• Title/Summary/Keyword: Vendors

Search Result 466, Processing Time 0.026 seconds

Fashion technical design education models applying the constructivism learning theory (구성주의 학습이론을 적용한 패션 테크니컬 디자인 교육 모형)

  • Im, Min-Jung
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.21 no.1
    • /
    • pp.115-129
    • /
    • 2019
  • This study aimed to develop methods for technical design education that can be intimately connected to the industrial field. For this, technical design jobs performed in the fields of the domestic and foreign fashion industries and their required competences were examined, and educational methods based on constructivism were proposed. Korean fashion technical designers' works were identified, and then the fashion technical designer's responsibilities and qualifications were collected and analyzed from global employment sites. On the basis of the collection and analysis, hands-on staff members and education experts were interviewed about required competences for the actual business and possible suitable methods for education. The results of research showed that in the case of the US, job systems and relevant duties for technical designers were clearly defined by clothing brands, whereas in Korea, businesses were systematized around vendors, not brands, and as a result the businesses of technical package composition and specification proposals were not performed properly. This study organized the contents of technical design education into fit development and specification, the composition of technical design packages, the evaluation and approval of samples, fit schedule management and fitting, block pattern setting and pattern correction, sewing specifications appropriate for styles and materials, grading, technical terms, and production management. As for the technical design education models, the cognitive apprenticeship model, resource-based learning, the problem-based and anchored model, and the problem-based and resource-based models were proposed.

Factors for the Intra-organizational Diffusion of Big Data Systems (조직 내 빅데이터 시스템 확산에 영향을 주는 요인에 대한 연구)

  • Park, Seungkwan;Kim, Cheong
    • Journal of Information Technology Services
    • /
    • v.18 no.2
    • /
    • pp.97-121
    • /
    • 2019
  • In this paper, factors affecting intra-organizational diffusion of Big Data systems from the perspective of the Big Data system vendors have been analyzed. In particular, the theory of resistance against innovation that exists in some form before the adoption or rejection of innovation has been focused on. In order to do that, the resistance has been divided into three categories : postponement, rejection and opposition. The variables affecting each type are also divided into four independent variables : perceived risk, innovation characteristics, user attributes, and organizational attributes. As a result of the survey, it was confirmed that the influences of each variable are different according to the type of resistance. As the strength of the resistance was increased, the influence of the trialability was increased as well. As the strength of the resistance was decreased, the satisfaction with the existing system became more influential on the resistance. The time risk and the satisfaction with the existing system were found to affect all types of resistance. From the vendor's point of view, strategic implications are presented in terms of marketing or system development for diffusion, depending on the degree of resistance of the adopter.

A Study on the Holiday Effect of Purchase Interval of Mobile Phone in Chinese Online B2C Market

  • Kwak, Youngsik;Hong, Jaewon;Nam, Yongsik;Nam, Yoonjung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.205-210
    • /
    • 2019
  • The purpose of this study is to demonstrate empirically whether replacement intervals of mobile phones sold in China online B2C are influenced by purchase points such as holidays. If there is a holiday effect, it is expected that the product replacement interval or interpurchase interval will be short compared to the usual one at holiday time. In order to verify this positively, at TMall, one of the largest B2C sites in China, we explored 5,132 replacement cycle intervals and the point of purchase at which one of the sales records of an agent dealing with all multinational mobile phones had minimum two purchase records. As a result, there was a buyer who had shorter replacement period than usual in holiday season. There was no statistically significant difference in the intervals of interchange between holidays. Based on the results, it was found that the mobile phone vendors were aware that purchasing was occurring due to the holiday.

A Study on the Effect of Internal Green SCM Implementation on External Green SCM Implementation and Performance of Korean Manufacturing Firms (내부 그린SCM실행이 외부 그린SCM실행과 국내 제조기업의 성과에 미치는 영향에 관한 연구)

  • Yoon, Seok-Kyu;Lee, Moon-Su;Jang, Ik-Geun
    • Journal of the Korean Institute of Plant Engineering
    • /
    • v.23 no.4
    • /
    • pp.5-19
    • /
    • 2018
  • Recently, utilizing the supply chain among companies, major companies support their sub-vendors to establish an environmental management system and transfer the clean production technology(know-how) to them for strengthening of environmental competitiveness. Thus, Green Supply Chain Management(GSCM) became a key successful factor for companies to be environmentally sustainable. This research endeavors to identify the relationship among the inside and outside GSCM implementation activities of Korean manufacturing companies and their financial, operational and environmental performances. Based on a the review of previous research findings, twenty one hypotheses are developed and examined. Total 251 valid responses from 1,634 survey responses are identified and the structural equation models(SEM) are developed and analysed for examining our hypotheses. The result shows that inside GSCM has a positive effect on outside GSCM. Also, it reveals that companies' performances are more positively affected by inside GSCM than by outside GSCM.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

Study on Selftest Requirements in Cryptographic Module Validation Program with FIPS-OpenSSL Source Code Analysis (FIPS-OpenSSL 코드 분석을 통한 암호모듈 자가시험 보안요구사항 분석)

  • Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.985-996
    • /
    • 2019
  • This paper analyzes the source code of FIPS-OpenSSL cryptographic module approved as FIPS cryptographic module in USA and shows how the selftest requirements are implemented as software cryptographic library with respect to pre-operational test and conditional tests. Even though FIPS-OpenSSL follows FIPS 140-2 standard, lots of security requirements are similar between FIPS 140-2 and Korean cryptographic module validation standards. Therefore, analysis from this paper contributes to help Korean cryptographic module vendors develop correct and secure selftest functions on their own cryptographic modules, which results in reducing the test period.

Assignment-Change Optimization for the Problem of Bid Evaluation (입찰 평가 문제의 배정-변경 최적화)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.171-176
    • /
    • 2021
  • This paper deals with bid evaluation problem that chooses the vendors and quantity with minimum purchasing cost for bid information of setup cost and unit price. For this problem, the branch-and-bound(BB) and branch-and-cut(BC) methods are well-known. But these methods can be fail to obtain the optimal solution. This paper gets the initial feasible solution with procuring quantity assignment principle in accordance with the unit price or setup cost rank-first. Then procuring quantity moving optimization(vendor change) is execute take account of unit price or setup cost rank. As a result of experimentation, the propose algorithm is significantly lower compared to BB and BC.

Blockchain-based e-Agro Intelligent System

  • Srinivas, V. Sesha;Pompapathi, M.;Rao, G. Srinivasa;Chaitanya, Smt. M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.347-351
    • /
    • 2022
  • Farmers E-Market is a website that allows agricultural workers to direct market their products to buyers without the use of a middleman. That theory is blockchain system will be used by authors to accomplish this. The system, which is built on a public blockchain system, supports sustainability, shippers, and consumers. Farmers can keep track of their farming activities. Customers can review the product's history and track its journey through carriers to delivery after making a purchase. Farmers are encouraged to get information about their interests promptly in a blockchain-enabled system like this. This functionality is being used by small-scale farmers to form groups based on their location to attract large-scale customers, renegotiate farming techniques or volumes, and enter into contracts with buyers. The analysis shows the use of blockchain technology with a farmer's portal that keeps the video of trading data of crops, taking into account the qualities of blockchain such as values and create or transaction data. The proposal merges python as a programming language with a blockchain system to benefit farmers, vendors, and individuals by preserving transactions.

A Study on the Status of Work and Education of Modelists (모델리스트의 업무 및 교육 실태에 관한 연구)

  • Park, Sung Mi;Choi, Young Lim
    • Fashion & Textile Research Journal
    • /
    • v.24 no.2
    • /
    • pp.241-248
    • /
    • 2022
  • This study aims to provide basic data to suggest guidelines for re-education and work improvement of modelists based on the analysis of the current status of modelist work and education. A survey was conducted from January 4 to May 15, 2020, targeting 44 people working in pattern, pattern CAD, and grading in domestic apparel companies. Descriptive statistical analysis and frequency analysis using SPSS 25 were employed to analyze the status of work type, work difficulties, and re-education. For pattern production, the rate of using pattern CAD for business was high. It was found that companies mainly use YUKA CAD (63.8%), and branded companies use pattern CAD (100%). It was found that 3D CAD is mostly employed by vendors (88.9%), and CLO (90%) is mainly used. Regarding difficulties in pattern making, it was found that they experienced difficulties with stretchable materials owing to the amount of shrinkage and sagging of the fabric. The work problem was the lack of requisite working hours owing to the volume of work. Regarding future re-education, 63.6% of the total respondents indicated that they required a course related to pattern correction and material. Moreover, it was found that re-education was necessary to upgrade technology and acquire new knowledge, however, information on re-education was insufficient.

Firmware Fuzzing Method through Pseudo-HAL Identification (유사 HAL 함수 탐색을 통한 펌웨어 퍼징 기법)

  • Jeong, Seyeon;Hwang, Eunbi;Cho, Yeongpil;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1121-1125
    • /
    • 2022
  • HAL-Fuzz, a fuzzing technique to find firmware vulnerabilities, is efficient by using the HAL function of the hardware abstraction layer provided by MCU vendors. However, it cannot handle most firmware that unused the exact HAL function. In this paper, we propose a new method for identifying pseudo-HAL functions to increase the fuzzing availability of HAL-Fuzz. In experiments, we identified not only the HAL but also the pseudo-HAL functions, implemented by the developer, and that fuzzing is possible.