http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
성공적인 6차산업을 위한 가치사슬 모형과 빅데이터 활용 방안
박상혁,박정선,이명관,Park, Sanghyeok,Park, Jeongseon,Lee, Myounggwan 디지털산업정보학회 2015 디지털산업정보학회논문지 Vol.11 No.2
Our agriculture and rural villages have faced negative conditions in many reasons. To overcome this situation, a new change is needed by the 6th industrialization. Many agriculture and rural villages in Korea are pursuing the 6th industrialization through the convergence of the primary, secondary, and tertiary industries to vitalize agriculture and rural villages. But there are several problems with the 6th industrialization. There is a limit to the capacity building of the members of the rural organization and Korean agricultural base primary, secondary, and tertiary industries are weak all. In addition, it has been insufficient research for value chain management of the region as a whole; there has been no study of information sharing across the region for the 6th industrialization. This study is about value chain management model for successful the 6th industry with Quick Response System and the big data technology. In this study to provide the efficiency of 6th industry value chain management with customer's needs analysis using big data and research for the information share between the industries in the region through the information pipeline theory of the QR System. We hope that our study is helped to proceed successfully on the 6th industrialization in Korea.
사회혁신 프로젝트 수행을 위한 디자인 씽킹과 비즈니스 모델 젠 연계 방법론
박상혁,오승희,Park, Sanghyeok,Oh, Seunghee 디지털산업정보학회 2017 디지털산업정보학회논문지 Vol.13 No.1
Today, companies and social actors at the beginning of the Fourth Industrial Revolution are focusing on active innovation and efforts to adapt to rapidly changing environmental changes. Design thinking refers to creative strategies designers utilize during the process of designing. Design thinking is also an approach that can be used to consider issues and resolve problems more broadly than within professional design practice, and has been applied in business and to social issues. However, there are some limitations in the design thinking methodology during the project in the field. This paper presents a novel design - thinking process that incorporates a lean start - up based business model into the design thinking process. We conducted a case study to verify the effectiveness of our new design thinking process in social innovation projects. In this paper, it is meaningful to suggest and verify a new process that combines business model Zen to complement the limit of design thinking. It will also provide guidelines for design thinking projects as tools for social innovation.
시간 길이가 다른 과목들의 시간표 작성을 위한 그래프 칼라링 알고리즘 개발
박상혁(Park Sanghyeok),안종일(Ahn Jongil),김명재(Kim Myungjae),정태충(ChungTaechoong) 한국정보과학회 1996 한국정보과학회 학술발표논문집 Vol.23 No.2A
최적화 기법 중의 하나인 그래프 칼라링 알고리즘은 시간표 문제 해결에 적용이 가능하다. 하지만, 기존의 알고리즘은 문제의 영역이 제한적이기에 다양한 시간표 문제에 적용하고자 할 경우 많은 제약이 뒤따른다. 본 연구에서는 먼저 배정될 과목의 시간 길이가 다른 경우를 고려하도록 문제 영역을 확장 시킨 후 보다 일반화된 시간표 문제에도 적용할 수 있도록, 문제 영역의 휴리스틱 정보를 이용한 효율적인 그래프 칼라링 알고리즘을 제안하고 실험하였다.
범용 CMOS 공정을 사용한 DTMOS 슈미트 트리거 로직의 구현을 통한 EM Immunity 향상 검증
박상혁(SangHyeok Park),김소영(SoYoung Kim) 한국전자파학회 2016 한국전자파학회논문지 Vol.27 No.10
슈미트 트리거 로직(Schmitt Trigger Logic)은 디지털 회로의 노이즈에 대한 내성을 향상시키기 위해 히스테리시스 특성을 보이는 게이트를 제안한 설계 방법이다. 슈미트 트리거 특성을 보이는 설계 방법 중 최근에 제안된 substrate bias를 조정하여 구현하는 Dynamic Threshold voltage MOS(DTMOS) 방법을 사용할 경우, 게이트 수를 늘이지 않고 내성을 향상시킬 수 있는 설계방법이나, 범용 CMOS 공정에서 구현하여 시뮬레이션으로 예상하는 성능을 얻을 수 있는지는 검증되지 않았다. 본 연구에서는 0.18 μm CMOS 공정에서 DTMOS 설계 방법을 구현하여 히스테리시스 특성을 측정하여 검증하였다. DTMOS 슈미트 트리거 버퍼, 인버터, 낸드, 노어 게이트 및 간단한 디지털 로직 회로를 제작하였으며, 히스테리시스 특성, 전력 소모, 딜레이 등의 특성들을 관찰하고, 일반적인 CMOS 게이트로 구현된 회로와 비교하였다. 노이즈에 대한 내성이 향상되는 것을 Direct Power Injection(DPI) 실험을 통해 확인하였다. 본 논문을 통해 제작된 DTMOS 슈미트 트리거 로직은 10 M~1 GHz 영역에서 전자파 내성이 향상된 것을 확인할 수 있었다. Schmitt Trigger logic is a gate level design method to have hysteresis characteristics to improve noise immunity in digital circuits. Dynamic Threshold voltage MOS(DTMOS) Schmitt trigger circuits can improve noise immunity without adding additional transistors but by controlling substrate bias. The performance of DTMOS Schmitt trigger logic has not been verified yet in standard CMOS process through measurement. In this paper, DTMOS Schmitt trigger logic was implemented and verified using Magna 0.18 μm MPW process. DTMOS Schmitt trigger buffer, inverter, NAND, NOR and simple digital logic circuits were made for our verification. Hysteresis characteristics, power consumption, and delay were measured and compared with common CMOS logic gates. EM Immunity enhancement was verified through Direct Power Injection(DPI) noise immunity test method. DTMOS Schmitt trigger logics fabricated using CMOS process showed a significantly improved EM Immunity in 10 M~1 GHz frequency range.
확장성 내시경 수술 후 발생한 2-3등급 뇌척수액 유출을 막기 위한 두개저 재건술 시 요추 배액법과 하이드록시아파타이트 방법의 비교 분석
박상혁(Sanghyeok Park),김지희(Ji Heui Kim),김용휘(Yong Hwy Kim),김영훈(Young-Hoon Kim) 대한두개저학회 2020 대한두개저학회지 Vol.15 No.1
Background : Although the skull base reconstruction to prevent cerebrospinal fluid (CSF) leakage is extremely critical for the extended endoscopic approach (EEA), The purpose of this report is to evaluate the clinical outcome of skull base reconstruction methods after EEA. Methods : The consecutive 62 cases with grade 2 or 3 CSF leakage after EEA at Asan Medical Center were enrolled in this study. Preoperative diagnosis of the patients included 19 pituitary adenomas (30.7%), 14 meningiomas (22.6%), 9 craniopharyngiomas (14.5%), 9 sinonasal malignancies (14.5%), 6 Rathke’s cleft cysts (9.7%), and 4 chordomas (6.5%). The vascularized nasoseptal flap was used in all cases. We performed the CSF lumbar drainage after surgery (L-method) in 30 patients (48.4%) and applied the injectable hydroxyapatite cement for skull base reconstruction without L-drainage (H-method) in 28 patients (45.2%). The clinical outcomes and risk between the L- and H-method were assessed and compared each other. Results : The overall reconstruction-related complication and CSF leakage rates were 12.9% (8/62) and 8.1% (5/62). The complication and CSF leakage rates of the L-method (10.0% and 6.7%, respectively) and the H-method (17.9.% and 10.7%, respectively) were not significantly different (P = 0.386 and 0.583, respectively). While all infections occurred only in the H-method (P = 0.066), the postoperative hospital stay was significantly shorter in the H-method (7.9 ± 2.9 days) than that of the L-method (10.8 ± 6.2 days) (P = 0.035). Conclusions : The skull base reconstruction method using the hydroxyapatite effectively prevented the CSF leakage and provided comfort and shorter hospitalization to patients without postoperative lumbar drainage. When using the hydroxyapatite, however, the postoperative infection should be considered.
전자상거래 기술특성과 개인가치가 정보보호 중요성에 의한 구매행동에 미치는 영향에 대한 종단적 연구
김연종,박상혁,Kim, Yeonjong,Park, Sanghyeok 디지털산업정보학회 2017 디지털산업정보학회논문지 Vol.13 No.1
The purpose of this study is to investigate the effects of e - commerce technology characteristics and personal values on purchasing behavior by information security importance. The results of the empirical study that examined the university students in 2006 and 2016 are as follows. First, personal value is centered on personal values, such as self - esteem and self - esteem in 2006. In 2016, however, personal values such as self - fulfillment and personal relationship with others are important. Transactional ease and product service serve as the main value of the fun and pleasure of life, but the sense of accomplishment as the core value of information protection. Second, the technical characteristics of e-commerce are as follows. In terms of ease of transaction and product service, technology characteristics are simplified and directly effected over time. On the other hand, information protection works very closely with individual value, There was a strong tendency to enjoy benefits. Especially in 2006, if you want to enjoy transactional convenience through transaction information security or benefit from product service, it has been changed to recognize the importance of information security through payment in 2016.
소셜미디어 사용자의 프라이버시 패러독스 현상으로 인한 개인정보 무관심 형태에 대한 연구
김연종,박상혁,Kim, Yeonjong,Park, Sanghyeok 디지털산업정보학회 2019 디지털산업정보학회논문지 Vol.15 No.4
Privacy paradox is a paradoxical behavior that provides personal information even though you are concerned about privacy. Social media users are also often concerned about their personal information exposure. It is even reluctant to describe personal information in profile. However, some users describe their personal information in detail on their profile, provide it freely when others request it, or post their own personal information. The survey was conducted using Google Docs centered on Facebook users. Structural equation model analysis was used for hypothesis testing. As an independent variable, we use personal information infringement experiences. As a mediator, we use privacy indifference, privacy concern, and the relationship with the act of providing personal information. Social media users have become increasingly aware of the fact that they can not distinguish between the real world and online world by strengthening their image and enhancing their image in the process of strengthening ties, sharing lots of information and enjoying themselves through various relationships. Therefore, despite the high degree of privacy indifference and high degree of privacy concern, the phenomenon of privacy paradox is also present in social media.
글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향
손성문(Seongmun Son),박상혁(Sanghyeok Park),오승희(Seunghee Oh) 한국인터넷전자상거래학회 2014 인터넷전자상거래연구 Vol.14 No.6
As the nature of business environment has become extremely complex and competitive, many companies have focused aware of the importance of the concept of business ecosystem and the necessity of the open innovation. However, the regional SMEs have a limitation of resource and business network for their open innovation. KITA(Korea International Trade Association) and G university promoted GTEP(Global Trade Experts Incubating Program) for development of global expert human resource. In this study, we focused on the effectiveness of GTEP from a business ecosystem perspective. For this research, we studied how the business network has changed after the program with network analysis. Also, we try to find out the reason of network structure change with interview.