• Title/Summary/Keyword: Strategy Type

Search Result 2,015, Processing Time 0.035 seconds

Study on the Relationship between Brand Characteristics and Localization Strategy of Imported Brands in Korean Market (국내 수입브랜드의 특성과 현지화전략과의 관계연구)

  • Han, Jee-Hee;Ko, Eun-Ju
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.8
    • /
    • pp.1180-1189
    • /
    • 2007
  • The purpose of this study is to search the level of localization strategy of imported brands in Korean Market, to investigate relationship between the brand characteristics and localization strategy, and to study the case about localization strategy of the brand selected according to the type of brand. The survey research was employed and for the data analysis, descriptive statistics, one-way ANOVA, and multiple-regression were used. For the case study, interview with the person who works in the each kind of company was used. The results of this study were as follows: Firstly, the level of localization strategy is found in order price, place, promotion and product. Secondly among the brand characteristics, type of brand, proportion of garments, price zone, launching time, number of shop are related with localization strategy, but turnover and number of the staff are not. Thirdly, license brand has the characteristics like as national brands and the differences between the branch and the agent is confidence and communication that are the basic elements of localization. This study can help national brands to refer the localization strategy and provide the understanding of localization strategy of imported brands in Korean fashion market.

The Effects of the IT Activity and the Organization Strategy on the Sysetm Performance (정보기술활동과 조직전략이 성과에 미치는 영향)

  • Han, Gyeong-Il;Jo, Jae-Wan
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.12a
    • /
    • pp.153-161
    • /
    • 2006
  • The purpose of this study is to confirm whether the IT activity and organizational strategy makes a significant influence on the system performance. IT activity is defined as a system development, system operation and system management. Cost leadership and Differentiation were used as a strategic type Field research was employed to empirically investigate the relationship among the var iables. The finding of the study can be summarized as follows. IT activity and strategic type are not enough to explain the system performance.

  • PDF

The Effects of Interaction between the IT Activity and the Organizational Strategy on the System Performance (정보기술활동과 조직전략의 대응이 성과에 미치는 영향)

  • Han, Gyeong-Il
    • Journal of Digital Convergence
    • /
    • v.4 no.2
    • /
    • pp.75-85
    • /
    • 2006
  • The purpose of this study is to confirm whether the IT activity and organizational strategy makes a significant influence on the system performance. IT activity is defined as a system development, system operation and system management. Cost leadership and Differentiation were used as a strategic type. Field research was employed to empirically investigate the relationship among the variables. The finding of the study can be summarized as follows. IT activity and strategic type are not enough to explain the system performance.

  • PDF

A Novel Modulation Scheme and a DC-Link Voltage Balancing Control Strategy for T-Type H-Bridge Cascaded Multilevel Converters

  • Wang, Yue;Hu, Yaowei;Chen, Guozhu
    • Journal of Power Electronics
    • /
    • v.16 no.6
    • /
    • pp.2099-2108
    • /
    • 2016
  • The cascaded multilevel converter is widely adopted to medium/high voltage and high power electronic applications due to the small harmonic components of the output voltage and the facilitation of modularity. In this paper, the operation principle of a T-type H-bridge topology is investigated in detail, and a carrier phase shifted pulse width modulation (CPS-PWM) based control method is proposed for this topology. Taking a virtual five-level waveform achieved by a unipolar double frequency CPS-PWM as the output object, PWM signals of the T-type H-bridge can be obtained by reverse derivation according to its switching modes. In addition, a control method for the T-type H-bridge based cascaded multilevel converter is introduced. Then a single-phase T-type H-bridge cascaded multilevel static var generator (SVG) prototype is built, and a repetitive controller based compound current control strategy is designed with the DC-link voltage balancing control scheme analyzed. Finally, simulation and experimental results validate the correctness and feasibility of the proposed modulation method and control strategy for T-type H-bridge based cascaded multilevel converters.

Control Strategy of Ratio Changing System for a Metal V-Belt CVT Adopting Primary Pressure Regulation (압력제어 방식 금속 벨트 CVT 변속비 제어 전략)

  • 최득환;김현수
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.10 no.3
    • /
    • pp.201-208
    • /
    • 2002
  • In this paper, the control strategy of ratio changing system for a metal belt CVT adopting primary pressure regulation is developed, and the shirting performance of pressure regulating type CVT with the suggested control strategy is investigated. The control strategy suggested in this study is composed of 2 feedback loop, one is speed ratio feedback and the other is primary pressure feedback. The pressure feedback is adopted to ensure prohibiting a belt slip during transient period in a fast downshift mode. Simulation results show that the system with suggested control strategy gives appropriate response time and tracking Performance for upshift and also gives a proper primary pressure which can prohibit the belt slip. In addition, it is fecund that the given system has an acceptable servo property in tracking the target speed ratio and robustness for the disturbance of line pressure.

A Study on an Optimal Design of a Triple-band PIFA using the Evolution Strategy (진화 알고리즘을 이용한 삼중대역 PIFA 최적 설계에 관한 연구)

  • Ko, Jae-Hyeong;Kim, Koon-Tae;Kim, Kyong-Ah;Kim, Hyeong-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.4
    • /
    • pp.768-773
    • /
    • 2010
  • In this paper, we study on an optimal design of a triple-band PIFA (Planar Inverted-F Antenna) of 433 MHz, 912 MHz and 2.45 GHz by using evolution strategy. Generally, the resonant frequency of the PIFA is determined by the width and length of a U-type slot used. However the resonant frequencies of the multiple U slots are varied by the mutual effect of the slots. Thus the optimal width and length of U-type slots are determined by using an optimal design program based on the evolution strategy. To achieve this, an interface program between a commercial EM analysis tool and the optimal design program is constructed for implementing the evolution strategy technique that seeks a global optimum of the objective function through the iterative design process consisting of variation and reproduction. The resonant frequencies of initial model are 439.5 MHz, 981.5 MHz and 2.563 GHz. However, the resonant frequencies of the triple-band PIFA yielded by the optimal design program are 430.5 MHz, 907 MHz and 2.4515 GHz. Measured resonant frequencies are 433.5 MHz, 905.5 MHz and 2.454GHz, which show a good agreement with the simulation results.

Research on the Mechanism of Neutral-point Voltage Fluctuation and Capacitor Voltage Balancing Control Strategy of Three-phase Three-level T-type Inverter

  • Yan, Gangui;Duan, Shuangming;Zhao, Shujian;Li, Gen;Wu, Wei;Li, Hongbo
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.6
    • /
    • pp.2227-2236
    • /
    • 2017
  • In order to solve the neutral-point voltage fluctuation problem of three-phase three-level T-type inverters (TPTLTIs), the unbalance characteristics of capacitor voltages under different switching states and the mechanism of neutral-point voltage fluctuation are revealed. Based on the mathematical model of a TPTLTI, a feed-forward voltage balancing control strategy of DC-link capacitor voltages error is proposed. The strategy generates a DC bias voltage using a capacitor voltage loop with a proportional integral (PI) controller. The proposed strategy can suppress the neutral-point voltage fluctuation effectively and improve the quality of output currents. The correctness of the theoretical analysis is verified through simulations. An experimental prototype of a TPTLTI based on Digital Signal Processor (DSP) is built. The feasibility and effectiveness of the proposed strategy is verified through experiment. The results from simulations and experiment match very well.

Development of Adoption Strategy and Guideline of Business Process Management Standards: Focusing on Business Process Execution Language (비즈니스 프로세스 관리 표준 도입 전략 및 지침 개발: 비즈니스 프로세스 실행 언어를 중심으로)

  • Kim, Dong-Soo
    • Journal of Information Technology Services
    • /
    • v.5 no.2
    • /
    • pp.107-123
    • /
    • 2006
  • The objectives of this study is to develop a strategy for the adoption of BPM(Business Process Management) standards and an implementation guideline of the BPM standard for BPM solution developers focusing on BPEL(Business Process Execution Language) which is regarded as the most important BPM standard. In the heterogeneous and distributed IT environments, every type of enterprise software requires standards to enhance interoperability. BPMS(Business Process Management System), which is a type of enterprise software requires BPM standards such as BPEL(Business Process Execution Language), BPMN(Business Process Modeling and Notation), BPQL(Business Process Query Language) and so on to achieve multi-system interoperability and component interoperability with their BPM solutions. It is quite helpful to provide the adoption strategy concerning BPM standards for each type of BPM solution vendors who need the BPM standards. Since the BPEL is conceived as the most important BPM standard and widely adopted by many BPM vendors, we have proposed a reference architecture for BPEL implementation and also developed the detail implementation guideline of core components of the BPM system supporting the BPEL standard. Using the strategy and implementation guideline proposed in this work, BPM solution vendors can establish their own standard adoption strategy and they can also develop their BPM solutions supporting the BPM standards more efficiently.

A Nexus among Strategy Type, Market Orientation, Strategic Costing and Financial Sector Performance of Private Universities in Indonesia

  • SRIYONO, Sriyono
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.1035-1046
    • /
    • 2020
  • This study aims to find empirical evidence of causal relationship between strategy type, market orientation, strategic management accounting (SMA) strategic costing technique, and financial sector performance of private universities in Indonesia. The research object in this study are private universities in Yogyakarta, Indonesia. Yogyakarta is chosen because universities there are one of the barometers of higher education in Indonesia, and the city has quite a number of universities. The respondents in this study are the leader (manager) of private universities in Yogyakarta, Indonesia. The data analysis is done using SEM-PLS with WarpPLS 3.0 software. The results of this study show that market orientation has significant influence on the development and implementation of SMA strategic costing technique, while strategy type does not have significant influence on the development and implementation of SMA strategic costing technique. This study also finds that the implementation of SMA strategic costing technique significantly influences the financial sector performance of private universities in Yogyakarta, Indonesia. This study provides theoretical implication regarding SMA development in universities that consider that contingency factors (market orientation) can encourage increased organizational performance. It indicates support for contingency theory that states there are no general principles that apply to all situations.

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.