• Title/Summary/Keyword: Science communication

Search Result 13,077, Processing Time 0.045 seconds

A study on the effect of brand recognition on brand personality, brand image and customer-brand relationship quality in the university contract foodservice industry (대학교 위탁급식업체의 브랜드 인지가 브랜드 개성, 브랜드 이미지, 소비자-브랜드 관계의 질(BRQ)에 미치는 영향연구)

  • Lee, Yun-Jung;Han, Kyung-Su;Choi, Duck-Joo;Kim, Yun-Kyeong
    • Culinary science and hospitality research
    • /
    • v.17 no.2
    • /
    • pp.51-73
    • /
    • 2011
  • Companies are required to invest in numerous intial marketing costs for establishing brand power, thus, many companies in the foodservice industry are increasing their budgets on communication to strengthen their own brand equity components such as brand recognition, brand royalty, perceived quality and associated image using mass media that has not been used before. For this study, 617 samples were analyzed by such analytic methods as a frequency analysis, cross-tabulation, a factor analysis and a reliability analysis for validity, and a confirmatory factory analysis, a model adequacy evaluation, and a path analysis using AMOS 17.0. The hypothesis verification by the AMOS analysis has revealed that all hypotheses positively influenced contract foodservice brands, and the brand recognition of a university contract foodservice company has an impact on sincerity and refinement. Therefore, positive brand image formation encourages strong brand establishment between a university contract foodservice business and customers, and this study strongly suggests continuous further studies about constructing a positive brand image.

  • PDF

A Study on the Status of Market, Technology and Legal System of the UAV and its Useful Policies (무인항공기 시장·기술·법제도 실태분석 및 정책적 대응방안 연구)

  • Park, Cheol-Soon
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.373-401
    • /
    • 2015
  • The UAV(Unmanned Aerial Vehicle, Drone) technology has been undergoing rapid progress, accompanied with a growth in the market. However, domestic industry standards and technology lag behind such progress happening on the international scene, and in particular in developed countries. Related regulations are also deemed lacking to address the issues that arise with such developments. Meanwhile, as the rise of UAV technology is a fairly recent phenomenon, the gap between Korea and developed countries is not too big. As this technology has high relevance to information and communication technologies, it also offers ample leeway for Korea to catch up in the field of UAV. As such, this paper seeks to provide a survey of the overall technology, market and regulations concerning UAV to identify possible measures on how to address any issues that may arise through proper policies. Due to the progress made in the field of UAV technology and increased penetration rate, striking a right balance between putting in place a proper regulatory system and establishing policies that foster growth in the field has risen as a very important issue. While the importance of establishing a legal system that helps prevent possible risks is indeed important, it must also be acknowledged that excessive regulation can also hinder technological progress. This, in turn would stagnate the market and dampen the entrepreneurial spirit in the society. In the case of new, practical technologies such as UAV, a prompt establishment of regulatory systems and policy measures in terms of policies is a requisite. In brief, in order to promote progress in the UAV industry and at the same time, for public safety and the protection of privacy, there should be an appropriate level on the easing and tightening of the regulation.

CORE-Dedup: IO Extent Chunking based Deduplication using Content-Preserving Access Locality (CORE-Dedup: 내용보존 접근 지역성 활용한 IO 크기 분할 기반 중복제거)

  • Kim, Myung-Sik;Won, You-Jip
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.59-76
    • /
    • 2015
  • Recent wide spread of embedded devices and technology growth of broadband communication has led to rapid increase in the volume of created and managed data. As a result, data centers have to increase the storage capacity cost-effectively to store the created data. Data deduplication is one way to save the storage space by removing redundant data. This work propose IO extent based deduplication schemes called CORE-Dedup that exploits content-preserving access locality. We acquire IO traces from block device layer in virtual machine host, and compare the deduplication performance of chunking method between the fixed size and IO extent based. At multiple workload of 10 user's compile in virtual machine environment, the result shows that 4 KB fixed size chunking and IO extent based chunking use chunk index 14500 and 1700, respectively. The deduplication rate account for 60.4% and 57.6% on fixed size and IO extent chunking, respectively.

Risk based policy at big data era: Case study of privacy invasion (빅 데이터 시대 위험기반의 정책 - 개인정보침해 사례를 중심으로 -)

  • Moon, Hyejung;Cho, Hyun Suk
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.63-82
    • /
    • 2012
  • The world's best level of ICT(Information, Communication and Technology) infrastructure has experienced the world's worst level of ICT accident in Korea. The number of major accidents of privacy invasion has been three times larger than the total number of Internet user of Korea. The cause of the severe accident was due to big data environment. As a result, big data environment has become an important policy agenda. This paper has conducted analyzing the accident case of data spill to study policy issues for ICT security from a social science perspective focusing on risk. The results from case analysis are as follows. First, ICT risk can be categorized 'severe, strong, intensive and individual'from the level of both probability and impact. Second, strategy of risk management can be designated 'avoid, transfer, mitigate, accept' by understanding their own culture type of relative group such as 'hierarchy, egalitarianism, fatalism and individualism'. Third, personal data has contained characteristics of big data such like 'volume, velocity, variety' for each risk situation. Therefore, government needs to establish a standing organization responsible for ICT risk policy and management in a new big data era. And the policy for ICT risk management needs to balance in considering 'technology, norms, laws, and market'in big data era.

  • PDF

The Effect of Physical Environments in the Comprehensive Health Examination Center on Medical Service Value, Satisfaction and Switching Barrier (종합검진센터의 물리적 환경이 의료서비스가치와 만족도, 전환장벽에 미치는 영향)

  • Kim, YongTae;Chae, BongSik;Hwang, BokJu
    • Journal of Service Research and Studies
    • /
    • v.9 no.4
    • /
    • pp.63-80
    • /
    • 2019
  • This study presents strategic implications for enhancing the competitiveness of the comprehensive health examination center through the study of its impact on the switching barrier with medical service value and medical service satisfaction as parameters. In order to achieve the purpose of this study, a total of 324 questionnaires were analyzed for customers who received health examinations at the general examination center. Covariance structure analysis was performed to test hypotheses and causal relationships. The results showed that the physical environment had a significant effect on the medical service value and medical service satisfaction. The value of medical service also had a significant effect on medical service satisfaction. The value of medical service was found to affect the transition barrier, but the satisfaction of medical service did not affect the transition barrier. The implications of this study are that physical environment has a significant effect on medical service value and medical service satisfaction. Therefore, modern medical equipment should be equipped with the latest medical equipment to minimize accurate examination and misdiagnosis through modernization of medical examination center. In addition, since the value of medical service has a significant effect on the switching barrier, it is necessary to establish a plan to enhance the value of medical service. We need to promote sustainable customer retention and creation of new customers through differentiated screening items and cost advantages over competitors. In addition to check-up services, efforts should be made to enhance the value of services such as strengthening medical communication and medical complex cultural spaces, and at the same time, establish an organizational culture of customer-first examination centers through the placement of excellent personnel and continuous education.

A Robust Method for Automatic Generation of Moire Reference Phase from Noisy Image (노이즈 영상으로부터 모아레 기준 위상의 강인 자동 생성 방법)

  • Kim, Kuk-Won;Kim, Min-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.5
    • /
    • pp.909-916
    • /
    • 2009
  • This paper presents the automatic vision algorithm to generate and calibrate reference phase plane to improve the accuracy of 3D measuring machine of using phase shifting projection moire method, which is not traditional N-bucket method, but is based on direct image processing method to the pattern projection image. Generally, to acquire accurate reference phase plane, the calibration specimen with well treated surface is needed, and detailed calibration method should be performed. For the cost reduction of specimen manufacturing and the calibration time reduction, on the specimen, not specially designed, with general accuracy level, an efficient calibration procedure for the reference phase generation is proposed. The proposed vision algorithm is developed to extract the line center points of the projected line pattern from acquired images, derive the line feature information consisting of its slope and intercept by using sampled feature points, and finally generate the related reference phase between line pairs. Experimental results show that the proposed method make reference phase plane with a good accuracy under noisy environment and the proposed algorithm can reduce the total cost to make high accurate calibration specimen, also increase the accuracy of reference phase plane, and reduce the complex calibration procedure to move grid via N-bucket algorithm precisely.

A Trend Analysis on the Educational Research of the Probability and Statistics - Focused on Papers Published in , the Journal of Korea Society of Mathematical Education - (확률.통계 연구에 대한 수학교육학적 고찰 -<수학교육>에 게재된 논문을 중심으로-)

  • 이영하;심효정
    • The Mathematical Education
    • /
    • v.42 no.2
    • /
    • pp.203-218
    • /
    • 2003
  • The purpose of this study is to see what the essential characteristics are in teaching probability and statistics among various mathematical fields. we also tried to connect the study of probability and statistics education with what is needed for a science be synthetic to have its own identity as a unique research field. Since we searched for the future direction of the pedagogic study in the probability and statistics we first selected papers on probability and statistics published in (Series A), the Journal of Korea Society of Mathematical Education, and establish the following research questions. What kinds of characteristics can be found when papers on probability and statistics published in (Series A) are classified into low categories; contents of probability and statistics education, research method of the mathematics education, methods of teaming and teaching, and finally measurements and evaluation\ulcorner We classified papers into two kinds. One is related to the educational contents, consisting of the methods of learning and teaching, and of the measurement and evaluation. The other is reined to the methods of research, which is not a part of the educational curriculum but is essential for establishing the identity of mathematics education. According to the periods, papers on the curricular contents in 1960s were influenced by the New Mathematics, and papers on the curricular contents in 1980s were influenced by 'back to basic'. In 1990s, papers on methods of learning and teaching, and measurement md evaluation were increasing in number. Besides, (series A) from the Journal of Korea Society of Mathematical Education covers contents, methods of Loaming and teaching, and measurement and evaluation. And when I examined the papers on the contents of textbook of a junior high school related to the probability and statistics education and on methods of learning and teaching, 1 found that those papers occupy 1.84% in . When it comes to the methods of loaming and teaching, most of studies in (series A) are about application of concrete implement like experiment and practical application of computer programs, Through this study, I found that over-all and more active researches on probability and statistics are required and that the studies about methods of loaming and teaching must be made in diverse directions. It is needed that how students recognize probability and statistics, connection, communication and representation in probability and statistics context, too. (series A) does not have papers on methods of study. Mathematics pedagogy is a mixture of various studies - mathematical psychology, mathematical philosophy, the history of mathematics and Mathematics. So If there doesn't exist a proper method of study adequate in the situation for the mathematics education the issue of mathematics pedagogy might be taken its own place by that of other studies'. We must search for the unique method of study fur mathematics education so that mathematics pedagogy has its own identity as a study. The study concerning this aspect is needed.

  • PDF

A Research on Extension Device of Korea Private Security Market (한국 민간경비 시장의 과제와 활성화 도입방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.173-198
    • /
    • 2008
  • As we took a look at above, this researcher suggest following device to extend Korea's private security industry's area. First, it is necessary to extend private investigation law's area grafting private security together. Second, it is necessary it is necessary to think of private security's role related key figure law, corresponding terror law, Presidential Security Service Guard law. Third, as a draft of a proposed law related prevention flowing out of industry techniques among industry security related law, passed, it is necessary private security's diversity, subdivision, composition through an enterprise security, and private security industry area's grafting together. Fourth, a research about private security company's investment and professional area's bringing up as well as business's extension device should be groped for the security consulting though total system management service. Fifth, there are no big difference education course and purpose, duty about a security police man law and security law's unification, so it is necessary to drive forward actively unification through government organization's cooperation. Sixth, a paradigm shift should be occured about private security service among policeman, citizen, and private security guards. Seventh, it is considered the role of security association is important. Lastly about a matter communication between the National Police Agency, and Security Association, not only look at from an authority's angle, collecting information, corresponding ability but now it is considered to grope each other cooperation device together among organizations not only the National Police Agency but also, National Organization, National Intelligence Service, the prosecution, Presidential Security Service Guard, Army etc.

  • PDF

An APK Overwrite Scheme for Preventing Modification of Android Applications (안드로이드 앱 변조 방지를 위한 APK 덮어쓰기 기법)

  • Choi, Byungha;Shim, HyungJoon;Lee, ChanHee;Cho, Sangwook;Cho, Seong-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.309-316
    • /
    • 2014
  • It is easy to reverse engineer an Android app package file(APK) and get its decompiled source code. Therefore, attackers obtains economic benefits by illegally using the decompiled source code, or modifies an app by inserting malware. To address these problems in Android, we propose an APK overwrite scheme that protects apps against illegal modification of themselves by using a new anti-reverse engineering technique. In this paper, the targets are the apps which have been written by any programmer. For a target app (original app), server system (1) makes a copy of a target app, (2) encrypts the target app, (3) creates a stub app by replacing the DEX (Dalvik Executable) of the copied version with our stub DEX, and then (4) distributes the stub app as well as the encrypted target app to users of smartphones. The users downloads both the encrypted target app and the corresponding stub app. Whenever the stub app is executed on smartphones, the stub app and our launcher app decrypt the encrypted target app, overwrite the stub app with the decrypted target one, and executes the decrypted one. Every time the target app ends its execution, the decrypted app is deleted. To verify the feasibility of the proposed scheme, experimentation with several popular apps are carried out. The results of the experiment demonstrate that our scheme is effective for preventing reverse engineering and tampering of Android apps.

The Role of Geographic Information System and Its Functional Intergration Strategy in the Conventional Transportation Planning Process (전통교통계획과정에 있어서 GIS의 역할 및 기능적 통합방안에 관한 연구)

  • Choi, Kee-Choo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.1 no.1 s.1
    • /
    • pp.127-140
    • /
    • 1993
  • The purpose of this paper is to examine the possible benefits of combining transportation planning models with geographic information systems (GIS) in the hope that intergrating these systems can alleviate the inherent problems of transportation planning models such as user unfriendliness, labor intensiveness, and theoretical limitations. Specially, this paper focuses on the issue of incompatiblity between GIS and the conventional transportation planning models in dealing with network topologies. Resolving this conflict in topologies is a conerstone for eliminating the user-unfriendliness and labor-intensiveness issues. This paper presents the development of an algorithm that converts GIS topology into transportation network topology. The FORTRAN-based topology conversion algorithm generates transportation networks from the GIS cartographic file and establishes a communication charmel between the two systems.

  • PDF