• Title/Summary/Keyword: 기업 이러닝

Search Result 218, Processing Time 0.023 seconds

A study on Survive and Acquisition for YouTube Partnership of Entry YouTubers using Machine Learning Classification Technique (머신러닝 분류기법을 활용한 신생 유튜버의 생존 및 수익창출에 관한 연구)

  • Hoik Kim;Han-Min Kim
    • Information Systems Review
    • /
    • v.25 no.2
    • /
    • pp.57-76
    • /
    • 2023
  • This study classifies the success of creators and YouTubers who have created channels on YouTube recently, which is the most influential digital platform. Based on the actual information disclosure of YouTubers who are in the field of science and technology category, video upload cycle, video length, number of selectable multilingual subtitles, and information from other social network channels that are being operated, the success of YouTubers using machine learning was classified and analyzed, which is the closest to the YouTube revenue structure. Our findings showed that neural network algorithm provided the best performance to predict the success or failure of YouTubers. In addition, our five factors contributed to improve the performance of the classification. This study has implications in suggesting various approaches to new individual entrepreneurs who want to start YouTube, influencers who are currently operating YouTube, and companies who want to utilize these digital platforms. We discuss the future direction of utilizing digital platforms.

Effect of Online Education on Training Effectiveness: Conceptual Framework and Empirical Validation (온라인 교육이 훈련교과성에 미치는 영향에 관한 실증적 연구)

  • Kim, Jeong-Wook;Nam, Ki-Chan
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.185-209
    • /
    • 2007
  • The development of information technologies has contributed on-line training as one of important education methods. On-line training in firms, which is similar to e-learning or virtual education, provides trainees with more education opportunities in diverse ways. It has developed a range of innovative services with a one-stop solution of education within the electronic sector. Also under the on-line training environment, trainees can undertake customized training packages at anytime and any places. Moreover, information technology allows both the trainers and other trainees to be decoupled in any of the elements of tune, place, and space. Two research questions are investigated : what are the determinants affecting the on-line training effectiveness and how those variables affect the two aspects of training effectiveness: learning performance and transfer performance. Based on the previous literature conducted on the traditional training environment, the determinants of training effectiveness are derived. Eight hypotheses are developed based on literature reviews and tested by questionnaires survey data. The collected data have been analyzed by LISREL. It is found that the relationship between individual, organizational and on-line site design variables and training effectiveness (learning and transfer) are significant. The contribution and limitations of this research are also discussed with future studies.

  • PDF

Prediction of Dormant Customer in the Card Industry (카드산업에서 휴면 고객 예측)

  • DongKyu Lee;Minsoo Shin
    • Journal of Service Research and Studies
    • /
    • v.13 no.2
    • /
    • pp.99-113
    • /
    • 2023
  • In a customer-based industry, customer retention is the competitiveness of a company, and improving customer retention improves the competitiveness of the company. Therefore, accurate prediction and management of potential dormant customers is paramount to increasing the competitiveness of the enterprise. In particular, there are numerous competitors in the domestic card industry, and the government is introducing an automatic closing system for dormant card management. As a result of these social changes, the card industry must focus on better predicting and managing potential dormant cards, and better predicting dormant customers is emerging as an important challenge. In this study, the Recurrent Neural Network (RNN) methodology was used to predict potential dormant customers in the card industry, and in particular, Long-Short Term Memory (LSTM) was used to efficiently learn data for a long time. In addition, to redefine the variables needed to predict dormant customers in the card industry, Unified Theory of Technology (UTAUT), an integrated technology acceptance theory, was applied to redefine and group the variables used in the model. As a result, stable model accuracy and F-1 score were obtained, and Hit-Ratio proved that models using LSTM can produce stable results compared to other algorithms. It was also found that there was no moderating effect of demographic information that could occur in UTAUT, which was pointed out in previous studies. Therefore, among variable selection models using UTAUT, dormant customer prediction models using LSTM are proven to have non-biased stable results. This study revealed that there may be academic contributions to the prediction of dormant customers using LSTM algorithms that can learn well from previously untried time series data. In addition, it is a good example to show that it is possible to respond to customers who are preemptively dormant in terms of customer management because it is predicted at a time difference with the actual dormant capture, and it is expected to contribute greatly to the industry.

The Role and Prospect of Smart Platform in Disaster Management (재난관리 분야에서 스마트 플랫폼의 역할과 전망)

  • Lee, Dong-Hoon;Kim, Soo-Dong;Choi, In-Sang;Ki, Gi-Hyeon
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.260-261
    • /
    • 2017
  • 최근 사회구조의 복잡화, 산업구조의 다변화, 기후변화 등에 의해 자연재해 및 산업재해, 도시재난이 급증하고, 그 규모 또한 대형화하고 있다. 이로 인해 에너지, 통신, 교통, 금융 등 공공 인프라의 피해가 급증하면서 작은 재해도 큰 재난으로 변하는 예가 늘어나고 있다. 한편 현대사회에 대한 IT의 관여도가 급속도로 늘어나면서 IT 서비스의 궁극적인 형태이자, 모든 산업을 수용하는 개념의 플랫폼(Platform)이 IT를 넘어서 글로벌 사회의 절대적 지배자로 등장했다. 또한 전 세계 유저들의 관점에서 보면 개개인들이 손에 든 스마트폰이 생활의 모든 분야에 걸쳐 소통, 정보, 쇼핑, 제보, 오락 등 모든 활동의 수단으로 절대적 가치를 창출하고 있다. 이는 스마트폰이 가진 스마트 데이터 생산 및 공유 기능에서 비롯된다. 이처럼 스마트 데이터를 기반으로 한 IT플랫폼이 중요한 위치를 점하지만, 아직 재난관리 분야에서 이를 본격적으로 도입, 활용하지 못하고 있다는 점은 큰 문제이다. 국내의 사정을 보면 다행히 벤처기업들을 중심으로 이 같은 플랫폼 구축 움직임이 시작되었으며, 여기에 활용될 데이터 자원을 창출할 수 있는 솔루션 및 특허기술들 역시 속속 등장하고 있다. 시민들이 재난현장을 스마트폰으로 실시간 공유하면 이 스마트 데이터들이 이미지 및 음향정보, 위치기반(GPS)정보, 시각정보, 3D정보, 빅데이터 정보, 센서정보 등으로 분류되어 플랫폼 안에서 인공지능(AI) 딥러닝 방식에 의해 분석되고, 이를 즉시 재난당국 및 시민들에게 재난긴급문자 등 자동으로 경보로 전해주는 것이 이 플랫폼의 핵심 기능이다. 몇몇 벤처기업이 보유한 특허기술을 기반으로 공공자본이 투입되어 이러한 플랫폼이 구축될 경우 국내 재난관리 수준의 획기적 발전은 물론 전 세계를 시장으로 한 플랫폼 수출 또는 글로벌 재난정보 수집능력에서도 엄청난 힘을 발휘할 것으로 기대된다.

  • PDF

A Study on Security Authentication Vector Generation of Virtualized Internal Environment using Machine Learning Algorithm (머신러닝 알고리즘이 적용된 가상화 내부 환경의 보안 인증벡터 생성에 대한 연구)

  • Choi, Do-Hyeon;Park, Jung Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.33-42
    • /
    • 2016
  • Recently, the investment and study competition regarding machine running is accelerating mainly with Google, Amazon, Microsoft and other leading companies in the field of artificial intelligence. The security weakness of virtualization technology security structure have been a serious issue continuously. Also, in most cases, the internal data security depend on the virtualization security technology of platform provider. This is because the existing software, hardware security technology is hard to access to the field of virtualization and the efficiency of data analysis and processing in security function is relatively low. This thesis have applied user significant information to machine learning algorithm, created security authentication vector able to learn to provide with a method which the security authentication can be conducted in the field of virtualization. As the result of performance analysis, the interior transmission efficiency of authentication vector in virtualization environment, high efficiency of operation method, and safety regarding the major formation parameter were demonstrated.

Meltdown Threat Dynamic Detection Mechanism using Decision-Tree based Machine Learning Method (의사결정트리 기반 머신러닝 기법을 적용한 멜트다운 취약점 동적 탐지 메커니즘)

  • Lee, Jae-Kyu;Lee, Hyung-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.209-215
    • /
    • 2018
  • In this paper, we propose a method to detect and block Meltdown malicious code which is increasing rapidly using dynamic sandbox tool. Although some patches are available for the vulnerability of Meltdown attack, patches are not applied intentionally due to the performance degradation of the system. Therefore, we propose a method to overcome the limitation of existing signature detection method by using machine learning method for infrastructures without active patches. First, to understand the principle of meltdown, we analyze operating system driving methods such as virtual memory, memory privilege check, pipelining and guessing execution, and CPU cache. And then, we extracted data by using Linux strace tool for detecting Meltdown malware. Finally, we implemented a decision tree based dynamic detection mechanism to identify the meltdown malicious code efficiently.

Development of Product Recommendation System Using MultiSAGE Model and ESG Indicators (MultiSAGE 모델과 ESG 지표를 적용한 상품 추천 시스템 개발)

  • Hyeon-woo Kim;Yong-jun Kim;Gil-sang Yoo
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.69-78
    • /
    • 2024
  • Recently, consumers have shown an increasing tendency to seek information related to environmental, social, and governance (ESG) aspects in order to choose products with higher social value and environmental friendliness. In this paper, we proposes a product recommendation system applying ESG indicators tailored to the recent consumer trend of value-based consumption, utilizing a model called MultiSAGE that combines GraphSAGE and GAT. To achieve this, ESG rating data for 1,033 companies in 2022 collected from the Korea ESG Standard Institute and actual product data from N companies were transformed into a Heterogeneous Graph format through a data processing pipeline. The MultiSAGE model was then applied in machine learning to implement a recommendation system that, given a specific product, suggests eco-friendly alternatives. The implementation results indicate that consumers can easily compare and purchase products with ESG indicators applied, and it is anticipated that this system will be utilized in recommending products with social value and environmental friendliness.

The performance of ICT ODA in Morocco and The business entry strategy (ODA를 통한 모로코 ICT원조 성과와 시장진출 방안)

  • Yoon, Young-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.7-11
    • /
    • 2010
  • 우리나라는 2009년 OECD DAC 회원국으로 가입하면서 6.25전쟁직후 세계 최빈국으로써 원조를 받는 국가에서 60년만에 국제사회에 원조를 제공하는 공여국으로 성장한 국제사회의 유일무이한 사례이다. 우리 나라의 ODA(Official Development Assistance)는 ICT, 교육 분야 등과 같이 우리나라가 세계적으로 경쟁력을 가지고 있는 분야를 특성화하여 제공하고 있다. 모로코는 2012년까지 9,000여개의 모로코 초중등학교에 ICT를 보급한다는 계획과 ICT 산업 육성을 국가 주요 정책으로 추진하고 있는 있어 금번 프로젝트는 모로코 교사의 ICT 역량 강화를 지원하기 위하여 한국의 ICT 교육시스템을 모로코 초중등 교사에게 제공하는 것이다. 본 프로젝트는 교육쎈터 리모델링, ICT 기자재설치, 교사 커리큘럼 개발, 홈페이지 개발, 정책보고서 발간, 모로코 교사 초청 연수로 구분되어 있으며, 2009년 1월에 시작되어 2010년 11월에 완료된다. 본 프로젝트를 통해 모로코 초중등 교사 23만명중 년간 1,000명을 교육하고, 교육을 받은 교사는 소속지역에서 ICT Master Teacher 역할을 담당하게 된다. 본 프로젝트를 통하여 우리나라는 모로코 교육 선진화에 기여하며, 한국 ICT 기자재를 활용함으로써 한국산 H/W, SW 및 교육컨텐츠의 우수성을 모로코와 인근 국가에 홍보하고, 이를 통해 국내 기업의 북아프리카 진출을 간접 지원하였다. 또한, 본 프로젝트를 통하여 모로코를 비롯하여 2000년도부터 년평균 5.3%의 경제성장을 지속하고 있는 아프리카지역에 한국 ICT제품이 진출할 수 있는 방안으로, 국산 e-러닝 개발툴을 영어, 불어와 아랍어 버젼으로 추가 개발하였으며, 모로코 대학과 합작기업을 설립을 추진하고 있다.

  • PDF

Anomaly Detection using VGGNet for safety inspection of OPGW (광섬유 복합가공 지선(OPGW) 설비 안전점검을 위한 VGGNet 기반의 이상 탐지)

  • Kang, Gun-Ha;Sohn, Jung-Mo;Son, Do-Hyun;Han, Jeong-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.3-5
    • /
    • 2022
  • 본 연구는 VGGNet을 사용하여 광섬유 복합가공 지선 설비의 양/불량 판별을 수행한다. 광섬유 복합가공 지선이란, 전력선의 보호 및 전력 시설 간 통신을 담당하는 중요 설비로 고장 발생 전, 결함의 조기 발견 및 유지 관리가 중요하다. 현재 한국전력공사에서는 드론에서 촬영된 영상을 점검원이 이상 여부를 점검하는 방식이 주로 사용되고 있으나 이는 점검원의 숙련도, 경험에 따른 정확성 및 비용과 시간 측면에서 한계를 지니고 있다. 본 연구는 드론에서 촬영된 영상으로 VGGNet 기반의 양/불량 판정을 수행했다. 그 결과, 정확도 약 95.15%, 정밀도 약 96%, 재현율 약 95%, f1 score 약 95%의 성능을 확인하였다. 결과 확인 방법으로는 설명 가능한 인공지능(XAI) 알고리즘 중 하나인 Grad-CAM을 적용하였다. 이러한 광섬유 복합가공 지선 설비의 양/불량 판별은 점검원의 단순 작업에 대한 비용 및 점검 시간을 줄이며, 부가가치가 높은 업무에 집중할 수 있게 해준다. 또한, 고장 결함 발견에 있어서 객관적인 점검을 수행하기 때문에 일정한 점검 품질을 유지한다는 점에서 적용 가치가 있다.

  • PDF

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.