• Title/Summary/Keyword: Problem Solve

Search Result 11,853, Processing Time 0.043 seconds

Performance analysis of Frequent Itemset Mining Technique based on Transaction Weight Constraints (트랜잭션 가중치 기반의 빈발 아이템셋 마이닝 기법의 성능분석)

  • Yun, Unil;Pyun, Gwangbum
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.67-74
    • /
    • 2015
  • In recent years, frequent itemset mining for considering the importance of each item has been intensively studied as one of important issues in the data mining field. According to strategies utilizing the item importance, itemset mining approaches for discovering itemsets based on the item importance are classified as follows: weighted frequent itemset mining, frequent itemset mining using transactional weights, and utility itemset mining. In this paper, we perform empirical analysis with respect to frequent itemset mining algorithms based on transactional weights. The mining algorithms compute transactional weights by utilizing the weight for each item in large databases. In addition, these algorithms discover weighted frequent itemsets on the basis of the item frequency and weight of each transaction. Consequently, we can see the importance of a certain transaction through the database analysis because the weight for the transaction has higher value if it contains many items with high values. We not only analyze the advantages and disadvantages but also compare the performance of the most famous algorithms in the frequent itemset mining field based on the transactional weights. As a representative of the frequent itemset mining using transactional weights, WIS introduces the concept and strategies of transactional weights. In addition, there are various other state-of-the-art algorithms, WIT-FWIs, WIT-FWIs-MODIFY, and WIT-FWIs-DIFF, for extracting itemsets with the weight information. To efficiently conduct processes for mining weighted frequent itemsets, three algorithms use the special Lattice-like data structure, called WIT-tree. The algorithms do not need to an additional database scanning operation after the construction of WIT-tree is finished since each node of WIT-tree has item information such as item and transaction IDs. In particular, the traditional algorithms conduct a number of database scanning operations to mine weighted itemsets, whereas the algorithms based on WIT-tree solve the overhead problem that can occur in the mining processes by reading databases only one time. Additionally, the algorithms use the technique for generating each new itemset of length N+1 on the basis of two different itemsets of length N. To discover new weighted itemsets, WIT-FWIs performs the itemset combination processes by using the information of transactions that contain all the itemsets. WIT-FWIs-MODIFY has a unique feature decreasing operations for calculating the frequency of the new itemset. WIT-FWIs-DIFF utilizes a technique using the difference of two itemsets. To compare and analyze the performance of the algorithms in various environments, we use real datasets of two types (i.e., dense and sparse) in terms of the runtime and maximum memory usage. Moreover, a scalability test is conducted to evaluate the stability for each algorithm when the size of a database is changed. As a result, WIT-FWIs and WIT-FWIs-MODIFY show the best performance in the dense dataset, and in sparse dataset, WIT-FWI-DIFF has mining efficiency better than the other algorithms. Compared to the algorithms using WIT-tree, WIS based on the Apriori technique has the worst efficiency because it requires a large number of computations more than the others on average.

Memory Organization for a Fuzzy Controller.

  • Jee, K.D.S.;Poluzzi, R.;Russo, B.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1041-1043
    • /
    • 1993
  • Fuzzy logic based Control Theory has gained much interest in the industrial world, thanks to its ability to formalize and solve in a very natural way many problems that are very difficult to quantify at an analytical level. This paper shows a solution for treating membership function inside hardware circuits. The proposed hardware structure optimizes the memoried size by using particular form of the vectorial representation. The process of memorizing fuzzy sets, i.e. their membership function, has always been one of the more problematic issues for the hardware implementation, due to the quite large memory space that is needed. To simplify such an implementation, it is commonly [1,2,8,9,10,11] used to limit the membership functions either to those having triangular or trapezoidal shape, or pre-definite shape. These kinds of functions are able to cover a large spectrum of applications with a limited usage of memory, since they can be memorized by specifying very few parameters ( ight, base, critical points, etc.). This however results in a loss of computational power due to computation on the medium points. A solution to this problem is obtained by discretizing the universe of discourse U, i.e. by fixing a finite number of points and memorizing the value of the membership functions on such points [3,10,14,15]. Such a solution provides a satisfying computational speed, a very high precision of definitions and gives the users the opportunity to choose membership functions of any shape. However, a significant memory waste can as well be registered. It is indeed possible that for each of the given fuzzy sets many elements of the universe of discourse have a membership value equal to zero. It has also been noticed that almost in all cases common points among fuzzy sets, i.e. points with non null membership values are very few. More specifically, in many applications, for each element u of U, there exists at most three fuzzy sets for which the membership value is ot null [3,5,6,7,12,13]. Our proposal is based on such hypotheses. Moreover, we use a technique that even though it does not restrict the shapes of membership functions, it reduces strongly the computational time for the membership values and optimizes the function memorization. In figure 1 it is represented a term set whose characteristics are common for fuzzy controllers and to which we will refer in the following. The above term set has a universe of discourse with 128 elements (so to have a good resolution), 8 fuzzy sets that describe the term set, 32 levels of discretization for the membership values. Clearly, the number of bits necessary for the given specifications are 5 for 32 truth levels, 3 for 8 membership functions and 7 for 128 levels of resolution. The memory depth is given by the dimension of the universe of the discourse (128 in our case) and it will be represented by the memory rows. The length of a world of memory is defined by: Length = nem (dm(m)+dm(fm) Where: fm is the maximum number of non null values in every element of the universe of the discourse, dm(m) is the dimension of the values of the membership function m, dm(fm) is the dimension of the word to represent the index of the highest membership function. In our case then Length=24. The memory dimension is therefore 128*24 bits. If we had chosen to memorize all values of the membership functions we would have needed to memorize on each memory row the membership value of each element. Fuzzy sets word dimension is 8*5 bits. Therefore, the dimension of the memory would have been 128*40 bits. Coherently with our hypothesis, in fig. 1 each element of universe of the discourse has a non null membership value on at most three fuzzy sets. Focusing on the elements 32,64,96 of the universe of discourse, they will be memorized as follows: The computation of the rule weights is done by comparing those bits that represent the index of the membership function, with the word of the program memor . The output bus of the Program Memory (μCOD), is given as input a comparator (Combinatory Net). If the index is equal to the bus value then one of the non null weight derives from the rule and it is produced as output, otherwise the output is zero (fig. 2). It is clear, that the memory dimension of the antecedent is in this way reduced since only non null values are memorized. Moreover, the time performance of the system is equivalent to the performance of a system using vectorial memorization of all weights. The dimensioning of the word is influenced by some parameters of the input variable. The most important parameter is the maximum number membership functions (nfm) having a non null value in each element of the universe of discourse. From our study in the field of fuzzy system, we see that typically nfm 3 and there are at most 16 membership function. At any rate, such a value can be increased up to the physical dimensional limit of the antecedent memory. A less important role n the optimization process of the word dimension is played by the number of membership functions defined for each linguistic term. The table below shows the request word dimension as a function of such parameters and compares our proposed method with the method of vectorial memorization[10]. Summing up, the characteristics of our method are: Users are not restricted to membership functions with specific shapes. The number of the fuzzy sets and the resolution of the vertical axis have a very small influence in increasing memory space. Weight computations are done by combinatorial network and therefore the time performance of the system is equivalent to the one of the vectorial method. The number of non null membership values on any element of the universe of discourse is limited. Such a constraint is usually non very restrictive since many controllers obtain a good precision with only three non null weights. The method here briefly described has been adopted by our group in the design of an optimized version of the coprocessor described in [10].

  • PDF

SANET-CC : Zone IP Allocation Protocol for Offshore Networks (SANET-CC : 해상 네트워크를 위한 구역 IP 할당 프로토콜)

  • Bae, Kyoung Yul;Cho, Moon Ki
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.87-109
    • /
    • 2020
  • Currently, thanks to the major stride made in developing wired and wireless communication technology, a variety of IT services are available on land. This trend is leading to an increasing demand for IT services to vessels on the water as well. And it is expected that the request for various IT services such as two-way digital data transmission, Web, APP, etc. is on the rise to the extent that they are available on land. However, while a high-speed information communication network is easily accessible on land because it is based upon a fixed infrastructure like an AP and a base station, it is not the case on the water. As a result, a radio communication network-based voice communication service is usually used at sea. To solve this problem, an additional frequency for digital data exchange was allocated, and a ship ad-hoc network (SANET) was proposed that can be utilized by using this frequency. Instead of satellite communication that costs a lot in installation and usage, SANET was developed to provide various IT services to ships based on IP in the sea. Connectivity between land base stations and ships is important in the SANET. To have this connection, a ship must be a member of the network with its IP address assigned. This paper proposes a SANET-CC protocol that allows ships to be assigned their own IP address. SANET-CC propagates several non-overlapping IP addresses through the entire network from land base stations to ships in the form of the tree. Ships allocate their own IP addresses through the exchange of simple requests and response messages with land base stations or M-ships that can allocate IP addresses. Therefore, SANET-CC can eliminate the IP collision prevention (Duplicate Address Detection) process and the process of network separation or integration caused by the movement of the ship. Various simulations were performed to verify the applicability of this protocol to SANET. The outcome of such simulations shows us the following. First, using SANET-CC, about 91% of the ships in the network were able to receive IP addresses under any circumstances. It is 6% higher than the existing studies. And it suggests that if variables are adjusted to each port's environment, it may show further improved results. Second, this work shows us that it takes all vessels an average of 10 seconds to receive IP addresses regardless of conditions. It represents a 50% decrease in time compared to the average of 20 seconds in the previous study. Also Besides, taking it into account that when existing studies were on 50 to 200 vessels, this study on 100 to 400 vessels, the efficiency can be much higher. Third, existing studies have not been able to derive optimal values according to variables. This is because it does not have a consistent pattern depending on the variable. This means that optimal variables values cannot be set for each port under diverse environments. This paper, however, shows us that the result values from the variables exhibit a consistent pattern. This is significant in that it can be applied to each port by adjusting the variable values. It was also confirmed that regardless of the number of ships, the IP allocation ratio was the most efficient at about 96 percent if the waiting time after the IP request was 75ms, and that the tree structure could maintain a stable network configuration when the number of IPs was over 30000. Fourth, this study can be used to design a network for supporting intelligent maritime control systems and services offshore, instead of satellite communication. And if LTE-M is set up, it is possible to use it for various intelligent services.

The Present Status and the Preservation Method of the Rice Terrace as Scenic Sites Resources in Northeast Asia (동북아시아 계단식 논의 명승지정 현황 및 보전방안)

  • Youn, Kyung-Sook;Lee, Chang-Hun;Kim, Hyung-Dae;Seo, Woo-Hyun;Lee, Jae-Keun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.4
    • /
    • pp.111-123
    • /
    • 2011
  • This study aims to present the basic materials, which lead us to preserve the Korea Rice Terrace as scenic sites resources and study it continuously, through researching about the present status and the preservation method of the Rice Terrace in Korea, China and Japan. The results of this study are as follows. First, The Rice Terrace has a traditional agricultural technique which minimizing the damage of the scenic view while cultivating the slope. And also, it has the value of one of the Korea unique traditional scenic views. However, The no cultivation land or disappearing desert land of rice terrace were increasing by the disadvantage of operation in land cultivation. Therefore, The Government must need preparing the base of scene resources excavation by executed the established of Korea Rice Terrace Database for preserving of Korea traditional scene. however it is getting to disappearance. And also, The High valued of Rice Terrace by cultural and scenic view which is must managed by designation of scenic sites or monument. Second, The internal and external reference book researched and analyzed results are as followings for understanding about Korea Rice Terrace feature. First of all, The Rice Terrace's dictionary meaning is just difference by each nations. However, Generally speaking that It means the terraced land by cultivated of sloped land. The Rice Terrace has cross relation with mountain valley and piedmont slope cultivation in location of condition. It occurred era is before approximately estimated from 3000 of years until 6000 of years. It can divide two type by topography shape those are slope and valley type. However, The natural element of forest has very big position in this part. But, The Rice Terrace is just managed and designated by the scenic sites with the Cultural Properties Protection Law. It must needs more binding force and effectiveness for the Rice Terrace scenic view plan establishment by scenic laws and farming and fishing village laws etc. I think that it must need the Rice Terrace related law establishment as soon as possible for efficient preservation and management of the Rice Terrace. Third, The Rice Terrace were researched and analyzed results are as followings those were executed at the Korea, China and Japan. The Korea and Japan have good Rice Terrace Characteristic. And also, The high valued scenic sites area were good managed by the Cultural Properties Protection Law as well as the superior scenic valued Rice Terrace in China. Those are also managed by designated scenic sites for protection and preservation positively. Those were managed by each autonomous district management Department. The each nation's related laws of Rice Terrace protection were just little bit different. However, The basic purpose is same. for example, it based on superior scenic view preservation and protection. Especially, The Japan's Cultural Properties Law and Scenic law linkage, and China Autonomous district legislation and effectiveness. The Korea Government must need above elements for Korea Rice Terrace culture and scenic view preservation. Fourth, We need inducing the owner system and the policy of Rice Terrace preservation promotion association for efficient preservation of Rice Terrace in japan. The owner system in japan gives the owner of the land a permission to rent the land to Rice Terrace preservation promotion association and the local government. In this system the village would be revitalized by commons in the way of the management of the terraces, beautifying the area around the terraces and etc. And also, Making the each village management operating system for Rice Terrace management through educating civilization. The civilization could receive quick help from a consultative body comprised of experts such as representatives of Cultural Heritage Administration and professors. And it is in a hurry to solve the problem of revitalization of the region by exchange between cities and the village.

A Study on the Effect of Network Centralities on Recommendation Performance (네트워크 중심성 척도가 추천 성능에 미치는 영향에 대한 연구)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.23-46
    • /
    • 2021
  • Collaborative filtering, which is often used in personalization recommendations, is recognized as a very useful technique to find similar customers and recommend products to them based on their purchase history. However, the traditional collaborative filtering technique has raised the question of having difficulty calculating the similarity for new customers or products due to the method of calculating similaritiesbased on direct connections and common features among customers. For this reason, a hybrid technique was designed to use content-based filtering techniques together. On the one hand, efforts have been made to solve these problems by applying the structural characteristics of social networks. This applies a method of indirectly calculating similarities through their similar customers placed between them. This means creating a customer's network based on purchasing data and calculating the similarity between the two based on the features of the network that indirectly connects the two customers within this network. Such similarity can be used as a measure to predict whether the target customer accepts recommendations. The centrality metrics of networks can be utilized for the calculation of these similarities. Different centrality metrics have important implications in that they may have different effects on recommended performance. In this study, furthermore, the effect of these centrality metrics on the performance of recommendation may vary depending on recommender algorithms. In addition, recommendation techniques using network analysis can be expected to contribute to increasing recommendation performance even if they apply not only to new customers or products but also to entire customers or products. By considering a customer's purchase of an item as a link generated between the customer and the item on the network, the prediction of user acceptance of recommendation is solved as a prediction of whether a new link will be created between them. As the classification models fit the purpose of solving the binary problem of whether the link is engaged or not, decision tree, k-nearest neighbors (KNN), logistic regression, artificial neural network, and support vector machine (SVM) are selected in the research. The data for performance evaluation used order data collected from an online shopping mall over four years and two months. Among them, the previous three years and eight months constitute social networks composed of and the experiment was conducted by organizing the data collected into the social network. The next four months' records were used to train and evaluate recommender models. Experiments with the centrality metrics applied to each model show that the recommendation acceptance rates of the centrality metrics are different for each algorithm at a meaningful level. In this work, we analyzed only four commonly used centrality metrics: degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality. Eigenvector centrality records the lowest performance in all models except support vector machines. Closeness centrality and betweenness centrality show similar performance across all models. Degree centrality ranking moderate across overall models while betweenness centrality always ranking higher than degree centrality. Finally, closeness centrality is characterized by distinct differences in performance according to the model. It ranks first in logistic regression, artificial neural network, and decision tree withnumerically high performance. However, it only records very low rankings in support vector machine and K-neighborhood with low-performance levels. As the experiment results reveal, in a classification model, network centrality metrics over a subnetwork that connects the two nodes can effectively predict the connectivity between two nodes in a social network. Furthermore, each metric has a different performance depending on the classification model type. This result implies that choosing appropriate metrics for each algorithm can lead to achieving higher recommendation performance. In general, betweenness centrality can guarantee a high level of performance in any model. It would be possible to consider the introduction of proximity centrality to obtain higher performance for certain models.

An Exploratory Study on Customers' Individual Factors on Waiting Experience (고객의 개인적 요소가 대기시간 경험에 미치는 영향에 대한 탐색적 연구)

  • Kim, Juyoung;Yoo, Bomi
    • Asia Marketing Journal
    • /
    • v.12 no.1
    • /
    • pp.1-30
    • /
    • 2010
  • Customers often experience waiting for buying service. Managing customers' waiting time is important for service providers since customers who are dissatisfied with waiting, secede from a service place at last. Not a few studies have been done to solve waiting time problem and improve customers' waiting experience. Hui & Tse(1996) identify evaluation factors in customers' behavioral mechanism as customers wait. That is, customers experience perceived waiting time, waiting acceptability and emotional response to the wait when they wait. Since customers evaluate the wait using these factors, service provider should manage these factors in order to minimize customers' dissatisfaction. Therefore, this study explores that evaluation factors of waiting are influenced by customers' situational and experiential characteristics, which include customer loyalty, transaction importance for customer and waiting expectation level. Those situational and experiential characteristics are usually given to service providers so they can't control these at waiting point. The major findings derived from two exploratory studies can be summarized as follows. First, according to the result from the study 1 (restaurant setting), customers' transaction importance has the greatest positive influence on waiting experience. The results show restaurant service provider could prevent customers' separation effectively through strategies which raise customers' transaction importance, like giving special coupons for important events. Second, in study 2 (amusement part setting) customer loyalty has large positive impact on waiting experience as well as transaction importance. This results show that service provider could minimize customers' dissatisfaction using strategies which raise customer loyalty continuously. This results show customer perceives waiting experience differently according to characteristics of service place and service itself. Therefore, service provider should grasp the unique customers' situational and experiential characters for each service and service place. It could provide an effective strategy for waiting time management. Third, the study finds transaction importance and waiting expectation level have direct influence customers' waiting experience as independent variables, while existing studies treated them as moderators. Customer loyalty which has not been incorporated in previous waiting time research is known to affect waiting experience. It suggests that marketing strategy which builds up customer loyalty for long period of time is also quite effective, compared to short term tactics to help customers endure waiting time. Fourth, this study reveals the importance of actual waiting time along with perceived waiting time. So far most studies only focus on customers' perceived waiting time. Especially, this study incorporates the concept of patient limit on waiting time to investigate effect of actual waiting time. The results show that there were various responses to the wait depending on how actual waiting time exceeds individual's patent limit on waiting time or not, even though customers wait about the same period of time. Finally, using structural equation model, conceptual path between behavioral responses is verified. As customer perceives waiting time, then she decides whether she can endure it or not, and then her emotional response occurs. This result are somewhat different from Hui & Tse(1996)'s study. The study also includes theoretical contributions as well as practical implications.

  • PDF

Effects of climate change on biodiversity and measures for them (생물다양성에 대한 기후변화의 영향과 그 대책)

  • An, Ji Hong;Lim, Chi Hong;Jung, Song Hie;Kim, A Reum;Lee, Chang Seok
    • Journal of Wetlands Research
    • /
    • v.18 no.4
    • /
    • pp.474-480
    • /
    • 2016
  • In this study, formation background of biodiversity and its changes in the process of geologic history, and effects of climate change on biodiversity and human were discussed and the alternatives to reduce the effects of climate change were suggested. Biodiversity is 'the variety of life' and refers collectively to variation at all levels of biological organization. That is, biodiversity encompasses the genes, species and ecosystems and their interactions. It provides the basis for ecosystems and the services on which all people fundamentally depend. Nevertheless, today, biodiversity is increasingly threatened, usually as the result of human activity. Diverse organisms on earth, which are estimated as 10 to 30 million species, are the result of adaptation and evolution to various environments through long history of four billion years since the birth of life. Countlessly many organisms composing biodiversity have specific characteristics, respectively and are interrelated with each other through diverse relationship. Environment of the earth, on which we live, has also created for long years through extensive relationship and interaction of those organisms. We mankind also live through interrelationship with the other organisms as an organism. The man cannot lives without the other organisms around him. Even though so, human beings accelerate mean extinction rate about 1,000 times compared with that of the past for recent several years. We have to conserve biodiversity for plentiful life of our future generation and are responsible for sustainable use of biodiversity. Korea has achieved faster economic growth than any other countries in the world. On the other hand, Korea had hold originally rich biodiversity as it is not only a peninsula country stretched lengthily from north to south but also three sides are surrounded by sea. But they disappeared increasingly in the process of fast economic growth. Korean people have created specific Korean culture by coexistence with nature through a long history of agriculture, forestry, and fishery. But in recent years, the relationship between Korean and nature became far in the processes of introduction of western culture and development of science and technology and specific natural feature born from harmonious combination between nature and culture disappears more and more. Population of Korea is expected to be reduced as contrasted with world population growing continuously. At this time, we need to restore biodiversity damaged in the processes of rapid population growth and economic development in concert with recovery of natural ecosystem due to population decrease. There were grand extinction events of five times since the birth of life on the earth. Modern extinction is very rapid and human activity is major causal factor. In these respects, it is distinguished from the past one. Climate change is real. Biodiversity is very vulnerable to climate change. If organisms did not find a survival method such as 'adaptation through evolution', 'movement to the other place where they can exist', and so on in the changed environment, they would extinct. In this respect, if climate change is continued, biodiversity should be damaged greatly. Furthermore, climate change would also influence on human life and socio-economic environment through change of biodiversity. Therefore, we need to grasp the effects that climate change influences on biodiversity more actively and further to prepare the alternatives to reduce the damage. Change of phenology, change of distribution range including vegetation shift, disharmony of interaction among organisms, reduction of reproduction and growth rates due to odd food chain, degradation of coral reef, and so on are emerged as the effects of climate change on biodiversity. Expansion of infectious disease, reduction of food production, change of cultivation range of crops, change of fishing ground and time, and so on appear as the effects on human. To solve climate change problem, first of all, we need to mitigate climate change by reducing discharge of warming gases. But even though we now stop discharge of warming gases, climate change is expected to be continued for the time being. In this respect, preparing adaptive strategy of climate change can be more realistic. Continuous monitoring to observe the effects of climate change on biodiversity and establishment of monitoring system have to be preceded over all others. Insurance of diverse ecological spaces where biodiversity can establish, assisted migration, and establishment of horizontal network from south to north and vertical one from lowland to upland ecological networks could be recommended as the alternatives to aid adaptation of biodiversity to the changing climate.

An Empirical Study in Relationship between Franchisor's Leadership Behavior Style and Commitment by Focusing Moderating Effect of Franchisee's Self-efficacy (가맹본부의 리더십 행동유형과 가맹사업자의 관계결속에 관한 실증적 연구 - 가맹사업자의 자기효능감의 조절효과를 중심으로 -)

  • Yang, Hoe-Chang;Lee, Young-Chul
    • Journal of Distribution Research
    • /
    • v.15 no.1
    • /
    • pp.49-71
    • /
    • 2010
  • Franchise businesses in South Korea have contributed to economic growth and job creation, and its growth potential remains very high. However, despite such virtues, domestic franchise businesses face many problems such as the instability of franchisor's business structure and weak financial conditions. To solve these problems, the government enacted legislation and strengthened franchise related laws. However, the strengthening of laws regulating franchisors had many side effects that interrupted the development of the franchise business. For example, legal regulations regarding franchisors have had the effect of suppressing the franchisor's leadership activities (e.g. activities such as the ability to advocate the franchisor's policies and strategies to the franchisees, in order to facilitate change and innovation). One of the main goals of the franchise business is to build cooperation between the franchisor and the franchisee for their combined success. However, franchisees can refuse to follow the franchisor's strategies because of the current state of franchise-related law and government policy. The purpose of this study to explore the effects of franchisor's leadership style on franchisee's commitment in a franchise system. We classified leadership styles according to the path-goal theory (House & Mitchell, 1974), and it was hypothesized and tested that the four leadership styles proposed by the path-goal theory (i.e. directive, supportive, participative and achievement-oriented leadership) have different effects on franchisee's commitment. Another purpose of this study to explore the how the level of franchisee's self-efficacy influences both the franchisor's leadership style and franchisee's commitment in a franchise system. Results of the present study are expected to provide important theoretical and practical implications as to the role of franchisor's leadership style, as restricted by government regulations and the franchisee's self-efficacy, which could be needed to improve the quality of the long-term relationship between the franchisor and franchisee. Quoted by Northouse(2007), one problem regarding the investigation of leadership is that there are almost as many different definitions of leadership as there are people who have tried to define it. But despite the multitude of ways in which leadership has been conceptualized, the following components can be identified as central to the phenomenon: (a) leadership is a process, (b) leadership involves influence, (c) leadership occurs in a group context, and (d) leadership involves goal attainment. Based on these components, in this study leadership is defined as a process whereby franchisor's influences a group of franchisee' to achieve a common goal. Focusing on this definition, the path-goal theory is about how leaders motivate subordinates to accomplish designated goals. Drawing heavily from research on what motivates employees, path-goal theory first appeared in the leadership literature in the early 1970s in the works of Evans (1970), House (1971), House and Dessler (1974), and House and Mitchell (1974). The stated goal of this leadership theory is to enhance employee performance and employee satisfaction by focusing on employee motivation. In brief, path-goal theory is designed to explain how leaders can help subordinates along the path to their goals by selecting specific behaviors that are best suited to subordinates' needs and to the situation in which subordinates are working (Northouse, 2007). House & Mitchell(1974) predicted that although many different leadership behaviors could have been selected to be a part of path-goal theory, this approach has so far examined directive, supportive, participative, and achievement-oriented leadership behaviors. And they suggested that leaders may exhibit any or all of these four styles with various subordinates and in different situations. However, due to restrictive government regulations, franchisors are not in a position to change their leadership style to suit their circumstances. In addition, quoted by Northouse(2007), ssubordinate characteristics determine how a leader's behavior is interpreted by subordinates in a given work context. Many researchers have focused on subordinates' needs for affiliation, preferences for structure, desires for control, and self-perceived level of task ability. In this study, we have focused on the self-perceived level of task ability, namely, the franchisee's self-efficacy. According to Bandura (1977), self-efficacy is chiefly defined as the personal attitude of one's ability to accomplish concrete tasks. Therefore, it is not an indicator of one's actual abilities, but an opinion of the extent of how one can use that ability. Thus, the judgment of maintain franchisee's commitment depends on the situation (e.g., government regulation and policy and leadership style of franchisor) and how it affects one's ability to mobilize resources to deal with the task, so even if people possess the same ability, there may be differences in self-efficacy. Figure 1 illustrates the model investigated in this study. In this model, it was hypothesized that leadership styles would affect the franchisee's commitment, and self-efficacy would moderate the relationship between leadership style and franchisee's commitment. Theoretically, quoted by Northouse(2007), the path-goal approach suggests that leaders need to choose a leadership style that best fits the needs of subordinates and the work they are doing. According to House & Mitchell (1974), the theory predicts that a directive style of leadership is best in situations in which subordinates are dogmatic and authoritarian, the task demands are ambiguous, and the organizational rule and procedures are unclear. In these situations, franchisor's directive leadership complements the work by providing guidance and psychological structure for franchisees. For work that is structured, unsatisfying, or frustrating, path-goal theory suggests that leaders should use a supportive style. Franchisor's Supportive leadership offers a sense of human touch for franchisees engaged in mundane, mechanized activity. Franchisor's participative leadership is considered best when a task is ambiguous because participation gives greater clarity to how certain paths lead to certain goals; it helps subordinates learn what actions leads to what outcome. Furthermore, House & Mitchell(1974) predicts that achievement-oriented leadership is most effective in settings in which subordinates are required to perform ambiguous tasks. Marsh and O'Neill (1984) tested the idea that organizational members' anger and decline in performance is caused by deficiencies in their level of effort and found that self-efficacy promotes accomplishment, decreases stress and negative consequences like depression and emotional instability. Based on the extant empirical findings and theoretical reasoning, we posit positive and strong relationships between the franchisor's leadership styles and the franchisee's commitment. Furthermore, the level of franchisee's self-efficacy was thought to maintain their commitment. The questionnaires sent to participants consisted of the following measures; leadership style was assessed using a 20 item 7-point likert scale developed by Indvik (1985), self-efficacy was assessed using a 24 item 6-point likert scale developed by Bandura (1977), and commitment was assessed using a 6 item 5-point likert scale developed by Morgan & Hunt (1994). Questionnaires were distributed to Korean optical franchisees in Seoul. It took about 20 days to complete the data collection. A total number of 140 questionnaires were returned and complete data were available from 137 respondents. Results of multiple regression analyses testing the relationships between the each of the four styles of leadership shown by the franchisor as independent variables and franchisee's commitment as the dependent variable showed that the relationship between supportive leadership style and commitment ($\beta$=.13, p<.001),and the relationship between participative leadership style and commitment ($\beta$=.07, p<.001)were significant. However, when participants divided into high and low self-efficacy groups, results of multiple regression analyses showed that only the relationship between achievement-oriented leadership style and commitment ($\beta$=.14, p<.001) was significant in the high self-efficacy group. In the low self-efficacy group, the relationship between supportive leadership style and commitment ($\beta$=.17, p<.001),and the relationship between participative leadership style and commitment ($\beta$=.10, p<.001) were significant. The study focused on the franchisee's self-efficacy in order to explore the possibility that regulation, originally intended to protect the franchisee, may not be the most effective method to maintain the relationships in a franchise business. The key results of the data analysis regarding the moderating role of self-efficacy between leadership behavior style as proposed by path-goal and commitment theory were as follows. First, this study proposed that franchisor should apply the appropriate type of leadership behavior to strengthen the franchisees commitment because the results demonstrated that supportive and participative leadership styles by the franchisors have a positive influence on the franchisee's level of commitment. Second, it is desirable for franchisor to validate the franchisee's efforts, since the franchisee's characteristics such as self-efficacy had a substantial, positive effect on the franchisee's commitment as well as being a meaningful moderator between leadership and commitment. Third, the results as a whole imply that the government should provide institutional support, namely to put the franchisor in a position to clearly identify the characteristics of their franchisees and provide reasonable means to administer the franchisees to achieve the company's goal.

  • PDF

Implementation of integrated monitoring system for trace and path prediction of infectious disease (전염병의 경로 추적 및 예측을 위한 통합 정보 시스템 구현)

  • Kim, Eungyeong;Lee, Seok;Byun, Young Tae;Lee, Hyuk-Jae;Lee, Taikjin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.69-76
    • /
    • 2013
  • The incidence of globally infectious and pathogenic diseases such as H1N1 (swine flu) and Avian Influenza (AI) has recently increased. An infectious disease is a pathogen-caused disease, which can be passed from the infected person to the susceptible host. Pathogens of infectious diseases, which are bacillus, spirochaeta, rickettsia, virus, fungus, and parasite, etc., cause various symptoms such as respiratory disease, gastrointestinal disease, liver disease, and acute febrile illness. They can be spread through various means such as food, water, insect, breathing and contact with other persons. Recently, most countries around the world use a mathematical model to predict and prepare for the spread of infectious diseases. In a modern society, however, infectious diseases are spread in a fast and complicated manner because of rapid development of transportation (both ground and underground). Therefore, we do not have enough time to predict the fast spreading and complicated infectious diseases. Therefore, new system, which can prevent the spread of infectious diseases by predicting its pathway, needs to be developed. In this study, to solve this kind of problem, an integrated monitoring system, which can track and predict the pathway of infectious diseases for its realtime monitoring and control, is developed. This system is implemented based on the conventional mathematical model called by 'Susceptible-Infectious-Recovered (SIR) Model.' The proposed model has characteristics that both inter- and intra-city modes of transportation to express interpersonal contact (i.e., migration flow) are considered. They include the means of transportation such as bus, train, car and airplane. Also, modified real data according to the geographical characteristics of Korea are employed to reflect realistic circumstances of possible disease spreading in Korea. We can predict where and when vaccination needs to be performed by parameters control in this model. The simulation includes several assumptions and scenarios. Using the data of Statistics Korea, five major cities, which are assumed to have the most population migration have been chosen; Seoul, Incheon (Incheon International Airport), Gangneung, Pyeongchang and Wonju. It was assumed that the cities were connected in one network, and infectious disease was spread through denoted transportation methods only. In terms of traffic volume, daily traffic volume was obtained from Korean Statistical Information Service (KOSIS). In addition, the population of each city was acquired from Statistics Korea. Moreover, data on H1N1 (swine flu) were provided by Korea Centers for Disease Control and Prevention, and air transport statistics were obtained from Aeronautical Information Portal System. As mentioned above, daily traffic volume, population statistics, H1N1 (swine flu) and air transport statistics data have been adjusted in consideration of the current conditions in Korea and several realistic assumptions and scenarios. Three scenarios (occurrence of H1N1 in Incheon International Airport, not-vaccinated in all cities and vaccinated in Seoul and Pyeongchang respectively) were simulated, and the number of days taken for the number of the infected to reach its peak and proportion of Infectious (I) were compared. According to the simulation, the number of days was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days when vaccination was not considered. In terms of the proportion of I, Seoul was the highest while Pyeongchang was the lowest. When they were vaccinated in Seoul, the number of days taken for the number of the infected to reach at its peak was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days. In terms of the proportion of I, Gangneung was the highest while Pyeongchang was the lowest. When they were vaccinated in Pyeongchang, the number of days was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days. In terms of the proportion of I, Gangneung was the highest while Pyeongchang was the lowest. Based on the results above, it has been confirmed that H1N1, upon the first occurrence, is proportionally spread by the traffic volume in each city. Because the infection pathway is different by the traffic volume in each city, therefore, it is possible to come up with a preventive measurement against infectious disease by tracking and predicting its pathway through the analysis of traffic volume.

An Empirical Study on the Influencing Factors for Big Data Intented Adoption: Focusing on the Strategic Value Recognition and TOE Framework (빅데이터 도입의도에 미치는 영향요인에 관한 연구: 전략적 가치인식과 TOE(Technology Organizational Environment) Framework을 중심으로)

  • Ka, Hoi-Kwang;Kim, Jin-soo
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.443-472
    • /
    • 2014
  • To survive in the global competitive environment, enterprise should be able to solve various problems and find the optimal solution effectively. The big-data is being perceived as a tool for solving enterprise problems effectively and improve competitiveness with its' various problem solving and advanced predictive capabilities. Due to its remarkable performance, the implementation of big data systems has been increased through many enterprises around the world. Currently the big-data is called the 'crude oil' of the 21st century and is expected to provide competitive superiority. The reason why the big data is in the limelight is because while the conventional IT technology has been falling behind much in its possibility level, the big data has gone beyond the technological possibility and has the advantage of being utilized to create new values such as business optimization and new business creation through analysis of big data. Since the big data has been introduced too hastily without considering the strategic value deduction and achievement obtained through the big data, however, there are difficulties in the strategic value deduction and data utilization that can be gained through big data. According to the survey result of 1,800 IT professionals from 18 countries world wide, the percentage of the corporation where the big data is being utilized well was only 28%, and many of them responded that they are having difficulties in strategic value deduction and operation through big data. The strategic value should be deducted and environment phases like corporate internal and external related regulations and systems should be considered in order to introduce big data, but these factors were not well being reflected. The cause of the failure turned out to be that the big data was introduced by way of the IT trend and surrounding environment, but it was introduced hastily in the situation where the introduction condition was not well arranged. The strategic value which can be obtained through big data should be clearly comprehended and systematic environment analysis is very important about applicability in order to introduce successful big data, but since the corporations are considering only partial achievements and technological phases that can be obtained through big data, the successful introduction is not being made. Previous study shows that most of big data researches are focused on big data concept, cases, and practical suggestions without empirical study. The purpose of this study is provide the theoretically and practically useful implementation framework and strategies of big data systems with conducting comprehensive literature review, finding influencing factors for successful big data systems implementation, and analysing empirical models. To do this, the elements which can affect the introduction intention of big data were deducted by reviewing the information system's successful factors, strategic value perception factors, considering factors for the information system introduction environment and big data related literature in order to comprehend the effect factors when the corporations introduce big data and structured questionnaire was developed. After that, the questionnaire and the statistical analysis were performed with the people in charge of the big data inside the corporations as objects. According to the statistical analysis, it was shown that the strategic value perception factor and the inside-industry environmental factors affected positively the introduction intention of big data. The theoretical, practical and political implications deducted from the study result is as follows. The frist theoretical implication is that this study has proposed theoretically effect factors which affect the introduction intention of big data by reviewing the strategic value perception and environmental factors and big data related precedent studies and proposed the variables and measurement items which were analyzed empirically and verified. This study has meaning in that it has measured the influence of each variable on the introduction intention by verifying the relationship between the independent variables and the dependent variables through structural equation model. Second, this study has defined the independent variable(strategic value perception, environment), dependent variable(introduction intention) and regulatory variable(type of business and corporate size) about big data introduction intention and has arranged theoretical base in studying big data related field empirically afterwards by developing measurement items which has obtained credibility and validity. Third, by verifying the strategic value perception factors and the significance about environmental factors proposed in the conventional precedent studies, this study will be able to give aid to the afterwards empirical study about effect factors on big data introduction. The operational implications are as follows. First, this study has arranged the empirical study base about big data field by investigating the cause and effect relationship about the influence of the strategic value perception factor and environmental factor on the introduction intention and proposing the measurement items which has obtained the justice, credibility and validity etc. Second, this study has proposed the study result that the strategic value perception factor affects positively the big data introduction intention and it has meaning in that the importance of the strategic value perception has been presented. Third, the study has proposed that the corporation which introduces big data should consider the big data introduction through precise analysis about industry's internal environment. Fourth, this study has proposed the point that the size and type of business of the corresponding corporation should be considered in introducing the big data by presenting the difference of the effect factors of big data introduction depending on the size and type of business of the corporation. The political implications are as follows. First, variety of utilization of big data is needed. The strategic value that big data has can be accessed in various ways in the product, service field, productivity field, decision making field etc and can be utilized in all the business fields based on that, but the parts that main domestic corporations are considering are limited to some parts of the products and service fields. Accordingly, in introducing big data, reviewing the phase about utilization in detail and design the big data system in a form which can maximize the utilization rate will be necessary. Second, the study is proposing the burden of the cost of the system introduction, difficulty in utilization in the system and lack of credibility in the supply corporations etc in the big data introduction phase by corporations. Since the world IT corporations are predominating the big data market, the big data introduction of domestic corporations can not but to be dependent on the foreign corporations. When considering that fact, that our country does not have global IT corporations even though it is world powerful IT country, the big data can be thought to be the chance to rear world level corporations. Accordingly, the government shall need to rear star corporations through active political support. Third, the corporations' internal and external professional manpower for the big data introduction and operation lacks. Big data is a system where how valuable data can be deducted utilizing data is more important than the system construction itself. For this, talent who are equipped with academic knowledge and experience in various fields like IT, statistics, strategy and management etc and manpower training should be implemented through systematic education for these talents. This study has arranged theoretical base for empirical studies about big data related fields by comprehending the main variables which affect the big data introduction intention and verifying them and is expected to be able to propose useful guidelines for the corporations and policy developers who are considering big data implementationby analyzing empirically that theoretical base.