• Title/Summary/Keyword: channel characteristics

Search Result 3,699, Processing Time 0.037 seconds

Numerical Analysis of Unstable Combustion Flows in Normal Injection Supersonic Combustor with a Cavity (공동이 있는 수직 분사 초음속 연소기 내의 불안정 연소유동 해석)

  • Jeong-Yeol Choi;Vigor Yang
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2003.05a
    • /
    • pp.91-93
    • /
    • 2003
  • A comprehensive numerical study is carried out to investigate for the understanding of the flow evolution and flame development in a supersonic combustor with normal injection of ncumally injecting hydrogen in airsupersonic flows. The formulation treats the complete conservation equations of mass, momentum, energy, and species concentration for a multi-component chemically reacting system. For the numerical simulation of supersonic combustion, multi-species Navier-Stokes equations and detailed chemistry of H2-Air is considered. It also accommodates a finite-rate chemical kinetics mechanism of hydrogen-air combustion GRI-Mech. 2.11[1], which consists of nine species and twenty-five reaction steps. Turbulence closure is achieved by means of a k-two-equation model (2). The governing equations are spatially discretized using a finite-volume approach, and temporally integrated by means of a second-order accurate implicit scheme (3-5).The supersonic combustor consists of a flat channel of 10 cm height and a fuel-injection slit of 0.1 cm width located at 10 cm downstream of the inlet. A cavity of 5 cm height and 20 cm width is installed at 15 cm downstream of the injection slit. A total of 936160 grids are used for the main-combustor flow passage, and 159161 grids for the cavity. The grids are clustered in the flow direction near the fuel injector and cavity, as well as in the vertical direction near the bottom wall. The no-slip and adiabatic conditions are assumed throughout the entire wall boundary. As a specific example, the inflow Mach number is assumed to be 3, and the temperature and pressure are 600 K and 0.1 MPa, respectively. Gaseous hydrogen at a temperature of 151.5 K is injected normal to the wall from a choked injector.A series of calculations were carried out by varying the fuel injection pressure from 0.5 to 1.5MPa. This amounts to changing the fuel mass flow rate or the overall equivalence ratio for different operating regimes. Figure 1 shows the instantaneous temperature fields in the supersonic combustor at four different conditions. The dark blue region represents the hot burned gases. At the fuel injection pressure of 0.5 MPa, the flame is stably anchored, but the flow field exhibits a high-amplitude oscillation. At the fuel injection pressure of 1.0 MPa, the Mach reflection occurs ahead of the injector. The interaction between the incoming air and the injection flow becomes much more complex, and the fuel/air mixing is strongly enhanced. The Mach reflection oscillates and results in a strong fluctuation in the combustor wall pressure. At the fuel injection pressure of 1.5MPa, the flow inside the combustor becomes nearly choked and the Mach reflection is displaced forward. The leading shock wave moves slowly toward the inlet, and eventually causes the combustor-upstart due to the thermal choking. The cavity appears to play a secondary role in driving the flow unsteadiness, in spite of its influence on the fuel/air mixing and flame evolution. Further investigation is necessary on this issue. The present study features detailed resolution of the flow and flame dynamics in the combustor, which was not typically available in most of the previous works. In particular, the oscillatory flow characteristics are captured at a scale sufficient to identify the underlying physical mechanisms. Much of the flow unsteadiness is not related to the cavity, but rather to the intrinsic unsteadiness in the flowfield, as also shown experimentally by Ben-Yakar et al. [6], The interactions between the unsteady flow and flame evolution may cause a large excursion of flow oscillation. The work appears to be the first of its kind in the numerical study of combustion oscillations in a supersonic combustor, although a similar phenomenon was previously reported experimentally. A more comprehensive discussion will be given in the final paper presented at the colloquium.

  • PDF

Selection Model of System Trading Strategies using SVM (SVM을 이용한 시스템트레이딩전략의 선택모형)

  • Park, Sungcheol;Kim, Sun Woong;Choi, Heung Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.59-71
    • /
    • 2014
  • System trading is becoming more popular among Korean traders recently. System traders use automatic order systems based on the system generated buy and sell signals. These signals are generated from the predetermined entry and exit rules that were coded by system traders. Most researches on system trading have focused on designing profitable entry and exit rules using technical indicators. However, market conditions, strategy characteristics, and money management also have influences on the profitability of the system trading. Unexpected price deviations from the predetermined trading rules can incur large losses to system traders. Therefore, most professional traders use strategy portfolios rather than only one strategy. Building a good strategy portfolio is important because trading performance depends on strategy portfolios. Despite of the importance of designing strategy portfolio, rule of thumb methods have been used to select trading strategies. In this study, we propose a SVM-based strategy portfolio management system. SVM were introduced by Vapnik and is known to be effective for data mining area. It can build good portfolios within a very short period of time. Since SVM minimizes structural risks, it is best suitable for the futures trading market in which prices do not move exactly the same as the past. Our system trading strategies include moving-average cross system, MACD cross system, trend-following system, buy dips and sell rallies system, DMI system, Keltner channel system, Bollinger Bands system, and Fibonacci system. These strategies are well known and frequently being used by many professional traders. We program these strategies for generating automated system signals for entry and exit. We propose SVM-based strategies selection system and portfolio construction and order routing system. Strategies selection system is a portfolio training system. It generates training data and makes SVM model using optimal portfolio. We make $m{\times}n$ data matrix by dividing KOSPI 200 index futures data with a same period. Optimal strategy portfolio is derived from analyzing each strategy performance. SVM model is generated based on this data and optimal strategy portfolio. We use 80% of the data for training and the remaining 20% is used for testing the strategy. For training, we select two strategies which show the highest profit in the next day. Selection method 1 selects two strategies and method 2 selects maximum two strategies which show profit more than 0.1 point. We use one-against-all method which has fast processing time. We analyse the daily data of KOSPI 200 index futures contracts from January 1990 to November 2011. Price change rates for 50 days are used as SVM input data. The training period is from January 1990 to March 2007 and the test period is from March 2007 to November 2011. We suggest three benchmark strategies portfolio. BM1 holds two contracts of KOSPI 200 index futures for testing period. BM2 is constructed as two strategies which show the largest cumulative profit during 30 days before testing starts. BM3 has two strategies which show best profits during testing period. Trading cost include brokerage commission cost and slippage cost. The proposed strategy portfolio management system shows profit more than double of the benchmark portfolios. BM1 shows 103.44 point profit, BM2 shows 488.61 point profit, and BM3 shows 502.41 point profit after deducting trading cost. The best benchmark is the portfolio of the two best profit strategies during the test period. The proposed system 1 shows 706.22 point profit and proposed system 2 shows 768.95 point profit after deducting trading cost. The equity curves for the entire period show stable pattern. With higher profit, this suggests a good trading direction for system traders. We can make more stable and more profitable portfolios if we add money management module to the system.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

Sulfide Chimney from the Cleft Segment, Juan de Fuca Ridge: Mineralogy and Fluid Inclusion (Juan de Fuca 해령 Cleft Segment에서 회수된 황화물 침니: 광물조성 및 유체포유물)

  • 윤성택;허철호;소칠섭;염승준;이경용
    • Economic and Environmental Geology
    • /
    • v.35 no.3
    • /
    • pp.203-210
    • /
    • 2002
  • In order to elucidate the growth mechanism of sulfide chimney formed as a result of seafloor hydrothermal mineralization, we carried out the mineralogical and fluid inclusion studies on the inactive, sulfide- and silica-rich chimney which has been recovered from a hydrothermal field in the Cleft segment of the Juan de Fuca Ridge. According to previous studies, many active and inactive vents are present in the Cleft segment. The sulfide- and silica-rich chimney is composed of amorphous silica, pyrite, sphalerite and wurtzite with minor amounts of chalcopyrite and marcasite. The interior part of the chimney is highly porous and represents a flow channel. Open spaces within chimneys are typically coated with colloform layers of amorphous silica. The FeS content of Zn-sulfides varies widely from 13.9 to 34.3 mole% with Fe-rich core and Fe-poor rims. This variation possibly reflects the change of physicochemical characteristics of hydrothermal fluids. Chemical and mineralogical compositions of the each growth zone are also varied, possibly due to a thermal gradient. Based on the microthermometric measurements of liquid-rich, two-phase inclusions in amorphous silica that was precipitated in the late stage of mineralization, minimum trapping temperatures are estimated to be about 1140 to 145$^{\circ}$C with the salinities between 3.2 and 4.8 wt.% NaCI equiv. Although the actual fluid temperatures of the vent are not available, this study suggests that the lowtemperature conditions were predominant during the mineralization in the hydrothermal field at Cleft segment. Comparing with the previously reported chimney types, the morphology, colloform texture, bulk chemistry, and a characteristic mineral assemblage (pyrite + marcasite + wurtzite + amorphous silica) of this chimney indicate that the chimney have been formed from a relatively low-temperature (<250$^{\circ}$C) hydrothermal fluid that was changed by sluggish fluid flow and conductive cooling.

Personalized Recommendation System for IPTV using Ontology and K-medoids (IPTV환경에서 온톨로지와 k-medoids기법을 이용한 개인화 시스템)

  • Yun, Byeong-Dae;Kim, Jong-Woo;Cho, Yong-Seok;Kang, Sang-Gil
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.147-161
    • /
    • 2010
  • As broadcasting and communication are converged recently, communication is jointed to TV. TV viewing has brought about many changes. The IPTV (Internet Protocol Television) provides information service, movie contents, broadcast, etc. through internet with live programs + VOD (Video on demand) jointed. Using communication network, it becomes an issue of new business. In addition, new technical issues have been created by imaging technology for the service, networking technology without video cuts, security technologies to protect copyright, etc. Through this IPTV network, users can watch their desired programs when they want. However, IPTV has difficulties in search approach, menu approach, or finding programs. Menu approach spends a lot of time in approaching programs desired. Search approach can't be found when title, genre, name of actors, etc. are not known. In addition, inserting letters through remote control have problems. However, the bigger problem is that many times users are not usually ware of the services they use. Thus, to resolve difficulties when selecting VOD service in IPTV, a personalized service is recommended, which enhance users' satisfaction and use your time, efficiently. This paper provides appropriate programs which are fit to individuals not to save time in order to solve IPTV's shortcomings through filtering and recommendation-related system. The proposed recommendation system collects TV program information, the user's preferred program genres and detailed genre, channel, watching program, and information on viewing time based on individual records of watching IPTV. To look for these kinds of similarities, similarities can be compared by using ontology for TV programs. The reason to use these is because the distance of program can be measured by the similarity comparison. TV program ontology we are using is one extracted from TV-Anytime metadata which represents semantic nature. Also, ontology expresses the contents and features in figures. Through world net, vocabulary similarity is determined. All the words described on the programs are expanded into upper and lower classes for word similarity decision. The average of described key words was measured. The criterion of distance calculated ties similar programs through K-medoids dividing method. K-medoids dividing method is a dividing way to divide classified groups into ones with similar characteristics. This K-medoids method sets K-unit representative objects. Here, distance from representative object sets temporary distance and colonize it. Through algorithm, when the initial n-unit objects are tried to be divided into K-units. The optimal object must be found through repeated trials after selecting representative object temporarily. Through this course, similar programs must be colonized. Selecting programs through group analysis, weight should be given to the recommendation. The way to provide weight with recommendation is as the follows. When each group recommends programs, similar programs near representative objects will be recommended to users. The formula to calculate the distance is same as measure similar distance. It will be a basic figure which determines the rankings of recommended programs. Weight is used to calculate the number of watching lists. As the more programs are, the higher weight will be loaded. This is defined as cluster weight. Through this, sub-TV programs which are representative of the groups must be selected. The final TV programs ranks must be determined. However, the group-representative TV programs include errors. Therefore, weights must be added to TV program viewing preference. They must determine the finalranks.Based on this, our customers prefer proposed to recommend contents. So, based on the proposed method this paper suggested, experiment was carried out in controlled environment. Through experiment, the superiority of the proposed method is shown, compared to existing ways.

Study on sea fog detection near Korea peninsula by using GMS-5 Satellite Data (GMS-5 위성자료를 이용한 한반도 주변 해무탐지 연구)

  • 윤홍주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.4
    • /
    • pp.875-884
    • /
    • 2000
  • Sea fog/stratus is very difficult to detect because of the characteristics of air-sea interaction and locality ,and the scantiness of the observed data from the oceans such as ships or ocean buoys. The aim of our study develops new algorism for sea fog detection by using Geostational Meteorological Satellite-5(GMS-5) and suggests the technics of its continuous detection. In this study, atmospheric synoptic patterns on sea fog day of May, 1999 are classified; cold air advection type(OOUTC, May 10, 1999) and warm air advection type(OOUTC, May 12, 1999), respectively, and we collected two case days in order to analyze variations of water vapor at Osan observation station during May 9-10, 1999.So as to detect daytime sea fog/stratus(OOUTC, May 10, 1999), composite image, visible accumulated histogram method and surface albedo method are used. The characteristic value during day showed A(min) .20% and DA < 10% when visible accumulated histogram method was applied. And the sea fog region which is detected is similar in composite image analysis and surface albedo method. Inland observation which visibility and relative humidity is beneath 1Km and 80%, respectively, at OOUTC, May 10,1999; Poryoung for visble accumulated histogram method and Poryoung, Mokp'o and Kangnung for surface albedo method. In case of nighttime sea fog(18UTC, May 10, 1999), IR accumulated histogram method and Maximum brightness temperature method are used, respectively. Maxium brightness temperature method dectected sea fog better than IR accumulated histogram method with the charateristic value that is T_max < T_max_trs, and then T_max is beneath 700hPa temperature of GDAPS(Global Data Assimilation and Prediction System). Sea fog region which is detected by Maxium brighness temperature method was similar to the result of National Oceanic and Atmosheric Administratio/Advanced Very High Resolution Radiometer (NOAA/AVHRR) DCD(Dual Channel Difference), but usually visibility and relative humidity are not agreed well in inland.

  • PDF

Effect of Halophilic Bacterium, Haloarcula vallismortis, Extract on UV-induced Skin Change (호염 미생물(Haloarcula vallismortis) 용해물의 자외선유발 피부변화에 대한 효과)

  • Kim, Ji Hyung;Shin, Jae Young;Hwang, Seung Jin;Kim, Yun Sun;Kim, Yoo Mi;Gil, So Yeon;Jin, Mu Hyun;Lee, Sang Hwa
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.41 no.4
    • /
    • pp.341-350
    • /
    • 2015
  • Skin carrys out protective role against harmful outer environment assaults including ultraviolet radiation, heavy metals and oxides. Especially, ultraviolet-B (UVB) light causes inflammatory reactions in skin such as sun burn and erythma and stimulates melanin pigmentation. Furthermore, the influx of UVB into skin cells causes DNA damage in keratinocytes and dermal fibroblasts, inhibition of extracellular matrix (ECM) synthesis which leads to a decrease in elasticity of skin and wrinkle formation. It also damages dermal connective tissue and disrupts the skin barrier function. Prolonged exposure of human skin to UVB light is well known to trigger severe skin lesions such as cell death and carcinogenesis. Haloarcula vallismortis is a halophilic microorganism isolated from the Dead Sea, Its growth characteristics have not been studied in detail yet. It generally grows at salinity more than 10%, but the actual growth salinity usually ranges between 20 to 25%. Because H. vallismortis is found mainly in saltern or salt lakes, there could exist defense mechanisms against strong sunlight. One of them is generation of additional ATP using halorhodopsin which absorbs photons and produces energy by potential difference formed by opening the chloride ion channel. It often shows a color of pink or red because of their high content of carotenoid pigments and it is considered to act as a defense mechanism against intense UV irradiation. In this study, the anti-inflammatory effect of the halophilic microorganism, H. vallismortis, extract was investigated. It was found that H. vallismortis extract had protective effect on DNA damage induced by UV irradiation. These results suggest that the extract of halophilic bacterium, H. vallismortis could be used as a bio-sunscreen or natural sunscreen which ameliorate the harmful effects of UV light with its anti-inflammatory and DNA protective properties.

Sensitivity Analysis for CAS500-4 Atmospheric Correction Using Simulated Images and Suggestion of the Use of Geostationary Satellite-based Atmospheric Parameters (모의영상을 이용한 농림위성 대기보정의 주요 파라미터 민감도 분석 및 타위성 산출물 활용 가능성 제시)

  • Kang, Yoojin;Cho, Dongjin;Han, Daehyeon;Im, Jungho;Lim, Joongbin;Oh, Kum-hui;Kwon, Eonhye
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_1
    • /
    • pp.1029-1042
    • /
    • 2021
  • As part of the next-generation Compact Advanced Satellite 500 (CAS500) project, CAS500-4 is scheduled to be launched in 2025 focusing on the remote sensing of agriculture and forestry. To obtain quantitative information on vegetation from satellite images, it is necessary to acquire surface reflectance through atmospheric correction. Thus, it is essential to develop an atmospheric correction method suitable for CAS500-4. Since the absorption and scattering characteristics in the atmosphere vary depending on the wavelength, it is needed to analyze the sensitivity of atmospheric correction parameters such as aerosol optical depth (AOD) and water vapor (WV) considering the wavelengths of CAS500-4. In addition, as CAS500-4 has only five channels (blue, green, red, red edge, and near-infrared), making it difficult to directly calculate key parameters for atmospheric correction, external parameter data should be used. Therefore, thisstudy performed a sensitivity analysis of the key parameters (AOD, WV, and O3) using the simulated images based on Sentinel-2 satellite data, which has similar wavelength specifications to CAS500-4, and examined the possibility of using the products of GEO-KOMPSAT-2A (GK2A) as atmospheric parameters. The sensitivity analysisshowed that AOD wasthe most important parameter with greater sensitivity in visible channels than in the near-infrared region. In particular, since AOD change of 20% causes about a 100% error rate in the blue channel surface reflectance in forests, a highly reliable AOD is needed to obtain accurate surface reflectance. The atmospherically corrected surface reflectance based on the GK2A AOD and WV was compared with the Sentinel-2 L2A reflectance data through the separability index of the known land cover pixels. The result showed that two corrected surface reflectance had similar Seperability index (SI) values, the atmospheric corrected surface reflectance based on the GK2A AOD showed higher SI than the Sentinel-2 L2A reflectance data in short-wavelength channels. Thus, it is judged that the parameters provided by GK2A can be fully utilized for atmospheric correction of the CAS500-4. The research findings will provide a basis for atmospheric correction of the CAS500-4 in the future.

Evaluation of Image Quality using SE-EPI and SSH-TSE Techniques in MRDWI (자기공명확산강조영상에서 SE-EPI 와 SSH-TSE 기법을 이용한 영상의 질 평가)

  • Goo, Eun-Hoe
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.7
    • /
    • pp.991-998
    • /
    • 2021
  • The purpose of this study is to investigate the image quality of the SE-EPI and SSH-TSE technique for MR DWI. Datum were analyzed for 35 PACS transmission datum(Normal part: 12 males, 13 females, Cerebral Infarction: 10(5males and 5females), and average age 68±7.32), randomly selected patients who underwent MRDWI tests. The equipment used was Ingenia CX 3.0T, SSH_TSE and SE-EPI pulse sequence and 32 Ch. head coil were used for data acquisition. Image evaluation was performed on the paired t-test and Wilcoxon tests, and was considered significant when the p value was 0.05 or less. As a result of quantitative analysis of SNR for DWI images, the mean and standard deviation values of 4 parts (WM, GM, BG, Cerebellum) in ADC (s/mm2), Diffusion b=0, 1000 images were higher in SE-EPI techniques(ADC: 120.50 ± 40, b=0: 54.50 ± 35.91, b=1000: 91.61 ± 36.63) than in SSH-TSE techniques(ADC: 99.69 ± 31.10, b=0: 43.52 ± 25.00 , b=1000: 60.74 ± 24.85)(p<0.05). The CNR values for GM-WM, BG-WM sites were also higher in SE-EPI technique (ADC: 116.08 ± 43.30, b=0:27.23 ± 09.10, b=1000: 78.50 ± 16.56) than in SSH-TSE(ADC: 101.08 ± 36.81, b=0: 23.96 ± 07.79 , b=1000: 74.30 ± 14.22). As a visual evaluation of observers, ghost artifact, magnetic susceptibility artifacts and overall image quality for SE-TSE and SSH-TSE all yielded high results from SSH-TSE techniques(ADC:3.6 ± 0.1, 2.8 ± 0.2, b=0: 4.3 ± 0.3, 3.4 ± 0.1 b=1000: 4.3 ± 0.2, 3.5 ± 0.2, p=0.000). In conclusion, the SE-EPI technique obtained an superiority in SNR and CNR measurements using SSH-TSE, SE-EPI. In the qualitative analysis, the SSH-TSE pulse sequence was obtained a high result according to the pulse sequence characteristics.

Study on Korean SMEs' Brand Luxuriousness Building (마케팅 믹스를 활용한 한국 중소기업의 브랜드 명품성 구축에 대한 연구)

  • Koh, InKo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.6
    • /
    • pp.1-14
    • /
    • 2018
  • As interest and consumption of luxury goods have become more popular, luxury goods market is growing rapidly. Consumers can acquire psychological satisfaction with material abundance by purchasing and using luxury goods. Also, from the view of corporations, luxury goods have price inelastic characteristics, so they can enjoy price premium and it is good to produce good performance. That is the reason why they should pay much attention to securing luxuriousness. This study examined the establishment of brands luxuriousness in Korean SMEs. First, it examined the world market of luxury goods industry and the present condition of Korean market. Then it identified the constituents of luxuriousness by examining the prior studies and related literatures, and designed a research model based on the theoretical grounds to suggest the methods of brand luxuriousness building of Korean SMEs. Luxuriousness can be defined as the attribute of product that distinguishes luxury goods from other products by consumers' perceptions, and the factor that provides situational benefits that motivate consumers' purchasing behavior. In this study, I identified the sub-dimensions of luxuriousness according to whether there are product related attributes and consumers' benefit in consideration of the problems of existing studies. Product related luxuriousness are classified into superiority(functional benefit) and scarcity(experiential benefit), while non-product related luxuriousness are classified into differentiation(symbolic benefit) and traditionality(exclusive benefit). The following are the ways to build brand luxuriousness. First, company can use product factors. High quality, excellent design, high recognized brand with strong, favorable and unique images can enhance the luxuriousness of brand. Second, company can use price factors. Consumers tend to perceive luxury goods as high-priced items, so lowering the price of product can undermine the luxuriousness of product. Third, company can use distribution factors. It is effective for making consumers to perceive the differentiation and scarcity of luxuriousness through limited distribution channel. In addition, store atmosphere suitable for luxury brands should be created. Fourth, company can use promotion factors. The more consumers are exposed to advertisements, the more positive attitudes toward luxury brands are made, and consumers recognize luxuriousness higher. Price promotion negatively affects consumers' perception of luxuriousness. Fifth, company can use corporate factors. Consumer evaluations of products are influenced not only by the product attributes but also by the corporate association and corporate image surrounding the product. Considering the existing researches, it is possible to enhance the brand luxuriousness through high corporate competence and good corporate reputation. In order to increase the competence of the enterprise, it is useful to approach multidimensionally in relation with the knowledge creation capability. In corporate reputation, the external stakeholders' reputation is important, but the internal members' reputation is also important. Korean SMEs will be able to build brand luxuriousness by establishing marketing strategies as above and/or mix(integrate) them according to the situation.