• Title/Summary/Keyword: systems of action

Search Result 1,356, Processing Time 0.026 seconds

Ad Planning Model by Comparison Challenge Approach in the e-Marketplace (e-Marketplace에서의 비교도전에 의한 광고계획 모델)

  • 이재규;이재원
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.137-153
    • /
    • 2003
  • Comparison shopping is the most popular functionality in the e-Marketplace. Most of their revenue has been generated kent the Internet advertisement, but the ad earning was declined as the ad costing per action method widespread. Seller less familiar to the customer shrinks from chances for advertising and exposing their products. So, we need an efficient methodology subject to the seller's ad budget and other constraints, and it also has to increase comparison broker's earning in the e-Marketplace. Our research proposed and developed an ad planning methodology using comparison challenge approach which can be applied by 3$^{rd}$ party comparison brokers. Comparison challenge planning is organized with challenge policy of competitor level, product level and specification level. With that policies and basic challenge propositions, we measure the quantified value of functional distance between the specifications of my product and competitor's product. My product challenges the comparison using the comparative ad format to the similar but inferior competitor's product based on quantified valuation. Comparison challenge planning system has two phases of comparative value generation and optimization. We developed a prototype system and applied it to the desktop PC market of five major manufacturers. Our performance was emphasized by comparing to other comparative ad methods such as random display method and minimum distance method..

  • PDF

Analysis report for readiness posture against north korea nuclear threat - Focused mainly in non-military area of government readiness posture - (북한의 핵위협 대비태세 분석 - 정부의 비군사분야 대비태세를 중심으로 -)

  • Kim, In-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.205-227
    • /
    • 2015
  • The Korean Peninsula is put in a position to carry out a highly strategic game vis-a-vis nK, which is asserting itself as a nuclear power amongst Northeast Asia's complex dynamics. While the international community recognizes nK's possession of nuclear weapons as released secret based on nK's three nuclear tests, shrewd strategic thinking is needed by ROK to secure itself as a non-nuclear nation in order to assume a responsible role to the international community, while simultaneously being ready to respond at all times for nK's military provocations. ROK must continue with its twofold strategy, by firm response to military confrontation with nK and maintaining flexible policy of tolerance in the areas of economy and ethnicity. Various strategic options to overcome nK's nuclear threats have been presented to ROK, whose possession of nuclear weapons have been difficult, and nK's nuclear capability is a real threat to ROK's national security. We must be able to respond to nK's nuclear threats strictly from ROK's national security perspective. This thesis aims to propose a response policy for nK's nuclear capability and nK's nuclear attack based on analysis of such nuclear damage, ROK Government's response posture against nK's nuclear threats, centered around ROK Government's non-military response posture.

  • PDF

A study on the policy of de-identifying unstructured data for the medical data industry (의료 데이터 산업을 위한 비정형 데이터 비식별화 정책에 관한 연구)

  • Sun-Jin Lee;Tae-Rim Park;So-Hui Kim;Young-Eun Oh;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.85-97
    • /
    • 2022
  • With the development of big data technology, data is rapidly entering a hyperconnected intelligent society that accelerates innovative growth in all industries. The convergence industry, which holds and utilizes various high-quality data, is becoming a new growth engine, and big data is fused to various traditional industries. In particular, in the medical field, structured data such as electronic medical record data and unstructured medical data such as CT and MRI are used together to increase the accuracy of disease prediction and diagnosis. Currently, the importance and size of unstructured data are increasing day by day in the medical industry, but conventional data security technologies and policies are structured data-oriented, and considerations for the security and utilization of unstructured data are insufficient. In order for medical treatment using big data to be activated in the future, data diversity and security must be internalized and organically linked at the stage of data construction, distribution, and utilization. In this paper, the current status of domestic and foreign data security systems and technologies is analyzed. After that, it is proposed to add unstructured data-centered de-identification technology to the guidelines for unstructured data and technology application cases in the industry so that unstructured data can be actively used in the medical field, and to establish standards for judging personal information for unstructured data. Furthermore, an object feature-based identification ID that can be used for unstructured data without infringing on personal information is proposed.

A Comparison between Korean and English News Editorials with Focus on U.S.-North Korea Summit Based on Expressive Language (언어표현 기반의 북미 정상회담에 관한 한미 신문사설의 비교)

  • Noh, Bokyung;Ban, Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.125-130
    • /
    • 2019
  • This research is about alternative measure of main components for sprinkler system like automatic wet pipe sprinkler system, dry pipe sprinkler system, pre-action sprinkler system, vacuum sprinkler system, deluge sprinkler system, and so on. By replacing the alarm check valve, dry valve, pre-operated valve, and deluge open valve with a solenoid valve, it be can be simplifed the various processes of the manufacturing process into one process, it creates an environment in which one standardized product can be produced simultaneously on a single machine. Therefore, it could improve the price competitiveness of products, reduce the maintenance cost, and help the adaptability of new sprinkler systems in the future. There is a benefit when it comes to apply to sprinkler system. Only replace the valve which is used to control primary and secondary valve such as wet, dry, pre operated, vacuum, deluge system valve. Other components such as retarding chambers, automatic air compressors, accelerators or adjusters, supervisory panels, vacuum pumps, and manual starters can be used as they are, so they can be easily applied to existing sprinkler system. It is needed to legal and institutional study for solenoid valve applied sprinkler system to commercialize.

Intracellular Signaling Pathway for Host Defense Mechanisms against Piscine Nervous Necrosis Virus (NNV) (어류신경괴사증바이러스(nervous necrosis virus, NNV) 감염에 따른 숙주의 방어기전관련 세포신호전달)

  • Kim, Jong-Oh
    • Journal of Life Science
    • /
    • v.30 no.4
    • /
    • pp.402-409
    • /
    • 2020
  • Nervous necrosis virus (NNV) contains a bi-segmented viral genome, RNA1 (3.4 kb, RdRp), and RNA2 (1.4 kb, capsid protein) in a small particle (25 nm). Despite its extremely compact size, NNV has caused serious damage by infecting approximately 120 fish species worldwide since it was first reported in the late 1980s. In order to minimize the damage caused by NNV infection and develop effective vaccines, it is necessary to understand the intra cellular signaling system according to NNV infection. NNV infection induces cell cycle arrest at the G1 phase via the p53-dependent pathway to use the cellular system for its replication. Otherwise, host cells recognize NNV infection through the RIG-1-like receptor (RLR) signaling pathway to control the virus and infected cells, and then ISGs required for antiviral action are activated via the IFN signaling pathway. Moreover, apoptosis of infected cells is triggered by the unfolded protein response (UPR) through ER stress and mitochondria-mediated cell death. Cell signaling studies on the NNV infection mechanisms are still at an early stage and many pathways have yet to be identified. Understanding the various disease-specific cellular signaling systems associated with NNV infection is essential for rapid and accurate diagnosis and vaccine development.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Annotation Method based on Face Area for Efficient Interactive Video Authoring (효과적인 인터랙티브 비디오 저작을 위한 얼굴영역 기반의 어노테이션 방법)

  • Yoon, Ui Nyoung;Ga, Myeong Hyeon;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.83-98
    • /
    • 2015
  • Many TV viewers use mainly portal sites in order to retrieve information related to broadcast while watching TV. However retrieving information that people wanted needs a lot of time to retrieve the information because current internet presents too much information which is not required. Consequentially, this process can't satisfy users who want to consume information immediately. Interactive video is being actively investigated to solve this problem. An interactive video provides clickable objects, areas or hotspots to interact with users. When users click object on the interactive video, they can see additional information, related to video, instantly. The following shows the three basic procedures to make an interactive video using interactive video authoring tool: (1) Create an augmented object; (2) Set an object's area and time to be displayed on the video; (3) Set an interactive action which is related to pages or hyperlink; However users who use existing authoring tools such as Popcorn Maker and Zentrick spend a lot of time in step (2). If users use wireWAX then they can save sufficient time to set object's location and time to be displayed because wireWAX uses vision based annotation method. But they need to wait for time to detect and track object. Therefore, it is required to reduce the process time in step (2) using benefits of manual annotation method and vision-based annotation method effectively. This paper proposes a novel annotation method allows annotator to easily annotate based on face area. For proposing new annotation method, this paper presents two steps: pre-processing step and annotation step. The pre-processing is necessary because system detects shots for users who want to find contents of video easily. Pre-processing step is as follow: 1) Extract shots using color histogram based shot boundary detection method from frames of video; 2) Make shot clusters using similarities of shots and aligns as shot sequences; and 3) Detect and track faces from all shots of shot sequence metadata and save into the shot sequence metadata with each shot. After pre-processing, user can annotates object as follow: 1) Annotator selects a shot sequence, and then selects keyframe of shot in the shot sequence; 2) Annotator annotates objects on the relative position of the actor's face on the selected keyframe. Then same objects will be annotated automatically until the end of shot sequence which has detected face area; and 3) User assigns additional information to the annotated object. In addition, this paper designs the feedback model in order to compensate the defects which are wrong aligned shots, wrong detected faces problem and inaccurate location problem might occur after object annotation. Furthermore, users can use interpolation method to interpolate position of objects which is deleted by feedback. After feedback user can save annotated object data to the interactive object metadata. Finally, this paper shows interactive video authoring system implemented for verifying performance of proposed annotation method which uses presented models. In the experiment presents analysis of object annotation time, and user evaluation. First, result of object annotation average time shows our proposed tool is 2 times faster than existing authoring tools for object annotation. Sometimes, annotation time of proposed tool took longer than existing authoring tools, because wrong shots are detected in the pre-processing. The usefulness and convenience of the system were measured through the user evaluation which was aimed at users who have experienced in interactive video authoring system. Recruited 19 experts evaluates of 11 questions which is out of CSUQ(Computer System Usability Questionnaire). CSUQ is designed by IBM for evaluating system. Through the user evaluation, showed that proposed tool is useful for authoring interactive video than about 10% of the other interactive video authoring systems.

An Empirical Study of Social Network Service (SNS) Continuance: Incorporating the Customer Value-Satisfaction-Loyalty Model into the IS Continuance Model (소셜 네트워크 서비스(SNS)의 지속이용의도에 관한 연구: IS 지속이용모델과 고객 가치-만족-충성도 모델의 통합적 접근)

  • Choi, Sujeong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.1-28
    • /
    • 2013
  • Given that smartphone-based social network services (SNS), such as KakaoStory is now being widely used as a way for people to connect and communicate with each other, this study examines key factors leading to the continued use of SNS. People have been using PC-based SNS, such as Cyworld, for years are now using smartphone-based SNS, such as KakaoStory. KakaoStory developed by KakaoTalk has rapidly grown up as the largest smartphone-based SNS in Korea as smartphone penetration increases. It is more difficult for firms to maintain their current users over time in that alternative SNSs satisfying people's new needs are constantly emerging and evolving. In this sense, one of the most challenging issues for SNS firms is how to retain their current users in the long run. However, there are few empirical studies on this issue. Applying the IS continuance model proposed by Bhattacherjee [2001], this study explores key determinants of users' smartphone-based SNS continuance intention. The model suggests that perceived usefulness and user satisfaction are the key determinants of IS continuance intention. However, the model includes only the utilitarian value that users can obtain through the use of smartphone-based SNS, by considering perceived usefulness. Therefore, the study attempts to extend the IS continuance model by considering hedonic and social values simultaneously. More specifically, we consider subjective norms as social value that are proposed by the theory of reasoned action and the theory of planned behavior. We also consider perceived enjoyment as hedonic value that is emphasized as a key factor influencing users' behavior intention and actual behavior, particularly in the context of hedonic IS use. By considering the three values in our model simultaneously, we could offer a deeper understanding of smartphone-based SNS continuance. That is, this study could offer an explanation of how each value is associated with user satisfaction and SNS continuance intention. The customer value-satisfaction-loyalty model can strengthen the assertion that smartphone-based SNS continuance intention is determined by various different types of customer values, such as utilitarian, hedonic, and social ones. Moreover, the model provides a theoretical basis for the assertion that customer values lead to increased loyalty via customer satisfaction. In this regard, we theorize that SNS continuance intention is influenced by users' various values, namely perceived usefulness, perceived enjoyment, and subjective norms, via user satisfaction. To test the proposed research model and hypotheses, we conducted a partial least squares analysis using a total of 253 data collected on the users of smartphone-based SNS (i.e., KakaoStory). The key findings are as follows: First, it has been found that SNS continuance intention considerably depends on user satisfaction. Second, user satisfaction is determined by confirmation, perceived usefulness, and perceived enjoyment. Third, concerning the effects of the three values on SNS continuance intention, only perceived enjoyment regarded as hedonic value was statistically significant. That is, perceived usefulness considered as utilitarian value and subjective norms considered as social value had no effect on SNS continuance intention. Finally, our results indicate that confirmation increases perceived usefulness, perceived enjoyment, and user satisfaction. The results reconfirm the effectiveness of IS continuance model in predicting smartphone-based SNS continuance intention. Moreover, the results demonstrate that perceived enjoyment reflecting hedonic value is the most important predictor of SNS continuance intention. Therefore, it is imperative for firms to meet SNS users' hedonic value to retain them in the long run. Meanwhile, we could not find any empirical evidence to support the assertion that subjective norms are associated with user satisfaction and SNS continuance intention. The results lead us to conclude that when users have enough direct experience in SNS use, subjective norms have no effect on SNS continuance intention. Discussions and implications of the results are provided.

Oxidative Stress-dependent Structural and Functional Regulation of 2-cysteine Peroxiredoxins In Eukaryotes Including Plant Cells (산화 스트레스에 의존한 식물 및 진핵세포 2-시스테인 퍼록시레독신의 기능 조절)

  • Jang, Ho-Hee;Kim, Sun-Young;Lee, Sang-Yeol
    • Journal of Plant Biotechnology
    • /
    • v.33 no.1
    • /
    • pp.1-9
    • /
    • 2006
  • Peroxiredoxins (Prxs) are ubiquitously distributed and play important functions in diverse cellular signaling systems. The proteins are largely classified into three groups, such as typical 2-Cys Prx, atypical 2-Cys Prx, and 1-Cys Prx, that are distinguished by their catalytic mechanisms and number of Cys residues. From the three classes of Prxs, the typical 2-Cys Prx containing the two-conserved Cys residues at its N-terminus and C-terminus catalyzes $H_2O_2$ with the use of thioredoxin (Trx) as an electron donor. During the catalytic cycle, the N-terminal Cys residue undergoes a peroxide-dependent oxidation to sulfenic acid, which can be further oxidized to sulfinic acid at the presence of high concentrations of $H_2O_2$ and a Trx system containing Trx, Trx reductase, and NADPH. The sulfinic acid form of 2-Cys Prx is reduced by the action of sulfiredoxin which requires ATP as an energy source. Under the strong oxidative or heat shock stress conditions, 2-Cys Prx in eukaryotes rapidly switches its protein structure from low-molecular-weight species to high-molecular-weight protein structures. In accordance with its structural changes, the protein concomitantly triggers functional switching from a peroxidase to a molecular chaperone, which can protect its substrate denaturation from external stress. In addition to its N-terminal active site, the C-terminal domain including 'YF-motif' of 2-Cys Prx plays a critical role in the structural changes. Therefore, the C-terminal truncated 2-Cys Prxs are not able to regulate their protein structures and highly resistant to $H_2O_2$-dependent hyperoxidation, suggesting that the reaction is guided by the peroxidatic Cys residue. Based on the results, it may be concluded that the peroxidatic Cys of 2-Cys Prx acts as an '$H_2O_2$-sensor' in the cells. The oxidative stress-dependent regulation of 2-Cys Prx provides a means of defense systems in cells to adapt stress conditions by activating intracellular defense signaling pathways. Particularly, 2-Cys Prxs in plants are localized in chloroplasts with a dynamic protein structure. The protein undergoes conformational changes again oxidative stress. Depending on a redox-potential of the chloroplasts, the plant 2-Cys Prx forms super-molecular weight protein structures, which attach to the thylakoid membranes in a reversible manner.

A Study of Power Perception between Supplier and Retail Buyer of Agricultural Products (농산물공급자와 대형소매업체 바이어간의 상호 파워 인식에 대한 연구)

  • 서성무;이은정
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2003.02a
    • /
    • pp.123-166
    • /
    • 2003
  • Marketing channel is recognized as one of the society systems which have the character of functional organization. These organizations are related to each other for specialized and cooperative work. Channel members in distribution channel are striving to accomplish exchange through reciprocal action. Thus channel members exercise their power to take better position in exchange. There will be struggling between members about satisfaction and conflict during this power exercise. Now a days, buyers use more harsh power as large retail firms are increasing. This phenomenon is occurring in the distribution channel. However, there will be different phenomenon in case of agricultural products. Not like industrial product suppliers, agricultural product suppliers have various supply channels and many agricultural products are seasonal. It has also unstable amount supplies. There should be differentiated marketing in agricultural products. Relatively weaker powered suppliers have to strengthen comparative factors and also have to be technically specialized through assessed experience in order to establish strong product sales chain. Making a brand of agricultural product would be also a good idea to increase the product comparability. Channel members need to be recognized their specialized functions in order to make balanced distribution channel. There have to be conversion of concept of relation between suppliers and buyers from subordinate relationship to cooperative relationship.

  • PDF