• Title/Summary/Keyword: 기업데이터 분석

Search Result 2,116, Processing Time 0.031 seconds

A Study on Latency Time Improvement of Electronic Commerce System Using Local Server and Web Cashing (로컬서버와 웹캐싱을 이용한 전자상거래 시스템의 지연속도 개선에 관한 연구)

  • Yoon,, Yong-Ki;Ko, Il-Seok;Leem, Choon-Seong
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.555-562
    • /
    • 2002
  • Increasing of electronic commerce users and high-capacity multimedia data is the main causes of increasing of load and network traffic in electronic commerce system. Increasing of load and network traffic brings the delay of service about client's request. And it's becoming factor that decreases customer satisfaction and corporation's competitive ability. So it is needed to research that consider efficient management and response time of electronic commerce system. In this paper, we designed electronic commerce system based on local server with web cashing function in order to solve load problem of electronic commerce system. And we proposed web cashing algorithm for local web server and analyzed performance by an experiment.

A Study of Successful Implementation of Application Service Providing Based on the Perception of Small and Medium Corporations in Korea (국내 중소기업의 인식을 기반으로 한 성공적인 ASP 구현에 관한 연구)

  • 황재훈;박현지
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.4
    • /
    • pp.100-105
    • /
    • 2002
  • This study evaluates the application sum providing(ASP) approach based on the perceptions of Koreas small and medium corporations, especially in the manufacturing industry. As considering the costs and risks of system implementation and maintenance, ASP would be a favorable alternative. Based on the survey of 25 cases, we found that as long as the level of perception on ASP is concerned, 80 percent of firms responded no or a little idea about the ASP service. Moreover the acceptance possibility of ASP service in the near future was less than 10 patent, and the primary reasons were found as follows: (1) lack of confidence regarding on the effect, (2) apprehension of data security, (3) issue of handling the existing employees, and (4) possibility of fee structure change after the implementation and stabilization. The guidelines to increase the recognition and successful implementation of ASP service in Korea are proposed.

  • PDF

Attack Evolution of 'DNSpionage' and Countermeasures on Survey ('DNS피오나지' 공격의 진화에 따른 대응방안)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.52-57
    • /
    • 2019
  • DNS stands for 'Domain Name System' and uses IP addresses to identify devices connected to the network on the network. IP is a protocol that registers and manages aliases such as IPs because it is difficult for general users to remember. In recent years, the abuse of such DNS is increasing abroad, and behind the scenes, called 'DNS pionage,' are developing and evolving new rules and malware. DNSpionage attack is abusing DNS system such as Increasing hacking success rate, leading to fake sites, changing or forged data. As a result it is increasing the damage cases. As the global DNS system is expanding to the extent that it is out of control. Therefore, in this research, the countermeasures of DNSpionage attack is proposed to contribute to build a secure and efficient DNS system.

Performance Analysis of Detecting buried pipelines in GPR images using Faster R-CNN (Faster R-CNN을 활용한 GPR 영상에서의 지하배관 위치추적 성능분석)

  • Ko, Hyoung-Yong;Kim, Nam-gi
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.21-26
    • /
    • 2019
  • Various pipes are buried in the city as needed, such as water pipes, gas pipes and hydrogen pipes. As the time passes, buried pipes becomes aged due to crack, etc. these pipes has the risk of accidents such as explosion and leakage. To prevent the risks, many pipes are repaired or replaced, but the location of the pipes can also be changed. Failure to identify the location of the altered pipe may cause an accident by touching the pipe. In this paper, we propose a method to detect buried pipes by gathering the GPR images by using GPR and Learning with Faster R-CNN. Then experiments was carried out by raw data sets and data sets augmentation applied to increase the amount of images.

A Mobile Sales Force Management System Using Geolocation (지오로케이션을 활용한 모바일 영업 관리 시스템)

  • Jung, Da Hee;Lee, Sang Rim;Kim, Young Jin;Ku, Dong Youn;Lee, Young Kyu
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.1669-1672
    • /
    • 2013
  • 영업 관리 시스템이 발달함에 따라 모바일 단말기를 이용하여 영업비용 절감, 고객 접점 및 영업 활동 강화에 대한 연구가 진행 중이다. 기존의 영업 관리 시스템은 영업사원이 기업에게 하나의 단말기를 제공받아 영업 활동을 하며 관리자가 이를 모니터링 할 수 있는 기능을 제공하는 시스템이다. 이를 통해 관리자는 영업사원의 업무 활동을 시스템을 통해 관리할 수 있다. 그렇지만 최근 다양한 모바일 기기가 등장함에도 불구하고 기존의 시스템은 다양한 디바이스를 지원할 수 없고 맵 기반의 지오로케이션을 통한 활동 분석의 부족함이 있다. 또한 관리자가 영업 사원의 업무 활동에 따른 예상 위치와 통계 정보를 알 수 없다는 한계가 있다. 본 시스템에서는 반응형 웹과 지오로케이션을 적용하여 다양한 디바이스 환경에서도 서비스를 제공하며, 영업 사원의 이동 경로를 정확하게 파악할 수 있다. 또한, 과거의 업무 시간과 이동 시간 데이터를 이용하여 영업 사원의 미래 위치를 예상하고 업무량에 대한 통계 기능을 추가하여 시스템의 편리성을 높인다.

Development of a model for predicting dyeing color results of polyester fibers based on deep learning (딥러닝 기반 폴리에스터 섬유의 염색색상 결과예측 모형 개발)

  • Lee, Woo Chang;Son, Hyunsik;Lee, Choong Kwon
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.74-89
    • /
    • 2022
  • Due to the unique recipes and processes of each company, not only differences among the results of dyeing textile materials exist but they are also difficult to predict. This study attempted to develop a color prediction model based on deep learning to optimize color realization in the dyeing process. For this purpose, deep learning-based models such as multilayer perceptron, CNN and LSTM models were selected. Three forecasting models were trained by collecting a total of 376 data sets. The three predictive models were compared and analyzed using the cross-validation method. The mean of the CMC (2:1) color difference for the prediction results of the LSTM model was found to be the best.

The Impact of Exploration and Exploitation Activities and Market Agility on the Relationship between Big Data Analytics Capability and Firms' Performance (빅 데이터 분석능력과 기업 성과 간의 관계에서 혁신 및 개선 활동과 시장 민첩성의 영향)

  • Jung, He-Kyung;Boo, Jeman
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.3
    • /
    • pp.150-162
    • /
    • 2022
  • This study investigated the impact of the latest developments in big data analytics capabilities (BDAC) on firm performance. The BDAC have the power to innovate existing management practices. Nevertheless, their impact on firm performance has not been fully is not yet fully elucidated. The BDAC relates to the flexibility of infrastructure as well as the skills of management and firm's personnel. Most studies have explored the phenomena from a theoretical perspective or based on factors such as organizational characteristics. However, this study extends the flow of previous research by proposing and testing a model which examines whether organizational exploration, exploitation and market agility mediate the relationship between the BDAC and firm performance. The proposed model was tested using survey data collected from the long-term employees over 10 years in 250 companies. The results analyzed through structural equation modeling show that a strong BDAC can help improve firm performance. An organization's ability to analyze big data affects its exploration and exploitation thereby affecting market agility, and, consequently, firm performance. These results also confirm the powerful mediating role of exploration, exploitation, and market agility in improving insights into big data utilization and improving firm performance.

Machine Learning Approach for Prediction of VOD Usage (머신러닝을 활용한 VOD 이용건수 예측)

  • Jeon, Jong Seok;Jang, Ha Eun;Oh, Joo Hee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.507-513
    • /
    • 2022
  • This study developed a model for predicting the number of VOD uses of IPTV, an online market in the film industry. A machine learning-based prediction model was established using the VOD usage data collected by the Korean Film Council from 2017 to 2021. Through literature research and cluster analysis, the difference between the offline market and the online market is revealed, and a new category of VOD usage is proposed. The purpose is to help IPTV companies establish marketing strategies as well as support decision-making by developing a machine learning-based VOD usage prediction model.

A Study of IT Asset Management (IT 자산관리에 관한 연구)

  • Choi, Dong-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.141-143
    • /
    • 2022
  • IT 자산관리(ITAM, IT Asset Management)는 조직이 소유한 IT 자산과 관련된 모든 이력 변경 정보, 비용, 계약 및 구매/리스 데이터를 관리하는 것이다. 자산 취득 및 처분에 관한 기술, 재무 및 계약 정보를 취득하고 통합한다. 그리고 유지하는 과정. 비즈니스의 효율성과 효율성을 높이기 위해 IT 인프라의 서비스 및 리소스에 대한 자산 관리의 4가지 요소(4C, 특성: 자산 수명 주기 정보, 구성: H/W와 S/W 정보, 계약: 서비스 및 보증, 종합관리: 보증 정보, 비용 및 재무 정보)는 회사 인프라 자원의 TCO 및 ROI를 개선하고 생산성의 범위를 확장하는 것을 목표로 한다. IT 자산 관리의 필요성은 사업에 필요한 IT 자산 정보 제공, 비용 관리, 구매 결정에 필요한 정보 제공, 소프트웨어 라이선스 및 하드웨어 자원의 재활용 촉진, 장치 노후화로 인한 추가 비용 방지를 위한 것이다. 비용 예측 및 관리, 내부 통제 및 외부 감사 대응, 사업부별 IT 비용 및 활용도 분석을 유지 및 지원한다. 사업부의 IT 자원 사용으로 인한 문제는 업무 효율성을 저하시키고 IT 부서의 업무를 증가시키며 결과적으로 기업의 비용을 증가시키며 이것이, IT 자산 관리의 현실이다. 본 논문에서는 적용 사례를 통해 더 나은 관리 방안을 마련하기 위한 방법을 제안한다.

  • PDF

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF