• Title/Summary/Keyword: 원패스

Search Result 132, Processing Time 0.027 seconds

A Study on the Effect of Service Quality on Attitudinal and Behavioral Loyalty by Different Types of Restaurants (레스토랑 유형에 따라 서비스 품질이 태도적, 행동적 충성도에 미치는 영향력 차이에 관한 연구)

  • Ahn, Sung-Sik;Park, Yeon-Ok;Kang, Beong-Ho
    • Culinary science and hospitality research
    • /
    • v.17 no.1
    • /
    • pp.26-43
    • /
    • 2011
  • This study aims to give insight into better understanding how service quality influences customers' attitude and behavior in terms of loyalty as well as how its effects vary by the types of restaurants (family restaurants or fast food restaurants). The results of the study are summarized as follows. First, perceived service quality, which consists of food, service, menu and atmosphere, made a significant impact on customer satisfaction for food, menu, atmosphere, and service, respectively. Second, the study examined how perceived service quality affected future expectations, and found only food turned out to be a significant factor. Third, customer satisfaction affected future satisfaction and customer loyalty, and it had a greater impact on attitudinal loyalty than behavioral loyalty. Fourth, future satisfaction affects customer loyalty, and it had a greater impact on attitudinal loyalty than behavioral loyalty. Fifth, the study examined how service quality, customer satisfaction and future expectation affected attitudinal loyalty and behavioral loyalty differently by different types of the food service industry (family restaurants or fast food restaurants) and found out there were some differences in the effects of customer satisfaction on behavioral loyalty and the future expectations and attitudinal loyalty on behavioral loyalty. The marketing implication is that service providers should be one step ahead in understanding the service quality perceived by customers (food, service, menu, and atmosphere). In addition, they should understand that establishing long-tenn relationships with customers by providing high quality service bas a direct impact on their business performance. Furthermore, management in family restaurants and fast food restaurants should include the improvement of service quality in their employee training programs.

  • PDF

Chinese Consumer Preference of Chicken Burgers Cooked by Sous-vide with Korean-styled Seasoning and Available on the Chinese Fast Food Market (진공저온조리를 이용한 한식 스타일 치킨버거와 중국 시판 치킨버거의 중국 소비자 기호도)

  • Bae, Sungeun;Jang, Jin A;Oh, Jieun;Lee, Kyungwon;Cho, Mi Sook
    • Korean Journal of Food Science and Technology
    • /
    • v.45 no.1
    • /
    • pp.126-132
    • /
    • 2013
  • The purpose of this study is to examine the difference of Chinese consumer preference between chicken burgers cooked by Sous-vide adding Korean-styled seasoning and chicken burgers from local fast food restaurants. For Chinese women in their 20s who reside in Beijing, China, the most important attribute for eating-out was taste (M=6.5), health (M=6.0) and pleasure (M=5.6) in order and 68.60% of them replied that they were interested in Korean cuisine. More than 90% answered they like Korean food for its good taste, shape and color. As for burger preference, BB was significantly higher in terms of the overall and appearance preference. However, there was no significant difference between AB and SB. As for flavor and texture, it showed no significant differences among BB, AB, and SB products. For SB, total balance, soft texture of patty and balance of flavor characteristics were the reasons for their preference of the burger.

A Study on the Mapping of Fishing Activity using V-Pass Data - Focusing on the Southeast Sea of Korea - (선박패스(V-Pass) 자료를 활용한 어업활동 지도 제작 연구 - 남해동부해역을 중심으로 -)

  • HAN, Jae-Rim;KIM, Tae-Hoon;CHOI, Eun Yeong;CHOI, Hyun-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.1
    • /
    • pp.112-125
    • /
    • 2021
  • Marine spatial planning(MSP) designates the marine as nine kinds of use zones for the systematic and rational management of marine spaces. One of them is the fishery protection zone, which is necessary for the sustainable production of fishery products, including the protection and fosterage of fishing activities. This study intends to quantitatively identify the fishing activity space, one of the elements necessary for the designation of fisheries protection zones, by mapping of fishery activities using V-Pass data and deriving the fishery activity concentrated zone. To this end, pre-processing of V-Pass data was performed, such as constructing a dataset that combines static and dynamic information, calculating the speed of fishing vessels, extracting fishing activity points, and removing data in non-fishing activity zone. Finally, using the selected V-Pass point data, a fishery activity map was made by kernel density estimation, and the concentrated space of fishery activity was analyzed. In addition, it was confirmed that there is a difference in the spatial distribution of fishing activities according to the type of fishing vessel and the season. The pre-processing technique of large volume V-Pass data and the mapping method of fishing activities performed through this study are expected to contribute to the study of spatial characteristics evaluation of fishing activities in the future.

Authenticated IPv4 Address Allocation Using Human Recognition in DSTM Server (Human Recognition 방법을 적용한 DSTM 서버의 IPv4 주소 할당 인증 방법)

  • Choi, Jae-Duck;Kim, Young-Han;Kwon, Taek-Jung;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.979-986
    • /
    • 2006
  • DSTM is one of the 1Pv6/IPv4 transition mechanisms using IPv4-in-IPv6 tunneling for communication between IPv6 node with dual stack and Ipv4-only node. In DSTM, the DSTM server using the DHCPv6 is vulnerable to DoS attacks which can exhaust the IPv4 address pool. In this paper, an authentication model using a HRAA (Human Recognition Address Allocation) scheme was proposed to protect DHCP server against DoS attacks. The proposed authentication model in DSTM that uses an image file for verification is effective because only human can respond to the challenge for authenticated address allocation. The proposed model can be used anytime and anywhere in a DSTM domain, and is secure against DoS attacks.

Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems (이기종의 침입탐지 시스템과 SDMS-RTIR의 실시간 상호연동을 지원하는 침입탐지 메시지 교환 라이브러리 구현)

  • Yun, Il-Sun;Lee, Dong-Ryun;Oh, Eun-Sook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.565-574
    • /
    • 2003
  • This paper implements an intrusion detection message exchange protocol library (IDMEPL) for SDMS-RTIR, which Korea Information Security Agency (KISA) has developed to hierarchically detect and respond to network vulnerability scan attacks. The IDMEPL, based on the IDMEF and the IAP of the IDWG, enables SDMS-RTIR to interact with other intrusion detection systems (IDS) in realtime, and supports the TLS protocol to prevent security threats in exchanging messages between its server and its agents. Especially, with the protocol selection stage, the IDMEPL can support various protocols such as the IDXP besides the IAP. Furthermore, it can allow for agents to choose an appropriate security protocol for their own network, achieving security stronger than mutual authentication. With the IDMEPL, SDMS-RTIR can receive massive intrusion detection messages from heterogeneous IDSes in large-scale networks and analyze them.

Media Access Control Protocol Considering MANET of Underwater Environment (수중 환경의 MANET을 고려한 매체 접근 제어 프로토콜)

  • Shin, Seung-Won;Yun, Nam-Yeol;Lee, Jin-Young;Lee, Seung-Joo;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.97-107
    • /
    • 2013
  • Underwater wireless communication systems can be useful for underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, vessel sinking exploration, and so on. However, unlike terrestrial wireless communication, underwater wireless communication should consider factors such as long propagation delay, limited transmission capacity, high bit-error rate due to potential loss in power, ambient noise, man-made noise, multi-path, etc., because of the inherent characteristics of water. Thus, in this paper, we propose a suitable media access control(MAC) protocol that applies a combination of the ALOHA MAC protocol and the CSMA/CA MAC protocol to underwater environment. We further propose a mathematical analysis model to evaluate performance. We also verify performance improvement in the proposed scheme in comparison with existing MAC protocols.

A Study on the Relationship between Servant Leadership and Co-worker Trust, Cooperation in the Foodservice Industry (외식업체 조리사들의 서번트 리더십과 동료신뢰 및 협력간의 관계)

  • Goo, Jung Dae
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.2
    • /
    • pp.57-80
    • /
    • 2014
  • The fact that cooperation is an essential factor for foodservice industry success has been discovered by many business leaders. Success in entrepreneurial businesses depends upon cooperation. However, there has been a lack of studies done about cooperation in the service industry, particularly levels of cooperation among foodservice employees in an organization. This study is designed to understand the antecedents, servant leadership and trust in co-workers that have a resulting influence on cooperation among foodservice employees. To achieve the study objective, 191 valid questionnaires were statistically analyzed, using frequency analysis, factor, reliability analysis and multiple regression analysis. The following is a summary of my verified analysis. First, servant leadership have a positive influence on trust in co-workers. Second, trust in co-workers has a positive influence on cooperation among foodservice employees positively.

Remote Sensing of Wave Trajectory in Surf Zone using Oblique Digital Videos (해안 디지털 비디오를 이용한 쇄파지역에서의 파랑궤적 측정)

  • Yoo, Je-Seon;Shin, Dong-Min;Cho, Yong-Sik
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.20 no.4
    • /
    • pp.333-341
    • /
    • 2008
  • A remote sensing technique to identify trajectories of breaking waves in the surf zone using oblique digital nearshore videos is proposed. The noise arising from white foam induced by wave breaking has hindered accurate remote sensing of wave properties in the surf zone. For this reason, this paper focuses on image processing to remove the noise and wave trajectory identification essential for wave property estimation. The nearshore video imagery sampled at 3 Hz are used, covering length scale(100 m). Original image sequences are processed through image frame differencing and directional low-pass image filtering to remove the noise characterized by high frequencies in the video imagery. The extraction of individual wave crest features is conducted using a Radon transform-based line detection algorithm in the processed cross-shore image timestacks having a two-dimensional space-time domain. The number of valid wave crest trajectories identified corresponds to about 2/3 of waves recorded by the in-situ sensors.

A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Global Roaming Environment (글로벌 로밍 환경에서 시간 동기화 OTP를 포함한 티켓 기반 AAA 메커니즘에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.129-138
    • /
    • 2007
  • AAA(Aluthentieation, Authorization, Accounting) protocol is an information securitv technology that offer secure and reliable user Authentication, Authorization, Accounting function systematically in various services. protocol and wireless network work as well as win network. Currently IETF(Internet Engineering Task Force) AAA Working Group deal with about AAA protocol and studying with activity, But, recently it exposing much problems side to user's anonymity and privacv violation. Therefore, in this paper, AAAH(Home Authentication Server) authenticaters Mobile device, after that, use ticket that is issued from AAAH even if move to outside network and can be serviced offering authentication in outside network without approaching by AAAH, Also, we study mechanism that can offer user's privacy and anonymousness to when use service. Our mechanism is using Time Synchronization OTP and focusing authentication and authorization. Therefore, our mechanism is secure from third party attack and offer secure and effective authentication scheme. Also only right user can offer services by using ticket. can reduce signal and reduce delay of message exchanged, can offer persistent service and beighten security and efficiency.

An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID) (RFID를 이용한 디지털 문서 보안 아키텍처)

  • Choi, Jae-Hyun;Lee, Woo-Jin;Chon, Ki-Won
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.965-972
    • /
    • 2005
  • Digital documents have become the mainstay of the paperless office. This is due to the increased usage of computer networks and the widespread digital culture. Along with the increased usage of digital documents comes the problem of securing them. The documents nay have very important information such as confidential business policies and intellectual Property statements. Generally, most of users protect them by using a password or secured flash memory or security software, but it has several weaknesses. Accordingly, we propose a new architecture for securing digital documents. The proposed architecture bases on RFID and several encrypting techniques. It makes up for the weakness of traditional securing architectures, and supports various Policies for digital documents of users.