• Title/Summary/Keyword: DBI

Search Result 34, Processing Time 0.028 seconds

How Customer Experience Management Can Improve the Distribution of Marketing Performance

  • Sri, SAFITRI;Achmad, SUDIRO;Fatchur, ROHMAN;Mugiono, MUGIONO
    • Journal of Distribution Science
    • /
    • v.21 no.2
    • /
    • pp.53-63
    • /
    • 2023
  • Purpose: This study aims to determine the effect of Customer Experience Management (CEM) on the distribution of Marketing Performance mediated by Digital Business Innovation (DBI), Digital Operational Excellence (DOE), and Digital Value Co-Creation (DVC) in Indonesia Information & Technology (IT) industry. Research design, data, and methodology: This research was conducted in two stages, namely exploratory and explanatory on IT companies in Indonesia. The authors took 132 samples using proportionate random sampling method in three groups of companies. Results: The results showed that CEM had no significant positive effect on the distribution of Marketing Performance. CEM has no direct effect on the distribution of Marketing Performance through the mediation of DBI. CEM has direct effect on the distribution of Marketing Performance through the mediation of DOE and DVC. DBI has no significant effect in increasing the distribution of Marketing Performance. However, DOE and DVC have a significant effect in increasing the distribution of Marketing Performance. Conclusion: The distribution of Marketing Performance can be indicated better through CEM through mediation.

Minutiae extraction using improved Binarization process of the fingerprint (지문의 개선된 이진화 과정을 통한 특징점 추출)

  • Son Won-Mu;Song Jong-Kwan;Yoon Byung-Woo;Lee Myeong-Jin
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.4
    • /
    • pp.243-248
    • /
    • 2004
  • Automatic fingerprint identification is a process of direction extraction, binarization, thinning, minutiae extraction of fingerprint identification. In this process, binarization after direction extraction affects a process of thinning and minutiae extraction. The fasle binarization is increased the false minutiae extraction rate. In this paper, we proposed more exact minutiae extraction algorithm with more enhanced binarization method, compared with traditional binarization process. We could have more enhanced results by using the direction and the half distance between ridges as the threshold of binarization process. In an experiment, Fingerprint images from NIST DBI are tested and the result shows that the proposed binarization algorithm increases minutiae extraction.

  • PDF

Validation and Development of the Driving Stress Scale (운전 스트레스 척도(Driving Stress Scale: DSS)의 개발과 타당화 연구)

  • Soon yeol Lee;Soon chul Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.3
    • /
    • pp.21-40
    • /
    • 2008
  • This study was intended to validate and develop the driving stress scale. In a preliminary investigation, literature studies on the stress and open questionnaire were administered and examined in four regions in Korea. As a result, 121 items driving stress questionnaire were developed. In the study, this driving stress questionnaire was examined to 450 drivers located seven regions in Korea. The factors analysis revealed 5 meaningful factors[(Progress Obstacle: PO), (Traffic Circumstance: TC), (Accident & Regulation: AR), (Regulation Observance: RO), (Time Pressure: TP)] with 38 items. When internal consistency for each 5 factor was calculated, all sub-scale revealed a satisfactory level of Cronbach's α. Also, correlations with Driving Behaviour Inventory-General Driver Stress(DBI-GEN) and risk driving behaviors(speed driving, drunken driving, offence accident, defence accident) supported consistently validity of the Driving Stress Scale(DSS). Finally the result were discussed and implications are suggested for future studies.

  • PDF

Monoculture and Mixture Effects of Green Manure Crops on Soil Quality, Weed Suppression and Organic Red-pepper Production

  • Lee, Sang-Min;Jung, Jung-Ah;Choi, Bong-Su;Lee, Yong-Hwan;Lee, Jong-Sik;Song, Beom-Heon;Sung, Jwa-Kyung
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.44 no.4
    • /
    • pp.581-590
    • /
    • 2011
  • Organic farming is rapidly expanding worldwide. Crop growth in organic systems greatly depends on the functions performed by soil microbes, and nutrient supply weed suppression by green manure crops input. Four red-pepper production systems were compared: 1) bare ground (conventional system); 2) hairy vetch monoculture; 3) rye monoculture; and 4) hairy vetch-rye mixture. Soil inorganic N reached the peak at 30 DAI and hairy vetch monoculture was the highest ($192mg\;kg^{-1}$) and soil total carbon was fluctuated sporadically during the experiment. Carbohydrate and phenolic compounds in soil kept significantly higher in green manure crops systems from 10 DBI to 30 DAI, however the level was the maximum at 10 DBI (carbohydrate) and 30 DAI (phenolic comounds). Incorporation of green manure crops residue enhanced soil microbial biomass C and N throughout the growing season except that MBN in rye was reduced after incorporation. Green manure crops systems suppressed weed occurrence and, in particular, it was prominent in rye monoculture. Mineral elements composition and production in red-pepper fruits were markedly decreased in green manure crops systems although hairy vetch monoculture has come close to bare ground (NPK-applied). Therefore, it was suggested that higher biomass production should be performed not only to improve soil quality and suppress weeds but to yield suitable red-pepper fruits in green manure crops-based organic farming.

An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems (임베디드 시스템 동적 프로그램 분석을 위한 JTAG API 구현)

  • Kim, Hyung Chan;Park, Il Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.31-42
    • /
    • 2014
  • Debugger systems are necessary to apply dynamic program analysis when evaluating security properties of embedded system software. It may be possible to make the use of software-based debugger and/or DBI framework if target devices support general purpose operating systems, however, constraints on applicability as well as environmental transparency might be incurred thereby hindering overall analyzability. Analysis with JTAG (IEEE 1149.1) debugging devices can overcome these difficulties in that no change would be involved in terms of internal software environment. In that sense, JTAG API can facilitate to practically perform dynamic program analysis for evaluating security properties of target device software. In this paper, we introduce an implementation of JTAG API to enable analysis of ARM core based embedded systems. The API function set includes the categories of debugger and target device controls: debugging environment and operation. To verify API applicability, we also provide example analysis tool implementations: our JTAG API could be used to build kernel function fuzzing and live memory forensics modules.

The reduction methods of in-rush current in electronic ballast for a 250W CDM lamp (250W CDM램프용 전자식 안정기의 돌입전류 감소 기법)

  • Lee, Hyeon-Jin;Jeon, In-Woong;Park, Chong-Yeun
    • Proceedings of the KIPE Conference
    • /
    • 2010.07a
    • /
    • pp.544-545
    • /
    • 2010
  • 전자식 안정기의 초기구동 시, 발생되는 입력단의 높은 돌입전류는 전자식 안정기 내의 전파정류다이오드 및 능동 역률보상회로의 파손원인이 되며, 제품의 신뢰성을 감소시키는 큰 요인으로 지목된다. 따라서 안정기의 입력에서 발생되는 돌입전류를 분석하고 제한하는 방법이 필요하다. 본 논문은 250W CDM(Ceramic Discharge Metal-halide) 램프용 DBI(Dual Buck Inverter) 구조의 전자식 안정기에서 초기 구동 시 높은 돌입전류가 발생되는 원인을 분석하고, 해결책을 제시하였다.

  • PDF

Implementation of the Automated De-Obfuscation Tool to Restore Working Executable (실행 파일 형태로 복원하기 위한 Themida 자동 역난독화 도구 구현)

  • Kang, You-jin;Park, Moon Chan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.785-802
    • /
    • 2017
  • As cyber threats using malicious code continue to increase, many security and vaccine companies are putting a lot of effort into analysis and detection of malicious codes. However, obfuscation techniques that make software analysis more difficult are applied to malicious codes, making it difficult to respond quickly to malicious codes. In particular, commercial obfuscation tools can quickly and easily generate new variants of malicious codes so that malicious code analysts can not respond to them. In order for analysts to quickly analyze the actual malicious behavior of the new variants, reverse obfuscation(=de-obfuscation) is needed to disable obfuscation. In this paper, general analysis methodology is proposed to de-obfuscate the software used by a commercial obfuscation tool, Themida. First, We describe operation principle of Themida by analyzing obfuscated executable file using Themida. Next, We extract original code and data information of executable from obfuscated executable using Pintool, DBI(Dynamic Binary Instrumentation) framework, and explain the implementation results of automated analysis tool which can deobfuscate to original executable using the extracted original code and data information. Finally, We evaluate the performance of our automated analysis tool by comparing the original executable with the de-obfuscated executable.

Analysis of Dowel Bar Placement Accuracy with Construction Methods (시공방법에 따른 다웰바 시공상태 분석)

  • Lee, Jae-Hoon;Kim, Hyung-Bae;Kwon, Soon-Min;Kwon, Ou-Sun
    • International Journal of Highway Engineering
    • /
    • v.9 no.2 s.32
    • /
    • pp.101-114
    • /
    • 2007
  • Dowel bars in the jointed concrete pavement are used to both provide load transfer across pavements joints and prevent the joint faulting leading to longer service life. On the contrary, the misplacement of dowel bar can provide negative results including the joint freezing(locking) that may cause the joint spatting and unexpected mid-slab cracking. The dowel bar can be placed using the assembly or dowel bar inserter (DBI) during the concrete pavement construction. In the domestic practice of the concrete pavement construction, the dowel bar is placed using the assembly method. This study primarily focuses on the comparison of these two dowel placement methods using the field data from the KHC test road in which both dowel placement methods have been applied to a certain length of the concrete pavement. The field data regarding the alignment of the dowel bars placed by both methods was collected using MIT-SCAN2, a nondestructive measuring equipment, and processed to compute Joint Score and Running Ave. Joint Score which are used as indicators of the dowel bar performance. The comparison of the methods for the dowel bar placement using these indicators shows that the DBI method provided much better alignment of the dowel bars reducing the risk of joint freezing than the assembly method. In order to improve the quality of the dowel bar placement using the assembly method, the current weak points of the assembly method including the fabrication, storage, and installation of dowel bar assembly were investigated and the solution was suggested. The improved dowel bar sets based on the suggested solution have been applied to an actual practice of the concrete pavement construction. The field data shows that the improved assembly method suggested in this study can highly reduce the risk of joint freezing.

  • PDF

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.

Plasticity of rice to water extremes: Farmers' genes to mechanisms

  • Bailey-Serres, Julia
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.5-5
    • /
    • 2017
  • Too little and too much water due to climatic events is a significant cause of global food insecurity. Crops are less productive under water-limited conditions and all major crops, with the exception of rice (Oryza sativa), die within a few days of complete submergence. To complement our studies on genes such as SUB1A, (an ERF-VII transcription factor that provides robust submergence tolerance) and AG1 (a TREHALOSE 6-P PHOSPHATASE that promotes establishment of young seedlings underwater), we have retooled INTACT (${\underline{I}}solation$ of ${\underline{N}}uclei$ ${\underline{TA}}gged$ in specific ${\underline{C}}ell$ ${\underline{T}}ypes$) and TRAP (${\underline{T}}ranslating$ ${\underline{R}}ibosome$ ${\underline{A}}ffinity$ ${\underline{P}}urification$) for rice. These technologies enable us to follow dynamics in chromatin, nuclear pre-mRNAs and ribosome-bound mRNAs in meristems and diverse cell types. With these technologies we can better interpret responses to stresses and reestablishment of homeostasis. These include stress acclimation strategies involving changes in metabolism and development, such as dynamics in suberin deposition in sub-epidermal layers of roots that limit water loss under drought and oxygen escape during waterlogging. Our new data uncover dynamic and reversible regulation at multiple levels of gene regulation and provide new insights into processes of stress resilience. Supported by US NSF-PGRP Plasticity (IOS-1238243), Secretome (IOS-1546879) and REU (DBI-146129) grants.

  • PDF