• Title/Summary/Keyword: Feature Variable

Search Result 387, Processing Time 0.025 seconds

A Scalable and Modular Approach to Understanding of Real-time Software: An Architecture-based Software Understanding(ARSU) and the Software Re/reverse-engineering Environment(SRE) (실시간 소프트웨어의 조절적${\cdot}$단위적 이해 방법 : ARSU(Architecture-based Software Understanding)와 SRE(Software Re/reverse-engineering Environment))

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3159-3174
    • /
    • 1997
  • This paper reports a research to develop a methodology and a tool for understanding of very large and complex real-time software. The methodology and the tool mostly developed by the author are called the Architecture-based Real-time Software Understanding (ARSU) and the Software Re/reverse-engineering Environment (SRE) respectively. Due to size and complexity, it is commonly very hard to understand the software during reengineering process. However the research facilitates scalable re/reverse-engineering of such real-time software based on the architecture of the software in three-dimensional perspectives: structural, functional, and behavioral views. Firstly, the structural view reveals the overall architecture, specification (outline), and the algorithm (detail) views of the software, based on hierarchically organized parent-chi1d relationship. The basic building block of the architecture is a software Unit (SWU), generated by user-defined criteria. The architecture facilitates navigation of the software in top-down or bottom-up way. It captures the specification and algorithm views at different levels of abstraction. It also shows the functional and the behavioral information at these levels. Secondly, the functional view includes graphs of data/control flow, input/output, definition/use, variable/reference, etc. Each feature of the view contains different kind of functionality of the software. Thirdly, the behavioral view includes state diagrams, interleaved event lists, etc. This view shows the dynamic properties or the software at runtime. Beside these views, there are a number of other documents: capabilities, interfaces, comments, code, etc. One of the most powerful characteristics of this approach is the capability of abstracting and exploding these dimensional information in the architecture through navigation. These capabilities establish the foundation for scalable and modular understanding of the software. This approach allows engineers to extract reusable components from the software during reengineering process.

  • PDF

Roles of Perceived Use Control consisting of Perceived Ease of Use and Perceived Controllability in IT acceptance (정보기술 수용에서 사용용이성과 통제가능성을 하위 차원으로 하는 지각된 사용통제의 역할)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.18 no.2
    • /
    • pp.1-14
    • /
    • 2008
  • According to technology acceptance model(TAN) which is one of the most important research models for explaining IT users' behavior, on intention of using IT is determined by usefulness and ease of use of it. However, TAM wouldn't explain the performance of using IT while it has been considered as a very good model for prediction of the intention. Many people would not be confirmed in the performance of using IT until they can control it at their will, although they think it useful and easy to use. In other words, in addition to usefulness and ease of use as in TAM, controllability is also should be a factor to determine acceptance of IT. Especially, there is a very close relationship between controllability and ease of use, both of which explain the other sides of control over the performance of using IT, so called perceived behavioral control(PBC) in social psychology. The objective of this study is to identify the relationship between ease of use and controllability, and analyse the effects of both two beliefs over performance and intention in using IT. For this purpose, we review the issues related with PBC in information systems studies as well as social psychology, Based on a review of PBC, we suggest a research model which includes the relationship between control and performance in using IT, and prove its validity empirically. Since it was introduced as qa variable for explaining volitional control for actions in theory of planned behavior(TPB), there have been confusion about concept of PBC in spite of its important role in predicting so many kinds of actions. Some studies define PBC as self-efficacy that means actor's perception of difficulty or ease of actions, while others as controllability. However, this confusion dose not imply conceptual contradiction but a double-faced feature of PBC since the performance of actions is related with both self-efficacy and controllability. In other words, these two concepts are discriminated and correlated with each other. Therefore, PBC should be considered as a composite concept consisting of self-efficacy and controllability, Use of IT has been also one of important areas for predictions by PBC. Most of them have been studied by analysis of comparison in prediction power between TAM and TPB or modification of TAM by inclusion of PBC as another belief as like usefulness and ease of use. Interestingly, unlike the other applications in social psychology, it is hard to find such confusion in the concept of PBC in the studies for use of IT. In most of studies, controllability is adapted as PBC since the concept of self-efficacy is included in ease of use explicitly. Based on these discussions, we can suggest perceived use control(PUC) which is defined as perception of control over the performance of using IT and composed of controllability and ease of use as sub-concepts. We suggest a research model explaining acceptance of IT which includes the relationships of PUC with attitude and performance of using IT. For empirical test of our research model, two user groups are selected for surveying questionnaires. In the first group, there are freshmen who take a basic course for Microsoft Excel, and the second group consists of senior students who take a course for analysis of management information by Excel. Most of measurements are adapted ones that have been validated in the other studies, while performance is real score of mid-term in each class. In result, four hypotheses related with PUC are supported statistically with very low significance level. Main contribution of this study is suggestion of PUC through theoretical review of PBC. Specifically, a hierarchical model of PUC are derived from very rigorous studies in the relationship between self-efficacy and controllability with a view of PBC in social psychology. The relationship between PUC and performance is another main contribution.

Development of Bicycle Accident Prediction Model and Suggestion of Countermeasures on Bicycle Accidents (자전거 사고예측모형 개발 및 개선방안 제시에 관한 연구)

  • Kwon, Sung-Dae;Kim, Yoon-Mi;Kim, Jae-Gon;Ha, Tae-Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.5
    • /
    • pp.1135-1146
    • /
    • 2015
  • This thesis aims to improve the safety of bicycle traffic for activating the use of bicycle, main means of non-powered and non-carbon transportation in order to cope with worldwide crisis such as climate change and energy depletion and to implement sustainable traffic system. In this regard, I analyzed the problem of bicycle roads currently installed and operated, and developed the bicycle accident forecasting model. Following are the processes for this. First, this study presented the current status of bicycle road in Korea as well as accident data, collect the data on bicycle traffic accidents generated throughout the country for recent 3 years (2009~2011) and analyzed the features of bicycle traffic accidents based on the data. Second, this study selected the variable affecting the number of bicycle accidents through accident feature analysis of bicycle accidents at Jeollanam-do, and developed accident forecast model using the multiple regression analysis of 'SPSS Statistics 21'. At this time, the number of accidents due to extension per road types (crossing, crosswalk, other single road) was used. To verify the accident forecast model deduced, this study used the data on bicycle accident generated in Gwangju, 2011, and compared the prediction value with actual number of accidents. As a result, it was found out that reliability of accident forecast model was secured through reconciling with actual number of cases except certain data. Third, this study carried out field survey on the bicycle road as well as questionnaire on satisfaction of bicycle road and use of bicycle for analysis of bicycle road problems, and presented safety improvement measures for the problems deduced as well as bicycle activation plans. This study is considered to serve as the fundamental data for planning and reorganizing of bicycle road in the future, and expected to improve safety of bicycle users and to promote activation of bicycle use as the means of transportation.

The Prediction of DEA based Efficiency Rating for Venture Business Using Multi-class SVM (다분류 SVM을 이용한 DEA기반 벤처기업 효율성등급 예측모형)

  • Park, Ji-Young;Hong, Tae-Ho
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.139-155
    • /
    • 2009
  • For the last few decades, many studies have tried to explore and unveil venture companies' success factors and unique features in order to identify the sources of such companies' competitive advantages over their rivals. Such venture companies have shown tendency to give high returns for investors generally making the best use of information technology. For this reason, many venture companies are keen on attracting avid investors' attention. Investors generally make their investment decisions by carefully examining the evaluation criteria of the alternatives. To them, credit rating information provided by international rating agencies, such as Standard and Poor's, Moody's and Fitch is crucial source as to such pivotal concerns as companies stability, growth, and risk status. But these types of information are generated only for the companies issuing corporate bonds, not venture companies. Therefore, this study proposes a method for evaluating venture businesses by presenting our recent empirical results using financial data of Korean venture companies listed on KOSDAQ in Korea exchange. In addition, this paper used multi-class SVM for the prediction of DEA-based efficiency rating for venture businesses, which was derived from our proposed method. Our approach sheds light on ways to locate efficient companies generating high level of profits. Above all, in determining effective ways to evaluate a venture firm's efficiency, it is important to understand the major contributing factors of such efficiency. Therefore, this paper is constructed on the basis of following two ideas to classify which companies are more efficient venture companies: i) making DEA based multi-class rating for sample companies and ii) developing multi-class SVM-based efficiency prediction model for classifying all companies. First, the Data Envelopment Analysis(DEA) is a non-parametric multiple input-output efficiency technique that measures the relative efficiency of decision making units(DMUs) using a linear programming based model. It is non-parametric because it requires no assumption on the shape or parameters of the underlying production function. DEA has been already widely applied for evaluating the relative efficiency of DMUs. Recently, a number of DEA based studies have evaluated the efficiency of various types of companies, such as internet companies and venture companies. It has been also applied to corporate credit ratings. In this study we utilized DEA for sorting venture companies by efficiency based ratings. The Support Vector Machine(SVM), on the other hand, is a popular technique for solving data classification problems. In this paper, we employed SVM to classify the efficiency ratings in IT venture companies according to the results of DEA. The SVM method was first developed by Vapnik (1995). As one of many machine learning techniques, SVM is based on a statistical theory. Thus far, the method has shown good performances especially in generalizing capacity in classification tasks, resulting in numerous applications in many areas of business, SVM is basically the algorithm that finds the maximum margin hyperplane, which is the maximum separation between classes. According to this method, support vectors are the closest to the maximum margin hyperplane. If it is impossible to classify, we can use the kernel function. In the case of nonlinear class boundaries, we can transform the inputs into a high-dimensional feature space, This is the original input space and is mapped into a high-dimensional dot-product space. Many studies applied SVM to the prediction of bankruptcy, the forecast a financial time series, and the problem of estimating credit rating, In this study we employed SVM for developing data mining-based efficiency prediction model. We used the Gaussian radial function as a kernel function of SVM. In multi-class SVM, we adopted one-against-one approach between binary classification method and two all-together methods, proposed by Weston and Watkins(1999) and Crammer and Singer(2000), respectively. In this research, we used corporate information of 154 companies listed on KOSDAQ market in Korea exchange. We obtained companies' financial information of 2005 from the KIS(Korea Information Service, Inc.). Using this data, we made multi-class rating with DEA efficiency and built multi-class prediction model based data mining. Among three manners of multi-classification, the hit ratio of the Weston and Watkins method is the best in the test data set. In multi classification problems as efficiency ratings of venture business, it is very useful for investors to know the class with errors, one class difference, when it is difficult to find out the accurate class in the actual market. So we presented accuracy results within 1-class errors, and the Weston and Watkins method showed 85.7% accuracy in our test samples. We conclude that the DEA based multi-class approach in venture business generates more information than the binary classification problem, notwithstanding its efficiency level. We believe this model can help investors in decision making as it provides a reliably tool to evaluate venture companies in the financial domain. For the future research, we perceive the need to enhance such areas as the variable selection process, the parameter selection of kernel function, the generalization, and the sample size of multi-class.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Development of the forecasting model for import volume by item of major countries based on economic, industrial structural and cultural factors: Focusing on the cultural factors of Korea (경제적, 산업구조적, 문화적 요인을 기반으로 한 주요 국가의 한국 품목별 수입액 예측 모형 개발: 한국의, 한국에 대한 문화적 요인을 중심으로)

  • Jun, Seung-pyo;Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.4
    • /
    • pp.23-48
    • /
    • 2021
  • The Korean economy has achieved continuous economic growth for the past several decades thanks to the government's export strategy policy. This increase in exports is playing a leading role in driving Korea's economic growth by improving economic efficiency, creating jobs, and promoting technology development. Traditionally, the main factors affecting Korea's exports can be found from two perspectives: economic factors and industrial structural factors. First, economic factors are related to exchange rates and global economic fluctuations. The impact of the exchange rate on Korea's exports depends on the exchange rate level and exchange rate volatility. Global economic fluctuations affect global import demand, which is an absolute factor influencing Korea's exports. Second, industrial structural factors are unique characteristics that occur depending on industries or products, such as slow international division of labor, increased domestic substitution of certain imported goods by China, and changes in overseas production patterns of major export industries. Looking at the most recent studies related to global exchanges, several literatures show the importance of cultural aspects as well as economic and industrial structural factors. Therefore, this study attempted to develop a forecasting model by considering cultural factors along with economic and industrial structural factors in calculating the import volume of each country from Korea. In particular, this study approaches the influence of cultural factors on imports of Korean products from the perspective of PUSH-PULL framework. The PUSH dimension is a perspective that Korea develops and actively promotes its own brand and can be defined as the degree of interest in each country for Korean brands represented by K-POP, K-FOOD, and K-CULTURE. In addition, the PULL dimension is a perspective centered on the cultural and psychological characteristics of the people of each country. This can be defined as how much they are inclined to accept Korean Flow as each country's cultural code represented by the country's governance system, masculinity, risk avoidance, and short-term/long-term orientation. The unique feature of this study is that the proposed final prediction model can be selected based on Design Principles. The design principles we presented are as follows. 1) A model was developed to reflect interest in Korea and cultural characteristics through newly added data sources. 2) It was designed in a practical and convenient way so that the forecast value can be immediately recalled by inputting changes in economic factors, item code and country code. 3) In order to derive theoretically meaningful results, an algorithm was selected that can interpret the relationship between the input and the target variable. This study can suggest meaningful implications from the technical, economic and policy aspects, and is expected to make a meaningful contribution to the export support strategies of small and medium-sized enterprises by using the import forecasting model.

Dual Path Model in Store Loyalty of Discount Store (대형마트 충성도의 이중경로모형)

  • Ji, Seong-Goo;Lee, Ihn-Goo
    • Journal of Distribution Research
    • /
    • v.15 no.1
    • /
    • pp.1-24
    • /
    • 2010
  • I. Introduction The industry of domestic discount store was reorganized with 2 bigs and 1 middle, and then Home Plus took over Home Ever in 2008. In present, Oct, 2008, E-Mart has 118 outlets, Home Plus 112 outlets, and Lotte Mart 60 stores. With total number of 403 outlets, they are getting closer to a saturation point. We know that the industry of discount store has been getting through the mature stage in retail life cycle. There are many efforts to maintain existing customers rather than to get new customers. These competitions in this industry lead firms to acknowledge 'store loyalty' to be the first strategic tool for their sustainable competitiveness. In other words, the strategic goal of discount store is to boost up the repurchase rate of customers throughout increasing store loyalty. If owners of retail shops can figure out main factors for store loyalty, they can easily make more efficient and effective retail strategies which bring about more sales and profits. In this practical sense, there are many papers which are focusing on the antecedents of store loyalty. Many researchers have been inspecting causal relationships between antecedents and store loyalty; store characteristics, store image, atmosphere in store, sales promotion in store, service quality, customer characteristics, crowding, switching cost, trust, satisfaction, commitment, etc., In recent times, many academic researchers and practitioners have been interested in 'dual path model for service loyalty'. There are two paths in store loyalty. First path has an emphasis on symbolic and emotional dimension of service brand, and second path focuses on quality of product and service. We will call the former an extrinsic path and call the latter an intrinsic path. This means that consumers' cognitive path for store loyalty is not single but dual. Existing studies for dual path model are as follows; First, in extrinsic path, some papers in domestic settings show that there is 'store personality-identification-loyalty' path. Second, service quality has an effect on loyalty, which is a behavioral variable, in the mediation of customer satisfaction. But, it's very difficult to find out an empirical paper applied to domestic discount store based on this mediating model. The domestic research for store loyalty concentrates on not only intrinsic path but also extrinsic path. Relatively, an attention for intrinsic path is scarce. And then, we acknowledge that there should be a need for integrating extrinsic and intrinsic path. Also, in terms of retail industry, this study is meaningful because retailers want to achieve their competitiveness by using store loyalty. And so, the purpose of this paper is to integrate and complement two existing paths into one specific model, dual path model. This model includes both intrinsic and extrinsic path for store loyalty. With this research, we would expect to understand the full process of forming customers' store loyalty which had not been clearly explained. In other words, we propose the dual path model for discount store loyalty which has been originated from store personality and service quality. This model is composed of extrinsic path, discount store personality$\rightarrow$store identification$\rightarrow$store loyalty, and intrinsic path, service quality of discount store$\rightarrow$customer satisfaction$\rightarrow$store loyalty. II. Research Model Dual path model integrates intrinsic path and extrinsic path into one specific model. Intrinsic path put an emphasis on quality characteristics and extrinsic path focuses on brand characteristics. Intrinsic path is based on information processing perspective, and extrinsic path emphasizes symbolic and emotional dimension of brand. This model is composed of extrinsic path, discount store personality$\rightarrow$store identification$\rightarrow$store loyalty, and intrinsic path, service quality of discount store$\rightarrow$customer satisfaction$\rightarrow$store loyalty. Hypotheses are as follows; Hypothesis 1: Service quality perceived by customers in discount store has an positive effect on customer satisfaction Hypothesis 2: Store personality perceived by customers in discount store has an positive effect on store identification Hypothesis 3: Customer satisfaction in discount store has an positive effect on store loyalty. Hypothesis 4: Store identification has an positive effect on store loyalty. III. Results and Implications We examined consumers who patronize discount stores for samples of this study. With the structural equation model(SEM) analysis, we empirically tested the validity and fitness of the dual path model for store loyalty in discount stores. As results, the fitness indices of this model were well fitted to data obtained. In an intrinsic path, service quality(SQ) is positively related to customer satisfaction(CS), customer satisfaction(CS) has very significantly positive effect on store loyalty(SL). Also, in an extrinsic path, the store personality(SP) is positively related to store identification(SI), it shows significant effect on store loyalty. Table 1 shows the results as follows; There are some theoretical and practical implications. First, Many studies on discount store loyalty have been executed from various perspectives. But there has been no integrative view on this issue. And so, this research was theoretically designed to integrate various and controversial arguments into one systematic model. We empirically tested dual path model forming store loyalty, and brought up a systematic and integrative framework for future studies. We want to expect creative and aggressive research activities. Second, a few established papers are focused on the relationship between antecedents and store loyalty; store characteristics, atmosphere, sales promotion in store, service quality, trust, commitment, etc., There has been some limits in understanding thoroughly the formation process of store loyalty with a singular path, intrinsic or extrinsic. Beyond these limits in single path, we could propose the new path for store loyalty. This is meaningful. Third, discount store firms make and execute marketing strategies for increasing store loyalty. This research provides real practitioners with reference framework needed for actual strategy formation. Because this paper shows integrated and systematic path for store loyalty. A special feature of this study is to represent 6 sub dimensions of service quality in intrinsic path and 4 sub dimensions of store personality in extrinsic path. Marketers can make more analytic marketing planning with concrete sub dimensions of service quality and store personality. When marketers of discount stores make strategic planning like MPR, Ads, campaign, sales promotion, they can use many items which are more competitive than competitors.

  • PDF