• 제목/요약/키워드: Lead User

검색결과 420건 처리시간 0.024초

IT서비스에 있어서 기획자, 디자이너, 개발자의 업무 및 역할 상호 평가 비교 연구 (Reciprocal Job and Role Assessments of Planners, Designers, and System Developers of IT Services)

  • 이동희;이정우
    • 한국IT서비스학회지
    • /
    • 제21권1호
    • /
    • pp.61-79
    • /
    • 2022
  • In the rapidly changing era of knowledge revolution, user-centered IT services are emerging as a very important component of modern business. However, in order to lead IT services into success, traditional capabilities and competences are not good enough. Development of IT services involve service planners and designers as well as traditional systems developers. This detailed segmentation of job and corresponding competences among involved in IT service development brings in new type of conflicts and contradictions that may require special attention for IT services to be properly development and implemented. This study aims to explore and define competences and roles of newly emerging job groups in IT services: planners, designers, and developers. In order to identify underlying competences of these emergeing groups, two stage interviews were conducted. At the first stage, general competence framework is developed across these groups with different skills for similar competence catogories. Using the categories developed at the first stage, members of each groups were asked to rate and assess the competences of other groups. Comparisons of these reciprocal assessment revealed the conceptual differences and biases across these groups. Detail differences are discussed and implications are discussed.

Cloth Product Recognition based on Siamese Network with Body Region Extraction method

  • Budiman, Sutanto Edward;Kurniawan, Edwin;Lee, Seung Heon;Lee, Jae Seung;Lee, Suk-Ho
    • International journal of advanced smart convergence
    • /
    • 제11권2호
    • /
    • pp.128-134
    • /
    • 2022
  • Nowadays, people consume a lot of content such as web dramas or K-pop videos through mobile devices such as smartphones, and the market for indirect advertisements through these web dramas or K-pop videos is also increasing every year. In order to lead to the immediate purchase of indirect products in web dramas, a system that allows consumers to purchase immediately at the time the products appear in the drama is needed. In this paper, we propose a system to allow viewers to purchase products worn by celebrities immediately when viewers see and click on them. When a user clicks on a video, it recognizes the product worn by the celebrity, and displays information on the screen on the most similar product corresponding to the recognized product, allowing them to go to the seller's site where they can purchase it. In order for such a system to operate stably, a pose estimation and siamese network-based system is proposed. The proposed system will primarily be released as a streaming service in the form of an app or web page that connects the products in web dramas or other K-pop video contents screened on the mobile with e-commerce. Furthermore, in the future, the technology is expected to be used globally in various industries such as smart mobility and display kiosks.

A Study on the Development of Artificial Intelligence Crop Environment Control Framework

  • Guangzhi Zhao
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권2호
    • /
    • pp.144-156
    • /
    • 2023
  • Smart agriculture is a rapidly growing field that seeks to optimize crop yields and reduce risk through the use of advanced technology. A key challenge in this field is the need to create a comprehensive smart farm system that can effectively monitor and control the growth environment of crops, particularly when cultivating new varieties. This is where fuzzy theory comes in, enabling the collection and analysis of external environmental factors to generate a rule-based system that considers the specific needs of each crop variety. By doing so, the system can easily set the optimal growth environment, reducing trial and error and the user's risk burden. This is in contrast to existing systems where parameters need to be changed for each breed and various factors considered. Additionally, the type of house used affects the environmental control factors for crops, making it necessary to adapt the system accordingly. While developing such a framework requires a significant investment of labour and time, the benefits are numerous and can lead to increased productivity and profitability in the field of smart agriculture. We developed an AI platform for optimal control of facility houses by integrating data from mushroom crops and environmental factors, and analysing the correlation between optimal control conditions and yield. Our experiments demonstrated significant performance improvement compared to the existing system.

Closed-form solution for the buckling behavior of the delaminated FRP plates with a rectangular hole using super-elastic SMA stitches

  • Soltanieh, Ghazaleh;Yam, Michael CH.;Zhang, Jing-Zhou;Ke, Ke
    • Structural Engineering and Mechanics
    • /
    • 제81권1호
    • /
    • pp.39-50
    • /
    • 2022
  • Layer separation (delamination) is an essential threat to fiber-reinforced polymer (FRP) plates under dynamic, static, and fatigue loads. Under compressive load, the growth of delamination will lead to structural instability. The aim of this paper is to present a method using shape memory alloy (SMA) stitches to suppress the delamination growth in a FRP plate and to improve the buckling behavior of the plate with a rectangular hole. The present paper is divided into two parts. Firstly, a closed-form (CF) formulation for evaluating the buckling load of the FRP plate is presented. Secondly, the finite element method (FEM) will be employed to calculate the buckling loads of the plates which serves to validate the results obtained from the closed-form method. The novelty of this work is the development of the closed-form solution using the p-Ritz energy approach regarding the stress-dependent phase transformation of SMA to trace the equilibrium path. For the FEM, the Lagoudas constitutive model of the SMA material is implemented in FORTRAN programming language using a user material subroutines (VUMAT). The model is simulated in ABAQUS/Explicit solver due to the nature of the loading type. The cohesive zone model (CZM) is applied to simulate the delamination growth.

Improving safety performance of construction workers through cognitive function training

  • Se-jong Ahn;Ho-sang Moon;Sung-Taek Chung
    • International journal of advanced smart convergence
    • /
    • 제12권2호
    • /
    • pp.159-166
    • /
    • 2023
  • Due to the aging workforce in the construction industry in South Korea, the accident rate has been increasing. The cognitive abilities of older workers are closely related to both safety incidents and labor productivity. Therefore, there is a need to improve cognitive abilities through personalized training based on cognitive assessment results, using cognitive training content, in order to enable safe performance in labor-intensive environments. The provided cognitive training content includes concentration, memory, oreintation, attention, and executive functions. Difficulty levels were applied to each content to enhance user engagement and interest. To stimulate interest and encourage active participation of the participants, the difficulty level was automatically adjusted based on feedback from the MMSE-DS results and content measurement data. Based on the accumulated data, individual training scenarios have been set differently to intensively improve insufficient cognitive skills, and cognitive training programs will be developed to reduce safety accidents at construction sites through measured data and research. Through such simple cognitive training, it is expected that the reduction of accidents in the aging construction workforce can lead to a decrease in the social costs associated with prolonged construction periods caused by accidents.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

Identification of Contaminant Injection in Water Distribution Network

  • Marlim, Malvin Samuel;Kang, Doosun
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2020년도 학술발표회
    • /
    • pp.114-114
    • /
    • 2020
  • Water contamination in a water distribution network (WDN) is harmful since it directly induces the consumer's health problem and suspends water service in a wide area. Actions need to be taken rapidly to countermeasure a contamination event. A contaminant source ident ification (CSI) is an important initial step to mitigate the harmful event. Here, a CSI approach focused on determining the contaminant intrusion possible location and time (PLoT) is introduced. One of the methods to discover the PLoT is an inverse calculation to connect all the paths leading to the report specification of a sensor. A filtering procedure is then applied to narrow down the PLoT using the results from individual sensors. First, we spatially reduce the suspect intrusion points by locating the highly suspicious nodes that have similar intrusion time. Then, we narrow the possible intrusion time by matching the suspicious intrusion time to the reported information. Finally, a likelihood-score is estimated for each suspect. Another important aspect that needs to be considered in CSI is that there are inherent uncertainties, such as the variations in user demand and inaccuracy of sensor data. The uncertainties can lead to overlooking the real intrusion point and time. To reflect the uncertainties in the CSI process, the Monte-Carlo Simulation (MCS) is conducted to explore the ranges of PLoT. By analyzing all the accumulated scores through the random sets, a spread of contaminant intrusion PLoT can then be identified in the network.

  • PDF

휴대용 디지털기기 엑세사리 구매과정의 질적 분석: 디지털그림자노동에 의한 해석 (A Qualitative Analysis of the Purchase Process of Digital Device Accessories: Interpretation by Digital Shadow Work)

  • 이웅규;조아라
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제32권1호
    • /
    • pp.85-108
    • /
    • 2023
  • Purpose The purpose of this study is to identify the role of digital shadow work(DSW) in the psychological mechanism that controls using and purchasing digital device accessories. More specifically, it is to reveal how the digital device user's perception of DSW is formed and how the formed DSW affects purchase and what results it will bring. Design/methodology/approach Ground theory method(GTM), one of qualitative appoaches, is adopted as research methodology. By interviewing total twenty five users, the data are analyzed by open coding amd axis coding. Two core codes are selected by selective coding and interpreted by DSW theory. Findings We find concern for potential DSW and generation of new DSW. Concern for potential DSW lead to the purchase of accessorie which would be supposed to reduce potential DSW. During purchasing accessories, quest type DSW, which provices flow experience and expertise, could be genterated. This means that there would be dynamics of DSW in the purchase process of digital device accessories.

Determine the Critical Factors of Information Systems Success (ISS) to Enhance Customer Satisfaction on SME Performance in Saudi Arabia

  • Saad A. Almohammadi;Adel A. Bahaddad
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.30-36
    • /
    • 2023
  • In today's worldwide environment, information systems (IS) usage is growing swiftly. As a result, it now affects every aspect of life and serves as a general growth tool for individuals, groups, and governments. information system success (ISS) is affected by customer satisfaction and their acceptance of using these services. In addition, this issue will be a critical thing for SMEs, especially in Saudi Arabia. SMEs have a shortage and lack IT experience and resources. The research's question is What are the ISS that will improve customer satisfaction and SME performance in Saudi Arabia. Through an online survey, The data on how Saudi SMEs succeed in IS was acquired. Citizens and residents users in Saudi Arabia, representing a range of ages and educational backgrounds. In the IS success factors evaluation, which assessed the degree of agreeability and disagreeability of specific statements related to the six dimensions based on the empirical data, it was found that the users agreed with the majority of the claims. For users, usability is the most important feature. This study discovered that enhancing the system's overall user experience might lead to higher overall satisfaction.

Implementation of Falling Accident Monitoring and Prediction System using Real-time Integrated Sensing Data

  • Bonghyun Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권11호
    • /
    • pp.2987-3002
    • /
    • 2023
  • In 2015, the number of senior citizens aged 65 and over in Korea was 6,662,400, accounting for 13.1% of the total population. Along with these social phenomena, risk information related to the elderly is increasing every year. In particular, a fall accident caused by a fall can cause serious injury to an elderly person, so special attention is required. Therefore, in this paper, we implemented a system that monitors fall accidents and informs them in real time to minimize damage caused by falls. To this end, beacon-based indoor location positioning was performed and biometric information based on an integrated module was collected using various sensors. In other words, a multi-functional sensor integration module was designed based on Arduino to collect and monitor user's temperature, heart rate, and motion data in real time. Finally, through the analysis and prediction of measurement signals from the integrated module, damage from fall accidents can be reduced and rapid emergency treatment is possible. Through this, it is possible to reduce the damage caused by a fall accident, and rapid emergency treatment will be possible. In addition, it is expected to lead a new paradigm of safety systems through expansion and application to socially vulnerable groups.