• Title/Summary/Keyword: competitive protocol

Search Result 48, Processing Time 0.026 seconds

Implementation of the Environment for Mobile HMI Communication Settings Based on QR Code

  • Kim, Jong-Joo;Kim, Jae-Woong;Park, Seong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.139-145
    • /
    • 2022
  • As products that consumers want become more diverse, the types of automation equipment are becoming more diverse and advanced to produce competitive products. In general, equipment is manufactured with built-in interface devices (HMI) for users so that operators can efficiently monitor and operate equipment quickly. Because HMI devices are connected to various industrial controllers, elements such as communication protocols of various controllers must be understood and set up in the design stage. Non-experts not only have difficulty choosing compatible items among various protocols, but also have limitations in integrating and operating on one device because screens and settings are statically assigned. This paper proposes a model that can scan information such as equipment ID and communication protocol with QR code using a mobile device, access industrial controller, and remotely operate the displayed equipment screen. The proposed model is expected to increase efficiency in inspection and management of automated equipment as it can easily set, monitor, and operate the communication environment of various automated equipment using one mobile device.

A Study on the Curriculum of Department Security Secretarial Programs in Korea University (국내 대학 경호비서학과의 교육과정 특성에 관한 연구 - 4년제 대학을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.1-21
    • /
    • 2007
  • This study aims to analysis and measure on the curriculum of security programs in Korean university as the private security system. Civil security demand social safety life by the police protection and private security system. The private security or the civil guards shows rapid growth by the social development and improve the quality of life. But the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. Then the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyze current situation of civil body and security guard training industry and to seek an educational model. For that, we examine in 'Do the professional training organizations meet social demand for the body and security guards'? And, 'What kind of training has to be provide for the body and security guards'? and 'What the qualifications of the trainers'? Then, 'What are the differences in training courses between private organizations and universities'? 'Is there differences in the job placement among the trainers of private organizations and universities'? etc.. Conclusion, the social demand common curriculum for the body and security guard will be drawn from the analysis of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. Then we have to a standard curriculum for the successful training education system to provide social security.

  • PDF

Using Choice-Based Conjoint Analysis in the China Market of Imported Beer (선택형 컨조인트 분석을 이용한 중국 수입맥주 시장에 관한 연구)

  • Gao, Zhihua;Wu, Zhangjian;Gao, Feng;Zhang, Jun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.57-64
    • /
    • 2018
  • Purpose - With the rapid economic development, great changes have happened in the Chinese beer market. The scale of imported beer is increasing. However, the sales of native Chinese beer decrease in recent years. It is because more Chinese customers prefer beer with unique attributes than those with lower prices. In order to take an advantage in this market, practitioners should develop new products to satisfy Chinese customers. Scholars have also focused on beer characteristics to estimate consumers' behavior for improving the development of beer industry. However, most studies are theoretically centered on marketing strategy management or general understanding of the market. It is not enough for us to explain customers' consumption patterns. Some empirical research did attempt to find out beer attributes that may influence their choice behavior. However, they failed to verify what can increase customers' utility through a new product. More importantly, few evidences can be found in the literature. Therefore this study explores the major characteristics of imported beer which may associate with customers' preferences. Research design, data, and methodology - With the results of literature review and focus group interview, we found out four main imported beer attributes and the levels of each factor. A pre-test is constructed to check the problems in the questionnaire protocol. With the results of pre-test, the revised questionnaire is processed among customers who have purchased and had imported beer in China regions such as Beijing, Shanghai, Jiangsu, Guangdong and so on. The choice-based conjoint analysis is applied to analyze the useful data of 205. Results - Results indicate that choice-based conjoint analysis is the effective method to estimate customers' choice behavior. Results also indicate that country of origin, price, taste, and package affect customers' preference and the importances of imported beer attributes are significantly different. Conclusions - Country of origin, price, taste, and package are important for customers to make an imported beer choice decision. Marketers should consider these determinants and their importance to develop new products. Moreover, choice-based conjoint analysis should be the useful method for practitioners to develop a new product of imported beer for sustainable business in the competitive industry.

Grope for a Scholarly identity by Comparative Analysis in curriculum of Department of the Security and Secretary Studies ("경호학과"와 "경호비서학과"의 교육과정 비교.분석을 통한 경호비서의 정체성 모색)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.1-18
    • /
    • 2009
  • Recently the demand for civil protection and security guards shows rapid growth by the social development and improve the quality of life. However the supply and education system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. However, the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. Therefore, the purpose of this article is to analyse current situation of curriculum on security guard training at the universities related to this department, and to seek an educational model for this area. For that, the following questions will be examined. First, Do the professional training organizations meet social demand for the body and security guards? Second, What kind of training has to be provide for the body and security guards? and what the qualifications of the trainers? Then, what are the differences in training courses between private organizations and universities? Is there differences in the job placement among the trainers of private organizations and universities? etc.. In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. For the scholarly identity to the security and secretary studies is th following on the core curriculum, then the university curriculum is very important for that. It is need to arrange the curriculum that is actually current at College or University for the suggestions on scholarly identity and development of the security and secretary studies.

  • PDF

Market Definition and System Analysis of Paid Broadcasting Services (유료방송서비스의 시장 획정과 제도 분석)

  • Lee, Suil
    • KDI Journal of Economic Policy
    • /
    • v.32 no.3
    • /
    • pp.101-137
    • /
    • 2010
  • This paper defines markets relating to each paid broadcasting service by applying the test method of critical sales loss to the results of survey to the paid service subscribers. The result confirms the existence of a meaningful competitive relationship--in terms of the Competition Law--among all paid broadcasting services included in this study, or at least analog cable broadcasting, digital cable broadcasting, and real time IPTV(Internet Protocol TV) service. This indicates that current regulations which are being applied to cable TV, satellite broadcasting, and IPTV are actually discriminatory. Based on these analysis results, this paper suggests that the main attention for the improvement of regulations should be focused on regulations which are differently applied to different paid service providers. In particular, Article 20 in the Internet Multimedia Broadcasting Law is interpreted as defining the real-time IPTV as an independent market, thereby having leeway to harm fair competition among different paid service providers. Therefore, that article needs to change to give the right of equal access to contents to all the competing paid service providers. Furthermore, to put teeth in the contents equal access rule, most popular pay channels need to be designated as target contents of the rule. As for the market-share limitation regulations, the paper suggests that an upper limit on the market share should be set based on the total number of subscribers of all the competing paid services and the same limit applied to all the competing paid service providers.

  • PDF

Multiple Case Analysis Study on Business Model Types and Components of Startups: Focusing on Leading Overseas Smart Farm Companies (스타트업의 비즈니스 모델 유형 및 구성요소에 대한 다중 사례 분석 연구: 해외 스마트팜 선도기업을 중심으로)

  • Ahn, Mun Hyoung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.6
    • /
    • pp.41-55
    • /
    • 2023
  • In order to secure sustainable competitiveness of startups, business model innovation is an important task to achieve competitive advantage by transforming the various elements that make up the business model. This study conducted a multi-case analysis study on leading smart farm companies around the world using an analysis framework based on business model theory. Through this, we sought to identify business model types and their constituent elements. For this, 19 companies were selected from the list of top 10 investment startups of the year for the past three years published by Agfunder, a global investment research company specializing in AgTech. Then data collection and analysis of the company cases were conducted according to the case study protocol. As a result of the study, the business model types were analyzed into four types: large-scale centralized production model, medium-to-large local distributed production model, small-scale hyperlocal modular FaaS model, and small-scale hyperlocal turnkey solution supply model. A comparative analysis was conducted on five business model components for each type, and strategic implications were derived through this. This study is expected to contribute to improving the competitiveness of domestic smart farm startups and diversifying their strategies by identifying the business models of overseas leading companies in the smart farm field using an academic analysis framework.

  • PDF

Studies on the Efficient Embryo Transfer Methods using Inbred Embryos in Generation of Transgenic Mice (Inbred 마우스 수정란을 이용한 형질전환마우스 생산에 있어서의 효과적인 수정란 이식 방법에 관한 연구)

  • Wang A. G;Kim, S. U.;Y. H. Han;Kim, S. K.;D. Y. Yu
    • Korean Journal of Animal Reproduction
    • /
    • v.27 no.1
    • /
    • pp.69-75
    • /
    • 2003
  • The objective of this study is to improve the efficiency of embryo transfer in generation of transgenic mice using inbred mouse (C57BL/6J) embryos. The embryos of C57BL/6J and BCF1 mice were superovulated by the standard protocol. One-cell stage of embryos were microinjected and the resulted one-or two-cell were transferred into one-or two-side oviducts of foster mother, respectively. When one-cell stage of embryos were transferred into one-side oviduct of 0.75 d.p.c. foster mother, the results were not ideal because of showing pregnancy ratios of 68.8$\pm$7.83% for C57BL/6J and 48.3$\pm$14.22% for BCF1, and development ratios of pups vs transferred embryos of 11.9$\pm$5.51% for C57BL/6J and 10.5$\pm$8.03% fur BCF1 . However, when two-cell stage of embryos were transferred into two-side oviducts of 0.5 d.p.c. foster mother, we got better results of 94.4$\pm$9.64% and 100$\pm$0% pregnancy ratio, and 22.1$\pm$0.4% and 21.8$\pm$0.38% development ratio for C57BL/6J and BCF1, respectively. Therefore, transferring two-cell stage of C57BL/6J embryos into two-side oviducts of 0.5 d.p.c. foster mother may be competitive to the result in BCF1 embryos. Even if there are a lot of other factors affecting these results, we conclude from these experiments that transfer of two-cell embryos into two-side oviducts of 0.5 d.p.c. foster mother is a more efficient and safe method than others in generating transgenic mice using inbred mice embryos.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.