• Title/Summary/Keyword: information Offering

Search Result 835, Processing Time 0.027 seconds

Analysis of the Differences in the Technology Support Effect on ICT SMEs : From the Perspective of a Government-funded Research Institute (ICT 중소기업 유형별 기술지원 효과 차이분석: 출연(연) 중소기업 기술지원 프로그램을 중심으로)

  • Lee, Hyung-Ju;Lee, Yong-hun;Lee, Il-jin;Kim, Seo-kyun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2017
  • This study aim to analyze the differences of the technology support on ICT SMEs conducted by ETRI - a government funded research institute. To collect the data, 167 beneficiaries participated in the survey and we classified them as 3 groups using cluster analysis. Then, we conducted ANOVA to verifying the differences among 3 groups. Results show that companies belonging to the higher revenue size groups have a highly effective technical support, while companies belonging to the lower revenue size groups have a highly effective information offering.

A Design and Implementation of User Device Framework for Service Adapted Contents (적응화된 콘텐츠를 서비스하기 위한 사용자 단말기 프레임워크 설계 및 구현)

  • Kim, Jin-Sung;Lee, Jae-Dong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.801-808
    • /
    • 2009
  • According to development of internet and an increase in demand of multimedia contents, the contents industry is being developed. However, they are served same contents in the limited environment(user device environment, network environment) of the present contents industry. And users have difficulties in searching and finding contents since they are served contents they want and contents suitable to diverse context and affection. Therefore, it is necessary to make a system offering contents according to context and affection of users. The study proposes the system to offer contents suitable to context and affection of users whenever and wherever through diverse devices in a ubiquitous environment and designs/implementation a user device framework system that users can be offered contents suitable to their devices.

Communicating Conservation to the General Public:Conservation Gallery Exhibition at the Wallace Collection, London, UK (영국 월레스 컬렉션의 상설 보존 전시관 운영을 통해 본 보존과 일반 대중과의 교류)

  • Kim, Seoyoung
    • 보존과학연구
    • /
    • s.32
    • /
    • pp.185-193
    • /
    • 2011
  • The Wallace Collection in London (one of the national museums in the UK) has a gallery dedicated to conservation related displays. As well as permanent displays on the manufacturing techniques and materials of artifacts, there is a specially designed space for temporary conservation exhibitions. Through the example of the current conservation exhibition at the Wallace Collection and similar exhibitions and displays from other museums in the UK, this paper will study how the relationship and communication between the conservation profession and the general public have changed, from conservation as a behind-the-scenes and little-known activity to a closer interaction with the public and as a direct educational tool. The general function of a museum can be seen to have evolved from providing passive information to its visitors to offering more active and various forms of education. Conservation has developed with this change towards more awareness of the profession and its role in the preservation of cultural heritage through public outreach programs and displays.

  • PDF

Channel-Based Scheduling Policy for QoS Guarantees in Wireless Links

  • Kim Jeong Geun;Hong Een-Kee
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.11-20
    • /
    • 2004
  • Proportional Fair (PF) share policy has been adopted as a downlink scheduling scheme in CDMA2000 l×EV-DO standard. Although It offers optimal performance in aggregate throughput conditioned on equal time share among users, it cannot provide a bandwidth guarantee and a strict delay bound. which is essential requirements of real-time (RT) applications. In this study, we propose a new scheduling policy that provides quality-of-service (QoS) guarantees to a variety of traffic types demanding diverse service requirements. In our policy data traffic is categorized Into three classes, depending on sensitivity of Its performance to delay or throughput. And the primary components of our policy, namely, Proportional Fair (PF), Weighted Fair Queuing (WFQ), and delay-based prioritized scheme are intelligently combined to satisfy QoS requirements of each traffic type. In our policy all the traffic categories run on the PF policy as a basis. However the level of emphasis on each of those ingredient policies is changed in an adaptive manner by taking into account the channel conditions and QoS requirements. Such flexibility of our proposed policy leads to offering QoS guarantees effectively and. at the same time, maximizing the throughput. Simulations are used to verify the performance of the proposed scheduling policy. Experimental results show that our proposal can provide guaranteed throughput and maximum delay bound more efficiently compared to other policies.

  • PDF

A Study of Fashion Art Illustration

  • Kang, Hee-Myung;Kim, Hye-Kyung
    • Journal of Fashion Business
    • /
    • v.6 no.3
    • /
    • pp.94-109
    • /
    • 2002
  • The advent of the information age, advancement of the multi-media, and proliferation of internet are all ushering-in a new era of a cyber world. The artistic expression is unfolding into a new genre of a new era.. In the modern art, the boundary between the fine art and the applied art is becoming blurred, and further, distinction of fine art from popular art is also becoming meaningless. The advancement of science and technology, by offering new materials and visual forms, is contributing to the expansion of the morden art's horizon. As fashion illustration is gaining recognition as a form of art which mirrors today's realities, it has also become increasingly necessary to add variety and newness. Fashion illustration is thus becoming the visual language of the modern world, capable of conveying artistic emotion, and at the same time able to effectively communicate the image of fashion to the masses. The increasing awareness of artistic talent and ingenuity as essential components of fashion illustration is yielding greater fusion between fashion illustration and art & technology. This has resulted in the use of the advanced computer technology as a tool for crafting artistic expressions, such as fashion illustration, and this new tool has opened-up new possibilities for expressing images and colors. Further, the computer-aided fashion illustration is emerging as a new technique for expression. The concept of fashion illustration, history of fashion illustration from its incepton to modern date is reviewed and the simplicity has been researched throughout past studies published in Korean and overseas Journals.

An Evaluation of Software Development Methodology Applicability at Medium and Small Business through AHP (AHP를 통해 소규모 소프트웨어 개발을 위한 소프트웨어 개발방법론 적합도 평가)

  • Kim, Kyueok;Yoo, Haeyoung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.10
    • /
    • pp.691-696
    • /
    • 2013
  • To develop of a new software, software development methodology is offering the most efficient development methods and management methods. But, it require a lot of time, cost and software engineering specialist. For this reason, we are awaking to the need of it, but it has its problem that is only applied to large-scale software. In this paper, we suggest optimized software development methodology that you can apply to a lot well-used small software development methodology in present, and we prove it through AHP(Analytic Hierarchy Process). This helps small and business not to introduce specialist can efficiently develop and manage software.

Banding the World Together; The Global Growth of Control Banding and Qualitative Occupational Risk Management

  • Zalk, David M.;Heussen, Ga Henri
    • Safety and Health at Work
    • /
    • v.2 no.4
    • /
    • pp.375-379
    • /
    • 2011
  • Control Banding (CB) strategies to prevent work-related illness and injury for 2.5 billion workers without access to health and safety professionals has grown exponentially this last decade. CB originates from the pharmaceutical industry to control active pharmaceutical ingredients without a complete toxicological basis and therefore no occupational exposure limits. CB applications have broadened into chemicals in general - including new emerging risks like nanomaterials and recently into ergonomics and injury prevention. CB is an action-oriented qualitative risk assessment strategy offering solutions and control measures to users through "toolkits". Chemical CB toolkits are user-friendly approaches used to achieve workplace controls in the absence of firm toxicological and quantitative exposure information. The model (technical) validation of these toolkits is well described, however firm operational analyses (implementation aspects) are lacking. Consequentially, it is often not known if toolkit use leads to successful interventions at individual workplaces. This might lead to virtual safe workplaces without knowing if workers are truly protected. Upcoming international strategies from the World Health Organization Collaborating Centers request assistance in developing and evaluating action-oriented procedures for workplace risk assessment and control. It is expected that to fulfill this strategy's goals, CB approaches will continue its important growth in protecting workers.

Morphological segmentation based on edge detection-II for automatic concrete crack measurement

  • Su, Tung-Ching;Yang, Ming-Der
    • Computers and Concrete
    • /
    • v.21 no.6
    • /
    • pp.727-739
    • /
    • 2018
  • Crack is the most common typical feature of concrete deterioration, so routine monitoring and health assessment become essential for identifying failures and to set up an appropriate rehabilitation strategy in order to extend the service life of concrete structures. At present, image segmentation algorithms have been applied to crack analysis based on inspection images of concrete structures. The results of crack segmentation offering crack information, including length, width, and area is helpful to assist inspectors in surface inspection of concrete structures. This study proposed an algorithm of image segmentation enhancement, named morphological segmentation based on edge detection-II (MSED-II), to concrete crack segmentation. Several concrete pavement and building surfaces were imaged as the study materials. In addition, morphological operations followed by cross-curvature evaluation (CCE), an image segmentation technique of linear patterns, were also tested to evaluate their performance in concrete crack segmentation. The result indicates that MSED-II compared to CCE can lead to better quality of concrete crack segmentation. The least area, length, and width measurement errors of the concrete cracks are 5.68%, 0.23%, and 0.00%, respectively, that proves MSED-II effective for automatic measurement of concrete cracks.

The study about achievement and improvement plans of the university assessment of industrial point of view (산업계관점 대학평가의 성과와 개선방안)

  • Kim, Wang-jun;Jang, Keui-deok;Kim, Min-kyu;Park, Juhyoung
    • Journal of Engineering Education Research
    • /
    • v.21 no.5
    • /
    • pp.54-63
    • /
    • 2018
  • The university assessment of Industrial point of view that is the evaluation of university's outcomes was started in 2008 to find out university's social and industrial contribution rate by evaluating the added value of raising up competent people and technical development through university courses. This study is for analyzing outcomes of university assessment of Industrial point of view in the second period and searching for improvement suggestions of evaluation indexes and ways. The outcomes of university assessment of Industrial point of view in the second period is that are the contributions overcoming the difference of industrial requests and university's courses, information offering to university about industrial requests, the substantiate indicator for evaluating the suitability of university's courses and the improvement of university's competitiveness through course's upgrades, The ways improving the university assessment of Industrial point of view are introducing the ways of industrial university's consulting, evaluation for certification and involving graduate school's courses assesment, reinforcing the analysis of industrial requests, improving the indexes of courses and setting up feedback system.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.