• Title/Summary/Keyword: 쇼핑 시스템

Search Result 673, Processing Time 0.026 seconds

A Mapping Table Caching Scheme for NAND Flash-based Mobile Storage Devices (NAND 플래시 기반 모바일 저장장치를 위한 사상 테이블 캐싱 기법)

  • Yang, Soo-Hyeon;Ryu, Yeon-Seung
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.21-31
    • /
    • 2010
  • Recently e-business such as online financial trade and online shopping using mobile computes are widely spread. Most of mobile computers use NAND flash memory-based storage devices for storing data. Flash memory storage devices use a software called flash translation layer to translate logical address from a file system to physical address of flash memory by using mapping tables. The legacy FTLs have a problem that they must maintain very large mapping tables in the RAM. In order to address this issues, in this paper, we proposed a new caching scheme of mapping tables. We showed through the trace-driven simulations that the proposed caching scheme reduces the space overhead dramatically but does not increase the time overhead. In the case of online transaction workload in e-business environment, in particular, the proposed scheme manifests better performance in reducing the space overhead.

Utilization of Mobile New Media based on Video Curation (동영상 큐레이션 기반 모바일 뉴미디어의 활용)

  • Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.51-56
    • /
    • 2020
  • In this paper, we developed a mobile new media solution that enables e-commerce shopping mall operators, band operators, and YouTube creators to create synergies in online and offline promotion by posting related video contents on the media in addition to their own videos. By providing videos in the field of the platform without directly searching for them, it is possible to provide users with a new type of marketing means that can promote their platform while providing interest and information. Prospective creators at home and abroad who produce video can upload their own video in addition to YouTube and afreeca TV, such as the open market for video, and use independent and free charging systems to manage independent customer relationship management(CRM), self-branding, and content management. It will be possible to utilize mobile-based new media equipped with a system.

Design The User Authentication Framework Using u-health System (u-health 시스템을 이용한 사용자 인증 프레임워크 설계)

  • Choo, Yeun-Su;Jin, Byung-Wook;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.219-226
    • /
    • 2015
  • OTP(One Time Password) is for user authentication of Internet banking and users should carry their security card or OTP generator to use OTP. If they lost their security card or OTP generator, there is at risk for OTP leak. This paper suggests a new User Authentication Framework using personal health information from diverse technology of u-Health. It will cover the problem of OTP loss and illegal reproduction A User Authentication Framework is worthy of use because it uses various combinations of user's physical condition which is inconstant. This protocol is also safe from leaking information due to encryption of reliable institutes. Users don't need to bring their OTP generator or card when they use bank, shopping mall, and game site where existing OTP is used.

Product Value Evaluation Models based on Itemset Association Chain (상품군 연관망 기반의 상품가치 평가모형)

  • Chang, Yong-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.1-17
    • /
    • 2010
  • Association rules among product items by association analysis suggest sales effect among products. These are useful for marketing strategies such as cross-selling and product display etc. However, if we evaluate more practical product values reflecting cross-selling effects, they will be also more useful for the decisions of companies such as product item selection for product assortment and profit maximization etc. This study proposes product value evaluation models with the concept of effective value based on single-item association chain and itemset association chain. In addition to that, we performed experiments with transaction data related to clothing of an online shopping mall in Korea to show the performances of our models. In result, we confirmed that some items increased in effective values compared with their pure values while the others decreased in effective values.

A mechanism for Converting BPMN model into Feature model based on syntax (구조 기반 BPMN 모델의 Feature 모델로 변환 기법)

  • Song, Chee-Yang;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.733-744
    • /
    • 2016
  • The legacy methods for converting a business model to a feature model make it difficult to support an automatic transformation due to a dependence on a domain analyzers' intuitions, which hinders the feature oriented development for the integration of feature modeling in business modeling. This paper proposes a method for converting a BPMN business model into a feature model based on syntax. To allow the conversion between the heterogeneous models from BPMN to the FM(Feature Model), it defines the grouping mechanism based activities' syntax, and then makes translation rules and a method based on the element (represent business function) and structure (relationships and process among elements), which are common constructs of their models. This method was applied to an online shopping mall system as a case study. With this mechanism, it will help develop a mechanical or automated structure transformation from the BPMN model to the FM.

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

Simultaneous Optimization Model of Case-Based Reasoning for Effective Customer Relationship Management (효과적인 고객관계관리를 위한 사례기반추론 동시 최적화 모형)

  • Ahn, Hyun-Chul;Kim, Kyoung-Jae;Han, In-Goo
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.175-195
    • /
    • 2005
  • 사례기반추론(case-based reasoning)은 사례간 유사도를 평가하여 유사한 이웃사례를 찾아내고, 이웃사례의 결과를 이용하여 새로운 사례에 대한 예측결과를 생성하는 전통적인 인공지능기법 중 하나다. 이러한 사례기반추론이 최근 적용이 쉽고 간단하다는 장점과 모형의 갱신이 실시간으로 이루어진다는 점 등으로 인해, 온라인 환경에서의 고객관계관리를 위한 도구로 학계와 실무에서 주목을 받고 있다 하지만, 전통적인 사례기반추론의 경우, 타 인공지능기법에 비해 정확도가 상대적으로 크게 떨어진다는 점이 종종 문제점으로 제기되어 왔다. 이에, 본 연구에서는 사례기반추론의 성과를 획기적으로 개선하기 위한 방법으로 유전자 알고리즘을 활용한 사례기반추론의 동시 최적화 모형을 제안하고자 한다. 본 연구가 제안하는 모형에서는 기존 연구에서 사례기반추론의 성과에 중대한 영향을 미치는 요소들로 제시된 바 있는 사례 특징변수의 상대적 가중치 선정(feature weighting)과 참조사례 선정(instance selection)을 유전자 알고리즘을 이용해 최적화함으로서, 사례간 유사도를 보다 정밀하게 도출하는 동시에 추론의 결과를 왜곡할 수 있는 오류사례의 영향을 최소화하고자 하였다. 제안모형의 유용성을 검증하기 위해, 본 연구에서는 국내 한 전문 인터넷 쇼핑몰의 구매예측모형 구축사례에 제안모형을 적용하여 그 성과를 살펴보았다. 그 결과, 제안모형이 지금까지 기존 연구에서 제안된 다른 사례기반추론 개선모형들은 물론, 로지스틱 회귀분석(LOGIT), 다중판별분석(MDA), 인공신경망(ANN), SVM 등 다른 인공지능 기법들에 비해서도 상대적으로 우수한 성과를 도출할 수 있음을 확인할 수 있었다.

  • PDF

Sensitive Personal Information Protection Model for RBAC System (역할기반 접근제어시스템에 적용가능한 민감한 개인정보 보호모델)

  • Mun, Hyung-Jin;Suh, Jung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2008
  • Due to the development of the e-commerce, the shopping mall such as auction collects and manages the personal information of the customers for efficient service. However, because of the leakage of the Personal information in auction, the image of the companies as well as the information subjects is damaged. Even though the organizations and the companies store the personal information as common sentences and protect using role based access control technique, the personal information can be leaked easily in case of getting the authority of the database administrator. And also the role based access control technique is not appropriate for protecting the sensitive information of the information subject. In this paper, we encrypted the sensitive information assigned by the information subject and then stored them into the database. We propose the personal policy based access control technique which controls the access to the information strictly according to the personal policy of the information subject. Through the proposed method we complemented the problems that the role based access control has and also we constructed the database safe from the database administrator. Finally, we get the control authority about the information of the information subject.

  • PDF

Learning T.P.O Inference Model of Fashion Outfit Using LDAM Loss in Class Imbalance (LDAM 손실 함수를 활용한 클래스 불균형 상황에서의 옷차림 T.P.O 추론 모델 학습)

  • Park, Jonghyuk
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.17-25
    • /
    • 2021
  • When a person wears clothing, it is important to configure an outfit appropriate to the intended occasion. Therefore, T.P.O(Time, Place, Occasion) of the outfit is considered in various fashion recommendation systems based on artificial intelligence. However, there are few studies that directly infer the T.P.O from outfit images, as the nature of the problem causes multi-label and class imbalance problems, which makes model training challenging. Therefore, in this study, we propose a model that can infer the T.P.O of outfit images by employing a label-distribution-aware margin(LDAM) loss function. Datasets for the model training and evaluation were collected from fashion shopping malls. As a result of measuring performance, it was confirmed that the proposed model showed balanced performance in all T.P.O classes compared to baselines.

Design of visitor counting system using edge computing method

  • Kim, Jung-Jun;Kim, Min-Gyu;Kim, Ju-Hyun;Lee, Man-Gi;Kim, Da-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.75-82
    • /
    • 2022
  • There are various exhibition halls, shopping malls, theme parks around us and analysis of interest in exhibits or contents is mainly done through questionnaires. These questionnaires are mainly depend on the subjective memory of the person being investigated, resulting in incorrect statistical results. Therefore, it is possible to identify an exhibition space with low interest by tracking the movement and counting the number of visitors. Based on this, it can be used as quantitative data for exhibits that need replacement. In this paper, we use deep learning-based artificial intelligence algorithms to recognize visitors, assign IDs to the recognized visitors, and continuously track them to identify the movement path. When visitors pass the counting line, the system is designed to count the number and transmit data to the server for integrated management.