• Title/Summary/Keyword: Call Center

Search Result 384, Processing Time 0.029 seconds

Contact Point Analysis for Wheel/Rail Contact Force Calculation (차륜/레일간의 접촉력 계산을 위한 접촉점 해석 알고리즘)

  • 박정훈;임진수;황요하;김창호
    • Journal of the Korean Society for Railway
    • /
    • v.2 no.3
    • /
    • pp.1-8
    • /
    • 1999
  • In this paper, descibed was the derived algorithm for calculating contact point between wheel and rail and the developed method for rail modeling. The proposed methods use travelling distance to represent rail center line position vector and rail orientation with respect to Newtonian reference frame. The methods call be easily used ill multibody dynamic analysis. Two numerical examples are shown to verify the validity of the proposed methods.

  • PDF

AN APPROXIMATION FOR THE QUEUE LENGTH DISTRIBUTION IN A MULTI-SERVER RETRIAL QUEUE

  • Kim, Jeongsim
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.29 no.1
    • /
    • pp.95-102
    • /
    • 2016
  • Multi-server queueing systems with retrials are widely used to model problems in a call center. We present an explicit formula for an approximation of the queue length distribution in a multi-server retrial queue, by using the Lerch transcendent. Accuracy of our approximation is shown in the numerical examples.

Design and Implementation of E-mail Response Management System for Call Center (콜센터를 위한 전자메일 자동응답 및 관리 시스템 설계 및 구현)

  • 김정재;권오식;이호동;노영균;박진영;박종철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04b
    • /
    • pp.445-447
    • /
    • 2001
  • 본 논문에서는 콜센터를 위하여 설계 및 구현된 전자메일 자동응답 및 관리 시스템 주에서 서버 시스템에 해당하는 뿐을 기술하였다. 본 연구에서는 도메인에 특성화된 표현 형식 개발을 개발하여 보다 효율적인 3단계 매칭방법을 가진 자동응답기, 학습에 기반한 도메인 비의존적인 자동분류기 및 적용방법의 재배열이 가능한 담당자 분배기를 구현하였다.

  • PDF

OLAP Implementation for Call center data analysis (콜센터 데이터 분석을 위한 OLAP 구현)

  • Baek, Kyung-Min;Yang, Woo-Sock;Lee, Won-Suk
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.275-278
    • /
    • 2010
  • 데이터가 기하급수적으로 생성되는 데이터스트림 환경에서 데이터를 처리하고 분석하는 방법에 대한 많은 연구가 진행 중에 있다. 본 논문에서는 데이터스트림의 한 예인 콜센터 데이터를 분석하기 위한 OLAP 구현에 대하여 기술한다. 제안하는 OLAP 시스템은 데이터스트림 환경에 적용할 수 있게 하여 유연한 분석을 가능하게 해준다.

  • PDF

A Study on the Development of Electronic Mail-based Customer Relationship Management System (전자메일 기반의 고객관계관리(CRM) 시스템 개발에 관한 연구)

  • 김승욱;양광민
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.4
    • /
    • pp.51-63
    • /
    • 2003
  • This study designs and implements a new approach to the classification of e-mail requests from customer based on machine learning techniques. The work on building an electronic mall classifier can be cast into the framework of text classification, since an e-mail is a viewed as a document, and judgement of interest is viewed as a class level given to the e-mail document. It is also implemented an e-mall based automated response system that integrate with Call Center in a practical use.

  • PDF

A Design of Call Center Service Using the VoIP (VoIP를 이용한 콜센터 서비스 제공 방안)

  • Kim, Jong-Il;Min, Jun-Sik;Lee, Hyeong-Ok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.616-618
    • /
    • 2005
  • 오늘날 초고속정보통신 환경 변화에 따라 다양한 차세대 신규 정보통신서비스가 제공되고 있다. 본 논문에서는 음성과 데이터를 통합한 VoIP를 이용한 서비스에 대해 해외의 망 구축 및 응용 사례를 조사 분석하였고, 그 결과를 이용하여 국내 공공기관의 VoIP 서비스를 이용한 콜센터 서비스 제공 방안을 제안하였다.

  • PDF

Breeding Status of the Black Woodpecker (Dryocopus martius) in Gayasan National Park (가야산국립공원 까막딱다구리의 번식 현황)

  • Kwon, Young Soo;Jeon, Se Kun;Seol, Jeong Wook;Kim, Im Gyu
    • Journal of Forest and Environmental Science
    • /
    • v.28 no.4
    • /
    • pp.289-294
    • /
    • 2012
  • This study was conducted from April 2012 to June 2012 to analyze breeding status of Black woodpeckers (Dryocopus martius) in the Gayasan National Park. Nest height, tree diameter which a nest built and altitude at the nest site of Black woodpeckers were 17.4 m, 63.8 cm and 587 m, respectively. A pair of Black woodpeckers completed a clutch in 4 eggs on 7 May and 3 of eggs hatched on 24 May 2012. Both female and male incubated eggs and never left eggs without one of parents. A male more contributed to build a nest than a female. Incubation duration was higher in a male than in a female. Nestlings made a begging call in a nest during the growing period. Begging frequency of nestlings increased from 11 days up to 20 days after hatching. After then, nestlings reduced begging and fledged a nest 24 days after hatching. This study provided information of breeding ecology to protect and manage population of Black woodpeckers which are endangered species in South Korea.

A Design and Implementation of CTI based Interactive CRM Utilizing Caller-ID (Caller-ID를 활용한 CTI기반의 인터액티브 CRM설계 및 구현)

  • Park, Chan-Il;Bae, Hyun-Jun;Moon, Seung-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.803-806
    • /
    • 2003
  • CTI(Computer and Telephony Integration) 기술이 1970년대 처음 선 보인 이래, 정보통신 기술의 눈부신 발전과 함께 그 인기가 날로 높아져 가고 있다. 정보기술(Information Technology)의 발전으로 향상된 컴퓨터의 기능을 활용한 다양한 서비스가 출현하면서 고객과 기업간의 상호 접촉이 증가되고 있다. 과거의 CTI기술은 Inbound 위주의 Voice and Call Communication 만을 위한 소극적인 개념이었으나, 현재의 대 다수의 기업들은 좀더 발전된 CTI 기술을 활용하고 있다. 최근 들어 기업간의 경쟁이 치열해지고 고객에 대한 우위를 높이기 위해 새로운 돌파구가 필요했다. 이에 대한 경영 솔루션으로, 인터넷 환경을 통합한 CITI(Computer and Internet Telephony Integration)와 eCRM 개념을 활용한 시스템의 사용으로 질 높은 서비스와 매출증대, 경비절감 등과 같은 경쟁력을 개선시킬 수 있었다. 본 논문은 CTI 기술과 CRM 개념을 활용한 시스템을 설계 구현하였다 이는, 전화의 호 전송, 호수신, 호 전달 등의 기능과 CTI 와 사설교환기(PBX)의 링크를 통합한 시스템이다. 제안된 시스템은 콜센터(Call Center)나 기타 고객의 접촉이 집중된 기업에 응용 되도록 설계되었다.

  • PDF

Android malicious code Classification using Deep Belief Network

  • Shiqi, Luo;Shengwei, Tian;Long, Yu;Jiong, Yu;Hua, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.454-475
    • /
    • 2018
  • This paper presents a novel Android malware classification model planned to classify and categorize Android malicious code at Drebin dataset. The amount of malicious mobile application targeting Android based smartphones has increased rapidly. In this paper, Restricted Boltzmann Machine and Deep Belief Network are used to classify malware into families of Android application. A texture-fingerprint based approach is proposed to extract or detect the feature of malware content. A malware has a unique "image texture" in feature spatial relations. The method uses information on texture image extracted from malicious or benign code, which are mapped to uncompressed gray-scale according to the texture image-based approach. By studying and extracting the implicit features of the API call from a large number of training samples, we get the original dynamic activity features sets. In order to improve the accuracy of classification algorithm on the features selection, on the basis of which, it combines the implicit features of the texture image and API call in malicious code, to train Restricted Boltzmann Machine and Back Propagation. In an evaluation with different malware and benign samples, the experimental results suggest that the usability of this method---using Deep Belief Network to classify Android malware by their texture images and API calls, it detects more than 94% of the malware with few false alarms. Which is higher than shallow machine learning algorithm clearly.

A Design and Implementation of the User Customized e-Ring(Enterprise Ring Back Tone) System (사용자 맞춤형 e-Ring(Enterprise Ring Back Tone) 시스템 설계 및 구현)

  • Kim, Jung-Sook;Yang, Myeong-Yeon;Kim, Hong-Sop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.37-45
    • /
    • 2007
  • In this paper, we proposed a new customized e-Ring(Enterprise Ring Back Tone) system which could be represented each user and organization feature. The e-Ring system provided the ring back tone and additional services to reduce the waiting time when the client called an organization. This system was for an appropriate organization public relations instead of the meaningless ring back tone which was used usual call, also was maximized the service availability and work efficiency which was obtained from the automatic response and service suppling to users who had needs and questions.

  • PDF