• Title/Summary/Keyword: mobile market

Search Result 1,211, Processing Time 0.025 seconds

Classification of Environmental Industry and Technology Competitiveness Evaluation (환경산업기술 분류체계 및 기술 경쟁력 평가)

  • Han, Daegun;Bae, Young Hye;Kim, Tae-Yong;Jung, Jaewon;Lee, Choongke;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.22 no.4
    • /
    • pp.245-256
    • /
    • 2020
  • The purpose of this study is to evaluate the technological competitiveness of the environmental industry with developed countries in order to establish an international market expansion strategy of the Korean environmental industry and technology. In order to evaluate the competitiveness of the environmental industry and technology, core technologies were classified by the environmental industry sectors based on the classification system of the domestic and international environmental industry and technology. After developing the evaluation index data, the Delphi analysis, journal and patent analysis, as well as the export and import analysis were carried out and the standardization analysis was performed on the index data. Moreover, the weights of each evaluation index were calculated using the AHP(Analytic Hierarchy Process) method and the evaluation results of competitiveness of the environmental industry and technology in Korea, the United States, the United Kingdom, Germany, and France were derived. As a result of the evaluation, the United States was rated with the highest technological competitiveness in all the environmental industry sectors, while Korea got the lowest technological competitiveness rating compared to the 4 developed countries. In particular, Korea got the lowest level of technological competitiveness in the sector of multi-media environmental management and development for a sustainable social system. Therefore, in order for the Korean environmental industry and technology to enter the global advanced market, it is necessary to strengthen the competitiveness through the development of the fourth environmental industry based on IoT(Internet of Things), cloud, big data, mobile, and AI(Artificial Intelligence), which are currently the country's domestic strengths.

DMB Filecasting Service Technology (DMB 파일캐스팅 서비스 기술)

  • Choi, Ji-Hoon;Yang, Kyu-Tae;Cha, Ji-Hun
    • Journal of Broadcast Engineering
    • /
    • v.17 no.1
    • /
    • pp.152-164
    • /
    • 2012
  • DMB provides various kinds of data services such as BWS and TPEG service in addition to audio and video services. But recently the necessity of new business models creating profit has been on the rise due to the saturation of DMB receiver market and break-down of market barrier between mobile IPTV and DMB services. This paper introduces DMB filecasting service technology, which can be expected a new profit-creative business model. The purpose of DMB filecasting service is to transmit non-real time multimedia contents based on DMB AF format to the users through DMB channels. It makes possible to consume DMB contents with any DMB-installed device anytime, anywhere and share them with others. Also DMB filecasting service makes consumption and request of DMB contents possible to be extented to a variety of networks as well as DMB channels. The paper explains the standardization status of DMB filecasting service and various DMB filecasting service scenarios. And also it proposes a signalling methode, a transmission and reception protocol and a receiver structure using DMB broadcasting program guide information.

Design of method to analyze UI structure of contents based on the Morphology (형태적 관점의 콘텐츠 UI구조 분석 방법 설계)

  • Yun, Bong Shik
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.58-63
    • /
    • 2019
  • The growth of the mobile device market has changed the education market and led to the quantitative growth of various media education. In particular, smart devices, which have better interaction than existing PCs or consoles, can develop more user-friendly content, allowing various types of educational content and inducing changes in traditional education methods for consumers. Although many researchers recently suggest viable development methods or marketing elements of contents, development companies, and developers, until now, merely rely on the human senses. Therefore, it is necessary to study the actual user's smart-device based usability and experience environment. This study aims to propose an intuitive statistical processing method for analyzing the usability of game-type educational contents in terms of form, for popular games that have been released as a basis for analyzing the user experience environment. In particular, because the game industry has a sufficient number of similar examples, it is possible to conduct research based on big data and to use them for immediate decision-making between multiple co-developers through the analysis method proposed by the research. It is expected to become an analytical model that can communicate with other industries because it is effective in securing data sources.

The Trend of Integrated Solution Service Based on VoIP and Voice Recognition (VoIP와 음석인식에 기반한 통합솔루션 서비스 동향)

  • Oh, Jae-Sam;Yoon, Young-Keun
    • Journal of Information Technology Services
    • /
    • v.1 no.1
    • /
    • pp.57-66
    • /
    • 2002
  • We are looking at the two different kinds of IT on this paper. One is VoIP and the other is VR (voice recognition). We are more interesting at the evolving techniques and services produced by combining the two techniques mentioned above. Recently, there are so many services and products appeared in the market using voice recognition technique. Now the technique has progressed on the level that can even replace the user interfaces using the QUI or general DTMF. Therefore, we are expecting so many various new services showed UP In the market which is combination of the VoIP and VR. Up until now, three models are available in the field which are wired telephone, wireless telephone, and wireless internet. We know the effectiveness of the VoIP is maximized more when this technique is combined with others rather than used alone without other techniques.

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

Factors Influencing Acceptance Resistance of Personal Health Record Apps: Focusing on the Privacy Calculus Model (개인건강기록 앱 수용저항에 영향을 미치는 요인: 프라이버시 계산모형을 중심으로)

  • Sang Ho Kim;Eunkyung Kang;Sung-Byung Yang
    • Information Systems Review
    • /
    • v.25 no.1
    • /
    • pp.165-187
    • /
    • 2023
  • The continuous increase in life expectancy and high interest in health has brought about significant changes in the use of health information by the public according to the development of information technology represented by the Internet and smartphones. As the medical market expands to the mobile health environment, many health-related apps have been created and distributed, but the acceptance rate is slow as it has become challenging to provide services due to various regulations. In this study, perceived value, perceived risk factors (psychological risk, risk of time-loss, legal risk), and perceived benefits (usefulness, interaction, autonomy) were derived and verified as factors that affect the acceptance resistance of personal health record apps based on the privacy calculation model. In addition, by analyzing the moderating effect of trust in the manufacturer, how the perceived risk and perceived benefit affect the perceived value was verified. A survey was conducted on Korean college students who recognized the personal health record apps but did not use them, and 127 samples were analyzed using structural equations. As a result of hypothesis verification, perceived value has a negative effect on acceptance resistance, perceived risk (risk of time-loss) has a negative effect on perceived value, and perceived benefits (usefulness, interaction, autonomy) were found to have a positive effect on perceived value. Trust in manufacturers has weakened the impact of perceived risks (legal risk) on perceived values. This study is expected to play an important role in maintaining a competitive advantage in the personal health record app market environment by identifying and proposing detailed criteria for reducing the acceptance resistance of personal health record apps.

A Novel Idle Mode Operation in IEEE 802.11 WLANs: Prototype Implementation and Performance Evaluation (IEEE 802.11 WLAN을 위한 Idle Mode Operation: Prototype 구현 및 성능 측정)

  • Jin, Sung-Geun;Han, Kwang-Hun;Choi, Sung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.152-161
    • /
    • 2007
  • IEEE 802.11 Wireless Local Area Network (WLAN) became a prevailing technology for the broadband wireless Internet access, and new applications such as Voice over WLAM (VoWLAN) are fast emerging today. For the battery-powered VoWLAN devices, the standby time extension is a key concern for the market acceptance while today's 802.11 is not optimized for such an operation. In this paper, we propose a novel Idle Mode operation, which comprises paging, idle handoff, and delayed handoff. Under the idle mode operation, a Mobile Host (MH) does not need to perform a handoff within a predefined Paging Area (PA). Only when the MH enters a new PA, an idle handoff is performed with a minimum level of signaling. Due to the absence of such an idle mode operation, both IP paging and Power Saving Mode (PSM) have been considered the alternatives so far even though they are not efficient approaches. We implement our proposed scheme in order to prove the feasibility. The implemented prototype demonstrates that the proposed scheme outperforms the legacy alternatives with respect to energy consumption, thus extending the standby time.

Quantitatation of Benzoic and Sorbic Acids in Some Processed Foods of Korea (일부 한국 가공식품의 벤조산과 소르빈산의 함량 조사)

  • Mitra, Sanika;Han, Jang-Il;Lee, Ki-Teak;Kim, Seong-Ai
    • Food Science and Preservation
    • /
    • v.16 no.6
    • /
    • pp.789-796
    • /
    • 2009
  • Benzoic acid (BA) and sorbic acid (SA) are the preservatives most commonly used in food. Although BA and SA are generally safe, some previous studies have shown that consumption of excessive amounts of these food additives can be a health hazard. The aim of this study was to determine the amounts of BA and SA in processed foods in Korea. Different brands of fruit juice, yogurt, cheese, dried fruits, jam, and margarine were purchased at a local market in Daejeon, Korea. Samples were analyzed by high-performance liquid chromatography (HPLC) using a UV detector. Chromatographic separation was achieved with a C18 column. Methanol acetate buffer (pH 4.4) at a 35:65 v/v ratio was used as the initial mobile phase to elute BA and SA. The detector wavelength was set at 254 nm. The average test results observed for BA concentrations in fruit juice, yogurt, cheese, dried fruits, jam, and margarine were $40.26{\pm}0.02$, $2.07{\pm}0.06$, $0.02{\pm}0.09$, $0.36{\pm}08$, $265.30{\pm}0.02$, and $27.34{\pm}0.08\;mg/kg$, respectively. Average concentrations of SA in these samples were $0.92{\pm}0.06$, $1.06{\pm}0.07$, $7.30{\pm}0.01$, $14.14{\pm}0.08$, $25.65{\pm}0.06$, and $4.81{\pm}0.07\;mg/kg$, respectively. Thus, the average levels of BA and SA in the studied food items were lower than the KFDA-permitted limits. Moreover, the estimated daily intake of both BA and SA by a typical consumer were below the maximum recommended daily values.

Estimating Willingness to Switch to MVNO for Activation of Mobile Data Services (무선데이터서비스 활성화를 위한 MVNO 전환의사비용 추정)

  • Lee, Sang Woo;Ko, Chang Youl
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.1-11
    • /
    • 2015
  • This study uses the contingent valuation method to estimate the switching cost for adopting the MVNO service. The findings are as follows.: First, Willingness To Switch(WTS) increases as users' using pattern and perceived degree of MVNO service, but satisfaction with current service provider does not play a significant role in predicting Switching Cost. This means that as amount of money users can save exceeds a certain level, users decide to willingly change their service provider to MVNO regardless of their level of satisfaction with current service provider. Second, there are differences in WTS among service subscribers in SKT, KT and LGU+. It means that there will be a difference in the tendency to switch to MVNO among subscribers of service providers. This study suggest the following mangerial perspective to effectively promote the MVNO and boost the MVNO market for activation of mobile data services.: First, MVNOs are better off applying differentiated pricing scheme at attractive rates than using a differentiation of service product and quality. Second, regulators should consider how to implement an MVNO regulatory policy when there is an asymmetric customer loyalty among MNOs. This research will be used to set the MVNO's pricing strategy and to build up a successful regulatory policies.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.