• Title/Summary/Keyword: Service System

Search Result 18,891, Processing Time 0.046 seconds

The Effect of Perception of Creating Shared Value (CSV) Activity on Job Satisfaction of Non-permanent (Part-time) Employees: Analysis of the Mediating Effect of Organizational Commitment and the Moderating Effect of Self-Efficacy (기업의 CSV활동 인식이 비정규직 근로자의 직무만족에 미치는 영향 : 조직몰입의 매개효과와 자기효능감의 조절효과를 중심으로)

  • Min, Heekyung-Jo;Yoo, Tae-Seob;Oh, Sang-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.612-634
    • /
    • 2018
  • This research examines the effect of perception of creating shared value (CSV) activity on the organizational commitment and job satisfaction of non-permanent (part-time) employees in order to understand the importance of CSV. In order to accomplish this study, 559 questionnaires were used for final analysis. SPSS 25.0 was used for statistical analysis. The analysis revealed that perception of corporate CSV activity had a positive effect on job satisfaction of non-permanent(part-time) employees. In particular, it had a positive effect on the relationships between the perception of CSV activity and organizational commitment, as well as organizational commitment and job satisfaction. The mediating effect of organizational commitment and the moderating effect of self-efficacy also had a positive effect. The implication of this study is that the perception of corporate CSV activity plays a crucial role in the current service landscape. Therefore, it is recommended that companies conduct a range of CSV activities and create an inclusive system and organizational culture that encourages active participation of non-permanent employees.

An Advanced User-friendly Wireless Smart System for Vehicle Safety Monitoring and Accident Prevention (차량 안전 모니터링 및 사고 예방을 위한 친사용자 환경의 첨단 무선 스마트 시스템)

  • Oh, Se-Bin;Chung, Yeon-Ho;Kim, Jong-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1898-1905
    • /
    • 2012
  • This paper presents an On-board Smart Device (OSD) for moving vehicle, based on a smooth integration of Android-based devices and a Micro-control Unit (MCU). The MCU is used for the acquisition and transmission of various vehicle-borne data. The OSD has threefold functions: Record, Report and Alarm. Based on these RRA functions, the OSD is basically a safety and convenience oriented smart device, where it facilitates alert services such as accident report and rescue as well as alarm for the status of vehicle. In addition, voice activated interface is developed for the convenience of users. Vehicle data can also be uploaded to a remote server for further access and data manipulation. Therefore, unlike conventional blackboxes, the developed OSD lends itself to a user-friendly smart device for vehicle safety: It basically stores monitoring images in driving plus vehicle data collection. Also, it reports on accident and enables subsequent rescue operation. The developed OSD can thus be considered an essential safety smart device equipped with comprehensive wireless data service, image transfer and voice activated interface.

A research paper for e-government's role for public Big Data application (공공의 빅데이터 활용을 위한 전자정부 역할 연구)

  • Bae, Yong-guen;Cho, Young-Ju;Choung, Young-chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2176-2183
    • /
    • 2017
  • The value of Big-Data which is a main factor of the fourth Industrial Revolution enhances industrial productivity in private sector and provides administrative services for nations and corporates in public sector. ICT-developed countries are coming up with Big-Data application in public sector rapidly. Especially, when it comes to social crisis management, they are equipped with pre-forcasting system. Korean Government also emphasizes Big-Data application in public sector for the social crisis management. But the reality where the overall infrastructure vulnerability reveals requires preparation and operation of measurement for social problems. Accordingly, we need to analyze Big-Data application problem and benchmark the precedented cases, thereby, direct policy diversity. Hence, this paper proposes the roles and rules of E-government analyzing problems from Big-Data application. The following policy proposes open Information and legal&institutional improvement, Big-Data service considerations threatening privacy issues in Big-Data ecosystem, necessity of operational and analytical technology for Big-Data and related technology in technical implication of Big-Data.

Sharing of DLNA Media Contents among Inter-homes based on DHCP or Private IP using Homeserver (동적 사설 IP 기반의 다중 홈간 DLNA 미디어 컨텐츠 공유)

  • Oh, Yeon-Joo;Lee, Hoon-Ki;Kim, Jung-Tae;Paik, Eui-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.709-716
    • /
    • 2006
  • According to the increase of various AV media devices and contents in the digital home, the DLNA becomes to play an important role as the interoperability standard between then Since this guideline only focuses on the interoperability among home networked devices, media players, and media contents existing inside of the homenetwork, there is no retrieval and transmission method for sharing multimedia contents located over several homes via Internet. Additionally, this guideline lets device-detection and notification messages to be transmitted using W multicast methods, and current Internet environment cannot guarantee consistent IP multicast services, it has the limitation that it cannot retrieve and control DLNA devices in other digital homes remotely via the Internet. Therefore, in this paper, we propose the IHM(Inter-Home Media) proxy system and its operating mechanism to provide a way of sharing media contents distributed over multiple DLNA-based homes, through analyzing these limitations and building up a sharing method for A/V media contents distributed over the DLNA homes based on the dynamic or private IP networks. Our method removes the limitation on the user locations through sharing distributed media contents, and also makes cost-downs for storing media contents, from the view point of individual residents.

Implementation of Uncertainty Processor for Tracking Vehicle Trajectory (차량 궤적 추적을 위한 불확실성 처리기 구현)

  • Kim, Jin-Suk;Kim, Dong-Ho;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1167-1176
    • /
    • 2004
  • Along the advent of Internet technology, the computing environment has been considerably changed in many application domains. Especially, a lot of researches for e-Logistics have been done for the last 3 years. The e-Logistics means the virtual business activity and service architecture among the logistics companies based on the Internet technology. To construct effectively the e-Logistics framework, researches on the development of the Moving Object Technology(MOT) including GPS and GIS with spatiotemporal databases technique so far has been done The Moving Object Technology stands for the efficient management for the spatiotemporal objects such as vehicles, airplanes, and vessels which change continuously their spatial location along with time flows. However, most systems manage just only the location information detected lately by many reasons so that the uncertainty processing for the past and future location of the moving objects is still very hard. In this paper, we propose the moving object uncertainty model and system design for e-Logistics applications. The MOMS architecture in e-Logistics is suggested and the detailed explain of sub-systems including the uncertainty processor of moving objects is described. We also explain the comprehensive examples of MOMS and uncertainty processing in Delivery Parcel Application that is one of major application of e-Logistics domain.

Design of a Real-Time Certificate Status Validation Mechanism Using Identity Information Hash Value of Signer (서명자의 신원정보 해쉬값을 이용한 실시간 인증서 상태 검증 메커니즘의 설계)

  • Kim Hyun-Chul;Kim Jung-Jae;Lee Jong-Hee;Oh Hae-Seok;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.147-154
    • /
    • 2006
  • The certificate status validation mechanism is a critical component of a public key infrastructure based on certificate system. The most generally mechanisms used these days are the use of the certificate revocation list and the real-time certificate status protocol. But the certificate revocation list can not give the real-time certificate status because the certificate is being delivered periodically, and the real-time certificate status protocol method will generate a concentrated load to the server because the protocol in the central server will be accessed whenever a certification is necessary. It will also take a long time to validate the certificate because each trade has to send mass information through the network. This paper will present that real-time validation is guaranteed as the real-time certificate status protocol method and the traffic congestion in the network Is reduced in a way that the certification would be requested using the user information hash value and would be validated using the user information kept in the certification authorities and the service providers. Based on the this study, we suggest a real-time certificate status validation mechanism which can reduce the certificate status validation time using the signed user information hash value. And we confirm speed of certificate status verification faster than existing CRL(Certificate Revocation List) and OCSP(Online Certificate Status Protocol) method by test.

Performance Analysis of Peer Aware Communications with CSMA/CA Based on Overhearing (Overhearing을 적용한 CSMA/CA 기반 대상인식통신 성능 분석)

  • Lee, Jewon;Ahn, Jae Min;Lee, Keunhyung;Park, Tae-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.251-259
    • /
    • 2014
  • In this paper, we propose Low Energy Service Discovery (LESD) protocol for common discovery mode of IEEE 802.15.8 Peer Aware Communications (PAC). In order to minimize power consumption, Basic Repetition Block (BRB) is defined. Device is able to select operating mode and synchronize other devices through it. Proposed MAC procedure is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based on overhearing technique. Even if device has not been received response signal since transmitted request signal, it is able to discover other devices of same group through the overhearing technique. IEEE 802.15.8 PAC has required that performances of common discovery mode are presented about discovered devices during the simulation time, discovery latency and average power consumption. By considering the number of devices per group and channel environment, two scenarios are evaluated through system level simulation and the simulation results of proposed scheme are compared with CSMA/CA in same simulation conditions. As a result, proposed scheme is able to get high energy efficiency of devices as well as increase the number of discovered devices during simulation time when the longer the number of devices is distributed over a limited area.

Development of a technology valuation method for buyers in technology transfer (기술이전을 위한 기술수요자 중심의 가치평가 방법론 개발)

  • Yun, DooSeob;Park, Inchae;Yoon, Byungun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.155-167
    • /
    • 2016
  • Technology valuation is necessary for determining the feasibility of technology commercialization. However, existing methods focus only on technology evaluation, with limitation in sufficiently reflecting buyer viewpoint. In addition, it causes a gap between estimated value and market value. Therefore, this research suggests a new technology valuation method which focuses on the perspectives of buyers. Technology factors, buyer factors and market factors are first determined and their relationships are analyzed. Second, based on the relationships, profit projections are calculated using the discount cash flow method. Finally, profit projections for each year are discounted. The proposed method was applied using the ubiquitous home network system and audio service and illumination control method and results compared with the value of a technology valuation guide distributed by the Ministry of Trade, Industry and Energy. The technology valuation approach used in this research is quantitative and systematic and can be used as a decision making support tool in technology transfer, reflecting various perspectives of stakeholders.

An Energy Consumption Model using Two-Tier Clustering in Mobile Sensor Networks (모바일 센서 네트워크에서 2계층 클러스터링을 이용한 에너지 소비 모델)

  • Kim, Jin-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.9-16
    • /
    • 2016
  • Wireless sensor networks (WSN) are composed of sensor nodes and a base station. The sensor nodes deploy a non-accessible area, receive critical information, and transmit it to the base station. The information received is applied to real-time monitoring, distribution, medical service, etc.. Recently, the WSN was extended to mobile wireless sensor networks (MWSN). The MWSN has been applied to wild animal tracking, marine ecology, etc.. The important issues are mobility and energy consumption in MWSN. Because of the limited energy of the sensor nodes, the energy consumption for data transmission affects the lifetime of the network. Therefore, efficient data transmission from the sensor nodes to the base station is necessary for sensing data. This paper, proposes an energy consumption model using two-tier clustering in mobile sensor networks (TTCM). This method divides the entire network into two layers. The mobility problem was considered, whole energy consumption was decreased and clustering methods of recent researches were analyzed for the proposed energy consumption model. Through analysis and simulation, the proposed TTCM was found to be better than the previous clustering method in mobile sensor networks at point of the network energy efficiency.

Effect of Cognitive Behavioral Therapy (CBT) for Perinatal Depression: A Systematic Review and Meta-Analysis (산전우울 임부를 위한 인지행동치료 프로그램의 효과: 체계적 문헌고찰 및 메타분석)

  • Shin, Hyeon-Hee;Shin, Yeong-Hee;Kim, Ga-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.271-284
    • /
    • 2016
  • This study was carried out to evaluate the efficacy of CBT for perinatal depression through systematic literature review and meta-analysis. The following databases were used to search the literature: CINAHL, PubMed, EMBASE, Koreamed, Library of Korean Congress, KISS, and Korean Academic Publication Database. Keywords included 'perinatal depression,' 'pregnant women,' and 'cognitive behavioral therapy,' and the evaluated articles were published up to May 2016. Using the R program, the effect size of perinatal depression and anxiety were calculated by random-effects model. The heterogeneity of the effect size was analyzed by data moderator analysis using the meta-ANOVA. Furthermore, the funnel plot, Egger's regression test, fail-safe N, trim-and-fill test, and publication bias analysis were conducted and used to verify the results. Out of the 180 selected articles, 16 clinical trial studies were meta-analyzed. Each articles were evaluated for the risk of bias by the checklist of SIGN; the overall risk of bias was low. The effect size of CBT for perinatal depression was Hedges' g=-0.55 (95% CI: -0.76~-0.33), which was a moderate level, while for anxiety reduction, Hedges' g=-0.20 (95% CI: -0.48~-0.08) and it was not statistically significant. Heterogeneity or risk of publication bias were low. This meta-analytic study found that CBT is moderately effective in reducing perinatal depression in pregnant women.