• Title/Summary/Keyword: mobile appliances

Search Result 107, Processing Time 0.029 seconds

A Study on Omni-Channel Strategy in Fashion Industry (패션산업에서 옴니채널 전략에 관한 탐색적 연구)

  • Kim, SaeEun;Kim, MunYoung
    • Journal of the Korean Society of Costume
    • /
    • v.67 no.1
    • /
    • pp.40-55
    • /
    • 2017
  • The current new distribution environment provides the consumers to shop at anytime and any places by using mobile appliances. So, the companies which run the offline-store increase the contact point with the consumer by launching not only online-store but also the mobile application (app). Moreover, they are trying to operate the Omni-channel shopping environment. In order for this research to draw the direction of 'the Omni-Channel Strategy', which is about the changed distribution environment of the domestic fashion enterprise, the following steps were performed. First of all, the term related to 'Omni-Channel' is defined. And then, Example of the 'Omni-Channel' strategy and 'O2O' business in the domestic distributior were researched. Lastly, present condition of the 'Omni-Channel' strategy case of the domestic fashion industry was researched. At the result, the online-stores usually have several brands which can not represent their identities. It is suggested that each online-store according to each brand has their own characteristic identity. And The Omni-Channel strategy of the domestic fashion enterprise that is needed the connection point connecting the on-line and off-line. It is able to allure the customer to the off-line-store.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

A Usage Control Model based on Context-Awareness for Mobile Devices (휴대 단말기를 위한 상황인식 기반 사용제어 모델)

  • Chang, Hye-Young;Noh, Jin-Uk;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.63-70
    • /
    • 2008
  • As the number of cell phone users become growing, some researchers have presented that the imprudent use of mobile phones exerts harmful influence on electronic devices such as medical appliances, takeoff and landing system of aircraft. In this paper, we propose a usage model based on context-awareness which can be applied to mobile devices. The model controls the usage of both mobile devices themselves and mobile contents according to some context information like location, time, the circumference noise, etc. The proposed usage control model includes a dynamic role-based access control approach. To show the effectiveness of the proposed model, we have implemented a prototype system on an embedded board and PC server, and evaluated the performance of the system.

An Effective Malware Detection Mechanism in Android Environment (안드로이드 환경에서의 효과적인 악성코드 탐지 메커니즘)

  • Kim, Eui Tak;Ryu, Keun Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.305-313
    • /
    • 2018
  • With the explosive growth of smart phones and efficiency, the Android of an open mobile operating system is gradually increasing in the use and the availability. Android systems has proven its availability and stability in the mobile devices, the home appliances's operating systems, the IoT products, and the mechatronics. However, as the usability increases, the malicious code based on Android also increases exponentially. Unlike ordinary PCs, if malicious codes are infiltrated into mobile products, mobile devices can not be used as a lock and can be leaked a large number of personal contacts, and can be lead to unnecessary billing, and can be cause a huge loss of financial services. Therefore, we proposed a method to detect and delete malicious files in real time in order to solve this problem. In this paper, we also designed a method to detect and delete malicious codes in a more effective manner through the process of installing Android-based applications and signature-based malicious code detection method. The method we proposed and designed can effectively detect malicious code in a limited resource environment, such as mobile environments.

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

An Empirical Study on the Effect of Perceived Usefulness, Reliability, and Convenience of Rental Subscription Service Users on Customer Satisfaction (렌탈구독서비스 이용자의 지각된 유용성, 신뢰성 및 편의성이 고객만족에 미치는 영향에 관한 실증연구)

  • Jin, Ki-bang;Ha, Tae-kwan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.3
    • /
    • pp.97-107
    • /
    • 2024
  • This study aims to identify the factors that affect customer satisfaction as the market growth of rental subscription services for living environment home appliances increases. Unlike previous research, which focused on online subscriptions (e.g., digital content, over-the-top (OTT) services, e-books, and mobile devices), this study expands the scope to include rental subscriptions for household environmental appliances. Specifically, this study analyzes the factors influencing customer satisfaction among rental subscription service users by examining the effects of perceived usefulness, reliability, and convenience. The results show that users' perceived reliability and convenience of rental subscription services for living environment home appliances significantly affect customer satisfaction. Perceived usefulness, however, was not found to have a significant impact, as it is an abstract and subjective customer aspect. The implications of the results are as follows: First, standardized services must be strengthened to increase the reliability of rental subscription services. Additionally, it is necessary to improve convenience by developing additional services when managing regular visits tailored to the characteristics of each product. Providing customized services by integrating products and Information and Communications Technologies (ICT). Furthermore, effective customer management to increase customer satisfaction is crucial, as it can lead to cross-selling and up-selling opportunities. Lastly, venture start-ups should actively apply a subscription service business model.

  • PDF

A Priority Analysis on Mobile Telecom Internet of Things Using the AHP (analytic hierarchy process) (계층분석기법(AHP)을 이용한 이동통신 사물인터넷 서비스 우선순위 분석)

  • Nam, Soo-Tai;Jin, Chan-Yong;Kim, Do-Goan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1191-1196
    • /
    • 2017
  • Lately, the three mobile telecom companies in Korea are competing for the launch of Internet of Things services for using home. Typical launched services are in the smart home related fields. However, Internet of Things as mobile telecom based are at an early stage, expected that various services will be started continuously. At this point, we have been planning to analyze the preference of Internet of Things for objects based on the services already launched. In order to apply the analytic hierarchy method, the first stage factors were designed as Safety, Security, Health care, Intelligence and Home appliances. In addition, the second stage factors were organized into 18 detailed services presented in the conceptual model. As a result, Health care (23.2%) was the most preferred priority. These results can be interpreted as the result of interest in health by improving income. We presented the theoretical and practical implications of these results.

A Preference Analysis for Internet of Things based Mobile Telecom Environment in Korea (국내 이동통신 사물인터넷에 관한 선호도 분석)

  • Nam, Soo-Tai;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.140-143
    • /
    • 2017
  • Lately, the three mobile telecom companies in Korea are competing for the launch of internet of things services for using home. Typical launched services are in the smart home related fields. However, internet of things as mobile telecom based are at an early stage, expected that various services will be started continuously. At this point, we have been planning to analyze the preference of Internet of things for objects based on the services already launched. In order to apply the AHP (analytic hierarchy process) analysis method, the first stage factors were designed as safety, security, health care, intelligence and home appliances. In addition, the second stage factors were organized into 18 detailed services presented in the conceptual model. Thus, we present the theoretical and practical implications of these results.

  • PDF

The Improvement of NDF(No Defect Found) on Mobile Device Using Datamining (데이터 마이닝 기법을 활용한 Mobile Device NDF(No Defect Found) 개선)

  • Lee, Jewang;Han, Chang Hee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.60-70
    • /
    • 2021
  • Recently, with the development of technologies for the fourth industrial revolution, convergence and complex technology are being applied to aircraft, electronic home appliances and mobile devices, and the number of parts used is increasing. Increasing the number of parts and the application of convergence technologies such as HW (hardware) and SW (software) are increasing the No Defect Found (NDF) phenomenon in which the defect is not reproduced or the cause of the defect cannot be identified in the subsequent investigation systems after the discovery of the defect in the product. The NDF phenomenon is a major problem when dealing with complex technical systems, and its consequences may be manifested in decreased safety and dependability and increased life cycle costs. Until now, NDF-related prior studies have been mainly focused on the NDF cost estimation, the cause and impact analysis of NDF in qualitative terms. And there have been no specific methodologies or examples of a working-level perspective to reduce NDF. The purpose of this study is to present a practical methodology for reducing NDF phenomena through data mining methods using quantitative data accumulated in the enterprise. In this study, we performed a cluster analysis using market defects and design-related variables of mobile devices. And then, by analyzing the characteristics of groups with high NDF ratios, we presented improvement directions in terms of design and after service policies. This is significant in solving NDF problems from a practical perspective in the company.

The Development of Ecobot Robot for Friendly Environment Smart Home Appliance Application System (친환경 스마트 가전 응용 시스템용 Ecobot 로봇 플랫폼 개발)

  • Moon, Yong-Seon;Bae, Young-Chul;Cha, Hyun-Rok;Roh, Sang-Hyun;Park, Jong-Kyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.480-485
    • /
    • 2010
  • In this paper, we developed mobile robot platform called Ecobot for the application system of friendly environment smart home appliance. Ecobot fulfills the purposes of monitoring of the healthy environment and guidance in the application system of friendly smart environment home appliance, home network formed by Zigbee network. For the healthy environment, the system contains monitoring sensor. Moreover, it continuously keeps the healthy environment by controlling the smart home appliances linkng with Zigbee network. And also using the URG-04LX laser distance sensor, it monitors indoor environment through autonomous moving and collision avoidance.