• Title/Summary/Keyword: Shared Resource

Search Result 255, Processing Time 0.026 seconds

A Study on the Characteristics and Social Values of Vegan Fashion in H&M and Zara

  • Seo, Kyoungah;Suh, Seunghee
    • Journal of Fashion Business
    • /
    • v.23 no.6
    • /
    • pp.86-100
    • /
    • 2019
  • This study analyzed the characteristics of vegan fashion produced by H&M and ZARA with respect to materials, design, development, production, and marketing to create social value. The results of this study are significant because they can be used as a reference to develop a vegan fashion market. Regarding the research method, this study assessed the concept and status of veganism through a literature review and examined vegan fashion case studies by analyzing official websites and media content. The study's scope covers the period from 2005, when H&M was the first SPA brand to create a vegan product line, until 2019. The characteristics of Global SPA's vegan fashion were as follows. Regarding materials, alternative materials were developed and an expanded use of organic materials was implemented. Regarding design, development was achieved through design collaboration and upcycling. In terms of production, an animal welfare policy was adopted and a sustainable supply chain was established. Marketing employed a campaign aimed at encouraging increased consumer participation. The findings regarding the social value of H&M and Zara's vegan fashion were as follows. First, a cyclical economy was realized through circular recycling in the entire process of resource selection, production, and waste disposal. Second, because product consumption indicated the importance of ethical consumption and sustainable consumer participation, corporate financial activities were created based on shared values to accomplish the social outcome. Third, collaborations with luxury brands or vegan fashion designers built a collaborative ecosystem in which vegan fashions were released and consumer participation campaigns were implemented.

Introduction To A New Created Scientific Disciline: Management Of allSelves' Enlightenment and Empowerment(MOSEE) with 5th Dimension Spirit Paradigm shift will conciliate the modern Management Philosophies (1st Issue)-CSV (새 학문 창시 소개함: 깨달음경영학의 5차원 의식(영성) 철학을 통한 현대 경영철학들의 통섭 고찰(1회)-공유가치론(CSV)-)

  • Rhee, Jaeyoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2018.05a
    • /
    • pp.57-58
    • /
    • 2018
  • 자본주의가 인류사회의 행복과 공동번영에 기여하는 경제체제로서 역할을 다하려면, 자본주의 역시 시대의 변화에 맞추어 진화해야 한다. 본 논문에서는 새 시대에 걸 맞는 자본주의의 대안을 논의하고자, 저자 이재윤이 창시한 깨달음경영학(MOSEE; Management Of allSelves' Enlightenment and Empowerment)의 새로운 과학적 학문연구를 통해 새로운 실현성 영역을 추구하는 동시에, 깨달음경영의 새로운 5차원 요소인 영적 자원 및 자산(SRA: Spirit Resource and Asset)과 본질적으로 무(無)에서 유(有)를 창조하는 창조경영(MOC: Management Of Creation)에 대한 연구 및 인간의식 성장 방법론에 대하여 발표 하고자 한다. 따라서 깨달음경영학(MOSEE)에 관한 고유한 철학, 고유한 탐구 영역, 이론, 방법, 기법, 도구, 운영 원리 및 활용 분야 등을 체계적으로 설명하는 것이 목적이다. 이로써 현대의 주요한 여러 경영철학들 예컨대 CSV(마이클 포터) SI(개리 함멜) 복잡계 철학 미덕(美德)경영 등의 내재된 구조적 제약들을 분석 평가하고 한계를 극복하는 방안들을 제시함으로써 이들을 5차원의 깨달음경영학(MOSEE)의 의식(영성)경영철학으로써 통섭을 고찰하고 21세기 우주 인류 신문명 창달을 위한 5차원의 깨달음경영 혁명을 성취하고자 한다. 즉 2040년 전에 지구 인류의 고도 영성 초 과학기술 문명을 넘어서 우주 인류의 초 영성 초 과학기술 문명 창달을 선도하는 학문연구 교육 인류 사회활동을 지속적으로 해갈 것이다. 위와 같이 21세기 우주 인류의 영원한 평화 자유 지속적 번영을 이루고자 한다. 본 연구는 통섭 고찰 제1회로 마이클 포토의 공유가치(CSV: Creating Shared Value)의 통섭을 고찰한다.

  • PDF

An Improvement of the Schedulability Condition in Dynamic Priority Ceiling Protocol (동적 우선순위 상한 프로토콜의 스케줄링 가능성 조건 개선)

  • O, Seong-Heun;Yang, Seung-Min
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.11
    • /
    • pp.573-580
    • /
    • 2001
  • When tasks access shared resources in real-time systems, the unbounded priority inversion may occur. In such cases it is impossible to guarantee the schedulability of real-time tasks. Several resource access protocols have been proposed to bound the duration of priority inversion and sufficient conditions are given to guarantee the schedulability of periodic task set. In this paper, we show an improved sufficient condition for schedulability when the dynamic priority ceiling protocol is used. Our approach exploits the fact that a lower priority task can continue to execute as far as the higher priority tasks do not miss their deadlines. This permitting execution time of the higher priority tasks for a lower priority task can be excluded from the worst-case blocking time of the higher priority tasks. Since the worst-case blocking time of tasks can be reduced, the sufficient condition for schedulability of dynamic priority ceiling protocol becomes further tight.

  • PDF

Database Workload Analysis : An Empirical Study (데이타베이스 워크로드 분석 : 실험적 연구)

  • Oh, Jeong-Seok;Lee, Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.747-754
    • /
    • 2004
  • Database administrators should be aware of performance characteristics of database systems in order to manage database system effectively. The usages of system resources in database systems could be quite different under database workloads. The objective of this paper is to identify and analyze performance characteristics of database systems in different workloads, which could help database tuners tune database systems Under the TPC-C and TPC-W workloads, which represent typical workloads of online transaction processing and electronic commerce respectively, we investigated usage types of resource that are determined by fourteen performance indicator, and are behaved in response to changes of four tuning parameters (data buffer, private memory, I/O process, shared memory). Eight out of the fourteen performance indicators cleary show the performance differences under the workloads. Changes of data buffer parameter give a influences to database system. The tuning parameter that affects the system performance significantly is the database buffer size in the both workloads.

An Efficient Management and Sliding Window Query for Real-Time Stream Data to Require frequent Update (빈번한 변경을 요구하는 실시간 스트림 데이터의 효율적 관리 및 슬라이딩 윈도우 질의)

  • Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.509-516
    • /
    • 2008
  • Recently, the operator modules to control external devices are concerned about automatic management system to process continuously changed signals. These signals are the stream data of which characteristics are several numbers. a short report interval and asynchronous report time. It is necessary that the system brings about high accuracy and real time process for stream data. The typical queries of these systems consist of the current query to search the latest signal value, the snapshot query at a past time, the sliding window query from a past time to current. In this paper, we propose the efficient method to manage the above signals by using a file structured database in small-size operating systems. We also propose a query model to accommodate various queries including the sliding window query. The file database in the QNX adopts a delta version and a shared memory buffering method for the resource limit of a small storage and a low computing power.

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Failure characteristics and mechanical mechanism of study on red sandstone with combined defects

  • Chen, Bing;Xia, Zhiguo;Xu, Yadong;Liu, Shuai;Liu, Xingzong
    • Geomechanics and Engineering
    • /
    • v.24 no.2
    • /
    • pp.179-191
    • /
    • 2021
  • In this study, the strength and failure mechanism of red sandstones with combined defects were investigated by uniaxial compression tests on red sandstones with different crack angles using two-dimensional particle flow code numerical software, and their mechanical parameters and failure process were studied and analyzed. The results showed that the mechanical characteristics such as peak strength, peak strain, and elastic modulus of the samples with prefabricated combined defects were significantly inferior than those of the intact samples. With increasing crack angle from 15° to 60°, the weakening area of cracks increased, elastic modulus, peak strength, and peak strain gradually reduced, the total number of cracks increased, and more strain energy was released. In addition, the samples underwent initial brittle failure to plastic failure stage, and the failure form was more significant, leading to peeling phenomenon. However, with increasing crack angle from 75° to 90°, the crack-hole combination shared the stress concentration at the tip of the crack-crack combination, resulted in a gradual increase in elastic modulus, peak strain and peak strength, but a decrease in the number of total cracks, the release of strain energy reduced, the plastic failure state weakened, and the spalling phenomenon slowed down. On this basis, the samples with 30° and 45° crack-crack combination were selected for further experimental investigation. Through comparative analysis between the experimental and simulation results, the failure strength and final failure mode with cracks propagation of samples were found to be relatively similar.

Design of an Efficient AES-ARIA Processor using Resource Sharing Technique (자원 공유기법을 이용한 AES-ARIA 연산기의 효율적인 설계)

  • Koo, Bon-Seok;Ryu, Gwon-Ho;Chang, Tae-Joo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.39-49
    • /
    • 2008
  • AEA and ARIA are next generation standard block cipher of US and Korea, respectively, and these algorithms are used in various fields including smart cards, electronic passport, and etc. This paper addresses the first efficient unified hardware architecture of AES and ARIA, and shows the implementation results with 0.25um CMOS library. We designed shared S-boxes based on composite filed arithmetic for both algorithms, and also extracted common terms of the permutation matrices of both algorithms. With the $0.25-{\mu}m$ CMOS technology, our processor occupies 19,056 gate counts which is 32% decreased size from discrete implementations, and it uses 11 clock cycles and 16 cycles for AES and ARIA encryption, which shows 720 and 1,047 Mbps, respectively.

A New Recovery Method to Privide Diverse Service Demands for Loss Sensitive Medical Data on IP over WDM Networks (IP over WDM 네트워크에서 손실에 민감한 의료 데이터를 위한 다양한 서비스 요구사항을 만족하는 새로운 복구 방법)

  • Lee, Yonggyu
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.377-388
    • /
    • 2022
  • Various researches are actively studied to satisfy exponentially increasing the usage of the Internet as well as the diverse service demands. Especially the Optical Internet that delivers several Tbps through a single optical fiber requires the intelligence to satisfy the various types of survivability requirements. In the paper, a novel recovery scheme that satisfies the various restoration demands in IP over WDM networks is proposed. The scheme classifies the restoration services into three classes and applies dedicated protection and shared restoration scheme with different priorities for each class. Also, a configuration scheme for information database to support the scheme is proposed. This scheme satisfies the different degree of restoration demands in terms of restoration time, blocking rate and resource usage. With the scheme, medical data can be transmitted without loss.

A Design and Implementation of The Deep Learning-Based Senior Care Service Application Using AI Speaker

  • Mun Seop Yun;Sang Hyuk Yoon;Ki Won Lee;Se Hoon Kim;Min Woo Lee;Ho-Young Kwak;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.23-30
    • /
    • 2024
  • In this paper, we propose a deep learning-based personalized senior care service application. The proposed application uses Speech to Text technology to convert the user's speech into text and uses it as input to Autogen, an interactive multi-agent large-scale language model developed by Microsoft, for user convenience. Autogen uses data from previous conversations between the senior and ChatBot to understand the other user's intent and respond to the response, and then uses a back-end agent to create a wish list, a shared calendar, and a greeting message with the other user's voice through a deep learning model for voice cloning. Additionally, the application can perform home IoT services with SKT's AI speaker (NUGU). The proposed application is expected to contribute to future AI-based senior care technology.