There are successful multinationals like McDonald's, and International hotel chain. The reason is efficiency managing diversity workforces. Therefore, purpose of this study suggests practical guidelines to handling global workforce for creative ideas, diversity for network, and pool for superiority workforces. 1. The company or university we provided by training program for cross-culture seminar, and education program for global culture & manner. 2 The employees express their perceptions and feelings in their own language, the discussions were videotaped, and used for decreasing misfactors such as misperceptions, misevaluations, and mistrust. 3. It builds up various program for understanding cultural difference like seminar, world business manner, and costume & food culture for each country. 4. Top manager should keep in mind that cross-culture has diversity and consistency at the same time.
Journal of the Korean Data and Information Science Society
/
v.26
no.5
/
pp.1035-1045
/
2015
Recent studies in Big Data Analysis are showing promising results, utilizing the main memory for rapid data processing. In-memory computing technology can be highly advantageous when used with high-performing servers having tens of gigabytes of RAM with multi-core processors. The constraint in network in these infrastructure can be lessen by combining in-memory technology with distributed parallel processing. This paper discusses the research in the aforementioned concept applying to a test taxi hailing application without disregard to its underlying RDBMS structure. The application of IMDG technology in the application's backend API without restructuring the database schema yields 6 to 9 times increase in performance in data processing and throughput. Specifically, the change in throughput is very small even with increase in data load processing.
The Journal of Korean Institute for Practical Engineering Education
/
v.4
no.2
/
pp.38-45
/
2012
Building a game has been used as effective and attractive way of teaching computer science. Building a usable Multi-player Game is requires important aspects of technology, teamwork and software engineering principles. The whole class was structured in to several teams and students needed to join one or two teams. Each team presented their progress, discussed future milestones and troubleshoots, updated documents for clearer communication and utilized SVN(Subversion) throughout the semester. Unlike usual class setting, all students worked collaboratively together like one company to achieve the goal. In one semester, students started from concept design and completed a working Multiplayer Online Game called "deBugger" (Fall 2009), and "World of Balance" (Fall 2011), while learning game design, 3D graphics, Game Engine, Server-client architecture, Game Protocol, network programming, database, Software Engineering principles, and large application development as a team project.
KSII Transactions on Internet and Information Systems (TIIS)
/
v.12
no.12
/
pp.5744-5764
/
2018
In Wireless Sensor Networks (WSNs) for Internet of Things (IoT) environment, fault tolerance is a most fundamental issue due to strict energy constraint of sensor node. In this paper, a robust energy saving data dissemination protocol for IoT-WSNs is proposed. Minimized energy consumption and dissemination delay time based on signal strength play an important role in our scheme. The representative dissemination protocol SPIN (Sensor Protocols for Information via Negotiation) overcomes overlapped data problem of the classical Flooding scheme. However, SPIN never considers distance between nodes, thus the issue of dissemination energy consumption is becoming more important problem. In order to minimize the energy consumption, the shortest path between sensors should be considered to disseminate the data through the entire IoT-WSNs. SPMS (Shortest Path Mined SPIN) scheme creates routing tables using Bellman Ford method and forwards data through a multi-hop manner to optimize power consumption and delay time. Due to these properties, it is very hard to avoid heavy traffic when routing information is updated. Additionally, a node failure of SPMS would be caused by frequently using some sensors on the shortest path, thus network lifetime might be shortened quickly. In contrast, our scheme is resilient to these failures because it employs energy aware concept. The dissemination delay time of the proposed protocol without a routing table is similar to that of shortest path-based SPMS. In addition, our protocol does not require routing table, which needs a lot of control packets, thus it prevents excessive control message generation. Finally, the proposed scheme outperforms previous schemes in terms of data transmission success ratio, therefore our protocol could be appropriate for IoT-WSNs environment.
The Journal of the Institute of Internet, Broadcasting and Communication
/
v.21
no.4
/
pp.1-8
/
2021
In this paper, we propose an approach that combines the technological advantages of P2P and cloud computing to support MMOGs that allowing a huge amount of users worldwide to share a real-time virtual environment. The proposed P2P system based on cloud computing can provide a greater level of scalability because their more resources are added to the infrastructure even when the amount of users grows rapidly. This system also relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. In this paper, we describe the concept and basic architecture of cloud computing-based P2P Systems for scalability of MMOGs. An efficient and effective provisioning of resources and mapping of load are mandatory to realize this architecture that scales in economical cost and quality of service to large communities of users. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed P2P system can reduce the bandwidth at the server while utilizing their enough bandwidth when the number of simultaneous users keeps growing.
Proceedings of the Korea Information Processing Society Conference
/
2011.04a
/
pp.871-874
/
2011
The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.
Ⅰ. Introduction Retailers in the 21st century are being told that future retailers are those who can execute seamless multi-channel access. The reason is that retailers should be where shoppers want them, when they want them anytime, anywhere and in multiple formats. Multi-channel access is considered one of the top 10 trends of all business in the next decade (Patricia T. Warrington, et al., 2007) And most firms use both direct and indirect channels in their markets. Given this trend, we need to evaluate a channel equity more systematically than before as this issue is expected to get more attention to consumers as well as to brand managers. Consumers are becoming very much confused concerning the choice of place where they shop for durable goods as there are at least 6-7 retail options. On the other hand, manufacturers have to deal with category killers, their dealers network, Internet shopping malls, and other avenue of distribution channels and they hope their retail channel behave like extensions of their own companies. They would like their products to be foremost in the retailer's mind-the first to be proposed and effectively communicated to potential customers. To enable this hope to come reality, they should know each channel's advantages and disadvantages from consumer perspectives. In addition, customer satisfaction is the key determinant of retail customer loyalty. However, there are only a few researches regarding the effects of shopping satisfaction and perceptions on consumers' channel choices and channels. The purpose of this study was to assess Korean consumers' channel choice and satisfaction towards channels they prefer to use in the case of electronic goods shopping. Korean electronic goods retail market is one of good example of multi-channel shopping environments. As the Korea retail market has been undergoing significant structural changes since it had opened to global retailers in 1996, new formats such as hypermarkets, Internet shopping malls and category killers have arrived for the last decade. Korean electronic goods shoppers have seven major channels : (1)category killers (2) hypermarket (3) manufacturer dealer shop (4) Internet shopping malls (5) department store (6) TV home-shopping (7) speciality shopping arcade. Korean retail sector has been modernized with amazing speed for the last decade. Overall summary of major retail channels is as follows: Hypermarket has been number 1 retailer type in sales volume from 2003 ; non-store retailing has been number 2 from 2007 ; department store is now number 3 ; small scale category killers are growing rapidly in the area of electronics and office products in particular. We try to evaluate each channel's equity using a consumer survey. The survey was done by telephone interview with 1000 housewife who lives nationwide. Sampling was done according to 2005 national census and average interview time was 10 to 15 minutes. Ⅱ. Research Summary We have found that seven major retail channels compete with each other within Korean consumers' minds in terms of price and service. Each channel seem to have its unique selling points. Department stores were perceived as the best electronic goods shopping destinations due to after service. Internet shopping malls were perceived as the convenient channel owing to price checking. Category killers and hypermarkets were more attractive in both price merits and location conveniences. On the other hand, manufacturers dealer networks were pulling customers mainly by location and after service. Category killers and hypermarkets were most beloved retail channel for Korean consumers. However category killers compete mainly with department stores and shopping arcades while hypermarkets tend to compete with Internet and TV home shopping channels. Regarding channel satisfaction, the top 3 channels were service-driven retailers: department stores (4.27); dealer shop (4.21); and Internet shopping malls (4.21). Speciality shopping arcade(3.98) were the least satisfied channels among Korean consumers. Ⅲ. Implications We try to identify the whole picture of multi-channel retail shopping environments and its implications in the context of Korean electronic goods. From manufacturers' perspectives, multi-channel may cause channel conflicts. Furthermore, inter-channel competition draws much more attention as hypermarkets and category killers have grown rapidly in recent years. At the same time, from consumers' perspectives, 'buy where' is becoming an important buying decision as it would decide the level of shopping satisfaction. We need to develop the concept of 'channel equity' to manage multi-channel distribution effectively. Firms should measure and monitor their prime channel equity in regular basis to maximize their channel potentials. Prototype channel equity positioning map has been developed as follows. We expect more studies to develop the concept of 'channel equity' in the future.
Purpose - The Millennial Generation, which grew in the wake of the spread of the Internet and rapid changes in the media environment, is rapidly moving from the traditional broadcasting environment to the Internet-broadcasting environment in terms of content acceptance. With the emergence of UGC (User-generated content), the change in the status of single-person content creators enables the growth of multi-channel networks (MCN), a new content-distribution platform and an agency concept for single creators. Youtube-based MCN produces multiple single star producers and casts and provides its own video series through Youtube. It is also emerging as a major M&A target for global media providers in terms of providing content to a wide range of consumers with the same interests and consumption characteristics. In addition, for the Millennials generation, which are part of their lives, MCN is becoming the most suitable media for TGIF (Twitter, Google, i-phone, Facebook). Accordingly, this study defines newly emerging MCNs and analyzes the factors for accepting MCN-produced content based on the push-pull-mooring (PPM) model. Research design, data, and methodology - An empirical analysis is performed through a questionnaire survey. For this purpose, 204 people who have experience of watching MCN were studied. Collected data is processed through analysis of a structural equation model using R to test the hypothesis. Results - For the MCN service to become an alternative to existing media, it is necessary to continuously promote cultural diversity and diversity of attempts that conventional media cannot provide. It is the attractiveness of the alternative that has the greatest influence on the intention to switch to a MCN service. When we look at MCN content so far, certain patterns such as game progress, introduction, food, and chat rooms have already appeared. We need to overcome this and develop a completely new conceptual content that we have never seen before. This requires a more generous viewer perception of the topics covered. For diversity, linguistic and verbal violence should be tolerant in common sense to provide a foundation for securing cultural diversity. Conclusions - In this study, we tried to develop a comprehensive approach to the substitution effect of MCN. In terms of academic achievement, the PPM model is used to enhance the utilization of media and broadcasting. Practical implications are to provide an analytical framework for verifying alternative or complementary effects when viewers switch to MCN.
The Journal of the Institute of Internet, Broadcasting and Communication
/
v.9
no.3
/
pp.123-129
/
2009
Ubiquitous home is emerging as the future digital home environments that provide various ubiquitous home services like u-Life, u-Health, etc. It is composed of some home appliances and sensors which are connected through wired/wireless network. Ubiquitous home services become aware of user's context with the information gathered from sensors and make home appliances adapt to the current home situation for maximizing user convenience. In these context-aware home environments, it is the one of significant research topics to predict user behaviors in order to proactively control the home environment. In this paper, we propose Multi-Level prediction algorithm for context-aware services in ubiquitous home environment. The algorithm has two phases, prediction and execution. In the first prediction phase, the next location of user is predicted using tree algorithm with information on users, time, location, devices. In the second execution phase, our table matching method decides home appliances to run according to the prediction, device's location, and user requirement. Since usually home appliances operate together rather than separately, our approach introduces the concept of mode service, so that it is possible to control multiple devices as well as a single one. We also devised some scenarios for the conceptual verification and validated our algorithm through simulations.
The issue presented in this paper are as follows: 1. Legislative actions of welfare-related law for the exceptional children. The legislative base for the evolution has been yet weak and ambigous at best for a formalization of what should be considered accepted practice and effective action in providing handicapped child and their parents educational rights and equal protection of the law. And they are under remote control of partial factor subject to social welfare law for children, and public law for education, promotion law for the exceptional child education, protection law for public aids. 2. Organization of government for the welfare services for the exceptional children. There is no sing of a push toward consolidation of effort for the welfare service of the exceptional children in this country that seeks to recapture a sense of unity, of coherence, of completeness from a reality made up of discontinuous fragments of humanitarian effora This presently that. as for the education of the exceptional child, by the section of the exceptional education in MOE (Ministry of Education), and/or as for welfare services and promotion actions, by the section of child welfare in MHSA (Ministry of Health and Social Affairs). One door type operation rooted in the specialization, and limited resources to evolve multi-purpose agencies that undertake to provide a broad range of tangible and concrete services, as well as supportive counselling and assessment, under a single management which plans and directs the allocations of resources, should be followed. 3. Facilities and recruitment of teachers for the exceptional children. In this country there are 54 facilities for special services, 56 schools for the exceptional education, and 3 colleges and equavalents that provide teacher training services leading to certification with IIO annual graduates. However, curriculum for exceptional children should be rearranged and reconstructed. Conclusion; Only as for social welfare institutions in community, this country produced a succession of specific purpose activities, over period of time, that accumulated to form the present network of hundreds of social welfare organizations and facilities Periodically major efforts were launched to revitalize or to improve the help-giving system. But they lack specialization to be effective, and the nature of multi-purpose center tends to be vague for the classified handicapped. Therefore, there, should be linkage between policy maker and community services to maintain some coherenty in preventive care, treatment, and after cares. At last, the effects of the current concept "the exceptional child" involved with their families, and their neighborhood should be considered in view of the people who consist about 25% of the total population.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.