• Title/Summary/Keyword: Paper Management

Search Result 27,739, Processing Time 0.058 seconds

Automatic gasometer reading system using selective optical character recognition (관심 문자열 인식 기술을 이용한 가스계량기 자동 검침 시스템)

  • Lee, Kyohyuk;Kim, Taeyeon;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.1-25
    • /
    • 2020
  • In this paper, we suggest an application system architecture which provides accurate, fast and efficient automatic gasometer reading function. The system captures gasometer image using mobile device camera, transmits the image to a cloud server on top of private LTE network, and analyzes the image to extract character information of device ID and gas usage amount by selective optical character recognition based on deep learning technology. In general, there are many types of character in an image and optical character recognition technology extracts all character information in an image. But some applications need to ignore non-of-interest types of character and only have to focus on some specific types of characters. For an example of the application, automatic gasometer reading system only need to extract device ID and gas usage amount character information from gasometer images to send bill to users. Non-of-interest character strings, such as device type, manufacturer, manufacturing date, specification and etc., are not valuable information to the application. Thus, the application have to analyze point of interest region and specific types of characters to extract valuable information only. We adopted CNN (Convolutional Neural Network) based object detection and CRNN (Convolutional Recurrent Neural Network) technology for selective optical character recognition which only analyze point of interest region for selective character information extraction. We build up 3 neural networks for the application system. The first is a convolutional neural network which detects point of interest region of gas usage amount and device ID information character strings, the second is another convolutional neural network which transforms spatial information of point of interest region to spatial sequential feature vectors, and the third is bi-directional long short term memory network which converts spatial sequential information to character strings using time-series analysis mapping from feature vectors to character strings. In this research, point of interest character strings are device ID and gas usage amount. Device ID consists of 12 arabic character strings and gas usage amount consists of 4 ~ 5 arabic character strings. All system components are implemented in Amazon Web Service Cloud with Intel Zeon E5-2686 v4 CPU and NVidia TESLA V100 GPU. The system architecture adopts master-lave processing structure for efficient and fast parallel processing coping with about 700,000 requests per day. Mobile device captures gasometer image and transmits to master process in AWS cloud. Master process runs on Intel Zeon CPU and pushes reading request from mobile device to an input queue with FIFO (First In First Out) structure. Slave process consists of 3 types of deep neural networks which conduct character recognition process and runs on NVidia GPU module. Slave process is always polling the input queue to get recognition request. If there are some requests from master process in the input queue, slave process converts the image in the input queue to device ID character string, gas usage amount character string and position information of the strings, returns the information to output queue, and switch to idle mode to poll the input queue. Master process gets final information form the output queue and delivers the information to the mobile device. We used total 27,120 gasometer images for training, validation and testing of 3 types of deep neural network. 22,985 images were used for training and validation, 4,135 images were used for testing. We randomly splitted 22,985 images with 8:2 ratio for training and validation respectively for each training epoch. 4,135 test image were categorized into 5 types (Normal, noise, reflex, scale and slant). Normal data is clean image data, noise means image with noise signal, relfex means image with light reflection in gasometer region, scale means images with small object size due to long-distance capturing and slant means images which is not horizontally flat. Final character string recognition accuracies for device ID and gas usage amount of normal data are 0.960 and 0.864 respectively.

An Empirical Study on Motivation Factors and Reward Structure for User's Createve Contents Generation: Focusing on the Mediating Effect of Commitment (창의적인 UCC 제작에 영향을 미치는 동기 및 보상 체계에 대한 연구: 몰입에 매개 효과를 중심으로)

  • Kim, Jin-Woo;Yang, Seung-Hwa;Lim, Seong-Taek;Lee, In-Seong
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.141-170
    • /
    • 2010
  • User created content (UCC) is created and shared by common users on line. From the user's perspective, the increase of UCCs has led to an expansion of alternative means of communications, while from the business perspective UCCs have formed an environment in which an abundant amount of new contents can be produced. Despite outward quantitative growth, however, many aspects of UCCs do not meet the expectations of general users in terms of quality, and this can be observed through pirated contents and user-copied contents. The purpose of this research is to investigate effective methods for fostering production of creative user-generated content. This study proposes two core elements, namely, reward and motivation, which are believed to enhance content creativity as well as the mediating factor and users' committement, which will be effective for bridging the increasing motivation and content creativity. Based on this perspective, this research takes an in-depth look at issues related to constructing the dimensions of reward and motivation in UCC services for creative content product, which are identified in three phases. First, three dimensions of rewards have been proposed: task dimension, social dimension, and organizational dimention. The task dimension rewards are related to the inherent characteristics of a task such as writing blog articles and pasting photos. Four concrete ways of providing task-related rewards in UCC environments are suggested in this study, which include skill variety, task significance, task identity, and autonomy. The social dimensioni rewards are related to the connected relationships among users. The organizational dimension consists of monetary payoff and recognition from others. Second, the two types of motivations are suggested to be affected by the diverse rewards schemes: intrinsic motivation and extrinsic motivation. Intrinsic motivation occurs when people create new UCC contents for its' own sake, whereas extrinsic motivation occurs when people create new contents for other purposes such as fame and money. Third, commitments are suggested to work as important mediating variables between motivation and content creativity. We believe commitments are especially important in online environments because they have been found to exert stronger impacts on the Internet users than other relevant factors do. Two types of commitments are suggested in this study: emotional commitment and continuity commitment. Finally, content creativity is proposed as the final dependent variable in this study. We provide a systematic method to measure the creativity of UCC content based on the prior studies in creativity measurement. The method includes expert evaluation of blog pages posted by the Internet users. In order to test the theoretical model of our study, 133 active blog users were recruited to participate in a group discussion as well as a survey. They were asked to fill out a questionnaire on their commitment, motivation and rewards of creating UCC contents. At the same time, their creativity was measured by independent experts using Torrance Tests of Creative Thinking. Finally, two independent users visited the study participants' blog pages and evaluated their content creativity using the Creative Products Semantic Scale. All the data were compiled and analyzed through structural equation modeling. We first conducted a confirmatory factor analysis to validate the measurement model of our research. It was found that measures used in our study satisfied the requirement of reliability, convergent validity as well as discriminant validity. Given the fact that our measurement model is valid and reliable, we proceeded to conduct a structural model analysis. The results indicated that all the variables in our model had higher than necessary explanatory powers in terms of R-square values. The study results identified several important reward shemes. First of all, skill variety, task importance, task identity, and automony were all found to have significant influences on the intrinsic motivation of creating UCC contents. Also, the relationship with other users was found to have strong influences upon both intrinsic and extrinsic motivation. Finally, the opportunity to get recognition for their UCC work was found to have a significant impact on the extrinsic motivation of UCC users. However, different from our expectation, monetary compensation was found not to have a significant impact on the extrinsic motivation. It was also found that commitment was an important mediating factor in UCC environment between motivation and content creativity. A more fully mediating model was found to have the highest explanation power compared to no-mediation or partially mediated models. This paper ends with implications of the study results. First, from the theoretical perspective this study proposes and empirically validates the commitment as an important mediating factor between motivation and content creativity. This result reflects the characteristics of online environment in which the UCC creation activities occur voluntarily. Second, from the practical perspective this study proposes several concrete reward factors that are germane to the UCC environment, and their effectiveness to the content creativity is estimated. In addition to the quantitive results of relative importance of the reward factrs, this study also proposes concrete ways to provide the rewards in the UCC environment based on the FGI data that are collected after our participants finish asnwering survey questions. Finally, from the methodological perspective, this study suggests and implements a way to measure the UCC content creativity independently from the content generators' creativity, which can be used later by future research on UCC creativity. In sum, this study proposes and validates important reward features and their relations to the motivation, commitment, and the content creativity in UCC environment, which is believed to be one of the most important factors for the success of UCC and Web 2.0. As such, this study can provide significant theoretical as well as practical bases for fostering creativity in UCC contents.

A Study of Anomaly Detection for ICT Infrastructure using Conditional Multimodal Autoencoder (ICT 인프라 이상탐지를 위한 조건부 멀티모달 오토인코더에 관한 연구)

  • Shin, Byungjin;Lee, Jonghoon;Han, Sangjin;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.57-73
    • /
    • 2021
  • Maintenance and prevention of failure through anomaly detection of ICT infrastructure is becoming important. System monitoring data is multidimensional time series data. When we deal with multidimensional time series data, we have difficulty in considering both characteristics of multidimensional data and characteristics of time series data. When dealing with multidimensional data, correlation between variables should be considered. Existing methods such as probability and linear base, distance base, etc. are degraded due to limitations called the curse of dimensions. In addition, time series data is preprocessed by applying sliding window technique and time series decomposition for self-correlation analysis. These techniques are the cause of increasing the dimension of data, so it is necessary to supplement them. The anomaly detection field is an old research field, and statistical methods and regression analysis were used in the early days. Currently, there are active studies to apply machine learning and artificial neural network technology to this field. Statistically based methods are difficult to apply when data is non-homogeneous, and do not detect local outliers well. The regression analysis method compares the predictive value and the actual value after learning the regression formula based on the parametric statistics and it detects abnormality. Anomaly detection using regression analysis has the disadvantage that the performance is lowered when the model is not solid and the noise or outliers of the data are included. There is a restriction that learning data with noise or outliers should be used. The autoencoder using artificial neural networks is learned to output as similar as possible to input data. It has many advantages compared to existing probability and linear model, cluster analysis, and map learning. It can be applied to data that does not satisfy probability distribution or linear assumption. In addition, it is possible to learn non-mapping without label data for teaching. However, there is a limitation of local outlier identification of multidimensional data in anomaly detection, and there is a problem that the dimension of data is greatly increased due to the characteristics of time series data. In this study, we propose a CMAE (Conditional Multimodal Autoencoder) that enhances the performance of anomaly detection by considering local outliers and time series characteristics. First, we applied Multimodal Autoencoder (MAE) to improve the limitations of local outlier identification of multidimensional data. Multimodals are commonly used to learn different types of inputs, such as voice and image. The different modal shares the bottleneck effect of Autoencoder and it learns correlation. In addition, CAE (Conditional Autoencoder) was used to learn the characteristics of time series data effectively without increasing the dimension of data. In general, conditional input mainly uses category variables, but in this study, time was used as a condition to learn periodicity. The CMAE model proposed in this paper was verified by comparing with the Unimodal Autoencoder (UAE) and Multi-modal Autoencoder (MAE). The restoration performance of Autoencoder for 41 variables was confirmed in the proposed model and the comparison model. The restoration performance is different by variables, and the restoration is normally well operated because the loss value is small for Memory, Disk, and Network modals in all three Autoencoder models. The process modal did not show a significant difference in all three models, and the CPU modal showed excellent performance in CMAE. ROC curve was prepared for the evaluation of anomaly detection performance in the proposed model and the comparison model, and AUC, accuracy, precision, recall, and F1-score were compared. In all indicators, the performance was shown in the order of CMAE, MAE, and AE. Especially, the reproduction rate was 0.9828 for CMAE, which can be confirmed to detect almost most of the abnormalities. The accuracy of the model was also improved and 87.12%, and the F1-score was 0.8883, which is considered to be suitable for anomaly detection. In practical aspect, the proposed model has an additional advantage in addition to performance improvement. The use of techniques such as time series decomposition and sliding windows has the disadvantage of managing unnecessary procedures; and their dimensional increase can cause a decrease in the computational speed in inference.The proposed model has characteristics that are easy to apply to practical tasks such as inference speed and model management.

A Study on the Ideal Leadership whole person of Confucian philosophy (유가(儒家)의 전인적(全人的) 지도자상(指導者像) 고찰(考察))

  • Kim, Kyeong-Mi
    • (The)Study of the Eastern Classic
    • /
    • no.62
    • /
    • pp.145-176
    • /
    • 2016
  • This paper aims to define the leadership of Gunja (君子, translated into prince, gentleman, or ideal man) based on Confucian Classics which offer the general values and norms of individuals' virtue and social virtuous acts. Thus, humanitarianism is regarded as true value, and the values of a virtuous person who properly practices social human relationships are discussed. The real worth of Gunja image is discussed as a true human image of "self-completion and completion of all things" (成己成物) which involves the convergence of truth, good and beauty where there is a sense of harmony and balance, where there is stern self discipline and self cultivation and where win-win values of human relationships are created. Confucian saint (聖人), wise man (賢人), great man (大人), and gentleman (君子) mean social leaders. They practice human morals, enlighten and beautify society with teachings, and are indicated as equipped with mental and material harmony, good character and competence, and economic power and morality. People today pursue their own personal growth according to their material preferences rather than pure intellectual cultural values, and are engrossed in visually beautiful external unlimited competition. In this digital age, we are supposed to demonstrate our individuality, but many people are obsessed with appearance, go on severe diet, and lose their health beauty, and consequently suffer mental stress. This trend fuels obsession with appearance and the sick practice of valuing appearance. As an alternative method to overcome this phenomenon, we need a leader image with the convergence of truth, good and beauty, which is characterized by internal self cultivation, external professionalism, and handsome and solid character. Confucian thoughts consist in practicing the Way of disciplining oneself for governing others (修己治人). Self discipline involves developing personal virtuous ability for cultivating a virtuous character, and governing others involves interacting to work together in society and to have right human relationships. Thus, leaders should impress not only themselves but also others. Self discipline for governing others means cultivating virtue for oneself and leading others. A true leader has self introspection and establishes himself through self discipline so that he can govern others or reach the realm of settling others where people live together. As all things have a value and a virtue, humans endeavor to cultivate character and virtue by learning and studying for securing their professionalism, reliability, character and ability, so as to create their own brand value. Personal character does not come from a high position, wealth and power. Character is a personal virtue, and is cultivated as immaculate and fresh through self discipline. As such, it well matches with a clean and clear spirit. This offers the ideal leader as the Guja image who has an extremely humane character, as well as being equipped with inherent virtues of intellect, benevolence and courage. Self development can foster virtue and self management through self leadership and self discipline. The leader in the relationship area can practice his virtue through virtuous acts, in other words, even think from another person's perspective. Such leader is mentioned as the principle of measuring square in the Great Learning. In our viewpoint, the beauty of character can breed the seed of virtue through intellect, benevolence and courage, the beauty of win-win can realize the right virtue by showing exemplary acts to others through considerateness, and the beauty of harmony can love and care for others like me through the principle of measuring square, thereby realizing the universal principle of virtue and harmony, which is like my mind. As such, the ideal leader, when his virtue and mind of being considerate of others all blending well, can exercise his ability to the full, can live together and coexist with many people, and can grow again into a triumphant relationship.

Supplementary Woodblocks of the Tripitaka Koreana at Haeinsa Temple: Focus on Supplementary Woodblocks of the Maha Prajnaparamita Sutra (해인사 고려대장경 보각판(補刻板) 연구 -『대반야바라밀다경』 보각판을 중심으로-)

  • Shin, Eunje;Park, Hyein
    • MISULJARYO - National Museum of Korea Art Journal
    • /
    • v.98
    • /
    • pp.104-129
    • /
    • 2020
  • Designated as a national treasure of Korea and inscribed on the UNESCO World Heritage List, the Tripitaka Koreana at Haeinsa Temple is the world's oldest and most comprehensive extant version of the Tripitaka in Hanja script (i.e., Chinese characters). The set consists of 81,352 carved woodblocks, some of which have two or more copies, which are known as "duplicate woodblocks." These duplicates are supplementary woodblocks (bogakpan) that were carved some time after the original production, likely to replace blocks that had been eroded or damaged by repeated printings. According to the most recent survey, the number of supplementary woodblocks is 118, or approximately 0.14% of the total set, which attests to the outstanding preservation of the original woodblocks. Research on the supplementary woodblocks can reveal important details about the preservation and management of the Tripitaka Koreana woodblocks. Most of the supplementary woodblocks were carved during the Joseon period (1392-1910) or Japanese colonial period (1910-1945). Although the details of the woodblocks from the Japanese colonial period have been recorded and organized to a certain extent, no such efforts have been made with regards to the woodblocks from the Joseon period. This paper analyzes the characteristics and production date of the supplementary woodblocks of the Tripitaka Koreana. The sutra with the most supplementary woodblocks is the Maha Prajnaparamita Sutra (Perfection of Transcendental Wisdom), often known as the Heart Sutra. In fact, 76 of the total 118 supplementary woodblocks (64.4%) are for this sutra. Hence, analyses of printed versions of the Maha Prajnaparamita Sutra should illuminate trends in the carving of supplementary woodblocks for the Tripitaka Koreana, including the representative characteristics of different periods. According to analysis of the 76 supplementary woodblocks of the Maha Prajnaparamita Sutra, 23 were carved during the Japanese colonial period: 12 in 1915 and 11 in 1937. The remaining 53 were carved during the Joseon period at three separate times. First, 14 of the woodblocks bear the inscription "carved in the mujin year by Haeji" ("戊辰年更刻海志"). Here, the "mujin year" is estimated to correspond to 1448, or the thirtieth year of the reign of King Sejong. On many of these 14 woodblocks, the name of the person who did the carving is engraved outside the border. One of these names is Seonggyeong, an artisan who is known to have been active in 1446, thus supporting the conclusion that the mujin year corresponds to 1448. The vertical length of these woodblocks (inside the border) is 21 cm, which is about 1 cm shorter than the original woodblocks. Some of these blocks were carved in the Zhao Mengfu script. Distinguishing features include the appearance of faint lines on some plates, and the rough finish of the bottoms. The second group of supplementary woodblocks was carved shortly after 1865, when the monks Namho Yeonggi and Haemyeong Jangung had two copies of the Tripitaka Koreana printed. At the time, some of the pages could not be printed because the original woodblocks were damaged. This is confirmed by the missing pages of the extant copy that is now preserved at Woljeongsa Temple. As a result, the supplementary woodblocks are estimated to have been produced immediately after the printing. Evidently, however, not all of the damaged woodblocks could be replaced at this time, as only six woodblocks (comprising eight pages) were carved. On the 1865 woodblocks, lines can be seen between the columns, no red paint was applied, and the prayers of patrons were also carved into the plates. The third carving of supplementary woodblocks occurred just before 1899, when the imperial court of the Korean Empire sponsored a new printing of the Tripitaka Koreana. Government officials who were dispatched to supervise the printing likely inspected the existing blocks and ordered supplementary woodblocks to be carved to replace those that were damaged. A total of 33 supplementary woodblocks (comprising 56 pages) were carved at this time, accounting for the largest number of supplementary woodblocks for the Maha Prajnaparamita Sutra. On the 1899 supplementary woodblocks, red paint was applied to each plate and one line was left blank at both ends.

A Study on Forestation for Landscaping around the Lakes in the Upper Watersheds of North Han River (북한강상류수계(北漢江上流水系)의 호수단지주변삼림(湖水団地周辺森林)의 풍경적시업(風景的施業)에 관(関)한 연구(硏究))

  • Ho, Ul Yeong
    • Journal of Korean Society of Forest Science
    • /
    • v.54 no.1
    • /
    • pp.1-24
    • /
    • 1981
  • Kangweon-Do is rich in sightseeing resources. There are three sightseeing areas;first, mountain area including Seolak and Ohdae National Parks, and chiak Provincial Park; second eastern coastal area; third lake area including the watersheds of North Han River. In this paper, several methods of forestation were studied for landscaping the North Han River watersheds centering around Chounchon. In Chunchon lake complex, there are four lakes; Uiam, Chunchon, Soyang and Paro from down to upper stream. The total surface area of the above four lakes is $14.4km^2$ the total pondage of them 4,155 million $m^3$, the total generation of electric power of them 410 thousand Kw, and the total forest area bordering on them $1,208km^2$. The bordering forest consists of planned management forest ($745km^2$) and non-planned management forest ($463km^2$). The latter is divided into green belt zone, natural conservation area, and protection forest. The forest in green belt amounts to $177km^2$ and centers around the 10km radios from Chunchon. The forest in natural conservation area amounts to $165km^2$, which is established within 2km sight range from the Soyang-lake sides. Protection forest surrounding the lakes is $121km^2$ There are many scenic places, recreation gardens, cultural goods and ruins in this lake complex, which are the same good tourist resources as lakes and forest. The forest encirelng the lakes has the poor average growing stock of $15m^3/ha$, because 70% of the forest consists of the young plantation of 1 to 2 age class. The ration of the needle-leaved forest, the broad-leaved forest and the mixed forest in 35:37:28. From the standpoint of ownership, the forest consists of national forest (36%), provincial forest (14%), Gun forest (5%) and private forest(45%). The greater part of the forest soil, originated from granite and gneiss, is much liable to weathering. Because the surface soil is mostly sterile, the fertilization for improving the soil quality is strongly urged. Considering the above-mentioned, the forestation methods for improving landscape of the North Han River Watersheds are suggested as follows: 1) The mature-stage forest should be induced by means of fertilizing and tendering, as the forest in this area is the young plantation with poor soil. 2) The bare land should be afforested by planting the rapid growing species, such as rigida pine, alder, and etc. 3) The bare land in the canyon with moderate moist and comparatively rich soil should be planted with Korean-pine, larch, ro fir. 4) Japaness-pine stand should be changed into Korean-pine, fir, spruce or hemlock stand from ravine to top gradually, because the Japanese-pine has poor capacity of water conservation and great liability to pine gall midge. 5) Present hard-wood forest, consisting of miscellaneous trees comparatively less valuable from the point of wood quality and scenerity, should be change into oak, maple, fraxinus-rhynchophylla, birch or juglan stand which is comparatively more valuable. 6) In the mountain foot within the sight-range, stands should be established with such species as cherry, weeping willow, white poplar, machilus, maiden-hair tree, juniper, chestnut or apricot. 7) The regeneration of some broad-leaved forests should be induced to the middle forest type, leading to the harmonious arrangement of the two storied forest and the coppice. 8) For the preservation of scenery, the reproduction of the soft-wood forest should be done under the selection method or the shelter-wood system. 9) Mixed forest should be regenerated under the middle forest system with upper needle-leaved forest and lower broad-leaved forest. In brief, the nature's mysteriousness should be conserved by combining the womanly elegance of the lakes and the manly grandeur of the forest.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Design and Implementation of MongoDB-based Unstructured Log Processing System over Cloud Computing Environment (클라우드 환경에서 MongoDB 기반의 비정형 로그 처리 시스템 설계 및 구현)

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.71-84
    • /
    • 2013
  • Log data, which record the multitude of information created when operating computer systems, are utilized in many processes, from carrying out computer system inspection and process optimization to providing customized user optimization. In this paper, we propose a MongoDB-based unstructured log processing system in a cloud environment for processing the massive amount of log data of banks. Most of the log data generated during banking operations come from handling a client's business. Therefore, in order to gather, store, categorize, and analyze the log data generated while processing the client's business, a separate log data processing system needs to be established. However, the realization of flexible storage expansion functions for processing a massive amount of unstructured log data and executing a considerable number of functions to categorize and analyze the stored unstructured log data is difficult in existing computer environments. Thus, in this study, we use cloud computing technology to realize a cloud-based log data processing system for processing unstructured log data that are difficult to process using the existing computing infrastructure's analysis tools and management system. The proposed system uses the IaaS (Infrastructure as a Service) cloud environment to provide a flexible expansion of computing resources and includes the ability to flexibly expand resources such as storage space and memory under conditions such as extended storage or rapid increase in log data. Moreover, to overcome the processing limits of the existing analysis tool when a real-time analysis of the aggregated unstructured log data is required, the proposed system includes a Hadoop-based analysis module for quick and reliable parallel-distributed processing of the massive amount of log data. Furthermore, because the HDFS (Hadoop Distributed File System) stores data by generating copies of the block units of the aggregated log data, the proposed system offers automatic restore functions for the system to continually operate after it recovers from a malfunction. Finally, by establishing a distributed database using the NoSQL-based Mongo DB, the proposed system provides methods of effectively processing unstructured log data. Relational databases such as the MySQL databases have complex schemas that are inappropriate for processing unstructured log data. Further, strict schemas like those of relational databases cannot expand nodes in the case wherein the stored data are distributed to various nodes when the amount of data rapidly increases. NoSQL does not provide the complex computations that relational databases may provide but can easily expand the database through node dispersion when the amount of data increases rapidly; it is a non-relational database with an appropriate structure for processing unstructured data. The data models of the NoSQL are usually classified as Key-Value, column-oriented, and document-oriented types. Of these, the representative document-oriented data model, MongoDB, which has a free schema structure, is used in the proposed system. MongoDB is introduced to the proposed system because it makes it easy to process unstructured log data through a flexible schema structure, facilitates flexible node expansion when the amount of data is rapidly increasing, and provides an Auto-Sharding function that automatically expands storage. The proposed system is composed of a log collector module, a log graph generator module, a MongoDB module, a Hadoop-based analysis module, and a MySQL module. When the log data generated over the entire client business process of each bank are sent to the cloud server, the log collector module collects and classifies data according to the type of log data and distributes it to the MongoDB module and the MySQL module. The log graph generator module generates the results of the log analysis of the MongoDB module, Hadoop-based analysis module, and the MySQL module per analysis time and type of the aggregated log data, and provides them to the user through a web interface. Log data that require a real-time log data analysis are stored in the MySQL module and provided real-time by the log graph generator module. The aggregated log data per unit time are stored in the MongoDB module and plotted in a graph according to the user's various analysis conditions. The aggregated log data in the MongoDB module are parallel-distributed and processed by the Hadoop-based analysis module. A comparative evaluation is carried out against a log data processing system that uses only MySQL for inserting log data and estimating query performance; this evaluation proves the proposed system's superiority. Moreover, an optimal chunk size is confirmed through the log data insert performance evaluation of MongoDB for various chunk sizes.

The Policy of Win-Win Growth between Large and Small Enterprises : A South Korean Model (한국형 동반성장 정책의 방향과 과제)

  • Lee, Jang-Woo
    • Korean small business review
    • /
    • v.33 no.4
    • /
    • pp.77-93
    • /
    • 2011
  • Since 2000, the employment rate of small and medium enterprises (SMEs) has dwindled while the creation of new jobs and the emergence of healthy SMEs have been stagnant. The fundamental reason for these symptoms is that the economic structure is disadvantageous to SMEs. In particular, the greater gap between SMEs and large enterprises has resulted in polarization, and the resulting imbalance has become the largest obstacle to improving SMEs' competitiveness. For example, the total productivity has continued to drop, and the average productivity of SMEs is now merely 30% of that of large enterprises, and the average wage of SMEs' employees is only 53% of that of large enterprises. Along with polarization, rapid industrialization has also caused anti-enterprise consensus, the collapse of the middle class, hostility towards establishments, and other aftereffects. The general consensus is that unless these problems are solved, South Korea will not become an advanced country. Especially, South Korea is now facing issues that need urgent measures, such as the decline of its economic growth, the worsening distribution of profits, and the increased external volatility. Recognizing such negative trends, the MB administration proposed a win-win growth policy and recently introduced a new national value called "ecosystemic development." As the terms in such policy agenda are similar, however, the conceptual differences among such terms must first be fully understood. Therefore, in this study, the concepts of win-win growth policy and ecosystemic development, and the need for them, were surveyed, and their differences from and similarities with other policy concepts like win-win cooperation and symbiotic development were examined. Based on the results of the survey and examination, the study introduced a South Korean model of win-win growth, targeting the promotion of a sound balance between large enterprises and SMEs and an innovative ecosystem, and finally, proposing future policy tasks. Win-win growth is not an academic term but a policy term. Thus, it is less advisable to give a theoretical definition of it than to understand its concept based on its objective and method as a policy. The core of the MB administration's win-win growth policy is the creation of a partnership between key economic subjects such as large enterprises and SMEs based on each subject's differentiated capacity, and such economic subjects' joint promotion of growth opportunities. Its objective is to contribute to the establishment of an advanced capitalistic system by securing the sustainability of the South Korean economy. Such win-win growth policy includes three core concepts. The first concept, ecosystem, is that win-win growth should be understood from the viewpoint of an industrial ecosystem and should be pursued by overcoming the issues of specific enterprises. An enterprise is not an independent entity but a social entity, meaning it exists in relationship with the society (Drucker, 2011). The second concept, balance, points to the fact that an effort should be made to establish a systemic and social infrastructure for a healthy balance in the industry. The social system and infrastructure should be established in such a way as to create a balance between short- term needs and long-term sustainability, between freedom and responsibility, and between profitability and social obligations. Finally, the third concept is the behavioral change of economic entities. The win-win growth policy is not merely about simple transactional relationships or determining reasonable prices but more about the need for a behavior change on the part of economic entities, without which the objectives of the policy cannot be achieved. Various advanced countries have developed different win-win growth models based on their respective cultures and economic-development stages. Japan, whose culture is characterized by a relatively high level of group-centered trust, has developed a productivity improvement model based on such culture, whereas the U.S., which has a highly developed system of market capitalism, has developed a system that instigates or promotes market-oriented technological innovation. Unlike Japan or the U.S., Europe, a late starter, has not fully developed a trust-based culture or market capitalism and thus often uses a policy-led model based on which the government leads the improvement of productivity and promotes technological innovation. By modeling successful cases from these advanced countries, South Korea can establish its unique win-win growth system. For this, it needs to determine the method and tasks that suit its circumstances by examining the prerequisites for its success as well as the strengths and weaknesses of each advanced country. This paper proposes a South Korean model of win-win growth, whose objective is to upgrade the country's low-trust-level-based industrial structure, in which large enterprises and SMEs depend only on independent survival strategies, to a high-trust-level-based social ecosystem, in which large enterprises and SMEs develop a cooperative relationship as partners. Based on this objective, the model proposes the establishment of a sound balance of systems and infrastructure between large enterprises and SMEs, and to form a crenovative social ecosystem. The South Korean model of win-win growth consists of three axes: utilization of the South Koreans' potential, which creates community-oriented energy; fusion-style improvement of various control and self-regulated systems for establishing a high-trust-level-oriented social infrastructure; and behavioral change on the part of enterprises in terms of putting an end to their unfair business activities and promoting future-oriented cooperative relationships. This system will establish a dynamic industrial ecosystem that will generate creative energy and will thus contribute to the realization of a sustainable economy in the 21st century. The South Korean model of win-win growth should pursue community-based self-regulation, which promotes the power of efficiency and competition that is fundamentally being pursued by capitalism while at the same time seeking the value of society and community. Already existing in Korea's traditional roots, such objectives have become the bases of the Shinbaram culture, characterized by the South Koreans' spontaneity, creativity, and optimism. In the process of a community's gradual improvement of its rules and procedures, the trust among the community members increases, and the "social capital" that guarantees the successful control of shared resources can be established (Ostrom, 2010). This basic ideal can help reduce the gap between large enterprises and SMEs, alleviating the South Koreans' victim mentality in the face of competition and the open-door policy, and creating crenovative corporate competitiveness. The win-win growth policy emerged for the purpose of addressing the polarization and imbalance structure resulting from the evolution of 21st-century capitalism. It simultaneously pursues efficiency and fairness on one hand and economic and community values on the other, and aims to foster efficient interaction between the market and the government. This policy, however, is also evolving. The win-win growth policy can be considered an extension of the win-win cooperation that the past 'Participatory Government' promoted at the enterprise management level to the level of systems and culture. Also, the ecosystemic development agendum that has recently emerged is a further extension that has been presented as a national ideal of "a new development model that promotes the co-advancement of environmental conservation, growth, economic development, social integration, and national and individual development."