• Title/Summary/Keyword: information theory

Search Result 7,448, Processing Time 0.033 seconds

Decision-Making of Determining the Start Time of Charging / Discharging of Electrical Vehicle Based on Prospect Theory

  • Liu, Lian;Lyu, Xiang;Jiang, Chuanwen;Xie, Da
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.3
    • /
    • pp.803-811
    • /
    • 2014
  • The moment when Electrical Vehicle (EV) starts charging or discharging is one of the most important parameters in estimating the impact of EV load on the grid. In this paper, a decision-making problem of determining the start time of charging and discharging during allowed period is proposed and studied under the uncertainty of real-time price. Prospect theory is utilized in the decision-making problem of this paper for it describes a kind of decision making behaviors under uncertainty. The case study uses the parameters of Springo SGM7001EV and adopts the historical realtime locational marginal pricing (LMP) data of PJM market for scenario reduction. Prospect values are calculated for every possible start time in the allowed charging or discharging period. By comparing the calculated prospect values, the optimal decisions are obtained accordingly and the results are compared with those based on Expected Utility Theory. Results show that with different initial State-of-Charge ($SoC_0$) and different reference points, the optimal start time of charging can be the one between 12 a.m. to 3 a.m. and optimal discharging starts at 2 p.m. or 3p.m. Moreover, the decision results of Prospect Theory may differ from that of the Expected Utility Theory with the reference points changing.

The CAbAT Modeling of Library User Context Information Applying Activity Theory (행위이론을 적용한 도서관 이용자 컨텍스트 정보의 CAbAT 모델링)

  • Lee, Jeong-Soo;Nam, Young-Joon
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.221-239
    • /
    • 2012
  • The information that has been created according to the complex environment and usage pattern of library user can provide context-aware information service through knowledge structuralization on whether it is a suitable situation for user. Accordingly, the development of a context model for defining the various contexts of library user and for the structuralization of interrelated context information is an essential requirement. This study examined the context concept and context modeling, and utilizing the concept of Activity Theory by Engestrom, the activity model of library user was designed as 1) subject, 2) object, 3) tools, 4) divison of labor, 5) community, and 6) rules. In addition, for the purpose of analyzing the context of library user, activity information was tracked to utilize the Shadow Tracking for observing and recording their forms, and the methodology of CAbAT (Context Analysis based on Activity Theory) was utilized for the collected activity information to analyze the user context model.

A Path Way to Increase the Intention to Comply with Information Security Policy of Employees (조직 구성원들의 정보보안 정책 준수행위 의도에 관한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.119-128
    • /
    • 2012
  • This study is to identify the factors that influence an intention to information security policy compliance of employees. To do this, this study is based on three theoretical backgrounds because of the lack of holistic perspective. Research results show that detection certainty and individual attachment have a positive effect on information security policy compliance intention. Detection certainty is influenced by security awareness education and training. Finally, response cost has a negative effect on information security policy compliance intention.

혁신확산이론 기반의 CRM 품질요인과 성과에 관한 연구

  • Jin, Chan-Yong;Kim, Do-Goan
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.194-198
    • /
    • 2008
  • Under the rapid change of business circumstance to E-business, CRM is one of the major strategic choices to reinforce the relationship with customers. In this point, this study attempts to understand the relationships among the quality of CRM and the variables of post adoption on the innovation diffusion theory. With integration of information system success model and innovation diffusion theory, it developed a research model and several hypotheses focusing on CRM performance of post-adoption. To testify the hypotheses, it conducted a survey on insurance industry and performed a statistical analysis for the research model with structure equation model. The results show that the factors of CRM quality (system, service, and information) have significant relationships with level of CRM usage and satisfaction. And the relationships between satisfaction and CRM performance and between CRM performance and intension of CRM extension are found as statistically significant.

  • PDF

The use of network theory to model disparate ship design information

  • Rigterink, Douglas;Piks, Rebecca;Singer, David J.
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.6 no.2
    • /
    • pp.484-495
    • /
    • 2014
  • This paper introduces the use of network theory to model and analyze disparate ship design information. This work will focus on a ship's distributed systems and their intra- and intersystem structures and interactions. The three system to be analyzed are: a passageway system, an electrical system, and a fire fighting system. These systems will be analyzed individually using common network metrics to glean information regarding their structures and attributes. The systems will also be subjected to community detection algorithms both separately and as a multiplex network to compare their similarities, differences, and interactions. Network theory will be shown to be useful in the early design stage due to its simplicity and ability to model any shipboard system.

The Effect of Cognitive Absorption on the Individual Intention of Technology Acceptance: An Empirical Study on the MP3 Player (인지적 몰입이 개인의 기술 수용에 미치는 영향: MP3 플레이어에 대한 실증 연구)

  • Kim, Bo-Youn;Lee, Sang-Gun;Kang, Min-Cheol
    • Asia pacific journal of information systems
    • /
    • v.16 no.1
    • /
    • pp.45-69
    • /
    • 2006
  • Technology Acceptance Model (TAM) has been widely used to predict user's behavior to accept the technology. Prior researches have been mainly focused on innovation constructs such as perceived usefulness and perceived ease of use. However, very little research has been conducted to understand individual mental beliefs in technology acceptance and imitation influence. This study integrates Technology Acceptance Model (TAM), Flow Theory (FT) and Diffusion of Innovation Theory (DIT). This paper indicates that imitation context, cognitive absorption (CA) based Flow theory and innovation context are the three important factors influencing user acceptance of information technologies. The proposed model has been tested among 232 users of MP3 players. Results showed that innovation context and cognitive absorption have positive influences on intention to use technology. Not all factors of the imitation context have direct effect on intention to use. However, we found that imitation context has positive influence on intention to use technology through cognitive absorption.

A Development Methodology for Reliability Improvement of ESTEREL based Embedded Software (Esterel 기반 임베디드 소프트웨어의 신뢰성 향상을 위한 개발 기법)

  • YANG Jin-Seok;SIM Jae-Hwan;KIM Jin-Hyun;KANG In-Hye;CHOI Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.334-336
    • /
    • 2005
  • 본 논문은 정형 명세 언어인 Esterel이 가지는 취약점을 보안하기 위해 Safety-Critical Aided Development Environment를 추가로 활용하여 신뢰성 있고 안전적인 임베디드 제어 소프트웨어 개발을 위한 기법을 제시하고 있다. 그 뿐만 아니라 제시한 기법을 이용하여 개발된 간단한 자동 강속 제어 소프트웨어를 인터페이스와 기능 부분에 대해서 각각 확인 및 검증을 수행한 후 임베디드 시스템인 레고 마인드 스톰으로 제작된 차량 로봇에 탑재한 후 실험을 하고, 실험을 통해 기존 개발 기법과의 차이점을 분석한다.

  • PDF

Research on Keyword-Overlap Similarity Algorithm Optimization in Short English Text Based on Lexical Chunk Theory

  • Na Li;Cheng Li;Honglie Zhang
    • Journal of Information Processing Systems
    • /
    • v.19 no.5
    • /
    • pp.631-640
    • /
    • 2023
  • Short-text similarity calculation is one of the hot issues in natural language processing research. The conventional keyword-overlap similarity algorithms merely consider the lexical item information and neglect the effect of the word order. And some of its optimized algorithms combine the word order, but the weights are hard to be determined. In the paper, viewing the keyword-overlap similarity algorithm, the short English text similarity algorithm based on lexical chunk theory (LC-SETSA) is proposed, which introduces the lexical chunk theory existing in cognitive psychology category into the short English text similarity calculation for the first time. The lexical chunks are applied to segment short English texts, and the segmentation results demonstrate the semantic connotation and the fixed word order of the lexical chunks, and then the overlap similarity of the lexical chunks is calculated accordingly. Finally, the comparative experiments are carried out, and the experimental results prove that the proposed algorithm of the paper is feasible, stable, and effective to a large extent.

An Empirical Study on Behavior and Psychology Concerning Invoice Disposal in the Context of Courier Services: A Comparative Study on Korea and the U.S.

  • Se Hun Lim
    • Asia pacific journal of information systems
    • /
    • v.28 no.2
    • /
    • pp.133-153
    • /
    • 2018
  • This study investigates responses to privacy concerns by analyzing the psychological and behavioral characteristics related to the disposition toward invoices of courier service users. To this end, we develop a theoretical framework by combining stimulus response theory, communication privacy management theory, the theory of reasoned action, and the theory of planned behavior. Based on the theoretical framework, we analyze the relationships between social influence, privacy propensity, privacy control, privacy risk, privacy concern, invoice disposition intention, and invoice disposition behavior in the context of courier services. To test our hypotheses, we survey courier service users in the U.S. and Korea. Using a structural equation model, we test the relationships among these various factors for the courier service users of the two countries. Results have distinct implications for the psychological and behavioral characteristics concerning the disposal of courier invoices and enable understanding of the characteristics of courier service customers of the two countries.

Research on Pattern Elements and Colors in Apparel Design through Fractal Theory

  • Dan Li;Chengjun Yuan
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.409-417
    • /
    • 2024
  • Excellent apparel design can increase market competitiveness. This article briefly introduced the theory of fractals and its application in the field of apparel design. The convolutional neural network (CNN) algorithm was used to assist in the evaluation of apparel designs. In the case analysis, the accuracy of the evaluation was validated by comparing the CNN algorithm with two other intelligent algorithms, support vector machine (SVM) and back propagation (BP). The evaluation of the proposed design showed that compared with SVM and BP algorithms, the CNN algorithm had higher accuracy in evaluating apparel designs. The evaluation result of the proposed apparel design not only further verifies the effectiveness of the CNN algorithm, but also demonstrates that the theory of fractals can be effectively applied in apparel design to provide more innovative designs.