• Title/Summary/Keyword: Practical Application

Search Result 4,632, Processing Time 0.027 seconds

Survey and Analysis of International Standards for Practical Apply to Guideline on Software Quality Assurance and Human-Centred Design for e-Navigation (e-Navigation 소프트웨어 품질 보증 및 인간중심설계 가이드라인의 실무 적용을 위한 국제표준 조사 및 분석)

  • Jung, Jieun;Lee, Seojeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.9-10
    • /
    • 2015
  • e-navigation is a Strategy developed by the IMO. It aims to implement the strategy in 2018. To this end, e-navigation Software Quality Assurance and Human-Centred Design Guidelines has been developing for the implementation and development of e-Navigation. The IMO MSC approved this guideline as a MSC circular in June 2015. In this paper, international standards of software quality assurance and human-centred design has been surveyed and analyzed in terms of usability testing for the practical application of this guideline. The result is planning to be reflected in the practical application guidance for the development of e-navigation equipment hardware-software combination.

  • PDF

Commercial Databases:The Keypoints and Practical Use(5) - Science and Engineering:General Branches - (상용(商用) 데이터베이스:요점(要點)과 활용(活用)(5) - 이공학(理工學):일반 -)

  • Cho, Jae-Ho
    • Journal of Information Management
    • /
    • v.25 no.2
    • /
    • pp.31-60
    • /
    • 1994
  • General branches of science and engineering now enjoy being substantially repleted in their databases. However, comparing the databases of such branches with chemistry or medical science and pharmacology, the strata do not seem to be fully equipped yet. As a matter of fact, the variety of such databases in practical application is still somewhat limited. Moreover, these databases are, with a few exceptions, prepared abroad. In this paper varieties and features of databases now available on the market for each database service system, as well as crucial points for practical use are introduced. At present, it is focussed more or less on the application of bibliographical information. Yet, it would be inevitable to equip them with factual data in order to increase the efficiency of research and development activities. Of course, it is still not easy to solve problems for better profitability and higher technical achievement. The author wishes to emphasize the necessity to fully equip the commercial factual database for said branches as quickly as possible.

  • PDF

Conflicts between Protected Franchise Territory and Unrestricted Delivery Trading Area

  • LEE, Soo-Duck
    • The Korean Journal of Franchise Management
    • /
    • v.11 no.1
    • /
    • pp.45-60
    • /
    • 2020
  • Propose: The expansion of the delivery market in franchise business is a positive means of advertising and promotion for franchisees and contributes to substantial sales growth for stores. However, unrestricted and uncontrolled delivery sales and business activity of franchisee directly lead to encroachment of business territory between franchisees, resulting in increased operating costs of franchisees and conflicts between franchisees over rights and interests on franchise business. Moreover, in relation to the restrictions on the opening of competitors, it is incapacitating the law intent of prohibiting unfair encroachment of business territory, in the issue of the Fair Franchise Act in regard to guarantee of exclusive sales and business activity rights of franchisee. This study aims to point out major problems arising out of franchisee's infinite competition on delivery sales and business activity that are not restricted or controlled and then suggest legal supplements, policy tasks, and practical implications for improvement on the issues. Literature Review: In franchising business transactions, vertical restraints are associated with the exclusive territory establishment, control of transaction area, restriction of intangible sales and business activity of franchisee. Therefore, in the franchise business, it is necessary to take positive interpretation and application on e-commerce, the area of e-commerce, and delivery trading area and find proper and practical ways, by virtue of constructive attitude of each actor, to reduce the encroachment of business territory and various conflicts caused by unrestricted delivery trading area. Conclusion and suggestion: The finding shows that unrestricted or uncontrolled delivery sales and business activity of franchisees cause encroachment of business territory and many conflicts among franchisees. And this matters also weaken the legislation of the law on the protection of the business territory and can be negative factors that disrupt the protection of identity and sound development of the franchise industry in the long run. Therefore, in the franchise business, it is necessary to take positive interpretation and application on e-commerce, the area of e-commerce, and delivery trading area and find proper and practical ways, by virtue of constructive attitude of each actor, to reduce the encroachment of business territory and various conflicts caused by unrestricted delivery trading area.

A suggestion of in-depth interview guidelines using generative AI services for lean startups (린 스타트업을 위한 생성형 AI 서비스 활용 심층 인터뷰 가이드라인 제안)

  • Lee Soobin;Jung Young-Wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.471-485
    • /
    • 2024
  • This study explores the effective utilization of generative AI for conducting in-depth interviews within the lean startup environment. With recent technological advancements, the application of generative AI in enhancing operational productivity has been on the rise across various organizations, and this trend extends to the lean startup milieu. The research develops specific guidelines and a guidebook aimed at assisting practitioners in lean startups to conduct in-depth interviews using AI, even amidst the constraints of limited time and capital. The proposed guidebook facilitates practitioners to swiftly design and conduct interviews, thereby promoting an agile and flexible working environment within lean startups. Moreover, this study investigates practical methods for applying text-based generative AI services like ChatGPT 4 and Luyten in the fields of design and interviewing, thereby contributing to the academic discussion and practical implementation in these areas. The significance of this research lies in its potential to broaden the horizon of scholarly debate and practical application of generative AI in lean startups.

The Role of Interpersonal Trust in On-line Learning Communities and Application of Knowledge

  • Kang, Sungmin;Suh, Hyunju;Kym, Hyogun
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.642-661
    • /
    • 2015
  • Interpersonal trust has become essential for online communities because people have managed to be in a situation without face-to-face encounters. To identify the structural relationships between interpersonal trust and learning performance, we analyzed the relationship between two types of trust, namely, cognitive and affective, as well as two dimensions of learning performance, namely, learning satisfaction and knowledge application. We also identified the moderating role of social norms in the relationship between trust and learning performance. Results of analysis are as follows. First, cognitive trust significantly affected the two dimensions of performance. Second, affective trust exhibited a significant effect on learning satisfaction, but did not affect knowledge application. Third, the relationships between the two performance factors were significant and direct. Lastly, social norms appeared to moderate the effects of cognitive trust on knowledge application and affective trust on satisfaction. These findings suggest that organizations, which would like to optimize task-oriented performance of their learning communities, should consider linking strategies between community satisfaction and practical knowledge application.

A Study on the Effects of University Student's Perceived O2O Application Characteristics on O2O Services Satisfaction and Continuous Use Intention (대학생이 지각한 O2O 어플리케이션 특성이 O2O 서비스 만족도와 지속적 이용의도에 미치는 영향)

  • Park, Jongsoon;Lee, Jongman
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.247-261
    • /
    • 2017
  • O2O service that combine online with offline service has been rapidly increasing and O2O service is the new trend that merges online commerce with traditional markets in various fields. The purpose of this study is to investigate influences of University Student's Perceived O2O application characteristics on O2O services satisfaction and continuous use intention. For this purpose, questionnaires including O2O application characteristics scale, customer perceived O2O satisfaction scale and O2O use intention scale were administered to 241 college students in Seoul. Regression analysis revealed that O2O application Characteristics showed influences of O2O service satisfaction. The O2O application charac*teristics showed influences of continuous use of intention of O2O services, O2O services satisfaction showed partial influence continuous use intention of O2O service. The result of this study is expected to provide implication as an initial study O2O service which is spreading with the growth of mobile ICT. Ultimately, the results of this study provide a number of theoretical and practical implications.

Heat Application According to Nurse's Belief on Evidence-Based Practice and Behavioral Intention Related to Research (임상간호사의 근거기반실무 신념과 연구 관련 행동의도에 따른 온 요법 간호)

  • Yoon, Sukyung;Shin, Yong Soon
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.23 no.3
    • /
    • pp.264-274
    • /
    • 2016
  • Purpose: This study was done to compare heat applications by nurses in accordance to belief in evidence-based practice and behavior intention related to research. Methods: A cross-section survey design was used. Participants were 228 nurses from 5 institutions who completed the research questionnaire. Data were collected during July and August 2015. Results: The nurses reported that duration of heat applications was 2.5 minutes to 90 minutes. Frequently used heat application devices, in order of frequency, were rubber bag, gel pack and red clay pack. Most of the nurses (78%) responded that advice from colleagues was the most frequently used basic evidence for heat application. There was a statistically significant difference for the necessity of heat application practice guidelines between the high evidence-based practice belief cluster and the low cluster ($x^2$=15.39, p<.001). Conclusion: There were difficulties in providing consistent nursing interventions because of practical differences and absence of evidence-based guidelines for heat application. The researchers recommend that basic studies with various instruments be conducted and proper practice guidelines developed for heat application.

A Study on Implementation of Efficient Patient Care Application System Using RFID (RFID를 이용한 효율적인 환자관리 애플리케이션 시스템 개발에 관한 연구)

  • Hong In-Sik;Baek Jang-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1142-1151
    • /
    • 2005
  • Various kinds of studies for building up U-Korea are now underway. Especially, RFID comes into the spotlight as a core technology of Ubiquitous. Though, the development of higher levels of application is far behind the hardware-based technology in RFID application system. For that reason, In this paper suggests technology using RFID on Ubiquitous and embodies the effective health care application which is one of the application services of user-centered environment It realizes the system which enables us to manage and send data about changing prescriptions and locations of patients effectively under the basis of RFID tag and mobile devices. It also provides the high quality of practical effectiveness of entire system throughout the realization of applications of application server and mobile device. on the basis of framework for providing the various kinds of services and physical elements.

  • PDF

Research of Application and Facilitation of BIM on Military Facilities (국방 군사시설의 BIM적용 및 활성화 방안 연구)

  • Gong, Keum-Rok
    • Journal of KIBIM
    • /
    • v.7 no.4
    • /
    • pp.1-7
    • /
    • 2017
  • Since its beginning the military has continued updating its equipments and facilities by modernizing and expanding them. However, with rapidly growing technologies and business management skills, the time for military facilities' evolvement seems unavoidable. The Defense Installations Agency (DIA) has come to a conclusion that application of BIM is necessary. Since its decision, the DIA has been researching the use of BIM and developing guidelines for its application. Nevertheless, the speed of instructions and practical implementation of its model have been behind its plan due to various reasons. To overcome its limitations, the DIA has come up with three-step-solution: basic experience, budgeting, and expansion. Due to numerous number of projects of BIM, it is almost impractical to implement all of them concurrently. The methodological approach of the research employs the Delphi survey method to quantitatively analyze qualitative information drawn from experts' opinions. By applying the Delphi survey method, the first round of the survey drew lists of constraints, BIM application scenarios as well as BIM promotion measures. Afterwards, at the second round of the survey, criticality of each item collected at the 1st round was analyzed to reach a conclusion. Finally, constraints against BIM application were analyzed, and BIM application scenarios and promotion measures for the BIM were introduced.

A JTAG Protection Method for Mobile Application Processors (모바일 애플리케이션 프로세서의 JTAG 보안 기법)

  • Lim, Min-Soo;Park, Bong-Il;Won, Dong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.