• Title/Summary/Keyword: Intelligence information technology

Search Result 1,945, Processing Time 0.034 seconds

The Classification System and Information Service for Establishing a National Collaborative R&D Strategy in Infectious Diseases: Focusing on the Classification Model for Overseas Coronavirus R&D Projects (국가 감염병 공동R&D전략 수립을 위한 분류체계 및 정보서비스에 대한 연구: 해외 코로나바이러스 R&D과제의 분류모델을 중심으로)

  • Lee, Doyeon;Lee, Jae-Seong;Jun, Seung-pyo;Kim, Keun-Hwan
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.127-147
    • /
    • 2020
  • The world is suffering from numerous human and economic losses due to the novel coronavirus infection (COVID-19). The Korean government established a strategy to overcome the national infectious disease crisis through research and development. It is difficult to find distinctive features and changes in a specific R&D field when using the existing technical classification or science and technology standard classification. Recently, a few studies have been conducted to establish a classification system to provide information about the investment research areas of infectious diseases in Korea through a comparative analysis of Korea government-funded research projects. However, these studies did not provide the necessary information for establishing cooperative research strategies among countries in the infectious diseases, which is required as an execution plan to achieve the goals of national health security and fostering new growth industries. Therefore, it is inevitable to study information services based on the classification system and classification model for establishing a national collaborative R&D strategy. Seven classification - Diagnosis_biomarker, Drug_discovery, Epidemiology, Evaluation_validation, Mechanism_signaling pathway, Prediction, and Vaccine_therapeutic antibody - systems were derived through reviewing infectious diseases-related national-funded research projects of South Korea. A classification system model was trained by combining Scopus data with a bidirectional RNN model. The classification performance of the final model secured robustness with an accuracy of over 90%. In order to conduct the empirical study, an infectious disease classification system was applied to the coronavirus-related research and development projects of major countries such as the STAR Metrics (National Institutes of Health) and NSF (National Science Foundation) of the United States(US), the CORDIS (Community Research & Development Information Service)of the European Union(EU), and the KAKEN (Database of Grants-in-Aid for Scientific Research) of Japan. It can be seen that the research and development trends of infectious diseases (coronavirus) in major countries are mostly concentrated in the prediction that deals with predicting success for clinical trials at the new drug development stage or predicting toxicity that causes side effects. The intriguing result is that for all of these nations, the portion of national investment in the vaccine_therapeutic antibody, which is recognized as an area of research and development aimed at the development of vaccines and treatments, was also very small (5.1%). It indirectly explained the reason of the poor development of vaccines and treatments. Based on the result of examining the investment status of coronavirus-related research projects through comparative analysis by country, it was found that the US and Japan are relatively evenly investing in all infectious diseases-related research areas, while Europe has relatively large investments in specific research areas such as diagnosis_biomarker. Moreover, the information on major coronavirus-related research organizations in major countries was provided by the classification system, thereby allowing establishing an international collaborative R&D projects.

Intents of Acquisitions in Information Technology Industrie (정보기술 산업에서의 인수 유형별 인수 의도 분석)

  • Cho, Wooje;Chang, Young Bong;Kwon, Youngok
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.123-138
    • /
    • 2016
  • This study investigates intents of acquisitions in information technology industries. Mergers and acquisitions are a strategic decision at corporate-level and have been an important tool for a firm to grow. Plenty of firms in information technology industries have acquired startups to increase production efficiency, expand customer base, or improve quality over the last decades. For example, Google has made about 200 acquisitions since 2001, Cisco has acquired about 210 firms since 1993, Oracle has made about 125 acquisitions since 1994, and Microsoft has acquired about 200 firms since 1987. Although there have been many existing papers that theoretically study intents or motivations of acquisitions, there are limited papers that empirically investigate them mainly because it is challenging to measure and quantify intents of M&As. This study examines the intent of acquisitions by measuring specific intents for M&A transactions. Using our measures of acquisition intents, we compare the intents by four acquisition types: (1) the acquisition where a hardware firm acquires a hardware firm, (2) the acquisition where a hardware firm acquires a software/IT service firm, (3) the acquisition where a software/IT service firm acquires a hardware firm, and (4) the acquisition where a software /IT service firm acquires a software/IT service firm. We presume that there are difference in reasons why a hardware firm acquires another hardware firm, why a hardware firm acquires a software firm, why a software/IT service firm acquires a hardware firm, and why a software/IT service firm acquires another software/IT service firm. Using data of the M&As in US IT industries, we identified major intents of the M&As. The acquisition intents are identified based on the press release of M&A announcements and measured with four categories. First, an acquirer may have intents of cost saving in operations by sharing common resources between the acquirer and the target. The cost saving can accrue from economies of scope and scale. Second, an acquirer may have intents of product enhancement/development. Knowledge and skills transferred from the target may enable the acquirer to enhance the product quality or to expand product lines. Third, an acquirer may have intents of gain additional customer base to expand the market, to penetrate the market, or to enter a foreign market. Fourth, a firm may acquire a target with intents of expanding customer channels. By complementing existing channel to the customer, the firm can increase its revenue. Our results show that acquirers have had intents of cost saving more in acquisitions between hardware companies than in acquisitions between software companies. Hardware firms are more likely to acquire with intents of product enhancement or development than software firms. Overall, the intent of product enhancement/development is the most frequent intent in all of the four acquisition types, and the intent of customer base expansion is the second. We also analyze our data with the classification of production-side intents and customer-side intents, which is based on activities of the value chain of a firm. Intents of cost saving operations and those of product enhancement/development can be viewed as production-side intents and intents of customer base expansion and those of expanding customer channels can be viewed as customer-side intents. Our analysis shows that the ratio between the number of customer-side intents and that of production-side intents is higher in acquisitions where a software firm is an acquirer than in the acquisitions where a hardware firm is an acquirer. This study can contribute to IS literature. First, this study provides insights in understanding M&As in IT industries by answering for question of why an IT firm intends to another IT firm. Second, this study also provides distribution of acquisition intents for acquisition types.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

Application of Amplitude Demodulation to Acquire High-sampling Data of Total Flux Leakage for Tendon Nondestructive Estimation (덴던 비파괴평가를 위한 Total Flux Leakage에서 높은 측정빈도의 데이터를 획득하기 위한 진폭복조의 응용)

  • Joo-Hyung Lee;Imjong Kwahk;Changbin Joh;Ji-Young Choi;Kwang-Yeun Park
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.2
    • /
    • pp.17-24
    • /
    • 2023
  • A post-processing technique for the measurement signal of a solenoid-type sensor is introduced. The solenoid-type sensor nondestructively evaluates an external tendon of prestressed concrete using the total flux leakage (TFL) method. The TFL solenoid sensor consists of primary and secondary coils. AC electricity, with the shape of a sinusoidal function, is input in the primary coil. The signal proportional to the differential of the input is induced in the secondary coil. Because the amplitude of the induced signal is proportional to the cross-sectional area of the tendon, sectional loss of the tendon caused by ruptures or corrosion can be identified by the induced signal. Therefore, it is important to extract amplitude information from the measurement signal of the TFL sensor. Previously, the amplitude was extracted using local maxima, which is the simplest way to obtain amplitude information. However, because the sampling rate is dramatically decreased by amplitude extraction using the local maxima, the previous method places many restrictions on the direction of TFL sensor development, such as applying additional signal processing and/or artificial intelligence. Meanwhile, the proposed method uses amplitude demodulation to obtain the signal amplitude from the TFL sensor, and the sampling rate of the amplitude information is same to the raw TFL sensor data. The proposed method using amplitude demodulation provides ample freedom for development by eliminating restrictions on the first coil input frequency of the TFL sensor and the speed of applying the sensor to external tension. It also maintains a high measurement sampling rate, providing advantages for utilizing additional signal processing or artificial intelligence. The proposed method was validated through experiments, and the advantages were verified through comparison with the previous method. For example, in this study the amplitudes extracted by amplitude demodulation provided a sampling rate 100 times greater than those of the previous method. There may be differences depending on the given situation and specific equipment settings; however, in most cases, extracting amplitude information using amplitude demodulation yields more satisfactory results than previous methods.

A Study on Recent Research Trend in Management of Technology Using Keywords Network Analysis (키워드 네트워크 분석을 통해 살펴본 기술경영의 최근 연구동향)

  • Kho, Jaechang;Cho, Kuentae;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.101-123
    • /
    • 2013
  • Recently due to the advancements of science and information technology, the socio-economic business areas are changing from the industrial economy to a knowledge economy. Furthermore, companies need to do creation of new value through continuous innovation, development of core competencies and technologies, and technological convergence. Therefore, the identification of major trends in technology research and the interdisciplinary knowledge-based prediction of integrated technologies and promising techniques are required for firms to gain and sustain competitive advantage and future growth engines. The aim of this paper is to understand the recent research trend in management of technology (MOT) and to foresee promising technologies with deep knowledge for both technology and business. Furthermore, this study intends to give a clear way to find new technical value for constant innovation and to capture core technology and technology convergence. Bibliometrics is a metrical analysis to understand literature's characteristics. Traditional bibliometrics has its limitation not to understand relationship between trend in technology management and technology itself, since it focuses on quantitative indices such as quotation frequency. To overcome this issue, the network focused bibliometrics has been used instead of traditional one. The network focused bibliometrics mainly uses "Co-citation" and "Co-word" analysis. In this study, a keywords network analysis, one of social network analysis, is performed to analyze recent research trend in MOT. For the analysis, we collected keywords from research papers published in international journals related MOT between 2002 and 2011, constructed a keyword network, and then conducted the keywords network analysis. Over the past 40 years, the studies in social network have attempted to understand the social interactions through the network structure represented by connection patterns. In other words, social network analysis has been used to explain the structures and behaviors of various social formations such as teams, organizations, and industries. In general, the social network analysis uses data as a form of matrix. In our context, the matrix depicts the relations between rows as papers and columns as keywords, where the relations are represented as binary. Even though there are no direct relations between papers who have been published, the relations between papers can be derived artificially as in the paper-keyword matrix, in which each cell has 1 for including or 0 for not including. For example, a keywords network can be configured in a way to connect the papers which have included one or more same keywords. After constructing a keywords network, we analyzed frequency of keywords, structural characteristics of keywords network, preferential attachment and growth of new keywords, component, and centrality. The results of this study are as follows. First, a paper has 4.574 keywords on the average. 90% of keywords were used three or less times for past 10 years and about 75% of keywords appeared only one time. Second, the keyword network in MOT is a small world network and a scale free network in which a small number of keywords have a tendency to become a monopoly. Third, the gap between the rich (with more edges) and the poor (with fewer edges) in the network is getting bigger as time goes on. Fourth, most of newly entering keywords become poor nodes within about 2~3 years. Finally, keywords with high degree centrality, betweenness centrality, and closeness centrality are "Innovation," "R&D," "Patent," "Forecast," "Technology transfer," "Technology," and "SME". The results of analysis will help researchers identify major trends in MOT research and then seek a new research topic. We hope that the result of the analysis will help researchers of MOT identify major trends in technology research, and utilize as useful reference information when they seek consilience with other fields of study and select a new research topic.

Quality management direction in the 4th industrial revolution era (제4차 산업혁명시대에서의 품질경영 방향)

  • Baik, Jaiwook
    • Industry Promotion Research
    • /
    • v.5 no.4
    • /
    • pp.1-13
    • /
    • 2020
  • Since the 4th industrial revolution was thrown into the world at the Davos World Economic Forum in January 2016, the world has been undergoing major social and economic changes. In this study, the direction of quality management in the 4th industrial revolution era was examined. First, in all the major countries the industrial structural changes and smart business models were confirmed due to the convergence of new ICT such as IoT, robotics, 3D printing, big data, and AI with the existing technologies and industries. Second, we found that although the core technology level of the 4th industrial revolution in Korea is not as good as that of advanced countries, we have been working on expanding smart production methods and creating new industries by utilizing new ICT. Finally, it was confirmed that quality management is a real-time implementation of new ICT that reflects the needs of the market in real time based on big data from the planning and design stage of products or services.

Horticultural Activity Interventions and Outcomes: A Review

  • Park, Sin-Ae;Lee, A-Young;Lee, Geung-Joo;Kim, Dae-Sik;Kim, Wan Soon;Shoemaker, Candice A.;Son, Ki-Cheol
    • Horticultural Science & Technology
    • /
    • v.34 no.4
    • /
    • pp.513-527
    • /
    • 2016
  • The objective of the present study was to review the current research about the outcomes of horticultural activity interventions in order to determine research trends and analyze the characteristics of horticultural activity interventions. We reviewed the literature using search engines such as the Web of Science, Proquest Dissertation and Theses, Academic Search Premier, Research Information sharing Service, and Korean National Assembly Digital Library to locate journal articles that include relevant search terms (e.g., gardening activity, gardening program, allotment garden, urban agriculture, horticultural therapy, and horticultural activity). We initially identified 14,414 journal articles that were published before April 2014 and selected 509 of the papers for review. We found that studies investigating treating children and adults 8 to 64 years old were the most common, and horticultural activities such as gardening outdoors, planting indoors, making crafts with live plants, arranging flowers, making crafts with artificial or pressed flowers, and other activities were usually combined. Short/medium term (11 to 20 sessions) horticultural activity programs were the most frequent, and most interventions were of medium duration (> 60 min to 120 min). Most of the studies focused on the psychological or emotional effects of horticultural intervention, such as its effects on emotional intelligence, self-esteem, stress, and depression. Further studies are needed to analyze the research methodology, specific outcomes, and strengths or weaknesses of studies investigating horticultural activity interventions.

A Study on a Historical Context of the Design Methodology Movement With an Emphasis on Its relations to Cyborg Sciences (디자인 방법론의 역사적 맥락에 대한 연구 - 사이보그 과학과의 관계를 중심으로 -)

  • Park, Hae-Cheon
    • Archives of design research
    • /
    • v.19 no.5 s.67
    • /
    • pp.105-118
    • /
    • 2006
  • From a general perspective of design history, the design methodology movement is interpreted in relations to the rationalistic and universal characteristics of modernism. This essay explores a historical context of the movement, focusing on its discursive and practical relations to cyborg sciences that has been shaped by the research and development of military technology in Cold War America. The formation of such relations could be largely devided into two processes: One is the process in which methods and techniques of system science that included operation research, system analysis, and system engineering, were appropriated by the first generation methodologists who had tried to establish "the science of design", and the other is the one in which Herbert Simon's studies on problem solving and artificial intelligence became profoundly embedded in theoretical frameworks of design methodology after the first generation. Examining such processes critically, this essay argues that a design process became finally redefined by the third generation methodology, as a 'feedback loop' of circulation of production and consumption, that is, an apparatus of information-processing which gives a concrete form to the "invisible hand" of markets.

  • PDF

Sari Case Design & Strategy Study (목(나전)칠기 사리(舍利)용기의 조형디자인 연구)

  • Kim, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.192-200
    • /
    • 2009
  • Market in the 21st century innovative products is not the same as marketing traditional products and services. Whether for survival or to sustain market leadership, Design Marketing Strategy is the key in the new era of world competition. Design Strategies are also more critical issues in the future, because most business and firms depend on successful design project. In order to effectively bring creative professional output to market, design leaders who can use design intelligence to shape the future of their organizations and business must evidence marketing strategy technology, creative and managerial skill. Design Management links design and related business activities into a creative and coordinated strategy for creating value and sustainable advantage for the firm. Design education has focused primarily in the training of professional designers within their specific disciplines. But it dose not provide training in the management skills necessary to effectively lead a design project team. Most design colleges do not provide any integrated education in leadership and team building, strategy, finance, marketing or project management. This is the time that Design Management Program should be prepared to provide design students who want to manage design project in creative industry. The program has to be prepared to provide all the business skills and information that design students need to know in an upper-level undergraduate school. The Program's goal is to graduate design leaders able to strategically manage a design project for the challenge of managing in the 21st century.

A Study on a Plan for Adaptation according to the Change of a Bodyguard's Social Cognition (경호직 근무자의 업무능력 증대방안에 관한 고찰)

  • Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.65-83
    • /
    • 2004
  • In modern society, the enterprises or the public organization have devised consistent means and methods with keen competition in high intelligence, high specialization and high competition for surviving in the struggle for existence. In the rapidly changing modern society like that, guard services are not free any more in the simple business. It will be survived only with consistent self-development and various abilities. Recently, it is on a trend that the enterprise including venture business requires the man of ability having many-sided thought, knowledge and capacity. That is, the era of a man with multi-function has come. The guards engaged in their present posts have to make efforts self-development consistently. And they have to work for self-development with theoretical knowledge acquirement about the expert knowledge escaping from simple function and business. The constitution including universities that train the guard should not adjust to the demand of quantitative manpower required in the enterprise organization with the training of the guard with simple functions only. It needs settlement as a curriculum with technology like ideology and knowledge breaking from short curriculum centered on function only in order to come to stay the recognition about guard services as expert services that the industrial society requires. The education centered on simple function should be replaced in the use of a high school, private academy and special guard institution. In addition, it requires a quality as the auxiliary, division, decision-making and spokesman according to the business role. Also, it requires the martial arts capacity, the communicative capacity, the sports or reports capacity, the guard driving capacity, the policy and assistant capacity and the information and analysis capacity, etc in individual. Lastly, it need each guard's change of cognition most of all. As part of the guard's adaptive plan according to the social change, it was enumerated like the mentioned above. It is important for the guard to prepare for the change of era and to build up quality and capacity before anything else.

  • PDF