• Title/Summary/Keyword: 계정

Search Result 447, Processing Time 0.026 seconds

The Effect of Viscosity of Natural Rubber on Incorporation Rate of Carbon Black in The Mixing (배합중 카본블랙 혼입속도에 천연고무 점도가 미치는 영향)

  • Kang, Yong-Gu;Han, Shin;Lee, Kye-Jung;Ryu, Dong-Wan;Park, Chan-Young
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.2 no.1
    • /
    • pp.97-103
    • /
    • 1999
  • The power curve during rubber mixing presents useful information for the understanding of rubber mixing process, because the power curve is determined the mixing state of rubber at the point. The time to the second peak on the power curve is known as carbon black incorporation time, BIT. This study gets the quantity relationship of BIT and viscosity of natural rubber, so by determining the mixing time of the compound on the ground of viscosity of the raw rubber. The mixing with natural rubber and carbon black is examined for various grade natural rubbers, encompassing a wide range of Mooney viscosity. Alter smoothing the mixing power curve using a polynomial, the carbon black incorporation time, BIT, was determined time to second power peak on the curve, The BIT's versus specific values on Mooney viscometer test curve show a linear relation, Especially, the peak of initial maximum torque on Mooney viscometer curve, PMT, is most relevant property relating to the BIT. PMT is useful index for determined optimum mixing time, To apply this results at the mixing, we effectively control the natural rubber mixing but can also know the grading of natural rubber upon processability.

  • PDF

Government's Social Media: A Study of Twitter Use and Network among Seven Nations (정부부처의 소셜미디어 소통방식: 국가간 트위터 이용 및 연결망에 대한 탐색적 연구)

  • Cho, Seong Eun;Park, Han Woo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.8
    • /
    • pp.160-170
    • /
    • 2013
  • The present study analyzes a Twitter network of some 175 government organizations belonging to seven countries. They are South Korea, U.S., U.K., Australia, Canada, Singapore, and Japan. The results showed that the U.S. occupied the most central position in terms of the incoming followings. Next, some clusters among countries were also noticeable according to their cultural proximities including national languages. The findings also indicate that some governmental organizations are likely to make international ties with others whose main duties are similar to each other. Finally, the structural connectivity pattern of some inter-governmental Twitter networks was visualized using a social network software. On the other hand, it suggests that there is a potential for a soft power through social media and as a result, it could be assumed that a new knowledge hegemony appears in the future.

Design and Implementation of Web Mail Integration System Using XML (XML을 이용한 웹 메일 통합 시스템의 설계 및 구현)

  • Kwon Jung-Sik;Cho Dae-Jea
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.89-97
    • /
    • 2004
  • Web-Mail Services are implemented with SMTP and POP3 in these days. These web mail services provide not only the basic sending and receiving functions but also additional functions for user. However, the sent and received data are stored in the web mail server. So general web mail users can't process their mail data if they have not access ID for the web mail server. In this paper, we design and implement WMIS (Web Mail Integration System) using XML. In the proposed system, mail data and user's environments in the old web mail system are transformed into XML documents and inserted into database. In order to store XML data into database, we use dynamic document processing method and analyze XML file by record unit. When the users change their mail accounts, they easily can establish the web environments and their mail data. Because the transformed XML document is converted into WML easily, the WMIS can reduce development cost, labors and time.

  • PDF

Continuous Use of Corporate SNS Accounts from a Habit and Emotional Perspective (SNS 사용자의 이용습관과 감정적 요인 관점에서 기업 SNS 계정의 지속적 사용의도에 관한 연구)

  • Ham, Juyeon;Ryu, Hyun-Sun;Ji, Sung-Hun;Lee, Jae-Nam
    • Knowledge Management Research
    • /
    • v.15 no.3
    • /
    • pp.37-66
    • /
    • 2014
  • Since social network service (SNS) has been widely used as a effective way for people to connect and communication with each other, the use of corporate SNS account also has increased. However, compared to a private SNS account, only few people have a continuous relationship with their corporate SNS account because the use of corporate SNS account tends to be one-time and temporary activity whenever the users just need events and information. Given the psychological side effects of using SNS, the relative lack of empirical studies on the impacts of emotional factor in SNS prevents the deeper understanding of the intention to continuous using corporate SNS account. Therefore, this study aims to explore key determinants of the intension to continuous using the corporate SNS account from a habit and emotional perspective. To bridge research gap, we attempt to divide emotional factor into the following 5 factors based on Mehrabian and Russell model (1974): intimacy, enjoyment (positive factor), privacy concern, anxiety (negative factor), arousal (arousal factor) and (dominant factor). The basic model is proposed to explore the effects of habit and emotional factors on the intension to continuous using the corporate SNS account. We then examine how the effects of habit and emotional factors differ depending on social media types (e.g., facebook and twitter). The results indicates that habit is related to emotional factors, and each emotional factor differently influences the intension to continuous using the corporate SNS account. The results also confirm that the effects of the habit and emotional factors on the intension to continuous using the corporate SNS account differ according to social media types. This study provides practical and useful guidance and the strategic marketing insight for managers in maintaining and improving the intension to continuous using the corporate SNS account.

  • PDF

Propensity Analysis of Political Attitude of Twitter Users by Extracting Sentiment from Timeline (타임라인의 감정추출을 통한 트위터 사용자의 정치적 성향 분석)

  • Kim, Sukjoong;Hwang, Byung-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.1
    • /
    • pp.43-51
    • /
    • 2014
  • Social Network Service has the sufficient potential can be widely and effectively used for various fields of society because of convenient accessibility and definite user opinion. Above all Twitter has characteristics of simple and open network formation between users and remarkable real-time diffusion. However, real analysis is accompanied by many difficulties because of semantic analysis in 140-characters, the limitation of Korea natural language processing and the technical problem of Twitter is own restriction. This thesis paid its attention to human's political attitudes showing permanence and assumed that if applying it to the analytic design, it would contribute to the increase of precision and showed it through the experiment. As a result of experiment with Tweet corpus gathered during the election of national assemblymen on 11st April 2012, it could be known to be considerably similar compared to actual election result. The precision of 75.4% and recall of 34.8% was shown in case of individual Tweet analysis. On the other hand, the performance improvement of approximately 8% and 5% was shown in by-timeline political attitude analysis of user.

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

User Authentication System using Base Password and Member Registration Information (기본 패스워드와 회원 가입 정보를 이용한 사용자 인증 시스템)

  • Jeong, Jongmun;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2289-2296
    • /
    • 2016
  • The password rules to be applied for the user account creation are often different by websites. Thus we often forget the password to sign in website and it creates waste of time for frequent password reset. In order to solve this problem we propose a new authentication method in this paper. When user forget the password to sign in, the existing methods require a password reset step but our proposed method provides new sign in scheme through the additional authentication step with base password and personal information registered at the member sign up stage. From the result of performance comparison the proposed method is considered to be more efficient than others because it provides not only an equivalent level of security with others but also requires only a half of the number of transactions and the time required for password reset step.

The Genealogy of Rebellious Communication and Twitter A Discourse Analysis of the Park Jung-geun Case ('불온 통신'의 계보와 '트위터' 박정근 사건에 대한 담론 분석을 중심으로)

  • Hong, Namhee
    • Korean journal of communication and information
    • /
    • v.81
    • /
    • pp.329-362
    • /
    • 2017
  • This study starts from the awareness that 'rebellious communication' is still being regulated in various ways even though 'rebellious communication' was declared unconstitutional in a decision by the Constitutional Court in 2002. The meaning of 'rebellious' has been amplified and transformed at various points through the censorship systems established during the Japanese colonial era, the US military period, and the regime of Park Jung-hee. In particular, 'rebellious communication' is regulated to protect 'national security' and 'social customs' from the perspective of power. This study analyzed discourses containing judgement about the Park Jung-geun case and the violation of the National Security Law using retweet accounts or posts related to North Korea. This study explores the genealogy of 'rebellious communication' based on its relationship to the characteristics of Twitter and specific individuals.

  • PDF

Study on the Security Threat Factors of Social Network Services (소셜 네트워크 서비스의 보안 위협요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.115-121
    • /
    • 2019
  • Recently, as the use of smart devices is becoming more common, various and convenient services are being developed. Among these services, the Social Network Service(SNS) is easily accessible anywhere, anytime. In particular, as well as sharing information, it forms a social relationship in cyberspace to expand new connections, and the SNS account is used as an authentication means of other services to provide users with speed and convenience at all times. However, despite the many advantages of SNS, due to security vulnerabilities occurring in the interworking process with various services, accidents of personal information are constantly occurring, and it is urgent to prepare countermeasures against potential risk factors. It is a necessary situation. Therefore, in this paper, the use of SNS is expected to increase rapidly in the future, and it is expected that it will be used as the basic data for developing the countermeasures by learning the countermeasures according to the security threats of the SNS.

A Proposal for Improvement and Current Situation of Risk Management on Financial Information System (금융정보시스템 위험관리의 현황 및 개선을 위한 제언)

  • Kang, TaeHong;Rhew, SungYul
    • Information Systems Review
    • /
    • v.14 no.2
    • /
    • pp.103-115
    • /
    • 2012
  • Improvement of the capability to cope with risk based on prior preventive management is very important for efficient operation of financial information system. In order to do this, understanding, analysis, and countermeasures for the risk that happened already in the past is essential. In this study, the defect data which happened in the financial information system including account system, business system and data feeding system during 4 years and 5 months were categorized and analyzed by the domain, defect factors, period, day of the week, phases of software development, and defect cause. As a result, it was identified that the defect data had characteristics and trends along the phase of software development, day of the week, and the cause, also that building risk prediction model was necessary for the risk management of whole financial domain due to the relation of the information systems.

  • PDF