• Title/Summary/Keyword: non-existence information

Search Result 129, Processing Time 0.022 seconds

A study on the Preference of Material quality and the Demand Performance of Clothing for Underwear Materials (내의 소재에 대한 재질선호 및 요구 성능에 대한 연구)

  • Park, Young-Hee
    • Fashion & Textile Research Journal
    • /
    • v.11 no.1
    • /
    • pp.147-155
    • /
    • 2009
  • This study has been made to examine the basic information, the preferences of material quality, and the demand performance of clothing for underwear materials between atopic patients and non-patients. The measurement tool was a questionnaire. For statistical analysis of data, crosstabs, ${\chi}^2$-test, t-test and ANOVA through SPSS for Windows(version 14.0) were used. The results obtained are as follows. The degree of the basic knowledge about clothing materials indicated that women was higher than men. The material decision method and the most considering part in case of selecting underwear products showed difference between men and women. The preference factors for underwear material quality were drawn with the five factors of sense of weight/pliability, lustering/see-through, tactility, and sense of cold and warmth. The preferred underwear material showed difference according to gender, existence and nonexistence of atopic determatitis, and degree of strength of skin itching caused by clothing materials. The demand performances of clothing in case of selecting underwear were drawn with the four factors of hygiene/practicality, skin protection, quality of materials, and aesthetic attribute. The demand performance of underwear showed difference according to gender, existence and nonexistence of atopic determatitis, degree of strength of skin itching caused by clothing materials.

Relationship Brand Orientation and Internal Brand Equity at Internet Service Providers: An Organization Change Readiness Effect

  • TOBING, Rudy P.;SUROSO, SUROSO;HALIM, Rizal Edy;ALIF, Gunawan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.2
    • /
    • pp.181-193
    • /
    • 2020
  • The midst competition makes a brand all together with its offering products and services is becoming a crucial element for company existence. This requires direct involvement from internal organizational to develop effective strategic branding. According to Asosiasi Penyelenggara Internet Indonesia (APJII), Indonesia's internet penetration is among the highest in Asia. The purpose of this research is to improve the strategic role of brand orientation within Internet Service Provider (ISP) for maximizing return on the company's financial and non-financial benefits by proposing organization change readiness variable. The data collection is taken using an online survey with a non-parametric sampling method and collected 68 qualified respondents for data analysis using SEM-PLS (Structural Equation Modeling with Partial Least Square). The result indicates partial hypotheses on the constructed model between variables brand orientation, brand commitment, and internal brand equity is acceptable. Another finding is stated hypotheses on organization change readiness as moderation is not accepted and means there is no significance to the constructed model. The main conclusion resumes associative human memory can shape up organization change readiness inside internal toward then brand. Relevant cues generate information received in the human brain then will create common associative and becoming social identity on internal brand equity.

Detection of Flaws in Ceramic Materials Using Non-Destructive Testing (비파괴 검사를 이용한 세라믹 재료의 결함 검출)

  • Kim, Kwang-Baek;Woo, Young-Woon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.3
    • /
    • pp.321-326
    • /
    • 2010
  • A method that can decide the existence and the severeness of flaws in ceramic materials through the use of non-destructive testing by image processing techniques, is proposed in this paper. The edges of the acquired image are first extracted using Sobel mask and the regions of the image are clustered using another mask after that. Histogram stretching is applied to each of the regions to enhance the image region-wise and objects are extracted by an edge following algorithm. Morphological information is incorporated to remove noise and detect flawed regions. The proposed method can detect flaws in the acquired images and the experimental results also supports that.

A Study on the Improvement Plan of Record Management of Non-Governmental Organizations to Improve Accountability : Based on a Survey of NGOs in Busan (설명책임성 향상을 위한 시민단체 기록관리 개선 방안 연구 부산지역단체 실태조사를 중심으로)

  • Sea, Jeong
    • The Korean Journal of Archival Studies
    • /
    • no.73
    • /
    • pp.81-123
    • /
    • 2022
  • NGOs(Non-Governmental Organizations) are organization based on the 'voluntary participation' of citizens. Citizens' participation and support are essential for the existence and sustainable growth of the organization. The records of NGOs are produced, received, collected, and left behind in the course of their activities. Systematically managed records are used as information for business performance to increase operational efficiency. In addition, it plays a role in proving the legitimacy of the group and its activities to internal and external stakeholders of the NGO, such as whether the group's activities were performed legally and whether the group is actually working to realize the goal it stands for. Therefore record management of NGOs is required to improve accountability. In other words, NGOs can be gain the trust of civil society based on accountability through records and secure internal and external resources necessary for the existence of the group. In this study, after confirming the general record management status of NGOs in Busan, improvement measures were examined in terms of record management in order to increase the accountability of NGOs.

Using Central Manifold Theorem in the Analysis of Master-Slave Synchronization Networks

  • Castilho, Jose-Roberto;Carlos Nehemy;Alves, Luiz-Henrique
    • Journal of Communications and Networks
    • /
    • v.6 no.3
    • /
    • pp.197-202
    • /
    • 2004
  • This work presents a stability analysis of the synchronous state for one-way master-slave time distribution networks with single star topology. Using bifurcation theory, the dynamical behavior of second-order phase-locked loops employed to extract the synchronous state in each node is analyzed in function of the constitutive parameters. Two usual inputs, the step and the ramp phase perturbations, are supposed to appear in the master node and, in each case, the existence and the stability of the synchronous state are studied. For parameter combinations resulting in non-hyperbolic synchronous states the linear approximation does not provide any information, even about the local behavior of the system. In this case, the center manifold theorem permits the construction of an equivalent vector field representing the asymptotic behavior of the original system in a local neighborhood of these points. Thus, the local stability can be determined.

What are Legible Korean Font Sizes within In-Vehicle Information Systems?

  • Kim, Huhn;Park, Soo-Hyun
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.2
    • /
    • pp.397-406
    • /
    • 2012
  • Objective: The aim of this study is to determine legible Korean font sizes within in-vehicle information systems(IVISs) in diving conditions. Background: Font legibility within IVISs is one of important causes on its' safe operations during driving. Several researches proposed some guidelines on the legible English font sizes within IVISs. On the contrary, appropriate Korean font sizes have been hardly known in spite of the typological differences between English and Korean. Therefore, more systematic researches for improving the legibility on Korean font size within IVISs have been required. Method: In this study, an experiment was performed with the following experimental factors: the existence of vibration, the color contrasts(white on black, black on white), the font types(HDR, CubeR, Gothic), and the font sizes(6, 8, 10, 12, 14, 16, 18, 20, 22, 24pt). To fit the experimental conditions into real driving environments, the illuminance was controlled to 15lx by using LED lamp and the distance between IVIS and participants was kept to 70cm. Moreover, all participants took the shutter glasses for employing well-known occlusion techniques. Results: The experimental results showed that 'HDR' and 'Non-vibration + Black on white' group took the shortest response time, and decreasing slopes of the response time with increasing font sizes were slowing down at 14pt then flattened out at 22pt regardless of the existence of vibration and color contrasts. Conclusion: The minimum size for legible Korean font would be about 14pt(5.47mm) and the optimum size would be about 22pt(8.59mm). Application: The guideline on the Korean font sizes from this study will be applied to design an IVIS in the future.

Central American Region Maritime Organization and their Role in the occurrence of maritime casualties

  • Rojas Oscar Porras;Imazu Hayama;Fujisaka Takahiko
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.10a
    • /
    • pp.166-175
    • /
    • 2006
  • Since many years ago and in spite of the existence of national regulations and international conventions ratified by the countries that are conformed the Central American Region (CAR), the seagoing maritime sector of this Region, has developed its activity without any type of safety measures. Therefore, a large number of people are known to die, disappear and suffer from serious injuries each year. These maritime casualties devastate the families affected by these events, and severely impact the local social and economic well-being. While all these accidents occurred in this Region, non government or any other official records are available recording these casualties Due to the lack of any historical written reports about maritime casualties occurred in this Region, the compilation of this type of accidents information and data was carried out directly by the researchers in the field. Also, all the information about the CAR Maritime Organization Components was too compiled by the authors from the respective National Maritimes Authorities. From the compiled information was elaborated the CAR maritime casualties data base and from the analysis of the above data base were determined the main causes of the maritime accidents occurred in the CAR. The lack of safety measures onboard and the ignorance of the presence and influence of atmospheric phenomena were among main factors that had been caused the maritime casualties in this Region. By other hand, from the analysis of the CAR maritime organization components, the existence of one level of organization very similar among them was determinate. The objective of this research was to analyze the role of the CAR maritime organization in the prevention of the occurrence of maritime casualties. The results of this study provides general understanding of the causes of this type of accidents in the CAR and basis for support in improving safety navigation system and measures so that the number of fatalities and maritime accidents may be reduced in the future.

  • PDF

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

SAR Image De-noising Based on Residual Image Fusion and Sparse Representation

  • Ma, Xiaole;Hu, Shaohai;Yang, Dongsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3620-3637
    • /
    • 2019
  • Since the birth of Synthetic Aperture Radar (SAR), it has been widely used in the military field and so on. However, the existence of speckle noise makes a good deal inconvenience for the subsequent image processing. The continuous development of sparse representation (SR) opens a new field for the speckle suppressing of SAR image. Although the SR de-noising may be effective, the over-smooth phenomenon still has bad influence on the integrity of the image information. In this paper, one novel SAR image de-noising method based on residual image fusion and sparse representation is proposed. Firstly we can get the similar block groups by the non-local similar block matching method (NLS-BM). Then SR de-noising based on the adaptive K-means singular value decomposition (K-SVD) is adopted to obtain the initial de-noised image and residual image. The residual image is processed by Shearlet transform (ST), and the corresponding de-noising methods are applied on it. Finally, in ST domain the low-frequency and high-frequency components of the initial de-noised and residual image are fused respectively by relevant fusion rules. The final de-noised image can be recovered by inverse ST. Experimental results show the proposed method can not only suppress the speckle effectively, but also save more details and other useful information of the original SAR image, which could provide more authentic and credible records for the follow-up image processing.

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.