• 제목/요약/키워드: Copying

검색결과 305건 처리시간 0.028초

국내 대기업의 개방형 혁신 저해요인에 대한 WFGM 관점 분석 사례 (A Case Study of the Hindrance Factors of Open Innovation in Korean Large-Scale Companies Focused on WFGM Model)

  • 조요한;류정호;임규건;이대철
    • Journal of Information Technology Applications and Management
    • /
    • 제19권2호
    • /
    • pp.249-263
    • /
    • 2012
  • Recently the open innovation is considered as one of the important issues for the survival strategy of a company in the industry. There have been several researches and practices on this topic. However, previous researches are mainly focused on the study of successful cases and some statistical analyses on the relationship between the open innovation and its performance. There are rare researches on the hindrance factors in the practical level. This paper tries to find some hinderance factors for the open innovation in Korean large-scale companies based on the WFGM(Want-Find-Get-Manage) model proposed by Gene Slowinski(2006). Especially this research focused on each processes of open innovation by in-depth interviews for two representative large companies in Korea. From the result of this research we come to know that the critical hindrance factor in the WANT step is the uncertain definition of the necessary technologies for the company. Issues on establishing and maintaining the innovation network are in the FIND step. Technology evaluation, technology introduction channel and technology copying issues are in the GET step. Communication issues, technology feasibility and lack of competition are in the MANAGE step. This paper finds some hindrance factors in each process step of open innovation, which gives some implications for the companies that want to adopt open innovation.

여성복 테일러드 칼라 패턴 비교연구 - 의복구성학 교재를 중심으로 - (A Comparative Study on the Tailored Collar Patterns of Women's Jackets - Focus on Clothing Construction Textbooks -)

  • 정화연
    • 한국의류학회지
    • /
    • 제34권4호
    • /
    • pp.617-627
    • /
    • 2010
  • This study selected and compared 7 tailored collar making factors from 15 clothing construction university textbooks. According to the results, in 15 clothing construction textbooks, the neckline of a tailored collar was drawn at the same length as the back neck circumference of the bodice and the length of collar stand was 3cm in 10 textbooks. In addition, the length of the collar laying varied between 2cm and 4.5cm regardless of the width of the upper collar or the textile thickness. In 7 out of the 15 textbooks, the gorge line of the collar was drawn by illustrating the collar pattern on the bodice based on the roll line and then copying it symmetrically. On the other hand, the pattern of upper collar was made in 5 ways; and 2 books did not give any explanation in the sections dealing with patterns or sewing. In addition, 6 textbooks explained that inner and outer collars are sewn with a difference. The lapel pattern of the facing part was made in 4 ways; in addition, 3 textbooks did not provide an explanation and 4 books explained that the difference is given in the sewing. The textile thickness and elasticity need to be considered in collar pattern making; however, they were not specifically mentioned in most of the textbooks.

소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계 (For the development of software industry, extensive software certification scheme)

  • 서희석;김상호;이승재
    • 디지털산업정보학회논문지
    • /
    • 제6권3호
    • /
    • pp.121-129
    • /
    • 2010
  • For the development of software industry, offers an expanded software authentication scheme caused by the unauthorized copying of software is to reduce the damage to software developers, retail sales and to promote the development of the software industry was studied. Serial Number of the current software registration is conducted in such a simple verification procedure if the Serial Number only illegal and can be installed on multiple computers, such as program code to allow third parties to enter the Serial Number, or the extract can be used without is a reality. The proposed extension to the software authentication system when you install the software, my phone authentication and MAC Address Authentication Service introduced to distinguish normal user, the user of the MAC Address of the server and software development company that was sent to the registered MAC Address of the computer to be run only by the use of genuine software and to make unauthorized copies of software generated by the software developer can reduce the damage of the proposed plan.

디자인 호텔 실내공간의 감성적 표현 특성에 관한 연구 (A Study on the Emotional Expressions of Design Hotel Interior Space)

  • 김명선;김주연
    • 한국실내디자인학회논문집
    • /
    • 제13권4호
    • /
    • pp.74-82
    • /
    • 2004
  • Urbanization created by modernization and industrialization has brought tremendous growth of hotel demand with city ' development such as population’s centralization, living environment changes, consumption emphasis, and internationalization. Moreover, the hotel industry has been developed in two ways. First, it has been diversified and popularized by hotel culture. Second, the hotel industry has been upgraded form focusing oh its specific targets. In the view of Hotel design, Hotel was shown as a social and cultural value. Customer can experience the space, not normal big sizes, but being new and reflecting trends regardless of any purposes or locations. The hotels that were resulted in development of American economy and construction since the 1980 had new design concepts. These hotels were one of the examples showing pluralism requiring on modern society. In the case of Korea, Korean Architect Company have built in copying or repacked western hotel without considering Korean local conditions. Korean company just tried to make large scales, high-story buildings, and chain hotels. Nevertheless, it is the current trend to understand the customer's sensitivity and viewpoint by introducing a new style of hotel management that requires variety and different characteristics of hotel design. Therefore, the purpose of this study presents a direction of the future hotel architecture by analyzing design characters of domestic and international hotels, by collecting various consumer's requests.

코아스캐너 (Corescanner)

  • 김중열
    • 지질공학
    • /
    • 제7권1호
    • /
    • pp.11-26
    • /
    • 1997
  • 한.독 국제공동연구를 통하여 현실화된 코아스캐너는 세계적인 현기술수준에서 독보적이라 할 수 있다. 발췌된 코아의 외형은 촬영되고 또한 디지털 데이터화 함으로써 다음과 같은 기대효과가 약속되고 있다. $\circled1$ 거의 완벽한 코아 외형복제는 바로 코아 보관에 따른 제반 문제를 극복할 수 있는 기틀을 마련하는 것이 되겠으며, $\circled1$ 재래의 시추주상도가 보여준 불확실성은 다각적인 분석기법 내지 다양한 도면화기법에 의해 크게 해소됨으로써 향후 지질주상도 작성을 위한 새로운 면모를 보여 주는 것이 되었다. 본 논문에는 상기 기법이 국내 변성퇴적암 코아에 응용되어 그의 효율설이 입증되고 있음을 보여주고 있다.

  • PDF

실내디자인 보호체계 및 현황에 관한 연구 - 미국과 한국의 디자인 및 상표등록 사례비교를 중심으로 - (The Legal Protestation for Interior Design and Protection Status of Interior Design - A Comparative Study : Design Protection and Trademarks for Interior Design between ROK and U.S.A. -)

  • 유호정;함미경
    • 한국실내디자인학회논문집
    • /
    • 제23권3호
    • /
    • pp.134-143
    • /
    • 2014
  • The protection of Design is very important issues in these days. Even though Interior Design is also one of important design sections, it is relatively unprotected by formal intellectual property laws, yet creativity and innovation flourish. The needs for protection of Interior Design have been creased. The aim of this study is to suggest the weakness of the system for protection of Interior Design. The proposed research is comprised of two themes. One is to research Acts related to protection of Interior Design. The second is to study the registered cases under the Design Protection Acts. These two theme is generated by the comparative review between ROK and U.S.A. Through these comparative results, this study propose some considerations for an effective protection for Interior Design. Design need to be registered in the hole image of the space not a partial element. The concept needs to be protected because it is more effective way to respond the copying. Exterior for facade and Interior Design need to be registered in one registration to use the protection system actively.

컨버전스 시대에 로봇산업의 비즈니스 모델 개발 (Development of a Business Model of the Robot Industry in the Convergence Age)

  • 서광규;안범준
    • 한국산학기술학회논문지
    • /
    • 제10권4호
    • /
    • pp.895-899
    • /
    • 2009
  • 본 논문에서는 컨버전스 시대에 새로운 비즈니스 기회를 창출하기 위하여 고령화 사회에 대응하기 위한 로봇사업의 비즈니스 모델을 개발하고자 한다. 컨버전스 사회와 고령화 사회의 마켓 동인을 확인하기 위하여, 이들의 트렌드를 분석한다. 마켓의 가치사슬의 구성과 분석을 통하여 본 연구에서는 유비쿼터스, 헬스 그리고 로봇이 통합된 컨버전스 서비스 형태의 u-health 로봇에 초점을 맞추어 비즈니스 모델을 설계한다. 추가적으로 기술개발과 마켓을 축으로 제안된 비즈니스 모델의 진화 경로에 대하여 기술한다 마지막으로 제안된 비즈니스 모델의 효과성을 측정하고 평가하기 위한 매트릭스 기반의 평가 프레임워크를 개발한다.

Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain

  • Pham, Giao N.;Kwon, Ki-Ryong;Lee, Eung-Joo;Lee, Suk-Hwan
    • Journal of Computing Science and Engineering
    • /
    • 제11권4호
    • /
    • pp.152-159
    • /
    • 2017
  • Three-dimensional (3D) printing is applied to many areas of life, but 3D printing models are stolen by pirates and distributed without any permission from the original providers. Moreover, some special models and anti-weapon models in 3D printing must be secured from the unauthorized user. Therefore, 3D printing models must be encrypted before being stored and transmitted to ensure access and to prevent illegal copying. This paper presents a selective encryption algorithm for 3D printing models based on clustering and the frequency domain of discrete cosine transform. All facets are extracted from 3D printing model, divided into groups by the clustering algorithm, and all vertices of facets in each group are transformed to the frequency domain of a discrete cosine transform. The proposed algorithm is based on encrypting the selected coefficients in the frequency domain of discrete cosine transform to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The decrypting error is approximated to be zero. The proposed algorithm provides a better method and more security than previous methods.

실시간 멀티미디어 데이타 전송을 위한 SRTPIO 모듈 설계 및 구현 (The Design and Implementation of the SRTPIO Module for a Real-time Multimedia Data Transport)

  • 남상준;이병래;김태우;김태윤
    • 한국정보과학회논문지:정보통신
    • /
    • 제28권4호
    • /
    • pp.621-630
    • /
    • 2001
  • 최근 멀티미디어 서비스에 대한 사용자의 요구가 증가되고 있다. 그러나 서버 시스템은 이러한 멀티미디어 데이타를 사용자들에게 효율적으로 공급하지 못한다. 본 논문에서는 기존의 운영체제에 멀티미디어 데이타를 효율적으로 전송하기 위한 방안으로 RTP(Real-time Transport Protocol) 프로토콜을 SIO(Special Input/Output) 메커니즘과 함께 커널 영역에 내장하는 SRTPIO(Special RTP Input/Output) 모듈을 제안한다. SIO 메커니즘은 일반적인 서버 시스템에서 발생하는 사용자 영역과 커널 영역 사이의 데이타 복사와 문맥 교환을 줄임으로써 데이타 전송의 효율을 증가시킨다. SRTPIO 모듈은 RTP 프로토콜을 SIO 메커니즘과 커널 영역에서 통합해 효율적 멀티미디어 데이타 전송 구조를 지원한다.

  • PDF

QoS 제공을 위한 차등서비스 망 성능분석 (Performance Analysis of DiffServ Networks for Providing)

  • 임석구
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2006년도 춘계 종합학술대회 논문집
    • /
    • pp.448-451
    • /
    • 2006
  • 현재 공용중인 강교에서 발생하는 볼트 연결부의 결함 중 볼트 도입축력 부족의 발생빈도가 가장 크지만 도입축력부족에 따른 결함의 연구는 미비한 상태이다. 따라서 본 연구에서는 고장력 볼트 연결부의 미끄러짐 거동을 파악할 수 있는 모델 제시하기 위하여 범용 유한요소 구조해석 프로그램인 LUSAS를 이용하여 수치해석을 실시하였고, 교량보다 비교적 구조계가 간단한 단순경간 강상형교를 모사한 full-size의 H-Beam시험편을 설계하여 설계볼트 도입축력 100%인 시험편의 도입축력을 기준으로 75%, 50%, 25%의 축력을 도입하여 정적 시험을 실시하여 마찰 문제로 인한 고장력 볼트 연결부의 내력을 수치해석한 결과와 비교 분석하고자 한다.

  • PDF