• Title/Summary/Keyword: traditional characteristic

Search Result 989, Processing Time 0.022 seconds

Development of Customer Satisfaction Quality Indicator Considering Producer's Specification Limits (생산자규격을 고려한 소비자만족품질지표의 개발)

  • Kim, Dong-Hyuk;Chung, Young-Bae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.50-58
    • /
    • 2018
  • Process Capability ($C_{pk}$) is a representative measure of how well the producer manages dispersion and bias for the specifications needed by the consumer. This is expressed as a ratio of 6 times the natural tolerance to the specification. As the producer manages the dispersion small, the capacity index becomes higher. And it is classified into 5 grades according to the degree of management. It is a measure of the quality of processes used in most industrial fields. However, $C_{pk}$ is calculated by only reflecting the mean and dispersion of the process, there is a disadvantage that it can not give information about the economic loss caused by the inconsistency of the process with the target value. Overcoming these drawbacks, process capability indexes reflecting various types of loss functions such as $C_{pm}$, $C^+_{pm}$ and $C_{pl}$ have been developed. However, all of these previous studies have applied the limit to the consumer specification, which is based on the traditional and passive quality perception that the quality characteristic should exist within the limits of the consumer specification. In this study, we will develop 'Customer Satisfaction Quality Indicator (CSQI)' which is a quantitative indicator that can be fully evaluated when the manufacturer's specification limit, which is an aggressive quality strategy, is applied. This is expected to be useful decision information for both producers and consumers.

The study of Dong-shan(東山) Yao(瑤) marriage culture (동산요족(東山瑤族)의 혼인형태탐구(婚姻形態探究))

  • Xing, Li
    • Korean Journal of Heritage: History & Science
    • /
    • v.37
    • /
    • pp.213-242
    • /
    • 2004
  • "China", "Guang-Xi(廣西)", "Dong-Shan(東山)", a marriage of "Yao-zu(瑤族)" divide mainly into a distinguished family form, but are by a marriage of a traditional general form (a woman getting married) and "Zhaoxu-Hun(招婿婚)", a marriage of "Liangtou-che(兩頭扯)". These two marriage format that mentioned the back is a marriage format to often appear in other Chinese minority race region while being a custom peculiar to "Yao-zu(瑤族)" marriage method. "Zhaoxu-Hun(招婿婚)" provides labor force as a workman while living with a man sinks with "son-in-law" to a woman house, and doing, and it is to carry out a lot of duty as a husband too. "A Liangtou-che(兩頭扯)" marriage is more characteristic, but lives while going around a bilateral family while man and woman each stay in an own house. There are inheritance of property rights to own family, too and obeys anger of he direction family bilateral where if lays a child even if stands up and holds a memorial service. At the same time that these marriages are performed between the same "Yao-zu(瑤族)" near a track, and solution does a distribution problem between a labor problem and the families which were unstable through a mutual marriage for the purpose a compunction "Yao-zu(瑤族)" social network construction into intimacy anger. A general idea is covered he base with in order the porcelain which is a weak race prevent that it is assimilated by external aggression because "Yo-zu(瑤族)" has always received aggression of "a Han-zu(漢族)" too historically, and to keep an ethnic pure blood.

An Interdisciplinary Study of A Leaders' Voice Characteristics: Acoustical Analysis and Members' Cognition

  • Hahm, SangWoo;Park, Hyungwoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4849-4865
    • /
    • 2020
  • The traditional roles of leaders are to influence members and motivate them to achieve shared goals in organizations. However, leaders such as top managers and chief executive officers, in practice, do not always directly meet or influence other company members. In fact, they tend to have the greatest impact on their members through formal speeches, company procedures, and the like. As such, official speech is directly related to the motivation of company employees. In an official speech, not only the contents of the speech, but also the voice characteristics of the speaker have an important influence on listeners, as the different vocal characteristics of a person can have different effects on the listener. Therefore, according to the voice characteristics of a leader, the cognition of the members may change, and, the degree to which the members are influenced and motivated will be different. This study identifies how members may perceive a speech differently according to the different voice characteristics of leaders in formal speeches. Further, different perceptions about voices will influence members' cognition of the leader, for example, in how trustworthy they appear. The study analyzed recorded speeches of leaders, and extracted features of their speaking style through digital speech signal analysis. Then, parameters were extracted and analyzed by the time domain, frequency domain, and spectrogram domain methods. We also analyzed the parameters for use in Natural Language Processing. We investigated which leader's voice characteristics had more influence on members or were more effective on them. A person's voice characteristics can be changed. Therefore, leaders who seek to influence members in formal speeches should have effective voice characteristics to motivate followers.

A Role-Based Access Control Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 역할기반 접근제어모델)

  • Byun Chang-Woo;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.13-29
    • /
    • 2005
  • An important characteristic of role-based access control model(RBAC) is that by itself it is policy neutral. This means RBAC articulates security policy without embodying particular security policy. Because of this reason, there are several researches to configure RBAC to enforce traditional mandatory access control(MAC) policy and discretionary access control(DAC) policy. Specifically, to simulate MAC using RBAC several researches configure a few RBAC components(user, role, role-hierarchy, user-role assignment and session) for keeping no-read-up rule and no-write-down rule ensuring one-direction information flow from low security level to high security level. We show these researches does not ensure confidentiality. In addition, we show the fact that these researches overlook violation of integrity due to some constraints of keeping confidentiality. In this paper we propose a RBAC model satisfying both confidentiality and integrity. We reexamine a few RBAC components and constructs additional constraints.

A vibration based acoustic wave propagation technique for assessment of crack and corrosion induced damage in concrete structures

  • Kundu, Rahul Dev;Sasmal, Saptarshi
    • Structural Engineering and Mechanics
    • /
    • v.78 no.5
    • /
    • pp.599-610
    • /
    • 2021
  • Early detection of small concrete crack or reinforcement corrosion is necessary for Structural Health Monitoring (SHM). Global vibration based methods are advantageous over local methods because of simple equipment installation and cost efficiency. Among vibration based techniques, FRF based methods are preferred over modal based methods. In this study, a new coupled method using frequency response function (FRF) and proper orthogonal modes (POM) is proposed by using the dynamic characteristic of a damaged beam. For the numerical simulation, wave finite element (WFE), coupled with traditional finite element (FE) method is used for effectively incorporating the damage related information and faster computation. As reported in literature, hybrid combination of wave function based wave finite element method and shape function based finite element method can addresses the mid frequency modelling difficulty as it utilises the advantages of both the methods. It also reduces the dynamic matrix dimension. The algorithms are implemented on a three-dimensional reinforced concrete beam. Damage is modelled and studied for two scenarios, i.e., crack in concrete and rebar corrosion. Single and multiple damage locations with different damage length are also considered. The proposed methodology is found to be very sensitive to both single- and multiple- damage while being computationally efficient at the same time. It is observed that the detection of damage due to corrosion is more challenging than that of concrete crack. The similarity index obtained from the damage parameters shows that it can be a very effective indicator for appropriately indicating initiation of damage in concrete structure in the form of spread corrosion or invisible crack.

Effect Analysis of MW Transmission System for Strategic Unit Using Adaptive Modulation (적응변조 적용 전략제대 MW전송시스템 효과 분석)

  • Lim, Young-Gab;Youn, Jong-Taek;Choi, Young-Min;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.412-419
    • /
    • 2020
  • The strategic unit communication infrastructure for military command, communications requires a dualized network structure of various communication methods, considering the direction of development, strategic unit and line characteristic. It has been pointed out that MicroWave, which is typical of wireless systems, is inefficient because it operates only with existing technologies. Therefore, it is necessary to analyze the structure, efficiency of the MW transmission system and its effects. It is difficult to transfer efficiently considering wireless environment due to a fixed type of access structure in the existing MW transmission system. Adaptive modulation allows improvement, but with traditional access structures and fixed bandwidth, there is a limit. Following the transmission performance improvement technique considering availability and link distance in the previous study, this paper presented improved packetized MW transmission system structure and variable bandwidth transmission in consideration of adaptive modulation based variable transmission waveform, bandwidth and distance, and performed the analysis in view of the strategic unit and command control circuit.

UX Elements and Effects of Fashion Shopping Apps Based on Multipersona Characteristics of MZ generation (MZ세대의 멀티퍼소나 특성을 반영한 패션 쇼핑 앱의 UX 요소에 대한 연구)

  • Lee, Se-Yeon;Choe, Jong-Hoon
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.123-129
    • /
    • 2021
  • MZ Generation has multipersona and characteristics that create various egos depending on the situation, and fashion styling is also expressed differently by each persona. Thus, this study investigates how to provide a multipersona or characteristic user experience to fashion shopping applications. Traditional fashion shopping apps, which focus on items, colors, and advertisements, have difficulty solving the problems of MZ generation fashion, so it is necessary to actively utilize their characteristics. We investigate the definitions and characteristics of multipersona and generation MZ, and identify the shopping behavior of generation MZ through prior research. We also analyze cases and improvements that indirectly utilize multipersona in fashion shopping apps. Four UX elements were derived through user interviews to identify needs and It was possible to derive positive effects, such as providing a shopping experience by forming one's own fashion characters in a personalized fashion beyond the existing fashion recommendation frame, which helps to worry about styling and gives a different experience.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Image-Based Application Testing Method Using Faster D2-Net for Identification of the Same Image (동일 이미지 판별을 위해 Faster D2-Net을 이용한 이미지 기반의 애플리케이션 테스트 방법)

  • Chun, Hye-Won;Jo, Min-Seok;Han, Sung-Soo;Jeong, Chang-Sung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.2
    • /
    • pp.87-92
    • /
    • 2022
  • Image-based application testing proposes an application testing method via image structure comparison. This test method allows testing on various devices without relying on various types of device operating systems or GUI. Traditional studies required the creation of a tester for each variant in the existing case, because it differs from the correct image for operating system changes, screen animation execution, and resolution changes. The study determined that the screen is the same for variations. The tester compares the underlying structure of the objects in the two images and extracts the regions in which the differences exist in the images, and compares image similarity as characteristic points of the Faster D2-Net. The development of the Faster D2-Net reduced the number of operations and spatial losses compared to the D2-Net, making it suitable for extracting features from application images and reducing test performance time.

An Analysis of Pattern Types of Knitted Jacquard and Intarsia -Focused on Four Fashion Collections from 2013F/W to 2022F/W- (니트 자카드와 인타샤의 패턴 유형 분석 -2013F/W~2022F/W 4대 패션컬렉션을 중심으로-)

  • Seo Hui, Choi;Min Taek, Oh;Seong Dal, Kim
    • Journal of Fashion Business
    • /
    • v.26 no.5
    • /
    • pp.36-48
    • /
    • 2022
  • This study aims to analyze the patterns made with knitted jacquard and intarsia techniques to provide essential data to help plan different knitwear designs using the techniques and patterns. Based on approximately 3,000 jacquard and intarsia knitwear published in the four significant womenswear collections over the past decade, eight main pattern types were classified, and each characteristic was analyzed. Firstly, it is a logo and symbol type pattern that appears mainly as a means of emphasizing a brand. Secondly, it is a traditional pattern with settled patterns from the past to the present. Third, it is a geometric pattern that appears both typically and atypically in various forms. Fourth, an abstract pattern type does not show a precise form or motif. Fifth, it is a colorful and diverse flower and plant pattern. Sixth, it is a landscape pattern that expresses nature and living space. Seventhly, it is an animal pattern type that expresses the appearance of an animal or the shape of the. Finally, it is a caricature pattern type using characters and various cartoonish motifs. Based on the analysis results of this study, creative and diverse design development of Jacquard and Intarsia knitwear and development of the knitwear market will take place.