• Title/Summary/Keyword: continuous convergence

Search Result 1,059, Processing Time 0.023 seconds

Study on Application Case of Scrum Methodology using Visibility

  • Chang, Eun-Sun;Kim, Neung-Hoe
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.161-166
    • /
    • 2019
  • Viewed in the rate of change in the web environment, it is very difficult to remain the initial planning at the time until the time of launch, and there is a need for a method to accommodate changes and satisfy market demands during the development process. Unlike the traditional waterfall approach of maintaining initial planning, scrum is one of the agile methodologies that enables flexibility to respond to changes in the market and customers' needs and drive customer satisfaction and business success. However, to apply the scrum to a project in actual, the practice method itself is relatively simple but not easy to apply. The reason is that the members of the organization need to understand and participate in scrum's philosophy and principles and the continuous observation and change management should be carried out. Therefore, in this paper, we presented the feature dashboard and customized scrum methodology to enable continuous observation and change management using visibility, and we shared the case that periodically reflected inspection and adaptation with the explanation of the main points. Also, based on the experience with participants, the strengths and weakness of the feature dashboard and the customized scrum methodology are summarized.

Design of User Concentration Classification Model by EEG Analysis Based on Visual SCPT

  • Park, Jin Hyeok;Kang, Seok Hwan;Lee, Byung Mun;Kang, Un Gu;Lee, Young Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.129-135
    • /
    • 2018
  • In this study, we designed a model that can measure the level of user's concentration by measuring and analyzing EEG data of the subjects who are performing Continuous Performance Test based on visual stimulus. This study focused on alpha and beta waves, which are closely related to concentration in various brain waves. There are a lot of research and services to enhance not only concentration but also brain activity. However, there are formidable barriers to ordinary people for using routinely because of high cost and complex procedures. Therefore, this study designed the model using the portable EEG measurement device with reasonable cost and Visual Continuous Performance Test which we developed as a simplified version of the existing CPT. This study aims to measure the concentration level of the subject objectively through simple and affordable way, EEG analysis. Concentration is also closely related to various brain diseases such as dementia, depression, and ADHD. Therefore, we believe that our proposed model can be useful not only for improving concentration but also brain disease prediction and monitoring research. In addition, the combination of this model and the Brain Computer Interface technology can create greater synergy in various fields.

Application Consideration of Machine Learning Techniques in Satellite Systems

  • Jin-keun Hong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.48-60
    • /
    • 2024
  • With the exponential growth of satellite data utilization, machine learning has become pivotal in enhancing innovation and cybersecurity in satellite systems. This paper investigates the role of machine learning techniques in identifying and mitigating vulnerabilities and code smells within satellite software. We explore satellite system architecture and survey applications like vulnerability analysis, source code refactoring, and security flaw detection, emphasizing feature extraction methodologies such as Abstract Syntax Trees (AST) and Control Flow Graphs (CFG). We present practical examples of feature extraction and training models using machine learning techniques like Random Forests, Support Vector Machines, and Gradient Boosting. Additionally, we review open-access satellite datasets and address prevalent code smells through systematic refactoring solutions. By integrating continuous code review and refactoring into satellite software development, this research aims to improve maintainability, scalability, and cybersecurity, providing novel insights for the advancement of satellite software development and security. The value of this paper lies in its focus on addressing the identification of vulnerabilities and resolution of code smells in satellite software. In terms of the authors' contributions, we detail methods for applying machine learning to identify potential vulnerabilities and code smells in satellite software. Furthermore, the study presents techniques for feature extraction and model training, utilizing Abstract Syntax Trees (AST) and Control Flow Graphs (CFG) to extract relevant features for machine learning training. Regarding the results, we discuss the analysis of vulnerabilities, the identification of code smells, maintenance, and security enhancement through practical examples. This underscores the significant improvement in the maintainability and scalability of satellite software through continuous code review and refactoring.

The Impact of Metaverse Presence on Immersion and Intention to Continuous Use (메타버스 이용자의 프레즌스 경험이 몰입과 지속이용의도에 미치는 영향)

  • Mideum Choi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.581-588
    • /
    • 2024
  • Metaverse technology, heralded as the fourth major innovation in computing following personal computers, the internet, and mobile devices, has realized a three-dimensional virtual world where communication with others as well as social, cultural, and economic activities of the real world can take place. While platforms like Zepeto, launched in 2018, and Animal Crossing: New Horizons, released in 2020, initially became popular among younger generations, concerns about declining investment and usage rates of the metaverse have become apparent since 2023. This study examines the impact of metaverse users' sense of presence on their immersion and intention to continue using these platforms.

An Empirical Study on Perceived Value and Continuous Intention to Use of Smart Phone, and the Moderating Effect of Personal Innovativeness (스마트폰의 지각된 가치와 지속적 사용의도, 그리고 개인 혁신성의 조절효과)

  • Han, Joonhyoung;Kang, Sungbae;Moon, Taesoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.53-84
    • /
    • 2013
  • With rapid development of ICT (Information and Communications Technology), new services by the convergence of mobile network and application technology began to appear. Today, smart phone with new ICT convergence network capabilities is exceedingly popular and very useful as a new tool for the development of business opportunities. Previous studies based on Technology Acceptance Model (TAM) suggested critical factors, which should be considered for acquiring new customers and maintaining existing users in smart phone market. However, they had a limitation to focus on technology acceptance, not value based approach. Prior studies on customer's adoption of electronic utilities like smart phone product showed that the antecedents such as the perceived benefit and the perceived sacrifice could explain the causality between what is perceived and what is acquired over diverse contexts. So, this research conceptualizes perceived value as a trade-off between perceived benefit and perceived sacrifice, and we need to research the perceived value to grasp user's continuous intention to use of smart phone. The purpose of this study is to investigate the structured relationship between benefit (quality, usefulness, playfulness) and sacrifice (technicality, cost, security risk) of smart phone users, perceived value, and continuous intention to use. In addition, this study intends to analyze the differences between two subgroups of smart phone users by the degree of personal innovativeness. Personal innovativeness could help us to understand the moderating effect between how perceptions are formed and continuous intention to use smart phone. This study conducted survey through e-mail, direct mail, and interview with smart phone users. Empirical analysis based on 330 respondents was conducted in order to test the hypotheses. First, the result of hypotheses testing showed that perceived usefulness among three factors of perceived benefit has the highest positive impact on perceived value, and then followed by perceived playfulness and perceived quality. Second, the result of hypotheses testing showed that perceived cost among three factors of perceived sacrifice has significantly negative impact on perceived value, however, technicality and security risk have no significant impact on perceived value. Also, the result of hypotheses testing showed that perceived value has significant direct impact on continuous intention to use of smart phone. In this regard, marketing managers of smart phone company should pay more attention to improve task efficiency and performance of smart phone, including rate systems of smart phone. Additionally, to test the moderating effect of personal innovativeness, this research conducted multi-group analysis by the degree of personal innovativeness of smart phone users. In a group with high level of innovativeness, perceived usefulness has the highest positive influence on perceived value than other factors. Instead, the analysis for a group with low level of innovativeness showed that perceived playfulness was the highest positive factor to influence perceived value than others. This result of the group with high level of innovativeness explains that innovators and early adopters are able to cope with higher level of cost and risk, and they expect to develop more positive intentions toward higher performance through the use of an innovation. Also, hedonic behavior in the case of the group with low level of innovativeness aims to provide self-fulfilling value to the users, in contrast to utilitarian perspective, which aims to provide instrumental value to the users. However, with regard to perceived sacrifice, both groups in general showed negative impact on perceived value. Also, the group with high level of innovativeness had less overall negative impact on perceived value compared to the group with low level of innovativeness across all factors. In both group with high level of innovativeness and with low level of innovativeness, perceived cost has the highest negative influence on perceived value than other factors. Instead, the analysis for a group with high level of innovativeness showed that perceived technicality was the positive factor to influence perceived value than others. However, the analysis for a group with low level of innovativeness showed that perceived security risk was the second high negative factor to influence perceived value than others. Unlike previous studies, this study focuses on influencing factors on continuous intention to use of smart phone, rather than considering initial purchase and adoption of smart phone. First, perceived value, which was used to identify user's adoption behavior, has a mediating effect among perceived benefit, perceived sacrifice, and continuous intention to use smart phone. Second, perceived usefulness has the highest positive influence on perceived value, while perceived cost has significant negative influence on perceived value. Third, perceived value, like prior studies, has high level of positive influence on continuous intention to use smart phone. Fourth, in multi-group analysis by the degree of personal innovativeness of smart phone users, perceived usefulness, in a group with high level of innovativeness, has the highest positive influence on perceived value than other factors. Instead, perceived playfulness, in a group with low level of innovativeness, has the highest positive factor to influence perceived value than others. This result shows that early adopters intend to adopt smart phone as a tool to make their job useful, instead market followers intend to adopt smart phone as a tool to make their time enjoyable. In terms of marketing strategy for smart phone company, marketing managers should pay more attention to identify their customers' lifetime value by the phase of smart phone adoption, as well as to understand their behavior intention to accept the risk and uncertainty positively. The academic contribution of this study primarily is to employ the VAM (Value-based Adoption Model) as a conceptual foundation, compared to TAM (Technology Acceptance Model) used widely by previous studies. VAM is useful for understanding continuous intention to use smart phone in comparison with TAM as a new IT utility by individual adoption. Perceived value dominantly influences continuous intention to use smart phone. The results of this study justify our research model adoption on each antecedent of perceived value as a benefit and a sacrifice component. While TAM could be widely used in user acceptance of new technology, it has a limitation to explain the new IT adoption like smart phone, because of customer behavior intention to choose the value of the object. In terms of theoretical approach, this study provides theoretical contribution to the development, design, and marketing of smart phone. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy formulation for acquiring and retaining long-term customers related to smart phone business. Since potential customers are interested in both benefit and sacrifice when evaluating the value of smart phone, marketing managers in smart phone company has to put more effort into creating customer's value of low sacrifice and high benefit so that customers will continuously have higher adoption on smart phone. Especially, this study shows that innovators and early adopters with high level of innovativeness have higher adoption than market followers with low level of innovativeness, in terms of perceived usefulness and perceived cost. To formulate marketing strategy for smart phone diffusion, marketing managers have to pay more attention to identify not only their customers' benefit and sacrifice components but also their customers' lifetime value to adopt smart phone.

Improvement of Phase Noise Characteristics of Continuous Wave in the Sub-Millimeter Bands Generated by Photomixing Using Polarization and Phase Mismatch (편광 및 위상 부정합을 이용한 광혼합을 통하여 발생된 서브 밀리미터파 대역 연속파의 위상 잡음 특성 개선)

  • Kim, Sung-Il;Kang, Kwang-Yong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.6
    • /
    • pp.617-626
    • /
    • 2010
  • In this paper, we have proposed and experimentally performed a polarization and phase control method of an optical signal which has same wavelength with the optical carrier to improve phase characteristics of a continuous wave(CW) generated by the double sideband-suppressed carrier(DSB-SC) as one of the famous photomixing technique for making sub-millimeter and terahertz waves. A polarization and phase controlled optical signal has been coupled with the general DSB-SC on an optical coupler. The output of the optical coupler is then photomixed by a photomixer. From our analysis and measurement results, we have found that the amplitude of the generated sub-mm and terahertz CW signal is higher 1.5 dB and the phase noise is lower about 3 dB@10 kHz offset frequency than the general DSBSC. Consequently, since our proposed method has improved the amplitude and phase noise of CW signals in the sub-mm and terahertz bands, it can be helpful results to make low cost CW generator in sub-millimeter and subterahertz bands.

Phase Noise Characterization with Optical Carrier Suppression Level on Continuous Wave in the Ranges of Millimeter Waves Generated by Photomixing of Optical Double Sideband-Suppressed Carrier(DSB-SC) (광 반송파가 억압된 양측 대역 방식의 광 혼합을 통하여 발생된 밀리미터파 대역 연속파에서 광 반송파 억압 레벨에 따른 위상 잡음 특성 분석)

  • Kim, Sung-Il;Kang, Kwang-Yong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.9
    • /
    • pp.974-982
    • /
    • 2009
  • Photomixing techniques beating two optical signals with different wavelengths and strong correlations are also very useful techniques to make a continuous wave(CW) signals in the range of millimeter(mm) and terahertz(THz) frequencies. An optical double sideband-suppressed carrier(DSB-SC) technique is one of the popular techniques to generate two optical signals with different wavelengths and strong correlations. DSB-SC signals with strong correlations are generated by a CW modulation of an optical carrier with a local oscillator and an optical modulator. In the previous parers related the DSB-SC for producing the CW signals within the range of mm and THz frequencies, there have been no reports why the optical carrier should suppress. In order to clear that, we have analyzed and measured the characteristics of the mm-wave CW signals made by the DSB-SC photomixing in this paper. From our analysis and measurement results, compared with the case of the DSB with the maximized optical carrier, the power and phase noise have improved about 23.9 dB and 21 dBc/Hz(@ 1 MHz offset frequency) in the case of the DSB with the minimized optical carrier (that is to say, the DSB-SC). Consequently, it is evident reason that the optical carrier should sufficiently suppress to obtain the mm-wave CW signals with the high power and low noise. This paper has given very helpful data to make mm- and THz-wave CW signals using photomixing techniques with the DSB-SC because the reason why the optical carrier should be suppressed is reported in this paper based on the numerical and experimental results.

Relation of Empowerment and Organization Attachment with the Organization Culture of Security Organization (시큐리티조직의 조직문화와 임파워먼트 및 조직애착도의 관계)

  • Kim, Chan Sun
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.33-41
    • /
    • 2014
  • The purpose of this study is to establish the relationship of empowerment and organization attachment with the organization culture of security organization. This study is based by setting the security organization employed in security firms in the capital area(Seoul) in 2012 as the parent population and using the purposive sampling method to analyze a total amount of 280 examples. The frequency analysis, analysis on primary factors, reliability analysis, multiple regression analysis, path analysis methods using SPSSWIN 18.0 were used in analysis. The reliability of the survey showed a Cronbach's ${\alpha}$ value of over 0.690. The results are like the following. First, the organization culture of security organization affect empowerment. Thus, the more a practical development culture is settled, the more the capability of self-determinism, meaningfulness, and effect is amplified. Moreover, the more a consensual culture is established, the more the capability of self-determinism is enhanced, and the more a hierarchical culture is established, the more the meaningfulness is enhanced. Second, the organization culture of security organization affect organization attachment. Thus, the continuous normative attachment is enhanced when a more hierarchical culture is established. Moreover, emotional attachment is enhanced when a more practical development culture is established. Third, the empowerment of security organization affects organization attachment. Thus, the continuous normative attachment is decreased when one's capability of self-determinism is more lacking. However, the continuous normative attachment is higher when the meaningfulness and effect is enhanced. Moreover, emotional attachment is enhanced when meaningfulness is increased. Fourth, the organization culture of security organization directly/indirectly affects empowerment and organization attachment. Thus, empowerment is an important mediating factor between organization culture and organization attachment.

A Study on The Factors Affecting Customer Satisfaction and Intention to Use of Internet-only Banking Services (인터넷 전문은행 서비스의 만족과 이용의도에의 영향요인에 관한 연구)

  • Lee, EunYoung;Baggii, Batdawa
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.627-631
    • /
    • 2020
  • We examined the factors affecting user satisfaction and persistent intention of use for the Internet-only banking services. Firstly, this study extracted factors that influence the acceptance of Internet-only banking services based on previous studies. The purpose of this study is to investigate the effect of perceived relative advantage, perceived convenience, perceived usefulness as independent variables based on Technology Acceptance Model for two dependent variables ; user satisfaction and intention for continuous use for internet-only banking service. The study showed that perceived relative advantage, perceived convenience, and perceived usefulness have a significant effect on user satisfaction and intention for continuous use as a result of an empirical analysis of 204 customers of internet-only banking services. Based on the results of the study, some practical implications for customer retention are suggested.

A Study on Interface Security Enhancement (조직의 실시간 보안관리 체계 확립을 위한 '인터페이스 보안' 강화에 대한 연구)

  • Park, Joon-Jeong;Kim, Sora;Ahn, SooHyun;Lim, Chae-Ho;Kim, Kwangjo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.5
    • /
    • pp.171-176
    • /
    • 2015
  • Because the specific security technology alone can not cope with sophisticated attacks, various security management models are applied. But, they do not focus on the vulnerability of the highest part because they offer so many common security management criteria. By analyzing the main information and confidential leakage cases inflicting enormous damage to our society, we found that attackers are using mainly an interface vulnerabilities - the paths that connect the internal and external of the organization, such as e-mail, web server, portable devices, and subcontractor employees. Considering the reality that time and resources to invest in security domain are limited, we point out the interface security vulnerabilities the possibility of attackers to exploit and present a convergence method of security measures. Finally, based of ROI(Return on Investment), we propose the real-time security management system through the intensive and continuous management.