• Title/Summary/Keyword: Internet Penetration

Search Result 81, Processing Time 0.026 seconds

Web 2.0 and Firms' Business Model Application (웹2.0과 기업의 비즈니스 모델 활용방안)

  • Cho, Dong-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.108-116
    • /
    • 2008
  • Recently the advent of web 2.0 era is an important trend in the business environmental change. Web 2.0 era means users' active participation, share, and openness, develop 'Internet penetration into everyday life,' and change many aspects of our society. web 2.0 has been making these following changes in the socioeconomic aspects: 1) acceleration of system shift to a small quantity of multi-species production system 2) growing influence of on-line channel/information to consumers 3) various minorities' power increase in the socioeconomic sector. web 2.0 has been making these following changes in the enterprise management: 1) the pursuit of open innovation from outside 2) active employment of viral marketing through Internet 3) the pursuit of present business transformation 4) strengthening of customer communication through open dialogue. Firms must squarely look at socioeconomic changes owing to web 2.0, and utilize them as business opportunities.

Oil Pipeline Weld Defect Identification System Based on Convolutional Neural Network

  • Shang, Jiaze;An, Weipeng;Liu, Yu;Han, Bang;Guo, Yaodan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1086-1103
    • /
    • 2020
  • The automatic identification and classification of image-based weld defects is a difficult task due to the complex texture of the X-ray images of the weld defect. Several depth learning methods for automatically identifying welds were proposed and tested. In this work, four different depth convolutional neural networks were evaluated and compared on the 1631 image set. The concavity, undercut, bar defects, circular defects, unfused defects and incomplete penetration in the weld image 6 different types of defects are classified. Another contribution of this paper is to train a CNN model "RayNet" for the dataset from scratch. In the experiment part, the parameters of convolution operation are compared and analyzed, in which the experimental part performs a comparative analysis of various parameters in the convolution operation, compares the size of the input image, gives the classification results for each defect, and finally shows the partial feature map during feature extraction with the classification accuracy reaching 96.5%, which is 6.6% higher than the classification accuracy of other existing fine-tuned models, and even improves the classification accuracy compared with the traditional image processing methods, and also proves that the model trained from scratch also has a good performance on small-scale data sets. Our proposed method can assist the evaluators in classifying pipeline welding defects.

Development of a disaster information delivery application using Cell Broadcast Service (긴급재난문자 서비스를 활용한 재난정보 전달 애플리케이션 개발)

  • Kim, Myeong-Jin;Kim, Kyeong-Rae;Baek, Seung-Hyeok;Oh, Seung-Hee;Jung, Woo-Sug;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.57-63
    • /
    • 2021
  • The Cell Broadcast Service is a public service that delivers information on disaster situations to mobile phones. In Korea, where mobile phone penetration is high, disaster information delivery through Cell Broadcast Service has a higher preference than other information delivery methods. However, since it consists only of text messages, disaster information is not delivered normally to the information vulnerable class compared to the general public. To compensate for this, a disaster information delivery application using Cell Broadcast Service was proposed and research was conducted. If research like this paper continues and Cell Broadcast Service become a service that transmits various disaster-related information considering the information vulnerable at home and abroad, it will provide the effect of reducing damage to disasters through rapid and accurate response.

A Study on the Technical Standard of Micro-Inverter for Domestic Photovoltaic Power Generation (국내 태양광발전용 마이크로 인버터 기술기준에 관한 연구)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.175-180
    • /
    • 2019
  • In order to overcome the drawbacks of low rated power of the string inverter, the necessity of micro -inverters and future development directions will be examined by comparing the power conditioner system with existing PCS using micro inverter. Currently, string inverters have been used in household solar power generation systems, and research and penetration of micro-inverters(PV-MIC) have been expanding, which can overcome the shortcomings of string inverters starting from Europe. However, in the PV inverter industry, precise technical standards, test measurement equipment and related test methods for micro-inverters(PV-MIC) are obstacles to product development. Therefore, in this paper, considering the characteristics of micro-inverter (PV-MIC), it aims to make it competitive so that it does not lag behind advanced technology change through test measurement equipment and related technical standard.

A Study on the Customer Relationship Management Method Using Real-Time IoT Data (실시간 IoT 데이터를 활용한 고객 관계 관리 방안에 관한 연구)

  • Bae, Ji Won;Baek, Dong Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.2
    • /
    • pp.69-77
    • /
    • 2019
  • As information technology advances, the penetration of smart devices connected to the Internet, such as smart phone and tablet PC, has rapidly expanded, and as sensor prices have fallen the Internet of Things has begun to be introduced in the industry. Today's industry is rapidly changing and evolving, requiring companies to respond to the new paradigm of business. In this situation, companies need to actively manage and maintain customer relationships in order to acquire loyal customers who bring them a high return. The purpose of this study is to suggest a method to manage customer relationship using real time IoT data including IoT product usage data, customer characteristics and transaction data. This study proposes a method of segmenting customers through RFM analysis and transition index analysis. In addition, a real-time monitoring through control charts is used to identify abnormalities in product use and suggest ways of differentiating marketing for each group. In the study, 44 samples were classified as 9 churn customers, 10 potential customers, and 25 active customers. This study suggested ways to induce active customers by providing after-sales benefit for product reuse to a group of churn customers and to promote the advantages or necessity of using the product by setting the goal of increasing the frequency of use to a group of potential customers. Finally, since the active customer group is a loyal customer, this study proposed an one-on-one marketing to improve product satisfaction.

Proposal of Hostile Command Attack Method Using Audible Frequency Band for Smart Speaker (스마트 스피커 대상 가청 주파수 대역을 활용한 적대적 명령어 공격 방법 제안)

  • Park, Tae-jun;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, the functions of smart speakers have diversified, and the penetration rate of smart speakers is increasing. As it becomes more widespread, various techniques have been proposed to cause anomalous behavior against smart speakers. Dolphin Attack, which causes anomalous behavior against the Voice Controllable System (VCS) during various attacks, is a representative method. With this method, a third party controls VCS using ultrasonic band (f>20kHz) without the user's recognition. However, since the method uses the ultrasonic band, it is necessary to install an ultrasonic speaker or an ultrasonic dedicated device which is capable of outputting an ultrasonic signal. In this paper, a smart speaker is controlled by generating an audio signal modulated at a frequency (18 to 20) which is difficult for a person to hear although it is in the human audible frequency band without installing an additional device, that is, an ultrasonic device. As a result with the method proposed in this paper, while humans could not recognize voice commands even in the audible band, it was possible to control the smart speaker with a probability of 82 to 96%.

A study on the Activation Methods of Food Volume Meter by improving the Inlet Function (투입구 기능 개선을 통한 음식물쓰레기종량제 활성화 방안에 관한 연구)

  • Kim, Yongil;Kim, Seungcheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.75-81
    • /
    • 2022
  • Under the government's principle of paying for emissions, the RFID-based pay-as-you-go system, which charges fees in proportion to emissions, was fully implemented in 2012. As of the end of 2018, the penetration rate is about 40% based on 149 local governments and multi-family apartments nationwide. The introduction of equipment showed a reduction effect of about 20-30%. Problems with existing equipment also began to appear. This study tried to improve by applying and integrating the existing technologies to solve the fundamental problems of these inlets. In other words, the plan is to improve the environment around the food waste meter by changing the design so that the hopper goes deep into the food waste bin inside the food waste meter so that the food waste becomes full and is designed smoothly when replacing the collection container.

Consumer Associative Network Analysis on Device and Service Convergence

  • Han, Sangman;Lee, Janghyuk;Park, Sun-Young;Jo, Woonghyeon
    • Asia Marketing Journal
    • /
    • v.15 no.3
    • /
    • pp.1-14
    • /
    • 2013
  • Our research brings managerial insights for developing new digital convergence of devices and services. To explain the phenomenon of device and service convergence, we combine two different approaches from separate research fields: a perceptual mapping technique generally used for segmentation in marketing and associative network analysis mobilized to understanding network structure of core and peripheral as well as the information mediating role of nodes in network science. By combining these two approaches, we provide an in-depth analysis of the associations among devices and services by assessing the centrality of device and service nodes in an associative network. This is done by examining the connections between these services and devices as well as investigating the role of mediation in the combined device-service associative network. Our results based on bi-partite network analysis of survey responses from 250 Internet Protocol (IP) television viewers show which device and which service will play the major role in future device and service convergence as well as which characteristics and functionalities have to be incorporated into future convergence. Among the devices, the mobile handset with the betweenness centrality of 0.26 appears to be the device that would lead future device convergence. Among the services, wireless broadband with the betweenness centrality of 0.276 appears to be the service on which future service convergence needs to be developed. This result is quite unexpected, since wireless broadband has a lower penetration rate than other services, such as fixed broadband and cable TV. In addition, we indicate the possibility of converging devices, such as personal digital assistant (PDA) and mobile handset, and services, such as IPTV and mobile Internet, into wireless broadband services in the future.

  • PDF

Insights Discovery through Hidden Sentiment in Big Data: Evidence from Saudi Arabia's Financial Sector

  • PARK, Young-Eun;JAVED, Yasir
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.6
    • /
    • pp.457-464
    • /
    • 2020
  • This study aims to recognize customers' real sentiment and then discover the data-driven insights for strategic decision-making in the financial sector of Saudi Arabia. The data was collected from the social media (Facebook and Twitter) from start till October 2018 in financial companies (NCB, Al Rajhi, and Bupa) selected in the Kingdom of Saudi Arabia according to criteria. Then, it was analyzed using a sentiment analysis, one of data mining techniques. All three companies have similar likes and followers as they serve customers as B2B and B2C companies. In addition, for Al Rajhi no negative sentiment was detected in English posts, while it can be seen that Internet penetration of both banks are higher than BUPA, rarely mentioned in few hours. This study helps to predict the overall popularity as well as the perception or real mood of people by identifying the positive and negative feelings or emotions behind customers' social media posts or messages. This research presents meaningful insights in data-driven approaches using a specific data mining technique as a tool for corporate decision-making and forecasting. Understanding what the key issues are from customers' perspective, it becomes possible to develop a better data-based global strategies to create a sustainable competitive advantage.

Strategy of Market Penetration in Japanese Internet Market: Comparing Online Game Loyalty between Korea and Japan with MSEM (한국 기업의 일본 인터넷 시장 진출 전략: 멀티그룹 구조분석(MSEM)을 이용한 한국과 일본의 온라인 게임 충성도 비교를 중심으로)

  • 김남희;이상철;서영호
    • Journal of Korean Society for Quality Management
    • /
    • v.31 no.1
    • /
    • pp.21-41
    • /
    • 2003
  • The purpose of this research is to identify if psychological temptation, site quality and sense of community influence user's flow and addiction and if causalities among flow, addiction, customer satisfaction and customer loyalty are different between Korean and Japanese online games. To perform our research, we use MCSF(Multi-group Confirmatory Factor Analysis) and MSEM(Multi-group Structural Equation Model). The empirical results of SEM(Structural Equation Model) including high-order factor analysis indicate that all of paths in our model are the same for both countries. Therefore, site quality and sense of community have impacts on the flow, while on the other hand, psychological temptation has impacts on the addiction. Customer satisfaction and loyalty are positively related not with the addiction but with the flow. In addition, customer loyalty is significantly influenced by the flow and the customer satisfaction. In Conclusion, the empirical results of MSEM(Multi-group Structural Equation Model) indicate sense of community to flow, flow to loyalty and customer satisfaction to loyalty are different between Korea and Japan. This indicates that companies to penetrate into Japa online game industry should have a concern with Japanese Social and Cultural features and to develop strategies which correspond with Japanese culture.