• Title/Summary/Keyword: Copying

Search Result 305, Processing Time 0.022 seconds

A Case Study of the Hindrance Factors of Open Innovation in Korean Large-Scale Companies Focused on WFGM Model (국내 대기업의 개방형 혁신 저해요인에 대한 WFGM 관점 분석 사례)

  • Cho, Yo-Han;Ryu, Christopher J.;Lim, Gyoo-Gun;Lee, Dae-Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.2
    • /
    • pp.249-263
    • /
    • 2012
  • Recently the open innovation is considered as one of the important issues for the survival strategy of a company in the industry. There have been several researches and practices on this topic. However, previous researches are mainly focused on the study of successful cases and some statistical analyses on the relationship between the open innovation and its performance. There are rare researches on the hindrance factors in the practical level. This paper tries to find some hinderance factors for the open innovation in Korean large-scale companies based on the WFGM(Want-Find-Get-Manage) model proposed by Gene Slowinski(2006). Especially this research focused on each processes of open innovation by in-depth interviews for two representative large companies in Korea. From the result of this research we come to know that the critical hindrance factor in the WANT step is the uncertain definition of the necessary technologies for the company. Issues on establishing and maintaining the innovation network are in the FIND step. Technology evaluation, technology introduction channel and technology copying issues are in the GET step. Communication issues, technology feasibility and lack of competition are in the MANAGE step. This paper finds some hindrance factors in each process step of open innovation, which gives some implications for the companies that want to adopt open innovation.

A Comparative Study on the Tailored Collar Patterns of Women's Jackets - Focus on Clothing Construction Textbooks - (여성복 테일러드 칼라 패턴 비교연구 - 의복구성학 교재를 중심으로 -)

  • Jeong, Hwa-Yeon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.4
    • /
    • pp.617-627
    • /
    • 2010
  • This study selected and compared 7 tailored collar making factors from 15 clothing construction university textbooks. According to the results, in 15 clothing construction textbooks, the neckline of a tailored collar was drawn at the same length as the back neck circumference of the bodice and the length of collar stand was 3cm in 10 textbooks. In addition, the length of the collar laying varied between 2cm and 4.5cm regardless of the width of the upper collar or the textile thickness. In 7 out of the 15 textbooks, the gorge line of the collar was drawn by illustrating the collar pattern on the bodice based on the roll line and then copying it symmetrically. On the other hand, the pattern of upper collar was made in 5 ways; and 2 books did not give any explanation in the sections dealing with patterns or sewing. In addition, 6 textbooks explained that inner and outer collars are sewn with a difference. The lapel pattern of the facing part was made in 4 ways; in addition, 3 textbooks did not provide an explanation and 4 books explained that the difference is given in the sewing. The textile thickness and elasticity need to be considered in collar pattern making; however, they were not specifically mentioned in most of the textbooks.

For the development of software industry, extensive software certification scheme (소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계)

  • Seo, Hee Suk;Kim, Sang Ho;Lee, Seung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.121-129
    • /
    • 2010
  • For the development of software industry, offers an expanded software authentication scheme caused by the unauthorized copying of software is to reduce the damage to software developers, retail sales and to promote the development of the software industry was studied. Serial Number of the current software registration is conducted in such a simple verification procedure if the Serial Number only illegal and can be installed on multiple computers, such as program code to allow third parties to enter the Serial Number, or the extract can be used without is a reality. The proposed extension to the software authentication system when you install the software, my phone authentication and MAC Address Authentication Service introduced to distinguish normal user, the user of the MAC Address of the server and software development company that was sent to the registered MAC Address of the computer to be run only by the use of genuine software and to make unauthorized copies of software generated by the software developer can reduce the damage of the proposed plan.

A Study on the Emotional Expressions of Design Hotel Interior Space (디자인 호텔 실내공간의 감성적 표현 특성에 관한 연구)

  • 김명선;김주연
    • Korean Institute of Interior Design Journal
    • /
    • v.13 no.4
    • /
    • pp.74-82
    • /
    • 2004
  • Urbanization created by modernization and industrialization has brought tremendous growth of hotel demand with city ' development such as population’s centralization, living environment changes, consumption emphasis, and internationalization. Moreover, the hotel industry has been developed in two ways. First, it has been diversified and popularized by hotel culture. Second, the hotel industry has been upgraded form focusing oh its specific targets. In the view of Hotel design, Hotel was shown as a social and cultural value. Customer can experience the space, not normal big sizes, but being new and reflecting trends regardless of any purposes or locations. The hotels that were resulted in development of American economy and construction since the 1980 had new design concepts. These hotels were one of the examples showing pluralism requiring on modern society. In the case of Korea, Korean Architect Company have built in copying or repacked western hotel without considering Korean local conditions. Korean company just tried to make large scales, high-story buildings, and chain hotels. Nevertheless, it is the current trend to understand the customer's sensitivity and viewpoint by introducing a new style of hotel management that requires variety and different characteristics of hotel design. Therefore, the purpose of this study presents a direction of the future hotel architecture by analyzing design characters of domestic and international hotels, by collecting various consumer's requests.

Corescanner (코아스캐너)

  • 김중열
    • The Journal of Engineering Geology
    • /
    • v.7 no.1
    • /
    • pp.11-26
    • /
    • 1997
  • Through the Korea-Germany joint project, a novel method, that is, an optical Corescanner (Stereophotogramrnetry) of acquisition, evaluation and display of struct-ural elements of drill cores has heen realized. AH scannable cores can he digitally stored on a storage device(dat tape, optical disc etc.) and available for further an-alysis using diverse software facilities. The use of this scanning technique was d-emonstrated on the cores derived from the metamorphosed sedimentary rocks in our country. Recent studies showed a great potential of using the Corescanner with high resolution not only for avoiding ambiguities of drill log interpretation due to the capability of accurate quantative analysis of structural elements, but also for replacing the cores themselves as a data-base one via completely copying of the core outlook.

  • PDF

The Legal Protestation for Interior Design and Protection Status of Interior Design - A Comparative Study : Design Protection and Trademarks for Interior Design between ROK and U.S.A. - (실내디자인 보호체계 및 현황에 관한 연구 - 미국과 한국의 디자인 및 상표등록 사례비교를 중심으로 -)

  • Ryu, Hojeong;Ha, Mikyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.23 no.3
    • /
    • pp.134-143
    • /
    • 2014
  • The protection of Design is very important issues in these days. Even though Interior Design is also one of important design sections, it is relatively unprotected by formal intellectual property laws, yet creativity and innovation flourish. The needs for protection of Interior Design have been creased. The aim of this study is to suggest the weakness of the system for protection of Interior Design. The proposed research is comprised of two themes. One is to research Acts related to protection of Interior Design. The second is to study the registered cases under the Design Protection Acts. These two theme is generated by the comparative review between ROK and U.S.A. Through these comparative results, this study propose some considerations for an effective protection for Interior Design. Design need to be registered in the hole image of the space not a partial element. The concept needs to be protected because it is more effective way to respond the copying. Exterior for facade and Interior Design need to be registered in one registration to use the protection system actively.

Development of a Business Model of the Robot Industry in the Convergence Age (컨버전스 시대에 로봇산업의 비즈니스 모델 개발)

  • Seo, Kwang-Kyu;Ahn, Beum-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.895-899
    • /
    • 2009
  • This paper presents a business models of the robot industry for copying with aging society that facilitates to create new business opportunities in the convergence age. In order to identify the market drivers for both convergence and aging society, the trends of them analyzed. Through constructing and analyzing market value chain, we design a set of the business model of the robot industry focused on u-health robots of a convergence service type integrated ubiquitous, health and robot. In addition, we describe the evolution path of the proposed business model in terms of technology development and market. Finally, we develop a matrix based evaluation framework to measure and assess the effectiveness of the business model.

Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain

  • Pham, Giao N.;Kwon, Ki-Ryong;Lee, Eung-Joo;Lee, Suk-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.4
    • /
    • pp.152-159
    • /
    • 2017
  • Three-dimensional (3D) printing is applied to many areas of life, but 3D printing models are stolen by pirates and distributed without any permission from the original providers. Moreover, some special models and anti-weapon models in 3D printing must be secured from the unauthorized user. Therefore, 3D printing models must be encrypted before being stored and transmitted to ensure access and to prevent illegal copying. This paper presents a selective encryption algorithm for 3D printing models based on clustering and the frequency domain of discrete cosine transform. All facets are extracted from 3D printing model, divided into groups by the clustering algorithm, and all vertices of facets in each group are transformed to the frequency domain of a discrete cosine transform. The proposed algorithm is based on encrypting the selected coefficients in the frequency domain of discrete cosine transform to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The decrypting error is approximated to be zero. The proposed algorithm provides a better method and more security than previous methods.

The Design and Implementation of the SRTPIO Module for a Real-time Multimedia Data Transport (실시간 멀티미디어 데이타 전송을 위한 SRTPIO 모듈 설계 및 구현)

  • Nam, Sang-Jun;Lee, Byung-Rae;Kim, Tai-Woo;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.621-630
    • /
    • 2001
  • Recently, users' demands for multimedia service are increasing. But, server systems offer inefficient multimedia data service to users. In this paper, to transport multimedia data in the server system more efficiently, we propose the SRTPIO(Special RTP Input/Output) module that process the RTP(Real-time Transport Protocol) data in the kernel with the SIO(Special Input/Output) Mechanism. The SIO mechanism improve a transfer speed because it reduces overheads associated with data copying and context-switching between the user mode and the kernel mode occured in general server system in the kernel-level. The SRTPIO module, integrating the SIO mechanism and the RTP data processing in the kernel, support efficient multimedia data transfer architecture.

  • PDF

Performance Analysis of DiffServ Networks for Providing (QoS 제공을 위한 차등서비스 망 성능분석)

  • Lim, Seog-Ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.448-451
    • /
    • 2006
  • Currently the bolt joint defect occurs from the steel bridge which is in the process of using but that investigation about each kind defect is lacking state. Research to see consequently the high strength bolt joint sliding conduct bring the model it used a structural analysis program LUSAS numerical analysis execution and a plan for Steel Box Girder Bridge copying full-size H-Beam and plan pretensioned bolt force 100%. 75%, 50% and 25% pretensioned force it acted in standard. And a hold an examination, against the sliding loads which it follows in the pretensioned force it will analysis.

  • PDF