• Title/Summary/Keyword: attribute

Search Result 3,323, Processing Time 0.026 seconds

The Influential Analysis for Customer Preference in the Perceived Quality of Hypermarket PB (대형마트 PB상품 품질지각이 고객선호도에 미치는 영향)

  • Wang, Il-Woung;Kang, Chang-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2099-2107
    • /
    • 2011
  • Despite the PB diffusion introduced as a strategic competitive factor from the change of a retailing business, the study of PB perceived quality in a customer aspect is poor. Therefore, this study led the influential factors to retailer attribute and product attribute through overall analysis. Also, the study found the influential attributes affecting the perceived quality and analysed the influential power linking to customer satisfaction and preference through the perceived quality. The examined results of the study have known that each attribute links to customer satisfaction via the only perceived quality. The strategic PB sales advantage should be achieved as giving customers the overall perceived quality, and has shown that it can increase the customer preference for PB.

Delphi Study for Developing Consensus of Physical Attribute in Pressure Pulse Waveform (맥상파 물리량 속성 총의형성을 위한 델파이 연구)

  • Lee, Haebeom;Kim, Hyunho;Park, Young-Jae;Park, Young-Bae
    • The Journal of the Society of Korean Medicine Diagnostics
    • /
    • v.18 no.3
    • /
    • pp.137-148
    • /
    • 2014
  • Objectives This study was conducted to derive consensus about physical attributes in pressure pulse waveform and pulse conditions by Delphi study. Methods Delphi research was conducted for 2 rounds via e-mail. 8 Professors who lecture on a diagnostics of K. M. from the society of Korean medicine diagnostics were participated in this survey. They were asked for answering about series of definition for a physical attribute in pressure pulse waveform and combination for physical attributes of pulse conditions. Results 4 survey items were decided to have high validity and 9 survey items were decided to come to consensus about a physical attribute in pressure pulse waveform. 6 pulse condition were decided to come to consensus. Conclusion Using Delphi method, physical attributes in pressure pulse waveform and combinations of physical attribute in pulse condition come to consensus.

Attribute-Based Classification Method for Automatic Construction of Answer Set (정답문서집합 자동 구축을 위한 속성 기반 분류 방법)

  • 오효정;장문수;장명길
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.7_8
    • /
    • pp.764-772
    • /
    • 2003
  • The main thrust of our talk will be based on our experience in developing and applying an attribute-based classification technique in the context of an operational answer set driven retrieval system. To alleviate the difficulty and reduce the cost of manually constructing and maintaining answer sets, i.e., knowledge base, we have devised a new method of automating the answer document selection process by using the notion of attribute-based classification, which is in and of itself novel. We attempt to explain through experiments how helpful the proposed method is for the knowledge base construction process.

Handwritten Numerals Recognition Using an Ant-Miner Algorithm

  • Phokharatkul, Pisit;Phaiboon, Supachai
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1031-1033
    • /
    • 2005
  • This paper presents a system of handwritten numerals recognition, which is based on Ant-miner algorithm (data mining based on Ant colony optimization). At the beginning, three distinct fractures (also called attributes) of each numeral are extracted. The attributes are Loop zones, End points, and Feature codes. After these data are extracted, the attributes are in the form of attribute = value (eg. End point10 = true). The extraction is started by dividing the numeral into 12 zones. The numbers 1-12 are referenced for each zone. The possible values of Loop zone attribute in each zone are "true" and "false". The meaning of "true" is that the zone contains the loop of the numeral. The Endpoint attribute being "true" means that this zone contains the end point of the numeral. There are 24 attributes now. The Feature code attribute tells us how many lines of a numeral are passed by the referenced line. There are 7 referenced lines used in this experiment. The total attributes are 31. All attributes are used for construction of the classification rules by the Ant-miner algorithm in order to classify 10 numerals. The Ant-miner algorithm is adapted with a little change in this experiment for a better recognition rate. The results showed the system can recognize all of the training set (a thousand items of data from 50 people). When the unseen data is tested from 10 people, the recognition rate is 98 %.

  • PDF

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree (이진트리 기반의 속성기반 암호전송 알고리즘)

  • Lee, Moon Sik;Kim, HongTae;Hong, Jeoung Dae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.

Color & Texture Attribute Classification System of Fashion Item Image for Standardizing Learning Data in Fashion AI (패션 AI의 학습 데이터 표준화를 위한 패션 아이템 이미지의 색채와 소재 속성 분류 체계)

  • Park, Nanghee;Choi, Yoonmi
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.2
    • /
    • pp.354-368
    • /
    • 2020
  • Accurate and versatile image data-sets are essential for fashion AI research and AI-based fashion businesses based on a systematic attribute classification system. This study constructs a color and texture attribute hierarchical classification system by collecting fashion item images and analyzing the metadata of fashion items described by consumers. Essential dimensions to explain color and texture attributes were extracted; in addition, attribute values for each dimension were constructed based on metadata and previous studies. This hierarchical classification system satisfies consistency, exclusiveness, inclusiveness, and flexibility. The image tagging to confirm the usefulness of the proposed classification system indicated that the contents of attributes of the same image differ depending on the annotator that require a clear standard for distinguishing differences between the properties. This classification system will improve the reliability of the training data for machine learning, by providing standardized criteria for tasks such as tagging and annotating of fashion items.

Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures (비단조 접근 구조를 갖는 CP-ABE 방식)

  • Sadikin, Rifki;Moon, SangJae;Park, YoungHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control mechanism without a trusted server. We propose an attribute-based access control mechanism by incorporating a CP-ABE scheme to ensure only authorized users can access the sensitive data. The idea of CP-ABE is to include access control policy in the ciphertexts, in which they can only be decrypted if a user possesses attributes that pass through the ciphertext's access structure. In this paper, we prove a secure CP-ABE scheme where the policy can be expressed in non-monotonic access structures. We further compare the performance of our scheme with the existing CP-ABE schemes.

An Exploratory Study of the Effect of Buyer-supplier Relationship on Supplier's Innovation : Cases from Semiconductor Equipment Industry (구매자-공급자 관계가 공급자 혁신에 미치는 영향에 대한 탐색적 연구 : 반도체 장비 산업 사례를 중심으로)

  • Lee, Kangmun;Cho, Dong-sung;Lee, Yun-cheol
    • Knowledge Management Research
    • /
    • v.10 no.4
    • /
    • pp.163-183
    • /
    • 2009
  • Numerous studies in the field of buyer-supplier relationship research have focused on the buyer's performance. In contrast, supplier's performance has been paid relatively little attention by researchers, especially the research about the supplier's innovation in the relationship is still in its early stage. In this paper, we examine the relation between the attribute of buyer-supplier relationship and the attribute of supplier's innovation through case research. We define the attribute of buyer-supplier relationship as 'tie strength' (Granovetter, 1973), and the attribute of supplier's innovation as 'exploitation or exploration' (March, 1991). We selected the semiconductor equipment industry of U.S.A, Japan and Korea and firm (JUSUNG Engineering) as cases that examine the relation. We found that a strong tie relationship is positively associated with supplier's exploitation based innovation, and a weak tie relationship is positively related to it's exploration based innovation in this research also. In addition, we could verify reduction of strong tie relationship cause supplier's organizational change.

  • PDF

Classification of Consumer Review Information Based on Satisfaction/Dissatisfaction with Availability/Non-availability of Information (구매후기 정보의 충족/미충족에 따른 소비자의 만족/불만족 인식 및 구매후기 정보의 유형화)

  • Hong, Hee-Sook
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.35 no.9
    • /
    • pp.1099-1111
    • /
    • 2011
  • This study identified the types of consumer review information about apparel products based on consumer satisfaction/dissatisfaction with the availability/non-availability of consumer review information for online stores. Data were collected from 318 females aged 20s' to 30s', who had significant experience in reading consumer reviews posted on online stores. Consumer satisfaction/dissatisfaction with availability or non-availability of review information on online stores is different for information in regards to apparel product attributes, product benefits, and store attributes. According to the concept of quality elements suggested by the Kano model, two types of consumer review information were determined: Must-have information (product attribute information about size, fabric, color and design of the apparel product; benefit information about washing & care and comport of the apparel product; store attribute information about responsiveness, disclosure, delivery and after service of the store) and attracting information (attribute information about price comparison; benefit information about coordination with other items, fashionability, price discounts, value for price, reaction from others, emotion experienced during transaction, symbolic features for status, health functionality, and eco-friendly feature; store attribute information about return/refund, damage compensation and reputation/credibility of online store and interactive and dynamic nature of reviews among customers). There were significant differences between the high and low involvement groups in their perceptions of consumer review information.

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

  • Li, Jiguo;Wang, Haiping;Zhang, Yichen;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3339-3352
    • /
    • 2016
  • In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is associated with a set of attributes, and the ciphertext is associated with an access policy. The user can decrypt the ciphertext if and only if the attribute set of his secret key satisfies the access policy specified in the ciphertext. In the present schemes, access policy is sent to the decryptor along with the ciphertext, which means that the privacy of the encryptor is revealed. In order to solve such problem, we propose a CP-ABE scheme with hidden access policy, which is able to preserve the privacy of the encryptor and decryptor. And what's more in the present schemes, the users need to do excessive calculation for decryption to check whether their attributes match the access policy specified in the ciphertext or not, which makes the users do useless computation if the attributes don't match the hidden access policy. In order to solve efficiency issue, our scheme adds a testing phase to avoid the unnecessary operation above before decryption. The computation cost for the testing phase is much less than the decryption computation so that the efficiency in our scheme is improved. Meanwhile, our new scheme is proved to be selectively secure against chosen-plaintext attack under DDH assumption.