• Title/Summary/Keyword: User Action

Search Result 431, Processing Time 0.023 seconds

An Exploratory Research on the Improvement of Agricultural Food-related Public Organizations' Information Service : Based on the example of Okdab.kr's information service improvement strategy

  • Ham, Eunin;Lee, Jongtae
    • Agribusiness and Information Management
    • /
    • v.10 no.1
    • /
    • pp.26-34
    • /
    • 2018
  • Development, availability and users' participation in the information service of agricultural food sector is slower than that of other sectors in Korea. This phenomenon comes from the lack of development strategies and comparative analyses with other sectors, as well as the agricultural food industry's own characteristics which is developed based on the offline market. In this research, we will discuss about how to improve the public information service of agricultural food sector based on the example of establishing service improvement strategy by the most representative Okdab. In this research, we have drawn the following implications for development strategy of Okdab service based on three core keywords derived from benchmarking KOSIS. Three core subjects for upgrading public information service are 'analysis information with expertise and differentiation,' 'user cooperation-oriented platform,' and 'intuitive nd effective UX,' and to strength B.I. as an integrated information service of agricultural food sector, we need to identify the users' satisfaction and needs for the existing service, establish an optimized operating strategy on a short-term, mid-term and long term bases, and implement them in a positive way. Based on this positive action, it can become a trustworthy information service for the users, and we can expect the improvement of the users' recognition for its consistent usability and efficiency.

Anomaly Detection Method Based on The False-Positive Control (과탐지를 제어하는 이상행위 탐지 방법)

  • 조혁현;정희택;김민수;노봉남
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.151-159
    • /
    • 2003
  • Internet as being generalized, intrusion detection system is needed to protect computer system from intrusions synthetically. We propose an intrusion detection method to identify and control the contradiction on self-explanation that happen at profiling process of anomaly detection methodology. Because many patterns can be created on profiling process with association method, we present effective application plan through clustering for rules. Finally, we propose similarity function to decide whether anomaly action or not for user pattern using clustered pattern database.

Resource Allocation Strategy of Internet of Vehicles Using Reinforcement Learning

  • Xi, Hongqi;Sun, Huijuan
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.443-456
    • /
    • 2022
  • An efficient and reasonable resource allocation strategy can greatly improve the service quality of Internet of Vehicles (IoV). However, most of the current allocation methods have overestimation problem, and it is difficult to provide high-performance IoV network services. To solve this problem, this paper proposes a network resource allocation strategy based on deep learning network model DDQN. Firstly, the method implements the refined modeling of IoV model, including communication model, user layer computing model, edge layer offloading model, mobile model, etc., similar to the actual complex IoV application scenario. Then, the DDQN network model is used to calculate and solve the mathematical model of resource allocation. By decoupling the selection of target Q value action and the calculation of target Q value, the phenomenon of overestimation is avoided. It can provide higher-quality network services and ensure superior computing and processing performance in actual complex scenarios. Finally, simulation results show that the proposed method can maintain the network delay within 65 ms and show excellent network performance in high concurrency and complex scenes with task data volume of 500 kbits.

Information Verification Practices and Perception of Social Media Users on Fact-Checking Services

  • Rabby Q., Lavilles;January F., Naga;Mia Amor C., Tinam-isan;Julieto E., Perez;Eddie Bouy B., Palad
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.1-13
    • /
    • 2023
  • This study determines how social media users (SMUs) verify the information they come across on the Internet. It determines SMUs' perception of online fact-checking services in terms of their ease of use, usefulness, and trust. By conducting a focus group discussion and key informant interviews, themes were derived in determining fact-checking practices while a survey was further conducted to determine such perceived ease of use, usefulness, and trust in fact-checking services. The thematic analysis revealed major information verification practices, such as cross-checking and verifying with other sources, inspecting comments and reactions, and confirming from personal and social networks. The results showed that SMUs considered fact-checking services easy to use. However, a concern was raised about their usefulness stemming from the delayed action in addressing the information issues that need to be verified. As to perceived trust, it was found that SMUs have reservations about fact-checking services. Finally, it is believed that fact-checking services are expected to be credible and need to be promoted to mitigate any form of fake news, particularly on social media platforms.

Applying Academic Theory with Text Mining to Offer Business Insight: Illustration of Evaluating Hotel Service Quality

  • Choong C. Lee;Kun Kim;Haejung Yun
    • Asia pacific journal of information systems
    • /
    • v.29 no.4
    • /
    • pp.615-643
    • /
    • 2019
  • Now is the time for IS scholars to demonstrate the added value of academic theory through its integration with text mining, clearly outline how to implement this for text mining experts outside of the academic field, and move towards establishing this integration as a standard practice. Therefore, in this study we develop a systematic theory-based text-mining framework (TTMF), and illustrate the use and benefits of TTMF by conducting a text-mining project in an actual business case evaluating and improving hotel service quality using a large volume of actual user-generated reviews. A total of 61,304 sentences extracted from actual customer reviews were successfully allocated to SERVQUAL dimensions, and the pragmatic validity of our model was tested by the OLS regression analysis results between the sentiment scores of each SERVQUAL dimension and customer satisfaction (star rates), and showed significant relationships. As a post-hoc analysis, the results of the co-occurrence analysis to define the root causes of positive and negative service quality perceptions and provide action plans to implement improvements were reported.

Beacon Signal Strength Analysis for Efficient Indoor Positioning (효율적인 실내 위치 측위를 위한 비콘 신호세기 분석)

  • Hwang, Hyun-seo;Park, Jin-tae;Yun, Jun-soo;Phyo, Gyung-soo;Moon, Il-young;Lee, Jong-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.552-557
    • /
    • 2015
  • Recent performed by recognizing a user's location, various services have been tailored focus on short-range wireless communication technology. A beacon in which is attracting attention as next-generation technology. Beacon is a terminal by utilizing the frequency of the non-audible area can not be bluetooth and human sending and receiving terminals and information, Apple recently iBeacon like a low-power Bluetooth (BLE; bluetooth low energy) based beacon showing a tendency to rise into the mainstream there. Services using a beacon is basically installs the terminal in a certain place indoor. It is characterized by providing the user the services to catch the user's position, even automatically take a separate action. Various types of location-based service provided by the target interior space began to attract attention. A variety of location-based services are provided in the interior space in order to be successfully deployed and provide guidance to the interior space, the movement route and the like are essentially required to build various types of information. In this paper, for efficient indoor positioning by varying the signal strength of the beacon in such areas were measured and analyzed.

Examining the Influencing Factors of Third-Party Mobile Payment Adoption: A Comparative Study of Alipay and WeChat Pay

  • Mu, Hong-Lei;Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.247-284
    • /
    • 2017
  • Purpose The first purpose of this study is to investigate factors that are likely to influence user's intention to adopt third-party mobile payment platform. A comprehensive study about mobile payment services have used various variables to explain user's use intention based on the theory of reasoned action (TRA) or the theory of planned behavior (TPB). Variables such as simplicity, security, costs, relative advantage, individual mobility, subjective norm, trust, satisfaction, attitude towards use, perceived usefulness, perceived ease of use and so on. Among these factors, we expect to find out the most influential factors effecting user's use intention of the third-party mobile payment services. Second, we also examine whether the most influential factors have the same influence to different third-party mobile payment services by conducting comparative study of Alipay and WeChat Pay. Design/methodology/approach Empirical data for this study were collected from Chinese who has the experience using or have used Alipay or WeChat Pay. Participants needed to be familiar with Alipay or WeChat Pay because such users may be more aware of both the advantages and disadvantages of Alipay and WeChat Pay. We conduct a pilot test using Smart PLS 2.0, which includes 50 Alipay users and 82 WeChat Pay users. The result indicates that all the measurement fit for the context. And then 980 questionnaires were mainly sent out to the college students and the e-mails users randomly. To encourage participation, we give the participants a small gift as a present. Finally, we received a total of 683 replied. Data from respondents who gave incomplete or invalid answers were excluded to assure the validity of the constructs. 79 questionnaires were rejected, finally the valid data are 604 (with 372 Alipay users and 232 WeChat Pay users). Findings The results suggest that users' intention is determined by their trust on third-party mobile payment service and perceived usefulness of use. Comparative study results also indicated that the factors have different influence on Alipay group and WeChat Pay group, which offers a new aspect for academic field, and provides useful information to mobile payment service providers in China.

Construction Site Safety Management System Using ZigBee Communication (지그비 통신을 이용한 건설 현장 안전 관리 시스템)

  • Lee, ChangHo;Kim, KangHee;Kim, JiWon;Choi, SangBang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.3
    • /
    • pp.39-51
    • /
    • 2017
  • Recently, looking at construction sites with either large or small scale, accidents like collision, fall, etc. occur often. These accidents lead to not only damage of human lives but also serious economic loss. In case of large scale constructions sites, safety management systems are used to reduce industrial accidents. However in construction sites with small scale, those systems cannot be applied due to problems such as lack of compatability and high installation expense. In this case, just by putting on safety gears can also reduce industrial accidents. Therefore, in this paper, a safety management systems that can be used at both large and small scale construction sites is proposed. This safety management system consists of a smart module, a repeater and a gateway, and a monitoring system. The smart module, which is detachable, is attached to a safety helmet. This module transfers the current status of the user to the monitoring system through the repeater and the gateway. The repeater transfers the data received from the smart module to the gateway, and the gateway sends the data from the repeater to the monitoring system. The monitoring system shows the user status to the safety supervisor by displaying the data - temperature, height, intensity of illumination, images - received from the smart module. The safety supervisor can monitor the user status in real-time and take immediate action in case of emergency through this monitoring system.

A Multicast Middleware for the Remote Educational Systems (원격 교육 시스템을 위한 멀티캐스트 미들웨어)

  • Byun, Sang-Seon;Jin, Hyun-Wook;Yoo, Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.100-108
    • /
    • 2003
  • By choosing Multicast for transmission of educational contents in the Remote Educational System, we can reduce the server load and increase network bandwidth utilization. We design and implement Multicast Middleware for the Remote Educational System in this paper. There are three characteristics in this Multicast Middleware: 1) Through Centralized Multicast Group Management for passive members, it allows a host to make multicast group, which is composed of receivers, called Group Member and who are chosen by the host, called group Maker. Because, all groups are created by the Group Maker in Centralized Group Management, Group Member's join action will be passive 2) Maintenance and recovery of multicast group information in order to restore from exception and crash; the maintenance and recovery mechanism of Group Maker is distinct from that of Group Member. 3) The mechanism which enables to transmit large size multimedia data through multicasting and remove additional copy operation through shared buffer. Fragmentation/de-fragmentation for large data delivery results in additional copy operation in user level. But by using user level shared buffer, it can be done without user Bevel copy operation. By applying to Remote Educational environment which consists of 30 PCs and Fast Ethernet, we can examine the efficiency of this middleware, which can transmit 18frames/sec movie which resolution 320 $\times$ 120 pixels, 128Kbps encoded sound data and some text data.

Design and Implementation of Indoor Air Hazardous Substance Detection Mobile System based on IoT Platform (IoT platform 기반 실내 대기 위험 물질 감지 모바일 시스템 설계 및 구현)

  • Yang, Oh-Seok;Kim, Yeong-Uk;Lee, Hong-Lo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.6
    • /
    • pp.43-53
    • /
    • 2019
  • In recent years, there have been many cases of damage to indoor air hazardous materials, and major damage due to the lack of quick action. In this regard, the system is intended to establish for sending push messages to the user's mobile when the concentration of hazardous substances is exceeded. This system extracts data with IoT system such as Arduino and Raspberry Pi and then constructs database through MongoDB and MySQL in cloud computing system. The database is imported through the application server using NodeJS and sent to the application for visualization. Also, when receiving signals about a dangerous situation in IoT system, push message is sent using Google FCM library. Mobile application is developed using Android Web view, and page to enter Web view is developed using HTML5 (HTML, Javascript CSS). The application of this system enables real-time monitoring of indoor air-dangerous substances. In addition, real-time information on indoor/outdoor detection location and concentration can be sent to the user's mobile in case of a risk situation, which can be expected to help the user respond quickly.