• Title/Summary/Keyword: User scope

Search Result 239, Processing Time 0.022 seconds

Improving the Design-phased VE Process of Public Clients in Relation to Using Critical Success Factors (핵심성공요인과 연계한 공공발주기관의 설계VE 프로세스 개선에 관한 연구)

  • Park, Heedae;Han, Seung Heon;Kim, Sung Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.3D
    • /
    • pp.399-408
    • /
    • 2009
  • The major changes in construction environment are that construction project is bigger and more complicated and the power of construction market changes from the supplier to the client or the user. Especially public construction enterprises have advanced to introduce the value engineering (VE) which is one of the cost management based on the owner's leading at the design phase for economical efficiency and quality improvement. According to the these efforts, the implementation of VE was legislated in the revised Construction Technology Management Act in 2000, governmental agencies, local autonomies, and construction public enterprises universally has taken the VE into consideration. In this circumstance, the scope that VE construction applied at 50 billion won projects from 2003 has been extended to 10 billion won projects in 2006. Therefore, the VE construction will be activated in the future. The cost savings and function improvement, which are the purpose of VE are not only construction public enterprises, but also every public client supported from government's budget or owned by the government. Therefore, the purpose of this study is to propose the improved process and performance index of VE for governmental agencies, local autonomies, and construction public enterprises which want to introduce or improve the VE process. This research also suggested the To-be design-phased VE process model. In addition, it suggested the To-be model of design management reflected the To-be design-phased VE process model, which is eliminated two problems reflected for the performance improvement of the As-is model of design management.

A Study on Management and Improvement of P University Libraries with Viewpoint of Five Laws of Library Science: Focused on the first law and the fifth law (도서관학 5법칙으로 본 P대학도서관 운영과 개선방안)

  • Sun-Gu Jeon;Yong-Jae Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.3
    • /
    • pp.57-80
    • /
    • 2023
  • The purpose of this study is to examine the current status of university library operation through the five laws of library science and suggest ways to improve it. To this end, the operation status of four national and public university libraries was analyzed with the scope of the study as the Busan area. Furthermore, for an in-depth investigation, the P University library in Busan was examined as a case. The operation status of national and public university libraries in the Busan region was analyzed by dividing them into the categories of university library collection materials, facilities, staff, material purchase costs, and users from 2018 to 2022. In particular, there was a decrease in users and a shortage of librarians due to COVID-19. In the case study, the operation status of P University library was investigated focusing on the first and fifth laws of Ranganathan's five laws of library science. In the first law, the study was conducted on the aspects of access to and use of the collection, library location, usage time and book lending, and staff. In the fifth law, the investigation was divided into service improvement aspects according to changes in digital technology of P University library and library environment improvement aspects according to changes in user characteristics. As a result of the study, 'establishment of library space composition strategy', 'establishment of blue ocean strategy', and 'expansion of recruitment and deployment of librarians' were suggested as improvement plans.

A Study of the Beauty Commerce Customer Segment Classification and Application based on Machine Learning: Focusing on Untact Service (머신러닝 기반의 뷰티 커머스 고객 세그먼트 분류 및 활용 방안: 언택트 서비스 중심으로)

  • Sang-Hyeak Yoon;Yoon-Jin Choi;So-Hyun Lee;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.75-92
    • /
    • 2020
  • As population and generation structures change, more and more customers tend to avoid facing relation due to the development of information technology and spread of smart phones. This phenomenon consists with efficiency and immediacy, which are the consumption patterns of modern customers who are used to information technology, so offline network-oriented distribution companies actively try to switch their sales and services to untact patterns. Recently, untact services are boosted in various fields, but beauty products are not easy to be recommended through untact services due to many options depending on skin types and conditions. There have been many studies on recommendations and development of recommendation systems in the online beauty field, but most of them are the ones that develop recommendation algorithm using survey or social data. In other words, there were not enough studies that classify segments based on user information such as skin types and product preference. Therefore, this study classifies customer segments using machine learning technique K-prototypesalgorithm based on customer information and search log data of mobile application, which is one of untact services in the beauty field, based on which, untact marketing strategy is suggested. This study expands the scope of the previous literature by classifying customer segments using the machine learning technique. This study is practically meaningful in that it classifies customer segments by reflecting new consumption trend of untact service, and based on this, it suggests a specific plan that can be used in untact services of the beauty field.

A Study on Practices and Improvement Factors of Financial Disclosures in early stages of IFRS Adoption - An Integrative Approach of Korean Cases: Embracing Views of Reporting Entities and Users of Financial Statements (IFRS 공시 실태 개선방안에 대한 소고 - 보고기업, 정보이용자 요인을 고려한 통합적 접근 -)

  • Kim, Hee-Suk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.2
    • /
    • pp.113-127
    • /
    • 2012
  • From the end of 1st quarter of 2012, Korean mandatory firms had started releasing financial reports conforming to the K-IFRS(Korean adopted International Financial Reporting Standards). Major characteristics of IFRS, such as 'principles based' features, consolidated reporting, 'fair value' measurement, increased pressure for non-financial disclosures have resulted in brief and various disclosure practices regarding the main body of each statements and vast amount of note description requirements. Meanwhile, a host of previous studies on IFRS disclosures have incorporated regulatory and/or 'compete information' perspectives, mainly focusing on suggesting further enforcement of strengthened requirements and providing guidelines for specific treatments. Thus, as an extension of prior findings and suggestions this study had explored to conduct an integrative approach embracing views of the reporting entities and the users of financial information. In spite of all the state-driven efforts for faithful representation and comparability of corporate financial reports, an overhaul of disclosure practices of fiscal year 2010 and 2011 had revealed numerous cases of insufficiency and discordance in terms of mandatory norms and market expectations. As to the causes of such shortcomings, this study identified several factors from the corporate side and the users of the information; some inherent aspects of IFRS, industry/corporate-specific context, expenditures related to internalizing IFRS system, reduced time frame for presentation. lack of clarity and details to meet the quality of information - understandability, comparability etc. - commonly requested by the user group. In order to improve current disclosure practices, dual approach had been suggested; Firstly, to encourage and facilitate implementation, (1) further segmentation and differentiation of mandates among companies, (2) redefining the scope and depth of note descriptions, (3) diversification and coordination of reporting periods, (4) providing support for equipping disclosure systems and granting incentives for best practices had been discussed. Secondly, as for the hard measures, (5) regularizing active involvement of corporate and user group delegations in the establishment and amendment process of K-IFRS (6) enforcing detailed and standardized disclosure on reporting entities had been recommended.

  • PDF

A Study on Knowledge Entity Extraction Method for Individual Stocks Based on Neural Tensor Network (뉴럴 텐서 네트워크 기반 주식 개별종목 지식개체명 추출 방법에 관한 연구)

  • Yang, Yunseok;Lee, Hyun Jun;Oh, Kyong Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.25-38
    • /
    • 2019
  • Selecting high-quality information that meets the interests and needs of users among the overflowing contents is becoming more important as the generation continues. In the flood of information, efforts to reflect the intention of the user in the search result better are being tried, rather than recognizing the information request as a simple string. Also, large IT companies such as Google and Microsoft focus on developing knowledge-based technologies including search engines which provide users with satisfaction and convenience. Especially, the finance is one of the fields expected to have the usefulness and potential of text data analysis because it's constantly generating new information, and the earlier the information is, the more valuable it is. Automatic knowledge extraction can be effective in areas where information flow is vast, such as financial sector, and new information continues to emerge. However, there are several practical difficulties faced by automatic knowledge extraction. First, there are difficulties in making corpus from different fields with same algorithm, and it is difficult to extract good quality triple. Second, it becomes more difficult to produce labeled text data by people if the extent and scope of knowledge increases and patterns are constantly updated. Third, performance evaluation is difficult due to the characteristics of unsupervised learning. Finally, problem definition for automatic knowledge extraction is not easy because of ambiguous conceptual characteristics of knowledge. So, in order to overcome limits described above and improve the semantic performance of stock-related information searching, this study attempts to extract the knowledge entity by using neural tensor network and evaluate the performance of them. Different from other references, the purpose of this study is to extract knowledge entity which is related to individual stock items. Various but relatively simple data processing methods are applied in the presented model to solve the problems of previous researches and to enhance the effectiveness of the model. From these processes, this study has the following three significances. First, A practical and simple automatic knowledge extraction method that can be applied. Second, the possibility of performance evaluation is presented through simple problem definition. Finally, the expressiveness of the knowledge increased by generating input data on a sentence basis without complex morphological analysis. The results of the empirical analysis and objective performance evaluation method are also presented. The empirical study to confirm the usefulness of the presented model, experts' reports about individual 30 stocks which are top 30 items based on frequency of publication from May 30, 2017 to May 21, 2018 are used. the total number of reports are 5,600, and 3,074 reports, which accounts about 55% of the total, is designated as a training set, and other 45% of reports are designated as a testing set. Before constructing the model, all reports of a training set are classified by stocks, and their entities are extracted using named entity recognition tool which is the KKMA. for each stocks, top 100 entities based on appearance frequency are selected, and become vectorized using one-hot encoding. After that, by using neural tensor network, the same number of score functions as stocks are trained. Thus, if a new entity from a testing set appears, we can try to calculate the score by putting it into every single score function, and the stock of the function with the highest score is predicted as the related item with the entity. To evaluate presented models, we confirm prediction power and determining whether the score functions are well constructed by calculating hit ratio for all reports of testing set. As a result of the empirical study, the presented model shows 69.3% hit accuracy for testing set which consists of 2,526 reports. this hit ratio is meaningfully high despite of some constraints for conducting research. Looking at the prediction performance of the model for each stocks, only 3 stocks, which are LG ELECTRONICS, KiaMtr, and Mando, show extremely low performance than average. this result maybe due to the interference effect with other similar items and generation of new knowledge. In this paper, we propose a methodology to find out key entities or their combinations which are necessary to search related information in accordance with the user's investment intention. Graph data is generated by using only the named entity recognition tool and applied to the neural tensor network without learning corpus or word vectors for the field. From the empirical test, we confirm the effectiveness of the presented model as described above. However, there also exist some limits and things to complement. Representatively, the phenomenon that the model performance is especially bad for only some stocks shows the need for further researches. Finally, through the empirical study, we confirmed that the learning method presented in this study can be used for the purpose of matching the new text information semantically with the related stocks.

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

Using Transportation Card Data to Analyze City Bus Use in the Ulsan Metropolitan City Area (교통카드를 활용한 시내버스의 현황 분석에 관한 연구 - 울산광역시 사례를 중심으로 -)

  • Choi, Yang-won;Kim, Ik-Ki
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.6
    • /
    • pp.603-611
    • /
    • 2020
  • This study collected and analyzed transportation card data in order to better understand the operation and usage of city buses in Ulsan Metropolitan City in Korea. The analysis used quantitative and qualitative indicators according to the characteristics of the data, and also the categories were classified as general status, operational status, and satisfaction. The existing city bus survey method has limitations in terms of survey scale and in the survey process itself, which incurs various types of errors as well as requiring a lot of time and money to conduct. In particular, the bus means indicators calculated using transportation card data were analyzed to compensate for the shortcomings of the existing operational status survey methods that rely entirely on site surveys. The city bus index calculated by using the transportation card data involves quantitative operation status data related to the user, and this results in the advantage of being able to conduct a complete survey without any data loss in the data collection process. We took the transportation card data from the entire city bus network of Ulsan Metropolitan City on Wednesday April 3, 2019. The data included information about passenger numbers/types, bus types, bus stops, branches, bus operators, transfer information, and so on. From the data analysis, it was found that a total of 234,477 people used the city bus on the one day, of whom 88.6% were adults and 11.4% were students. In addition, the stop with the most passengers boarding and alighting was Industrial Tower (10,861 people), A total of 20,909 passengers got on and off during the peak evening period of 5 PM to 7 PM, and 13,903 passengers got on and off the No. 401 bus route. In addition, the top 26 routes in terms of the highest number of passengers occupied 50% of the total passengers, and the top five bus companies carried more than 70% of passengers, while 62.46% of the total routes carried less than 500 passengers per day. Overall, it can be said that this study has great significance in that it confirmed the possibility of replacing the existing survey method by analyzing city bus use by using transportation card data for Ulsan Metropolitan City. However, due to limitations in the collection of available data, analysis was performed only on one matched data, attempts to analyze time series data were not made, and the scope of analysis was limited because of not considering a methodology for efficiently analyzing large amounts of real-time data.

Terrain Shadow Detection in Satellite Images of the Korean Peninsula Using a Hill-Shade Algorithm (음영기복 알고리즘을 활용한 한반도 촬영 위성영상에서의 지형그림자 탐지)

  • Hyeong-Gyu Kim;Joongbin Lim;Kyoung-Min Kim;Myoungsoo Won;Taejung Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_1
    • /
    • pp.637-654
    • /
    • 2023
  • In recent years, the number of users has been increasing with the rapid development of earth observation satellites. In response, the Committee on Earth Observation Satellites (CEOS) has been striving to provide user-friendly satellite images by introducing the concept of Analysis Ready Data (ARD) and defining its requirements as CEOS ARD for Land (CARD4L). In ARD, a mask called an Unusable Data Mask (UDM), identifying unnecessary pixels for land analysis, should be provided with a satellite image. UDMs include clouds, cloud shadows, terrain shadows, etc. Terrain shadows are generated in mountainous terrain with large terrain relief, and these areas cause errors in analysis due to their low radiation intensity. previous research on terrain shadow detection focused on detecting terrain shadow pixels to correct terrain shadows. However, this should be replaced by the terrain correction method. Therefore, there is a need to expand the purpose of terrain shadow detection. In this study, to utilize CAS500-4 for forest and agriculture analysis, we extended the scope of the terrain shadow detection to shaded areas. This paper aims to analyze the potential for terrain shadow detection to make a terrain shadow mask for South and North Korea. To detect terrain shadows, we used a Hill-shade algorithm that utilizes the position of the sun and a surface's derivatives, such as slope and aspect. Using RapidEye images with a spatial resolution of 5 meters and Sentinel-2 images with a spatial resolution of 10 meters over the Korean Peninsula, the optimal threshold for shadow determination was confirmed by comparing them with the ground truth. The optimal threshold was used to perform terrain shadow detection, and the results were analyzed. As a qualitative result, it was confirmed that the shape was similar to the ground truth as a whole. In addition, it was confirmed that most of the F1 scores were between 0.8 and 0.94 for all images tested. Based on the results of this study, it was confirmed that automatic terrain shadow detection was well performed throughout the Korean Peninsula.

Research on Making a Disaster Situation Management Intelligent Based on User Demand (사용자 수요 기반의 재난 상황관리 지능화에 관한 연구)

  • Seon-Hwa Choi;Jong-Yeong Son;Mi-Song Kim;Heewon Yoon;Shin-Hye Ryu;Sang Hoon Yoon
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_2
    • /
    • pp.811-825
    • /
    • 2023
  • In accordance with the government's stance of actively promoting intelligent administrative service policies through data utilization, in the disaster and safety management field, it also is proceeding with disaster and safety management policies utilizing data and constructing systems for responding efficiently to new and complex disasters and establishing scientific and systematic safety policies. However, it is difficult to quickly and accurately grasp the on-site situation in the event of a disaster, and there are still limitations in providing information necessary for situation judgment and response only by displaying vast data. This paper focuses on deriving specific needs to make disaster situation management work more intelligent and efficient by utilizing intelligent information technology. Through individual interviews with workers at the Central Disaster and Safety Status Control Center, we investigated the scope of disaster situation management work and the main functions and usability of the geographic information system (GIS)-based integrated situation management system by practitioners in this process. In addition, the data built in the system was reclassified according to purpose and characteristics to check the status of data in the GIS-based integrated situation management system. To derive needed to make disaster situation management more intelligent and efficient by utilizing intelligent information technology, 3 strategies were established to quickly and accurately identify on-site situations, make data-based situation judgments, and support efficient situation management tasks, and implementation tasks were defined and task priorities were determined based on the importance of implementation tasks through analytic hierarchy process (AHP) analysis. As a result, 24 implementation tasks were derived, and to make situation management efficient, it is analyzed that the use of intelligent information technology is necessary for collecting, analyzing, and managing video and sensor data and tasks that can take a lot of time of be prone to errors when performed by humans, that is, collecting situation-related data and reporting tasks. We have a conclusion that among situation management intelligence strategies, we can perform to develop technologies for strategies being high important score, that is, quickly and accurately identifying on-site situations and efficient situation management work support.