• Title/Summary/Keyword: 특성 모델 검증

Search Result 2,151, Processing Time 0.035 seconds

The Effects of Social Enterprise CEO's Job Stress on Business Preformance (사회적 기업 CEO의 직무스트레스가 경영성과에 미치는 영향)

  • Jo, Jong-Hyeon;Jeon, In-Oh
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.229-241
    • /
    • 2016
  • This research has its purpose to seek, among the CEOs of social enterprises, the influence of job stress on business performance, social support inbetween them, and adjusting role of government-supported policies. CEO of social enterprise, which is established to realize its social purposes, receives the job stress due to business ethics, profitability, identity crisis, management challenges and etc. We would like to set the foundation for the enterprises to constantly conduct social purposes within the local society by raising the business performances of social enterprises through seeking the measures to resolve such job stresses of the CEOs by expressing them. This research applied the ISR Job Stress Model theroy as its main ground of theoretical background. We would like to analyze the inter-significance by setting the job stress causes and job stress influences as independent variables, business achievements as a dependent variable, and social support, government-supported policies as moderating variables. For the methods of the research, we collected, using structuralized questionnaire, from 223 social enterprise CEOs located within Korea. Data analysis used IBM SPSS Statristics 20.0 programme, and through general characteristic of sample, confidence testing, factorial analysis, correlation analysis and research hypothesis testing, drew the following results. First, job stress factor and influence were analyzed to have negative impacts on business performance. Second, social support was found to lower job stress factor and influence, and raise business performance. Third, government-supported policy was analyzed to lower job stress factor and influence, and raise business performance.

Estimation of Structural Deformed Shapes Using Limited Number of Displacement Measurements (한정된 계측 변위를 이용한 구조물 변형 형상 추정)

  • Choi, Junho;Kim, Seungjun;Han, Seungryong;Kang, Youngjong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1295-1302
    • /
    • 2013
  • The structural deformed shape is important information to structural analysis. If the sufficient measuring points are secured at the structural monitoring system, reasonable and accurate structural deformation shapes can be obtained and structural analysis is possible using this deformation. However, the accurate estimation of the global structural shapes might be difficult if sufficient measuring points are not secure under cost limitations. In this study, SFSM-LS algorithm, the economic and effective estimation method for the structural deformation shapes with limited displacement measuring points is developed and suggested. In the suggested method, the global structural deformation shape is determined by the superposition of the pre-investigated structural deformed shapes obtained by preliminary FE analyses, with their optimum weight factors which lead minimization of the estimate errors. 2-span continuous bridge model is used to verify developed algorithm and parametric studies are performed. By the parametric studies, the characteristics of the estimation results obtained by the suggested method were investigated considering essential parameters such as pre-investigated structural shapes, locations and numbers of displacement measuring points. By quantitative comparison of estimation results with the conventional methods such as polynomial, Lagrange and spline interpolation, the applicability and accuracy of the suggested method was validated.

Spatial Extension of Runoff Data in the Applications of a Lumped Concept Model (집중형 수문모형을 활용한 홍수유출자료 공간적 확장성 분석)

  • Kim, Nam Won;Jung, Yong;Lee, Jeong Eun
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.9
    • /
    • pp.921-932
    • /
    • 2013
  • Runoff data availability is a substantial factor for precise flood control such as flood frequency or flood forecasting. However, runoff depths and/or peak discharges for small watersheds are rarely measured which are necessary components for hydrological analysis. To compensate for this discrepancy, a lumped concept such as a Storage Function Method (SFM) was applied for the partitioned Choongju Dam Watershed in Korea. This area was divided into 22 small watersheds for measuring the capability of spatial extension of runoff data. The chosen total number of flood events for searching parameters of SFM was 21 from 1991 to 2009. The parameters for 22 small watersheds consist of physical property based (storage coefficient: k, storage exponent: p, lag time: $T_l$) and flood event based parameters (primary runoff ratio: $f_1$, saturated rainfall: $R_{sa}$). Saturated rainfall and base flow from event based parameters were explored with respect to inflow at Choongju Dam while other parameters for each small watershed were fixed. When inflow of Choongju Dam was optimized, Youngchoon and Panwoon stations obtained average of Nash-Sutcliffe Efficiency (NSE) were 0.67 and 0.52, respectively, which are in the satisfaction condition (NSE > 0.5) for model evaluation. This result is showing the possibility of spatial data extension using a lumped concept model.

Investigation into the Factors Affecting the Voluntary Information Security Compliance Behavior: Compliance Behavioral Belief, Compliance Knowledge, and Compliance Relevance to Job (자발적인 정보보안 컴플라이언스에 영향을 미치는 요인에 관한 연구: 준법에 대한 신념, 준법 관련 지식, 그리고 업무의 준법 연관성을 중심으로)

  • Kim, Sang Soo;Kim, Yong Jin
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.127-149
    • /
    • 2016
  • Based on a comprehensive literature review on Theory of Planned Behavior and Social Cognitive Theory, this study proposes and empirically examines a structural model consisting of factors affecting voluntary information security compliance behavior. To test the proposed research model, the study analyzes survey results from employees of a major Korean energy company, which employs an enterprise compliance support system. Results indicate three factors: compliance behavioral belief and compliance knowledge affect compliance behavior; compliance knowledge works as a mediator in the relationship between compliance behavioral belief and compliance behavior; and the more relevant the compliance is to an employee's job, the more the employee prioritizes compliance knowledge. This study suggests methods for encouraging employees to embrace voluntary, positive information security compliance standards. By doing so, this article aims to promote a more effective corporate compliance system for information security and enhance sustainable management practices.

A Study on the Growth Proccess and Strategic Niche Management of New Energy Technology: A Case Study with Government Supporting Photovoltaic R&D Project (전략적 니치관리(SNM)를 활용한 정부 신재생 R&D 성장과정 분석)

  • Kim, Bong-Gyun;Moon, Sun-Woo
    • Journal of Technology Innovation
    • /
    • v.20 no.2
    • /
    • pp.161-187
    • /
    • 2012
  • Recently, environmentally friendly technology are becoming important due to reconsideration about climate change and environmental pollution. In addition, as well as technical skills and social interaction through an analysis of the nonlinear transition management and policy implementation are emerging. This study of the development of photovoltaic industry in Korea 10 years analyze with strategic niche management (SNM) based on the theoretical and multi-layered perspective (MLP) is used as the analytical framework. Choose the gerverment-support project for niche technology, through a process of quantifying and alnalyze the phase transition to Regime with the numerical method and policy vision, learning effects, and network that key elements of SNM, MLP. Through the analysis of the photovoltaic industry technology-commercialization phase was investigated. This conventional overall and step-by-step model for technical management is proposed to replace exiting linear and narrow method and through the case study its validity was confirmed.

  • PDF

The Acclerated Life Test of Hard Disk In The Environment of PACS (PACS 환경에서 하드디스크의 가속 수명시험)

  • Cho, Euy-Hyun;Park, Jeong-Kyu;Chae, Jong-Gyu
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.63-70
    • /
    • 2015
  • In this paper, we estimate the life cycle from acceleration life test about the hard disk of disk array of image storage of PACS. Webuil distribution was selected by the Anderson-Darling goodness-of-fit test with data of down time at $50^{\circ}C$ and $60^{\circ}C$. The equality test of shape parameter and scale parameter was conducted, so that the probability distribution estimated from data of down time at $50^{\circ}C$ and $60^{\circ}C$ was not statistically significant. The shape parameter was 1.0409, The characteristic life was 24603.5 hours at normal user condition($30^{\circ}C$) by the analysis of weibull-arrhenius modeling which included the acceleration factor of temperature, and The activation energy was 0.5011 eV through arrhenius modeling. The failure analysis of the failure samples of acceleration test and the samples of market return was conducted, so that the share percentage of failure mode was detail difference but the rank of share percentage was almost same. This study suggest the test procedure of acceleration test of hard disk drive in PACS using environment, and help the life estimation at manufacture and use.

Design and Implementation of Initial OpenSHMEM Based on PCI Express (PCI Express 기반 OpenSHMEM 초기 설계 및 구현)

  • Joo, Young-Woong;Choi, Min
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.105-112
    • /
    • 2017
  • PCI Express is a bus technology that connects the processor and the peripheral I/O devices that widely used as an industry standard because it has the characteristics of high-speed, low power. In addition, PCI Express is system interconnect technology such as Ethernet and Infiniband used in high-performance computing and computer cluster. PGAS(partitioned global address space) programming model is often used to implement the one-sided RDMA(remote direct memory access) from multi-host systems, such as computer clusters. In this paper, we design and implement a OpenSHMEM API based on PCI Express maintaining the existing features of OpenSHMEM to implement RDMA based on PCI Express. We perform experiment with implemented OpenSHMEM API through a matrix multiplication example from system which PCs connected with NTB(non-transparent bridge) technology of PCI Express. The PCI Express interconnection network is currently very expensive and is not yet widely available to the general public. Nevertheless, we actually implemented and evaluated a PCI Express based interconnection network on the RDK evaluation board. In addition, we have implemented the OpenSHMEM software stack, which is of great interest recently.

Collision Analysis of STF Impregnated Kevlar Fabric Using the 3D-Shell Element (쉘요소를 활용한 STF 함침된 Kevlar Fabric의 방탄해석)

  • Lee, Duk-Gyu;Park, Jong-Kyu;Jung, Wui-Kyung;Lee, Man-Young;Kim, See-Jo;Moon, Sang-Ho;Son, Kwon-Joong;Cho, Hee-Keun
    • Composites Research
    • /
    • v.29 no.1
    • /
    • pp.24-32
    • /
    • 2016
  • Ballistic impact analyses have been performed with the Kevlar fabric impregnated with STF(shear thickening fluid). Multi-layer laminates modeled with 3D isoparametric shell elements were used for the performance analysis and their results are compared with experimental results. Both experiments and numerical analyses have been done to verify the usefulness of STF to enhance the impact resistance performance. The results showed that STF increases friction within a bundle of fiber, and this phenomena is more apparent in the velocity range of under near 450 m/s. In this research, it is emphasized that FEA analyses of STF impregnated Kevlar fabric laminate were successfully conducted using shell elements. Moreover, the effectiveness of the technique and accuracy were verified through the comparison with reliable experimental data.

The Accelerated Life Test of 2.5 Inch Hard Disk In The Environment of PC using (PC 사용 환경의 2.5 인치 하드디스크의 가속 수명 시험)

  • Cho, Euy-Hyun;Park, Jeong-Kyu;Seo, Hui-Don
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.19-27
    • /
    • 2014
  • In order to estimate the life of 2,5 inch HDD which is adopted by PC environment, make the test plan which reflect the failure mode of market, make the test model of accelerated life test which reflect the stress of temperature. after an analysis of the environment of PC using, test procedure was decided that operation was write 50 % and read 50 %, and then access method was sequential 50 % and random 50%. The acceleration life test was executed on condition that temperature was $50^{\circ}C$ and $60^{\circ}C$, performance was 95 % in max performance, test time was 1000 hours. by the test of goodness of fit of anderson-darling of the failure data during test, it was confirmed that the distribution of failure fellow weibull. test for shape and scale was equal, and shape parameter was 0.7177, characteristic life was 429434 hours at normal user condition($30^{\circ}C$) by the analysis of weibull-arrhenius modeling. It made no difference about the statistics when equality test was executed. The activation energy was 0.2775eV. In analyzing between the failure samples of acceleration test and the samples of market return even though there is detail difference about the share of failure mode, the rank of share was almost same. This study suggest the test procedure of acceleration test of 2.5 inch HDD in PC using environment, and help the life estimation at manufacture and user.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF