• Title/Summary/Keyword: IT Convergence Business Model

Search Result 512, Processing Time 0.021 seconds

A Research of Cultural Heritage and Business Value of the Juk-Bang-Ryeum(Fishing Instrument made-by Bamboo Weir) (죽방렴의 문화유산적 가치와 비즈니스적 가치 탐색 연구)

  • Kang, Myeong Hwa;Lee, Kyung-Joo;Kwon, Hojong;Jeong, Dae-Yul
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.12
    • /
    • pp.425-435
    • /
    • 2018
  • The purpose of this study is to investigate the cultural value as well as business value of Juk-Bang-Ryeum(fishing instrument made by bamboo weir) by the investigation of remains in Gyeongnam Sacheon area and reviewing various historical literatures. The research will contribute to make back data necessary for the registration of World Heritage(UNESCO) and Globally Important Agricultural Heritage Systems(FAO). Fisheries, along with agriculture, have been great significance in human history. In particular, the Fisheries has been considered very important industry due to the geopolitical characteristics of our country surrounded by the sea. We can imagine may types of fishing practices and instruments at the agricultural age. Nonetheless, there are a few fishery heritages such as collecting and hunting tools that remains today. Fortunately, there are many Juk-Bang-Ryeum which is actually operate now from the past 500 years ago at the The Sacheon and Namhae areas. We could found some literature records about it in the historical ancient literatures. We could also infer that Juk-Bang-Ryeum was an important fishery resource of the country for a long time. It was built on the basis of scientific principles to capture fishes using the rapid tide of the natural geological straits, and it prove the wisdom of our ancestors. We also could found some unique cultural heritages that was important to the local community. Naturally, it has been managed as an important asset for the residents. In addition to such historical and humanistic values, it also has business and educational value. It can be useful to understand scientific fishery principles as well as fishery experience field. It has business value as an important tourism resource in the region in connection with historical relics and geological environment resources. In conclusion, it is a valuable asset to be handed down as a valuable cultural heritage.

A Study on the Scale Effort Estimation Model based on Industry Characteristics (산업별 특성에 따른 소요공수 규모 산정 모델 연구)

  • Kwoak, Song-Hae;Park, Koo-Rack;Kim, Dong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.233-240
    • /
    • 2016
  • Information system development projects, have a mechanism for many of the costs generated by a variety of risk factors. In general, the probability that the software project of the information system is carried out successfully in the delivery time is very low. This prediction of a formal cost is needed as the most important factor since it can prevent the project from being failed. However, objectivity of most of the project scale calculation during the calculation criteria is insufficient. Further, it is the actual situation that the management of the base line is not properly made during the project. Therefore, in this paper, we propose a model to calculate the number of steps it takes to develop on the basis of a methodology in an attempt to overcome the limitation of being unpractical in the early stage of the information system development project. It is expected to be a tool to estimate the effort and cost required by the information system development business through these convergence proposals model.

ON LIMIT BEHAVIOURS FOR FELLER'S UNFAIR-FAIR-GAME AND ITS RELATED MODEL

  • An, Jun
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.6
    • /
    • pp.1185-1201
    • /
    • 2022
  • Feller introduced an unfair-fair-game in his famous book [3]. In this game, at each trial, player will win 2k yuan with probability pk = 1/2kk(k + 1), k ∈ ℕ, and zero yuan with probability p0 = 1 - Σk=1 pk. Because the expected gain is 1, player must pay one yuan as the entrance fee for each trial. Although this game seemed "fair", Feller [2] proved that when the total trial number n is large enough, player will loss n yuan with its probability approximate 1. So it's an "unfair" game. In this paper, we study in depth its convergence in probability, almost sure convergence and convergence in distribution. Furthermore, we try to take 2k = m to reduce the values of random variables and their corresponding probabilities at the same time, thus a new probability model is introduced, which is called as the related model of Feller's unfair-fair-game. We find out that this new model follows a long-tailed distribution. We obtain its weak law of large numbers, strong law of large numbers and central limit theorem. These results show that their probability limit behaviours of these two models are quite different.

Implementation of Pre-Post Process for Accuraty Improvement of OCR Recognition Engine Based on Deep-Learning Technology (딥러닝 기반 OCR 인식 엔진의 정확도 향상을 위한 전/후처리기 기술 구현)

  • Jang, Chang-Bok;Kim, Ki-Bong
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.163-170
    • /
    • 2022
  • With the advent of the 4th Industrial Revolution, solutions that apply AI technology are being actively developed. Since 2017, the introduction of business automation solutions using AI-based Robotic Process Automation (RPA) has begun in the financial sector and insurance companies, and recently, it is entering a time when it spreads past the stage of introducing RPA solutions. Among the business automation using these RPA solutions, it is very important how accurately textual information in the document is recognized for business automation using various documents. Such character recognition has recently increased its accuracy by introducing deep learning technology, but there is still no recognition model with perfect recognition accuracy. Therefore, in this paper, we checked how much accuracy is improved when pre- and post-processor technologies are applied to deep learning-based character recognition engines, and implemented RPA recognition engines and linkage technologies.

Determining How Image of Social Media Influencers Affect Korean Food Purchase Behavior in China: An Image Transfer Perspective

  • Zong-Yi Zhu;Hyeon-Cheol Kim
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.127-134
    • /
    • 2023
  • Existing studies on this topic have focused on the effect of online content quality on consumer attitudes and behavior, with very few illustrating the effect of influencer image on consumer attitudes and behavior. The purpose of this study intents to reveal how influencer image affect consumer behavior. We have developed an image transfer theory-based research model to reveal how influencers transfer their image to endorsed products to influence consumer behavior. The results show that influencer image positively affects satisfaction, which in turn affects the product's cognitive and affective images in the vlog. Moreover, it was found that a product's cognitive image and affective image influence consumer behavior intention. Furthermore, purchase experience exhibits significant differences in its path. Based on these results, the social media-related research theoretical implication will be offered, and managerial implications will be provided for foreign brand promotion strategies

A Study on Insider Behavior Scoring System to Prevent Data Leaks

  • Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.77-86
    • /
    • 2015
  • The organization shall minimize business risks associated with customer information leaks. Enhance information security activities through voluntary pre-check and must find a way to detect the personal information leakage caused by carelessness and neglect accident. Recently, many companies have introduced an information leakage prevention solution. However, there is a possibility of internal data leakage by the internal user who has permission to access the data. By this thread it is necessary to have the environment to analyze the habit and activity of the internal user. In this study, we use the SFI analytical technique that applies RFM model to evaluate the insider activity levels were carried out case studies is applied to the actual business.

An Empirical Study of the Factors Influencing the Task Performances of SaaS Users

  • Park, Sung Bum;Lee, Sangwon;Chae, Seong Wook;Zo, Hangjung
    • Asia pacific journal of information systems
    • /
    • v.25 no.2
    • /
    • pp.265-288
    • /
    • 2015
  • IT convergence services, as the main stream of the digital age, are currently on their way to include the concept of Software as a Service (SaaS), where IT products and services are integrated as one. In particular, the recently introduced web-service-based SaaS is expected to be a more developed SaaS model. This new model provides greater influence on clients' job performances than its previous models, such as application service providers and the web-native phase. However, the effects of technology maturity on task performance have been overlooked in adoption and performance studies. Accordingly, this study introduces SaaS technology maturity as the exogenous technological characteristic influencing job performance. This study also examines the relationships among various SaaS-related performances according to the different levels of SaaS maturity. Results suggest that applying innovative technologies (such as SaaS), particularly when the technology reaches a certain level of maturity, is more helpful for managers in improving task-technology fit and job performance. This study makes an academic contribution by establishing and validating a performance model empirically with SaaS technology maturity perspectives.

The method of using database technology to process rules of Rule-Based System

  • Zheng, Baowei;Yeo, Jeong-Mo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.89-94
    • /
    • 2010
  • The most important of rule-base system is the knowledge base that determines the power of rule-base system. The important form of this knowledge is how to descript kinds of rules. The Rule-Base System (RBS) has been using in many field that need reflect quickly change of business rules in management system. As far, when develop the Rule-Based System, we must make a rule engine with a general language. There are three disadvantage of in this developed method. First, while there are many data that must be processed in the system, the speed of processing data will become very slow so that we cannot accept it. Second, we cannot change the current system to make it adaptive to changes of business rules as quickly as possible. Third, large data make the rule engine become very complex. Therefore, in this paper, we propose the two important methods of raising efficiency of Rule-Base System. The first method refers to using the Relational database technology to process the rules of the Rule-Base System, the second method refers to a algorithm of according to Quine McCluskey formula compress the rows of rule table. Because the expressive languages of rule are still remaining many problems, we will introduce a new expressive language, which is Rule-Base Data Model short as RBDM in this paper.

A Designing Method of Software Architecture for Information Security Business Model Selection using BMO Technique Base (BMO기법을 활용한 정보보안 비즈모델 평가시스템 소프트웨어 아키텍쳐 설계방법)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.71-77
    • /
    • 2013
  • In our country security industry biz model analysis methodology fragmentary theory exists, but it is hard to find a comprehensive analysis methodology. Biz model analysis IT companies the external factors and internal factors to integrate the information gathered about the comprehensive analysis of the development of an information system are required. Information support system early in the software architecture of the system design decisions early decision as the design, development, testing, maintenance, has a lasting impact on the project as a guideline in the development of a framework of design abstraction. BMO evaluation support information systems architecture designs system purposes. The mission must support the execution. Information system stakeholders to determine the mission and the environment. All information systems architecture shall have architecture. Technology architecture should be documented with each other can be used. Determine the architecture based architecture descriptions are presented.

The Study on Corporate Information Security Governance Model for CEO (최고경영자를 위한 기업 정보보호 거버넌스 모델에 대한 연구)

  • Kim, Do Hyeong
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.39-44
    • /
    • 2017
  • The existing enterprise information security activities were centered on the information security organization, and the top management considers information security and enterprise management to be separate. However, various kinds of security incidents are constantly occurring. In order to cope with such incidents, it is necessary to protect information in terms of business management, not just information security organization. In this study, we examine the existing corporate governance and IT governance, and present an information security governance model that can reflect the business goals of the enterprise and the goals of the management. The information security governance model proposed in this paper induces the participation of top management from the planning stage and establishes information security goals. We can strengthen information security activities by establishing an information security plan, establishing and operating an information security system, and reporting the results to top management through compliance audit, vulnerability analysis and risk management.