• Title/Summary/Keyword: Gartner

Search Result 54, Processing Time 0.026 seconds

Design of Custom Training System for Fitness Club Based on NFC (NFC기반 피트니스센터 맞춤 트레이닝 시스템 설계)

  • Lee, Hyun-Suk;Park, Seok--Cheon
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.1-6
    • /
    • 2017
  • According to Gartner, the size of the global health care industry in 2020 is expected to reach $ 850 billion, which is 15 percent of the total IoT market. The health care market is growing a lot lately, and many people are looking for a fitness center to build a healthy body. Sometimes, they exercise the wrong way by exercising exercise in the wrong way. Even though it is recommended to use the exercise, it is problematic to know how to use it or not to use it. It is becoming a problem. This paper designed the NFC fitness center customized for the fitness center that users use to improve the previously presented problem.

A Study on the Efficiency Improving of Communication Protocols on the Internet of Things. (사물인터넷 통신프로토콜 성능 개선 연구)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Soh, Woo-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.427-430
    • /
    • 2016
  • Internet of Things is one of the technologies that become a hot topic in recent years, is a technology that connects objects with wired or wireless network and share a information between objects. Gartner predicts that spread rapidly devices for end users, also increase revenue from enterprise equipment through the Annual 'Internet of Things' reports. By this trend, Internet of Things is becoming the platform of various kinds, the platform and the protocol for that have been developed a new technique. In this paper, we compared the performance of the communication protocol between devices in the Internet of Things, and propose a way to improve performance efficiency.

  • PDF

Author Co-citation Analysis for Digital Twin Studies (디지털 트윈 연구의 저자 동시인용 분석)

  • Kim, Sumin;Suh, Chang-Kyo
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.39-58
    • /
    • 2019
  • Purpose A digital twin is a digital replication of a physical system. Gartner identified the digital twin as one of the Gartner Top 10 Strategic Technology Trend for three years from 2017. The rapid development of the digital twin market is expected to bring about innovation and change throughout society, and much research has been done recently in academia. In this research, we tried to explore the main research trends for digital twin research. Design/methodology/approach We collected the digital twin research from Web of Science, and analyzed 804 articles that was published during time span of 2010-2018. A total of 41 key authors were selected based on the frequency of citation. We created a co-citation matrix for the core authors, and performed multivariate analysis such as cluster analysis and multidimensional scaling. We also conducted social network analysis to find the influential researchers in digital twin research. Findings We identified four major sub- areas of digital twin research: "Infrastructure", "Prospects and Challenges", "Security", and "Smart Manufacturing". We also identified the most influential researchers in digital twin research: Lee EA, Rajkumar R, Wan J, Karnouskos S, Kim K, and Cardenas AA. Limitation and further research suggestion were also discussed as a concluding remarks.

제조업체의 CRM 동향 및 선진사례

  • 강신길
    • Proceedings of the CALSEC Conference
    • /
    • 2001.08a
    • /
    • pp.559-576
    • /
    • 2001
  • ㆍ선별된 고객으로부터 수익을 창출하고 장기적인 고객관계를 가능하게 하는 솔루션 (Oracle) ㆍ자사의 고객이 누구인지, 고객이 무엇을 원하는지를 파악하여 고객이 원하는 제품과 서비스를 지속적으로 제공함으로써 고객을 오래 유지시키고 이를 통해 고객의 평생가치를 극대화하여 수익성을 높이는 통합된 고객관계 관리 프로세스 (siebel) ㆍ수익 매출 그리고 고객만족은 극대화 하기 위해 정교하게 계획된 비즈니스 전락(Gartner Croup) ㆍ개별 임직원 및 마케팅 종사자, 그리고 고객으로부터 조직에 대한 긍적적 선호도를 획득함으로서 고객보유율과 경영 성과 모두를 향상시키는 경영전락(LG-EDS)(중략)

  • PDF

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

Usability Evaluation Method for SOA Software (SOA 소프트웨어의 사용성 평가 방법)

  • Lee, Sang-Hyo;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1575-1584
    • /
    • 2009
  • Improvement of service quality and to be caused by with high re-use result expandability, the importance of SOA softwares to be coming to be high recently, according to the [thu] your (Gartner) group from 2006 until 2011 CAGR (yearly average complex growth rate: Compound it is a tendency where in Annual Growth Rate) these 35% the domestic and foreign SOA software markets are increasing suddenly at this degree. It follows hereupon and in about quality rating of SOA softwares the demand is augmented in about development of the quality rating method which it follows international standard. In order to evaluate the use characteristic quality of SOA softwares a quality and about the use frost requirement from the research which it sees and escape with the scale box it examined it measured and in about the method which it decides and an evaluation instance a research the result according to the standard which is appropriate it accomplished it presented. The research which it sees it leads and it induces strategic engineering development it leads and with the fact that it will be the possibility of raising an objectivity and an application degree it expects the use characteristic quality increase of SOA softwares.

Is it Possible to predict the Characteristics of Calcific Deposition in Calcific Tendinitis of Shoulder Joint? (단순 방사선 검사를 이용하여 석회성 건염에서 발생하는 석회 침착물의 성상에 대한 예측이 가능한가?)

  • Kim, Sung-Jae;Lee, Hee Jae;Lee, Kwang-Hyun;Park, Dong-Hyeok;Lee, Bong Geun
    • The Journal of Korean Orthopaedic Ultrasound Society
    • /
    • v.7 no.2
    • /
    • pp.77-83
    • /
    • 2014
  • Purpose: The purpose of current study was to evaluate the validity of the existing radiological classifications as a diagnostic modality for predicting characteristics of calcific deposition in calcific tendinitis of the shoulder joint. For that purpose, we determined the inter-observer reliability for evaluating diagnostic precisions of the classification and also evaluated diagnostic accuracy of predicting the toothpaste type calcific deposition. Materials and Methods: We performed retrospective study with total 26 patients surgically treated with calcific tendinitis of the shoulder joint from March 2010 to October 2013. Two independent observers reviewed preoperative radiographs of shoulder joints, and classified the characteristics of calcific depositions according to the criteria of Gartner, DePalma and Patte. Cohen's kappa were calculated for each classifications to evaluate inter-observer reliability. Sensitivity, specificity, positive likelihood ratio, negative likelihood ratio and diagnostic odds ratio were determined for type of calcific depositions with Gartner type III, DePalma type I, and Patte type II for predicting toothpaste type calcific deposition. Results: The values of Cohen's kappa were the highest in the classification of Patte, 0.62, and the values for the classifications of DePalma and Gartner were 0.56 and 0.36, respectively. The sensitivities for predicting toothpaste type calcific deposition in Gartner Type III, DePalma type I and Patte type II were 83.3%, 91.7%, and 58.3%, respectively. Specificities were 85.7% 50.0% and 64%, positive likelihood ratios were 5.833, 1.833 and 1.633, negative likelihood ratios were 0.194, 0.167 and 0.648, and diagnostic odds ratios were 30.00, 11.00 and 2.52, respectively. Conclusion: There were no radiologic classifications of calcific tendinitis which has both high precision and accuracy. Further studies with other diagnostic modalities such as ultrasonography are needed for predicting characteristics of calcific deposition in calcific tendinitis of the shoulder joint.

  • PDF

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF