• Title/Summary/Keyword: Decision System

Search Result 6,597, Processing Time 0.035 seconds

Study on the Establishment of Barley Cultivation System using the Power Tiller (동력경운기를 중심으로한 맥류재배의 기계화 -관작업체계 확립에 관한 연구)

  • 이영렬;최규홍
    • Journal of Biosystems Engineering
    • /
    • v.3 no.2
    • /
    • pp.22-33
    • /
    • 1978
  • To maintain the self-sufficiency of food production , it is required to improved the productivity and increase the effective utilization of land in the double cropping areas using improved cultivation technology. The following reasons encourage this cours of action because the overlapping rice harvest and barely seeding seasons complete for labour, the lower price of barley makes it financially less attractive to grow and these two facts together are responsible for a decrease in barley being planted in certain more seasonably marginal double cropping areas. Fro these reasons, it is desirable to carry out tests to improve the current cultivation techniques . In this interest , the following studies were carried out in the experimental field located at Banweol-myeon, Whasung-jkun, Gyeonggi-do from October 1977 to July 1978 in order to establish the mechanical method of barley cultivation using the power tiller. The summarized results are as follows. 1. The work performance in the seeding operation using the rotary barley seeder was 68 minutes per 10 ares which compares favourably with 408 min/10a using the conventional method. This is only one sixth of the time required by th conventional method. The operating costs using the rotary barley seeder was 1, 463 won per 10 areas as against 3, 486 Won per 10 ares for the conventional method, showing a saving of about 50% in comparison with the conventional method. 2. In the manure spreading operation, the work performance was 25 min/10a for the manure spreading machine , compared to 1089 min/10a for the manual operations. This is about one fourth of the time required by the conventional method, The operating costs were 810 Won/10a for the machine and 857 Won/10a for the manual labour. This cost shows little advantage by the machine over the manual labor costs. The conventional method of manure spreading will continue pending decision which will develope and improve the machine.3. Work performance in the rolling operation using the barley rolIer was 30 min/lOa which compares favourably with 135 min/10a using conventional method. This was one fourth of the time required by the conventional method. The operating costs were 514 Won/103. for the machine and 1, 003 Won/lOa for manual labour. In the weed control operation, the work performance and operating costs were 45min/lOa, 1, 399won/10a for the herbcide application using the power sprayer, 1, 149min/10a 8, 541won/lOa for the conventional method respectively. This is 26 times higher efficiency in comparison to the conventional method. 4. In the harvesting operation using the reaper binder and tiller attachment, the work performance was 60min/lOa and represents a cost of 2, 039won/10a. The con\ulcornerventional method took 640min/10a at a cost of 4, 757won/lOa. The reaper binder showns a saving of one tenth over the conventional method. The automatic thresher is already recommended for the current situations, and is now being used. 5. From a comparison of the results of the above trials, the serial cultivation system using the attachment for the power tiller such as the rotary barley seeder is now to be recommended for the current barley cultivation system. It is also recommend from these results that the mechanized technology now available must be used to improve and maintain the increase in barley production. It is seen th1t this is the only course now avaihble to solve the peak seasonal requirements of labour needed for l11rvesting and seeding between rice and barley cultivation.

  • PDF

New horizon of geographical method (인문지리학 방법론의 새로운 지평)

  • ;Choi, Byung-Doo
    • Journal of the Korean Geographical Society
    • /
    • v.38
    • /
    • pp.15-36
    • /
    • 1988
  • In this paper, I consider the development of methods in contemporary human geography in terms of a dialectical relation of action and structure, and try to draw a new horizon of method toward which geographical research and spatial theory would develop. The positivist geography which was dominent during 1960s has been faced both with serious internal reflections and strong external criticisms in the 1970s. The internal reflections that pointed out its ignorance of spatial behavior of decision-makers and its simplication of complex spatial relations have developed behavioural geography and systems-theoretical approach. Yet this kinds of alternatives have still standed on the positivist, geography, even though they have seemed to be more real and complicate than the previous one, The external criticisms that have argued against the positivist method as phenomenalism and instrumentalism suggest some alternatives: humanistic geography which emphasizes intention and action of human subject and meaning-understanding, and structuralist geography which stresses on social structure as a totality which would produce spatial phenomena, and a theoretical formulation. Human geography today can be characterized by a strain and conflict between these methods, and hence rezuires a synthetic integration between them. Philosophy and social theory in general are in the same in which theories of action and structural analysis have been complementary or conflict with each other. Human geography has fallen into a further problematic with the introduction of a method based on so-called political ecnomy. This method has been suggested not merely as analternative to the positivist geography, but also as a theoretical foundation for critical analysis of space. The political economy of space with has analyzed the capitalist space and tried to theorize its transformation may be seen either as following humanistic(or Hegelian) Marxism, such as represented in Lefebvre's work, or as following structuralist Marxism, such as developed in Castelles's or Harvey's work. The spatial theory following humanistic Marxism has argued for a dialectic relation between 'the spatial' and 'the social', and given more attention to practicing human agents than to explaining social structures. on the contray, that based on structuralist Marxism has argued for social structures producing spatial phenomena, and focused on theorising the totality of structures, Even though these two perspectives tend more recently to be convergent in a way that structuralist-Marxist. geographers relate the domain of economic and political structures with that of action in their studies of urban culture and experience under capitalism, the political ecnomy of space needs an integrated method with which one can overcome difficulties of orthhodox Marxism. Some novel works in philosophy and social theory have been developed since the end of 1970s which have oriented towards an integrated method relating a series of concepts of action and structure, and reconstructing historical materialism. They include Giddens's theory of structuration, foucault's geneological analysis of power-knowledge, and Habermas's theory of communicative action. Ther are, of course, some fundamental differences between these works. Giddens develops a theory which relates explicitly the domain of action and that of structure in terms of what he calls the 'duality of structure', and wants to bring time-space relations into the core of social theory. Foucault writes a history in which strategically intentional but nonsubjective power relations have emerged and operated by virtue of multiple forms of constrainst wihthin specific spaces, while refusing to elaborate any theory which would underlie a political rationalization. Habermas analyzes how the Western rationalization of ecnomic and political systems has colonized the lifeworld in which we communicate each other, and wants to formulate a new normative foundation for critical theory of society which highlights communicatie reason (without any consideration of spatial concepts). On the basis of the above consideration, this paper draws a new norizon of method in human geography and spatial theory, some essential ideas of which can be summarized as follows: (1) the concept of space especially in terms of its relation to sociery. Space is not an ontological entity whch is independent of society and has its own laws of constitution and transformation, but it can be produced and reproduced only by virtue of its relation to society. Yet space is not merlely a material product of society, but also a place and medium in and through which socety can be maintained or transformed.(2) the constitution of space in terms of the relation between action and structure. Spatial actors who are always knowledgeable under conditions of socio-spatial structure produce and reproduce their context of action, that is, structure; and spatial structures as results of human action enable as well as constrain it. Spatial actions can be distinguished between instrumental-strategicaction oriented to success and communicative action oriented to understanding, which (re)produce respectively two different spheres of spatial structure in different ways: the material structure of economic and political systems-space in an unknowledged and unitended way, and the symbolic structure of social and cultural life-space in an acknowledged and intended way. (3) the capitalist space in terms of its rationalization. The ideal development of space would balance the rationalizations of system space and life-space in a way that system space providers material conditions for the maintainance of the life-space, and the life-space for its further development. But the development of capitalist space in reality is paradoxical and hence crisis-ridden. The economic and poltical system-space, propelled with the steering media like money, and power, has outstriped the significance of communicative action, and colonized the life-space. That is, we no longer live in a space mediated communicative action, but one created for and by money and power. But no matter how seriously our everyday life-space has been monetalrized and bureaucratised, here lies nevertheless the practical potential which would rehabilitate the meaning of space, the meaning of our life on the Earth.

  • PDF

The Development of Evaluation Chart for the Applicability of CO2 Flooding in Oil Reservoirs and Its Applications (생산유전의 CO2 공법 적용성 평가를 위한 평가차트 개발 및 응용)

  • Kwon, Sunil;Cho, Hyunjin;Ha, Sehun;Lee, Wonkyu;Yang, Sungoh;Sung, Wonmo
    • Korean Chemical Engineering Research
    • /
    • v.45 no.6
    • /
    • pp.638-647
    • /
    • 2007
  • In this study, we present the evaluation chart for assessing the applicability of $CO_2$ flooding method to oil reservoirs. The evaluation chart consists of four categories as source availability, miscibility, applicability and injecting method of miscible flooding. The applicability of reservoir and oil in the chart has basic items of the properties such as oil gravity, viscosity, oil saturation, reservoir temperature and permeability, and these are quantitatively graded. Meanwhile, for additional items of $CO_2$ purity, reservoir thickness and formation dip, they are graded as "highmediumlow". In the case of evaluating the injection method of either continuous injection or WAG ($CO_2$), the qualitative decision will be made according to formation dip, vertical permeability, reservoir thickness, etc. The recommended score in the chart was assigned by utilizing 51 oil producing fields which $CO_2$ flooding is successfully being applied. The evaluation chart developed in this work has been applied to the Captain oil producing field located in Scotland as well as to the Onado oil field of Venezuela, which Korean oil companies have participated in. For the Captain field, the reservoir quality in terms of permeability and porosity is considered to be very excellent to flow the oil. The oil in captain field contains heavier component of $C_{21+}$ as 54%. Therefore, this heavy oil could be immiscibly displaced, hence the evaluating result with the basis of immiscible criteria shows that $CO_2$ immiscible flooding in this field could be properly applied. In the case of Onado oil producing field, since the estimated minimum miscibility pressure is lower than the reservoir pressure, it was assessed that the Onado field would be efficiently conducted for $CO_2$ miscible flooding.

The Effects of CEO's Narcissism on Diversification Strategy and Performance in an Economic Downturn: The Moderating Role of Corporate Governance System (경기침체기의 다각화전략과 성과에 대한 최고경영자 나르시시즘의 영향과 기업지배구조의 조절효과에 대한 연구)

  • Yoo, Jae-Wook
    • Management & Information Systems Review
    • /
    • v.35 no.4
    • /
    • pp.1-19
    • /
    • 2016
  • The researchers in strategic management have focused on identifying the effects of CEO's demographic characteristics and experience on the strategic choices and performance of firms. On the other hand, they have failed to identifying the effects of CEO's psychological characteristics on them because of the difficulties over data collection and measurement for variables. To overcome this limitation of prior researches, this study is designed to achieve two specific objectives. The first is to examine the effect of CEO narcissism on diversification strategy and performance of listed corporations on Korean securities market in an economic downturn. The other is to examine the moderating effects of various corporate governance systems that are related to board and/or ownership structures on those relationships. The empirical setting for this study was drawn from a multi-year(2011~2014) sample of large listed corporations in Korean securities market. To achieve the objectives, the hypotheses of research are analyzed by implementing multiple regression analyses in two separate models. The results of these analyses show that CEO narcissism is positively related to the diversification of listed large corporations in Korean securities market. Regrading the moderating effects, the stake of institutional investors weakens the positive relationship between CEO narcissism and firm's diversification. The findings of this research imply that CEO narcissism can intensify the tendency of Korean corporations to adopt high-risk and high return strategy in an economic downturn. Thus, firms might be able to use CEO narcissism to drastically restructure the business portfolio in an economic downturn. However, Korean corporations should be very cautions to maximize the positive effect of CEO narcissism. They might be use the institutional investors as their corporate governance system to monitor and control the opportunism of CEO in the decision for diversification in an economic downturn.

  • PDF

A Smoothing Data Cleaning based on Adaptive Window Sliding for Intelligent RFID Middleware Systems (지능적인 RFID 미들웨어 시스템을 위한 적응형 윈도우 슬라이딩 기반의 유연한 데이터 정제)

  • Shin, DongCheon;Oh, Dongok;Ryu, SeungWan;Park, Seikwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.1-18
    • /
    • 2014
  • Over the past years RFID/SN has been an elementary technology in a diversity of applications for the ubiquitous environments, especially for Internet of Things. However, one of obstacles for widespread deployment of RFID technology is the inherent unreliability of the RFID data streams by tag readers. In particular, the problem of false readings such as lost readings and mistaken readings needs to be treated by RFID middleware systems because false readings ultimately degrade the quality of application services due to the dirty data delivered by middleware systems. As a result, for the higher quality of services, an RFID middleware system is responsible for intelligently dealing with false readings for the delivery of clean data to the applications in accordance with the tag reading environment. One of popular techniques used to compensate false readings is a sliding window filter. In a sliding window scheme, it is evident that determining optimal window size intelligently is a nontrivial important task in RFID middleware systems in order to reduce false readings, especially in mobile environments. In this paper, for the purpose of reducing false readings by intelligent window adaption, we propose a new adaptive RFID data cleaning scheme based on window sliding for a single tag. Unlike previous works based on a binomial sampling model, we introduce the weight averaging. Our insight starts from the need to differentiate the past readings and the current readings, since the more recent readings may indicate the more accurate tag transitions. Owing to weight averaging, our scheme is expected to dynamically adapt the window size in an efficient manner even for non-homogeneous reading patterns in mobile environments. In addition, we analyze reading patterns in the window and effects of decreased window so that a more accurate and efficient decision on window adaption can be made. With our scheme, we can expect to obtain the ultimate goal that RFID middleware systems can provide applications with more clean data so that they can ensure high quality of intended services.

A Status Analysis for the Standards on Permission of Altering Cultural Heritage's Current State Focusing on the Results of Handling Application Cases on Permission of State-Designated Cultural Heritage (Historic Site) for the Last Five Years (2015~2019) (문화재 현상변경 인·허가 검토기준 마련을 위한 실태분석 연구 - 최근 5년(2015~2019)간 국가지정문화재(사적)의 허가신청 안건 처리결과를 중심으로 -)

  • CHO, Hongseok;SUH, Hyunjung;CHOI, Jisu
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.3
    • /
    • pp.24-51
    • /
    • 2021
  • Since June 2006, there have been active efforts to systematize the permission system including the amendment of [Cultural Heritage Protection Act]. Cultural Heritage Administration prepared standards on reviewing each type of cultural heritages(CH) in 2015, promoted a project on the modification of permission standards and showed remarkable performances in quantitative aspects. But as there has been little change for the cases applied for permission, additional studies on policy are required to improve the management efficiency and reduce the citizens'inconvenience. In response, this study aims to identify the actual management status on the current state alteration permission system, and establish practically utilizable reference materials at permission review. While historic sites(HS) constitute a relatively small proportion in state-designated CHs, they are subject to the designation of permission standards. Also, with their location in the downtown area, the application rate is high (51.4%) and the results are commonly utilizable to other types of CH. We constructed a DB based on the minutes of Cultural Heritage Committee(CHC) on HS and categorized similar features in permission handling results. The result of the analysis is as follows. Out of a total of 5,243 cases for permission applied for HS, 1,734 cases of cultural heritage areas(CHA) and 3,509 cases of historic and cultural environment preservation areas(HCEPA) have been applied. CHA has a great proportion of the applications for events and festivals, which are highly related to CHs or representing the local area. There is a high permission rate on applications for the purpose of public service by local governments. Meanwhile, HCEPA has a high proportion of applying for the installation and extension of buildings and facilities at the private level. Thus, negative decisions were made for tall buildings, massed facilities, or suspected scattering of similar acts. Our actual condition analysis has identified a total of 78 types of harmful acts which may influence the preservation of CHs. 31 types in CHA and 37 types in HCEPA are categorized. Especially, 10 common types of permission have been confirmed in both sectors. As a result, it is expected to secure consistency in the permission administration, enhance the management efficiency and improve the public's satisfaction over the regulatory administration by providing practically utilizable reference materials for altering the current state of CH and for decision making on the part of CHC.

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products (부정 탐지를 위한 이상치 분석 활용방안 연구 : 농수산 상장예외품목 거래를 대상으로)

  • Kim, Dongsung;Kim, Kitae;Kim, Jongwoo;Park, Steve
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.93-108
    • /
    • 2014
  • To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.

Visualizing the Results of Opinion Mining from Social Media Contents: Case Study of a Noodle Company (소셜미디어 콘텐츠의 오피니언 마이닝결과 시각화: N라면 사례 분석 연구)

  • Kim, Yoosin;Kwon, Do Young;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.89-105
    • /
    • 2014
  • After emergence of Internet, social media with highly interactive Web 2.0 applications has provided very user friendly means for consumers and companies to communicate with each other. Users have routinely published contents involving their opinions and interests in social media such as blogs, forums, chatting rooms, and discussion boards, and the contents are released real-time in the Internet. For that reason, many researchers and marketers regard social media contents as the source of information for business analytics to develop business insights, and many studies have reported results on mining business intelligence from Social media content. In particular, opinion mining and sentiment analysis, as a technique to extract, classify, understand, and assess the opinions implicit in text contents, are frequently applied into social media content analysis because it emphasizes determining sentiment polarity and extracting authors' opinions. A number of frameworks, methods, techniques and tools have been presented by these researchers. However, we have found some weaknesses from their methods which are often technically complicated and are not sufficiently user-friendly for helping business decisions and planning. In this study, we attempted to formulate a more comprehensive and practical approach to conduct opinion mining with visual deliverables. First, we described the entire cycle of practical opinion mining using Social media content from the initial data gathering stage to the final presentation session. Our proposed approach to opinion mining consists of four phases: collecting, qualifying, analyzing, and visualizing. In the first phase, analysts have to choose target social media. Each target media requires different ways for analysts to gain access. There are open-API, searching tools, DB2DB interface, purchasing contents, and so son. Second phase is pre-processing to generate useful materials for meaningful analysis. If we do not remove garbage data, results of social media analysis will not provide meaningful and useful business insights. To clean social media data, natural language processing techniques should be applied. The next step is the opinion mining phase where the cleansed social media content set is to be analyzed. The qualified data set includes not only user-generated contents but also content identification information such as creation date, author name, user id, content id, hit counts, review or reply, favorite, etc. Depending on the purpose of the analysis, researchers or data analysts can select a suitable mining tool. Topic extraction and buzz analysis are usually related to market trends analysis, while sentiment analysis is utilized to conduct reputation analysis. There are also various applications, such as stock prediction, product recommendation, sales forecasting, and so on. The last phase is visualization and presentation of analysis results. The major focus and purpose of this phase are to explain results of analysis and help users to comprehend its meaning. Therefore, to the extent possible, deliverables from this phase should be made simple, clear and easy to understand, rather than complex and flashy. To illustrate our approach, we conducted a case study on a leading Korean instant noodle company. We targeted the leading company, NS Food, with 66.5% of market share; the firm has kept No. 1 position in the Korean "Ramen" business for several decades. We collected a total of 11,869 pieces of contents including blogs, forum contents and news articles. After collecting social media content data, we generated instant noodle business specific language resources for data manipulation and analysis using natural language processing. In addition, we tried to classify contents in more detail categories such as marketing features, environment, reputation, etc. In those phase, we used free ware software programs such as TM, KoNLP, ggplot2 and plyr packages in R project. As the result, we presented several useful visualization outputs like domain specific lexicons, volume and sentiment graphs, topic word cloud, heat maps, valence tree map, and other visualized images to provide vivid, full-colored examples using open library software packages of the R project. Business actors can quickly detect areas by a swift glance that are weak, strong, positive, negative, quiet or loud. Heat map is able to explain movement of sentiment or volume in categories and time matrix which shows density of color on time periods. Valence tree map, one of the most comprehensive and holistic visualization models, should be very helpful for analysts and decision makers to quickly understand the "big picture" business situation with a hierarchical structure since tree-map can present buzz volume and sentiment with a visualized result in a certain period. This case study offers real-world business insights from market sensing which would demonstrate to practical-minded business users how they can use these types of results for timely decision making in response to on-going changes in the market. We believe our approach can provide practical and reliable guide to opinion mining with visualized results that are immediately useful, not just in food industry but in other industries as well.

Strategy for Store Management Using SOM Based on RFM (RFM 기반 SOM을 이용한 매장관리 전략 도출)

  • Jeong, Yoon Jeong;Choi, Il Young;Kim, Jae Kyeong;Choi, Ju Choel
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.93-112
    • /
    • 2015
  • Depending on the change in consumer's consumption pattern, existing retail shop has evolved in hypermarket or convenience store offering grocery and daily products mostly. Therefore, it is important to maintain the inventory levels and proper product configuration for effectively utilize the limited space in the retail store and increasing sales. Accordingly, this study proposed proper product configuration and inventory level strategy based on RFM(Recency, Frequency, Monetary) model and SOM(self-organizing map) for manage the retail shop effectively. RFM model is analytic model to analyze customer behaviors based on the past customer's buying activities. And it can differentiates important customers from large data by three variables. R represents recency, which refers to the last purchase of commodities. The latest consuming customer has bigger R. F represents frequency, which refers to the number of transactions in a particular period and M represents monetary, which refers to consumption money amount in a particular period. Thus, RFM method has been known to be a very effective model for customer segmentation. In this study, using a normalized value of the RFM variables, SOM cluster analysis was performed. SOM is regarded as one of the most distinguished artificial neural network models in the unsupervised learning tool space. It is a popular tool for clustering and visualization of high dimensional data in such a way that similar items are grouped spatially close to one another. In particular, it has been successfully applied in various technical fields for finding patterns. In our research, the procedure tries to find sales patterns by analyzing product sales records with Recency, Frequency and Monetary values. And to suggest a business strategy, we conduct the decision tree based on SOM results. To validate the proposed procedure in this study, we adopted the M-mart data collected between 2014.01.01~2014.12.31. Each product get the value of R, F, M, and they are clustered by 9 using SOM. And we also performed three tests using the weekday data, weekend data, whole data in order to analyze the sales pattern change. In order to propose the strategy of each cluster, we examine the criteria of product clustering. The clusters through the SOM can be explained by the characteristics of these clusters of decision trees. As a result, we can suggest the inventory management strategy of each 9 clusters through the suggested procedures of the study. The highest of all three value(R, F, M) cluster's products need to have high level of the inventory as well as to be disposed in a place where it can be increasing customer's path. In contrast, the lowest of all three value(R, F, M) cluster's products need to have low level of inventory as well as to be disposed in a place where visibility is low. The highest R value cluster's products is usually new releases products, and need to be placed on the front of the store. And, manager should decrease inventory levels gradually in the highest F value cluster's products purchased in the past. Because, we assume that cluster has lower R value and the M value than the average value of good. And it can be deduced that product are sold poorly in recent days and total sales also will be lower than the frequency. The procedure presented in this study is expected to contribute to raising the profitability of the retail store. The paper is organized as follows. The second chapter briefly reviews the literature related to this study. The third chapter suggests procedures for research proposals, and the fourth chapter applied suggested procedure using the actual product sales data. Finally, the fifth chapter described the conclusion of the study and further research.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.