• Title/Summary/Keyword: making techniques

Search Result 1,309, Processing Time 0.025 seconds

Country of Origin, Religiosity and Halal Awareness: A Case Study of Purchase Intention of Korean Food

  • ASTUTI, Yuni;ASIH, Daru
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.413-421
    • /
    • 2021
  • This research empirically analyzed whether the foods which came from a non-Muslim majority country, such as South Korea, could play an important role in affecting the consumer intention in a predominantly Muslim country. Online survey methods were used to investigate the proposed hypothesis. 318 responses were used for further analysis. Forty-six reflective constructs were adapted from literature and designed by using a five-point Likert scale to facilitate measurement. Estimation models and structural models were examined through SEM-PLS analysis techniques using SmartPLS 3.0 application as the data processing tool. The results showed that religiosity and halal awareness had a positive and significant effect on attitude toward halal labels, including the mediating effect from consumer attitudes towards halal labels which had a positive but insignificant effect on purchase intention. Halal awareness plays an important role for Muslims in the decision-making process for purchasing food. In contrast to the initial hypothesis, the country of origin actually did not have a positive effect on attitudes towards the halal label. In a Muslim-majority country like Indonesia, findings halal food is not difficult, so this research basically is a reminder to marketers to follow those halal principles in implementing their marketing strategies.

A Hardware Implementation for Real-Time Fingerprint Identification (실시간 지문식별을 위한 하드웨어 구현)

  • Kim Kichul;Kim Min;Chung Yongwha;Pan Sung Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.79-89
    • /
    • 2004
  • Fingerprint identification consists of user enrollment phase storing user's fingerprint in a database and user identification phase making a candidate list for a given fingerprint. straightforward approach to perform the user identification phase is to scan the entire database sequentially, and takes times for large-scale databases. In this paper, we develop a hardware design which can perform the user identification phase in real-time. Our design employs parallel processing techniques and has been implemented on a PCI-based platform containing an FPGA and SDRAMs. Based on the performance evaluation, our hardware implementation can provide a scalability and perform the fingerprint identification in real-time.

Privacy-Preserving in the Context of Data Mining and Deep Learning

  • Altalhi, Amjaad;AL-Saedi, Maram;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.137-142
    • /
    • 2021
  • Machine-learning systems have proven their worth in various industries, including healthcare and banking, by assisting in the extraction of valuable inferences. Information in these crucial sectors is traditionally stored in databases distributed across multiple environments, making accessing and extracting data from them a tough job. To this issue, we must add that these data sources contain sensitive information, implying that the data cannot be shared outside of the head. Using cryptographic techniques, Privacy-Preserving Machine Learning (PPML) helps solve this challenge, enabling information discovery while maintaining data privacy. In this paper, we talk about how to keep your data mining private. Because Data mining has a wide variety of uses, including business intelligence, medical diagnostic systems, image processing, web search, and scientific discoveries, and we discuss privacy-preserving in deep learning because deep learning (DL) exhibits exceptional exactitude in picture detection, Speech recognition, and natural language processing recognition as when compared to other fields of machine learning so that it detects the existence of any error that may occur to the data or access to systems and add data by unauthorized persons.

Development of Hazardous Food Notification Application Using CNN Model (CNN 모델을 이용한 위해 식품 알림 애플리케이션의 개발)

  • Yoon, Dong Eon;Lee, Hyo Sang;Oh, Am Suk
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.3
    • /
    • pp.461-467
    • /
    • 2022
  • This research is to raise awareness of food safety by designing and supporting a hazard food information notification platform for consumers. To this end, the design was carried out by dividing the process into a data extraction process, an application screen design process, and a CNN-based food inference process. Data was collected through public data APIs and crawling, and it was sent to each activity screen designed for Android studios so that it could be output. As a result, when the platform is executed, information on hazardous food names, registration dates, food classification, manufacturing dates, recovery grades, recovery reasons, recovery methods, company names, barcode numbers, and packaging units can be intuitively and conveniently checked. In addition, CNN-based food inference processes allowed mobile cameras to infer harmful food and applied various quantization techniques such as Dynamic Range, Integer, and Float16 to compare the degree of improvement in inference performance. As a result, the group that applied basic quantization and treated device resources with GPU showed the greatest improvement in inference performance. Through this platform, it is expected that the reliability of food safety will be improved by making it more convenient for consumers to recognize food risks.

Beyond design basis seismic evaluation of underground liquid storage tanks in existing nuclear power plants using simple method

  • Wang, Shen
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2147-2155
    • /
    • 2022
  • Nuclear safety-related underground liquid storage tanks, such as those used to store fuel for emergency diesel generators, are critical components for safety of hundreds of existing nuclear power plants (NPP) worldwide. Since most of those NPP will continue to operate for decades, a beyond design base (BDB) seismic screening of safety-related underground tanks in those NPP is beneficial and essential to public safety. The analytical methodology for buried tank subjected to seismic effect, including a BDB seismic evaluation, needs to consider both soil-structure and fluid-structure interaction effects. Comprehensive analysis of such a soil-structure-fluid system is costly and time consuming, often subjected to availability of state-of-art finite element tools. Simple, but practically and reasonably accurate techniques for seismic evaluation of underground liquid storage tanks have not been established. In this study, a mechanics based solution is proposed for the evaluation of a cylindrical underground liquid storage tank using hand calculation methods. For validation, a practical example of two underground diesel fuel tanks in an existing nuclear power plant is presented and application of the proposed method is confirmed by using published results of the computer-aided System for Analysis of Soil Structural Interaction (SASSI). The proposed approach provides an easy to use tool for BDB seismic assessment prior to making decision of applying more costly technique by owner of the nuclear facility.

Blockchain-based e-Agro Intelligent System

  • Srinivas, V. Sesha;Pompapathi, M.;Rao, G. Srinivasa;Chaitanya, Smt. M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.347-351
    • /
    • 2022
  • Farmers E-Market is a website that allows agricultural workers to direct market their products to buyers without the use of a middleman. That theory is blockchain system will be used by authors to accomplish this. The system, which is built on a public blockchain system, supports sustainability, shippers, and consumers. Farmers can keep track of their farming activities. Customers can review the product's history and track its journey through carriers to delivery after making a purchase. Farmers are encouraged to get information about their interests promptly in a blockchain-enabled system like this. This functionality is being used by small-scale farmers to form groups based on their location to attract large-scale customers, renegotiate farming techniques or volumes, and enter into contracts with buyers. The analysis shows the use of blockchain technology with a farmer's portal that keeps the video of trading data of crops, taking into account the qualities of blockchain such as values and create or transaction data. The proposal merges python as a programming language with a blockchain system to benefit farmers, vendors, and individuals by preserving transactions.

Possible Linkage between Management of the Service Supply Chain and the Power to Influence Potential Customers for Airline Booking

  • Moon-Jeong KIM
    • Journal of Distribution Science
    • /
    • v.21 no.5
    • /
    • pp.93-102
    • /
    • 2023
  • Purpose: This study aims to investigate a meaningful connection between the service supply chain and the power to influence potential customers for airline booking. This investigation will cover various topics, including customer service, product quality, and marketing strategies. Additionally, the literature review will examine the various strategies and tactics airlines use to influence customer behavior. Research design, data, and methodology: The data collection process conducted by the author could obtain the justification and establish the quality of the instrument between independent factor (Service Supply Chain) and dependent factor (Power to Influence Potential Customers), selecting peer-reviewed articles mostly for the current study. Results: The findings section thoroughly studied the research findings indicating a potential link between service supply chain management and the ability to persuade potential consumers to book an airline. The research findings will be explored concerning the numerous variables that may affect customers' decision-making in the airline business, the techniques used by airlines to sway consumers. Conclusions: The research has provided evidence that airlines use a variety of strategies to influence potential customers and that these strategies are generally successful in increasing customer loyalty and satisfaction, as well as sales. By utilizing these strategies, airlines can increase their customer base and profitability.

Application of UAV images for rainfall-induced slope stability analysis in urban areas

  • Dohyun Kim;Junyoung Ko;Jaehong Kim
    • Geomechanics and Engineering
    • /
    • v.33 no.2
    • /
    • pp.167-174
    • /
    • 2023
  • This study evaluated slope stability through a case study to determine the disaster risks associated with increased deforestation in structures, including schools and apartments, located in urban areas adjacent to slopes. The slope behind the ○○ High School in Gwangju, Korea, collapsed owing to heavy rain in August 2018. Historically, rainwater drained well around the slope during the rainy season. However, during the collapse, a large amount of seepage water flowed out of the slope surface and a shallow failure occurred along the saturated soil layer. To analyze the cause of the collapse, the images of the upper area of the slope, which could not be directly identified, were captured using unmanned aerial vehicles (UAVs). A digital elevation model of the slope was constructed through image analysis, making it possible to calculate the rainfall flow direction and the area, width, and length of logging areas. The change in the instability of the slope over time owing to rainfall lasting ten days before the collapse was analyzed through numerical analysis. Imaging techniques based on the UAV images were found to be effective in analyzing ground disaster risk maps in urban areas. Furthermore, the analysis was found to predict the failure before its actual occurrence.

A Study on the Fingerprinting scheme without Trusted Third Party (신뢰기관 비참여의 핑커프린팅 기법에 관한 연구)

  • Yong, Seung-Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.81-88
    • /
    • 2009
  • Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. These schemes enable the original merchant to identify the original buyer of the digital data by embedding fingerprints into digital contents. Asymmetric property of fingerprinting schemes is important to keep the buyer's privacy. In this paper, we propose a symmetric encryption based fingerprinting protocol without trusted third party. Our scheme enables the reduction of computational costs for the encryption using symmetric key encryption scheme. Since a trusted third party doesn't take part in making the fingerprint of each buyer, the protocol doesn't need to control the trusted third party and it is more secure against collusion attack.

The Impact of Energy Crisis and Political Instability on Outsourcing: An Analysis of the Textile Industry of Pakistan

  • ARSLAN, Aniqa;QAYYUM, Arslan;AYUBI, Sharique;KHAN, Sohail Ahmed;ASAD ULLAH, Muhammad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.3
    • /
    • pp.235-243
    • /
    • 2022
  • To help the industry, outsourcing was found to be the most efficient method. An extensive literature analysis was done to assess the macroeconomic factors associated with outsourcing to supplement the anxious parties' decision-making process with evidence-based comprehensive tools. As a theoretical framework for evaluating these issues, transaction cost economies and resource-based perspective theories are investigated. Outsourcing is proven to be a result of energy crises and political instability. The advantages of outsourcing assist major industries in the economy. To discover the key drivers behind outsourcing, we used the vector autoregressive (VAR model) and step-wise regression techniques for the period 1992 to 2016. This research adds to the literature in that it not only explains the energy issue but also discusses the dilemma of political instability in the country in the context of outsourcing. The findings indicate that labor cost and export tendency have a positive impact on outsourcing strategy, which confirms the study's third and fourth hypotheses. Customs tax, inflation, and the unemployment rate, on the other hand, have a negative impact on textile outsourcing in Pakistan, according to the study's fifth, sixth, and seventh hypotheses.