• Title/Summary/Keyword: model complexity

Search Result 1,977, Processing Time 0.027 seconds

The Study on the Factors Affecting Discontinuance Intention of FinTech Payment Service: Focusing on Y University Students (핀테크 지급결제 서비스 사용중단의도 영향요인 연구: Y대학 재학생을 중심으로)

  • Chang, Eun-Jin;Hwang, Sin-Hae;Kim, Jeoung-Kun
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.117-129
    • /
    • 2022
  • In the perspective of value-based adoption mode, this study empirically examined the factors that affect the intention of users of Fintech payment services to stop using them. A survey of college students who are familiar with digital devices, have no objection to payment and settlement services, and have high service access. A total of 148 questionnaires were analyzed using SPSS and SmartPLS. The study results show that perceived benefits, complexity, and security concerns are significant factors influencing the discontinue intention of Fintech payment services. Among them, the perceived benefit showed the most significant influence. Based on the results of this study, Fintech providers will be able to build a service environment to provide continuous benefits for maintaining long-term relationships with users, improve systems to secure various uses, and reduce users' negative perceptions of security. Recently, the use of services by the elderly has increased, so it is necessary to expand the scope of this study to target various age groups in future research.

E-commerce Adoption of Small and Medium-Sized Enterprises During COVID-19 Pandemic: Evidence from South Asian Countries

  • HOSSAIN, Md Billal;WICAKSONO, Tutur;NOR, Khalil Md;DUNAY, Anna;ILLES, Csaba Balint
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.1
    • /
    • pp.291-298
    • /
    • 2022
  • COVID-19 has spread across the world in the last two years, confining people to their homes and shutting down businesses and markets. The world is currently experiencing a catastrophic economic and social crisis. To benefit people and to protect them, industries invented new products. These products were made by small and medium-sized businesses across the globe. In South Asia, there was also a rigorous lockdown, people were laid off, and SMEs adopted E-commerce to assist clients and customers. Therefore, the study aims to analyze the impact of the COVID-19 pandemic on E-commerce adoption through open innovation strategies in South Asian countries. 500 respondents were selected through an online questionnaire to collect data from different countries of South Asia. The prominent countries are; India, Pakistan, and Bangladesh. The results of the study show that perceived compatibility and complexity have a positive influence on E-commerce adoption. In normal circumstances, however, the open innovation model is feasible. Knowledge and experience sharing and management attitude have a moderate impact on E-commerce adoption. These results are beneficial for researchers and SME managers in South Asia to overcome the challenges of the COVID-19 pandemic and increase the number of skilled people employed. This study suggests that SMEs should hire skilled workers to upgrade their systems.

The effect of ambidextrous strategic balance on the management performance of venture businesses (양손잡이 전략균형이 벤처기업 경영성과에 미치는 영향)

  • Se-jong Yoo;Yong-seok Cho;Woo-hyoung Kim
    • Korea Trade Review
    • /
    • v.48 no.1
    • /
    • pp.83-126
    • /
    • 2023
  • The revenue histogram of venture businesses is shifting from bell-shaped normal distribution to power-law distribution, which implies that the fitness landscape of the venture businesses ecosystem is changing to be more rugged terrain. We argue that the firm should adopt both exploitation (fast follower) and exploration (or first mover) strategies not to get stuck in local maxima in the rugged fitness landscape from the complex system perspective. By designing and performing agent-based modeling simulation experiments which consist of three types of agents (new technologies, entrepreneurs, and consumers), we demonstrated that the ambidexterity strategy showed the highest performance score in three of four different environment except 'Fast Widening' case where the exploitation strategy showed the highest performance score under low technology appropriation and fast disruptive technology development speed. By investigating the financial and other statistics of 617 top venture businesses who have earned 100B won or higher annual revenue, we concluded that 82% and 9% of firms are bent on the exploitation and exploration strategy.

The Success Factors for Self-Service Business Intelligence System: Cases of Korean Companies (사용자 주도 비즈니스 인텔리전스 성공요인 고찰: 한국 기업 사례를 중심으로)

  • JungIm Lee;Soyoung Yoo;Ingoo Han
    • Knowledge Management Research
    • /
    • v.24 no.3
    • /
    • pp.127-148
    • /
    • 2023
  • Traditional Business Intelligence environment is limited to support the rapidly changing businesses and the exponential growth of data in both volume and complexity of data. Companies should shift their business intelligence environment into Self-Service Business Intelligence (SSBI) environment in order to make smarter and faster decisions. However, firms seem to face various challenges in implementing and leveraging the effective business intelligence system, and academics do not provide sufficient studies related including the success factors of SSBI. This study analyzes the three cases of Korean companies in depth, their development process and the assessment of business intelligence, based on the theoretical model on the key success factors of business intelligence systems. The comparative analysis of the three cases including project managers' interviews and performance evaluations provide rich implications for the successful adoption and the use of business intelligence systems of firms. The study is expected to provide useful references for firms to fully leverage the effects of business intelligence systems and upgrade towards self-service business intelligence systems.

Real-time Tooth Region Detection in Intraoral Scanner Images with Deep Learning (딥러닝을 이용한 구강 스캐너 이미지 내 치아 영역 실시간 검출)

  • Na-Yun, Park;Ji-Hoon Kim;Tae-Min Kim;Kyeong-Jin Song;Yu-Jin Byun;Min-Ju Kang․;Kyungkoo Jun;Jae-Gon Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.3
    • /
    • pp.1-6
    • /
    • 2023
  • In the realm of dental prosthesis fabrication, obtaining accurate impressions has historically been a challenging and inefficient process, often hindered by hygiene concerns and patient discomfort. Addressing these limitations, Company D recently introduced a cutting-edge solution by harnessing the potential of intraoral scan images to create 3D dental models. However, the complexity of these scan images, encompassing not only teeth and gums but also the palate, tongue, and other structures, posed a new set of challenges. In response, we propose a sophisticated real-time image segmentation algorithm that selectively extracts pertinent data, specifically focusing on teeth and gums, from oral scan images obtained through Company D's oral scanner for 3D model generation. A key challenge we tackled was the detection of the intricate molar regions, common in dental imaging, which we effectively addressed through intelligent data augmentation for enhanced training. By placing significant emphasis on both accuracy and speed, critical factors for real-time intraoral scanning, our proposed algorithm demonstrated exceptional performance, boasting an impressive accuracy rate of 0.91 and an unrivaled FPS of 92.4. Compared to existing algorithms, our solution exhibited superior outcomes when integrated into Company D's oral scanner. This algorithm is scheduled for deployment and commercialization within Company D's intraoral scanner.

A Study on Graph-Based Heterogeneous Threat Intelligence Analysis Technology (그래프 기반 이기종 위협정보 분석기술 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.417-430
    • /
    • 2024
  • As modern technology advances and the proliferation of the internet continues, cyber threats are also on the rise. To effectively counter these threats, the importance of utilizing Cyber Threat Intelligence (CTI) is becoming increasingly prominent. CTI provides information on new threats based on data from past cyber incidents, but the complexity of data and changing attack patterns present significant analytical challenges. To address these issues, this study aims to utilize graph data that can comprehensively represent multidimensional relationships. Specifically, the study constructs a heterogeneous graph based on malware data, and uses the metapath2vec node embedding technique to more effectively identify cyber attack groups. By analyzing the impact of incorporating topology information into traditional malware data, this research suggests new practical applications in the field of cyber security and contributes to overcoming the limitations of CTI analysis.

Development of wound segmentation deep learning algorithm (딥러닝을 이용한 창상 분할 알고리즘 )

  • Hyunyoung Kang;Yeon-Woo Heo;Jae Joon Jeon;Seung-Won Jung;Jiye Kim;Sung Bin Park
    • Journal of Biomedical Engineering Research
    • /
    • v.45 no.2
    • /
    • pp.90-94
    • /
    • 2024
  • Diagnosing wounds presents a significant challenge in clinical settings due to its complexity and the subjective assessments by clinicians. Wound deep learning algorithms quantitatively assess wounds, overcoming these challenges. However, a limitation in existing research is reliance on specific datasets. To address this limitation, we created a comprehensive dataset by combining open dataset with self-produced dataset to enhance clinical applicability. In the annotation process, machine learning based on Gradient Vector Flow (GVF) was utilized to improve objectivity and efficiency over time. Furthermore, the deep learning model was equipped U-net with residual blocks. Significant improvements were observed using the input dataset with images cropped to contain only the wound region of interest (ROI), as opposed to original sized dataset. As a result, the Dice score remarkably increased from 0.80 using the original dataset to 0.89 using the wound ROI crop dataset. This study highlights the need for diverse research using comprehensive datasets. In future study, we aim to further enhance and diversify our dataset to encompass different environments and ethnicities.

A Study on the i-YOLOX Architecture for Multiple Object Detection and Classification of Household Waste (생활 폐기물 다중 객체 검출과 분류를 위한 i-YOLOX 구조에 관한 연구)

  • Weiguang Wang;Kyung Kwon Jung;Taewon Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.135-142
    • /
    • 2023
  • In addressing the prominent issues of climate change, resource scarcity, and environmental pollution associated with household waste, extensive research has been conducted on intelligent waste classification methods. These efforts range from traditional classification algorithms to machine learning and neural networks. However, challenges persist in effectively classifying waste in diverse environments and conditions due to insufficient datasets, increased complexity in neural network architectures, and performance limitations for real-world applications. Therefore, this paper proposes i-YOLOX as a solution for rapid classification and improved accuracy. The proposed model is evaluated based on network parameters, detection speed, and accuracy. To achieve this, a dataset comprising 10,000 samples of household waste, spanning 17 waste categories, is created. The i-YOLOX architecture is constructed by introducing the Involution channel convolution operator and the Convolution Branch Attention Module (CBAM) into the YOLOX structure. A comparative analysis is conducted with the performance of the existing YOLO architecture. Experimental results demonstrate that i-YOLOX enhances the detection speed and accuracy of waste objects in complex scenes compared to conventional neural networks. This confirms the effectiveness of the proposed i-YOLOX architecture in the detection and classification of multiple household waste objects.

Analysis of Transaction Networks among Korean IT Corporations in Nine Metropolitan Regions: Assessing Connection Strengths and Developing a Node Centrality Composite Indicator (국내 IT 기업 대상 9개 광역권 지역의 거래 네트워크 분석: 연결강도 분석 및 노드 중심성 복합지표 개발)

  • Geon Jae Yu;Hyun Sang Lee;Choong Kwon Lee
    • Smart Media Journal
    • /
    • v.13 no.2
    • /
    • pp.108-121
    • /
    • 2024
  • In the IT industry, the complexity and volatility of corporate networks are gradually evolving, and concurrently, the significance of corporate networks is increasing. Previous research has employed network analysis to scrutinize inter-corporate trade relationships for strategic and policy making. However, previous studies focused on the overall network structure from a macroscopic perspective, presenting limitations in applicability at the individual IT corporation level. This study develops a novel research model incorporating sector and region-level network analysis based on connection strength, along with the derivation of a composite node centrality indicator. Using this methodology, we analyzed corporate networks across nine metropolitan areas using IT corporate transaction data. The results means that cities with a manufacturing base, such as Incheon, Busan, and Daegu, have recently established cooperative networks with IT companies. We also found that in the IT industry in Gwangju and Daejeon, certain companies dominate the transaction network.

Cisd2 deficiency impairs neutrophil function by regulating calcium homeostasis via Calnexin and SERCA

  • Un Yung Choi;Youn Jung Choi;Shin-Ae Lee;Ji-Seung Yoo
    • BMB Reports
    • /
    • v.57 no.5
    • /
    • pp.256-261
    • /
    • 2024
  • In the context of aging, the susceptibility to infectious diseases increases, leading to heightened morbidity and mortality. This phenomenon, termed immunosenescence, is characterized by dysregulation in the aging immune system, including abnormal alterations in lymphocyte composition, elevated basal inflammation, and the accumulation of senescent T cells. Such changes contribute to increased autoimmune diseases, enhanced infection severity, and reduced responsiveness to vaccines. Utilizing aging animal models becomes imperative for a comprehensive understanding of immunosenescence, given the complexity of aging as a physiological process in living organisms. Our investigation focuses on Cisd2, a causative gene for Wolfram syndrome, to elucidate on immunosenescence. Cisd2 knockout (KO) mice, serving as a model for premature aging, exhibit a shortened lifespan with early onset of aging-related features, such as decreased bone density, hair loss, depigmentation, and optic nerve degeneration. Intriguingly, we found that the Cisd2 KO mice present a higher number of neutrophils in the blood; however, isolated neutrophils from these mice display functional defects. Through mass spectrometry analysis, we identified an interaction between Cisd2 and Calnexin, a protein known for its role in protein quality control. Beyond this function, Calnexin also regulates calcium homeostasis through interaction with sarcoendoplasmic reticulum calcium transport ATPase (SERCA). Our study proposes that Cisd2 modulates calcium homeostasis via its interaction with Calnexin and SERCA, consequently influencing neutrophil functions.