• Title/Summary/Keyword: 사용자의도

Search Result 1,337, Processing Time 0.028 seconds

An Adaptive Business Process Mining Algorithm based on Modified FP-Tree (변형된 FP-트리 기반의 적응형 비즈니스 프로세스 마이닝 알고리즘)

  • Kim, Gun-Woo;Lee, Seung-Hoon;Kim, Jae-Hyung;Seo, Hye-Myung;Son, Jin-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.301-315
    • /
    • 2010
  • Recently, competition between companies has intensified and so has the necessity of creating a new business value inventions has increased. A numbers of Business organizations are beginning to realize the importance of business process management. Processes however can often not go the way they were initially designed or non-efficient performance process model could be designed. This can be due to a lack of cooperation and understanding between business analysts and system developers. To solve this problem, business process mining which can be used as the basis of the business process re-engineering has been recognized to an important concept. Current process mining research has only focused their attention on extracting workflow-based process model from competed process logs. Thus there have a limitations in expressing various forms of business processes. The disadvantage in this method is process discovering time and log scanning time in itself take a considerable amount of time. This is due to the re-scanning of the process logs with each new update. In this paper, we will presents a modified FP-Tree algorithm for FP-Tree based business processes, which are used for association analysis in data mining. Our modified algorithm supports the discovery of the appropriate level of process model according to the user's need without re-scanning the entire process logs during updated.

Study of the Acceptance of Interested Parties(Auditor /Auditee) in the Information System Audit Technologies Based Technology Acceptance Model(TAM) (정보시스템 감리기술에 대해 이해관계자(감리인/피감리인)의 수용에 관한 연구 -기술수용모델(TAM)을 중심으로-)

  • Kim, Hak-Joon;Jeon, Soon-Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1403-1413
    • /
    • 2015
  • An information System Audit by the recognition of a problem and suggestions for solutions for overall matters about constructing and managing information systems is needed in order to contribute to the improvement of an information system's quality and improving the performance of projects. In reality, however, the general cognition is that audit is biased by subjective opinions. For this, an auditor needs to measure the level of recognition of the usability and convenience of the technologies of automating audit by applying TAM in the information system audit, and to analyze the relationship with recognition and availability of the interested parties for the technology (tool) of the audit. By the hypothesis verification result, an auditor needs to present objective corroborative facts that back up the level of recognition and usability for the information technology in the field of audit. This study verified that the phenomenon of technology application can be explained and predicted by applying TAM in the field of audit. Through an empirical study of the recognition level of audit and contractor, the developer suggests that the audit plan stage is similar to the audit corrective action stage, but the audit action stage is different from the audit review stage. This research can verify the audit technology preferred for the availability and intention of use and usability.

A Study to Improve Recovery Ratio of Deleted File Using the Parsing Algorithm of the HFS + Journal File (HFS+ 저널 파일 파싱 알고리즘을 이용한 삭제된 파일 복구 기법 향상 방안)

  • Bang, Seung Gyu;Jeon, Sang Jun;Kim, Do Hyun;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.463-470
    • /
    • 2016
  • With the growing demand for MAC-based system, the need for digital forensic techniques of these system has been increasing. In the digital forensic analysis process, sometimes analysts have recovered the deleted files when they prove the allegations if system user try to remove the evidence deliberately. Research and analysis that recover the deleted files from a file system constantly been made and HFS+ that is a file system of MAC-based system also has been researched. Carving techniques primarily has been used to recover the deleted file from HFS+ a file system because metadata of folder or file overwrite metadata of a deleted file when file is deleted from a file system on HFS+ characteristic. But if the file content is saved by separated state in a file system, Carving techniques also can't recover the whole or a part of the deleted file. In this paper we describe technique the deleted file recovery technique using HFS+ file system a journal. This technique that is suggested by existing research and analysis result is the technique that recover the deleted file by metadata that is maintained in a journal on HFS+ file system. but this technique excludes specific files and this problem needs to be reformed. In this paper we suggest algorithm that analysis a journal of HFS+ file system in detail. And we demonstrate that the deleted file cat be recovered from the extracted metadata by this algorithm without the excluded file.

Digital Reproduction of Mobiles (모빌의 디지털 재현)

  • Lee, Dong-Chun;Lee, Nam-Kyeong;Jung, Dae-Hyun;Kim, Chang-Tae;Lee, Dong-Kyu;Bae, Hee-Jung;Baek, Nakhoon;Lee, Jong-Won;Ryu, Kwan-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.415-423
    • /
    • 2001
  • Recently, there are many attempts to reproduce real world fine art pieces in digital forms. The digital representations are convenient to store and/or transmit. In contrast, mobiles, or moving sculptures, such as those designed by Alexander Calder cannot to reproduced realistically by usual reproduction techniques. Since mobiles are originally designed to generate motions in response to external forces applied to it, people could not fully enjoy them through photographs or static images. We present a virtual mobile system where use can easily control the mobile and can feel the impressions that the artist originally intended to provide. A real-world mobile is reconstructed in a three-dimensional physically-based model. and then virtual wind is generated to give motions to it. The motions of the mobile are generated by constraint dynamics and impulse dynamics techniques, which are modified to fully utilize the characteristics of the mobile, and finally give interactive displays on the PC platforms. The techniques presented can easily be extended to simulate other interactive dynamics systems.

  • PDF

The Facets of Korean Documentary Photography (한국 기록사진의 개념 형성과 전개)

  • Park, Ju Seok
    • The Korean Journal of Archival Studies
    • /
    • no.27
    • /
    • pp.169-208
    • /
    • 2011
  • In this thesis, I pursued how the concept of documentary photography in Korea was formed, and how Koreans perceive the current mix of some concepts and how they are tracked that. Korean photography society, directly or indirectly, accepted the concept and format of documentary photography of the United States in which information and discussion of the history and concept by examining the process of being transferred to Korea are examined. Giroksajin(記錄寫眞) is a translation word of documentary photography which was a part of documentary movements in the United States of the 1930s, and are all based on that concept. When we order Korean documentary photography and the subject matter must be distinct, attitude toward the things should be based on the exact perceptions of this age awareness, to be able to give enough information, and finally moved forward to move the human emotion must be. When this condition is equipped with the photographers and archivists perspective is revealed clearly the social and historical records that are meaningful. Documentary photography is the subject of the photographers and archivists that want to record the important things, but what you can get in the records and the question of how to use it is also important. Korean documentary photography, not only records the things, just to have a meaningful supplement to get done the exact context of information production and led to the conclusion that the strengthening of documentation strategies.

An Analysis on Perception of Korean University Students Learners on MOOCs (K-MOOC 대학생 수강자의 인식 분석)

  • Lee, Jeongmin;Jeon, JeongA
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.1-11
    • /
    • 2019
  • This study is aimed to analyze university students' learning experiences in K-MOOC by conducting a survey of university students' perception of K-MOOC, who are the major users of K-MOOC. Also it intended to use them to develop a specific strategy for continued use of K-MOOC. The study was conducted on 155 university students who attending university course and experienced K-MOOC's course within a year. The survey was conducted on online and provided with multiple questions about sustainability and satisfaction. Also survey provided with a subjective items about reason of satisfaction and dissatisfaction with the K-MOOC, and expectation about the future K-MOOC. The analysis found that the main motivation for university students was the convenience of online learning, which was the highest in questions asking why they were satisfied. For reasons of dissatisfaction, the decrease in academic volition and lack of interaction, and the technical problems of K-MOOC system were pointed out. University students learners are expecting improvements in course content and K-MOOC system. Based on these results, this paper suggests instructional strategies to help K-MOOC university students for becoming lifelong learners of K-MOOC.

A Knowledge Graph on Japanese "Comfort Women": Interlinking Fragmented Digital Archival Resources (일본군 '위안부' 지식그래프: 파편화된 디지털 기록의 연결)

  • Park, Haram;Kim, Haklae
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.3
    • /
    • pp.61-78
    • /
    • 2021
  • Records on Japanese "Comfort Women" have been individually managed by private sectors or institutions, and some are provided as digital archives on the Internet. However, records of digital archives differ in the composition and representation of metadata by individual institutions. Meanwhile, there is a lack of a consistent structure to describe the relationships between and among these records, leading to their fragmentation and disconnectedness. This paper proposes a knowledge model for interlinking the digital archival resources and builds a knowledge graph by integrating the records from distributed digital archives. It derives common elements by analyzing metadata from the diverse digital archives and expresses them in standard vocabularies to semantically describe multiple entities and relationships of the digital archival resources. In particular, the study includes the refinement of collected data to search and thread dispersed records and the enrichment of external data to provide significant contextual information of records. An evaluation of the knowledge graph is performed via a query measuring the (dis)connectivity between the distributed records. As a result, the knowledge graph is capable of interlinking and retrieving fragmented records, providing substantial contextual information on the records with external data enrichment, and searching accurately to match the user's intentions through semantic-based queries.

Acceleration of Viewport Extraction for Multi-Object Tracking Results in 360-degree Video (360도 영상에서 다중 객체 추적 결과에 대한 뷰포트 추출 가속화)

  • Heesu Park;Seok Ho Baek;Seokwon Lee;Myeong-jin Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.3
    • /
    • pp.306-313
    • /
    • 2023
  • Realistic and graphics-based virtual reality content is based on 360-degree videos, and viewport extraction through the viewer's intention or automatic recommendation function is essential. This paper designs a viewport extraction system based on multiple object tracking in 360-degree videos and proposes a parallel computing structure necessary for multiple viewport extraction. The viewport extraction process in 360-degree videos is parallelized by composing pixel-wise threads, through 3D spherical surface coordinate transformation from ERP coordinates and 2D coordinate transformation of 3D spherical surface coordinates within the viewport. The proposed structure evaluated the computation time for up to 30 viewport extraction processes in aerial 360-degree video sequences and confirmed up to 5240 times acceleration compared to the CPU-based computation time proportional to the number of viewports. When using high-speed I/O or memory buffers that can reduce ERP frame I/O time, viewport extraction time can be further accelerated by 7.82 times. The proposed parallelized viewport extraction structure can be applied to simultaneous multi-access services for 360-degree videos or virtual reality contents and video summarization services for individual users.

Ethical Consciousness: Passive Privacy Intrusion versus Active Privacy Intrusion on a SNS (윤리의식: SNS상의 수동적 개인정보 침해와 능동적 개인정보 침해)

  • Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.24 no.4
    • /
    • pp.55-76
    • /
    • 2022
  • People have adopted Social Networking Sites (SNSs) as a part of their daily lives. When a person uses SNSs, (s)he intentionally or unintentionally discloses her/his personal information. Although using SNSs can provide benefits to a person such as maintaining relationships with people who does not see often, it also opens a dark side. Someone can use one's disclosed information without the acknowledgement of the information owner. It is called a privacy intrusion on SNSs, which has become a social problem and needs attention. This study examined factors affecting privacy intrusion intention on SNSs. This study classifies privacy intrusions into passive intrusion (collector) and active intrusion (distributor). The results reveal that low ethical consciousness positively affects enjoyment in both of collecting and distributing someone's personal information on SNSs. A person who has the low ethical consciousness also tends to raise her/his curiosity of collecting someone's private information on SNSs. Apart from low ethical consciousness, this study discloses how enjoyment, curiosity, experience of being a victim of privacy intrusion, experience of intruding others' privacies, and self-efficacy of collecting or distributing others' private information are related to passive or/and active privacy intrusion on SNSs with survey data.

Design and Analysis of Online Advertising Expenditure Model based on Coupon Download (쿠폰 다운로드를 기준으로 하는 온라인 광고비 모델의 설계 및 분석)

  • Jun, Jung-Ho;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.1-19
    • /
    • 2010
  • In offline environment, unlike traditional advertising model through TV, newspaper, and radio, online advertising model draws instantaneous responses from potential consumers and it is convenient to assess. This kind of characteristics of Internet advertising model has driven the growth of advertising model among various Internet business models. There are, conventionally classified, CPM (Cost Per Mile), CPC (Cost Per Click), and CPS (Cost Per Sales) models as Internet advertising expenditure model. These can be examined in manners regarding risks that stakeholders should stand and degree of responsibility. CPM model that is based on number of advertisement exposure is mechanically exposed to users but not actually recognized by users resulting in risk of wasted expenditure by advertisers without any advertising effect. While on aspect of media, CPS model that is based on conversion action is the most risky model because of the conversion action such as product purchase is determined by capability of advertisers not that of media. In this regard, while there are issue of CPM and CPS models disadvantageously affecting only one side of Internet advertising business model value network, CPC model has been evaluated as reasonable both to advertisers and media, and occupied the largest segment of Internet advertising market. However, CPC model also can cause fraudulent behavior such as click fraud because of the competition or dishonest amount of advertising expenditure. On the user aspect, unintentionally accessed advertisements can lead to more inappropriate expenditure from advertisers. In this paper, we suggest "CPCD"(Cost Per Coupon Download) model. This goes beyond simple clicking of advertisements and advertising expenditure is exerted when users download a coupon from advertisers, which is a concept in between CPC and CPS models. To achieve the purpose, we describe the scenario of advertiser perspective, processes, participants and their benefits of CPCD model. Especially, we suggest the new value in online coupon; "possibility of storage" and "complement for delivery to the target group". We also analyze the working condition for advertiser by a comparison of CPC and CPCD models through advertising expenditure simulation. The result of simulation implies that the CPCD model suits more properly to advertisers with medium-low price products rather than that of high priced goods. This denotes that since most of advertisers in CPC model are dealing with medium-low priced products, the result is very interesting. At last, we contemplate applicability of CPCD model in ubiquitous environment.