• Title/Summary/Keyword: User Network

Search Result 4,591, Processing Time 0.035 seconds

The strategic behaviors of incumbent pharmacy groups in the retail market of pharmaceuticals in response to the entry trials by the online platform firms delivering medicines - A perspective of market entry deference model in game theory (온라인 의약품배송플랫폼기업의 시장 진입 시도에 대한 기존 의약품 공급자의 전략적 행동 - 게임이론의 시장진입 저지 모형 관점)

  • Lee, Jaehee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.303-311
    • /
    • 2022
  • Recently the telemedicine platform firms which have been temporarily permitted since COVID-19 outbreak have increasingly provided online prescription drugs delivery, causing concerns among incumbent providers of medicine, some of whom began to take aggressive actions again them. In this study, using game theoretic market entry - deterrence model, we show that although the incumbent medicine provider can effectively deter entry by the telemedicine platform firms by its preemptive action, accommodation could be a optimal action when telemedicine platform firms already have penetrated the market with their being permitted to do business due to the COVID-19. However, for the incumbent to cooperate for the successful change in the retail market for medicines, policies like placing a ceiling on the maximum number of taking prescriptions by the pharmacists a day in the telemedince platform network, providing favorable exposure of community pharmacists on the telemedicine platform user interface, and allowing community pharmacies to participate as shareholders of the telemedicine platform firms in its initial public opening of capital, are suggested.

Implementation of CoMirror System with Video Call and Messaging Function between Smart Mirrors (스마트 미러간 화상 통화와 메시징 기능을 가진 CoMirror 시스템 구현)

  • Hwang, Kitae;Kim, Kyung-Mi;Kim, Yu-Jin;Park, Chae-Won;Yoo, Song-Yeon;Jung, Inhwan;Lee, Jae-Moon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.121-127
    • /
    • 2022
  • Smart mirror is an IoT device that attaches a display and an embedded computer to the mirror and provides various information to the useer along with the mirror function. This paper went beyond the form of dealing with smart mirrors only stand alone device the provide information to users, and constructed a network in which smart mirrors are connected, and proposed and implemented a CoMirror system that allows users to talk and share information with other smart mirror users. The CoMirror system has a structure in which several CoMirror clients are connected on one CoMirror server. The CoMirror client consists of Raspberry Pi, a mirror film, a touch pad, a display device, an web camera, etc. The server has functions such as face learning and recognition, user management, a relay role for exchanging messages between clients, and setting up for video call. Users can communicate with other CoMirror users via the server, such as text, image, and audio messages, as well as 1:1 video call.

A research on the Construction and Sharing of Authority Record-focusing on the Case of Social Networks and Archival Context Project (전거레코드 구축 및 공유에 관한 연구 SNAC 프로젝트 사례를 중심으로)

  • Lee, Eun Yeong
    • The Korean Journal of Archival Studies
    • /
    • no.71
    • /
    • pp.49-89
    • /
    • 2022
  • This study suggests the necessity and domestic application plan a national authority database that promotes an integrated access, richer search, and understanding of historical information sources and archival resources distributed among cultural heritage institutions through the "Social Networks and Archive Context" project case. As the SNAC project was transformed into an international cooperative organization led by NARA, it was possible to secure a sustainable operating system and realize cooperative authority control. In addition, SNAC authority records have the characteristics of providing richer contextual information about life and history and social and intellectual network information compared to libraries. Through case analysis, First, like SNAC, a cooperative body led by the National Archives and having joint ownership of the National Library of Korea should lead the development and expand the scope of participating institutions. Second, in the cooperative method, take a structure in which divisions are made for each field with special strengths, but the main decision-making is made through the administrative team in which the two organizations participate. Third, development of scalable open source software that can collect technical information in various formats when constructing authority data, designing with the structure and elements of archival authority records, designing functions to control the quality of authority records, and building user-friendly interfaces and the need for a platform design reflecting content elements.

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

Implementation of CNN-based Classification Training Model for Unstructured Fashion Image Retrieval using Preprocessing with MASK R-CNN (비정형 패션 이미지 검색을 위한 MASK R-CNN 선형처리 기반 CNN 분류 학습모델 구현)

  • Seunga, Cho;Hayoung, Lee;Hyelim, Jang;Kyuri, Kim;Hyeon-Ji, Lee;Bong-Ki, Son;Jaeho, Lee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.6
    • /
    • pp.13-23
    • /
    • 2022
  • In this paper, we propose a detailed component image classification algorithm by fashion item for unstructured data retrieval in the fashion field. Due to the COVID-19 environment, AI-based online shopping malls are increasing recently. However, there is a limit to accurate unstructured data search with existing keyword search and personalized style recommendations based on user surfing behavior. In this study, pre-processing using Mask R-CNN was conducted using images crawled from online shopping sites and then classified components for each fashion item through CNN. We obtain the accuaracy for collar of the shirt's as 93.28%, the pattern of the shirt as 98.10%, the 3 classese fit of the jeans as 91.73%, And, we further obtained one for the 4 classes fit of jeans as 81.59% and the color of the jeans as 93.91%. At the results for the decorated items, we also obtained the accuract of the washing of the jeans as 91.20% and the demage of jeans accuaracy as 92.96%.

Research on the Influence of Interaction, Identification and Recommendation of Entertainment Communication Platform (커뮤니케이션 플랫폼의 상호작용이 동일시와 추천 의도에 미치는 영향)

  • Zhao, Yi-Dan;Choi, Myeong-gil
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.6
    • /
    • pp.23-33
    • /
    • 2021
  • Under the long-term influence of COVID-19, offline activities were interrupted and online communication became the main way. With the rapid development of Korean Wave and network information technology, there have been many entertainment communication platforms. Fans can communicate with stars and other fans and share information through entertainment and communication platforms. This can improve users' perception of the value of entertainment communication platforms, arouse emotional resonance and have a positive impact on users' platform recommendation intention. In this study, the influence of user interaction, identity and recommendation intention of entertainment communication platforms was investigated by questionnaire. The results are as follows: First, the interaction between fans and content has a positive effect on psychological and behavioral identity. Second, the interaction between fans does not affect their psychological and behavioral identity. Third, the interaction between fans and stars has a positive impact on psychological identity and behavior identity. Fourth, psychological identity and behavioral identity have a positive impact on community members' willingness to recommend. Behavioral identity plays a partial mediating role between psychological identity and recommendation intention. Based on the above analysis results, the present situation, limitations and future research directions of this study are put forward.

A Study on the Research Trends on Literacy in Library and Information Science (문헌정보학 분야의 리터러시 연구 동향 분석)

  • Jang, Su Hyun;Nam, Young Joon
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.3
    • /
    • pp.263-292
    • /
    • 2022
  • The purpose of this study is to identify the topics of research related to the concepts of literacy in the field of Library and Information Science which is related to user education in libraries. Data were collected from the WoS and KCI databases, and complementary keyword analysis and topic modeling analysis techniques were used to identify topics of literature-related research articles in the field of Library and Information Science. Findings presented that there was a difference in keywords and topics between the two databases. Literacy-related topics identified from the KCI database were classified into three groups through topic modeling. Also, it was analyzed that there is a difference between the overall literacy-related research trend, the timing of the surge in research volume, and key frequent keywords in the Library and Information Science field confirmed in the study. In particular, in the study of literacy in all fields, a number of words such as 'literacy', 'education', 'media', and 'digital' were derived. However, in literature research in the field of Library and Information Science, keywords such as 'information utilization ability' and 'school library' appeared. Based on this, it was concluded that research on the ability to develop an evaluative eye for information is needed in line with today's information environment, where information is rapidly increasing in Korea in the future.

Qos Management System of BcN for Convergence Services of Broadcasting and Communication (방송통신 컨버전스 서비스를 위한 BcN의 Qos 관리시스템)

  • Song, Myung-Won;Choi, In-Young;Jung, Soon-Key
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.121-131
    • /
    • 2009
  • BcN provides a wide variety of high-quality multimedia services such as broadcasting and communication convergence services. But the quality degeneration is observed in BcN when we use broadcasting and communication convergence service via more than one network of different internet service providers. In this paper, a QoS management system which is able to measure and maintain objectively the quality-related information in overall networks is proposed. The proposed QoS management system is tested on the pilot networks of BcN consortiums by measuring the quality of voice and video experienced by the actual users of the commercial video phone services. The result of the experiment shows that it is possible to figure out service qualify between a user and a service provider by analyzing the information from agents. The per-service traffic information collected by probes is proved to be useful to pinpoint the party responsible for the loss of the service qualify in case of the services including different service providers. As the result of the experiment, it is shown that the proposed QoS management system would play a key role of resolving the quality dispute, which is one of the important issues of QoS-guaranteed BcN.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.