• Title/Summary/Keyword: 추천자 시스템

Search Result 253, Processing Time 0.021 seconds

Extension Method of Association Rules Using Social Network Analysis (사회연결망 분석을 활용한 연관규칙 확장기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.111-126
    • /
    • 2017
  • Recommender systems based on association rule mining significantly contribute to seller's sales by reducing consumers' time to search for products that they want. Recommendations based on the frequency of transactions such as orders can effectively screen out the products that are statistically marketable among multiple products. A product with a high possibility of sales, however, can be omitted from the recommendation if it records insufficient number of transactions at the beginning of the sale. Products missing from the associated recommendations may lose the chance of exposure to consumers, which leads to a decline in the number of transactions. In turn, diminished transactions may create a vicious circle of lost opportunity to be recommended. Thus, initial sales are likely to remain stagnant for a certain period of time. Products that are susceptible to fashion or seasonality, such as clothing, may be greatly affected. This study was aimed at expanding association rules to include into the list of recommendations those products whose initial trading frequency of transactions is low despite the possibility of high sales. The particular purpose is to predict the strength of the direct connection of two unconnected items through the properties of the paths located between them. An association between two items revealed in transactions can be interpreted as the interaction between them, which can be expressed as a link in a social network whose nodes are items. The first step calculates the centralities of the nodes in the middle of the paths that indirectly connect the two nodes without direct connection. The next step identifies the number of the paths and the shortest among them. These extracts are used as independent variables in the regression analysis to predict future connection strength between the nodes. The strength of the connection between the two nodes of the model, which is defined by the number of nodes between the two nodes, is measured after a certain period of time. The regression analysis results confirm that the number of paths between the two products, the distance of the shortest path, and the number of neighboring items connected to the products are significantly related to their potential strength. This study used actual order transaction data collected for three months from February to April in 2016 from an online commerce company. To reduce the complexity of analytics as the scale of the network grows, the analysis was performed only on miscellaneous goods. Two consecutively purchased items were chosen from each customer's transactions to obtain a pair of antecedent and consequent, which secures a link needed for constituting a social network. The direction of the link was determined in the order in which the goods were purchased. Except for the last ten days of the data collection period, the social network of associated items was built for the extraction of independent variables. The model predicts the number of links to be connected in the next ten days from the explanatory variables. Of the 5,711 previously unconnected links, 611 were newly connected for the last ten days. Through experiments, the proposed model demonstrated excellent predictions. Of the 571 links that the proposed model predicts, 269 were confirmed to have been connected. This is 4.4 times more than the average of 61, which can be found without any prediction model. This study is expected to be useful regarding industries whose new products launch quickly with short life cycles, since their exposure time is critical. Also, it can be used to detect diseases that are rarely found in the early stages of medical treatment because of the low incidence of outbreaks. Since the complexity of the social networking analysis is sensitive to the number of nodes and links that make up the network, this study was conducted in a particular category of miscellaneous goods. Future research should consider that this condition may limit the opportunity to detect unexpected associations between products belonging to different categories of classification.

A Method for Evaluating Online News Value and Personalization (온라인 뉴스 가치 평가 및 개인화 기법)

  • Choi, Kwang Sun;Kim, Soo Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8195-8209
    • /
    • 2015
  • The purpose of this paper is to propose a method for recommendation and personalization of important news articles based on evaluating news value. Evaluation of news is the approach by which editors select news articles for cover-story in traditional offline news papers area. For this, my study proposes a suite of methods to select and personalize a set of news based on evaluating news articles, not just on the personal preference for them. The aforementioned the value of news articles including social impact, novelty, relevance to each audience, and human interest, all of which have been factorized in many previous studies, is a main concept for a procedural and structural application methodology deduced in this study. After a comparative case study with other online news services, it was shown that my research provides more effective way to select important news articles in terms of user satisfaction than others.

A Study On Customized Products and Services in Smart Environments (스마트환경에 따른 고객 맞춤 제품 및 서비스에 관한 연구)

  • Chang, Seog-Ju
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.1
    • /
    • pp.167-174
    • /
    • 2015
  • This study examines the Personalized Oriented Customized and services in smart environments. In addition to The structure of industry is currently smart environment shifting from the manufacturing industry focusing on goods production to service industry merging and combining service and marketing. The companies are placing a higher value on the customer needs to gain a competitive edge with creation of new business model. The key dilemma in mass customization and service, though, is how product customization can be realized without increasing production cost significantly. The purpose of this study is to explore new product development strategies that facilitate mass customization and service. Specifically, we propose Crowdsourcing marketing, Digital experience technology, Recommender Systems, 3D printing technology, Flexible manufacturing systems and UX based PSS(Product-Service Systems) in new product development processes as enabling strategies for mass customization and service in smart environments.

  • PDF

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

An Empirical Study on the Influence of Weather and Daytime on Restaurant Menu search System (날씨 및 요일 특성이 음식점 메뉴 검색시스템 이용에 미치는 영향에 관한 실증 연구)

  • Cho, Chan-Yeol;Jung, Ku-Imm;Seo, Yang-Min;Choi, Hae-Lim
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.50-56
    • /
    • 2017
  • Due to new social environment, expenditure on eating out has increased over the last few year, thereafter the food-tech industries have steadily grown as well. We have studied what variable would affect customer's choices when they plan to eat out or order in. There are two variables are taken into account to prove it. Firstly, it is climate changes, such as an amount of rainfall, snowfall and clouds. Secondly, it is days, such as seasons and holidays. Based on this, we looked up the SikSin user's behaviors patterns, then did analysis of the daily data provided by the Meteorological office. By the end of the study, it turned out that two variables, climate changes and days, both have a strong influence on customer's choices. It is considered that this research outcome will make contributions to small businesses founders who want to take the initiative, marketing managers and people who are engaged in the food-tech industry.

A Case Study of Flipped Learning Application of Public Vocational Education and Training on the 4th Industry Occupation (4차산업직종 공공직업교육훈련에서의 플립러닝 적용사례 연구)

  • Wee, Young-eun;Jung, Hyojung;Lee, Hyun
    • Journal of Practical Engineering Education
    • /
    • v.10 no.2
    • /
    • pp.103-111
    • /
    • 2018
  • The purpose of this study is to suggest change probability of vocational education and training and support of teaching-learning methods. For this study, we applied a flipped learning strategy of two learning modules in Convergence Technology Campus of public vocational education and training institute and had an operation class. As a result, student satisfaction of flipped learning is 4.0 on average. 56.1% of education-trainees were higher an engagement of flipped learning class than teacher-centered class and 56.1% of education-trainees were used more learning energy. Based on results, we suggested the necessity of pre-learning system for application of education and training teaching methods on the 4th industry occupation and strategies to enhance teaching and learning competency.

Preference Prediction System using Similarity Weight granted Bayesian estimated value and Associative User Clustering (베이지안 추정치가 부여된 유사도 가중치와 연관 사용자 군집을 이용한 선호도 예측 시스템)

  • 정경용;최성용;임기욱;이정현
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.3_4
    • /
    • pp.316-325
    • /
    • 2003
  • A user preference prediction method using an exiting collaborative filtering technique has used the nearest-neighborhood method based on the user preference about items and has sought the user's similarity from the Pearson correlation coefficient. Therefore, it does not reflect any contents about items and also solve the problem of the sparsity. This study suggests the preference prediction system using the similarity weight granted Bayesian estimated value and the associative user clustering to complement problems of an exiting collaborative preference prediction method. This method suggested in this paper groups the user according to the Genre by using Association Rule Hypergraph Partitioning Algorithm and the new user is classified into one of these Genres by Naive Bayes classifier to slove the problem of sparsity in the collaborative filtering system. Besides, for get the similarity between users belonged to the classified genre and new users, this study allows the different estimated value to item which user vote through Naive Bayes learning. If the preference with estimated value is applied to the exiting Pearson correlation coefficient, it is able to promote the precision of the prediction by reducing the error of the prediction because of missing value. To estimate the performance of suggested method, the suggested method is compared with existing collaborative filtering techniques. As a result, the proposed method is efficient for improving the accuracy of prediction through solving problems of existing collaborative filtering techniques.

EFFECT OF A DESENSITIZER ON DENTINAL BOND STRENGTH IN CEMENTATION OF COMPOSITE RESIN INLAY (레진 인레이 합착시 지각과민처리제의 사용이 상아질 결합강도에 미치는 영향)

  • Han, Sae-Hee;Cho, Young-Gon
    • Restorative Dentistry and Endodontics
    • /
    • v.34 no.3
    • /
    • pp.223-231
    • /
    • 2009
  • The purpose of this study was to evaluate the effect of a desensitizer on dentinal bond strength in cementation of composite resin inlay. Fifty four molar teeth were exposed the occlusal dentin. Class I inlay cavities were prepared and randomly divided into six groups. Control group: no agent, Group 1 : Isodan, Group 2 : One-step, Group 3 : All-Bond SE, Group 4 : Isodan + One-step, Group 5 : Isodan + All-Bond SE. Desensitizing agent and dentin bonding agents were applied immediately after the completion of the preparations. Impressions were then made. The composite resin inlays (Tescera, Bisco) were fabricated according to the manufacturers' guidelines. Cementation procedures followed a standard protocol by using resin cement (Bis-Cem, Bisco). Specimens were stored in distilled water at $37^{\circ}C$ for 24 hours. All specimens were sectioned to obtained sticks with $1.0{\times}1.0\;mm^2$ cross sectional area. The microtensile bond strength (${\mu}TBS$) was tested at crosshead speed of 1 mm/min. The data was analyzed using one way ANOVA and Tukey's test. Scanning electron microscopy analysis was made to examine the details of the bonding interface, 1. Group 1 showed significantly lower ${\mu}TBS$ than other groups (p<0.05). 2. There was no significant difference between the ${\mu}TBS$ of Group 3 and Group 5. 3. The ${\mu}TBS$ of Group 4 showed significantly lower than that of Group 2 (p<0.05). In conclusion, a desensitizer (Isodan) might have an adverse effect on the bond strength of composite resin inlay to dentin.

The Relationships among Perceived Value, Use-Diffusion, Loyalty of Mobile Instant Messaging Service (모바일 메신저 서비스의 지각된 가치, 사용-확산 그리고 충성도 간의 관계에 대한 연구)

  • Jo, Dong-Hyuk;Park, Jong-Woo;Chun, Hyun-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.193-212
    • /
    • 2011
  • Mobile instant messaging service is surfacing to an important keyword in the mobile market together with popularization of Smart phones. Mobile instant messaging service in Korea has become popular to the degree of 87.9% usages from total Smartphone holders, and it is expected that using populations will be more enlarged afterwards if considering a fact that its populations of Smartphone is continuously being increased after exceeding 10 million persons (Trend Monitor, June 2011). In the instant messaging market where competitions have been deepened day by day, raising customer's royalties will be the key for company's business survivals and goals of corporate marketing strategies. It could be said that understanding on which factors affect to customer retentions and royalties is very important. Specially, as changing status is being progressed very quickly in case of innovative mobile services like the instant messaging service, research necessities on how many do consumers use the services after accepting them, how much do consumers use them variously, and whether does it connect to long-term relations have been increased, but studies on such matters are in insufficient situations actually. Therefore, this study examined on which effects were affected to use-diffusion and loyalty factors from perceived customer vales' factors having been occurred after accepting the mobile instant messaging service, namely 'functional value', 'monetary value', 'emotional value', and 'social value'. Also, the study looked into what kind of roles do the service usage and using variety play to service's continued using intents as a loyalty index, recommending intents to others, and brand switching intents. And then the study laid the main purpose in trying to provide implications for enhancing customer securities and royalties on the mobile instant messaging service through research's results. The research hypotheses are as follows; H1: Perceived values will affect influences to royalties. H2: Use-Diffusion will affect influences to loyalty. H3: Perceived value will affect influences to loyalty. H4: The use-diffusion will play intermediating roles between perceived values and loyalty. Total 276 cases among collected 284 ones were used for the statistical analysis by SPSS ver. 15 package. Reliability, Factor analysis, regression were done. As the result of research, 'monetary value' and 'emotional value' affected to 'usage' among perceived value factors, and 'emotional value' was appeared as affecting the largest influence. Besides, the usage affected to constant-using intents and recommending intents to others, and using varieties were displayed as affecting to recommending intents to others. On the other hand, 'Using' and 'Using diversity' were appeared as not affecting to 'brand switching intentions'. Meanwhile, as the result of recognizing about effects of perceived values on the loyalty, it was appeared such like 'continued using intents' affected to'functional value', 'monetary value', and 'social value' first, and also 'monetary value', 'emotional value', and 'social value' affected to 'recommending intents to others'. On the other hand, it was shown such like only 'social value' affected influences to 'brand switching intents', and thus contrary results with the factor 'constant-using intents' were displayed. So, it seems that there are many applications to service provides who are worrying about marketing strategies for making consumer retains (constant-using) and new consumer's inductions (brand-switching intents). Finally, as a result of looking into intermediating roles of the use-diffusion factor in relations between conceived values and royalties at hypothesis 4, 'using' and 'using diversity' were displayed as affecting significant influences all together. Regarding to research result's implications, for expanding and promoting continued uses of the mobile instant messaging service by service providers: First, encouraging recognitions on the perceived value connected to users' service usage are necessary. Second, setting up user's use-diffusion strategies are required so as to enhance the loyalty after understanding a fact that use-diffusion patterns affecting to the service's loyalty are different. Finally, methods of raising customer loyalties and making constant relationships have to be grouped by analyzing on what are the customer value's factors that can satisfy users in competitive alterations.

Extraction of Author Identification Elements of Overseas Academic Papers on Authority Data System for Science and Technology (과학기술 전거데이터 시스템에서의 해외 학술논문 저자 식별요소 추출)

  • Choi, Hyunmi;Lee, Seokhyoung;Kim, Kwangyoung;Kim, Hwanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.711-713
    • /
    • 2013
  • Various human resource information of the world can be found according to spread of social network such as facebook and twitter. There are an amounts of researcher information on the science and technology area but it is difficult to find a suitable researcher for research or business such as research partner, because researcher information is not systematically arranged. To solver this problem, we are constructing authority data system for science and technology based on authority information of overseas academic papers. In this paper, in order to construct the authority data, we extracts author identification elements from millions of overseas academic papers, which are published from 1994 to 2012. There are more than 50 author identification elements such as author name, affiliation, paper title, publisher, year, keywords, co-author, co-author's affiliation in Korean, English, Chinese, and Japanese. We construct the element database by extracting and storing an author identification information based on the elements from overseas academic papers. Future works includes that the authority database for overseas academic papers is constructed by storing an academic activities of researchers after author clustering with these extracted elements. The authority data is used to improve the researcher information utilization and activate community to find a suitable research partner or a business examiner.

  • PDF