• Title/Summary/Keyword: users' IT capability

Search Result 162, Processing Time 0.031 seconds

Electronic-Composit Consumer Sentiment Index(CCSI) development by Social Bigdata Analysis (소셜빅데이터를 이용한 온라인 소비자감성지수(e-CCSI) 개발)

  • Kim, Yoosin;Hong, Sung-Gwan;Kang, Hee-Joo;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.121-131
    • /
    • 2017
  • With emergence of Internet, social media, and mobile service, the consumers have actively presented their opinions and sentiment, and then it is spreading out real time as well. The user-generated text data on the Internet and social media is not only the communication text among the users but also the valuable resource to be analyzed for knowing the users' intent and sentiment. In special, economic participants have strongly asked that the social big data and its' analytics supports to recognize and forecast the economic trend in future. In this regard, the governments and the businesses are trying to apply the social big data into making the social and economic solutions. Therefore, this study aims to reveal the capability of social big data analysis for the economic use. The research proposed a social big data analysis model and an online consumer sentiment index. To test the model and index, the researchers developed an economic survey ontology, defined a sentiment dictionary for sentiment analysis, conducted classification and sentiment analysis, and calculated the online consumer sentiment index. In addition, the online consumer sentiment index was compared and validated with the composite consumer survey index of the Bank of Korea.

An Exploratory Study on Determinants Affecting R Programming Acceptance (R 프로그래밍 수용 결정 요인에 대한 탐색 연구)

  • Rubianogroot, Jennifer;Namn, Su Hyeon
    • Management & Information Systems Review
    • /
    • v.37 no.1
    • /
    • pp.139-154
    • /
    • 2018
  • R programming is free and open source system associated with a rich and ever-growing set of libraries of functions developed and submitted by independent end-users. It is recognized as a popular tool for handling big data sets and analyzing them. Reflecting these characteristics, R has been gaining popularity from data analysts. However, the antecedents of R technology acceptance has not been studied yet. In this study we identify and investigates cognitive factors contributing to build user acceptance toward R in education environment. We extend the existing technology acceptance model by incorporating social norms and software capability. It was found that the factors of subjective norm, perceived usefulness, ease of use affect positively on the intention of acceptance R programming. In addition, perceived usefulness is related to subjective norms, perceived ease of use, and software capability. The main difference of this research from the previous ones is that the target system is not a stand-alone. In addition, the system is not static in the sense that the system is not a final version. Instead, R system is evolving and open source system. We applied the Technology Acceptance Model (TAM) to the target system which is a platform where diverse applications such as statistical, big data analyses, and visual rendering can be performed. The model presented in this work can be useful for both colleges that plan to invest in new statistical software and for companies that need to pursue future installations of new technologies. In addition, we identified a modified version of the TAM model which is extended by the constructs such as subjective norm and software capability to the original TAM model. However one of the weak aspects that might inhibit the reliability and validity of the model is that small number of sample size.

A Logical Cell-Based Approach for Robot Component Repositories (논리적 셀 기반의 로봇 소프트웨어 컴포넌트 저장소)

  • Koo, Hyung-Min;Ko, In-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.8
    • /
    • pp.731-742
    • /
    • 2007
  • Self-growing software is a software system that has the capability of evolving its functionalities and configurations by itself based on dynamically monitored situations. Self-growing software is especially necessary for intelligent service robots, which must have the capability to monitor their surrounding environments and provide appropriate behaviors for human users. However, it is hard to anticipate all situations that robots face with, and it is hard to make robots have all functionalities for various environments. In addition, robots have limited internal capacity. To support self-growing software for intelligent service robots, we are developing a cell-based distributed repository system that allows robots and developers transparently to share robot functionalities. To accomplish the creation of evolutionary repositories, we invented the concept of a cell, which is a logical group of distributed repositories based upon the functionalities of components. In addition, a cell can be used as a unit for the evolutionary growth of the components within the repositories. In this paper, we describe the requirements and architecture of the cell-based repository system for self-growing software. We also present a prototype implementation and experiment of the repository system. Through the cell-based repositories, we achieve improved performance of self-growing actions for robots and efficient sharing of components among robots and developers.

A Competitiveness Analysis on Business Resources of 'TVING' in Korean OTT Market: Focusing on Resource-based Theory and VRIO Framework (국내 OTT 시장에서 '티빙' 경영자원의 경쟁력 분석: 자원준거이론(RBT) 및 VRIO 분석 모형을 기반으로)

  • Vickie Jinhee Yu;Ilhan Hong;Kenneth Chi Ho Kim
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.147-172
    • /
    • 2023
  • This study aims to review the competitiveness of 'TVING', a Korean OTT player in Korean market. For this, this study extracts core business resources of TVING focusing on resource-based theory, and analyzes their competitiveness under VRIO framework. TVING has 4 tangible and intangible resources respectively and 1 human resource. Tangible resources of TVING are technology(recommendation, compression), content(original, exclusive, discriminative non-exclusive), production studio, and paid-subscribers. Intangible resources are content planing capability, distribution network(local, global), marketing promotion·PR, sales), brand preference. And human resource of TVING creates IP professionalism of the company. As a result of VRIO analysis, discriminative non-exclusive content, production studios, and domestic service channels are the most powerful resources of TVING to 'sustain competitive advantage'. Technology, original content, planning capability and IT professionalism bring 'temporary competitive advantage', while exclusive content, the number of paid-subscribers, global service network, and promotion capabilities are not core resources with staying in competitive rank stages. By the way, TVING has potential users for sales of KT and LGU+ thanks to partnership and M&A, but this is not effectively used at the organization level yet. The meaning of this study can be found in that this evaluated competitiveness by each resource of TVING and arranged its implications.

A Key Management Scheme for Radio Frequency Communication Environment (저속 무전 통신 환경에 적용 가능한 키 관리 방식)

  • Kim, Song-Yi;Lee, Kwang-Woo;Jeong, Han-Jae;Cho, Young-Jun;Cha, Wook-Jae;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.439-448
    • /
    • 2009
  • The development of wireless communications provides mobility and accessibility to the wire communication users. Wireless sensor network is one of the leading wireless communication techniques. The security mechanism for wired network communication cannot be applied to wireless sensor network because of the limited resource and computing capability of nodes. Furthermore, communication errors frequently occur and the speed is low. Thus, efficient key management scheme is required in low-speed environment. In this paper, we proposed an efficient and secured master key-based scheme compared to the existing scheme. The advantage of our scheme is that establishing and renewing the pair-wise key is possible. In addition, it provides functions such as establishing group keys and renewing it. Furthermore, adding nodes is enabled through our scheme. The master key-based scheme can be applied to military operations and to radio communications for confidential communications.

Development of an Android-based App for Total Station Surveying and Visualization using Smartphone and Google Earth (스마트폰과 Google Earth를 이용한 TS 측량 및 가시화 안드로이드 앱 개발)

  • Park, Jinwoo;Lee, Seongkyu;Suh, Yongcheol
    • Korean Journal of Remote Sensing
    • /
    • v.29 no.2
    • /
    • pp.253-261
    • /
    • 2013
  • Current surveying and spatial information technology incorporates information and communication technology and is user friendly. However, it is not convenient to use in the field because a connection to a computer, such as a laptop, tablet PC, or desktop PC, is needed to obtain the survey results and the coordinates of the surveyed points. To solve this problem, we developed an app that can display surveyed data on a map and the current survey results through a connection between a total station and smartphone using a Bluetooth wireless communication device. The app allows users to perform field work simultaneously with office work in the field, because it consists of Bluetooth, closed traverse survey, current status survey, and coordinate conversion modules. The proposed app should increase user convenience and the operational capability of the total station in the field.

Utilizing Distributed Ontology Repository in Multi-Agent System Environment (다중 에이전트 시스템 환경에서 분산된 온톨로지 저장소의 사용)

  • Kim, Sung-Tae;Jee, Kyeng-Whan;Yang, Jung-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.3
    • /
    • pp.129-139
    • /
    • 2005
  • The rapid growth of IT technologies enables the quality of human's daily life to be improved dramatically, Contrasting to the services in previous computing environment directed by user's request, the services in ubiquitous computing era of new IT technology are provided through recognizing users intention and utilizing context-aware information suited to the user. According to the contextual information, agents need to set a dynamic goal to achieve and work collaboratively with other agents. Agents that take control over their behaviors with capability of communicating with other agents become a thrust in this up-coming computing environment. This work focuses on building ontologies, shared knowledge bases among agents, to improve semantical interoperability among agents. More attention is given to the construction and effective management of ontology repository along with its requirement and organization. Ontology agent suggested takes an initiative role to manage the repository in a distributed manner and to facilitate the use of ontology in a multi-agent environment.

  • PDF

cdma2000 Physical Layer: An overview

  • Willenegger, Serge
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.5-17
    • /
    • 2000
  • cdma2000 offers several enhancement as compared to TIA/EIA-95, although it remains fully compatible with TIA/EIA-95 systems and allows for a smooth migration from one to the other-Major new capability include:1)connectivity to GSM-MAP in addition to IP and IS-41 networks; 2) new layering with new LAC and MAC architectures for improved service multiplexing and QoS management and efficient use of radio resource ;3) new bands and band widths of operation in support of various operator need and constraints, as well as desire for a smooth and progressive migration to cdma 2000; and 4) flexible channel structure in support of multiple services with various QoS and variable transmission rates at up to 1 Mbps per channel and 2 Mbps per user. Given the phenomenal success of wireless services and desire for higher rate wireless services. improved spectrum efficiency was a major design goal in the elaboration of cdma2000. Major capacity enhancing features include; 1) turbo coding for data transmission: 2)fast forward link power control :3) forward link transmit diversity; 4) support of directive antenna transmission techniques; 5) coherent reverse link structure; and 6) enhanced access channel operation. As users increasingly rely on their cell phone at work and at home for voice and data exchange, the stand-by time and operation-time are essential parameters that can influence customer's satisfaction and service utilization. Another major goal of cdma2000 was therefore to enable manufacturers to further optimize power utilization in the terminal. Major battery life enhancing features include; 1) improved reverse link performance (i.e., reduced transmit power per information bit; 2) new common channel structure and operation ;3) quick paging channel operation; 4) reverse link gated transmission ; and 5) new MAC stated for efficient and ubiquitous idle time idle time operation. this article provides additional details on those enhancements. The intent is not to duplicate the detailed cdma2000 radio access network specification, but rather to provide some background on the new features of cdma2000 and on the qualitative improvements as compared to the TIA/EIA-95 based systems. The article is focused on the physical layer structure and associated procedures. It therefore does not cover the MAC, LAC, radio resource management [1], or any other signaling protocols in any detail. We assume some familiarity with the basic CDMA concepts used in TIA/EIA-95.

  • PDF

Collection Fusion Algorithm in Distributed Multimedia Databases (분산 멀티미디어 데이터베이스에 대한 수집 융합 알고리즘)

  • Kim, Deok-Hwan;Lee, Ju-Hong;Lee, Seok-Lyong;Chung, Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.406-417
    • /
    • 2001
  • With the advances in multimedia databases on the World Wide Web, it becomes more important to provide users with the search capability of distributed multimedia data. While there have been many studies about the database selection and the collection fusion for text databases. The multimedia databases on the Web have autonomous and heterogeneous properties and they use mainly the content based retrieval. The collection fusion problem of multimedia databases is concerned with the merging of results retrieved by content based retrieval from heterogeneous multimedia databases on the Web. This problem is crucial for the search in distributed multimedia databases, however, it has not been studied yet. This paper provides novel algorithms for processing the collection fusion of heterogeneous multimedia databases on the Web. We propose two heuristic algorithms for estimating the number of objects to be retrieved from local databases and an algorithm using the linear regression. Extensive experiments show the effectiveness and efficiency of these algorithms. These algorithms can provide the basis for the distributed content based retrieval algorithms for multimedia databases on the Web.

  • PDF

Workflow Pattern Extraction based on ACTA Formalism (ACTA 형식론에 기반한 워크플로우 패턴추출)

  • Lee Wookey;Bae Joonsoo;Jung Jae-yoon
    • Journal of KIISE:Databases
    • /
    • v.32 no.6
    • /
    • pp.603-615
    • /
    • 2005
  • As recent business environments are changed and become complex, a more efficient and effective business process management are needed. This paper proposes a new approach to the automatic execution of business processes using Event-Condition-Action (ECA) rules that can be automatically triggered by an active database. First of all, we propose the concept of blocks that can classify process flows into several patterns. A block is a minimal unit that can specify the behaviors represented in a process model. An algorithm is developed to detect blocks from a process definition network and transform it into a hierarchical tree model. The behaviors in each block type are modeled using ACTA formalism. This provides a theoretical basis from which ECA rules are identified. The proposed ECA rule-based approach shows that it is possible to execute the workflow using the active capability of database without users' intervention.