 위해 정확 및 오류 패턴을 활용하여 순차적 매칭 성능이 개선된 상황 예측 방법)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.51-67
    • /
    • 2009
  • Developing an agile recommender system for nomadic users has been regarded as a promising application in mobile and ubiquitous settings. To increase the quality of personalized recommendation in terms of accuracy and elapsed time, estimating future context of the user in a correct way is highly crucial. Traditionally, time series analysis and Makovian process have been adopted for such forecasting. However, these methods are not adequate in predicting context data, only because most of context data are represented as nominal scale. To resolve these limitations, the alignment-prediction algorithm has been suggested for context prediction, especially for future context from the low-level context. Recently, an ontological approach has been proposed for guided context prediction without context history. However, due to variety of context information, acquiring sufficient context prediction knowledge a priori is not easy in most of service domains. Hence, the purpose of this paper is to propose a novel context prediction methodology, which does not require a priori knowledge, and to increase accuracy and decrease elapsed time for service response. To do so, we have newly developed pattern-based context prediction approach. First of ail, a set of individual rules is derived from each context attribute using context history. Then a pattern consisted of results from reasoning individual rules, is developed for pattern learning. If at least one context property matches, say R, then regard the pattern as right. If the pattern is new, add right pattern, set the value of mismatched properties = 0, freq = 1 and w(R, 1). Otherwise, increase the frequency of the matched right pattern by 1 and then set w(R,freq). After finishing training, if the frequency is greater than a threshold value, then save the right pattern in knowledge base. On the other hand, if at least one context property matches, say W, then regard the pattern as wrong. If the pattern is new, modify the result into wrong answer, add right pattern, and set frequency to 1 and w(W, 1). Or, increase the matched wrong pattern's frequency by 1 and then set w(W, freq). After finishing training, if the frequency value is greater than a threshold level, then save the wrong pattern on the knowledge basis. Then, context prediction is performed with combinatorial rules as follows: first, identify current context. Second, find matched patterns from right patterns. If there is no pattern matched, then find a matching pattern from wrong patterns. If a matching pattern is not found, then choose one context property whose predictability is higher than that of any other properties. To show the feasibility of the methodology proposed in this paper, we collected actual context history from the travelers who had visited the largest amusement park in Korea. As a result, 400 context records were collected in 2009. Then we randomly selected 70% of the records as training data. The rest were selected as testing data. To examine the performance of the methodology, prediction accuracy and elapsed time were chosen as measures. We compared the performance with case-based reasoning and voting methods. Through a simulation test, we conclude that our methodology is clearly better than CBR and voting methods in terms of accuracy and elapsed time. This shows that the methodology is relatively valid and scalable. As a second round of the experiment, we compared a full model to a partial model. A full model indicates that right and wrong patterns are used for reasoning the future context. On the other hand, a partial model means that the reasoning is performed only with right patterns, which is generally adopted in the legacy alignment-prediction method. It turned out that a full model is better than a partial model in terms of the accuracy while partial model is better when considering elapsed time. As a last experiment, we took into our consideration potential privacy problems that might arise among the users. To mediate such concern, we excluded such context properties as date of tour and user profiles such as gender and age. The outcome shows that preserving privacy is endurable. Contributions of this paper are as follows: First, academically, we have improved sequential matching methods to predict accuracy and service time by considering individual rules of each context property and learning from wrong patterns. Second, the proposed method is found to be quite effective for privacy preserving applications, which are frequently required by B2C context-aware services; the privacy preserving system applying the proposed method successfully can also decrease elapsed time. Hence, the method is very practical in establishing privacy preserving context-aware services. Our future research issues taking into account some limitations in this paper can be summarized as follows. First, user acceptance or usability will be tested with actual users in order to prove the value of the prototype system. Second, we will apply the proposed method to more general application domains as this paper focused on tourism in amusement park.

An Application-Independent Multimedia Adaptation framework for the Mobile Web (모바일 웹을 지원하는 응용 독립적 멀티미디어 적응 프레임워크)

  • Chon, Sung-Mi;Lim, Young-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.139-148
    • /
    • 2005
  • The desired level for multimedia services in the mobile web environment, the next generation web environment, is expected to be of PC level quality. And great efforts have been made in the development of hadware technology, communication technology, various kinds of services and standardization to support these services, In the mobile web environment, multimedia contents adaptation services should be available through supporting various kinds of devices, network abilities and users' preferences. It means that due to the variety of both desired devices' hardware specifications, called destinations, and desired QoSes, the QoSes in the destinations are not fixed or defined. If a new user wants to stream multimedia contents in a server through a new kind of terminal device, it should be considered whether the existing transcoders are able to adapt the multimedia contents. However, the existing libraries for multimedia adaptation have heavy transcoder figures which include all adaptive functions in one library, The challenge of universal access is too complex to be solved with these all in one solutions. Therefore, in this paper we propose an application independent multimedia adaptation framework which meets the QoS of new and varied mobile devices. This framework is composed of a group of unit transcoders having only one transcoding function respectively, Instead of heavy transcoders. Also, It includes the transcoder manager supporting the dynamic connections of the unit transcoders in order to satisfy end to end QoS.

  • PDF

A Study on Actual Usage of Information Systems: Focusing on System Quality of Mobile Service (정보시스템의 실제 이용에 대한 연구: 모바일 서비스 시스템 품질을 중심으로)

  • Cho, Woo-Chul;Kim, Kimin;Yang, Sung-Byung
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.611-635
    • /
    • 2014
  • Information systems (IS) have become ubiquitous and changed every aspect of how people live their lives. While some IS have been successfully adopted and widely used, others have failed to be adopted and crowded out in spite of remarkable progress in technologies. Both the technology acceptance model (TAM) and the IS Success Model (ISSM), among many others, have contributed to explain the reasons of success as well as failure in IS adoption and usage. While the TAM suggests that intention to use and perceived usefulness lead to actual IS usage, the ISSM indicates that information quality, system quality, and service quality affect IS usage and user satisfaction. Upon literature review, however, we found a significant void in theoretical development and its applications that employ either of the two models, and we raise research questions. First of all, in spite of the causal relationship between intention to use and actual usage, in most previous studies, only intention to use was employed as a dependent variable without overt explaining its relationship with actual usage. Moreover, even in a few studies that employed actual IS usage as a dependent variable, the degree of actual usage was measured based on users' perceptual responses to survey questionnaires. However, the measurement of actual usage based on survey responses might not be 'actual' usage in a strict sense that responders' perception may be distorted due to their selective perceptions or stereotypes. By the same token, the degree of system quality that IS users perceive might not be 'real' quality as well. This study seeks to fill this void by measuring the variables of actual usage and system quality using 'fact' data such as system logs and specifications of users' information and communications technology (ICT) devices. More specifically, we propose an integrated research model that bring together the TAM and the ISSM. The integrated model is composed of both the variables that are to be measured using fact as well as survey data. By employing the integrated model, we expect to reveal the difference between real and perceived degree of system quality, and to investigate the relationship between the perception-based measure of intention to use and the fact-based measure of actual usage. Furthermore, we also aim to add empirical findings on the general research question: what factors influence actual IS usage and how? In order to address the research question and to examine the research model, we selected a mobile campus application (MCA). We collected both fact data and survey data. For fact data, we retrieved them from the system logs such information as menu usage counts, user's device performance, display size, and operating system revision version number. At the same time, we conducted a survey among university students who use an MCA, and collected 180 valid responses. A partial least square (PLS) method was employed to validate our research model. Among nine hypotheses developed, we found five were supported while four were not. In detail, the relationships between (1) perceived system quality and perceived usefulness, (2) perceived system quality and perceived intention to use, (3) perceived usefulness and perceived intention to use, (4) quality of device platform and actual IS usage, and (5) perceived intention to use and actual IS usage were found to be significant. In comparison, the relationships between (1) quality of device platform and perceived system quality, (2) quality of device platform and perceived usefulness, (3) quality of device platform and perceived intention to use, and (4) perceived system quality and actual IS usage were not significant. The results of the study reveal notable differences from those of previous studies. First, although perceived intention to use shows a positive effect on actual IS usage, its explanatory power is very weak ($R^2$=0.064). Second, fact-based system quality (quality of user's device platform) shows a direct impact on actual IS usage without the mediating role of intention to use. Lastly, the relationships between perceived system quality (perception-based system quality) and other constructs show completely different results from those between quality of device platform (fact-based system quality) and other constructs. In the post-hoc analysis, IS users' past behavior was additionally included in the research model to further investigate the cause of such a low explanatory power of actual IS usage. The results show that past IS usage has a strong positive effect on current IS usage while intention to use does not have, implying that IS usage has already become a habitual behavior. This study provides the following several implications. First, we verify that fact-based data (i.e., system logs of real usage records) are more likely to reflect IS users' actual usage than perception-based data. In addition, by identifying the direct impact of quality of device platform on actual IS usage (without any mediating roles of attitude or intention), this study triggers further research on other potential factors that may directly influence actual IS usage. Furthermore, the results of the study provide practical strategic implications that organizations equipped with high-quality systems may directly expect high level of system usage.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Customer-Centric CRM Implementation Case Study (고객중심의 CRM 구축비교 사례연구)

  • Lee, Ho-Seoub
    • Management & Information Systems Review
    • /
    • v.23
    • /
    • pp.25-40
    • /
    • 2007
  • In the highly competitive and divers world of financial market, customer is the single most important factor to company's survival. Especially, creating a relationship with valued customers is a key to success. CRM provides the mean to retain high value customers. It takes a prospect of what customers expect. Utilizing those knowledge can help the products and service meet the customers' needs, thereby maximizing customer satisfaction and company's profit. In this report, I am going to suggest a few ways to develop successful CRM in the life insurance industry. First, CRM should innovate the way of communication to keep pace with Web 2.0 era. In other words, the customer's needs should be caught by real-time communication than traditional off-line market research. Thus, the functionality and specification of products can be decided by customer's direct choice so that the customers are able to purchase the understanding and experience of the products. Second, CRM project should consider whether the initial strategy plan can promise the stable growth of customer at the first step. When planning strategy, the project needs to identify what customer wants and how to fulfill the needs with stable growth of the customer. In addition, the CRM should be developed by realizing that customer centric benefits ultimately guarantee the growth of the organization. Third, CRM systems should enhance the organization's ability to take the customer's insight in a 360 degree view and to capture the voice of the customer directly. In order to develop the best matched product package, more precise customer segmentation should be ahead of market segmentation strategy. Forth, the biggest reward from CRM will be a customer royalty program. Many successful banks are already planning and practicing customer royalty strategy. A comprehensive analysis of customers and their behavior allow organization to identify high value potential customers' needs and determine a strategy required to meet those needs. Even life insurance companies such as Prudential Korea are developing products designed for royal customers. Fifth, understanding and managing the experience of customer called Customer Experience Management also can increase customer satisfaction. Measuring only customers' experience and adapting it to marketing strategy make products position in the gap between the customers' expectation and experience not required by market. A key component of CEM is its application across all organizational functions. At last, the direction of change and development of CRM can be defined from the conceptualization of information technology represented by Ubiquitous and Web 2.0. Instead of just managing customer information, companies should take the initiative in personalized system with customer oriented strategy. Furthermore, with the regular communication between CRM stakeholders (Sales-Marketing-IT), customer's demand should be directly reflected to enterprise strategy in real time.

  • PDF

Exploring the 4th Industrial Revolution Technology from the Landscape Industry Perspective (조경산업 관점에서 4차 산업혁명 기술의 탐색)

  • Choi, Ja-Ho;Suh, Joo-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.2
    • /
    • pp.59-75
    • /
    • 2019
  • This study was carried out to explore the 4th Industrial Revolution technology from the perspective of the landscape industry to provide the basic data necessary to increase the virtuous circle value. The 4th Industrial Revolution, the characteristics of the landscape industry and urban regeneration were considered and the methodology was established and studied including the technical classification system suitable for systematic research, which was selected as a framework. First, the 4th Industrial Revolution technology based on digital data was selected, which could be utilized to increase the value of the virtuous circle for the landscape industry. From 'Element Technology Level', and 'Core Technology' such as the Internet of Things, Cloud Computing, Big Data, Artificial Intelligence, Robot, 'Peripheral Technology', Virtual or Augmented Reality, Drones, 3D 4D Printing, and 3D Scanning were highlighted as the 4th Industrial Revolution technology. It has been shown that it is possible to increase the value of the virtuous circle when applied at the 'Trend Level', in particular to the landscape industry. The 'System Level' was analyzed as a general-purpose technology, and based on the platform, the level of element technology(computers, and smart devices) was systematically interconnected, and illuminated with the 4th Industrial Revolution technology based on digital data. The application of the 'Trend Level' specific to the landscape industry has been shown to be an effective technology for increasing the virtuous circle values. It is possible to realize all synergistic effects and implementation of the proposed method at the trend level applying the element technology level. Smart gardens, smart parks, etc. have been analyzed to the level they should pursue. It was judged that Smart City, Smart Home, Smart Farm, and Precision Agriculture, Smart Tourism, and Smart Health Care could be highly linked through the collaboration among technologies in adjacent areas at the Trend Level. Additionally, various utilization measures of related technology applied at the Trend Level were highlighted in the process of urban regeneration, public service space creation, maintenance, and public service. In other words, with the realization of ubiquitous computing, Hyper-Connectivity, Hyper-Reality, Hyper-Intelligence, and Hyper-Convergence were proposed, reflecting the basic characteristics of digital technology in the landscape industry can be achieved. It was analyzed that the landscaping industry was effectively accommodating and coordinating with the needs of new characters, education and consulting, as well as existing tasks, even when participating in urban regeneration projects. In particular, it has been shown that the overall landscapig area is effective in increasing the virtuous circle value when it systems the related technology at the trend level by linking maintenance with strategic bridgehead. This is because the industrial structure is effective in distributing data and information produced from various channels. Subsequent research, such as demonstrating the fusion of the 4th Industrial Revolution technology based on the use of digital data in creation, maintenance, and service of actual landscape space is necessary.