• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.042 seconds

In-Vehicle AR-HUD System to Provide Driving-Safety Information

  • Park, Hye Sun;Park, Min Woo;Won, Kwang Hee;Kim, Kyong-Ho;Jung, Soon Ki
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1038-1047
    • /
    • 2013
  • Augmented reality (AR) is currently being applied actively to commercial products, and various types of intelligent AR systems combining both the Global Positioning System and computer-vision technologies are being developed and commercialized. This paper suggests an in-vehicle head-up display (HUD) system that is combined with AR technology. The proposed system recognizes driving-safety information and offers it to the driver. Unlike existing HUD systems, the system displays information registered to the driver's view and is developed for the robust recognition of obstacles under bad weather conditions. The system is composed of four modules: a ground obstacle detection module, an object decision module, an object recognition module, and a display module. The recognition ratio of the driving-safety information obtained by the proposed AR-HUD system is about 73%, and the system has a recognition speed of about 15 fps for both vehicles and pedestrians.

Identifying the Determinants and the Dynamic Characteristics of ICT Non-Use: A Qualitative Study by Grounded Theory Methodolgy (정보기술 비사용의 결정요인과 동태적 성격의 규명: 근거이론방법론에 의한 질적 연구)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.1-20
    • /
    • 2018
  • Purpose The purpose of this study is to identify the determinants of non-use and the dynamic nature of non-use by the qualitative research methodology, grounded theory methodology, as part of identifying the nature of non-use. Design/methodology/approach We applied the grounded theory methodology to a total of 23 college students, including non-users who are not currently using them, users with low intention to use them, and users with high intention to use. We extracted the codes related to the use and proposed the non-use dynamics conversion process based on the coding results. Findings First, the use of information technology can also promote the frequency of use, but can also lead to the use of negative attitudes which would fall in the state of non-use. Second, the user may have both positive and negative attitudes toward the current information technology. Third, if usage is dominated by habits, it is not so easy to change persistent use into an unused state. Fourth, factors that determine the use of specific information technology can be a factor in determining nonuse. This study has contributed to understand the essence of non - use as well as the nature of use, overcoming limitations of quantitative research approach and confirming possibility of grounded theory method in information system research.

The effects of OTTservice information system quality on reuse intention (OTT 서비스 정보시스템 품질이 재사용의도에 미치는 영향)

  • Eom, Ji Yeon;Lim, Yeong Woo;Kwahk, Kee-Young
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.63-83
    • /
    • 2023
  • Purpose With the continuous growth of the OTT services market, trust issues are becoming increasingly important, but research on this topic is still in its infancy. The purpose of this study is to identify the structural relationship between information system quality and reuse intention of OTT services and to analyze the impact of trust and user satisfaction. Design/methodology/approach This study proposed a research model based on the information system success model. In this study, a survey was conducted among 236 Korean users who have used OTT services within the last six months. Findings The results of the analysis showed that text quality and visual quality had a significant impact on trust in OTT services, with text quality having the largest impact. System quality and text quality also had a significant impact on trust in OTT service providers. However, visual quality did not have a statistically significant effect on trust in the service provider. Trust in the OTT service and the service provider was analyzed to have a significant impact on user satisfaction. However, it did not have a statistically significant impact on reuse intention. These findings have important implications for improving trust in OTT services to increase users' reuse intentions. It is also expected to contribute to further expanding the field of OTT service research.

Proactive: Comprehensive Access to Job Information

  • Lee, Danielle;Brusilovsky, Peter
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.721-738
    • /
    • 2012
  • The Internet has become an increasingly important source for finding the right employees, so more and more companies post their job openings on the Web. The large amount and dynamic nature of career recruiting information causes information overload problems for job seekers. To assist Internet users in searching for the right job, a range of research and commercial systems were developed over the past 10 years. Surprisingly, the majority of existing job search systems support just one, rarely two ways of information access. In contrast, our work focused on exploring a value of comprehensive access to job information in a single system (i.e., a system which supports multiple ways). We designed Proactive, a recommendation system providing comprehensive and personalized information access. To assist the varied needs of users, Proactive has four information retrieval methods - a navigable list of jobs, keyword-based search, implicit preference-based recommendations, and explicit preference-based recommendations. This paper introduces the Proactive and reports the results of a study focusing on the experimental evaluation of these methods. The goal of the study was to assess whether all of the methods are necessary for users to find relevant jobs and to what extent different methods can meet different users' information requirements.

Selecting Good Speech Features for Recognition

  • Lee, Young-Jik;Hwang, Kyu-Woong
    • ETRI Journal
    • /
    • v.18 no.1
    • /
    • pp.29-41
    • /
    • 1996
  • This paper describes a method to select a suitable feature for speech recognition using information theoretic measure. Conventional speech recognition systems heuristically choose a portion of frequency components, cepstrum, mel-cepstrum, energy, and their time differences of speech waveforms as their speech features. However, these systems never have good performance if the selected features are not suitable for speech recognition. Since the recognition rate is the only performance measure of speech recognition system, it is hard to judge how suitable the selected feature is. To solve this problem, it is essential to analyze the feature itself, and measure how good the feature itself is. Good speech features should contain all of the class-related information and as small amount of the class-irrelevant variation as possible. In this paper, we suggest a method to measure the class-related information and the amount of the class-irrelevant variation based on the Shannon's information theory. Using this method, we compare the mel-scaled FFT, cepstrum, mel-cepstrum, and wavelet features of the TIMIT speech data. The result shows that, among these features, the mel-scaled FFT is the best feature for speech recognition based on the proposed measure.

  • PDF

An Enhanced Role-Based Access Control Model using Static Separation of Duty Concept

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1350-1354
    • /
    • 2004
  • This paper proposes a simple but practically useful model for preventing fraud of users called "ERBAC03". The new model consists of qualified mandatory and discretionary features for roles and locations, including the assignment of permissions for the appropriate roles and the assignment of roles for the appropriate locations. Moreover, a static separation of duty (SSoD) principle is applied to the new model for integrity requirements of security systems. The paper also explores some extensions of ERBAC03 including the new model using the SSoD concept from some experiments. The experimental results prove the efficiency improvement of the proposed model that can make benefits for large enterprises.

  • PDF

Application of Fuzzy Theory and Analytic Hierarchy Process to Evaluate Marketing Strategies

  • Yu, C.S.;Tzeng, G.H.;Li, H. L.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.352-357
    • /
    • 1998
  • Conventional marketing research generally focuses on a single layer's benefit. A notable example is the consumer layer providing managers with partial market information to evaluate relevant strategies. As generally known, marketing management encounters complex supply and demand behaviors, thereby necessitation that a successful marketing strategy adopt multi-layer considerations, such as the consumer layer, channel-retailer layer, and marketing planner layer. In light of above situation, this study applies fuzzy theory and the analytic hierarchy process(AHP) technique to analyze the performances of marketing strategies under multi-layer benefits, In addition, conventional marketing research has difficulty in efficiently allocating the limited budget so that each desired criterion can be significantly enhanced by a group of events. Therefore, a weighting structure among the goal, layers, criteria, and strategies(i.e. a group of events) is also developed herein to trace the influential process and assist marketing managers in efficiently allocating resources(i.e.budget).

  • PDF

Implementation of Process System and Intelligent Monitoring Environment using Neural Network

  • Kim, Young-Tak;Kim, Gwan-Hyung;Kim, Soo-Jung;Lee, Sang-Bae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.1
    • /
    • pp.56-62
    • /
    • 2004
  • This research attempts to suggest a detecting method for cutting position of an object using the neural network, which is one of intellectual methods, and the digital image processing method. The extraction method of object information using the image data obtained from the CCD camera as a replacement of traditional analog sensor thanks to the development of digital image processing. Accordingly, this research determines the threshold value in binary-coding of an input image with the help of image processing method and the neural network for the real-time gray-leveled input image in substitution for lighting; as a result, a specific position is detected from the processed binary-coded image and an actual system designed is suggested as an example.

A Study on the Influence of information in the Facorty Automation (자동화에서의 정보의 역할에 관한 연구)

  • 허성관;권택진;박종락;박동은
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.53-59
    • /
    • 1999
  • This study suggests that present conceptual frame work of factory automation technique that is the start point of factory automation is achieved and display a conceptual frame work for it's strategic effect under this documental research. This paper examines influence of information in the factory automation.

  • PDF

Eliciting and Analyzing Requirements for Smart Environment for Future-Oriented Learning and Coaching (스마트 배움터 시스템 설계에 관한 연구)

  • Lee, Jungwoo;Lee, Hyejung;Kim, Min Sun
    • Knowledge Management Research
    • /
    • v.14 no.1
    • /
    • pp.121-132
    • /
    • 2013
  • In education, innovative ways of teaching and learning are always under development and keep being proposed with advanced concepts since the ancient times. Student-centered learning, problem-based learning and cooperative learning have been three major trends under development in secondary education research and practice more than a decade or so. Combined with advanced information and communication technologies, these trends will greatly transform the way we teach and learn in classroom environment and may change the classroom environment itself, into a more interactive and self-centered coaching type environment. In this study, a smart environment that utilizes advanced information technology devices and network is conceptualized, accommodating requirements contained and proposed in the recent trendy pedagogies. Pedagogical cases discussed in these trends are analyzed in detail, producing requirements for such a learning and coaching environment. These requirements are modeled using unified modeling language, leading to a proposal of a basic architecture for an information system supporting this environment.

  • PDF