• Title/Summary/Keyword: TOM

Search Result 259, Processing Time 0.024 seconds

A Perceptual Mapping of Coffee Shop Brands and Preference Attributes (선택속성에 따른 에스프레소 커피 전문점의 포지셔닝에 관한 연구)

  • Kim, Ki-Ran;Kim, Dong-Jin
    • Culinary science and hospitality research
    • /
    • v.16 no.3
    • /
    • pp.66-75
    • /
    • 2010
  • The purpose of this study is to examine the competitive positions of five coffee shop brands(i.e., Starbucks, Coffee Bean & Tea Leaf, Hollys, Angelinus, and Tom N Toms) in Korea. For this study, data were gathered from the residents of Seoul, Busan and Daegu from September 22 to October 11, 2009. In order to accomplish the purpose of the study, MDS was utilized to investigate differences in customer's perception of the position of five coffee shop brands. The results of positioning analysis showed that there was competitive relationship between Hollys and Angelinus. Also, the positioning of Tom N Toms was close to Hollys and Angelinus. However, Starbucks, the market leader, and Coffee Bean & Tea Leaf, the market follower, were their own identity in their brands. According to the result of the study, it will be helpful for the marketers who need to establish a marketing strategy. Future studies could include other various variables and more thorough investigation into them.

  • PDF

Implications of TMF and QuEST Programs to Global Standardization Activities on Internet QoS in the Era of Digital Convergence (ITU-T와 IETF의 NGN 중심의 디지털 컨버전스 시대의 인터넷 QoS 가치사슬과 관련된 글로벌 표준화 활동)

  • Kim, Do-Hoon
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.3
    • /
    • pp.37-46
    • /
    • 2007
  • Our society is increasingly dependent on the Internet, and this trend will be accelerating in the ear of All-IP convergence. As the core infrastructure of the All-IP convergence, the next generation Internet should enable end-to-end Quality of Service(e2e QoS). For that purpose, major international standardization institutes such as ITU(International Telecommunication Union) and IETF(Internet Engineering Task Force) are building the concept and architecture of the Next Generation Network(NGN). However, these institutes focus only on technical issues, and leave many business/policy-oriented challenges unresolved. For example, the standards raised by ITU assume that the entire service delivery process for e2e QoS services is perfectly working. But required is a standardized business interface and process for seamless inter-operations across many stakeholders including ISPs(Internet Service Providers), CPs(Content Providers), so on. On the other hand, TMF(TeleManagement Forum) and QuEST(Quality Excellence for Suppliers of Telecommunication) Forum, global consortiums of telecom operators and vendors, present sets of interface rules and process which playa crucial role as de facto standards: for example, NGOSS/eTOM and TL9000 authorization system. However, these standards focus on telephone services, and provide little principle for the next generation Internet. Our study seeks a way to combine these two strains for a successful implementation of NGN. In particular, we find a missing link in the NGN architecture and the elements that could be complemented with the help of NGOSS/eTOM and TL9000. Finally, presented is a strategic direction that our standardization policy should purse in order to reinforce our global leadership for the next generation Internet.

A Method for Safety of RFID Systems

  • Karygiannis, Tom;Eydt, Bernard;Barber, Greg;Bunn, Lynn;Phillips, Ted
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.63-70
    • /
    • 2008
  • The authors, Tom Karygiannis of NIST, and Bernard Eydt, Greg Barber, Lynn Bunn, and Ted Phillips of Booz Allen Hamilton, wish to thank Steven Fick, Rick Korchak, Kate Remley, Jeff Guerrieri, Dylan Williams, Karen Scarfone, and Tim Grance of NIST, and Kenneth Waldrop and Beth Mallory of Booz Allen Hamilton. These individuals reviewed drafts of this document and contributed to its technical content. The authors would also like to express their thanks to several experts for their critical review and feedback on drafts of the publication. These experts include V.C. Kumar of Texas Instruments; Simson Garfinkel of the Naval Postgraduate School; Peter Sand of the Department of Homeland Security; Erika McCallister of MITRE; and several professionals supporting Automatic Identification Technology(AIT) program offices within the Department of Defense(DoD), especially Nicholas Tsougas, Fred Naigle, Vince Pontani, Jere Engelman, and Kathleen Smith. During the public comment period we received helpful comments from the following Federal Government agencies: the US Departments of Defense, Health and Human Services, Homeland Security, Labor, and State; the Office of the Director of National Intelligence; the Office of Management and Budget; and the General Services Administration. We also received several helpful contributions from commercial industry, including comments from EPCglobal, VeriSign, and Priway. Finally, the authors wish to thank the following individuals for their comments and assistance: Brian Tiplady, Daniel Bailey, Paul Dodd, Craig K. Harmon, William MacGregor, Ted Winograd, Russell Lange, Perry F. Wilson, John Pescatore, Ronald Dugger, Stephan Engberg, Morten Borup Harning, Matt Sexton, Brian Cute, Asterios Tsibertzopoulos, Mike Francis, Joshua Slob in, Jack Harris, and Judith Myerson.

  • PDF

TOSS: Telecom Operations Support Systems for Broadband Services

  • Chen, Yuan-Kai;Hsu, Chang-Ping;Hu, Chung-Hua;Lin, Rong-Syh;Lin, Yi-Bing;Lyu, Jian-Zhi;Wu, Wudy;Young, Hey-Chyi
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.1-20
    • /
    • 2010
  • Due to the convergence of voice, data, and video, today's telecom operators are facing the complexity of service and network management to offer differentiated value-added services that meet customer expectations. Without the operations support of well-developed Business Support System/Operations Support System (BSS/OSS), it is difficult to timely and effectively provide competitive services upon customer request. In this paper, a suite of NGOSS-based Telecom OSS (TOSS) is developed for the support of fulfillment and assurance operations of telecom services and IT services. Four OSS groups, TOSS-P (intelligent service provisioning), TOSS-N (integrated large-scale network management), TOSS-T (trouble handling and resolution), and TOSS-Q (end-to-end service quality management), are organized and integrated following the standard telecom operation processes (i.e., eTOM). We use IPTV and IP-VPN operation scenarios to show how these OSS groups co-work to support daily business operations with the benefits of cost reduction and revenue acceleration.

Keyword Analysis of Data Technology Using Big Data Technique (빅데이터 기법을 활용한 Data Technology의 키워드 분석)

  • Park, Sung-Uk
    • Journal of Korea Technology Innovation Society
    • /
    • v.22 no.2
    • /
    • pp.265-281
    • /
    • 2019
  • With the advent of the Internet-based economy, the dramatic changes in consumption patterns have been witnessed during the last decades. The seminal change has led by Data Technology, the integrated platform of mobile, online, offline and artificial intelligence, which remained unchallenged. In this paper, I use data analysis tool (TexTom) in order to articulate the definitfite notion of data technology from Internet sources. The data source is collected for last three years (November 2015 ~ November 2018) from Google and Naver. And I have derived several key keywords related to 'Data Technology'. As a result, it was found that the key keyword technologies of Big Data, O2O (Offline-to-Online), AI, IoT (Internet of things), and cloud computing are related to Data Technology. The results of this study can be used as useful information that can be referred to when the Data Technology age comes.

Silencing of the Target of Rapamycin Complex Genes Stimulates Tomato Fruit Ripening

  • Choi, Ilyeong;Ahn, Chang Sook;Lee, Du-Hwa;Baek, Seung-A;Jung, Jung Won;Kim, Jae Kwang;Lee, Ho-Seok;Pai, Hyun-Sook
    • Molecules and Cells
    • /
    • v.45 no.9
    • /
    • pp.660-672
    • /
    • 2022
  • The target of rapamycin complex (TORC) plays a key role in plant cell growth and survival by regulating the gene expression and metabolism according to environmental information. TORC activates transcription, mRNA translation, and anabolic processes under favorable conditions, thereby promoting plant growth and development. Tomato fruit ripening is a complex developmental process promoted by ethylene and specific transcription factors. TORC is known to modulate leaf senescence in tomato. In this study, we investigated the function of TORC in tomato fruit ripening using virus-induced gene silencing (VIGS) of the TORC genes, TOR, lethal with SEC13 protein 8 (LST8), and regulatory-associated protein of TOR (RAPTOR). Quantitative reverse transcription-polymerase chain reaction showed that the expression levels of tomato TORC genes were the highest in the orange stage during fruit development in Micro-Tom tomato. VIGS of these TORC genes using stage 2 tomato accelerated fruit ripening with premature orange/red coloring and decreased fruit growth, when control tobacco rattle virus 2 (TRV2)-myc fruits reached the mature green stage. TORC-deficient fruits showed early accumulation of carotenoid lycopene and reduced cellulose deposition in pericarp cell walls. The early ripening fruits had higher levels of transcripts related to fruit ripening transcription factors, ethylene biosynthesis, carotenoid synthesis, and cell wall modification. Finally, the early ripening phenotype in Micro-Tom tomato was reproduced in the commercial cultivar Moneymaker tomato by VIGS of the TORC genes. Collectively, these results demonstrate that TORC plays an important role in tomato fruit ripening by modulating the transcription of various ripening-related genes.

Mistranslation or Adaptation in Medieval Manuscripts: Can One Tell the Difference\ulcorner

  • Burton, Tom.L.
    • Lingua Humanitatis
    • /
    • v.2 no.2
    • /
    • pp.129-141
    • /
    • 2002
  • Editors of medieval texts that are translated from other languages face difficulties when the translation differs significantly from the original. Are the differences unintended, the result of misunderstanding and mistranslation\ulcorner Or do they proceed from a conscious decision on the translator's part to change the meaning of the original\ulcorner Is it possible to be sure one knows the difference\ulcorner This paper discusses three test cases encountered in preparing for the Early English Text Society a critical edition of Sidrak and Bokkus, the fifteenth-century English verse translation of the Old French prose book of knowledge, Le livre de Sidrac.

  • PDF

A Porous Silicon-Based Capacitive Humidity Sensor (다공질 실리콘 산화막을 이용한 용량형 습도 센서)

  • Min, Nam-Ki;Chin, Min-Suk;Ahn, Kwang-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1995.07c
    • /
    • pp.1209-1212
    • /
    • 1995
  • This paper presents a capacitive humidity sensor using porous silicon layers formed tom the anodization of p-type silicon in HF solution. The upper electrodes consist of many aluminum strips over porous silicon, between which the porous silicon is etched away. The sensor showed a good sensitivity(20pF/%RH) and lineaity in the range of 40%RH$\sim$80%RH, a hysteresis of ${\pm}2%$ RH, and a slow transient response. These preliminary resluts show that futher improvement can still be expected.

  • PDF

Dependency Grammar and the Parsing of Chinese Sentences

  • Lai, Bong-Ycung-Tom;Huang, Changning
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 1994.02a
    • /
    • pp.63-72
    • /
    • 1994
  • Dependency Grammar has been used by Iinguists as the basis of the syntactic components of their grammar formalisms. It has also been used in natural langauge parsing. In China, attempts have been made to use this grammar formalism to parse Chinese sentences using corpus based techniques. This paper reviews the properties of Dependency Grammar as embodied in four axioms for the well-formedness conditions for dependency structures. It is shown that allowing mul tiple governors as done by some followers of this formalism is unnecessary. The practice of augmenting Dependency Grammar with functional labels is discussed in the light of building functional structures when the sentence is parsed. This will also facilitate semantic interpretion.retion.

  • PDF

A PRELIMINARY STUDY ON THE CHARACTERIZATION OF HONEY BY NEAR INFRARED SPECTROSCOPY

  • Davies, Anthony M.C.;Radovic, Branka;Fearn, Tom;Anklam, Elke
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1052-1052
    • /
    • 2001
  • Hear infrared (NIR) spectra were measured, at five temperatures, for forty-eight samples of honey, from a variety of geographical and botanical sources, and the data has been used to explore the possibility of using NIR spectroscopy for testing label claims concerning the geographical and botanical source of honey being offered for sale to the public. These results demonstrate that the successful characterization of the botanical source of a honey may be obtained by NIR spectroscopy. Further work with large numbers of samples and groups will be required to realized this potential. Additional analysis of these data suggest that research into new ways of obtaining information on the change of absorption with temperature might be beneficial for a range of technologies.

  • PDF