• Title/Summary/Keyword: 3-dimension

Search Result 3,577, Processing Time 0.035 seconds

Searching for the SCM Improvement Directions through the Power Attribute and Partnership (파워 유형과 파트너십 연계를 통한 공급사슬관리 개선방안 모색)

  • Jung, Dae-Hyun;Park, Kwang-O
    • Management & Information Systems Review
    • /
    • v.35 no.3
    • /
    • pp.57-79
    • /
    • 2016
  • It is required to derive various conclusions by identifying the type of power and the relationship between SCMs and presenting practical implications. Thus, we can identify the differential effects of each type of power on SCM performance. We can contribute to develop the practical implications at more sophisticated multi-dimension by comparing results of this study with various SCM theories. Through previous studies, the source of power is largely divided into binding power and non-binding power. Binding power is classified into behavior coercion, binding reward and relationship legitimacy. Non-binding power is classified into work expertise, information superiority and value compliance. Enterprises should fully understand and recognize partners within supply chains including understanding of the source of power, imbalance and results. Thus, we look into types of power and effects on trust and commitment, and identify a causal relationship leading to collaboration and SCM performance. Specific research results are as follows. First, the binding power did not give a significant effect to the trust. However, the binding power gave a positively(+) significant effect to the commitment. Second, non-binding power showed a significant effect on both trust and commitment. As a result of analysis on total effects, it was shown that non-binding power gave indirect effects to collaboration and SCM performance. Third, it was shown that both trust and commitment significantly affected collaboration. From the perspectives of social exchange theory and trading cost theory among inter-organizational relationship theory, it may lead to SCM performance of trust, commitment and collaboration. Moreover, it was found that association of each attribute of power led to the significant result. Fourth, it was shown that trust and collaboration significantly affected SCM performance. However, commitment did not directly affect SCM performance, but it indirectly significantly affected SCM performance through collaboration. Proper use of this power can firmly build partnerships between members of the supply chain and induce the improvement on supply chain performance and satisfaction of members.

  • PDF

How Customer Experience Management in the Hotel Industry can Lead to a Willingness to Pay More (호텔 기업의 고객경험관리(CEM)는 기꺼이 더 지불하게 하는가?)

  • Choi, Wook-Hee
    • Culinary science and hospitality research
    • /
    • v.22 no.7
    • /
    • pp.267-280
    • /
    • 2016
  • Customer Experience Management (CEM) appeared as a complementary solution to overcome CRM limitations. CEM enhances profitability through building long-term relations with customers by understanding their experiences. This study aims at investigating the impact of customer experience quality on the willingness to pay more through customer satisfaction in the hotel businesses. The survey for this study was carried out on customers who had domestic hotel experience s within the last 6 months. Out of the 306 questionnaires retrieved, 225 valid responses were used for the empirical analysis that utilizied the statistical package programs SPSS 18.0 and AMOS 18.0. The research findings may be summarized as follows. First, as an outcome of the research hypothesis that each component of customer experience management would influence satisfaction, 'the peace of mind' & 'the moment of truth' were shown to have a significantly positive (+) impact on it. On the other hand, 'the product experience' was shown not to significantly influence it in a positive (+) way. Second, as an outcome of the research hypothesis that satisfaction would influence willingness to pay more. From the findings of the study, theoretical implications are as follows. It can be predicted that customer experience management will likely make customers more profitable because customers are willing to pay more with a sense of loyalty built through satisfaction of the hotel industry. In the practical implications, the dimension of experience quality examined by the study can be used as an index to measure and manage customer experience in the hotel industry.

Building battery deterioration prediction model using real field data (머신러닝 기법을 이용한 납축전지 열화 예측 모델 개발)

  • Choi, Keunho;Kim, Gunwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.243-264
    • /
    • 2018
  • Although the worldwide battery market is recently spurring the development of lithium secondary battery, lead acid batteries (rechargeable batteries) which have good-performance and can be reused are consumed in a wide range of industry fields. However, lead-acid batteries have a serious problem in that deterioration of a battery makes progress quickly in the presence of that degradation of only one cell among several cells which is packed in a battery begins. To overcome this problem, previous researches have attempted to identify the mechanism of deterioration of a battery in many ways. However, most of previous researches have used data obtained in a laboratory to analyze the mechanism of deterioration of a battery but not used data obtained in a real world. The usage of real data can increase the feasibility and the applicability of the findings of a research. Therefore, this study aims to develop a model which predicts the battery deterioration using data obtained in real world. To this end, we collected data which presents change of battery state by attaching sensors enabling to monitor the battery condition in real time to dozens of golf carts operated in the real golf field. As a result, total 16,883 samples were obtained. And then, we developed a model which predicts a precursor phenomenon representing deterioration of a battery by analyzing the data collected from the sensors using machine learning techniques. As initial independent variables, we used 1) inbound time of a cart, 2) outbound time of a cart, 3) duration(from outbound time to charge time), 4) charge amount, 5) used amount, 6) charge efficiency, 7) lowest temperature of battery cell 1 to 6, 8) lowest voltage of battery cell 1 to 6, 9) highest voltage of battery cell 1 to 6, 10) voltage of battery cell 1 to 6 at the beginning of operation, 11) voltage of battery cell 1 to 6 at the end of charge, 12) used amount of battery cell 1 to 6 during operation, 13) used amount of battery during operation(Max-Min), 14) duration of battery use, and 15) highest current during operation. Since the values of the independent variables, lowest temperature of battery cell 1 to 6, lowest voltage of battery cell 1 to 6, highest voltage of battery cell 1 to 6, voltage of battery cell 1 to 6 at the beginning of operation, voltage of battery cell 1 to 6 at the end of charge, and used amount of battery cell 1 to 6 during operation are similar to that of each battery cell, we conducted principal component analysis using verimax orthogonal rotation in order to mitigate the multiple collinearity problem. According to the results, we made new variables by averaging the values of independent variables clustered together, and used them as final independent variables instead of origin variables, thereby reducing the dimension. We used decision tree, logistic regression, Bayesian network as algorithms for building prediction models. And also, we built prediction models using the bagging of each of them, the boosting of each of them, and RandomForest. Experimental results show that the prediction model using the bagging of decision tree yields the best accuracy of 89.3923%. This study has some limitations in that the additional variables which affect the deterioration of battery such as weather (temperature, humidity) and driving habits, did not considered, therefore, we would like to consider the them in the future research. However, the battery deterioration prediction model proposed in the present study is expected to enable effective and efficient management of battery used in the real filed by dramatically and to reduce the cost caused by not detecting battery deterioration accordingly.

Development of Rain Shelter for Chinese Cabbage Rainproof Cultivation (배추재배용 비가림하우스 개발)

  • Yu, In Ho;Lee, Eung Ho;Cho, Myeong Whan;Ryu, Hee Ryong;Moon, Doo Gyung
    • Journal of Bio-Environment Control
    • /
    • v.23 no.4
    • /
    • pp.293-302
    • /
    • 2014
  • This study was carried out to develop rain shelter which can make an appropriate size and environment for Chinese cabbage rainproof cultivation. Fifty three farms with chinese cabbage rainproof cultivation system have been investigated to set up width and height of rain shelter. Mostly the width of 6m was desired for rain shelter and the height of 1.6m for their eaves, so these values were chosen as the dimensions for rain shelter. After an analysis of their structural safety and installation costs by the specifications of the rafter pipe, Ø$25.4{\times}1.5t$ and 90cm have been set as the size of rafter that such size costs the least. This size is stable with $27m{\cdot}s^{-1}$ of wind velocity and 17cm of snow depth. Therefore it is difficult to apply this dimension to area with higher climate load. In order to sort out such problem, the rain shelter has been designed to avoid damage on frame by opening plastic film to the ridge. Once greenhouse band is loosen by turning the manual switch at the both sides of rain shelter and open button of controller is pushed then switch motor rises up along the guide pipe and plastic film is opened to the ridge. Chinese cabbage can be damaged by insects if rain shelter is opened completely as revealed a field. To prevent this, farmers can install an insect-proof net. Further, the greenhouse can be damaged by typhoon while growing Chinese cabbage therefore the effect of an insect-proof net on structural safety has been analyzed. And then structural safety has been analyzed through using flow-structure interaction method at the wind condition of $40m{\cdot}s^{-1}$. And it assumed that wind applied perpendicular to side of the rain shelter which was covered by insect-proof net. The results indicated that plastic film was directly affected by wind therefore high pressure occurred on the surface. But wind load on insect-proof net was smaller than on plastic film and pressure distribution was also uniform. The results of structural analysis by applying pressure data extracted from flow analysis indicated that the maximum stress occurred at the end of pipe which is the ground part and the value has been 54.6MPa. The allowable stress of pipe in the standard of structural safety must be 215 MPa or more therefore structural safety of this rain shelter is satisfied.

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

PCA­based Waveform Classification of Rabbit Retinal Ganglion Cell Activity (주성분분석을 이용한 토끼 망막 신경절세포의 활동전위 파형 분류)

  • 진계환;조현숙;이태수;구용숙
    • Progress in Medical Physics
    • /
    • v.14 no.4
    • /
    • pp.211-217
    • /
    • 2003
  • The Principal component analysis (PCA) is a well-known data analysis method that is useful in linear feature extraction and data compression. The PCA is a linear transformation that applies an orthogonal rotation to the original data, so as to maximize the retained variance. PCA is a classical technique for obtaining an optimal overall mapping of linearly dependent patterns of correlation between variables (e.g. neurons). PCA provides, in the mean-squared error sense, an optimal linear mapping of the signals which are spread across a group of variables. These signals are concentrated into the first few components, while the noise, i.e. variance which is uncorrelated across variables, is sequestered in the remaining components. PCA has been used extensively to resolve temporal patterns in neurophysiological recordings. Because the retinal signal is stochastic process, PCA can be used to identify the retinal spikes. With excised rabbit eye, retina was isolated. A piece of retina was attached with the ganglion cell side to the surface of the microelectrode array (MEA). The MEA consisted of glass plate with 60 substrate integrated and insulated golden connection lanes terminating in an 8${\times}$8 array (spacing 200 $\mu$m, electrode diameter 30 $\mu$m) in the center of the plate. The MEA 60 system was used for the recording of retinal ganglion cell activity. The action potentials of each channel were sorted by off­line analysis tool. Spikes were detected with a threshold criterion and sorted according to their principal component composition. The first (PC1) and second principal component values (PC2) were calculated using all the waveforms of the each channel and all n time points in the waveform, where several clusters could be separated clearly in two dimension. We verified that PCA-based waveform detection was effective as an initial approach for spike sorting method.

  • PDF

An Empirical Study on How the Moderating Effects of Individual Cultural Characteristics towards a Specific Target Affects User Experience: Based on the Survey Results of Four Types of Digital Device Users in the US, Germany, and Russia (특정 대상에 대한 개인 수준의 문화적 성향이 사용자 경험에 미치는 조절효과에 대한 실증적 연구: 미국, 독일, 러시아의 4개 디지털 기기 사용자를 대상으로)

  • Lee, In-Seong;Choi, Gi-Woong;Kim, So-Lyung;Lee, Ki-Ho;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.113-145
    • /
    • 2009
  • Recently, due to the globalization of the IT(Information Technology) market, devices and systems designed in one country are used in other countries as well. This phenomenon is becoming the key factor for increased interest on cross-cultural, or cross-national, research within the IT area. However, as the IT market is becoming bigger and more globalized, a great number of IT practitioners are having difficulty in designing and developing devices or systems which can provide optimal experience. This is because not only tangible factors such as language and a country's economic or industrial power affect the user experience of a certain device or system but also invisible and intangible factors as well. Among such invisible and intangible factors, the cultural characteristics of users from different countries may affect the user experience of certain devices or systems because cultural characteristics affect how they understand and interpret the devices or systems. In other words, when users evaluate the quality of overall user experience, the cultural characteristics of each user act as a perceptual lens that leads the user to focus on a certain elements of experience. Therefore, there is a need within the IT field to consider cultural characteristics when designing or developing certain devices or systems and plan a strategy for localization. In such an environment, existing IS studies identify the culture with the country, emphasize the importance of culture in a national level perspective, and hypothesize that users within the same country have same cultural characteristics. Under such assumptions, these studies focus on the moderating effects of cultural characteristics on a national level within a certain theoretical framework. This has already been suggested by cross-cultural studies conducted by scholars such as Hofstede(1980) in providing numerical research results and measurement items for cultural characteristics and using such results or items as they increase the efficiency of studies. However, such national level culture has its limitations in forecasting and explaining individual-level behaviors such as voluntary device or system usage. This is because individual cultural characteristics are the outcome of not only the national culture but also the culture of a race, company, local area, family, and other groups that are formulated through interaction within the group. Therefore, national or nationally dominant cultural characteristics may have its limitations in forecasting and explaining the cultural characteristics of an individual. Moreover, past studies in psychology suggest a possibility that there exist different cultural characteristics within a single individual depending on the subject being measured or its context. For example, in relation to individual vs. collective characteristics, which is one of the major cultural characteristics, an individual may show collectivistic characteristics when he or she is with family or friends but show individualistic characteristics in his or her workplace. Therefore, this study acknowledged such limitations of past studies and conducted a research within the framework of 'theoretically integrated model of user satisfaction and emotional attachment', which was developed through a former study, on how the effects of different experience elements on emotional attachment or user satisfaction are differentiated depending on the individual cultural characteristics related to a system or device usage. In order to do this, this study hypothesized the moderating effects of four cultural dimensions (uncertainty avoidance, individualism vs, collectivism, masculinity vs. femininity, and power distance) as suggested by Hofstede(1980) within the theoretically integrated model of emotional attachment and user satisfaction. Statistical tests were then implemented on these moderating effects through conducting surveys with users of four digital devices (mobile phone, MP3 player, LCD TV, and refrigerator) in three countries (US, Germany, and Russia). In order to explain and forecast the behavior of personal device or system users, individual cultural characteristics must be measured, and depending on the target device or system, measurements must be measured independently. Through this suggestion, this study hopes to provide new and useful perspectives for future IS research.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

A Study on Factors Affecting Youth Employee's Labor Mobility and Employment Status Transition (청년취업자의 노동이동 및 고용형태 전환에 영향을 미치는 요인에 관한 연구)

  • Ban, Jung-Ho;Kim, Kyung-Hee;Kim, Kyung-Huy
    • Korean Journal of Social Welfare
    • /
    • v.57 no.3
    • /
    • pp.73-103
    • /
    • 2005
  • This study takes of youth panel data(2002-2003), there is the purpose to know to youth employed's labor mobility conditions of employment status conversion and examine on factors affecting conversion of employment status. Main analysis result and policy imply, is as following. First, although youth employed's non-standard employment shows some decrease, employment youth hierarchy was construed that youth of our country is consisting very changefully because appear great turnover that is converted by unemployment or Not economically activity population same period. Specially, non-standard employment phenomenon of woman or low in scholarship person appeared notedly, and because phenomenon that is converted by unemployment or Not economically activity population is expose that is deepened, discriminating policy of government dimension is required for employment stabilization of these class. Second, show result that danger to escape to non-standard job risk trap which seeking employment activity of youth class is arranged case or company which is formed by official path is suitable becomes low, must formulate path of employment about youth class and improve qualitative level of employment through suitable job placement education of youth class or function (technology) level. Third, when was construed, but take into account that the although large enterprise have low risk in non-standard job, recently employment of youth class consists very limited, rather small scale business or smaller enterprise's competitive power preferably need to be plan. Finally, danger to non-standard job youth employed's company form is government connection wonder was expose that high, Such result can do that it is difficult by limited research period, but reflect actuality that youth unemployment policy of our country is enforced laying stress on public labor or unregular job employment such as internship system. Therefore, current youth unemployment policy may have to change by employment policy that can secure stable work record by youth class or act as bridge-building that promote conversion by full-time job.

  • PDF

Spatio-temporal Variations in the Dynamics and Export of Large Wood in Korean Mountain Streams (우리나라 산지계류에 있어서 유목 동태의 시.공간적 다양성과 그에 따른 유출 특성)

  • Seo, Jung Il;Chun, Kun Woo;Kim, Suk Woo;Im, Sangjun
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.3
    • /
    • pp.333-343
    • /
    • 2012
  • In-stream large wood (LW) has a critical impact on the geomorphic characteristics relevant to ecosystem management and disaster prevention, yet relatively little is known about variations in its dynamics and subsequent export on the watershed-scale perspective in Korea. Here we review variations in the dynamics and subsequent export of LW as a function of stream size, which is appropriate for Korean mountain streams. In upstream channels with narrow bankfull widths and low stream discharges, a massive amount of LW, resulting from forest dynamics and hillslope processes, may persist for several decades on valley floor. These pieces, however, are eventually transported during infrequent debris flows from small tributaries, as well as peak hydrology in main-stem channels. During the transport, these pieces suffer fragmentation caused by frictions with boulders, and stream bank and bed. Although infrequent, these events can be dominant processes in the export of significant amounts of LW from upstream channel networks. In downstream channels with wide bankfull widths and high stream discharges, LW is dominantly recruited by forest dynamics and bank erosion only at locations where the channel is adjacent to mature riparian forests. With the LW pieces that are supplied from the upstream, these pieces are continuously transported downstream during rainfall events. This leads to further fragmentation of the LW pieces, which increases their transportability. With decreasing stream-bed slope, these floated LW pieces, however, can be stored and form logjams at various depositional sites, which were developed by interaction between channel forms and floodplains. These pieces may decay for decades and be subsequently transported as particulate or dissolved organic materials, resulting in the limitation of LW fluvial export from the systems. However, in Korea, such depositional sites were developed in the extremely limited streams with a large dimension and no flood history for decades, and thus it does not be expected that the reduction of LW export amount, which can be caused by the long-term storage. Our review presents a generalized view of LW processing and is relevant to ecosystem management and disaster prevention for Korean mountain streams.