• Title/Summary/Keyword: mobile business

Search Result 1,509, Processing Time 0.024 seconds

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.

Analysis of Smart Grid Network Vulnerability Using Smart Phone (Smart Phone을 통한 Smart Grid 네트워크 접속에서 취약성)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.240-243
    • /
    • 2010
  • Smart Phone supplies are diffused and substitute the Internet PC with Mobile communications which they are applied. Smart Phone in Smart Grid where electric power watch and the IT of existing amalgamate are used with business. Consequently from Smart Grid network connections which lead Smart Phone in about connection and control in about security vulnerabilities and Smart Grid networks the research is necessary in about vulnerability. It uses Smart Phone from the present paper and when approaching electric power watch systems which lead Smart Grid networks, it researches in about connection vulnerability. Also it uses Smart Phone and after connecting in Smart Grid networks a vulnerability in seizure possibility and, electric power information and control information, about private data etc. access authority it analyzes with the problem point which occurs it confronts it researches. And the research direction for a security reinforcement under presenting boil in about Smart Grid network security vulnerabilities which lead Smart Phone.

  • PDF

A Location Recognition System of RFID Tag for Parking Control (주차관제를 위한 RFID 태그 객체의 위치 인식 시스템)

  • Kang, Ku-An;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.99-107
    • /
    • 2008
  • Recently route guiding system using GPS is spread widely. In the parking management system of complex mall, RFID is mainly used to control status of parking lots. However, in a case that a vehicle only with RFID tag enters into small market-populated district with service of parking lots, there is no parking route guiding system optimized with information of real tine status of parking lots and the system only with GPS can't provide a function of using real time status of parking lots. This paper proposes a location recognizing method of RFID tag object for parking control system to integrated several parking lots in the business district and database-linked route guiding system optimized for parking. The proposed location recognizing method makes the search of optimized parking route possible by abstracting decoding order of tag and antenna number and recognizing direction of tag linked with database. Ihe implemented system that is composed of RFID tag, reader, middleware, server, parking lot clients and mobile clients shows that the proposed method works well and it will be useful for integrated parking control system.

Design of Wide-band Sleeve Monopole Antenna that 4 PCS of Post Type Parasitic Element is Added (4개의 Post 형태 기생소자를 추가한 광대역 슬리브 모노폴 안테나 설계)

  • Lee, Sang-Woo;Kim, Kab-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.7-13
    • /
    • 2007
  • In this paper, we have designed and fabricated a small size wide-band monopole antenna which can integrate the frequency of previous business mobile communication system by adding 4 PCS of post type parasitic element on top-loaded sleeve monopole antenna. We have observed the properties of return loss upon a parameter change of element, and we also examined radiation properties in the band of PCS, W-CDMA, WiBro, W-LAN and S-DMB in order to make sure the suggested antenna's wide-band properties. We have found that the proposed antenna has omni-direction in horizontal plane and figure eight-direction in vertical plane, and we could have good return loss($Return\;loss{\leq}-10\;dB$) and $1.14{\sim}3.66\;dBi$ gain in $1.67{\sim}3.55\;GHz$ of frequency range($B/W{\fallingdotsep}72%$).

The Effect of New Revenue Recognition Standard on Telecom Firms' Financial Reporting : Focusing on Regulatory Accounting (새로운 수익인식기준이 통신사업자의 재무보고에 미치는 영향 : 규제회계를 중심으로)

  • Chon, Mi-Lim;Jung, Jin-Hyang;Lee, Tae-Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.163-170
    • /
    • 2019
  • A new revenue recognition standard was adopted in 2018. The purpose of this paper is to analyse how K-IFRS 1115 'Revenue from Contracts with Customers' affects the revenue recognition of the telecommunication firms and to suggest a regulatory policy for the telecommunications industry. It shows identifying performance obligations for bundles, determining the transaction price and allocating the transaction price to the performance obligation and how to account for it using case study. The most important change in the telecommunication companies's revenue is to allocate the transaction price to two performance obligations: telecom services and mobile handset sales. As a result, sales revenue are expected to drop en masse. This study provides important implications for the regulatory accounting policy of the telecommunications industry.

Adhesion Properties of Moisture-Curable Polyurethane Hotmelt (습기경화형 폴리우레탄 핫멜트의 접착물성)

  • Kim, Jae-Beum;Chung, Kyung-Ho;Chun, Young-Sik;Jung, Jin-Soo;Chang, Young-Wook
    • Elastomers and Composites
    • /
    • v.33 no.4
    • /
    • pp.267-273
    • /
    • 1998
  • Isocyante terminated urethane prepolymers were synthesized by the reaction of 4,4'-dimethyl phenyldiisocyanate(MDI) and ester type polyols such as ethylene glycol/ butanediol adipate(EBA), neopentylglycol/butanediol adipate (NBA) and hexanediol adipate (HA) . All of the NCO-terminated urethane prepolymers are solid at room temperature, but they become mobile enough to be disposed onto a substrate upon heating about $80^{\circ}C$. Subsequently, they are solidified and cured through the reaction with moisture. Tensile behavior of the ore-thane hotmelt exhibits characteristic features depending on the type of polyol. The adhesive strength determined by single lap shear joint is higher in order of HA, NBA and EBA based ore thane hotmelt, which can be correlated with the magnitude of breaking energy of the cured films. The failure mode are cohesive for all cases and the adhesive strength increases as the test is performed faster. This indicates that the strength of the adhesive joint is primarily dependent upon the bulk properties of the adhesives.

  • PDF

The Effect of Interpersonal Conflict, Social Stress, and Communication on Loneliness of Mobile Messenger Users (대인 갈등, 사회적 스트레스, 의사소통이 모바일 메신저 사용자의 외로움에 미치는 영향에 관한 연구)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.235-248
    • /
    • 2021
  • The ultimate aim of this work is to explore the antecedents that affect the loneliness felt by users who actively communicate through smartphones apps. To do this, three characteristics including individual, relational, and communication characteristics that can affect loneliness and the effects of these characteristics on loneliness are empirically analyzed. The research results are as follows. First, we found that conflict resolution ability had a significant effect on interpersonal conflict and loneliness. Second, social stress was found to have a significant effect on interpersonal conflict, communication fatigue, and loneliness. Third, lack of communication was found to have a significant effect on conflict resolution ability and loneliness. Finally, we found that communication fatigue had a significant effect on loneliness. These results are interpreted that in order to reduce the loneliness, it is necessary to continuously improve the ability to wisely resolve conflicts that may arise in the relationship between oneself and others. In addition, it is necessary to reduce the fear or burden of building relationships with others.

Research on the Use of Logistics Centers in Idle site on Highway Using Social Network Analysis (사회연결망 분석을 활용한 고속도로 유휴부지의 물류센터 활용 방안에 관한 연구)

  • Gong, InTaek;Shin, KwangSup
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • The rapid growth of mobile-based online shopping and the appearance of untact business initiated by COVID-19 has led to an explosive increase in demand for logistics services such as delivery services. In order to respond to the rapidly growing demand, most logistics and distribution companies are working to improve customer service levels through the establishment of a full-filament center in the city center. However, due to social factors such as high land prices and traffic congestion, it becomes more difficult to establish the logistics facilities in the city center. In this study, it has been proposed the way to choose the candidate locations for the shared distribution centers among the space nearby the tall-gate which can be idle after the smart tolling service is widely extended. In order to evaluate the candidate locations, it has been evaluated the centralities of all candidates using social network analysis (SNA). To understand the result considering the characteristics of centrality, the network structure was regenerated based on the distance and the traveling time, respectively. It is possible to refer the result of evaluation based on the cumulative relative importance to choose the best set of candidates.

Development of a Social Network Service Closely Coupled with Local Broadcasting Media

  • Kim, Hyeon Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.129-137
    • /
    • 2021
  • Recently, local broadcast companies are experiencing financial shortages and business deterioration due to difficulties in securing income sources. This is due to the continuous decrease in viewership ratings as the contents of the broadcast companies do not attract the interest and participation of local residents. To resolve this issue, this paper presents a social network service closely coupled with local broadcasting. In the proposed service, the exposure range of articles is limited to a region so that reporters could easily find the interests of local residents. In addition, among the articles written by local residents, the articles requested to be broadcast by reporters are placed at the top section of the main page. From this UI configuration, local residents can easily recognize that their opinions can be directly connected to the broadcast, which is intended to activate their participation. The proposed service was implemented in the form of a prototype system with JCN, a broadcasting company in Ulsan, and this paper discusses its user interfaces, system structure, and an algorithm to estimate the priority of the written articles.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.