Journal of the Institute of Electronics Engineers of Korea CI
/
v.46
no.1
/
pp.35-45
/
2009
In an open environment such as Home Network, ZigBee Cluster comprising a plurality of Ato-cells is required to provide intense security over the movement of collected, measured data. Against this setting, various security issues are currently under discussion concerning master key control policies, Access Control List (ACL), and device sources, which all involve authentication between ZigBee devices. A variety of authentication methods including Hash Chain Method, token-key method, and public key infrastructure, have been previously studied, and some of them have been reflected in standard methods. In this context, this paper aims to explore whether a new method for searching for neighboring devices in order to detect device replications and Sybil attacks can be applied and extended to the field of security. The neighbor detection applied method is a method of authentication in which ACL information of new devices and that of neighbor devices are included and compared, using information on peripheral devices. Accordingly, this new method is designed to implement detection of malicious device attacks such as Sybil attacks and device replications as well as prevention of hacking. In addition, in reference to ITU-T SG17 and ZigBee Pro, the home network equipment, configured to classify the labels and rules into four categories including user's access rights, time, date, and day, is implemented. In closing, the results demonstrates that the proposed method performs significantly well compared to other existing methods in detecting malicious devices in terms of success rate and time taken.
Companies do not be resolved by the FTA services of external aid should be operational by assigning dedicated personnel inside the company. FTA is a choice, not an essential trade agreement requirements. If the exporter contracts to provide a certificate of origin in trade agreements, it shall issue a certificate of origin of goods originating management is performed. When considering the future trend of spreading wide FTA, it should be extended to one year to take advantage of the FTA Certificate of Origin environments utilizing a comprehensive environment for regional countries that require proof of origin between certain countries, such as current. FTA utilization of the future is to utilize the GVC(Global Value Chain) efficiently. In other words, the expansion of the consumer market and take advantage of an efficient production base across borders. These environmental changes are needed development of the FTA utilization promotion and FTA experts. The experts studying how to procure raw materials or intermediate goods exports in a variety of regional foreign countries, to meet the rules of origin is required for a successful FTA utilization. One of the objectives of Origin managers are qualified experts in the country of origin can take advantage of the FTA plan. Therefore, managers of origin shall collect their ability to expand the understanding and information about the industry as an international business perspective beyond the Certificate of Origin. In addition, it should be in their best learning expertise for the introduction and development of country of origin control system in an effort to effectively perform its international FTA utilization. Once the FTA is more widespread in the future and build a common origin information it must not be disconnected until the export enterprises from terminal manufacturers systematically. Therefore origin management is preferred by expanding the knowledge base of teaching and learning in the common sense to the universal subject of specialization from professional schools to promote the relevant departments so that they can be opened in a college or university. An FTA hub linking East and West, also need the confidence that in order to become a center of Glabal Supply Chain Using an FTA Certificate of Origin and stable environment for importers to import products from the country offers. Certificate of Origin and all of them thoroughly exporters and companies related to the administration of origin and should create an atmosphere that can effectively respond to the origin verification. Korea shall endeavor to elicit a geopolitical value (FTA Hub), as well as securing a competitive advantage in the global industry leverage, trading at a reasonable price competitive products thereby enhancing production and economic growth through the FTA.
ACROSS device, which is composed of an implantable microphone, a signal processor, and a vibrating transducer, is a fullyimplantable middle ear hearing device(F-IMEHD) for the recovery of patients with hearing loss. And since a microphone is implanted under skin and tissue at the temporal bones, the amplitude of the sound wave is attenuated by absorption and scattering. And the vibrating transducer attached to the ossicular chain caused also the different displacement from characteristic of the stapes. For the gain control of auditory signals, most of implantable hearing devices with the digital audio signal processor still apply to fitting rules of conventional hearing aid without regard to the effect of the implanted microphone and the vibrating transducer. So it should be taken into account the effect of the implantable microphone and the vibrating transducer to use the conventional audio fitting rule. The aim of this study was to measure gain characteristics caused by the implanted microphone and the vibrating transducer attached to the ossicle chains for the gain compensation of ACROSS device. Differential floating mass transducers (DFMT) of ACROSS device were clipped on four cadaver temporal bones. And after placing the DFMT on them, displacements of the ossicle chain with the DFMT operated by 1 $mA_{peak}$ current was measured using laser Doppler vibrometer. And the sensitivity of microphones under the sampled pig skin and the skin of 3 rat back were measured by stimulus of pure tones in frequency from 0.1 to 8.9 kHz. And we confirmed that the microphone implanted under skin showed poorer frequency response in the acoustic high-frequency band than it in the low- to mid- frequency band, and the resonant frequency of the stapes vibration was changed by attaching the DFMT on the incus, the displacement of the DFMT driven with 1 $mA_{rms}$ was higher by the amount of about 20 dB than that of cadaver's stapes driven by the sound presssure of 94 dB SPL in resonance frequency range.
We used to LASSO-Cox method for determining prognostic factors of male breast cancer survival and showed the superiority of this method compared to Cox proportional hazard model in low sample size setting. In order to identify and estimate exactly the relative hazard of the most important factors effective for the survival duration of male breast cancer, the LASSO-Cox method has been used. Our data includes the information of male breast cancer patients in Fars province, south of Iran, from 1989 to 2008. Cox proportional hazard and LASSO-Cox models were fitted for 20 classified variables. To reduce the impact of missing data, the multiple imputation method was used 20 times through the Markov chain Mont Carlo method and the results were combined with Rubin's rules. In 50 patients, the age at diagnosis was 59.6 (SD=12.8) years with a minimum of 34 and maximum of 84 years and the mean of survival time was 62 months. Three, 5 and 10 year survival were 92%, 77% and 26%, respectively. Using the LASSO-Cox method led to eliminating 8 low effect variables and also decreased the standard error by 2.5 to 7 times. The relative efficiency of LASSO-Cox method compared with the Cox proportional hazard method was calculated as 22.39. The19 years follow of male breast cancer patients show that the age, having a history of alcohol use, nipple discharge, laterality, histological grade and duration of symptoms were the most important variables that have played an effective role in the patient's survival. In such situations, estimating the coefficients by LASSO-Cox method will be more efficient than the Cox's proportional hazard method.
Kim, Seung-Hyun;Jeon, Jung-Ik;Lee, Jang-Hyun;Lee, Won-Joon
Korean Journal of Computational Design and Engineering
/
v.15
no.6
/
pp.425-439
/
2010
The current challenge with which most shipyards are forced is to reduce the design time and the time-to-delivery because of explosive order of shipbuilding. Collaborative design and product data management have become important to reduce the lead time. Furthermore, enterprise information technologies such as ERP (Enterprise Resource Planning), SCM (Supply Chain management), and APS (Advanced Planning System) requires the collaborative environment. Also, manufacturing environment has been considered as a topic of strategic interest to get shorter product lifecycles in shipyards. Most shipyards have chosen an environment of ETO (Engineering To Order) strategy which designs and produces new products in response to various requirements of customer, rules and regulations. In the ATO (Assemble 10 Order) environment, most component parts have been designed to be procured or produced on the order requirement. The basic distinction between the ETO and ATO is the timing of the design. Thus in the ATO environment, it is more flexible in reducing the lead time to meet the specified requirements of customers. However, the ETO strategy requires new ship design process and ship product structures that are linked with the implementation of PLM. And, the function and architecture of current PLM solution has been designed based upon ATO environment properly. This paper presents the PLM architecture which effectively reflects the characteristics of shipbuilding. 4-layer architecture model is suggested to implement the PLM system. Also, implemented functions of ship PLM is explained in order to make a practical guidance for ship PLM implementation.
Journal of Korean Society of Industrial and Systems Engineering
/
v.43
no.3
/
pp.29-40
/
2020
Korean firms have been vigorously searching and exploring overseas market opportunities through export and overseas investment. As of end of 2019, there were more than 80,000 Korean overseas subsidiaries all over the world. With Korean overseas direct investment increasing recently, it became one of the important issues for overseas investors to be successful in the global market. There are a lot of studies on factors influencing the performance of overseas subsidiaries such as 'firm' and 'country' factors. This study empirically examines subsidiary performance determinants with 'industry architectures' by using a sample of 292 overseas Korean firm subsidiaries. Industry architectures are the stable but evolving sets of rules and roles through which labor is divided within a sector. This article considers how industry architectures shape success in international expansion. Industry architectures differ between countries, are not necessarily technologically determined, shape firms' capabilities and their competitive environment, and constitute a distinct level of analysis. We extract antecedents of related theory and empirically test its impact with a survey of Korean firms expanding in emerging economies. We would say this is the first study which tries to focus on industry architectures with the performance of Korean overseas subsidiaries. We find that separability and similarity of industry architectures across countries and localization of subsidiaries are robust and important predictors of success in international expansion. Our results suggest that industry architectures should be added to firm and country as an intermediate level of analysis that helps explain success in international expansion. While we established a pattern, much more remains to be done. We focus on the success of foreign operations, but we do not consider the broader benefits of going abroad, such as the learning or network effects that accrue at the level of the entire firm. The next obvious question is whether the results would differ in the developed market context. These we leave for future research to consider.
Purpose - The increasing share of Korean private label products (PLPs) in the domestic market helped generate lucrative revenue. In recent years, major South Korean retailers have begun to cast their sights on overseas markets and actively export their PLPs. In China, the proportion of private label fresh food (PLFF) is gradually expanding amid the development of the new retailing model. A profound understanding of the relationship between private label fresh produce and purchase intention may be the answer to helping Chinese retailer private labels expand supply chains in Korea. This study, taking Chinese retailers as an example, examines the impacts of selection factors of private label fresh food and perceived value on purchase intention. Apart from that, the relationship between the selection factors and purchase intention will be analyzed with perceived value as a mediator. Design/methodology - This work aims to empirically analyze the purchase intention of private label fresh food using statistical analysis. In this study, a hypothetical causal model consisting of 6 latent variables and 24 measured variables is developed based on the literature review. To validate the research hypotheses and the research model, SPSS23.0/AMOS23.0 is used to analyze factors such as validity and reliability, as well as structural equation modeling. Findings - The hypothetical model established in this study is of general applicability. In respect to PLFF, perceived value, while significantly influencing purchase intention in combination with four selection factors (perceived quality, perceived price, brand trust, and store image), mediates partially between the first three factors and purchase intention, which rules out the impact and mediating effect of store image on purchase intention. Originality/value - These research results, as helpful insights into the present circumstances of Chinese PLFF in the domestic market, provide useful information and guidance for Korean retailers and service providers to innovate production and service, as well as develop marketing and promotion strategies, so that they can shift private label goods with advantages from domestic demand to export, thus increasing overseas profitability. Further, this work will also contribute to relevant research.
As the WTO·DDA continues to stagnate, mega FTAs such as the TPP will likely play the leading role in rule-making of trade for some time to come, creating a 'spaghetti bowl' of trade rules. FTAs, notably high-standard and broad-based regional or mega-FTAs, are the appropriate means to achieve this objective, because they cover many of the policy measures that are needed for the development of global value chains(GVC). The highest quality FTAs are increasingly adding new features like regulatory harmonization that may also foster GVC growth in partner countries. Complementary relationships among markets along value chains, involving both goods and services, also complicate analysis. This is particularly relevant when thinking about policy, since the traditional tendency to think about policies and regulate markets in unconnected silos can lead to unintended and undesirable results. This paper examines the current states of FTAs to determine which are more likely to push this latest wave of globalization further and faster, and explores the plans that are most helpful for GVC growth.
Batbold, D.;Baigalmaa, Dovdon;Ganbaatar, B.;Chimedsuren, O.
Perspectives in Nursing Science
/
v.7
no.1
/
pp.50-54
/
2010
The studies of M. Colombo (1989) and W. Lange (1992) showed that 30~40% of people became chronic after suffering from hepatitis B virus (HBV) and C virus (HCV) infection, and about 50% of the chronic cases transformed into primary liver cancer. There have been few studies done in Mongolia on hepatitis infection among health professionals, particularly in nurses. In a study done by Chimedsuren (8), the study showed that 19.4% of people with identified surface hepatitis B antigen (HBsAg) and antibodies to hepatitis C virus and 8% of people with the identified nucleotide of RNA for the hepatitis C virus (polymerase chain reaction) had an acute form of hepatitis C. Studies on the hepatitis virus genome damaging effect on liver cells showed that genotype 8 (A, B, C, D, E, F, G, TTV) had the most damaging effect on liver cells (Hahn and Faeka, 2007). Several studies have shown a relationship between hepatitis B virus infection and a lack of compliance regarding safety regulations and rules by medical personnel. Results of a study from the Maternal and Child Health Research Center showed that tests done to detect hepatitis B virus antigen and antibodies to C virus did not reveal anything. Both antigen and antibodies in 69% cases did not show, and separately, B virus and antibodies to hepatitis C virus were identified in 13% and 9%, respectively. Results of the tests taken from health personnel in Shastin Central Hospital showed that in 76% of the cases, the B virus antigen with C virus antibodies was not identified. In 8% of the cases, the B virus antigen was present on its own. The combination of B the virus antigen and C virus antibodies were present in 8% of nurses and doctors, respectively. 82% of the cases had negative results for the detection of a combination of B virus antigen and C virus antibodies taken from health personnel from the State Central Clinical Hospital whereas the B virus antigen and C virus antibodies by themselves were present in 7% and 14% of the cases, respectively. Combined cases of the B virus antigen and C virus antibodies were identified in 4% of the personnel. Results of the tests taken from the health personnel in the Hospital of the Ministry of Justice and Internal Affairs showed that in 79% of the cases, the B virus antigen with C virus antibodies were not identified. Separately, the B virus and antibodies to hepatitis C virus were identified in 8% and 13% of the cases, respectively.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.