• Title/Summary/Keyword: management information system

Search Result 18,277, Processing Time 0.047 seconds

Analysis of the Runoff Characteristics of Small Mountain Basins Using Rainfall-Runoff Model_Danyang1gyo in Chungbuk (강우-유출모형을 활용한 소규모 산지 유역의 유출특성 분석_충북 단양1교)

  • Hyungjoon Chang;Hojin Lee;Kisoon Park;Seonggoo Kim
    • Journal of the Korean GEO-environmental Society
    • /
    • v.24 no.12
    • /
    • pp.31-38
    • /
    • 2023
  • In this study, runoff characteristics analysis was conducted as a basic research to establish a forecasting and warning system for flood risk areas in small mountainous basins in South Korea. The Danyang 1 Bridge basin located in Danyang-gun, Chungcheongbuk-do was selected as the study basin, and the watershed characteristic factors were calculated using Q-GIS based on the digital elevation model (DEM) of the basin. In addition, nine heavy rainfall events were selected from 2020 to 2023 using hydrometeorological data provided by the National Water Resources Management Comprehensive Information System. HEC-HMS rainfall-runoff model was used to analyze the runoff characteristics of small mountainous basins, and rainfall-runoff model simulation was performed by reflecting 9 heavy rainfall events and calculated basin characteristic factors. Based on the rainfall-runoff model, parameter optimization was performed for six heavy rain events with large error rates among the simulated events, and the appropriate parameter range for the Danyang 1 Bridge basin, a small mountainous basin, was calculated to be 0.8 to 3.4. The results of this study will be utilized as foundational data for establishing flood forecasting and warning systems in small mountainous basin, and further research will be conducted to derive the range of parameters according to basin characteristics.

A psychological approach to the safety problems in Korean society (한국사회에서 안전에 관한 심리학 연구의 과제)

  • Doug-Woong Hahn
    • Korean Journal of Culture and Social Issue
    • /
    • v.9 no.spc
    • /
    • pp.35-55
    • /
    • 2003
  • The purpose of this study is to review the previous studies on the safety problems in Korea and to propose a psychological total safety system model. The model consisted of four agents; the government as the safety management agent, the suppliers of safety goods and services, consumer of safety goods and services, and civil movement institutions for safety. It was emphasized that the culture specific social representations of safety and accident have emerged in the course of rapid industrialization process in Korea during last 30 years. We delineated the social representations of the Korean people on safety and accident according to the model. A psychological analysis of drinking and driving behavior was performed as an application of the model. It was emphasized that safety psychologists have to develope and to apply the knowledge and the information from human engineering psychology and applied social psychology on safety and accidents.

  • PDF

Assessing the Applicability of Hysteresis Indices for the Interpretation of Suspended Sediment Dynamics in a Forested Catchment (산림유역의 부유토사 동태 해석을 위한 이력현상 지수의 적용성 평가)

  • Ki-Dae Kim;Su-Jin Jang;Soo-Youn Nam;Jae-Uk Lee;Suk-Woo Kim
    • Korean Journal of Environment and Ecology
    • /
    • v.38 no.2
    • /
    • pp.178-188
    • /
    • 2024
  • The dynamics of suspended sediment (SS) in forested catchments vary depending upon human or natural disturbances, including land use change, forestry activity, forest fires, and landslides. Understanding the dynamics of SS originating from the potential sources within a forested catchment is crucial for establishing an effective water quality management strategy. Therefore, to suggest a systematic method for interpreting SS dynamics, we evaluated the performance and applicability of ten methods for calculating the hysteresis index based on observed hydrological data and two calculation models (Lawler's method and Lloyd's method) with five sampling intervals (50th, 25th, 10th, 5th, and 1st percentiles). Our results showed that Lloyd's method, which used a sampling interval at the 1st percentile, had the largest number of analyzable runoff events and exhibited the best performance. The results of this study can contribute to quantifying the hysteresis in the relationship between discharge and SS and provide useful information for interpreting SS dynamics.

A Study on Decision Rules for Qi·Blood·Yin·Yang Deficiency Pathogenic Factor Based on Clinical Data of Diagnosis System of Oriental Medicine (한방진단설문지 임상자료에 근거한 기혈음양 허증병기 의사결정규칙 연구)

  • Soo Hyung Jeon;In Seon Lee;Gyoo yong Chi;Jong Won Kim;Chang Wan Kang;Yong Tae Lee
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.37 no.6
    • /
    • pp.172-177
    • /
    • 2023
  • In order to deduce the pathogenic factor(PF) diagnosis logic of underlying in pattern identification of Korean medicine, 2,072 cases of DSOM(Diagnosis System of Oriental Medicine) data from May 2005 to April 2022 were collected and analyzed by means of decision tree model(DTM). The entire data were divided into training data and validation data at a ratio of 7:3. The CHAID algorithm was used for analysis of DTM, and then validity was tested by applying the validation data. The decision rules of items and pathways determined from the diagnosis data of Qi Deficiency, Blood Deficiency, Yin Deficiency and Yang Deficiency Pathogenic Factor of DSOM were as follows. Qi Deficiency PF had 7 decision rules and used 5 questions: Q124, Q116a, Q119, Q119a, Q55. The primary indicators(PI) were 'lack of energy' and 'weary of talking'. Blood deficiency PF had 7 decision rules and used 6 questions: Q113, Q84, Q85, Q114, Q129, Q130. The PI were 'numbness in the limbs', 'dizziness when standing up', and 'frequent cramps'. Yin deficiency PF had 3 decision rules and used 2 questions: Q144 and Q56. The PI were 'subjective heat sensation from the afternoon to night' and 'heat sensation in the limbs'. Yang deficiency PF had 3 decision rules and used 3 questions: Q55, Q10, and Q102. The PI were 'sweating even with small movements' and 'lack of energy'. Conclusively, these rules and symptom information to decide the Qi·Blood·Yin·Yang Deficiency PF would be helpful for Korean medicine diagnostics.

Nondestructive Quantification of Corrosion in Cu Interconnects Using Smith Charts (스미스 차트를 이용한 구리 인터커텍트의 비파괴적 부식도 평가)

  • Minkyu Kang;Namgyeong Kim;Hyunwoo Nam;Tae Yeob Kang
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.31 no.2
    • /
    • pp.28-35
    • /
    • 2024
  • Corrosion inside electronic packages significantly impacts the system performance and reliability, necessitating non-destructive diagnostic techniques for system health management. This study aims to present a non-destructive method for assessing corrosion in copper interconnects using the Smith chart, a tool that integrates the magnitude and phase of complex impedance for visualization. For the experiment, specimens simulating copper transmission lines were subjected to temperature and humidity cycles according to the MIL-STD-810G standard to induce corrosion. The corrosion level of the specimen was quantitatively assessed and labeled based on color changes in the R channel. S-parameters and Smith charts with progressing corrosion stages showed unique patterns corresponding to five levels of corrosion, confirming the effectiveness of the Smith chart as a tool for corrosion assessment. Furthermore, by employing data augmentation, 4,444 Smith charts representing various corrosion levels were obtained, and artificial intelligence models were trained to output the corrosion stages of copper interconnects based on the input Smith charts. Among image classification-specialized CNN and Transformer models, the ConvNeXt model achieved the highest diagnostic performance with an accuracy of 89.4%. When diagnosing the corrosion using the Smith chart, it is possible to perform a non-destructive evaluation using electronic signals. Additionally, by integrating and visualizing signal magnitude and phase information, it is expected to perform an intuitive and noise-robust diagnosis.

Effects of firm strategies on customer acquisition of Software as a Service (SaaS) providers: A mediating and moderating role of SaaS technology maturity (SaaS 기업의 차별화 및 가격전략이 고객획득성과에 미치는 영향: SaaS 기술성숙도 수준의 매개효과 및 조절효과를 중심으로)

  • Chae, SeongWook;Park, Sungbum
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.151-171
    • /
    • 2014
  • Firms today have sought management effectiveness and efficiency utilizing information technologies (IT). Numerous firms are outsourcing specific information systems functions to cope with their short of information resources or IT experts, or to reduce their capital cost. Recently, Software-as-a-Service (SaaS) as a new type of information system has become one of the powerful outsourcing alternatives. SaaS is software deployed as a hosted and accessed over the internet. It is regarded as the idea of on-demand, pay-per-use, and utility computing and is now being applied to support the core competencies of clients in areas ranging from the individual productivity area to the vertical industry and e-commerce area. In this study, therefore, we seek to quantify the value that SaaS has on business performance by examining the relationships among firm strategies, SaaS technology maturity, and business performance of SaaS providers. We begin by drawing from prior literature on SaaS, technology maturity and firm strategy. SaaS technology maturity is classified into three different phases such as application service providing (ASP), Web-native application, and Web-service application. Firm strategies are manipulated by the low-cost strategy and differentiation strategy. Finally, we considered customer acquisition as a business performance. In this sense, specific objectives of this study are as follows. First, we examine the relationships between customer acquisition performance and both low-cost strategy and differentiation strategy of SaaS providers. Secondly, we investigate the mediating and moderating effects of SaaS technology maturity on those relationships. For this purpose, study collects data from the SaaS providers, and their line of applications registered in the database in CNK (Commerce net Korea) in Korea using a questionnaire method by the professional research institution. The unit of analysis in this study is the SBUs (strategic business unit) in the software provider. A total of 199 SBUs is used for analyzing and testing our hypotheses. With regards to the measurement of firm strategy, we take three measurement items for differentiation strategy such as the application uniqueness (referring an application aims to differentiate within just one or a small number of target industry), supply channel diversification (regarding whether SaaS vendor had diversified supply chain) as well as the number of specialized expertise and take two items for low cost strategy like subscription fee and initial set-up fee. We employ a hierarchical regression analysis technique for testing moderation effects of SaaS technology maturity and follow the Baron and Kenny's procedure for determining if firm strategies affect customer acquisition through technology maturity. Empirical results revealed that, firstly, when differentiation strategy is applied to attain business performance like customer acquisition, the effects of the strategy is moderated by the technology maturity level of SaaS providers. In other words, securing higher level of SaaS technology maturity is essential for higher business performance. For instance, given that firms implement application uniqueness or a distribution channel diversification as a differentiation strategy, they can acquire more customers when their level of SaaS technology maturity is higher rather than lower. Secondly, results indicate that pursuing differentiation strategy or low cost strategy effectively works for SaaS providers' obtaining customer, which means that continuously differentiating their service from others or making their service fee (subscription fee or initial set-up fee) lower are helpful for their business success in terms of acquiring their customers. Lastly, results show that the level of SaaS technology maturity mediates the relationships between low cost strategy and customer acquisition. That is, based on our research design, customers usually perceive the real value of the low subscription fee or initial set-up fee only through the SaaS service provide by vender and, in turn, this will affect their decision making whether subscribe or not.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Research about a successful adopting for the CRM in the companies (기업에서의 성공적인 CRM 정착에 대한 연구)

  • Kim, Gipyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.2 no.1
    • /
    • pp.5-15
    • /
    • 2011
  • Prior to the introduction of the CRM, we need to analyze the characteristics and the situations of the company, and should establish a clear vision of the CRM. And each company should identify elements and technologies for introducing the most suitable CRM for them, and optimize them, with long-term perspective. In addition, it requires the implementation strategy which integrates the existing company's routine marketing activities with the concept of the CRM. According to the implementation strategy, the company should improve the business process which is the most effective in investment step by step, and the information system strategy, which develops system investment gradually, should harmonize with it. First, we recognized that raising the company value is important by maximizing customer lifetime value (LTV) by understanding customer needs, and achieving the company's goal through customer satisfaction. Second, we understood that adopting the CRM should be accompanied by changes in the structure, business process and customer contact channels, and it can be successfully integrated with business when it gets proper understandings and attentions of the management. Third, the reality is that there are few cases of successful implementation of domestic companies, and some companies that successfully implement the system mean nothing but implement the solution for developing the CRM. Therefore, it needs to be observed for the long haul, and it seems that we need to approach more systematically to implementation cases for each industry about implementation of the CRM. Fourth, the CRM is no longer the preserve of major companies, and it is the time that medium and small sized enterprises also need it. Taking lesson from Switzerland's small size store merchants who successfully adopt right size of the CRM for their business, for domestic medium and small sized enterprises, the necessity to develop business through developing the CRM models which fit their situations and maintaining relationships with customers has been grown. Fifth, for adopting the CRM business processes, changing or converting the CRM system to the model which fits the company's situation is important rather than applying the advanced company's CRM system model. In other words, the CRM solution which can maximize their own strength by developing the CRM program that makes the most of features and characteristics of the company should be adopted.

  • PDF

Improvement of Certification Criteria based on Analysis of On-site Investigation of Good Agricultural Practices(GAP) for Ginseng (인삼 GAP 인증기준의 현장실천평가결과 분석에 따른 인증기준 개선방안)

  • Yoon, Deok-Hoon;Nam, Ki-Woong;Oh, Soh-Young;Kim, Ga-Bin
    • Journal of Food Hygiene and Safety
    • /
    • v.34 no.1
    • /
    • pp.40-51
    • /
    • 2019
  • Ginseng has a unique production system that is different from those used for other crops. It is subject to the Ginseng Industry Act., requires a long-term cultivation period of 4-6 years, involves complicated cultivation characteristics whereby ginseng is not produced in a single location, and many ginseng farmers engage in mixed-farming. Therefore, to bring the production of Ginseng in line with GAP standards, it is necessary to better understand the on-site practices of Ginseng farmers according to established control points, and to provide a proper action plan for improving efficiency. Among ginseng farmers in Korea who applied for GAP certification, 77.6% obtained it, which is lower than the 94.1% of farmers who obtained certification for other products. 13.7% of the applicants were judged to be unsuitable during document review due to their use of unregistered pesticides and soil heavy metals. Another 8.7% of applicants failed to obtain certification due to inadequate management results. This is a considerably higher rate of failure than the 5.3% incompatibility of document inspection and 0.6% incompatibility of on-site inspection, which suggests that it is relatively more difficult to obtain GAP certification for ginseng farming than for other crops. Ginseng farmers were given an average of 2.65 points out of 10 essential control points and a total 72 control points, which was slightly lower than the 2.81 points obtained for other crops. In particular, ginseng farmers were given an average of 1.96 points in the evaluation of compliance with the safe use standards for pesticides, which was much lower than the average of 2.95 points for other crops. Therefore, it is necessary to train ginseng farmers to comply with the safe use of pesticides. In the other essential control points, the ginseng farmers were rated at an average of 2.33 points, lower than the 2.58 points given for other crops. Several other areas of compliance in which the ginseng farmers also rated low in comparison to other crops were found. These inclued record keeping over 1 year, record of pesticide use, pesticide storages, posts harvest storage management, hand washing before and after work, hygiene related to work clothing, training of workers safety and hygiene, and written plan of hazard management. Also, among the total 72 control points, there are 12 control points (10 required, 2 recommended) that do not apply to ginseng. Therefore, it is considered inappropriate to conduct an effective evaluation of the ginseng production process based on the existing certification standards. In conclusion, differentiated certification standards are needed to expand GAP certification for ginseng farmers, and it is also necessary to develop programs that can be implemented in a more systematic and field-oriented manner to provide the farmers with proper GAP management education.