• Title/Summary/Keyword: User data

Search Result 9,010, Processing Time 0.231 seconds

Cost-Benefit based User Review Selection Method

  • Neung-Hoe Kim;Man-Soo Hwang
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.177-181
    • /
    • 2023
  • User reviews posted in the application market show high relevance with the satisfaction of application users and its significance has been proven from numerous studies. User reviews are also crucial data as they are essential for improving applications after its release. However, as infinite amounts of user reviews are posted per day, application developers are unable to examine every user review and address them. Simply addressing the reviews in a chronological order will not be enough for an adequate user satisfaction given the limited resources of the developers. As such, the following research suggests a systematical method of analyzing user reviews with a cost-benefit analysis, in which the benefit of each user review is quantified based on the number of positive/negative words and the cost of each user review is quantified by using function point, a technique that measures software size.

An Investigation on Strategic Choice and Utilization of Information Systems Outsourcing (정보(情報)시스템 Outsourcing의 전략적(戰略的) 선택(選擇) 및 활용(活用)에 관한 연구(硏究))

  • Moon, Tae-Soo;Han, Kyong-Soo
    • Asia pacific journal of information systems
    • /
    • v.7 no.3
    • /
    • pp.39-59
    • /
    • 1997
  • This study presents the growth strategy of outsourcing service by finding out the differences of importance between user firms and system integration(SI) firms in Korean outsourcing business, The result of data analysis reveals that there are siginificant differences between user firms and SI firms in some components of information systems(IS) outsourcing services. User firms regarded integation of distributea data centers as the prominent issue of IS environment changes. Meanwhile, SI firms chose management of IS/VAN center, office automation(OA), and management of global network, as the more important issues in the application area of outsourcing. Among the merits of outsourcing, both of them considered cost reduction and IS flexibility as the most important factors, However, they chose the difficulty of management control and the lack of operation knowledge among the demerits of outsourcing, Also, they commonly selected overall IS consulting among the components of outsourcing diffusion. In the question of future outsourcing services, user firms chose the adoption of client/server architecture, while SI firms selected the application of multimedia. These results show that there are some differences of preference between user firms and SI firms. Most of user firms consider the outsourcing to maximize information utilization, while the service suppliers focus on new IT adoption and its application to organization. For the strategic use of outsourcing services, SI firms are required to establish the diffusion strategy to meet the outsourcing needs of user firms.

  • PDF

Character Floating Hologram using Detection of User's Height and Motion by Depth Image (깊이 영상으로 사용자 키 검출 및 동작감지를 사용한 캐릭터 플로팅 홀로그램)

  • Oh, KyooJin;Han, DaeHyun;Kwon, SoonKak
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.4
    • /
    • pp.33-40
    • /
    • 2018
  • With the development of computer and video technology, a lot of contents are being produced as digital media methods to provide are being diversified and the intrest in digital media increases. Such contents are actively researched using human motion and user's information through camera or controller. Contents using user's information can be exposed to various people in public places and used as an advertisement. This paper proposes the character floating hologram system that is implemented using detection of user's height and motion. The purposed system detects user's height and motion from depth images and creates corresponding character from the detected data. Then it is represented using a floating hologram device. This system can be used for marketing, advertising and exhibition events using user information.

A study on the effect of user experience of fitness APP on product trust and purchase intention

  • Zhoua, Huizhuo;Xing, Xiaoyu;Lu, Zifan
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.3
    • /
    • pp.1-18
    • /
    • 2022
  • Purpose - The purpose of this study is to take fitness APP users as the research object from the perspective of user experience to explore the influence of fitness APP user experience factors on product trust and purchase intention. Design/methodology/approach - The study collected data on 275 customers who had experience buying and using fitness apps. To test the hypothesis, SPSS 27.0 and AMOS 26.0 statistical packages were used based on the collected data. Findings - The results showed that the user experience factors (usefulness, ease to use, enjoyment, interaction) of fitness APP and the relationship between product trust had a positive effect, and product trust had a positive effect on purchase intention. In addition, exercise experience, showed a moderating effect in the relationship between the usefulness, easy to use of user experience and product trust. Research implications or Originality - This study provided research model among user experience factors of fitness APP, product trust and purchase intention. This study can help sports and fitness companies with product optimization and marketing decisions.

Research on Data Acquisition Strategy and Its Application in Web Usage Mining (웹 사용 마이닝에서의 데이터 수집 전략과 그 응용에 관한 연구)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.231-241
    • /
    • 2019
  • Web Usage Mining (WUM) is one part of Web mining and also the application of data mining technique. Web mining technology is used to identify and analyze user's access patterns by using web server log data generated by web users when users access web site. So first of all, it is important that the data should be acquired in a reasonable way before applying data mining techniques to discover user access patterns from web log. The main task of data acquisition is to efficiently obtain users' detailed click behavior in the process of users' visiting Web site. This paper mainly focuses on data acquisition stage before the first stage of web usage mining data process with activities like data acquisition strategy and field extraction algorithm. Field extraction algorithm performs the process of separating fields from the single line of the log files, and they are also well used in practical application for a large amount of user data.

Development of Climate & Environment Data System for Big Data from Climate Model Simulations (대용량 기후모델자료를 위한 통합관리시스템 구축)

  • Lee, Jae-Hee;Sung, Hyun Min;Won, Sangho;Lee, Johan;Byu, Young-Hwa
    • Atmosphere
    • /
    • v.29 no.1
    • /
    • pp.75-86
    • /
    • 2019
  • In this paper, we introduce a novel Climate & Environment Database System (CEDS). The CEDS is developed by the National Institute of Meteorological Sciences (NIMS) to provide easy and efficient user interfaces and storage management of climate model data, so improves work efficiency. In uploading the data/files, the CEDS provides an option to automatically operate the international standard data conversion (CMORization) and the quality assurance (QA) processes for submission of CMIP6 variable data. This option increases the system performance, removes the user mistakes, and increases the level of reliability as it eliminates user operation for the CMORization and QA processes. The uploaded raw files are saved in a NAS storage and the Cassandra database stores the metadata that will be used for efficient data access and storage management. The Metadata is automatically generated when uploading a file, or by the user inputs. With the Metadata, the CEDS supports effective storage management by categorizing data/files. This effective storage management allows easy and fast data access with a higher level of data reliability when requesting with the simple search words by a novice. Moreover, the CEDS supports parallel and distributed computing for increasing overall system performance and balancing the load. This supports the high level of availability as multiple users can use it at the same time with fast system-response. Additionally, it deduplicates redundant data and reduces storage space.

Fountain Code-based Hybrid P2P Storage Cloud (파운틴 코드 기반의 하이브리드 P2P 스토리지 클라우드)

  • Park, Gi Seok;Song, Hwangjun
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.58-63
    • /
    • 2015
  • In this work, we present a novel fountain code-based hybrid P2P storage system that combines cloud storage with P2P storage. The proposed hybrid storage system minimizes data transmission time while guaranteeing high data retrieval and data privacy. In order to guarantee data privacy and storage efficiency, the user transmits encoded data after performing fountain code-based encoding. Also, the proposed algorithm guarantees the user's data retrieval by storing the data while considering each peer's survival probability. The simulation results show that the proposed algorithm enables fast completion of the upload transmission while satisfying the required data retrieval and supporting the privacy of user data under the system parameters.

A PageRank based Data Indexing Method for Designing Natural Language Interface to CRM Databases (분석 CRM 실무자의 자연어 질의 처리를 위한 기업 데이터베이스 구성요소 인덱싱 방법론)

  • Park, Sung-Hyuk;Hwang, Kyeong-Seo;Lee, Dong-Won
    • CRM연구
    • /
    • v.2 no.2
    • /
    • pp.53-70
    • /
    • 2009
  • Understanding consumer behavior based on the analysis of the customer data is one essential part of analytic CRM. To do this, the analytic skills for data extraction and data processing are required to users. As a user has various kinds of questions for the consumer data analysis, the user should use database language such as SQL. However, for the firm's user, to generate SQL statements is not easy because the accuracy of the query result is hugely influenced by the knowledge of work-site operation and the firm's database. This paper proposes a natural language based database search framework finding relevant database elements. Specifically, we describe how our TableRank method can understand the user's natural query language and provide proper relations and attributes of data records to the user. Through several experiments, it is supported that the TableRank provides accurate database elements related to the user's natural query. We also show that the close distance among relations in the database represents the high data connectivity which guarantees matching with a search query from a user.

  • PDF

The Acquisition Methodology Study of User Trace Data in Mac OS X (Mac OS X 운영체제상의 사용자 흔적정보 수집방안 연구)

  • Choi, Joon-Ho;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.335-346
    • /
    • 2010
  • Mac OS X is the Computer Operating System that develop in Apple Inc. Mac OS X is the successor to Mac OS 9 Version which had been Apple's primary operating system since 1984. Recently, Mac OS X 10.6 (Snow Leopard) has been manufactured and is distributed to user. Apple's Mac OS X Operating System is occupying about 10% in the world Operating System market share. But, Forensic tools that is utilized on digital forensic investigation can not forensic analysis about Mac OS X properly. To do forensic investigation about Mac OS X, information connected with user's action and trace can become important digital evidence in Operating System. This paper presents way about user trace data acquisition methodology in Mac OS X.

Interactive Typography System using Combined Corner and Contour Detection

  • Lim, Sooyeon;Kim, Sangwook
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.68-75
    • /
    • 2017
  • Interactive Typography is a process where a user communicates by interacting with text and a moving factor. This research covers interactive typography using real-time response to a user's gesture. In order to form a language-independent system, preprocessing of entered text data presents image data. This preprocessing is followed by recognizing the image data and the setting interaction points. This is done using computer vision technology such as the Harris corner detector and contour detection. User interaction is achieved using skeleton information tracked by a depth camera. By synchronizing the user's skeleton information acquired by Kinect (a depth camera,) and the typography components (interaction points), all user gestures are linked with the typography in real time. An experiment was conducted, in both English and Korean, where users showed an 81% satisfaction level using an interactive typography system where text components showed discrete movements in accordance with the users' gestures. Through this experiment, it was possible to ascertain that sensibility varied depending on the size and the speed of the text and interactive alteration. The results show that interactive typography can potentially be an accurate communication tool, and not merely a uniform text transmission system.