• Title/Summary/Keyword: 인지도 관리기법

Search Result 169, Processing Time 0.03 seconds

Analysis of the Impact Relationship for Risk Factors on Big Data Projects Using SNA (SNA를 활용한 빅데이터 프로젝트의 위험요인 영향 관계 분석)

  • Park, Dae-Gwi;Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.79-86
    • /
    • 2021
  • In order to increase the probability of success in big data projects, quantified techniques are required to analyze the root cause of risks from complex causes and establish optimal countermeasures. To this end, this study measures risk factors and relationships through SNA analysis and presents a way to respond to risks based on them. In other words, it derives a dependency network matrix by utilizing the results of correlation analysis between risk groups in the big data projects presented in the preliminary study and performs SNA analysis. In order to derive the dependency network matrix, partial correlation is obtained from the correlation between the risk nodes, and activity dependencies are derived by node by calculating the correlation influence and correlation dependency, thereby producing the causal relationship between the risk nodes and the degree of influence between all nodes in correlation. Recognizing the root cause of risks from networks between risk factors derived through SNA between risk factors enables more optimized and efficient risk management. This study is the first to apply SNA analysis techniques in relation to risk management response, and the results of this study are significant in that it not only optimizes the sequence of risk management for major risks in relation to risk management in IT projects but also presents a new risk analysis technique for risk control.

Development of an Automated Pavement Crack Sealing Machine and Its Economic Feasibility Analysis (크랙실링 자동화 장비의 개발 린 경제적 타당성 분석)

  • Lee, Jeong-Ho;Lee, Jun-Bok;Jeong, Hyung-Hoon;Kim, Young-Suk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.6
    • /
    • pp.151-164
    • /
    • 2006
  • Numerous efforts are currently underway to automate pavementcrack and joint sealing activities. Productivity improvements, improved safety and quality, and reduced road user costs motivate these developments. Recently, an automated pavement crack sealing machine has been developed to automate the process of sealing pavement cracks and joints in Korea. This paper mainly describes the results of the economic feasibility analysis revealed through its overall performance evaluation and field tests. Finally, it is concluded that the automated machine exceeds the performance in terms of productivity, safety, and quality required in conventional method, thus making the machine economically feasible.

An Analysis of Related Movie Information Using The Co-Word Method (동시출현단어분석을 이용한 연관영화정보 분석 연구)

  • Choi, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.31 no.4
    • /
    • pp.161-178
    • /
    • 2014
  • Recently, many information services allow users to collaborate to produce and use information. Sharing information is also important for users who have similar taste or interest. As various channels are available for users to share their experiences and knowledge, users' data have also been accumulated within the information services. This study collected movie lists made by users of IMDB service. Co-word analysis and ego-centered network analysis were adapted to discover relevant information for users who chose a specific movie. Three factors of movies including movie title, director and genre were used to present related movie information. Movie title is an effective feature to present related movies with various aspects such as theme or characters and the popularity of directors affects on identifying related directors. Genre is not useful to find related movies due to the complexity in the topic of a movie.

Product Image Concentration System as a Design Strategy to Build Corporate Brand Image (기업 브랜드 이미지 구축을 위한 디자인 전략으로서의 제품 이미지 집중 체계)

  • Kim, Hyun
    • Archives of design research
    • /
    • v.16 no.2
    • /
    • pp.375-384
    • /
    • 2003
  • This study is on the strategy for establishing successful corporate brand image, by understanding the need for increasing brand value based on the level of brand recognition. In order to carry this out, the PICS (Product Image Concentration System) is suggested, which includes Brand Image Analysis on a high-level, Product Image Programming based on the result of the image analysis, and Product Image Coherency Assessment and Management, resulting in setting up a guideline for gaining competitive advantage and brand management. Brand Image Analysis is a method that utilizes image association to understand brand disposition by analyzing the association pattern among available visual materials to measure the corporate and brand image inclinations. As the next step, Product Image Programming establishes design philosophy and principles based on the analysis of brand image, and the Visual Programming is a process for visualizing the intended product image direction. Lastly, Product Image Coherency Assessment examines whether to incorporate design philosophy and principles or not to arrive at an agreed evaluation criteria for developing designs coherent with the brand image. The PICS (Product Image Concentration System) is a practical method for increasing a company' competitive advantage and managing brand. The expectation on this system is to provide a guideline for applying brand image in design process more objectively. For further study, diversification of image spectrum based on expressive keywords and comparative analysis on images as well as a product image interpretation program to understand the order of visual materials will be necessary.

  • PDF

A Study on the Improvement of User Management for Decrease of Vandalism in Tourism Destinations (관광지의 훼손행위 감소를 위한 이용자 관리)

  • Kang, Eun-Jee;Kim, Yong-Geun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.38 no.3
    • /
    • pp.53-61
    • /
    • 2010
  • The purpose of this paper is to devise a user management plan for tourism destinations in parts of park and open green spaces to prevent resource damage through depreciative behavior by tourists. Also, the possibility of the introduction of user management has been considered in order to complement this in these kinds of park and open green spaces. As explained in prior results, tourists have had the opportunity of taking part in many experiences which furnish cultural and historical information, but have never had experiences which furnish information in utilization and management such as prohibited behavior at tourism destinations, responsibility for damage, etc. The furnishing of information on utilization and management plays an important role in understanding responsibility in resource damage. For example, groups who have been given information on utilization and management appear to be much more responsible toward resources and environmental damage. For this reason, this must be a very important element for preventing damaging behavior at tourism destinations. Tourists can be made to understand that tourism destinations can be very seriously damaged by users. In order to control these damaging behaviors which occur from other users and to meet the needs of the tourism destinations being visited, it is necessary to establish a user management plan.

An Image Processing Algorithm for Detection and Tracking of Aerial Vehicles in Short-Range (무인항공기의 근거리 비행체 탐지 및 추적을 위한 영상처리 알고리듬)

  • Cho, Sung-Wook;Huh, Sung-Sik;Shim, Hyun-Chul;Choi, Hyoung-Sik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.12
    • /
    • pp.1115-1123
    • /
    • 2011
  • This paper proposes an image processing algorithms for detection and tracking of aerial vehicles in short-range. Proposed algorithm detects moving objects by using image homography calculated from consecutive video frames and determines whether the detected objects are approaching aerial vehicles by the Probabilistic Multi-Hypothesis Tracking method(PMHT). This algorithm can perform better than simple color-based detection methods since it can detect moving objects under complex background such as the ground seen during low altitude flight and consider the characteristics of vehicle dynamics. Furthermore, it is effective for the flight test due to the reduction of thresholding sensitivity against external factors. The performance of proposed algorithm is verified by applying to the onboard video obtained by flight test.

Using Plan Recognition and a Discourse Stack for Effective Response Generation in a Dialogue System (대화 시스템을 위한 계획 인식과 담화 스택을 이용한 효과적인 응답 생성)

  • Kang, Sang-Woo;Ko, Young-Joong;Seo, Jung-Yun
    • Korean Journal of Cognitive Science
    • /
    • v.19 no.2
    • /
    • pp.107-123
    • /
    • 2008
  • The existing studies of a dialogue system can be classified into two major parts. One is a study for a practical system, and the other is a study to understand a principal of dialogue phenomena. The former focuses on robustness in real environment for dialogue systems. However, it cannot guarantee its performance in complicated dialogue environment. The latter has studied as the plan-based model typically. It has strong points that it can reflect complex dialogue phenomena and can infer user's intention in various situations. However, an initial design of this model is so complicated, and it is difficult for this model to be extended to the interaction model for response generation in a practical dialogue system. This paper proposes a new dialogue modeling using plan recognition and a discourse stark to effectively generate response in a practical dialogue system.

  • PDF

Cognitive Approach to Anti-Phishing and Anti-Pharming: Survey (피싱/파밍 예방을 위한 인지기반 접근 방법)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.33-39
    • /
    • 2013
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser. However, they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS Pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or Pharming is presented by using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or Pharming. Therefore, proposed method effective cognitive approach against phishing and Pharming attacks.

  • PDF

Optimized Spectrum Pooling by Inventory Model (인벤토리모델을 이용한 스펙트럼풀링 최적화)

  • Byun, Sang-Seon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2664-2669
    • /
    • 2014
  • Recently, many research efforts have paid attention to spectrum pooling meshanism that provides efficient way to manage transient spectrum requests of secondary users in cognitive radio networks. Spectrum pooling is maintained by WSP (wireless service provider). WSP leases the spectrums stored in her spectrum pool to secondary users with being paid for it. It is natural that WSP tries to get profits as much as possible, which implies the WSP tries to minimize the cost required for maintaining her spectrum pool. In this paper, we model the spectrum pool into a probabilistic inventory model. Assuming secondary users' spectrum requests follow normal distribution, we give a strategic way that minimizes the maintenance cost of the spectrum pool. By a series of simulations, we show that WSP can reduce the total maintenance cost through our inventory model-based spectrum pooling than maintaining fixed inventory level.

An Inventory Model-based Spectrum Pooling in Cognitive Radio Networks (인벤토리모델을 이용한 인지무선네트워크에서 스펙트럼풀링)

  • Byun, Sang-Seon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.338-341
    • /
    • 2014
  • Recently, many research efforts have paid attention to spectrum pooling meshanism that provides efficient way to manage transient spectrum requests of secondary users in cognitive radio networks. Spectrum pooling is maintained by WSP (wireless service provider). WSP leases the spectrums stored in her spectrum pool to secondary users with being paid for it. It is natural that WSP tries to get profits as much as possible, which implies the WSP tries to minimize the cost required for maintaining her spectrum pool. In this paper, we model the spectrum pool into a probabilistic inventory model. Assuming secondary users' spectrum requests follow normal distribution, we give a strategic way that minimizes the maintenance cost of the spectrum pool. By a series of simulations, we show that WSP can reduce the total maintenance cost through our inventory model-based spectrum pooling than maintaining fixed inventory level.

  • PDF