• Title/Summary/Keyword: 제안 주체

Search Result 745, Processing Time 0.024 seconds

Furniture Brand Development Plan Study according to Increasing Single-Person Households - Focused on hanssem and ikea (1인 가구 증가에 따른 가구브랜드 발전 방안 연구)

  • Eo, Kyung-Eun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.393-398
    • /
    • 2016
  • The purpose of this study is to conduct research from qualitative aspects regarding the development of substantive design research for furniture brand and detailed development direction as single household has increased rapidly. In case of research method, the usability evaluation questionnaire was produced based on Honey Comb Model of Peter Morville. As a result, the single-person household including other household show preference for furniture for the one-man households and tend to purchase and use them. Nonetheless, it was found that places for sharing opinion and reselling the furniture are greatly lacking. Therefore, it is required to vitalize community market for the one-man household. And it is expected that this result of research provides useful implication concerning the single household as well as academic significance to offer primary information of furniture brand development-related research.

A Case Study of Recent New Terrorism and Potential Patterns in South Korea (최근 국외 뉴테러리즘의 사례분석과 국내 발생가능 유형에 대한 연구)

  • Jeon, Yong-Jae;Lee, Chang-Bae;Lee, Seung-Hyun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.11-33
    • /
    • 2017
  • Terrorism has existed in the entire human history and has become a significant topic in criminology while prior studies has focused on North Korea as the perpetrator, and this prevents an in-depth discussion of the international trends of terrorism. As soft targets are the main target of new terrorism and because we never ignore the significance of the consequences, there are needs for more studies on the topic. This study conducted a case study of major terrorism attacks and surveyed professionals in the field via an AHP analysis in order to find the characteristics of terrorism and its potential patterns in South Korea. As a result, we found that North Korea or the left-wing may utilize homemade bomb, motor vehicle or drone for the purpose of attacking multi-use facilities in South Korea. For policy implications, we insist developing a better CPTED approach on those facilities, improving professionalism of cyber-watchdog via more training and education, stricter control on drone permit, and operation of counseling centers for preventing radicalization.

  • PDF

Decision Making Support Tool for Master Architect in Design Development Phase of Mega-Project (메가프로젝트 기본설계단계의 Master Architect 의사결정지원 도구)

  • Cho, Dong-Hyun;Koo, Kyo-Jin;Park, Sung-Chul;Kim, Jong-Il
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.202-206
    • /
    • 2008
  • Recently, as high level of interest for the city regeneration, large-scale projects are planned or being performed such as reconstruction project. These mesa-projects have different characteristics from a single project in the design phase. It is a number of companies involved in design phase of mega-project and principal decision-making entity manage the project from the initial stage of an ongoing business by coordinating an opinions between design companies. The absence of a decision making support system reflected those characteristic causes a variety of problems such as a loss of cost and schedule. Therefore the final object of this paper is to propose a decision making support tool and system interface.

  • PDF

Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things (사물인터넷의 경량화 장치를 위한 안전한 Pre-shared Key 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.1-6
    • /
    • 2015
  • The IoT(Internet of things) technology enable objects around user to be connected with each other for sharing information. To support security is the mandatory requirement in IoT because it is related to the disclosure of private information but also directly related to the human safety. However, it is difficult to apply traditional security mechanism into lightweight devices. This is owing to the fact that many IoT devices are generally resource constrained and powered by battery. PSK(Pre-Shared Key) based approach, which share secret key in advance between communication entities thereafter operate security functions, is suitable for light-weight device. That is because PSK is costly efficient than a session key establishment approach based on public key algorithm. However, how to safely set a PSK of the lightweight device in advance is a difficult issue because input/output interfaces such as keyboard or display are constrained in general lightweight devices. To solve the problem, we propose and develop a secure PSK configuration scheme for resource constrained devices in IoT.

The Study of Interaction Design for Preventing and Reducing of Carsickness of Passengers in an Autonomous Mobility (자율주행 모빌리티 탑승자의 멀미 예방 및 완화를 위한 효과적인 인터렉션 디자인 연구)

  • Kim, Soo-Hyun;Kim, Jae-Yeop
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.447-457
    • /
    • 2020
  • Mobility passengers with over four levels of autonomous driving are more likely to feel carsickness because they do not drive independently. Therefore study on how to prevent or mitigate carsickness are needed to ensure comfortable and productive moving experience of passengers. Therefore this study looked into prior researches on the causes and solutions of carsickness and conducted a survey on the specific situation of carsickness among the general public. Based on this preliminary study the four interaction guide lines for preventing and mitigating of carsickness were designed and validated by performing a CVT (Concept value test). The study have shown that people prefer auditory sense and somatic senses for response in carsickness. These current have been similar in CVT and I believe that specific interaction design proposals and validations will be needed in the future.

The Agenda-Setting Process in Cyberspace: The Difference between Open Cyberspace and Closed Cyberspace (사이버공간의 특성과 의제 전개과정: 일반네티즌공간과 참여네티즌공간의 차이)

  • Park, Eun-Hee;Lee, Soo-Young
    • Korean journal of communication and information
    • /
    • v.18
    • /
    • pp.99-130
    • /
    • 2002
  • This study examines whether cyberspace produced by computer mediated communication(CMC) would perform the public sphere through the agenda-setting process. By doing this, this study focused on how the cyberspace agenda is set and on how the characteristics of cyberspace and the mass media influence the cyberspace agenda-setting process. Through this study, the possibility of cyberspace as the public sphere is found although the characteristics of cyberspace decide this possibility. In particular, in order for cyberspace to contribute to enhancing democracy as a form of alternative media, the interaction among cyberspace, mass media and the off-line arena is a necessary condition. The interaction between cyberspace and mass media regarding the Sungsoo Women's Middle School violence case provides two very important points. First, cyberspace helps the individual agenda to be adopted by mass media as the media agenda. Second, mass media confirmed the credibility of cyberspace agenda through reporting. In addition, this study reveals that cyberspace would perform as the public sphere only when the interaction between on-line and off-line is provided.

  • PDF

Revealing Hidden Relations between Query-Words for an Efficient Inducing User's Intention of an Information Search (효율적 검색의도 파악을 위한 쿼리 단어 가시화에 관한 연구)

  • Kwon, Soon-Jin;Hong, Chul-Eui;Kim, Won-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.44-52
    • /
    • 2012
  • This paper proposes to increase an efficiency of somebody searching information by a visualization of an unseen query words with well-selected user's intent structures. If a search engine identifies user's intent to pursue information, it would be an effective search engine. To do so, it is needed that relationships between query-words are to be visible after recovering words lost during formulated, and that an intention structure/elements is to be established. This paper will review previous studies, after then, define a simple structure of the search intent, and show a process to expand and to generate the query words appropriate to the intent structure with a method for the visualization of the query words. In this process, some examples and tests are necessary that one of the multiple intent structured layers is to assign to a range of query-words. Increasing/Decreasing an efficiency are analyzed to find. Future research is needed how to automate a process to extend structural nodules of user's intent.

Deduction on The Problems and Improve The Way of The Successful Bidder Determination Method for Turnkey·Alternative Bid Construction (턴키·대안입찰공사 낙찰자 결정방식의 문제점 및 개선 방안 도출)

  • Park, Hong-Tae;Lee, Yang-kyu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.6
    • /
    • pp.1881-1891
    • /
    • 2014
  • Full system of turnkey deliberation committee in 2010 was abolished and permanent Deliberation committee was introduced. So far, ordering organization selected the best method suitable for the design and comprehensive evaluation method in the turnkey bid construction. Comprehensive evaluation method have bid price design score coordination, weighted basis, the best design approach fixed amount, five successful bidder decision method in addition. Design deliberation branch committee in the successful bidder decision way configured and operated branch members of special design consultation committee, But main agent changed from committee deliberation pull system to permanent committee deliberation, as well as and The lobby burden was not improved. This similar to the past at the portion of the design deliberation and the way of the design deliberation in the turnkey bid construction. Therefore it is necessary to improve the design deliberation system. In other words, design score and technology competition should be adapted to determine a successful bid. This study suggested the operating system of the design deliberation, the decision method problems of the successful bidder and ways to improve the design deliberation.

The Binding Update Method using Delegation of Rights in MIPv6 (MIPv6에서 권한위임을 이용한 위치수정 방안)

  • 이달원;이명훈;황일선;정회경;조인준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1194-1203
    • /
    • 2004
  • The RR protocole, proposed in IETF mip6 WG and standardized by RFC 3775 at lune 2004, send a message 'Binding Update' that express MN's location information to CN safety and update location information. Standard RR protocole has some problems with initiating the protocol by the MN; it causes to increases in communication load in the home network, to increases communication delay between MN and CN. Also, is connoting vulnerability to against attacker who are on the path between CN and HA in security aspect. This paper proposes doing to delegate MN's location information update rights by HA new location information update method. That is, When update MN's location information to HA, Using MN's private key signed location information certificate use and this certificate using method that HA uses MN's location information at update to CN be. It decreases the route optimization overhead by reducing the number of messages as well as the using location information update time. Also, remove security weakness about against attacker who are on the path between CN and HA.

Offline Object Tracking for Private Information Masking in CCTV Data (CCTV 개인영상 정보보호를 위한 오프라인 객체추적)

  • Lee, Suk-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2961-2967
    • /
    • 2014
  • Nowadays, a private protection act has come into effect which demands for the protection of personal image information obtained by the CCTV. According to this act, the object out of interest has to be mosaicked such that it can not be identified before the image is sent to the investigation office. Meanwhile, the demand for digital videos obtained by CCTV is also increasing for digital forensic. Therefore, due to the two conflicting demands, the demand for a solution which can automatically mask an object in the CCTV video is increasing and related IT industry is expected to grow. The core technology in developing a target masking solution is the object tracking technique. In this paper, we propose an object tracking technique which suits for the application of CCTV video object masking as a postprocess. The proposed method simultaneously uses the motion and the color information to produce a stable tracking result. Furthermore, the proposed method is based on the centroid shifting method, which is a fast color based tracking method, and thus the overall tracking becomes fast.