• Title/Summary/Keyword: making techniques

Search Result 1,309, Processing Time 0.027 seconds

Development of Scoring Model on Customer Attrition Probability by Using Data Mining Techniques

  • Han, Sang-Tae;Lee, Seong-Keon;Kang, Hyun-Cheol;Ryu, Dong-Kyun
    • Communications for Statistical Applications and Methods
    • /
    • v.9 no.1
    • /
    • pp.271-280
    • /
    • 2002
  • Recently, many companies have applied data mining techniques to promote competitive power in the field of their business market. In this study, we address how data mining, that is a technique to enable to discover knowledge from a deluge of data, Is used in an executed project in order to support decision making of an enterprise. Also, we develope scoring model on customer attrition probability for automobile-insurance company using data mining techniques. The development of scoring model in domestic insurance is given as an example concretely.

A Study on Collage as a Means of Generating Creativity in Fashion Design (패션디자인 발상을 위한 꼴라쥬 활용 연구)

  • 이민선
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.5
    • /
    • pp.683-696
    • /
    • 2003
  • In the post-modern society, creativity is redefined as a capability which collects a wide range of information and recombines them in diverse manners. With a such trend, the characteristics of collage - a method of making a creative image by combining pieces which have no relevance - is becoming prevalent in the post-modern culture. The purpose of this research is to develop a model which generates ideas in fashion design by use of collage techniques. With regard to research methodology, a literature survey was undertaken to find out and understand characteristics of collage. Analytic and positive studies were also done on the styles of fashion design of the 2003 SS collections to which collage techniques applied. In order to generate ideas in fashion design, the following mechanism using collage techniques can be used. Above all, pluralism is realized by collecting incoherent elements. Secondly, deconstruction is made by changing scales and configuration. Lastly, relativity is attained by using parts of ready-made goods and respecting their independency.

  • PDF

A study on revitalization of riverfront space in terms of ecological aspect (생태적(生態的) 측면(側面)을 고찰(考察)한 하천(河川) 수변공간(水邊空間)의 활성화(活性化) 방안(方案) 연구(硏究))

  • Han, Ju-Hyung;Oh, Deog-Seong
    • KIEAE Journal
    • /
    • v.2 no.1
    • /
    • pp.21-32
    • /
    • 2002
  • This study aims to find out the way of revitalizing of natural riverfront space in terms of ecological aspect. At the first part, theoretical made in terms of concept, planning aspects and techniques which were main bases for the study. It begins by explaining the concept of ecological riverfront space, the main aspect and techniques of its planning. After this, it analysis eight cases(four cases in Korea, Swiss, Germany, America and Japan) in terms of the objects, planning techniques and the results of development. It continues by making detailed analysis according to four objectives like 'protection from flood', 'quality of the river', 'ecological preservation' and 'active usage of riverfront space'. It ends by evaluating the relationship between objectives and the planning which will be adapted to the future development of riverfront space with ecological aspect. In conclusion, hereafter will propose desirable design-direction for revitalization about riverfront space about ecological aspect design in urban.

A Multistrategy Learning System to Support Predictive Decision Making

  • Kim, Steven H.;Oh, Heung-Sik
    • The Korean Journal of Financial Studies
    • /
    • v.3 no.2
    • /
    • pp.267-279
    • /
    • 1996
  • The prediction of future demand is a vital task in managing business operations. To this end, traditional approaches often focused on statistical techniques such as exponential smoothing and moving average. The need for better accuracy has led to nonlinear techniques such as neural networks and case based reasoning. In addition, experimental design techniques such as orthogonal arrays may be used to assist in the formulation of an effective methodology. This paper investigates a multistrategy approach involving neural nets, case based reasoning, and orthogonal arrays. Neural nets and case based reasoning are employed both separately and in combination, while orthoarrays are used to determine the best architecture for each approach. The comparative evaluation is performed in the context of an application relating to the prediction of Treasury notes.

  • PDF

Mathematical Programming Models for Establishing Dominance with Hierarchically Structured Attribute Tree (계층구조의 속성을 가지는 의사결정 문제의 선호순위도출을 위한 수리계획모형)

  • Han, Chang-Hee
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.2
    • /
    • pp.34-55
    • /
    • 2002
  • This paper deals with the multiple attribute decision making problem when a decision maker incompletely articulates his/her preferences about the attribute weight and alternative value. Furthermore, we consider the attribute tree which is structured hierarchically. Techniques for establishing dominance with linear partial information are proposed in a hierarchically structured attribute tree. The linear additive value function under certainty is used in the model. The incompletely specified information constructs a feasible region of linear constraints and therefore the pairwise dominance relationship between alternatives leads to intractable non-linear programming. Hence, we propose solution techniques to handle this difficulty. Also, to handle the tree structure, we break down the attribute tree into sub-trees. Due to there cursive structure of the solution technique, the optimization results from sub-trees can be utilized in computing the value interval on the topmost attribute. The value intervals computed by the proposed solution techniques can be used to establishing the pairwise dominance relation between alternatives. In this paper, pairwise dominance relation will be represented as strict dominance and weak dominance, which ware already defined in earlier researches.

Examining China's Internet Policies through a Bibliometric Approach

  • Li, Jiang;Xu, Weiai Wayne;Wang, Fang;Chen, Si;Sun, Jianjun
    • Journal of Contemporary Eastern Asia
    • /
    • v.17 no.2
    • /
    • pp.237-253
    • /
    • 2018
  • In order to understand China's internet governance, this paper examined 1,931 Internet policies of China by bibliometric techniques. Specifically, the bibliometric techniques include simple document counting, co-word analysis, collaboration network analysis and citation analysis. The findings include: (1) China's Internet legislations mainly emphasized e-commerce and Internet governance, and, to some extent, neglected personal data protection; (2) China's Internet is under intensive multiple regulatory controls by central government. A large number of government agencies are involved in Internet policy-making. The Propaganda Department of the Central Committee of the Communist Party of China and the State Information Leading Group of the State Council, enforced fewer policy documents, but occupy higher positions in the Internet governance hierarchy; (3) China's Internet legislation system is primarily composed of industry-specific administrative rules, rather than laws or administrative regulations. Nevertheless, laws and administrative regulations received significantly more citations owing to their superior force. This paper also discussed current gaps in China's internet governance and how the country's internet policies are situated in the broader global context.

A Survey on Cloud Storage System Security via Encryption Mechanisms

  • Alsuwat, Wejdan;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.181-186
    • /
    • 2022
  • Cloud computing is the latest approach that is developed for reducing the storage of space to store the data and helps the quick sharing of the data. An increase in the cloud computing users is observed that is also making the users be prone to hacker's attacks. To increase the efficiency of cloud storage encryption mechanisms are used. The encryption techniques that are discussed in this survey paper are searchable encryption, attribute-based, Identity-based encryption, homomorphic encryption, and cloud DES algorithms. There are several limitations and disadvantages of each of the given techniques and they are discussed in this survey paper. Techniques are found to be effective and they can increase the security of cloud storage systems.

R&D Project Portfolio Selection Problem (R&D Project Portfolio 선정 문제)

  • Ahn, Tae-Ho;Kim, Myung-Gwan
    • Korean Management Science Review
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2008
  • This paper investigates the R&D project portfolio selection problem. Despite its importance and impact on real world projects, there exist few practical techniques that help construct an non-dominated portfolio for a decision makers satisfaction. One of the difficulties constructing the portfolio is that such project portfolio problem is, in nature, a multi-attribute decision-making problem, which is an NP-hard class problem. This paper investigates the R&D project portfolio selection problem. Despite its importance and impact on real world projects, there exist few practical techniques that help construct an non-dominated portfolio for a decision makers satisfaction. One of the difficulties constructing the portfolio is that such project portfolio problem is, in nature, a multi-attribute decision-making problem, which is an NP-hard class problem. In order to obtain the non-dominated portfolio that a decision maker or a user is satisfied with, we devise a user-interface algorithm, in that the user provides the maximum/minimum input values for each project attribute. Then the system searches the non-dominated portfolio that satisfies all the given constraints if such a portfolio exists. The process that the user adjusts the maximum/minimum values on the basis of the portfolio found continues repeatedly until the user is optimally satisfied with. We illustrate the algorithm proposed, and the computational results show the efficacy of our procedure.

An Investigation into "Science-Technology-Society" Curricula (과학-기술-사회 교육과정에 관한 연구)

  • Cho, Jung-Il
    • Journal of The Korean Association For Science Education
    • /
    • v.11 no.2
    • /
    • pp.87-101
    • /
    • 1991
  • Science-Technology-Society curricula have been developed in several countries for the last 20 years. Those curricula were focused on social aspects of science, i.e., value-laden knowledge and scientific enterprise, and society-related scientific and technological issues, i.e., energy, pollution, natural resources. The major teaching models employed in those curricula were problem solving and decision making, which required the following teaching techniques: teacher as a manager, small group discussion, controversy as a motivational force for substantive learning, and sufficient factual information into the discussion. Further researches are to be made to ascertain whether or not the expectations of the curricula might be realized in practice. It was shown that most Korean biology teachers considered the STS-related goal of science education as more important than the other goals. Based upon the findings, some recommendations for development of Korean STS curriculum were made as follows: 1. The contents of the STS curricula are to be organized with the integrated mode; 2. The major teaching models throughout the contents are to be problem solving and decision making. These are considered to provide students with the opportunities to involve in debates on practical issues and to draw consensus from them; 3. Some degree of flexibility should be provided on teachers' implementation of the curriculum in terms of contents, teaching techniques etc.; 4. To increase the practicality of the curriculum, teachers should be involved in the development of the curriculum and the relevant research; and 5. Contents to be included in STS curriculum were suggested by some science educators, but the more systematic study is required in this respect.

  • PDF

Making Packets from Animation Gestures -Based on the Effort Element of LMA- (애니메이션 제스처의 패킷화 -LMA의 Effort 요소를 기반으로-)

  • Lee, Mi-Young;Hong, Soo-Hyeon;Kim, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.179-189
    • /
    • 2011
  • Gesture is one of the means for non-linguistic communication which can be expressed by human characters in animations. High drawing ability and profound knowledge about gestures are both required for animators to achieve efficient gesture expressions. However, diversified profound techniques are needed to master this knowledge which makes it very difficult for common animation drawers. In this paper, characteristics for each gesture are analyzed based on Laban Movement Analysis and gesture classification by making gesture packets. This research is of notable significance in providing animators with high efficient gesture expression techniques and developing automatic gesture-generating system.