This experimental research explores the effect of background music of TV documentary which can be classified as channel factor in the field of media effect, on audience's recall memory, flow, arousal of interest, evaluation of documentary. Most previous researches of media effect focused on the effect of sender factor and message factor on audience's memory, understanding, acquirement of knowledge, attitude, action. However the number of researches on the effect of background music on audience's various dependent variables is extremely limited, especially it is very difficult to find studies on the effect of background music of TV documentary on audience. Therefore this research tries to find the effect of background music of TV documentary on audience's recall memory, flow, arousal of interest, evaluation. For this research of experiment, 2 groups of subjects composed of 101 university students were exposed to 2 different video clips of TV documentary, one with background music, the other without it, After this experiment, Questions which were designed to measure audience's recall memory, flow, arousal of interest, evaluation were asked and analysed. This research found that background music of TV documentary increased audience's flow, degree of interest and raised evaluation, However meaningful effect of background music on audience's recall memory was not found.
Firms that have adopted internet technology have been confused by distorted market signals. It is natural to look at marketplace outcomes for guidance, when confronted with a new business phenomenon. However, market signals can be unreliable in the early states of any important new information technology. New technologies trigger rampant experimentation, and the experimentation is often unsustainable. As a result, market behavior is distorted and must be interpreted cautiously. In Chapter 1, we review a concept of business model and roles of strategies in a business model. In Chapter 2, we discuss a strategic auditing method for analyzing market/channel positioning, product/service positioning, value chain/value network positioning and external environmental factors. In chapter 3, we introduces major frameworks for understanding factors forming strategies. The strategic grid model categorizes four quadrants depending on the level of impacts of information technology on operation and strategy. The strategic alignment model presents a new method of assessing an alignment of information technology and business throughout all elements of a business model. In this research, we review the concept of a business model. This research introduces factors that shape strategies and new frameworks for understanding these factors. The research objective of this manuscript is to present a guidance for firms how to use information technology for attaining sustainable competitive advantages.
Kim, Hyun Su;Chun, Seung Man;Chung, Yun Seok;Park, Jong Tae
Journal of the Institute of Electronics and Information Engineers
/
v.53
no.4
/
pp.3-11
/
2016
In the environment of Internet of Things (IoT), IoT devices are limited by physical components such as power supply and memory, and also limited to their network performance in bandwidth, wireless channel, throughput, payload, etc. Despite these limitations, resources of IoT devices are shared with other IoT devices. Especially, remote management of the information of devices and patients are very important for the IoT healthcare service, moreover, providing the interoperability between the healthcare device and healthcare platform is essential. To meet these requirements, format of the message and the expressions for the data information and data transmission need to comply with suitable international standards for the IoT environment. However, the ISO/IEEE 11073 PHD (Personal Healthcare Device) standards, the existing international standards for the transmission of health informatics, does not consider the IoT environment, and therefore it is difficult to be applied for the IoT healthcare service. For this matter, we have designed and implemented the IoT healthcare system by applying the oneM2M, standards for the Internet of Things, and ISO/IEEE 11073 DIM (Domain Information Model), standards for the transmission of health informatics. For the implementation, the OM2M platform, which is based on the oneM2M standards, has been used. To evaluate the efficiency of transfer syntaxes between the healthcare device and OM2M platform, we have implemented comparative performance evaluation between HTTP and CoAP, and also between XML and JSON by comparing the packet size and number of packets in one transaction.
Social network services based on openness, connectedness, and mass participation are reshaping many aspects of how companies conduct business and create value for their customers. For instance, Facebook and Twitter are expected to play a pivotal role as a new communication channel through which companies-forge close relationships with their customers for co-creation of value for mutual benefits. Given the potential of social network services, it is not surprising that many companies have strategically invested in social network services to reach out to customers. Despite the growing interest in social network services as a platform to connect companies and their customers, few guidelines exist about how managers can effectively utilize social network services in forging relationships with their customers. As such, scholars should pay greater attention to how firms can successfully develop relationships with their customers on social network services. In particular, this study employs the S-O-R (stimulus-organism-response) framework as a theoretical lens to develop a research model that explains customers' participation in the value co-creation platform that companies opened on Twitter. According to the S-O-R framework, certain types of individuals' behaviors can be best understood based on a causal link from environmental stimulus to organism, and response. We apply the S-O-R framework to understand how ubiquitous connectivity (stimuli) can influence customers' experience (organism) with companies on Twitter, which in turn influence their participation behavior (response). Two steps have been undertaken to empirically test the research model. First, we conducted a content analysis of tweets written by customers who follow companies on Twitter. As a result, we found event/promotion participation, company support, and giving feedback as three specific types of customer participation behavior. Second, we conducted a web-based survey to test research hypotheses in the research model. Participations in the survey were solicited to customers who followed companies on Twitter. As a result, a total of 115 respondents have completed the survey. Data were analyzed using the partial least square (PLS) technique. The results of data analysis suggest that ubiquitous connectivity (stimuli) had strong positive effects on perceive usefulness, perceived enjoyment, and perceived intimacy (organism). Perceived intimacy showed positive effects on customer participation behavior (response), such as event participation, company support, and giving feedback. Perceived enjoyment was found to have strong positive effects on company support and giving feedback. On the other hand, perceived usefulness did not have significant impacts on the three types of customer participation behavior.
IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.
The Journal of Korean Institute of Communications and Information Sciences
/
v.38A
no.3
/
pp.277-288
/
2013
3GPP LTE-Advanced (Third Generation Partnership Project Long Term Evolution-Advanced) as a next generation mobile communication standard introduced small base stations such as femto cells or pico cells, and D2D (Device-to-Device) communications between mobiles in the proximity in order to satisfy the needs of rapidly growing wireless data traffic. A diverse range of topics has been studied to solve various interference situations which may occur within a single cell. In particular, an introduction of a small base station along with D2D communication raises important issues of how to increase the channel capacity and frequency efficiency in HetNets (Heterogeneous Networks). To this end, we propose in this paper methods to manage the interference between the macro cell and other small cells in the HetNet to improve the frequency efficiency. The proposed CCN (Cluster Coordinator Node)-assisted ICI (Inter-Cell Interference) avoidance methods exploit the CCN to control the interference in HetNet comprising of an MeNB (Macro enhanced Node-B) and a large number of small cells. A CCN which is located at the center of a number of small cells serves to avoid the interference between macro cell and small cells. We propose methods of resource allocation to avoid ICI for user equipments within the CCN coverage, and evaluate their performance through system-level computer simulations.
Proceedings of the Korean Powder Metallurgy Institute Conference
/
2002.07a
/
pp.25-37
/
2002
The most important industrial application of gamma radiation in characterizing green compacts is the determination of the density. Examples are given where this method is applied in manufacturing technical components in powder metallurgy. The requirements imposed by modern quality management systems and operation by the workforce in industrial production are described. The accuracy of measurement achieved with this method is demonstrated and a comparison is given with other test methods to measure the density. The advantages and limitations of gamma ray densitometry are outlined. The gamma ray densitometer measures the attenuation of gamma radiation penetrating the test parts (Fig. 1). As the capability of compacts to absorb this type of radiation depends on their density, the attenuation of gamma radiation can serve as a measure of the density. The volume of the part being tested is defined by the size of the aperture screeniing out the radiation. It is a channel with the cross section of the aperture whose length is the height of the test part. The intensity of the radiation identified by the detector is the quantity used to determine the material density. Gamma ray densitometry can equally be performed on green compacts as well as on sintered components. Neither special preparation of test parts nor skilled personnel is required to perform the measurement; neither liquids nor other harmful substances are involved. When parts are exhibiting local density variations, which is normally the case in powder compaction, sectional densities can be determined in different parts of the sample without cutting it into pieces. The test is non-destructive, i.e. the parts can still be used after the measurement and do not have to be scrapped. The measurement is controlled by a special PC based software. All results are available for further processing by in-house quality documentation and supervision of measurements. Tool setting for multi-level components can be much improved by using this test method. When a densitometer is installed on the press shop floor, it can be operated by the tool setter himself. Then he can return to the press and immediately implement the corrections. Transfer of sample parts to the lab for density testing can be eliminated and results for the correction of tool settings are more readily available. This helps to reduce the time required for tool setting and clearly improves the productivity of powder presses. The range of materials where this method can be successfully applied covers almost the entire periodic system of the elements. It reaches from the light elements such as graphite via light metals (AI, Mg, Li, Ti) and their alloys, ceramics ($AI_20_3$, SiC, Si_3N_4, $Zr0_2$, ...), magnetic materials (hard and soft ferrites, AlNiCo, Nd-Fe-B, ...), metals including iron and alloy steels, Cu, Ni and Co based alloys to refractory and heavy metals (W, Mo, ...) as well as hardmetals. The gamma radiation required for the measurement is generated by radioactive sources which are produced by nuclear technology. These nuclear materials are safely encapsulated in stainless steel capsules so that no radioactive material can escape from the protective shielding container. The gamma ray densitometer is subject to the strict regulations for the use of radioactive materials. The radiation shield is so effective that there is no elevation of the natural radiation level outside the instrument. Personal dosimetry by the operating personnel is not required. Even in case of malfunction, loss of power and incorrect operation, the escape of gamma radiation from the instrument is positively prevented.
In a power-asymmetry relationship like franchise system, a high dependent franchisee must often rely on its powerful partner. Therefore, in order to build up 'win-win' systems, therefore channel members should increase trust and commitment each other to enhance the relationship quality to sustain long-term cooperative relationships. First of all, to increase the relationship quality in franchise system, franchisor should increase franchisee's perception of the powerful franchisor's justice. The point of this research, I established basic hypotheses and comparative hypotheses to examine franchisor's behavior what franchisee expected which influences on franchisee's attitude and behavior in power - asymmetry relationship in franchise system. For the purpose of the empirical testing, managers of franchisee in the food service industry of Korea had been selected and analyzed, and major findings in this study as follow: First, the relational norm between franchisor and franchisee increased both distributive justice and procedural justice, especially relational norm had more effect on procedural justice than distributive justice. Second, distributive justice increased both economic commitment and social commitment while procedural justice just increased social commitment only but economic commitment. So, on the relational commitment, distributive justice was more important element than procedural justice. On the other hand, procedural justice had indirect effect on economic commitment through distributive and social commitment.
Purpose: Cavity growth process monitoring is to periodically monitor changes in common size and topography for general and observational grades to predict the rate of common growth. The purpose of this study is to establish a systematic cavity management plan by evaluating the general and observational class community in a non-destructive method. Method: Using GPR exploration equipment, the acquired surface image and the surrounding status image are analyzed in the GPR probe radargram in depth, profile, and cross section of the location. The exact location is selected using the distance and surrounding markings shown on the road surface of the initial detection cavity, and the test cavity is analyzed by calling the radar at the corresponding location. Result: As a result of monitoring tests conducted at a cavity 30 sites of general and observation grade, nine sites have been recovered. Changes in scale were seen in 21 cavity locations, and changes in size and grade occurred in 13 locations. Conclusion: The under road cavity is caused by various causes such as damage to the burial site, poor construction, soil leakage caused by groundwater leakage, waste and ground vibration. Among them, indirect factors could infer the effects of groundwater and localized rainfall.
In response to changes in the global market environment, companies in the Information and Communications Technology (ICT) industry have begun to pursue cooperation and competition on a business ecosystem level. In particular, to become a leader in the new growth engine industry of Internet of Things (IoT), companies around the globe aim to consolidate vertically up the value chain through a solid establishment of their platforms. This paper looks at Samsung and Xiaomi, whose strategies for creating an ecosystem based on their own platforms differ in accordance to the ecosystem in which they compete. An analysis of these two companies indicate that Samsung pursues a strategy to become the market standard by openly sharing its platform with complementary companies, whereas Xiaomi pursues a strategy that achieves value as a channel owner through the restriction on which companies may become partners. This paper concludes that as Samsung and Xiaomi strive to become IoT industry leaders, each company pursues a variant of a platform-based value chain integration strategy based on the specific nature of the ecosystems in which they compete, thereby creating value through a symbiotic relationship with their partner companies.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.