• Title/Summary/Keyword: Hardware + Software

Search Result 2,810, Processing Time 0.032 seconds

Evaluating of the Effectiveness of RTK Surveying Performance Based on Low-cost Multi-Channel GNSS Positioning Modules (다채널 저가 GNSS 측위 모듈기반 RTK 측량의 효용성 평가)

  • Kim, Chi-Hun;Oh, Seong-Jong;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.53-65
    • /
    • 2022
  • According to the advancement of the GNSS satellite positioning system, the module of hardware and operation software reflecting accuracy and economical efficiency is implemented in the user sector including the multi-channel GNSS receiver, the multi-frequency external antenna and the mobile app (App) base public positioning analysis software etc., and the multichannel GNSS RTK positioning of the active configuration method (DIY, Do it yourself) is possible according to the purpose of user. Especially, as the infrastructure of multi-GNSS satellite is expanded and the potential of expansion of utilization according to various modules is highlighted, interest in the utilization of multi-channel low-cost GNSS receiver module is gradually increasing. The purpose of this study is to review the multi-channel low-cost GNSS receivers that are appearing in the mass market in various forms and to analyze the utilization plan of the "address information facility investigation project" of the Ministry of Public Administration and Security by constructing the multi-channel low-cost GNSS positioning module based RTK survey system (hereinafter referred to as "multi-channel GNSS RTK module positioning system"). For this purpose, we constructed a low-cost "multi-channel GNSS RTK module positioning system" by combining related modules such as U-blox's F9P chipset, antenna, Ntrip transmission of GNSS observation data and RTK positioning analysis app through smartphone. Kinematic positioning was performed for circular trajectories, and static positioning was performed for address information facilities. The results of comparative analysis with the Static positioning performance of the geodetic receivers were obtained with 5 fixed points in the experimental site, and the good static surveying performance was obtained with the standard deviation of average ±1.2cm. In addition, the results of the test point for the outline of the circular structure in the orthogonal image composed of the drone image analysis and the Kinematic positioning trajectory of the low cost RTK GNSS receiver showed that the trajectory was very close to the standard deviation of average ±2.5cm. Especially, as a result of applying it to address information facilities, it was possible to verify the utility of spatial information construction at low cost compared to expensive commercial geodetic receivers, so it is expected that various utilization of "multi-channel GNSS RTK module positioning system"

Video Analysis System for Action and Emotion Detection by Object with Hierarchical Clustering based Re-ID (계층적 군집화 기반 Re-ID를 활용한 객체별 행동 및 표정 검출용 영상 분석 시스템)

  • Lee, Sang-Hyun;Yang, Seong-Hun;Oh, Seung-Jin;Kang, Jinbeom
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.89-106
    • /
    • 2022
  • Recently, the amount of video data collected from smartphones, CCTVs, black boxes, and high-definition cameras has increased rapidly. According to the increasing video data, the requirements for analysis and utilization are increasing. Due to the lack of skilled manpower to analyze videos in many industries, machine learning and artificial intelligence are actively used to assist manpower. In this situation, the demand for various computer vision technologies such as object detection and tracking, action detection, emotion detection, and Re-ID also increased rapidly. However, the object detection and tracking technology has many difficulties that degrade performance, such as re-appearance after the object's departure from the video recording location, and occlusion. Accordingly, action and emotion detection models based on object detection and tracking models also have difficulties in extracting data for each object. In addition, deep learning architectures consist of various models suffer from performance degradation due to bottlenects and lack of optimization. In this study, we propose an video analysis system consists of YOLOv5 based DeepSORT object tracking model, SlowFast based action recognition model, Torchreid based Re-ID model, and AWS Rekognition which is emotion recognition service. Proposed model uses single-linkage hierarchical clustering based Re-ID and some processing method which maximize hardware throughput. It has higher accuracy than the performance of the re-identification model using simple metrics, near real-time processing performance, and prevents tracking failure due to object departure and re-emergence, occlusion, etc. By continuously linking the action and facial emotion detection results of each object to the same object, it is possible to efficiently analyze videos. The re-identification model extracts a feature vector from the bounding box of object image detected by the object tracking model for each frame, and applies the single-linkage hierarchical clustering from the past frame using the extracted feature vectors to identify the same object that failed to track. Through the above process, it is possible to re-track the same object that has failed to tracking in the case of re-appearance or occlusion after leaving the video location. As a result, action and facial emotion detection results of the newly recognized object due to the tracking fails can be linked to those of the object that appeared in the past. On the other hand, as a way to improve processing performance, we introduce Bounding Box Queue by Object and Feature Queue method that can reduce RAM memory requirements while maximizing GPU memory throughput. Also we introduce the IoF(Intersection over Face) algorithm that allows facial emotion recognized through AWS Rekognition to be linked with object tracking information. The academic significance of this study is that the two-stage re-identification model can have real-time performance even in a high-cost environment that performs action and facial emotion detection according to processing techniques without reducing the accuracy by using simple metrics to achieve real-time performance. The practical implication of this study is that in various industrial fields that require action and facial emotion detection but have many difficulties due to the fails in object tracking can analyze videos effectively through proposed model. Proposed model which has high accuracy of retrace and processing performance can be used in various fields such as intelligent monitoring, observation services and behavioral or psychological analysis services where the integration of tracking information and extracted metadata creates greate industrial and business value. In the future, in order to measure the object tracking performance more precisely, there is a need to conduct an experiment using the MOT Challenge dataset, which is data used by many international conferences. We will investigate the problem that the IoF algorithm cannot solve to develop an additional complementary algorithm. In addition, we plan to conduct additional research to apply this model to various fields' dataset related to intelligent video analysis.

Open Digital Textbook for Smart Education (스마트교육을 위한 오픈 디지털교과서)

  • Koo, Young-Il;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.177-189
    • /
    • 2013
  • In Smart Education, the roles of digital textbook is very important as face-to-face media to learners. The standardization of digital textbook will promote the industrialization of digital textbook for contents providers and distributers as well as learner and instructors. In this study, the following three objectives-oriented digital textbooks are looking for ways to standardize. (1) digital textbooks should undertake the role of the media for blended learning which supports on-off classes, should be operating on common EPUB viewer without special dedicated viewer, should utilize the existing framework of the e-learning learning contents and learning management. The reason to consider the EPUB as the standard for digital textbooks is that digital textbooks don't need to specify antoher standard for the form of books, and can take advantage od industrial base with EPUB standards-rich content and distribution structure (2) digital textbooks should provide a low-cost open market service that are currently available as the standard open software (3) To provide appropriate learning feedback information to students, digital textbooks should provide a foundation which accumulates and manages all the learning activity information according to standard infrastructure for educational Big Data processing. In this study, the digital textbook in a smart education environment was referred to open digital textbook. The components of open digital textbooks service framework are (1) digital textbook terminals such as smart pad, smart TVs, smart phones, PC, etc., (2) digital textbooks platform to show and perform digital contents on digital textbook terminals, (3) learning contents repository, which exist on the cloud, maintains accredited learning, (4) App Store providing and distributing secondary learning contents and learning tools by learning contents developing companies, and (5) LMS as a learning support/management tool which on-site class teacher use for creating classroom instruction materials. In addition, locating all of the hardware and software implement a smart education service within the cloud must have take advantage of the cloud computing for efficient management and reducing expense. The open digital textbooks of smart education is consdered as providing e-book style interface of LMS to learners. In open digital textbooks, the representation of text, image, audio, video, equations, etc. is basic function. But painting, writing, problem solving, etc are beyond the capabilities of a simple e-book. The Communication of teacher-to-student, learner-to-learnert, tems-to-team is required by using the open digital textbook. To represent student demographics, portfolio information, and class information, the standard used in e-learning is desirable. To process learner tracking information about the activities of the learner for LMS(Learning Management System), open digital textbook must have the recording function and the commnincating function with LMS. DRM is a function for protecting various copyright. Currently DRMs of e-boook are controlled by the corresponding book viewer. If open digital textbook admitt DRM that is used in a variety of different DRM standards of various e-book viewer, the implementation of redundant features can be avoided. Security/privacy functions are required to protect information about the study or instruction from a third party UDL (Universal Design for Learning) is learning support function for those with disabilities have difficulty in learning courses. The open digital textbook, which is based on E-book standard EPUB 3.0, must (1) record the learning activity log information, and (2) communicate with the server to support the learning activity. While the recording function and the communication function, which is not determined on current standards, is implemented as a JavaScript and is utilized in the current EPUB 3.0 viewer, ths strategy of proposing such recording and communication functions as the next generation of e-book standard, or special standard (EPUB 3.0 for education) is needed. Future research in this study will implement open source program with the proposed open digital textbook standard and present a new educational services including Big Data analysis.

Effective 3-D GPR Survey for the Exploration of Old Remains (유적지 발굴을 위한 효율적 3차원 GPR 탐사)

  • Kim, Jung-Ho;Yi, Myeong-Jong;Son, Jeong-Sul;Cho, Seong-Jun;Park, Sam-Gyu
    • Geophysics and Geophysical Exploration
    • /
    • v.8 no.4
    • /
    • pp.262-269
    • /
    • 2005
  • Since the buried cultural relics are three-dimensional (3-D) objects in nature, 3-D survey is more preferable in archeological exploration. 3-D Ground Penetrating Radar (GPR) survey based on very dense data in principle, however, might need much higher cost and longer time of exploration than other geophysical methods commonly used for the archeological exploration, such as magnetic and electromagnetic methods. We developed a small-scale continuous data acquisition system which consists of two sets of GPR antennas and the precise positioning device tracking the moving-path of GPR antenna automatically and continuously. Since the high cost of field work may be partly attributed to establishing many profile lines, we adopted a concept of data acquisition at arbitrary locations not along the pre-established profile lines. Besides this hardware system, we also developed several software packages in order to effectively process and visualize the 3-D data obtained by the developed system and the data acquisition concept. Using the developed system, we performed 3-D GPR survey to investigate the possible historical remains of Baekje Kingdom at Buyeo city, South Korea, prior to the excavation. Owing to the newly devised system, we could obtain 3-D GPR data of this survey area having areal extent over about $17,000m^2$ within only six-hours field work. Although the GPR data were obtained at random locations not along the pre-established profile lines, we could obtain high-resolution 3-D images showing many distinctive anomalies, which could be interpreted as old agricultural lands, waterways, and artificial structures or remains. This cast: history led us to the conclusion that 3-D GPR method is very useful not only to examine a small anomalous area but also to investigate the wider region of the archeological interests.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

A Study on Property Change of Auto Body Color Design (자동차 바디컬러 디자인의 속성 변화에 관한 연구)

  • Cho, Kyung-Sil;Lee, Myung-Ki
    • Archives of design research
    • /
    • v.19 no.1 s.63
    • /
    • pp.253-262
    • /
    • 2006
  • Research of color has been developed and also has raised consumer desire through changing from a tool to pursue curiosity or beauty to a tool creating effects in the 20th century. People have been interested in colors as a dynamic expression of results since the color TV appeared. The meaning of colors has been recently diversified as the roles of colors became important to the emotional aspects of design. While auto colors have developed along with such changes of the times, black led the color trend during the first half of the 20th century from 1900 to 1950, a transitional period of economic growth and world war. Since then, automobile production has increased apace with the rapid economic growth throughout the world and automobiles became the most expensive item out of the goods that people use. Accordingly, increasing production induced facility investment in mass production and a technology leveling was achieved. Auto manufacturing processes are very complicated, auto makers gradually recognized that software changes such as to colors or materials was an easier way for the improvement of brand identity as opposed to hardware changes such as the mechanical or design components of the body. Color planning and development systems were segmented in various aspects. In the segmentation issue, pigment technology and painting methods are important elements that have an influence on body colors and have a higher technical correlation with colors than in other industries. In other words, the advanced mixture of pigments is creating new body colors that have not existed previously. This diversifies the painting structure and methods and so maximizes the transparency and depth of body colors. Thus, body colors that are closely related to technical factors will increase in the future and research on color preferences by region have been systemized to cope with global competition due to the expansion and change of auto export regions.

  • PDF

A Study on Integrated Logistic Support (통합병참지원에 관한 연구)

  • 나명환;김종걸;이낙영;권영일;홍연웅;전영록
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2001.06a
    • /
    • pp.277-278
    • /
    • 2001
  • The successful operation of a product In service depends upon the effective provision of logistic support in order to achieve and maintain the required levels of performance and customer satisfaction. Logistic support encompasses the activities and facilities required to maintain a product (hardware and software) in service. Logistic support covers maintenance, manpower and personnel, training, spares, technical documentation and packaging handling, storage and transportation and support facilities.The cost of logistic support is often a major contributor to the Life Cycle Cost (LCC) of a product and increasingly customers are making purchase decisions based on lifecycle cost rather than initial purchase price alone. Logistic support considerations can therefore have a major impact on product sales by ensuring that the product can be easily maintained at a reasonable cost and that all the necessary facilities have been provided to fully support the product in the field so that it meets the required availability. Quantification of support costs allows the manufacturer to estimate the support cost elements and evaluate possible warranty costs. This reduces risk and allows support costs to be set at competitive rates.Integrated Logistic Support (ILS) is a management method by which all the logistic support services required by a customer can be brought together in a structured way and In harmony with a product. In essence the application of ILS:- causes logistic support considerations to be integrated into product design;- develops logistic support arrangements that are consistently related to the design and to each other;- provides the necessary logistic support at the beginning and during customer use at optimum cost.The method by which ILS achieves much of the above is through the application of Logistic Support Analysis (LSA). This is a series of support analysis tasks that are performed throughout the design process in order to ensure that the product can be supported efficiently In accordance with the requirements of the customer.The successful application of ILS will result in a number of customer and supplier benefits. These should include some or all of the following:- greater product uptime;- fewer product modifications due to supportability deficiencies and hence less supplier rework;- better adherence to production schedules in process plants through reduced maintenance, better support;- lower supplier product costs;- Bower customer support costs;- better visibility of support costs;- reduced product LCC;- a better and more saleable product;- Improved safety;- increased overall customer satisfaction;- increased product purchases;- potential for purchase or upgrade of the product sooner through customer savings on support of current product.ILS should be an integral part of the total management process with an on-going improvement activity using monitoring of achieved performance to tailor existing support and influence future design activities. For many years, ILS was predominantly applied to military procurement, primarily using standards generated by the US Government Department of Defense (DoD). The military standards refer to specialized government infrastructures and are too complex for commercial application. The methods and benefits of ILS, however, have potential for much wider application in commercial and civilian use. The concept of ILS is simple and depends on a structured procedure that assures that logistic aspects are fully considered throughout the design and development phases of a product, in close cooperation with the designers. The ability to effectively support the product is given equal weight to performance and is fully considered in relation to its cost.The application of ILS provides improvements in availability, maintenance support and longterm 3ogistic cost savings. Logistic costs are significant through the life of a system and can often amount to many times the initial purchase cost of the system.This study provides guidance on the minimum activities necessary to Implement effective ILS for a wide range of commercial suppliers. The guide supplements IEC60106-4, Guide on maintainability of equipment Part 4: Section Eight maintenance and maintenance support planning, which emphasizes the maintenance aspects of the support requirements and refers to other existing standards where appropriate. The use of Reliability and Maintainability studies is also mentioned in this study, as R&M is an important interface area to ILS.

  • PDF

${T_2}weighted$- Half courier Echo Planar Imaging

  • 김치영;김휴정;안창범
    • Investigative Magnetic Resonance Imaging
    • /
    • v.5 no.1
    • /
    • pp.57-65
    • /
    • 2001
  • Purpose : $T_2$-weighted half courier Echo Planar Imaging (T2HEPI) method is proposed to reduce measurement time of existing EPI by a factor of 2. In addition, high $T_2$ contrast is obtained for clinical applications. High resolution single-shot EPI images with $T_2$ contrast are obtained with $128{\times}128$ matrix size by the proposed method. Materials and methods : In order to reduce measurement time in EPI, half courier space is measured, and rest of half courier data is obtained by conjugate symmetric filling. Thus high resolution single shot EPI image with $128{\times}128$ matrix size is obtained with 64 echoes. By the arrangement of phase encoding gradients, high $T_2$ weighted images are obtained. The acquired data in k-space are shifted if there exists residual gradient field due to eddy current along phase encoding gradient, which results in a serious problem in the reconstructed image. The residual field is estimated by the correlation coefficient between the echo signal for dc and the corresponding reference data acquired during the pre-scan. Once the residual gradient field is properly estimated, it can be removed by the adjustment of initial phase encoding gradient field between $70^{\circ}$ and $180^{\circ}$ rf pulses. Results : The suggested T2EPl is implemented in a 1.0 Tela whole body MRI system. Experiments are done with the effective echo times of 72ms and 96ms with single shot acquisitions. High resolution($128{\times}128$) volunteer head images with high $T_2$ contrast are obtained in a single scan by the proposed method. Conclusion : Using the half courier technique, higher resolution EPI images are obtained with matrix size of $128{\times}128$ in a single scan. Furthermore $T_2$ contrast is controlled by the effective echo time. Since the suggested method can be implemented by software alone (pulse sequence and corresponding tuning and reconstruction algorithms) without addition of special hardware, it can be widely used in existing MRI systems.

  • PDF

Factors Affecting the Implementation Success of Data Warehousing Systems (데이터 웨어하우징의 구현성공과 시스템성공 결정요인)

  • Kim, Byeong-Gon;Park, Sun-Chang;Kim, Jong-Ok
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.234-245
    • /
    • 2007
  • The empirical studies on the implementation of data warehousing systems (DWS) are lacking while there exist a number of studies on the implementation of IS. This study intends to examine the factors affecting the implementation success of DWS. The study adopts the empirical analysis of the sample of 112 responses from DWS practitioners. The study results suggest several implications for researchers and practitioners. First, when the support from top management becomes great, the implementation success of DWS in organizational aspects is more likely. When the support from top management exists, users are more likely to be encouraged to use DWS, and organizational resistance to use DWS is well coped with increasing the possibility of implementation success of DWS. The support of resource increases the implementation success of DWS in project aspects while it is not significantly related to the implementation success of DWS in organizational aspects. The support of funds, human resources, and other efforts enhances the possibility of successful implementation of project; the project does not exceed the time and resource budgets and meet the functional requirements. The effect of resource support, however, is not significantly related to the organizational success. The user involvement in systems implementation affects the implementation success of DWS in organizational and project aspects. The success of DWS implementation is significantly related to the users' commitment to the project and the proactive involvement in the implementation tasks. users' task. The observation of the behaviors of competitors which possibly increases data quality does not affect the implementation success of DWS. This indicates that the quality of data such as data consistency and accuracy is not ensured through the understanding of the behaviors of competitors, and this does not affect the data integration and the successful implementation of DWS projects. The prototyping for the DWS implementation positively affects the implementation success of DWS. This indicates that the extent of understanding requirements and the communication among project members increases the implementation success of DWS. Developing the prototypes for DWS ensures the acquirement of accurate or integrated data, the flexible processing of data, and the adaptation into new organizational conditions. The extent of consulting activities in DWS projects increases the implementation success of DWS in project aspects. The continuous support for consulting activities and technology transfer enhances the adherence to the project schedule preventing the exceeding use of project budget and ensuring the implementation of intended system functions; this ultimately leads to the successful implementation of DWS projects. The research hypothesis that the capability of project teams affects the implementation success of DWS is rejected. The technical ability of team members and human relationship skills themselves do not affect the successful implementation of DWS projects. The quality of the system which provided data to DWS affects the implementation success of DWS in technical aspects. The standardization of data definition and the commitment to the technical standard increase the possibility of overcoming the technical problems of DWS. Further, the development technology of DWS affects the implementation success of DWS. The hardware, software, implementation methodology, and implementation tools contribute to effective integration and classification of data in various forms. In addition, the implementation success of DWS in organizational and project aspects increases the data quality and system quality of DWS while the implementation success of DWS in technical aspects does not affect the data quality and system quality of DWS. The data and systems quality increases the effective processing of individual tasks, and reduces the decision making times and efforts enhancing the perceived benefits of DWS.

  • PDF

An effect on the Job-satisfaction and Service quality of the effect factor on Job-satisfaction of Family Restaurant Service Staff (외식업체 종사원의 직무만족 영향요인이 직무만족과 서비스품질에 미치는 영향)

  • 이형백;노진옥
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.16 no.2
    • /
    • pp.175-199
    • /
    • 2005
  • Family Restaurant is a service business of a kind. The role of service operator is to improve a sales of service goods through maximizing the service value with customer satisfaction at the moment of MOT(moment of truth). Family Restaurant come to the great growth on the face of it. In future, it will place emphasis more and more on not hardware but software including service quality. The purpose of this study, therefore, is to research the effect on service quality of the job satisfaction of Family Restaurant's service staff. Data was collected from the employee who are working at Family Restaurant located in Taegu. The empirical research has been done over 50days from 1April, 2004 to 20May, 2004. In conclusion of empirical analysis, 4 hypotheses were significant among 7 hypotheses suggested in this study. The research showed as follows : First, the organic trait among the effect factor of job satisfaction perceived by Family Restaurant service staff showed positive influence on job satisfaction. Second, the personal trait among the effect factor of job satisfaction perceived by Family Restaurant service staff showed positive influence on service quality. Third, the official trait among the effect factor of job satisfaction perceived by Family Restaurant service staff showed negative influence on job satisfaction. Fourth, the organic trait among the effect factor of job satisfaction perceived by Family Restaurant service staff showed positive influence on service quality. Fifth, the personal trait among the effect factor of job satisfaction perceived by Family Restaurant service staff showed negative influence on service quality. Sixth, the organic trait among the effect factor of job satisfaction perceived by Family Restaurant service staff showed negative influence on service quality. Seventh, the job satisfaction of Family Restaurant service staff showed positive influence on service quality. Besides, the critical points of this study are as follows; First, we designated the subject of research to the employee of Family Restaurant only. Second, multi-situations(time, holiday) which can happen as service was offered, wasn't concerned. Third, as service quality was estimated by general service quality, the research in future should subdivide service quality more. I, finally, applied the pervious researches on job satisfaction and service quality in the employee of Family Restaurant. To extend more this research model in future, the variables like customer satisfaction should be added.

  • PDF