• Title/Summary/Keyword: Digital Fast

Search Result 1,204, Processing Time 0.029 seconds

Career map and course map recommendation system for employment (취업준비를 위한 career map and course map 추천 시스템)

  • Kwon, Wonhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.276-279
    • /
    • 2022
  • The 4th industrial revolution refers to the transition to a knowledge society in which the production speed of knowledge is fast and the proportion of the knowledge industry is greatly increased. The reorganization of the industrial structure and the change of occupations and jobs due to new technologies are bringing about changes in education, and the development of digital technology has made education that is borderless, individual and dynamic, becoming the new standard of education. With these changes, interest in nano-degrees on new technologies or micro-degrees focused on core courses rather than regular course degrees is increasing. As a representative example, Udacity in the United States has opened and operated online nanodegree courses related to jobs, and collaborates with major companies to develop and educate core training courses necessary for companies, thereby efficiently supporting companies in securing talent. With the revitalization of online vocational and job training, an environment has been prepared in which individuals can set goals for vocational competency development and continue their portfolio-based sustainable learning. However, for effective vocational education, automated and personalized educational content design should be preceded. To this end, in this paper, we propose a personalized career and course map recommendation system in the era of online learning

  • PDF

Evaluation of Cerebral Aneurysm with High Resolution MR Angiography using Slice Interpolation Technique: Correlation wity Digital Subtraction Angiography(DSA) and MR Angiography(MRA) (Slice Interpolation기법의 고해상도 자기공명혈관조영술을 이용한 뇌동맥류의 진단 : 디지탈 감산 혈관조영술과 자기공명 혈관조영술의 비교)

  • ;;;Daisy Chien;Gerhard Laub
    • Investigative Magnetic Resonance Imaging
    • /
    • v.1 no.1
    • /
    • pp.94-102
    • /
    • 1997
  • Purpose: There have been some efforts to diagnose intracranial aneurysm through a non-invasive method using MRA, although the process may be difficult when the lesion is less than 3mm. The present study prospectively compares the results of high resolution, fast speed slice interpolation MRA and DSA thereby examing the potentiality of primary non-invasive screening test. Materials and Methods: A total of 26 cerebral aneurysm lesions from 14 patients with subarachnoid hemorrhage from ruptured aneurysm (RA) and 5 patients with unruptured aneurysm(UA). In all subjects, MRA was taken to confirm the vessel of origin, definition of aneurysm neck and the relationship of the aneurysm to nearby small vessels, and the results were compared with the results of DSA. The images were obtained with 1.5T superconductive machine (Vision, Siemens, Erlangen, Germany) on 4 slabs of MRA using slice interpolation. The settings include TR/TE/FA=30/6.4/25, matrix $160{\times}512$, FOV $150{\times}200$, 7minutes 42 seconds of scan time, effective thickness of 0.7 mm and an entire thickness of 102. 2mm. The images included structures from foramen magnum to A3 portion of anterior cerebral artery. MIP was used for the image analysis, and multiplanar reconstruction (MPR) technique was used in cases of intracranial aneurysm. Results: A total of 26 intracranial aneurysm lesions from 19 patients with 2 patients having 3 lesion, 3 patients having 2 lesions and the rest of 14 patients having 1 lesion each were examined. Among those, 14 were RA and 12 were UA. Eight lesions were less than 2mm in size, 9 lesions were 3-5mm, 7 were 6-9mm and 2 were larger than IOmm. On initial exams, 25 out of 26 aneurysm lesions were detected in either MRA or DSA showing 96% sensitivity. Specificity cannot be estimated since there was no true negative of false positive findings. When MRA and MPR were used concurrently for the confirmation of size and shape, the results were equivalent to those of DSA, while in the confirmation of aneurysm neck and parent vessels, the concurrent use of MRA and MPR was far superior to the sole use of either MRA or DSA. Conclusion: High resolution MRA using slice interpolation technique showed equal results as those of DSA for the detection of intracranial aneurysm, and may be used as a primary non-invasive screening test in the future.

  • PDF

Design and Implementation of Content-based Video Database using an Integrated Video Indexing Method (통합된 비디오 인덱싱 방법을 이용한 내용기반 비디오 데이타베이스의 설계 및 구현)

  • Lee, Tae-Dong;Kim, Min-Koo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.661-683
    • /
    • 2001
  • There is a rapid increase in the use of digital video information in recent years, it becomes more important to manage video databases efficiently. The development of high speed data network and digital techniques has emerged new multimedia applications such as internet broadcasting, Video On Demand(VOD) combined with video data processing and computer. Video database should be construct for searching fast, efficient video be extract the accurate feature information of video with more massive and more complex characteristics. Video database are essential differences between video databases and traditional databases. These differences lead to interesting new issues in searching of video, data modeling. So, cause us to consider new generation method of database, efficient retrieval method of video. In this paper, We propose the construction and generation method of the video database based on contents which is able to accumulate the meaningful structure of video and the prior production information. And by the proposed the construction and generation method of the video database implemented the video database which can produce the new contents for the internet broadcasting centralized on the video database. For this production, We proposed the video indexing method which integrates the annotation-based retrieval and the content-based retrieval in order to extract and retrieval the feature information of the video data using the relationship between the meaningful structure and the prior production information on the process of the video parsing and extracting the representative key frame. We can improve the performance of the video contents retrieval, because the integrated video indexing method is using the content-based metadata type represented in the low level of video and the annotation-based metadata type impressed in the high level which is difficult to extract the feature information of the video at he same time.

  • PDF

Hardware Approach to Fuzzy Inference―ASIC and RISC―

  • Watanabe, Hiroyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.975-976
    • /
    • 1993
  • This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}

  • PDF

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

Designing female-oriented computer games: Emotional expression

  • Shui, Lin-Lin;Lee, Won-Jung
    • Cartoon and Animation Studies
    • /
    • s.20
    • /
    • pp.75-86
    • /
    • 2010
  • Recently, as the number of female players has increased rapidly, the electronic gaming industry has begun to look at ways to appeal to the largely untapped female market. According to the latest game market investigative report by China Internet Network Information Center (CNNIC), the total number of game players in China increased by 24.8% in 2009, reached 69,130,000 people, and 38.9% of them are female players. This growth in the number of female player is corroborated by a series of investigative reports from IResearch Company in Shanghai, China: from 2003 to 2009, the number of female players grew from 8% to more than 49%. Therefore, no matter how much attention the game production companies have given to male players or how they have ignored the female players before, the companies would be sensible to face up this reality and adjust their marketing policy a bit more. This article analyzes gender preferences in video games which shows that male players are more likely to be attracted to elements of aggression, violence, competition and fast action in electronic game-playing, while female players are drawn to emotional and social aspects of the games such as an understanding of character relationships. The literatures cited indicates that female players also show apparent preference for games with familiar environments, games that allow players to work together, games that have more than one way to win, and games in which characters do not die. It also discusses the characteristics of female-friendly games from the aspect of emotion, pointing out that the simulation games involving pet, dressing-up, and social simulation games are very popular with female players. Because these are the most suitable game types to fill with emotions of love, share, jealousy, superiority, mystery, these are absolutely attractive to female players. Finally, in accord with the above, I propose some principles of designing female-oriented games, including presenting a good-looking leading character, making the story interesting with "live" NPCs(Non-Playing Characters), and finding ways to satisfy female nature instincts such as taking care of others and the inborn interest of classifying and selecting.

  • PDF

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.

Estimation of Rice-Planted Area using Landsat TM Imagery in Dangjin-gun area (Landsat TM 화상을 이용한 당진군 일원의 논면적 추정)

  • 홍석영;임상규;이규성;조인상;김길웅
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.3 no.1
    • /
    • pp.5-15
    • /
    • 2001
  • For estimating paddy field area with Landsat TM images, two dates, May 31, 1991 (transplanting stage) and August 19, 1991 (heading stage) were selected by the data analysis of digital numbers considering rice cropping calendar. Four different estimating methods (1) rule-based classification method, (2) supervised classification(maximum likelihood), (3) unsupervised classification (ISODATA, No. of class:15), (4) unsupervised classification (ISODATA, No. of class:20) were examined. Paddy field area was estimated to 7291.19 ha by non-classification method. In comparison with topographical map (1:25,000), accuracy far paddy field area was 92%. A new image stacked by 10 layers, Landsat TM band 3,4,5, RVI, and wetness in May 31,1991 and August 19,1991 was made to estimate paddy field area by both supervised and unsupervised classification method. Paddy field was classified to 9100.98 ha by supervised classification. Error matrix showed 97.2% overall accuracy far training samples. Accuracy compared with topographical map was 95%. Unsupervised classifications by ISODATA using principal axis. Paddy field area by two different classification number of criteria were 6663.60 ha and 5704.56 ha and accuracy compared with topographical map was 87% and 82%. Irrespective of the estimating methods, paddy fields were discriminated very well by using two-date Landsat TM images in May 31,1991 (transplanting stage) and August 19,1991 (heading stage). Among estimation methods, rule-based classification method was the easiest to analyze and fast to process.

  • PDF

A Study on Real-Time Defect Detection Using Ultrasound Excited Thermography (초음파 서모그라피를 이용한 실시간 결함 검출에 대한 연구)

  • Cho, Jai-Wan;Seo, Yong-Chil;Jung, Seung-Ho;Jung, Hyun-Kyu;Kim, Seung-Ho
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.26 no.4
    • /
    • pp.211-219
    • /
    • 2006
  • The UET(ultrasound excited thermography) for the ,eat-time diagnostics of the object employs an infrared camera to image defects of the surface and subsurface which are locally heated using high-frequency putted ultrasonic excitation. The dissipation of high-power ultrasonic energy around the feces of the defects causes an increase In temperature. The defect's image appears as a hot spot (bright IR source) within a dark background field. The UET for nondestructive diagnostic and evaluation is based on the image analysis of the hot spot as a local response to ultrasonic excited heat deposition. In this paper the applicability of VET for fast imaging of defect is described. The ultrasonic energy is injected into the sample through a transducer in the vertical and horizontal directions respectively. The voltage applied to the transducer is measured by digital oscilloscope, and the waveform are compared. Measurements were performed on four kinds of materials: SUS fatigue crack specimen(thickness 14mm), PCB plate(1.8 mm), CFRP plate(3 mm) and Inconel 600 plate (1 mm). A high power ultrasonic energy with pulse durations of 250ms Is injected into the samples in the horizontal and vertical directions respectively The obtained experimental result reveals that the dissipation loss of the ultrasonic energy In the vertical injection is less than that in the horizontal direction. In the cafe or PCB, CFRP, the size of hot spot in the vortical injection if larger than that in horizontal direction. Duration time of the hot spot in the vertical direction is three times as long as that in the horizontal direction. In the case of Inconel 600 plate and SUS sample, the hot spot in the horizontal injection was detected faster than that in the vertical direction

UX Methodology Study by Data Analysis Focusing on deriving persona through customer segment classification (데이터 분석을 통한 UX 방법론 연구 고객 세그먼트 분류를 통한 페르소나 도출을 중심으로)

  • Lee, Seul-Yi;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.151-176
    • /
    • 2021
  • As the information technology industry develops, various kinds of data are being created, and it is now essential to process them and use them in the industry. Analyzing and utilizing various digital data collected online and offline is a necessary process to provide an appropriate experience for customers in the industry. In order to create new businesses, products, and services, it is essential to use customer data collected in various ways to deeply understand potential customers' needs and analyze behavior patterns to capture hidden signals of desire. However, it is true that research using data analysis and UX methodology, which should be conducted in parallel for effective service development, is being conducted separately and that there is a lack of examples of use in the industry. In thiswork, we construct a single process by applying data analysis methods and UX methodologies. This study is important in that it is highly likely to be used because it applies methodologies that are actively used in practice. We conducted a survey on the topic to identify and cluster the associations between factors to establish customer classification and target customers. The research methods are as follows. First, we first conduct a factor, regression analysis to determine the association between factors in the happiness data survey. Groups are grouped according to the survey results and identify the relationship between 34 questions of psychological stability, family life, relational satisfaction, health, economic satisfaction, work satisfaction, daily life satisfaction, and residential environment satisfaction. Second, we classify clusters based on factors affecting happiness and extract the optimal number of clusters. Based on the results, we cross-analyzed the characteristics of each cluster. Third, forservice definition, analysis was conducted by correlating with keywords related to happiness. We leverage keyword analysis of the thumb trend to derive ideas based on the interest and associations of the keyword. We also collected approximately 11,000 news articles based on the top three keywords that are highly related to happiness, then derived issues between keywords through text mining analysis in SAS, and utilized them in defining services after ideas were conceived. Fourth, based on the characteristics identified through data analysis, we selected segmentation and targetingappropriate for service discovery. To this end, the characteristics of the factors were grouped and selected into four groups, and the profile was drawn up and the main target customers were selected. Fifth, based on the characteristics of the main target customers, interviewers were selected and the In-depthinterviews were conducted to discover the causes of happiness, causes of unhappiness, and needs for services. Sixth, we derive customer behavior patterns based on segment results and detailed interviews, and specify the objectives associated with the characteristics. Seventh, a typical persona using qualitative surveys and a persona using data were produced to analyze each characteristic and pros and cons by comparing the two personas. Existing market segmentation classifies customers based on purchasing factors, and UX methodology measures users' behavior variables to establish criteria and redefine users' classification. Utilizing these segment classification methods, applying the process of producinguser classification and persona in UX methodology will be able to utilize them as more accurate customer classification schemes. The significance of this study is summarized in two ways: First, the idea of using data to create a variety of services was linked to the UX methodology used to plan IT services by applying it in the hot topic era. Second, we further enhance user classification by applying segment analysis methods that are not currently used well in UX methodologies. To provide a consistent experience in creating a single service, from large to small, it is necessary to define customers with common goals. To this end, it is necessary to derive persona and persuade various stakeholders. Under these circumstances, designing a consistent experience from beginning to end, through fast and concrete user descriptions, would be a very effective way to produce a successful service.