• Title/Summary/Keyword: Intelligence information technology

Search Result 1,965, Processing Time 0.033 seconds

Empirical Analysis of the Effects of Service Quality of the Smartphone App Store on Users' Repurchase Intention (스마트폰 앱 스토어의 서비스 품질이 재구매 의도에 미치는 요인에 관한 실증연구)

  • Lee, Myung Moo;Lee, Kun Chang
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.1-18
    • /
    • 2015
  • Recent trends of mobile convergence has already brought about many changes in our digitally-powered society. Especially, taking advantage of strengths of existing mobile devices and smart phones have already been established as a primary standard in the business intelligence world. Such high-powered digital devices equipped with mobile convergence functions are getting more momentum as app stores are prevailing. Basically, the app stores are administered by smart phone manufacturers, creating a new business ecosystem among app developers and end-users. However, there are paucity of studies tackling an issue about how users' repurchase intention of the apps is influenced by the service qualities of the app stores. In this respect, this study aims to investigate the effect of app store service quality on users' satisfaction and repurchase intention. As the value of loyal customers is incomparably high in app commerce, winning customers' loyalty is vital to the success of app stores. In this study, a customer is defined as one who has purchased goods or services at least once from the app stores. The proposed research model includes a number of constructs such as app perceptions, customer service, perceived ease of use, design, promotion, perceived consumer risk and connectivity. Empirical results revealed that perceived consumer risk has a negative relationship with consumer's perceived repurchase intention. All the other variables-app perceptions, customer service, perceived ease of use, design, promotion, connectivity- are found to be positively related with the repurchase intentions.

Analysis of Effect of Surface Temperature Rise Rate of 72.5 Ah NCM Pouch-type Lithium-ion Battery on Thermal Runaway Trigger Time (72.5 Ah NCM계 파우치형 리튬이온배터리의 표면온도 상승률이 열폭주 발생시간에 미치는 영향 분석)

  • Lee, Heung-Su;Hong, Sung-Ho;Lee, Joon-Hyuk;Park, Moon Woo
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.5
    • /
    • pp.1-9
    • /
    • 2021
  • With the convergence of the information and communication technologies, a new age of technological civilization has arrived. This is the age of intelligent revolution, known as the 4th industrial revolution. The 4th industrial revolution is based on technological innovations, such as robots, big data analysis, artificial intelligence, and unmanned transportation facilities. This revolution would interconnect all the people, things, and economy, and hence will lead to the expansion of the industry. A high-density, high-capacity energy technology is required to maintain this interconnection. As a next-generation energy source, lithium-ion batteries are in the spotlight today. However, lithium-ion batteries can cause thermal runaway and fire because of electrical, thermal, and mechanical abuse. In this study, thermal runaway was induced in 72.5 Ah NCM pouch-type lithium-ion batteries because of thermal abuse. The surface of the pouch-type lithium-ion batteries was heated by the hot plate heating method, and the effect of the rate of increase in the surface temperature on the thermal runaway trigger time was analyzed using Minitab 19, a statistical analysis program. The correlation analysis results confirmed that there existed a strong negative relationship between each variable, while the regression analysis demonstrated that the thermal runaway trigger time of lithium-ion batteries can be predicted from the rate of increase in their surface temperature.

Real Time SW Sizing Model for FP-Based Fintech Software Development Project (FP 기반의 핀테크 소프트웨어 개발 프로젝트 실시간 규모 산정 모델)

  • Koo, Kyung-Mo;Yoon, Byung-Un;Kim, Dong-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.36-44
    • /
    • 2021
  • Estimation on SW Sizing applied to fintech is very difficult, a task requiring long time, it is difficult for client companies and developer companies to accurately calculate the size of software development. The size is generally estimated based on the experience of project managers and the general functional scoring method. In this paper, propose a model that can be applied to fintech development projects by quantitatively calculating the required functions from the user's point of view, measuring the scale, and calculating the scale in real time. Through the proposed model, the amount of work can be estimated prior to development and the size can be measured, and the M/M and the estimated quotation amount can be calculated based on the program list by each layer. In future studies, by securing size computation data on existing the Fintech Project in mass, research on accurate size computation would be required.

Clasification of Cyber Attack Group using Scikit Learn and Cyber Treat Datasets (싸이킷런과 사이버위협 데이터셋을 이용한 사이버 공격 그룹의 분류)

  • Kim, Kyungshin;Lee, Hojun;Kim, Sunghee;Kim, Byungik;Na, Wonshik;Kim, Donguk;Lee, Jeongwhan
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.165-171
    • /
    • 2018
  • The most threatening attack that has become a hot topic of recent IT security is APT Attack.. So far, there is no way to respond to APT attacks except by using artificial intelligence techniques. Here, we have implemented a machine learning algorithm for analyzing cyber threat data using machine learning method, using a data set that collects cyber attack cases using Scikit Learn, a big data machine learning framework. The result showed an attack classification accuracy close to 70%. This result can be developed into the algorithm of the security control system in the future.

End-to-end Delay Guarantee in IEEE 802.1 TSN with Non-work conserving scheduler (비작업보존 스케줄러를 갖는 IEEE 802.1 TSN에서 단대단 지연시간 보장)

  • Joung, Jinoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.121-126
    • /
    • 2018
  • IEEE 802.1 TSN TG is developing standards for end-to-end delay bounds and zero packet loss based on Ethernet technology. We focus on packet forwarding techniques. TSN packet forwarding techniques can be classified into Synchronous and Asynchronous framework. Synchronous approach allocates fixed time period for a class, yet is complex for large networks. Asynchronous approach provides delay guarantee by regulator-scheduler pair, yet is unnecessarily complex, too. We propose network components for TSN Asynchronous architecture, which remove the complexity of maintaining flow state for regulation decisions. Despite such a simplicity, the proposed architecture satisfies the TSN's delay requirements provided the limited high priority traffic's maximum packet length.

Policy Suggestions on Personal Data Utilization by Analyzing Domestic and International De-identification Policy (국내외 비식별화 현황 분석을 통한 개인정보 활용 정책 제언)

  • Kang, Hye-young;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.41-48
    • /
    • 2019
  • In the era of Internet of Things and Artificial Intelligence, it has become essential to digitize mass data, which leads 'data-driven economy'. Digitalized personal data can be easily collected, stored, duplicated and analyzed. As ICT technology is evolving the concept of traditional personal data has changed. The United States, the European Union, Japan, Korea and many countries have introduced new concept of personal data into law such as de-identification, anonymization, and pseudonymization to protect and utilize digitalized personal information. These concepts are distinguishable depending on countries. Therefore, this study will be done by researching and analyzing personal data related policies of several countries. Based on this study, this paper will suggest policy on di-identification to draw the right balance between personal data protection and use, which contributes to the development of digital economy.

Development of ITB Risk Mgt. Model Based on AI in Bidding Phase for Oversea EPC Projects (플랜트 EPC 해외 사업을 위한 입찰단계 시 AI 기반의 ITB Risk 관리 모델 개발)

  • Lee, Don-Hee;Yoon, Gun-Ho;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.151-160
    • /
    • 2019
  • EPC companies to continue operating overseas, it is increasingly becoming apparent that risk is no longer something to be avoided but a subject to be managed. During the bidding stage, the requirements, specifications and project line items within the bid package must be studied in details to analyze the various risk factors in order to avoid cost overruns. However, reviewing vast quantities of bidding documents is time consuming and labor intensive and is not an easy task and this is where automated information technology can help. For this study, I have constructed an ITB analysis model based on Watson AI that can analyze and apply vast amount of documents more effectively in a short time. Configuration of the Watson Explorer AI architecture for AI-based ITB risk management model research, the selection of learning procedures and analysis subjects, and the performance evaluation criteria were defined, and a test bed was constructed to conduct a pilot research. Consequently, I verified the effectiveness of the analytical time reduction and the quality of its results and VOC operations by professionals.

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

A Multilayer Perceptron-Based Electric Load Forecasting Scheme via Effective Recovering Missing Data (효과적인 결측치 보완을 통한 다층 퍼셉트론 기반의 전력수요 예측 기법)

  • Moon, Jihoon;Park, Sungwoo;Hwang, Eenjun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.2
    • /
    • pp.67-78
    • /
    • 2019
  • Accurate electric load forecasting is very important in the efficient operation of the smart grid. Recently, due to the development of IT technology, many works for constructing accurate forecasting models have been developed based on big data processing using artificial intelligence techniques. These forecasting models usually utilize external factors such as temperature, humidity and historical electric load as independent variables. However, due to diverse internal and external factors, historical electrical load contains many missing data, which makes it very difficult to construct an accurate forecasting model. To solve this problem, in this paper, we propose a random forest-based missing data recovery scheme and construct an electric load forecasting model based on multilayer perceptron using the estimated values of missing data and external factors. We demonstrate the performance of our proposed scheme via various experiments.

Development of e-learning support platform through real-time two-way communication (실시간 양방향 소통을 통한 이러닝 학습 지원 플랫폼의 구축)

  • Kim, Eun-Mi;Choi, Jong-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.249-254
    • /
    • 2019
  • The concept of 'Edu-Tech', which is rapidly reorganized around e-Learning, has been spreading along with the development of intelligent information technology according to the fourth industrial revolution such as Artificial Intelligence (AI), Internet of Things (IoT), BigData. Currently, leading companies are conducting online education services, but real-time two-way communication is difficult. In addition, in the case of off-line class, there are many students, and not only the time is limited, but also they often miss the opportunities to ask questions. In order to solve these problems, this paper develops a real - time interactive question and answer management system that can freely questions both on - line and off - line by combining the benefits of offline instant answers and the advantages of online openness. The developed system is a real-time personalized education system that enables the respondent to check the situation of the questioner in real time and provide a customized answer according to the inquirer's request. In addition, by measuring and managing the system usage time in seconds, the questioner and the respondent can efficiently utilize the system.