• Title/Summary/Keyword: device development

Search Result 5,566, Processing Time 0.037 seconds

Development of Electret to Improve Output and Stability of Triboelectric Nanogenerator (마찰대전 나노발전기의 출력 및 안정성 향상을 위한 일렉트렛 개발)

  • Kam, Dongik;Jang, Sunmin;Yun, Yeongcheol;Bae, Hongeun;Lee, Youngjin;Ra, Yoonsang;Cho, Sumin;Seo, Kyoung Duck;Cha, Kyoung Je;Choi, Dongwhi
    • Korean Chemical Engineering Research
    • /
    • v.60 no.1
    • /
    • pp.93-99
    • /
    • 2022
  • With the rapid development of ultra-small and wearable device technology, continuous electricity supply without spatiotemporal limitations for driving electronic devices is required. Accordingly, Triboelectric nanogenerator (TENG), which utilizes static electricity generated by the contact and separation of two different materials, is being used as a means of effectively harvesting various types of energy dispersed without complex processes and designs due to its simple principle. However, to apply the TENG to real life, it is necessary to increase the electrical output. In addition, stable generation of electrical output, as well as increase in electrical output, is a task to be solved for the commercialization of TENG. In this study, we proposed a method to not only improve the output of TENG but also to stably represent the improved output. This was solved by using the contact layer, which is one of the components of TENG, as an electret for improved output and stability. The utilized electret was manufactured by sequentially performing corona charging-thermal annealing-corona charging on the Fluorinated ethylene propylene (FEP) film. Electric charges artificially injected due to corona charging enter a deep trap through the thermal annealing, so an electret that minimizes charge escape was fabricated and used in TENG. The output performance of the manufactured electret was verified by measuring the voltage output of the TENG in vertical contact separation mode, and the electret treated to the corona charging showed an output voltage 12 times higher than that of the pristine FEP film. The time and humidity stability of the electret was confirmed by measuring the output voltage of the TENG after exposing the electret to a general external environment and extreme humidity environment. In addition, it was shown that it can be applied to real-life by operating the LED by applying an electret to the clap-TENG with the motif of clap.

A Development of Facility Web Program for Small and Medium-Sized PSM Workplaces (중·소규모 공정안전관리 사업장의 웹 전산시스템 개발)

  • Kim, Young Suk;Park, Dal Jae
    • Korean Chemical Engineering Research
    • /
    • v.60 no.3
    • /
    • pp.334-346
    • /
    • 2022
  • There is a lack of knowledge and information on the understanding and application of the Process Safety Management (PSM) system, recognized as a major cause of industrial accidents in small-and medium-sized workplaces. Hence, it is necessary to prepare a protocol to secure the practical and continuous levels of implementation for PSM and eliminate human errors through tracking management. However, insufficient research has been conducted on this. Therefore, this study investigated and analyzed the various violations in the administrative measures, based on the regulations announced by the Ministry of Employment and Labor, in approximately 200 small-and medium-sized PSM workplaces with fewer than 300 employees across in korea. This study intended to contribute to the prevention of major industrial accidents by developing a facility maintenance web program that removed human errors in small-and medium-sized workplaces. The major results are summarized as follows. First, It accessed the web via a QR code on a smart device to check the equipment's specification search function, cause of failure, and photos for the convenience of accessing the program, which made it possible to make requests for the it inspection and maintenance in real time. Second, it linked the identification of the targets to be changed, risk assessment, worker training, and pre-operation inspection with the program, which allowed the administrator to track all the procedures from start to finish. Third, it made it possible to predict the life of the equipment and verify its reliability based on the data accumulated through the registration of the pictures for improvements, repairs, time required, cost, etc. after the work was completed. It is suggested that these research results will be helpful in the practical and systematic operation of small-and medium-sized PSM workplaces. In addition, it can be utilized in a useful manner for the development and dissemination of a facility maintenance web program when establishing future smart factories in small-and medium-sized PSM workplaces under the direction of the government.

Development of High Intensity Focused Ultrasound (HIFU) Mediated AuNP-liposomal Nanomedicine and Evaluation with PET Imaging

  • Ji Yoon Kim;Un Chul Shin;Ji Yong Park;Ran Ji Yoo;Soeku Bae;Tae Hyeon Choi;Kyuwan Kim;Young Chan Ann;Jin Sil Kim;Yu Jin Shin;Hokyu Lee;Yong Jin Lee;Kyo Chul Lee;Suhng Wook Kim;Yun-Sang Lee
    • Journal of Radiopharmaceuticals and Molecular Probes
    • /
    • v.9 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • Liposomes as drug delivery system have proved useful carrier for various disease, including cancer. In addition, perfluorocarbon cored microbubbles are utilized in conjunction with high-intensity focused-ultrasound (HIFU) to enable simultaneous diagnosis and treatment. However, microbubbles generally exhibit lower drug loading efficiency, so the need for the development of a novel liposome-based drug delivery material that can efficiently load and deliver drugs to targeted areas via HIFU. This study aims to develop a liposome-based drug delivery material by introducing a substance that can burst liposomes using ultrasound energy and confirm the ability to target tumors using PET imaging. Liposomes (Lipo-DOX, Lipo-DOX-Au, Lipo-DOX-Au-RGD) were synthesized with gold nanoparticles using an avidin-biotin bond, and doxorubicin was mounted inside by pH gradient method. The size distribution was measured by DLS, and encapsulation efficiency of doxorubicin was analyzed by UV-vis spectrometer. The target specificity and cytotoxicity of liposomes were assessed in vitro by glioblastoma U87mg cells to HIFU treatment and analyzed using CCK-8 assay, and fluorescence microscopy at 6-hour intervals for up to 24 hours. For the in vivo study, U87mg model mouse were injected intravenously with 1.48 MBq of 64Cu-labeled Lipo-DOX-Au and Lipo-DOX-Au-RGD, and PET images were taken at 0, 2, 4, 8, and 24 hours. As a result, the size of liposomes was 108.3 ± 5.0 nm at Lipo-DOX-Au and 94.1 ± 12.2 nm at Lipo-DOX-Au-RGD, and it was observed that doxorubicin was mounted inside the liposome up to 52%. After 6 hours of HIFU treatment, the viability of U87mg cells treated with Lipo-DOX-Au decreased by around 20% compared to Lipo-DOX, and Lipo-DOX-Au-RGD had a higher uptake rate than Lipo-DOX. In vivo study using PET images, it was confirmed that 64Cu-Lipo-DOX-Au-RGD was taken up into the tumor immediately after injection and maintained for up to 4 hours. In this study, drugs released from liposomes-gold nanoparticles via ultrasound and RGD targeting were confirmed by non-invasive imaging. In cell-level experiments, HIFU treatment of gold nanoparticle-coupled liposomes significantly decreased tumor survival, while RGD-liposomes exhibited high tumor targeting and rapid release in vivo imaging. It is expected that the combination of these models with ultrasound is served as an effective drug delivery material with therapeutic outcomes.

A Study on the Improvement of Flexible Working Hours (유연근로시간제 개선에 대한 연구)

  • Kwon, Yong-man;Seo, Ei-seok
    • Journal of Venture Innovation
    • /
    • v.4 no.2
    • /
    • pp.97-108
    • /
    • 2021
  • Labor contracts appear in form as an exchange relationship between labor products and wages, but since they transcend the level of simple barter, they can be economically identified as "trading" and can be identified as "rental." From a legal point of view, a legal device that legally supports and imposes binding force on commodity exchange relations is a contract. Such a labor contract led to a relationship in which wages were received and a certain amount of time was placed under the direction and supervision of the employer as a counter benefit to the receipt of wages. Since working hours are subordinate hours with one's labor under the disposition authority of the employer, long hours of work can be done for the health and safety of workers and furthermore, it can be an act that violates the value to enjoy as a human being. The reduction of working hours needs to be shortened in terms of productivity and enjoyment of workers' culture so that they can expand and reproduce, but users' corporate management labor and production activities should also be compatible compared to those pursued by capitalist countries. Working hours can be seen as individual time and time in society as a whole, and long hours of work at the individual level are reduced, which is undesirable at the individual level, but an increase in products due to an increase in production time at the social level can help social development. It is necessary to consider working hours in terms of finding the balance between these individual and social levels. If the regulation method of working hours was to regulate the total amount of working hours, flexibility and elasticity of working hours are a qualitative regulation method that allows companies to flexibly allocate and organize working hours within a certain range of up to 52 hours per week. Accordingly, it is necessary to shorten working hours, but expand and implement the flexible working hours system according to the situation of the company. To this end, it is necessary to flexibly operate the flexible working hours system, which is currently limited to six months, handle the selective working hours by agreement between employers and workers, and expand the target work of discretionary working hours according to the development of information and communication technology and new types based on the 4th industrial revolution.

Development of deep learning network based low-quality image enhancement techniques for improving foreign object detection performance (이물 객체 탐지 성능 개선을 위한 딥러닝 네트워크 기반 저품질 영상 개선 기법 개발)

  • Ki-Yeol Eom;Byeong-Seok Min
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.99-107
    • /
    • 2024
  • Along with economic growth and industrial development, there is an increasing demand for various electronic components and device production of semiconductor, SMT component, and electrical battery products. However, these products may contain foreign substances coming from manufacturing process such as iron, aluminum, plastic and so on, which could lead to serious problems or malfunctioning of the product, and fire on the electric vehicle. To solve these problems, it is necessary to determine whether there are foreign materials inside the product, and may tests have been done by means of non-destructive testing methodology such as ultrasound ot X-ray. Nevertheless, there are technical challenges and limitation in acquiring X-ray images and determining the presence of foreign materials. In particular Small-sized or low-density foreign materials may not be visible even when X-ray equipment is used, and noise can also make it difficult to detect foreign objects. Moreover, in order to meet the manufacturing speed requirement, the x-ray acquisition time should be reduced, which can result in the very low signal- to-noise ratio(SNR) lowering the foreign material detection accuracy. Therefore, in this paper, we propose a five-step approach to overcome the limitations of low resolution, which make it challenging to detect foreign substances. Firstly, global contrast of X-ray images are increased through histogram stretching methodology. Second, to strengthen the high frequency signal and local contrast, we applied local contrast enhancement technique. Third, to improve the edge clearness, Unsharp masking is applied to enhance edges, making objects more visible. Forth, the super-resolution method of the Residual Dense Block (RDB) is used for noise reduction and image enhancement. Last, the Yolov5 algorithm is employed to train and detect foreign objects after learning. Using the proposed method in this study, experimental results show an improvement of more than 10% in performance metrics such as precision compared to low-density images.

Contactless Data Society and Reterritorialization of the Archive (비접촉 데이터 사회와 아카이브 재영토화)

  • Jo, Min-ji
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.5-32
    • /
    • 2024
  • The Korean government ranked 3rd among 193 UN member countries in the UN's 2022 e-Government Development Index. Korea, which has consistently been evaluated as a top country, can clearly be said to be a leading country in the world of e-government. The lubricant of e-government is data. Data itself is neither information nor a record, but it is a source of information and records and a resource of knowledge. Since administrative actions through electronic systems have become widespread, the production and technology of data-based records have naturally expanded and evolved. Technology may seem value-neutral, but in fact, technology itself reflects a specific worldview. The digital order of new technologies, armed with hyper-connectivity and super-intelligence, not only has a profound influence on traditional power structures, but also has an a similar influence on existing information and knowledge transmission media. Moreover, new technologies and media, including data-based generative artificial intelligence, are by far the hot topic. It can be seen that the all-round growth and spread of digital technology has led to the augmentation of human capabilities and the outsourcing of thinking. This also involves a variety of problems, ranging from deep fakes and other fake images, auto profiling, AI lies hallucination that creates them as if they were real, and copyright infringement of machine learning data. Moreover, radical connectivity capabilities enable the instantaneous sharing of vast amounts of data and rely on the technological unconscious to generate actions without awareness. Another irony of the digital world and online network, which is based on immaterial distribution and logical existence, is that access and contact can only be made through physical tools. Digital information is a logical object, but digital resources cannot be read or utilized without some type of device to relay it. In that respect, machines in today's technological society have gone beyond the level of simple assistance, and there are points at which it is difficult to say that the entry of machines into human society is a natural change pattern due to advanced technological development. This is because perspectives on machines will change over time. Important is the social and cultural implications of changes in the way records are produced as a result of communication and actions through machines. Even in the archive field, what problems will a data-based archive society face due to technological changes toward a hyper-intelligence and hyper-connected society, and who will prove the continuous activity of records and data and what will be the main drivers of media change? It is time to research whether this will happen. This study began with the need to recognize that archives are not only records that are the result of actions, but also data as strategic assets. Through this, author considered how to expand traditional boundaries and achieves reterritorialization in a data-driven society.

Development of Crushing Device for Whole Crop Silage and the Characteristics of Crushed Whole Crop Silage (총체맥류 분쇄기 개발 및 분쇄 총체맥류 사일리지의 품질 특성)

  • Lee, Sunghyoun;Yu, Byeongkee;Ju, Sunyi;Park, Taeil
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.36 no.4
    • /
    • pp.344-349
    • /
    • 2016
  • This study was conducted to evaluate the possibility of expanding the usage of whole crop silage from beef cattle and dairy cow to hogs and chickens. For this purpose, a crushing device was developed to crush whole crop silage. The crushed silage was sealed, and analyzed for its feed value. The silage varieties used for the experiment included Saessal barley and Geumgang wheat. Whole crop barley and wheat were crushed in the crushing system as a whole without separating stems, leaves, grains, etc.. When the crushed whole crop silages (CWCS) were analyzed, full grain, grains above 10 mm in size, grains 5~10 mm in size, and grains below 5 mm in size accounted for, 20%, 4%, 27%, and 49 %, respectively. In order to facilitate the fermentation of CWCS, inoculated some fermenter into each CWCS sample (barley or wheat). As control, another set of sample was not inoculated. Crude protein (CP), ether extract (EE), crude fiber (CF), neutral detergent fiber (NDF), acid detergent fiber (ADF), lignin, cellulose content, total digestible nutrient (TDN), and relative feed value (RFV) of fermenter-inoculated Saessal barley were 2.45 %, 1.61%, 8.95%, 16.94%, 9.52%, 1.01%, 8.51%, 81.38%, and 447.5%, respectively. The CP, EE, CF, NDF, ADF, lignin, cellulose content, TDN, and RFV in the other sample of Saessal barley without inoculation of fermenter were 2.57%, 1.62%, 9.61%, 18.25%, 10.13%, 1.10%, 9.04%, 80.90%, and 412.9%, respectively. The CP, EE, CF, NDF, ADF, lignin, cellulose content, TDN, and RFV of fermenter-inoculated Geumgang wheat sample were 2.43%, 1.27%, 10.99%, 19.49%, 11.23%, 1.46%, 9.77%, 80.03%, and 382.6%, respectively. The CP, EE, CF, NDF, ADF, lignin, cellulose content, TDN, RFV of the other set sample of Geumgang wheat sample without the inoculation of fermenter were 2.28%, 1.44%, 10.08%, 18.02%, 10.44%, 1.26%, 9.18%, 80.65%, and 416.9%, respectively. The TDN and RFV content in the fermenter-inoculated Saessal barley were 81.38% and 447.5%, respectively, while the one in the fermenter-inoculated Geumgang wheat were 80.03% and 382.6% respectively. When the feed value of whole crop barley and wheat silage without crushing process was compared to the feed value of whole crop barley and wheat silage made from crushing system, the latter appeared to be higher than the former. This could be due to the process of sealing the crushed silage which might have minimized air content between samples and shortened the golden period of fermentation. In conclusion, these results indicate that a crushing process might be needed to facilitate fermentation and improve the quality of silage when making whole crop silage.

A Study on Market Expansion Strategy via Two-Stage Customer Pre-segmentation Based on Customer Innovativeness and Value Orientation (고객혁신성과 가치지향성 기반의 2단계 사전 고객세분화를 통한 시장 확산 전략)

  • Heo, Tae-Young;Yoo, Young-Sang;Kim, Young-Myoung
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.1
    • /
    • pp.73-97
    • /
    • 2007
  • R&D into future technologies should be conducted in conjunction with technological innovation strategies that are linked to corporate survival within a framework of information and knowledge-based competitiveness. As such, future technology strategies should be ensured through open R&D organizations. The development of future technologies should not be conducted simply on the basis of future forecasts, but should take into account customer needs in advance and reflect them in the development of the future technologies or services. This research aims to select as segmentation variables the customers' attitude towards accepting future telecommunication technologies and their value orientation in their everyday life, as these factors wilt have the greatest effect on the demand for future telecommunication services and thus segment the future telecom service market. Likewise, such research seeks to segment the market from the stage of technology R&D activities and employ the results to formulate technology development strategies. Based on the customer attitude towards accepting new technologies, two groups were induced, and a hierarchical customer segmentation model was provided to conduct secondary segmentation of the two groups on the basis of their respective customer value orientation. A survey was conducted in June 2006 on 800 consumers aged 15 to 69, residing in Seoul and five other major South Korean cities, through one-on-one interviews. The samples were divided into two sub-groups according to their level of acceptance of new technology; a sub-group demonstrating a high level of technology acceptance (39.4%) and another sub-group with a comparatively lower level of technology acceptance (60.6%). These two sub-groups were further divided each into 5 smaller sub-groups (10 total smaller sub-groups) through two rounds of segmentation. The ten sub-groups were then analyzed in their detailed characteristics, including general demographic characteristics, usage patterns in existing telecom services such as mobile service, broadband internet and wireless internet and the status of ownership of a computing or information device and the desire or intention to purchase one. Through these steps, we were able to statistically prove that each of these 10 sub-groups responded to telecom services as independent markets. We found that each segmented group responds as an independent individual market. Through correspondence analysis, the target segmentation groups were positioned in such a way as to facilitate the entry of future telecommunication services into the market, as well as their diffusion and transferability.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

New Insights on Mobile Location-based Services(LBS): Leading Factors to the Use of Services and Privacy Paradox (모바일 위치기반서비스(LBS) 관련한 새로운 견해: 서비스사용으로 이끄는 요인들과 사생활염려의 모순)

  • Cheon, Eunyoung;Park, Yong-Tae
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.33-56
    • /
    • 2017
  • As Internet usage is becoming more common worldwide and smartphone become necessity in daily life, technologies and applications related to mobile Internet are developing rapidly. The results of the Internet usage patterns of consumers around the world imply that there are many potential new business opportunities for mobile Internet technologies and applications. The location-based service (LBS) is a service based on the location information of the mobile device. LBS has recently gotten much attention among many mobile applications and various LBSs are rapidly developing in numerous categories. However, even with the development of LBS related technologies and services, there is still a lack of empirical research on the intention to use LBS. The application of previous researches is limited because they focused on the effect of one particular factor and had not shown the direct relationship on the intention to use LBS. Therefore, this study presents a research model of factors that affect the intention to use and actual use of LBS whose market is expected to grow rapidly, and tested it by conducting a questionnaire survey of 330 users. The results of data analysis showed that service customization, service quality, and personal innovativeness have a positive effect on the intention to use LBS and the intention to use LBS has a positive effect on the actual use of LBS. These results implies that LBS providers can enhance the user's intention to use LBS by offering service customization through the provision of various LBSs based on users' needs, improving information service qualities such as accuracy, timeliness, sensitivity, and reliability, and encouraging personal innovativeness. However, privacy concerns in the context of LBS are not significantly affected by service customization and personal innovativeness and privacy concerns do not significantly affect the intention to use LBS. In fact, the information related to users' location collected by LBS is less sensitive when compared with the information that is used to perform financial transactions. Therefore, such outcomes on privacy concern are revealed. In addition, the advantages of using LBS are more important than the sensitivity of privacy protection to the users who use LBS than to the users who use information systems such as electronic commerce that involves financial transactions. Therefore, LBS are recommended to be treated differently from other information systems. This study is significant in the theoretical point of contribution that it proposed factors affecting the intention to use LBS in a multi-faceted perspective, proved the proposed research model empirically, brought new insights on LBS, and broadens understanding of the intention to use and actual use of LBS. Also, the empirical results of the customization of LBS affecting the user's intention to use the LBS suggest that the provision of customized LBS services based on the usage data analysis through utilizing technologies such as artificial intelligence can enhance the user's intention to use. In a practical point of view, the results of this study are expected to help LBS providers to develop a competitive strategy for responding to LBS users effectively and lead to the LBS market grows. We expect that there will be differences in using LBSs depending on some factors such as types of LBS, whether it is free of charge or not, privacy policies related to LBS, the levels of reliability related application and technology, the frequency of use, etc. Therefore, if we can make comparative studies with those factors, it will contribute to the development of the research areas of LBS. We hope this study can inspire many researchers and initiate many great researches in LBS fields.