• Title/Summary/Keyword: Big6 model

Search Result 311, Processing Time 0.027 seconds

Six sigma, a sure quality or vapour one? (6 시그마 프로그램의 비판과 효과적 실현방안)

  • Kim Tai-Kyoo
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 1998.11a
    • /
    • pp.143-155
    • /
    • 1998
  • Many leading companies know that the best quality dominates the world economy in the next 21 century and Six Sigma Program of Motorola Corporation could be considered as a typical model for it. Six Sigma Program is based on the quantitative analysis and the professional qualify manager's training. In fact, this program is a strategy to accomplish the total quality innovation by applying the standardized quality control techniques to the manufacturing or non-manufacturing operation parts. Since many companies recognized their successes and vision, leading domestic companies are very much interested in establishing and driving this program. However, they must understand the meaning of the program correctly and prepare the practicing strategy sufficiently, since there are many differences in ways to drive between other quality program such as TQM and Six Sigma Program. Otherwise, it should lead a big disappointment and another vapour of management paradigm. This study considers the concepts and features of Six Sigma Program of Motorola Corporation and suggest the effective practicing strategy, pointing out the possible problems.

  • PDF

A Study on Improvement in Gas Safety Management System for Decreasing Gas Accident (가스사고 감소를 위한 가스아전관리체계 개선에 관한 연구)

  • 정원익;양광모;강경식
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.1
    • /
    • pp.1-10
    • /
    • 2004
  • Safety management was divided by the competent authorities supplier, and customer with responsibility and authority. Gas accident were caused by treatment problem on the supplier and user, on technical and use management mater, on facilities and goods, and included problem with gas safety connection system. Especially, the big accident of the inside and outside of the country occurred during recent year was newly recognized with the whole society about safety. This study is present standard application plan of each department to use planning gas technical standard and gas utilization standard of introduction model than statute for change of self-regulation management system and complicated regulation of examination center and order.

Analysis of Ellerman Bomb Spectra Observed by FISS

  • Seo, Minju;Chae, Jongchul;Lee, Jeongwoo
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.2
    • /
    • pp.61.3-61.3
    • /
    • 2017
  • We have studied the high-resolution $H{\alpha}$ and Ca II $8542{\AA}$ line profiles of Ellerman Bombs (EBs) obtained with the Fast Imaging Solar Spectrograph (FISS) installed on the 1.6m Goode Solar Telescope (GST) in Big Bear Solar Observatory (BBSO). The FISS spectra of EBs are compared with synthetic profiles computed using RH non-LTE radiative transfer code and a set of 1D atmospheric models with local transient heating, the latter of which is modeled by varying local temperature enhancement in magnitude and height. We could reproduce each of the observed $H{\alpha}$ and Ca II line profiles separately with different atmospheric models, but not with a single atmospheric model. To fit the observed $H{\alpha}$ lines we often need much higher temperature enhancements than those needed for fitting Ca II lines. Possible causes for this temperature mismatch are briefly discussed.

  • PDF

Development of Bundling Machine for Allium-odorum (부추 단 묶음 결속기의 개발)

  • Kim, Yong-Seok;Park, Te-Pyo;Park, Sung-Hee;Park, Sung-Ho;Yang, Soon-Young
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.17 no.6
    • /
    • pp.56-62
    • /
    • 2008
  • An Allium-odorum is difficult material to handle because it is soft and weak mechanically. For bundling work of allium-odorum, we must grip in the bundle shape of unit weight. However it is difficult to grip allium-odorum by hand because the bundle bulk is very big. Especially, in packing work, the bundle shape of allium-odorum package is more important than other vegetables because the sale price depend on the bundle shape. In this paper, we propose bundling mechanism for a rectangular shape, and semi-auto bundling mechanism by a eccentric roller and a triangular link. We carry out mechanical model and analysis respectively using the CATIA V5 and SimDesigner. We have manufactured the prototype of the semi-automatic bundling machine, and got satisfied result through field test. This machine is in the process of commercialization.

Environmental Distribution of Air Pollutants and Environmental Risk Assessment in Regional Scale

  • Matsumoto, Fumio;Saito, Mitsugu;Otsuka, Naohiro
    • International Journal of Safety
    • /
    • v.9 no.1
    • /
    • pp.35-42
    • /
    • 2010
  • We measured the concentrations of air pollutants at several residential sites, roadside sites and industrial sites in Iwate Prefecture, Japan. And the concentration distributions of air pollutants were estimated by atmospheric dispersion model using air emissions data. Based on those results, we calculated environmental risk of air pollutants emitted in Iwate Prefecture. As a result, it was found that the surround of factories with high emissions and highly toxic chemicals and the roadsides were high risk area, benzo(a)pyrene, formaldehyde and ozone exceeded the $10^{-5}$ risk level. Moreover, we tried to use "Loss of life expectancy: LLE" for an index to explain those risk to general public intelligibly. The total LLE of the carcinogenic chemicals was about 8.6 hours. Moreover, LLE of ozone was about 9.2 hours. Ozone has a big influence compared with the carcinogenic chemicals.

What is the Switching Intention from Existing Payment to Mobile Payment Service?

  • Lee, Sae-Bom;Lee, Joon-Young;Moon, Jae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.6
    • /
    • pp.59-66
    • /
    • 2018
  • Recently, the use of mobile payment, called "Pay" payment, is increasing such as 'KakaoPay' and 'SamsungPay'. In Korea, various mobile payment services are running and emerging. The purpose of this study is to examine the intention to switch from using existing credit cards or check card to mobile payment service based on the two-factor theory. We empirically examined the effect of the two factors, the factors that enable switching and the factors that inhibit switching. Therefore, the study use switching cost and switching benefit as parameters to confirm the effect on the switching intention. In addition, this study intends to analyze the differences between two subgroups by the degree of personal innovativeness. We survey smartphone users and credit card or check card users, and analyzed the Smart PLS 3.0 using structural equation model to verify the significance of the research hypothesis.

A Novel Unweighted Combination Method for Business Failure Prediction Using Soft Set

  • Xu, Wei;Yang, Daoli
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1489-1502
    • /
    • 2019
  • This work introduces a novel unweighted combination method (UCSS) for business failure perdition (BFP). With considering features of BFP in the age of big data, UCSS integrates the quantitative and qualitative analysis by utilizing soft set theory (SS). We adopt the conventional expert system (ES) as the basic qualitative classifier, the logistic regression model (LR) and the support vector machine (SVM) as basic quantitative classifiers. Unlike other traditional combination methods, we employ soft set theory to integrate the results of each basic classifier without weighting. In this way, UCSS inherits the advantages of ES, LR, SVM, and SS. To verify the performance of UCSS, it is applied to real datasets. We adopt ES, LR, SVM, combination models utilizing the equal weight approach (CMEW), neural network algorithm (CMNN), rough set and D-S evidence theory (CMRD), and the receiver operating characteristic curve (ROC) and SS (CFBSS) as benchmarks. The superior performance of UCSS has been verified by the empirical experiments.

Crime hotspot prediction based on dynamic spatial analysis

  • Hajela, Gaurav;Chawla, Meenu;Rasool, Akhtar
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1058-1080
    • /
    • 2021
  • Crime is not a completely random event but rather shows a pattern in space and time. Capturing the dynamic nature of crime patterns is a challenging task. Crime prediction models that rely only on neighborhood influence and demographic features might not be able to capture the dynamics of crime patterns, as demographic data collection does not occur frequently and is static. This work proposes a novel approach for crime count and hotspot prediction to capture the dynamic nature of crime patterns using taxi data along with historical crime and demographic data. The proposed approach predicts crime events in spatial units and classifies each of them into a hotspot category based on the number of crime events. Four models are proposed, which consider different covariates to select a set of independent variables. The experimental results show that the proposed combined subset model (CSM), in which static and dynamic aspects of crime are combined by employing the taxi dataset, is more accurate than the other models presented in this study.

Compressive sensing-based two-dimensional scattering-center extraction for incomplete RCS data

  • Bae, Ji-Hoon;Kim, Kyung-Tae
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.815-826
    • /
    • 2020
  • We propose a two-dimensional (2D) scattering-center-extraction (SCE) method using sparse recovery based on the compressive-sensing theory, even with data missing from the received radar cross-section (RCS) dataset. First, using the proposed method, we generate a 2D grid via adaptive discretization that has a considerably smaller size than a fully sampled fine grid. Subsequently, the coarse estimation of 2D scattering centers is performed using both the method of iteratively reweighted least square and a general peak-finding algorithm. Finally, the fine estimation of 2D scattering centers is performed using the orthogonal matching pursuit (OMP) procedure from an adaptively sampled Fourier dictionary. The measured RCS data, as well as simulation data using the point-scatterer model, are used to evaluate the 2D SCE accuracy of the proposed method. The results indicate that the proposed method can achieve higher SCE accuracy for an incomplete RCS dataset with missing data than that achieved by the conventional OMP, basis pursuit, smoothed L0, and existing discrete spectral estimation techniques.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.