• Title/Summary/Keyword: competitive intelligence

Search Result 143, Processing Time 0.022 seconds

Development of Radar-enabled AI Convergence Transportation Entities Detection System for Lv.4 Connected Autonomous Driving in Adverse Weather

  • Myoungho Oh;Mun-Yong Park;Kwang-Hyun Lim
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.190-201
    • /
    • 2023
  • Securing transportation safety infrastructure technology for Lv.4 connected autonomous driving is very important for the spread of autonomous vehicles, and the safe operation of level 4 autonomous vehicles in adverse weather has limitations due to the development of vehicle-only technology. We developed the radar-enabled AI convergence transportation entities detection system. This system is mounted on fixed and mobile supports on the road, and provides excellent autonomous driving situation recognition/determination results by converging transportation entities information collected from various monitoring sensors such as 60GHz radar and EO/IR based on artificial intelligence. By installing such a radar-enabled AI convergence transportation entities detection system on an autonomous road, it is possible to increase driving efficiency and ensure safety in adverse weather. To secure competitive technologies in the global market, the development of four key technologies such as ① AI-enabled transportation situation recognition/determination algorithm, ② 60GHz radar development technology, ③ multi-sensor data convergence technology, and ④ AI data framework technology is required.

A Study on the User Acceptance Model of Artificial Intelligence Music Based on UTAUT

  • Zhang, Weiwei
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.25-33
    • /
    • 2020
  • In this paper, the purpose is to verify the impact of performance expectations, effort expectations, social impact, individual innovation and perceived value on the intent of use and the behavior of use. Used Unified Theory of Acceptance and Use of Technology (UTAUT) to verify the applicability of this model in China, and established the research model by adding two new variables to UTAUT according to the situation of the Chinese market. To achieve this goal, 345 questionnaires were collected for experienced music creators using artificial intelligence nuggets in China by means of Internet research. The collected data were analyzed through frequency analysis, factor analysis, reliability analysis, and structural equation analysis through SPSS V. 22.0 and AMOS V 22.0. The verification of the hypotheses presented in the research model identified the decisive influence factors on the use of artificial intelligence music acceptance by Chinese users. The study is innovative in that it attempts to verify the applicability of UTAUT in the Chinese context. In the construction of the user acceptance model of AI music, three influencing factors will have an effect on users' intentions, and according to the degree of effect, from largest to smallest, they are respectively Perceived Innovativeness, Performance Expectancy and Effort Expectancy. This paper will also provide some management advices, i.e. improving the utility and usability of AI music, encouraging users with individual innovativeness, developing competitive and attractive pricing policies, increasing publicity, and prioritizing word-of-mouth advertising.

A Case Study on the Introduction and Use of Artificial Intelligence in the Financial Sector (금융권 인공지능 도입 및 활용 사례 연구)

  • Byung-Jun Kim;Sou-Bin Yun;Mi-Ok Kim;Sam-Hyun Chun
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.21-27
    • /
    • 2023
  • This study studies the policies and use cases of the government and the financial sector for artificial intelligence, and the future policy tasks of the financial sector. want to derive According to Gartner, noteworthy technologies leading the financial industry in 2022 include 'generative AI', 'autonomous system', 'Privacy Enhanced Computation (PEC) was selected. The financial sector is developing new technologies such as artificial intelligence, big data, and blockchain. Developments are spurring innovation in the financial sector. Data loss due to the spread of telecommuting after the corona pandemic As interests in sharing and personal information protection increase, companies are expected to change in new digital technologies. Global financial companies also utilize new digital technology to develop products or manage and operate existing businesses. I n order to promote process innovation, I T expenses are being expanded. The financial sector utilizes new digital technology to prevent money laundering, improve work efficiency, and strengthen personal information protection. are applying In the era of Big Blur, where the boundaries between industries are disappearing, the competitive edge in the challenge of new entrants In order to preoccupy the market, financial institutions must actively utilize new technologies in their work.

Digital Library Interface Research Based on EEG, Eye-Tracking, and Artificial Intelligence Technologies: Focusing on the Utilization of Implicit Relevance Feedback (뇌파, 시선추적 및 인공지능 기술에 기반한 디지털 도서관 인터페이스 연구: 암묵적 적합성 피드백 활용을 중심으로)

  • Hyun-Hee Kim;Yong-Ho Kim
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.261-282
    • /
    • 2024
  • This study proposed and evaluated electroencephalography (EEG)-based and eye-tracking-based methods to determine relevance by utilizing users' implicit relevance feedback while navigating content in a digital library. For this, EEG/eye-tracking experiments were conducted on 32 participants using video, image, and text data. To assess the usefulness of the proposed methods, deep learning-based artificial intelligence (AI) techniques were used as a competitive benchmark. The evaluation results showed that EEG component-based methods (av_P600 and f_P3b components) demonstrated high classification accuracy in selecting relevant videos and images (faces/emotions). In contrast, AI-based methods, specifically object recognition and natural language processing, showed high classification accuracy for selecting images (objects) and texts (newspaper articles). Finally, guidelines for implementing a digital library interface based on EEG, eye-tracking, and artificial intelligence technologies have been proposed. Specifically, a system model based on implicit relevance feedback has been presented. Moreover, to enhance classification accuracy, methods suitable for each media type have been suggested, including EEG-based, eye-tracking-based, and AI-based approaches.

A Study on the Service Improvement Strategies by Enterprise through the Analysis of Customer Response Reviews in Smart Home Applications : Based on the Classification of Functional Elements and Design Elements of smart Home Usability Values (스마트 홈 어플리케이션의 고객반응리뷰분석을 통한 기업별 서비스개선전략에 대한 연구 : 스마트 홈 사용성 가치의 기능적요소와 디자인적 요소 분류를 바탕으로)

  • Heo, Ji Yeon;Kim, Min Ji;Cha, Kyung Jin
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.85-107
    • /
    • 2020
  • The Internet of Things market, a technology that connects the Internet to various things, is growing day by day. Besides, various smart home services using IoT and AI (Artificial Intelligence) are being launched in homes. Related to this, existing smart home-related studies focus primarily on ICT technology, not on what service improvements should be made in customer positions. In this study, we will use smart home application customer review data to classify functional and design elements of smart home usability value and examine the ways customers think of service improvement. For this, LG Electronics and Samsung Electronics" Smart Home application, the main provider of Smart Home in Korea, customer reviews were crawled to conduct a comparative analysis between them. In this study, the review of IoT home-applications was analyzed to find service improvement insights from customer perspective, and related analysis of text mining, social network analysis and Doc2vec was used to efficiently analyze data equivalent to about 16,000 user reviews. Through this research, we hope that related companies effectively seek ways to improve smart home services that reflect customer needs and are expected to help them establish competitive strategies by identifying weaknesses and strengths among competitors.

Merchandise Management Using Web Mining in Business To Customer Electronic Commerce (기업과 소비자간 전자상거래에서의 웹 마이닝을 이용한 상품관리)

  • 임광혁;홍한국;박상찬
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.1
    • /
    • pp.97-121
    • /
    • 2001
  • Until now, we have believed that one of advantages of cyber market is that it can virtually display and sell goods because it does not necessary maintain expensive physical shops and inventories. But, in a highly competitive environment, business model that does away with goods in stock must be modified. As we know in the case of AMAZON, leading companies already consider merchandise management as a critical success factor in their business model. That is, a solution to compete against one's competitors in a highly competitive environment is merchandise management as in the traditional retail market. Cyber market has not only past sales data but also web log data before sales data that contains information of path that customer search and purchase on cyber market as compared with traditional retail market. So if we can correctly analyze the characteristics of before sales patterns using web log data, we can better prepare for the potential customers and effectively manage inventories and merchandises. We introduce a systematic analysis method to extract useful data for merchandise management - demand forecasting, evaluating & selecting - using web mining that is the application of data mining techniques to the World Wide Web. We use various techniques of web mining such as clustering, mining association rules, mining sequential patterns.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Analysis of Difference in Importance and Need for Basic Core Competence of Clinical Dental Hygienists

  • Lee, Sun-Mi;Lee, Chun-Sun;Shin, Myong-Suk
    • Journal of dental hygiene science
    • /
    • v.20 no.3
    • /
    • pp.146-154
    • /
    • 2020
  • Background: The objective of this study is to investigate the needs and importance of basic core competencies required for future society by dental hygienists' viewpoints who are working in the clinical practices and to provide the fundamental data to develop the educational programs based on the competencies in the 21st century so as to enhance their working capability. Methods: A total of 38 questionnaires were used in this study, 3 questionnaires on the general characteristics (age, service years, main job functions) and those in 11 sub-factors of basic core competencies including 4 questionnaires on creativity, 3 on collaboration, 3 on communication, 3 on interpersonal relationship, 3 on problem-solving, 4 on resource control, 4 on self-control and development, 2 on vocational ethics, 3 on knowledge information utilization, 3 on global mind, and 3 on emotional intelligence. Self-reported survey was conducted in the dental hygienists who were working in Seoul and Gyeonggi Province and a total of 195 data were analyzed. Results: Vocational ethics, communication, and collaboration showed the highest on both importance and needs with 4.49 points and 4.34; 4.41 and 4.28; and 4.39 and 4.22, respectively, while global mind showed the lowest with 3.51 and 3.59. Upon Importance-Performance Analysis, 7 items were defined to require maintain the status including vocational ethics, communication, collaboration, interpersonal relationship, self-control, emotional intelligence, and problem-solving while 4 items with lower priority were resource control and development, knowledge information utilization, creativity, and global mind. Conclusion: Based on this study results that suggested the basic core competencies of dental hygienists in alignment with their jobs in the future society, competitive dental hygienists should be developed with the educational programs applied with these competencies.

Study on the Modeling of Health Medical Examination Knowledge Base Construction using Data Analysis based on AI (인공지능 기반의 데이터 분석을 적용한 건강검진 지식 베이스 구축 모델링 연구)

  • Kim, Bong-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.35-40
    • /
    • 2020
  • As we enter the society of the future, efforts to increase healthy living are a major area of concern for modern people. In particular, the development of technology for a healthy life that combines ICT technology with a competitive healthcare industry environment is becoming the next growth engine. Therefore, in this paper, artificial intelligence-based data analysis of the examination results was applied in the health examination process. Through this, a research was conducted to build a knowledge base modeling that can improve the reliability of the overall judgment. To this end, an algorithm was designed through deep learning analysis to calculate and verify the test result index. Then, the modeling that provides comprehensive examination information through judgment knowledge was studied. Through the application of the proposed modeling, it is possible to analyze and utilize big data on national health, so it can be expected to reduce medical expenses and increase health.

Domestic development situation of precision nutrition healthcare (PNH) system based on direct-to-consumer (DTC) obese genes (소비자대상 직접 (DTC) 비만유전자 기반 정밀영양 (PNH)의 국내 현황)

  • Oh Yoen Kim;Myoungsook Lee;Jounghee Lee;Cheongmin Sohn;Mi Ock Yoon
    • Journal of Nutrition and Health
    • /
    • v.55 no.6
    • /
    • pp.601-616
    • /
    • 2022
  • In the era of the fourth industrial revolution technology, the inclusion of personalized nutrition for healthcare (PNH), when establishing a healthcare platform to prevent chronic diseases such as obesity, diabetes, cerebrovascular and cardiovascular disease, pulmonary disease, and inflammatory diseases, enhances the national competitiveness of global healthcare markets. Furthermore, since the government experienced COVID-19 and the population dead cross in 2020, as well as numerous health problems due to an increasing super-aged Korean society, there is an urgent need to secure, develop, and utilize PNH-related technologies. Three conditions are essential for the development of PNH technologies. These include the establishment of causality between obesity genome (genotype) and prevalence (phenotype) in Koreans, validation of clinical intervention research, and securing PNH-utilization technology (i.e., algorithm development, artificial intelligence-based platform, direct-to-customer [DTC]-based PNH, etc.). Therefore, a national control tower is required to establish appropriate PNH infrastructure (basic and clinical research, cultivation of PNH-related experts, etc.). The post-corona era will be aggressive in sharing data knowledge and developing related technologies, and Korea needs to actively participate in the large-scale global healthcare markets. This review provides the importance of scientific evidence based on a huge dataset, which is the primary prerequisite for the DTC obesity gene-based PNH technologies to be competitive in the healthcare market. Furthermore, based on comparing domestic and internationally approved DTC obese genes and the current status of Korean obesity genome-based PNH research, we intend to provide a direction to PNH planners (individuals and industries) for establishing scientific PNH guidelines for the prevention of obesity.