• Title/Summary/Keyword: technical potential

Search Result 986, Processing Time 0.037 seconds

An exploratory study on Social Network Services in the context of Web 2.0 period (웹 2.0 시대의 SNS(Social Network Service)에 관한 고찰)

  • Lee, Seok-Yong;Jung, Lee-Sang
    • Management & Information Systems Review
    • /
    • v.29 no.4
    • /
    • pp.143-167
    • /
    • 2010
  • Diverse research topics relating to Social Network Services (SNS) such as, social affective factors in relationships among internet users, social capital value of SNS, comparing attributes why users are intending to participate in SNS, user's lifestyle and their preferences, and the exploratory seeking potential of SNS as a social capital need to be focused on. However, these researches that have been undertaken only consider facts at a particular period of the changing computing environment. In accordance with this indispensability, the integrated view on what technical, social and business characteristics and attributes need to be acknowledged. The purpose of this study is to analyze the evolving attributes and characteristics of SNS from Web 1.0 to Mobile web 2.0 through the Web 2.0 and Mobile 1.0 period. Based on the relevant literature, the attributes that drive the changing technological, social and business aspects of SNS have been developed and analyzed. This exploratory study analyzed major attributes and relationships between SNS and users by changing the paradigms which represented each period. It classified and chronicled each period by representing paradigms and deducted the attributes by considering three aspects such as technological, social and business administration. The major findings of this study are, firstly, the web based computing environment has been changed into the platform attribute for users in the aspect of technology. Users can only read, listen and view information through the web site in the early stages, but now it is possible that users can create, modify and distribute all kinds of information. Secondly, the few knowledge producers of web services have been changed into a collective intelligence by groups of people in the aspect of society. Information authority has been distributed and there is no limit to its spread. Many businesses recognized the potential of the SNS and they are considering how to utilize these advantages toward channel of promotion and marketing. Thirdly, the conventional marketing channel has been changed into oral transmission by using SNS. The market of innovative mobile technology such as smart phones, which provide convenience and access-ability toward customers, has been enlarged. New opportunities to build friendly relationship between business and customers as a new marketing chance have been created. Finally, the role of the consumer has been changed into the leading role of a prosumer. Users can create, modify and distribute information, and are performing the dual role of customer and producer.

  • PDF

A Study on Integrated Logistic Support (통합병참지원에 관한 연구)

  • 나명환;김종걸;이낙영;권영일;홍연웅;전영록
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2001.06a
    • /
    • pp.277-278
    • /
    • 2001
  • The successful operation of a product In service depends upon the effective provision of logistic support in order to achieve and maintain the required levels of performance and customer satisfaction. Logistic support encompasses the activities and facilities required to maintain a product (hardware and software) in service. Logistic support covers maintenance, manpower and personnel, training, spares, technical documentation and packaging handling, storage and transportation and support facilities.The cost of logistic support is often a major contributor to the Life Cycle Cost (LCC) of a product and increasingly customers are making purchase decisions based on lifecycle cost rather than initial purchase price alone. Logistic support considerations can therefore have a major impact on product sales by ensuring that the product can be easily maintained at a reasonable cost and that all the necessary facilities have been provided to fully support the product in the field so that it meets the required availability. Quantification of support costs allows the manufacturer to estimate the support cost elements and evaluate possible warranty costs. This reduces risk and allows support costs to be set at competitive rates.Integrated Logistic Support (ILS) is a management method by which all the logistic support services required by a customer can be brought together in a structured way and In harmony with a product. In essence the application of ILS:- causes logistic support considerations to be integrated into product design;- develops logistic support arrangements that are consistently related to the design and to each other;- provides the necessary logistic support at the beginning and during customer use at optimum cost.The method by which ILS achieves much of the above is through the application of Logistic Support Analysis (LSA). This is a series of support analysis tasks that are performed throughout the design process in order to ensure that the product can be supported efficiently In accordance with the requirements of the customer.The successful application of ILS will result in a number of customer and supplier benefits. These should include some or all of the following:- greater product uptime;- fewer product modifications due to supportability deficiencies and hence less supplier rework;- better adherence to production schedules in process plants through reduced maintenance, better support;- lower supplier product costs;- Bower customer support costs;- better visibility of support costs;- reduced product LCC;- a better and more saleable product;- Improved safety;- increased overall customer satisfaction;- increased product purchases;- potential for purchase or upgrade of the product sooner through customer savings on support of current product.ILS should be an integral part of the total management process with an on-going improvement activity using monitoring of achieved performance to tailor existing support and influence future design activities. For many years, ILS was predominantly applied to military procurement, primarily using standards generated by the US Government Department of Defense (DoD). The military standards refer to specialized government infrastructures and are too complex for commercial application. The methods and benefits of ILS, however, have potential for much wider application in commercial and civilian use. The concept of ILS is simple and depends on a structured procedure that assures that logistic aspects are fully considered throughout the design and development phases of a product, in close cooperation with the designers. The ability to effectively support the product is given equal weight to performance and is fully considered in relation to its cost.The application of ILS provides improvements in availability, maintenance support and longterm 3ogistic cost savings. Logistic costs are significant through the life of a system and can often amount to many times the initial purchase cost of the system.This study provides guidance on the minimum activities necessary to Implement effective ILS for a wide range of commercial suppliers. The guide supplements IEC60106-4, Guide on maintainability of equipment Part 4: Section Eight maintenance and maintenance support planning, which emphasizes the maintenance aspects of the support requirements and refers to other existing standards where appropriate. The use of Reliability and Maintainability studies is also mentioned in this study, as R&M is an important interface area to ILS.

  • PDF

Seismic Design of Columns in Inverted V-braced Steel Frames Considering Brace Buckling (가새좌굴을 고려한 역 V형 가새골조의 기둥부재 내진설계법)

  • Cho, Chun-Hee;Kim, Jung-Jae;Lee, Cheol-Ho
    • Journal of Korean Society of Steel Construction
    • /
    • v.22 no.1
    • /
    • pp.1-12
    • /
    • 2010
  • According to the capacity design concept which forms the basis of the current steel seismic codes, the braces in concentrically braced frames (CBFs) should dissipate seismic energy through cyclic tension yielding and cyclic compression buckling while the beams and the columns should remain elastic. Brace buckling in inverted V-braced frames induces unbalanced vertical forces which, in turn, impose the additional beam moments and column axial forces. However, due to difficulty in predicting the location of buckling stories, the most conservative approach implied in the design code is to estimate the column axial forces by adding all the unbalanced vertical forces in the upper stories. One alternative approach, less conservative and recommended by the current code, is to estimate the column axial forces based on the amplified seismic load expected at the mechanism-level response. Both are either too conservative or lacking technical foundation. In this paper, three combination rules for a rational estimation of the column axial forces were proposed. The idea central to the three methods is to detect the stories of high buckling potential based on pushover analysis and dynamic behavior. The unbalanced vertical forces in the stories detected as high buckling potential are summed in a linear manner while those in other stories are combined by following the SRSS(square root of sum of squares) rule. The accuracy and design advantage of the three methods were validated by comparing extensive inelastic dynamic analysis results. The mode-shape based method(MSBM), which is both simple and accurate, is recommended as the method of choice for practicing engineers among the three.

Analyzing animation techniques used in webtoons and their potential issues (웹툰 연출의 애니메이션 기법활용과 문제점 분석)

  • Kim, Yu-mi
    • Cartoon and Animation Studies
    • /
    • s.46
    • /
    • pp.85-106
    • /
    • 2017
  • With the media's shift into the digital era in the 2000s, comic book publishers attempted a transition into the new medium by establishing a distribution structure using internet networks. But that effort shied from escaping the parallel-page reading structure of traditional comics. On the other hand, webtoons are showing divers changes by redesigning the structure of traditional sequential art media; they tend to separate and allot spaces according to the vertical scroll reading method of the internet browser and include animations, sound effects and background music. This trend is also in accordance with the preferences of modern readers. Modern society has complicated social structures with the development of various media; the public is therefore exposed to different stimuli and shows characteristics of differentiated perceptions. In other words, webtoons display more relevant and entertaining characteristics by inserting sounds and using moving texts and characters in specific frames, while traditional comics require an appreciation of withdrawal and immersion like other published media. Motions in webtoons are partially applied for dramatic tension or to create an effective expression of action. For example, hand-drawn animation is adopted to express motions by dividing motion images into many layers. Sounds are also utilized, such as background music with episode-related lyrics, melodies, ambient sounds and motion-related sound effects. In addition, webtoons provide readers with new amusement by giving tactile stimuli via the vibration of a smart phone. As stated above, the vertical direction, time-based nature of animation motions and tactile stimuli used in webtoons are differentiated from published comics. However, webtoons' utilization of innovative techniques hasn't yet reached its full potential. In addition to the fact that the software used for webtoon effects is operationally complex, this is a transitional phenomenon since there is still a lack of technical understanding of animation and sound application amongst the general public. For example, a sound might be programmed to play when a specific frame scrolls into view on the monitor, but the frame may be scrolled faster or slower than the author intended; in this case, sound can end before or after a reader sees the whole image. The motion of each frame is also programmed to start in a similar fashion. Therefore, a reader's scroll speed is related to the motion's speed. For this reason, motions might miss the intended timing and be unnatural because they are played out of context. Also, finished sound effects can disturb the concentration of readers. These problems come from a shortage of continuity; to solve these, naturally activated consecutive sounds or animations, like the simple rotation of joints when a character moves, is required.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Biological activity and analysis of α-glucosidase inhibitor from mulberry (Morus alba L.) wine (오디와인의 생리활성 및 α-glucosidase 저해제의 분석)

  • Son, Woo-Rim;Choi, Sang-Won
    • Food Science and Preservation
    • /
    • v.20 no.6
    • /
    • pp.877-885
    • /
    • 2013
  • Wine extracts of four different berry fruits, such as mulberry, blueberry, strawberry, and raspberry, were investigated for antioxidant, anti-tyrosinase, and ${\alpha}$-glucosidase activities by using in vitro assays. Additionally, quantitative changes of ${\alpha}$-glucosidase inhibitor in mulberry wine were determined by HPLC according to mulberry cultivars and fermentation process. Among four berry wines examined, mulberry wine showed the most potent ${\alpha}$-glucosidase inhibitory activity with 69.37% at 0.23 mg/mL, while blueberry and strawberry wines exhibited the strongest inhibition against DPPH radical and tyrosinase activity, respectively. Four compounds were isolated and purified from mulberry wine by a series of isolation procedures, such as solvent fractionation, and Diaion HP-20, ODS-A, and Sephadex LH-20 column chromatographies. Among them, Comp. 4 exerted the strongest ${\alpha}$-glucosidase inhibitory activity ($I_C_{50}=31.57{\mu}M$), and its chemical structure was identified as quercetin by UV and NMR spectral analysis. Finally, the "Daeseongppong" (16.83 ppm) muberry wine had larger amount of quercetin than the "Iksuppong" (14.85 ppm) and "Cheongilppong" (8.92 ppm) mulberry wines, but their contents of three mulberry wines decreased considerably with aging process. These results suggest that mulberry wine containing quercetin acted as ${\alpha}$-glucosidase inhibitor may be useful as a potential functional wine for improving diabetic disorder.

Enhancing Technology Learning Capabilities for Catch-up and Post Catch-up Innovations (기술학습역량 강화를 통한 추격 및 탈추격 혁신 촉진)

  • Bae, Zong-Tae;Lee, Jong-Seon;Koo, Bonjin
    • The Journal of Small Business Innovation
    • /
    • v.19 no.2
    • /
    • pp.53-68
    • /
    • 2016
  • Motivation and activities for technological learning, entrepreneurship, innovation, and creativity are driving forces of economic development in Asian countries. In the early stages of technological development, technological learning and entrepreneurship are efficient ways in which to catch up with advanced countries because firms can accumulate skills and knowledge quickly at relatively low risk. In the later stages of technological development, however, innovation and creativity become more important. This study aims to identify a) the factors (learning capabilities) that influence technological learning performance and b) barriers to enhancing innovation capabilities for the creative economy and organizations. The major part of this study is related to learning capabilities in the post-catch-up era. Based on a literature review and observations from Korean experiences, this study proposes a technological learning model composed of various influencing factors on technological learning. Three hypotheses are derived, and data are collected from Korean machine tool manufacturers. Intense interviews with CEOs and R&D directors are conducted using structured questionnaires. Statistical analysis, such as correlation and ANOVA are then carried out. Furthermore, this study addresses how to enhance innovation capabilities to move forward. Innovation enablers and barriers are identified by case studies and policy analysis. The results of the empirical study identify several levels of firms' learning capabilities and activities such as a) stock of technology, b) potential of technical labor, c) explicit technological efforts, d) readiness to learn, e) top management support, f) a formal technological learning system, g) high learning motivation, h) appropriate technology choice, and i) specific goal setting. These learning capabilities determine firms' learning performance, especially in the early stages of development. Furthermore, it is found that the critical factors for successful technological learning vary along the stages of technology development. Throughout the statistical and policy analyses, this study confirms that technological learning can be understood as an intrinsic principle of the technology development process. Firms perform proactive and creative learning in the late stages, while reactive and imitative learning prevails in the early stages. In addition, this study identifies the driving forces or facilitating factors enhancing innovation performance in the post catch-up era. The results of the preliminary case studies and policy analysis show some facilitating factors such as a) the strategic intent of the CEO and corporate culture, b) leadership and change agents, c) design principles and routines, d) ecosystem and collaboration with partners, and e) intensive R&D investment.

  • PDF

Research of z-axis geometric dose efficiency in multi-detector computed tomography (MDCT 장치의 z-축 기하학적 선량효율에 관한 연구)

  • Kim, You-Hyun;Kim, Moon-Chan
    • Journal of radiological science and technology
    • /
    • v.29 no.3
    • /
    • pp.167-175
    • /
    • 2006
  • With the recent prevalence of helical CT and multi-slice CT, which deliver higher radiation dose than conventional CT due to overbeaming effect in X-ray exposure and interpolation technique in image reconstruction. Although multi-detector and helical CT scanner provide a variety of opportunities for patient dose reduction, the potential risk for high radiation levels in CT examination can't be overemphasized in spite of acquiring more diagnostic information. So much more concerns is necessary about dose characteristics of CT scanner, especially dose efficient design as well as dose modulation software, because dose efficiency built into the scanner's design is probably the most important aspect of successful low dose clinical performance. This study was conducted to evaluate z-axis geometric dose efficiency in single detector CT and each level multi-detector CT, as well as to compare z-axis dose efficiency with change of technical scan parameters such as focal spot size of tube, beam collimation, detector combination, scan mode, pitch size, slice width and interval. The results obtained were as follows ; 1. SDCT was most highest and 4 MDCT was most lowest in z-axis geometric dose efficiency among SDCT, 4, 8, 16, 64 slice MDCT made by GE manufacture. 2. Small focal spot was 0.67-13.62% higher than large focal spot in z-axis geometric dose efficiency at MDCT. 3. Large beam collimation was 3.13-51.52% higher than small beam collimation in z-axis geometric dose efficiency at MDCT. 4. Z-axis geometric dose efficiency was same at 4 slice MDCT in all condition and 8 slice MDCT of large beam collimation with change of detector combination, but was changed irregularly at 8 slice MDCT of small beam collimation and 16 slice MDCT in all condition with change of detector combination. 5. There was no significant difference for z-axis geometric dose efficiency between conventional scan and helical scan, and with change of pitch factor, as well as change of slice width or interval for image reconstruction. As a conclusion, for reduction of patient radiation dose delivered from CT examination we are particularly concerned with dose efficiency of equipment and have to select proper scanning parameters which increase z-axis geometric dose efficiency within the range of preserving optimum clinical information in MDCT examination.

  • PDF