• Title/Summary/Keyword: Management Technology

Search Result 25,784, Processing Time 0.046 seconds

Spatiotemporal Monitoring of Soybean Growth and Water Status Using Drone-Based Shortwave Infrared (SWIR) Imagery (드론 기반 단파적외(SWIR) 영상을 활용한 콩의 생장과 수분 변화 모니터링)

  • Inji Lee;Heung-Min Kim;Youngmin Kim;Hoyong Ahn;Jae-Hyun Ryu;Hoejeong Jeong;Hyun-Dong Moon;Jaeil Cho;Seon-Woong Jang
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.3
    • /
    • pp.275-284
    • /
    • 2024
  • Monitoring crop growth changes and water content is crucial in the agricultural sector. This study utilized drones equipped with Short Wavelength Infrared (SWIR) sensors, sensitive to moisture changes, to observe soybeans' growth and water content variations. We confirmed that as soybeans grow more vigorously, their water content increases and differences in irrigation levels lead to decreases in vegetation and moisture indices. This suggests that waterlogging slows down soybean growth and reduces water content, highlighting the importance of detailed monitoring of vegetation and moisture indices at different growth stages to enhance crop productivity and minimize damage from waterlogging. Such monitoring could also preemptively detect and prevent the adverse effects of moisture changes, such as droughts, on crop growth. By demonstrating the potential for early diagnosis of moisture stress using drone-based SWIR sensors, this research suggests improvements in the efficiency of large-scale crop management and increases in yield, contributing to agricultural production.

Assessing Abdominal Aortic Aneurysm Progression by Using Perivascular Adipose Tissue Attenuation on Computed Tomography Angiography

  • Shuai Zhang;Hui Gu;Na Chang;Sha Li;Tianqi Xu;Menghan Liu;Ximing Wang
    • Korean Journal of Radiology
    • /
    • v.24 no.10
    • /
    • pp.974-982
    • /
    • 2023
  • Objective: Recent studies have highlighted the active and potential role of perivascular adipose tissue (PVAT) in atherosclerosis and aneurysm progression, respectively. This study explored the link between PVAT attenuation and abdominal aortic aneurysm (AAA) progression using computed tomography angiography (CTA). Materials and Methods: This multicenter retrospective study analyzed patients with AAA who underwent CTA at baseline and follow-up between March 2015 and July 2022. The following parameters were obtained: maximum diameter and total volume of the AAA, presence or absence of intraluminal thrombus (ILT), maximum diameter and volume of the ILT, and PVAT attenuation of the aortic aneurysm at baseline CTA. PVAT attenuation was divided into high (> -73.4 Hounsfield units [HU]) and low (≤ -73.4 HU). Patients who had or did not have AAA progression during the follow-up, defined as an increase in the aneurysm volume > 10 mL from baseline, were identified. Kaplan-Meier and multivariable Cox regression analyses were used to investigate the association between PVAT attenuation and AAA progression. Results: Our study included 167 participants (148 males; median age: 70.0 years; interquartile range: 63.0-76.0 years), of which 145 (86.8%) were diagnosed with AAA accompanied by ILT. Over a median period of 11.3 months (range: 6.0-85.0 months), AAA progression was observed in 67 patients (40.1%). Multivariable Cox regression analysis indicated that high baseline PVAT attenuation (adjusted hazard ratio [aHR] = 2.23; 95% confidence interval [CI], 1.16-4.32; P = 0.017) was independently associated with AAA progression. This association was demonstrated within the patients of AAA with ILT subcohort, where a high baseline PVAT attenuation (aHR = 2.23; 95% CI, 1.08-4.60; P = 0.030) was consistently independently associated with AAA progression. Conclusion: Elevated PVAT attenuation is independently associated with AAA progression, including patients of AAA with ILT, suggesting the potential of PVAT attenuation as a predictive imaging marker for AAA expansion.

Appendiceal Visualization on 2-mSv CT vs. Conventional-Dose CT in Adolescents and Young Adults with Suspected Appendicitis: An Analysis of Large Pragmatic Randomized Trial Data

  • Jungheum Cho;Youngjune Kim;Seungjae Lee;Hooney Daniel Min;Yousun Ko;Choong Guen Chee;Hae Young Kim;Ji Hoon Park;Kyoung Ho Lee;LOCAT Group
    • Korean Journal of Radiology
    • /
    • v.23 no.4
    • /
    • pp.413-425
    • /
    • 2022
  • Objective: We compared appendiceal visualization on 2-mSv CT vs. conventional-dose CT (median 7 mSv) in adolescents and young adults and analyzed the undesirable clinical and diagnostic outcomes that followed appendiceal nonvisualization. Materials and Methods: A total of 3074 patients aged 15-44 years (mean ± standard deviation, 28 ± 9 years; 1672 female) from 20 hospitals were randomized to the 2-mSv CT or conventional-dose CT group (1535 vs. 1539) from December 2013 through August 2016. A total of 161 radiologists from 20 institutions prospectively rated appendiceal visualization (grade 0, not identified; grade 1, unsure or partly visualized; and grade 2, clearly and entirely visualized) and the presence of appendicitis in these patients. The final diagnosis was based on CT imaging and surgical, pathologic, and clinical findings. We analyzed undesirable clinical or diagnostic outcomes, such as negative appendectomy, perforated appendicitis, more extensive than simple appendectomy, delay in patient management, or incorrect CT diagnosis, which followed appendiceal nonvisualization (defined as grade 0 or 1) and compared the outcomes between the two groups. Results: In the 2-mSv CT and conventional-dose CT groups, appendiceal visualization was rated as grade 0 in 41 (2.7%) and 18 (1.2%) patients, respectively; grade 1 in 181 (11.8%) and 81 (5.3%) patients, respectively; and grade 2 in 1304 (85.0%) and 1421 (92.3%) patients, respectively (p < 0.001). Overall, undesirable outcomes were rare in both groups. Compared to the conventional-dose CT group, the 2-mSv CT group had slightly higher rates of perforated appendicitis (1.1% [17] vs. 0.5% [7], p = 0.06) and false-negative diagnoses (0.4% [6] vs. 0.0% [0], p = 0.01) following appendiceal nonvisualization. Otherwise, these two groups were comparable. Conclusion: The use of 2-mSv CT instead of conventional-dose CT impairs appendiceal visualization in more patients. However, appendiceal nonvisualization on 2-mSv CT rarely leads to undesirable clinical or diagnostic outcomes.

Understanding the Artificial Intelligence Business Ecosystem for Digital Transformation: A Multi-actor Network Perspective (디지털 트랜스포메이션을 위한 인공지능 비즈니스 생태계 연구: 다행위자 네트워크 관점에서)

  • Yoon Min Hwang;Sung Won Hong
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.125-141
    • /
    • 2019
  • With the advent of deep learning technology, which is represented by AlphaGo, artificial intelligence (A.I.) has quickly emerged as a key theme of digital transformation to secure competitive advantage for businesses. In order to understand the trends of A.I. based digital transformation, a clear comprehension of the A.I. business ecosystem should precede. Therefore, this study analyzed the A.I. business ecosystem from the multi-actor network perspective and identified the A.I. platform strategy type. Within internal three layers of A.I. business ecosystem (infrastructure & hardware, software & application, service & data layers), this study identified four types of A.I. platform strategy (Tech. vertical × Biz. horizontal, Tech. vertical × Biz. vertical, Tech. horizontal × Biz. horizontal, Tech. horizontal × Biz. vertical). Then, outside of A.I. platform, this study presented five actors (users, investors, policy makers, consortiums & innovators, CSOs/NGOs) and their roles to support sustainable A.I. business ecosystem in symbiosis with human. This study identified A.I. business ecosystem framework and platform strategy type. The roles of government and academia to create a sustainable A.I. business ecosystem were also suggested. These results will help to find proper strategy direction of A.I. business ecosystem and digital transformation.

The Role of Psychological Distance and Relative Optimism in Information Security Decision Making (정보보호 의사결정에서 정보보호 침해사고 발생가능성의 심리적 거리감과 상대적 낙관성의 역할)

  • Jongki Kim;Jiyun Kim
    • Information Systems Review
    • /
    • v.20 no.3
    • /
    • pp.51-71
    • /
    • 2018
  • Many studies in the field of information security reveal the need to increase awareness. However, although awareness of information security has been raised to a considerable extent, actual security behavior has been shown to fall short of that. Therefore, we wanted to identify the role of psychological factors in making information security decisions by conducting a experimental study. The results show that there are differences in perception of information security risks according to the probabilistic distance and the degree of relative optimism due to social distance. In relation to their relative optimism and intention of information security, they reduced the level of perceived risk compared to those close to them and found that their influence varied according to their probabilistic distance. This study has made valuable attempt in terms of methodology and it is meaningful that the psychological factor is taken into consideration for the information protection behavior, so that the range of relative optimism that actually affects the perception of risk is narrowed. It is expected to contribute to the improvement of information security level of information technology users and protection of information assets by empirically identifying necessity of various approaches to decision making process for information security.

How to Identify Customer Needs Based on Big Data and Netnography Analysis (빅데이터와 네트노그라피 분석을 통합한 온라인 커뮤니티 고객 욕구 도출 방안: 천기저귀 온라인 커뮤니티 사례를 중심으로)

  • Soonhwa Park;Sanghyeok Park;Seunghee Oh
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.175-195
    • /
    • 2019
  • This study conducted both big data and netnography analysis to analyze consumer needs and behaviors of online consumer community. Big data analysis is easy to identify correlations, but causality is difficult to identify. To overcome this limitation, we used netnography analysis together. The netnography methodology is excellent for context grasping. However, there is a limit in that it is time and costly to analyze a large amount of data accumulated for a long time. Therefore, in this study, we searched for patterns of overall data through big data analysis and discovered outliers that require netnography analysis, and then performed netnography analysis only before and after outliers. As a result of analysis, the cause of the phenomenon shown through big data analysis could be explained through netnography analysis. In addition, it was able to identify the internal structural changes of the community, which are not easily revealed by big data analysis. Therefore, this study was able to effectively explain much of online consumer behavior that was difficult to understand as well as contextual semantics from the unstructured data missed by big data. The big data-netnography integrated model proposed in this study can be used as a good tool to discover new consumer needs in the online environment.

A Methodology for Determining Cloud Deployment Model in Financial Companies (금융회사 클라우드 운영 모델 결정 방법론)

  • Yongho Kim;Chanhee Kwak;Heeseok Lee
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.47-68
    • /
    • 2019
  • As cloud services and deployment models become diverse, there are a growing number of cloud computing selection options. Therefore, financial companies need a methodology to select the appropriated cloud for each financial computing system. This study adopted the Balanced Scorecard (BSC) framework to classify factors for the introduction of cloud computing in financial companies. Using Analytic Hierarchy Process (AHP), the evaluation items are layered into the performance perspective and the cloud consideration factor and a comprehensive decision model is proposed. To verify the proposed research model, a system of financial company is divided into three: account, information, and channel system, and the result of decision making by both financial business experts and technology experts from two financial companies were collected. The result shows that some common factors are important in all systems, but most of the factors considered are very different from system to system. We expect that our methodology contributes to the spread of cloud computing adoption.

The Study on the Difference of Information Security Awareness between PC and Smartphone (사용자의 PC와 스마트폰에 대한 정보보안 인식 차이에 관한 연구)

  • Piao Zhengxian;Sungmin Kang
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.69-89
    • /
    • 2017
  • In the information age, the rapid development of information technology provides people with an enriching experience yet also causes them harm because of information security (IS) issues. The IS of smartphones faces great challenges. Although many studies on IS awareness have been conducted, most of them have focused on PCs and do not consider the security issues of smartphones. In this study, we focus on those factors that affect IS awareness for both PCs and smartphones. We also analyze the differences in the impacts of certain factors on PCs and smartphones based on the proposed research model. The results are summarized as follows. First, the understanding of security technique, understanding of IS threat, and IS education have significant impacts on IS awareness for PCs and smartphones, while IS intention has a significant impact on IS awareness for PCs but not for smartphones. Moreover, IS policy has no significant impact on IS awareness. Second, PCs and smartphones show no significant differences in IS awareness, IS threat, and IS intention, but show significant differences in understanding of security technique, IS education, and IS policy.

Stage of Service Switching Behavior based on the Transtheoretical Model: Focused on Accommodation Sharing Economy Service (범이론적 모형에 기반한 서비스 전환 행동 단계 연구: 숙박공유경제 서비스를 중심으로)

  • Byounggu Choi
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.183-209
    • /
    • 2017
  • With changes in information technology (IT), many innovative IT-based services, such as AirBnB, have become popular. Switching behavior toward new and innovative services become a major issue for managers who want to attract many customers. In response, many researchers have investigated why customers switch service providers. However, little research has been conducted on the processes of switching behavior for a hedonic service. To fill this research gap, this study aimed to identify the stages of switching behavior based on transtheoretical model. Furthermore, the factors affecting the service switching behavior in stages were identified on the basis of service provider switching model. This study also hypothesized the customer's switching behavior in accommodation sharing economy service and analyzed it empirically. Results showed that the factors affecting switching behavior differ across five stages. The present results can provide a basis to prevent switching behavior and reduce churn by analyzing the difference in switching behavior among stages. This study also helps managers who want to improve organizational performance by enhancing customer retention capability.

A Study for Comparing the Legal Importance of Digital Forensics Issues in Korea (국내 디지털 포렌식 분야에서 법률적 이슈사항의 중요도 인식에 따른 우선순위 비교 연구)

  • Jae Bin Lee;Won Kyung Sung;Choong C. Lee
    • Information Systems Review
    • /
    • v.19 no.2
    • /
    • pp.185-209
    • /
    • 2017
  • In modern society, crime records have been digitized. Digital information is difficult to distinguish from original information, but the former is easy to modulate. This situation explains the increasing importance of digital forensics. However, digital forensic has several inefficiencies because of the rapid development of technology, unclear jurisdiction, and tool errors. This study surveyed digital forensic specialists and derived the priority of domestic digital forensic issues by redefining 17 issues in digital forensics from Brungs-Jamieson study in Australia. The present study was divided into four groups, namely, police, government and public corporations, private companies, and legal groups. The study could compare and analyze comparative analysis of existing studies in Australia and the US. This study can also examine differences in the results of each group in Korea. Thus, the key issues in Korea were derived as "Requirements to 'Fire Up' Original." The differences of the three groups in terms of legal issues were then identified. This finding enables us to understand differences in priorities and importance between groups and countries.