• Title/Summary/Keyword: IT 집중화

Search Result 143, Processing Time 0.02 seconds

Business Strategies for Korean Private Security-Guard Companies Utilizing Resource-based Theory and AHP Method (자원기반 이론과 AHP 방법을 활용한 민간 경호경비 기업의 전략 연구)

  • Kim, Heung-Ki;Lee, Jong-Won
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.177-200
    • /
    • 2013
  • As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.

  • PDF

Adaptive 1-D Transforms Order Selection Methods for Performance Improvement of SA-DCT (SA-DCT 성능 향상을 위한 적응적 1차원 변환 순서선택방법)

  • Song, Joon-Ho;Moon, Joo-Hee;Chung, Jae-Won
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.4
    • /
    • pp.442-454
    • /
    • 2002
  • It's noticed that the SA-DCT (Shape-Adaptive Discrete Cosine Transform) produces different 2-dimensional transform coefficients according as the first 1-dimensional transform is applied in horizontal or vertical direction for an arbitrarily shaped boundary block. Performing the first 1-dimensional transform in the direction, which has higher spatial correlation or smaller shifting distance, can compact the energy on the smaller number of AC coefficients around DC. This paper shows, experimentally, the compaction capability improvement by choosing the first 1-dimensional transform direction with higher spatial correlation or smaller shifting distance. Two adaptive selection methods are proposed to decide efficiently the spatial direction with higher correlation in a boundary block. One is based on the gradients between DC coefficients of neighboring and current blocks, and the other is based on the final coding efficiency that means the number of bits required for coding the block. Using the MPEG-4 video coder, the proposed method shows coding efficiency gain up to 10.87% compared to the conventional SA-DCT method.

Characteristics of Spray Deposit Pattern and Flow Rate in the Air-Center Nozzle System (Air-center nozzle의 분무살포도(噴霧撒布度)와 분무량(噴霧量)의 특성(特性))

  • Lee, Sang Woo;Hur, Yun Kun
    • Korean Journal of Agricultural Science
    • /
    • v.7 no.2
    • /
    • pp.156-168
    • /
    • 1980
  • The air-center nozzles, being specially designed to supply air into the central part of water stream at seven levels of air volume, were tested for spray deposit pattern and flow-rate at each of the twelve pressure levels ranging from $0.35kg/cm^2$ (5 psi) to $6.33kg/cm^2$ (90 psi) in comparison with those of standard nozzles. The air-center nozzles produced comparatively more stable spray deposit patterns than the standard nozzles. The spray deposit patterns of the air-center nozzle were concentrated gradually in the central region with increase of air volume as a component of spray mixture. The degree of concentration of spray deposit on the central region from the air-center nozzle was higher than that of the standard nozzle, which suggested the possibility of obtaining farther travel distance spraying system at a given performance level. The flow rate of the air-center nozzle was not as much as that of the standard nozzle due to the air within certain limits. The rate of decrease of water flow became smaller with an increase in operating pressure although it changed rapidly in the beginning stage, ranging up to two or three percent of the air flow rate due to the compressive properties of air.

  • PDF

A Real-Time Certificate Status Verification Method based on Reduction Signature (축약 서명 기반의 실시간 인증서 상태 검증 기법)

  • Kim Hyun Chul;Ahn Jae Myoung;Lee Yong Jun;Oh Hae Seok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.301-308
    • /
    • 2005
  • According to banking online transaction grows very rapidly, guarantee validity about business transaction has more meaning. To offer guarantee validity about banking online transaction efficiently, certificate status verification system is required that can an ieai-time offer identity certification, data integrity, guarantee confidentiality, non-repudiation. Existing real-time certificate status verification system is structural concentration problem generated that one node handling all transactions. And every time status verification is requested, network overload and communication bottleneck are occurred because ail useless informations are transmitted. it does not fit to banking transaction which make much account of real response time because of these problem. To improve problem by unnecessary information and structural concentration when existing real-time certificate status protocol requested , this paper handle status verification that break up inspection server by domain. This paper propose the method of real~time certificate status verification that solves network overload and communication bottleneck by requesting certification using really necessary Reduction information to certification status verification. And we confirm speed of certificate status verification $15\%$ faster than existing OCSP(Online Certificate Status Protocol) method by test.

An Exploratory Study on the Slow Adoption of Vendor managed Inventory in Manufacturing Firms (제조업체의 VMI 시스템 도입 부담요인에 관한 탐색적 연구)

  • Rhee, Moon-Ki Kyle;Choi, Hye-Jeong;Park, Seong-Taek
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.77-87
    • /
    • 2015
  • Vendor Managed Inventory(VMI) is a distribution channel system where the inventory at the retailer is monitored and managed by the manufacturer or vendor. By pushing the decision making responsibility further up the supply chain and centralizing the replenishment decision, the vendor can help the entire supply chain be more competitive. The purpose of this research is to explore the factors influencing the adoption of VMI by Korean manufacturers. This research proposes the IT readiness, operating cost, and information sharing as antecedents of burden for VMI, and collected the survey responses from the small-to-medium manufacturers. The statistical results indicate that only the operating cost has a significant impact on the adoption of VMI. However it has also been found that the IT readiness and information sharing have a significant effect on the operating cost. Thus indirectly influence the adoption of VMI. As a conclusion, the academic and practical implications of these findings are discussed.

Analysis of regionally centralized and decentralized multistage reverse logistics networks using genetic algorithm (유전알고리즘을 이용한 지역 집중형 및 분산형 다단계 역물류 네트워크 분석)

  • Yun, YoungSu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.4
    • /
    • pp.87-104
    • /
    • 2014
  • This paper proposes regionally centralized multistage reverse logistics (cmRL) networks and regionally decentralized multistage reverse logistics (dmRL) networks. cmRL considers whole area of RL network, while dmRL regionally distributed area of RL network. Each type is formulated by the mixed integer programming (MIP) models, which are realized in genetic algorithm (GA) approach. Two types of numerical experiments using RL network are presented and various measures of performance are used for comparing the efficiency of the cmRL and the dmRL. Finally, it is proved that the performance of the cmRL is superior to that of the dmRL.

A Study on a Leakage Sensing Pipe and Monitoring System Using TDR in GIS (GIS상에서 TDR을 사용한 누수감지관과 모니터링 시스템에 관한 연구)

  • 강병모;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.567-578
    • /
    • 2004
  • GIS technique enhanced a space data manipulation ability and we are offering a geographic information service through various analysis. The quantity used of the water was increased in such situation according to a population increase and a city concentration phenomenon. But, to secure clear water are difficult, owing to the water shortage phenomenon, seepage and the quality of water change for worse. We decide the seepage and the system to retrieve the seepage location using GIS in order to reduce vast loss from the seepage. In this paper we proposed Leakage Sensing System using TDR technology in GIS, constructed a GIS database and pilot system to prove the validity, and simulated it using TDR in GIS.

  • PDF

HILS Test for the Small Aircraft Autopilot (소형항공기용 Autopilot HILS 시험)

  • Lee, Jang-Ho;Kim, Eung-Tai;Seong, Ki-Jeong
    • Aerospace Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.172-178
    • /
    • 2009
  • Recently, autopilot is essential to reduce pilot's workload and increase flight safety. Avionics system of the small aircraft also has progressively adopted centralized multi-processor and multi-process computing architectures similar to the integrated modular avionics of B-777. It is increased more and more that importance of the flight control system. In this paper, the performance of the autopilot for the small aircraft has been verified with Hardware-In-the-Loop Simulation(HILS). Also, the autopilot algorithm that is operated in the Flight Control Computer(FCC) for the Fly by Wire(FBW) was verified with PILS and compared with the HILS results for the several commercial autopilots.

  • PDF

Projection number of the graduate student in high school around the capital area and an entrance quota (수도권지역의 고3학생 수 예측과 대학입학정원수와의 분석)

  • Yoon, Yong-Hwa;Kim, Jong-Tae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.3
    • /
    • pp.523-534
    • /
    • 2010
  • The purpose of this paper is to forecast the numbers of students in a capital areas until 2027 year by using the moving average methods for estimating the number of student at the elementary, meddle and high-school. It is analyzed the third student number at the high schools and the entrance quota of colleges and universities around capital areas until 2027. The result of this paper is that there are no problems to keep the current entrance quota of colleges and universities around capital areas until 2027.

Analysis on Consensus Algorithms of Blockchain and Attacks (블록체인 합의 알고리즘과 공격 분석)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.83-88
    • /
    • 2018
  • The blockchain is the technique which is used in decentralized system instead of centralized system. Its characteristics are anonymous and transparency. However, there are still some traditional attacks. In this paper, we introduced some of the famous consensus algorithm with blockchain: Bitcoin, Algorand, and IOTA. Also, this paper talked about how each consensus algorithm tried to solve those traditional attacks such as double spending attack or sybil attack. Furthermore, if the consensus algorithm does not consider those attacks yet, then the author would introduce additional methods to solve those attacks. Furthermore, this paper proposed the new scenario that can make classical attacks be happened.