
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
레스토랑의 비대면주문(Kiosk) 서비스품질이 가치와 행동의도에 미치는 영향
김양훈,박종희 (사)한국조리학회 2020 한국조리학회지 Vol.26 No.10
This study conducted to identify the effects of Kiosk service quality on value and behavioal intention. To perform the purpose, this study collected data from consumers who have experienced with the Kiosk system in any restaurants in three months using online survey method. Total 350 online survey were distributed and total 324 participants were used for statistical analysis. Demographic analysis was conducted to find demographic characteristics and confirmatory factor analysis and SEM were used for demonstrating the hypotheses. Results shown that only environment quality has significant influence on both value and behavioral intention. Especially, the environment quality was the most critical anticipant of behavioral intention in this study. In addition, this study found that the outcome quality was significant predictor of value, and the process quality was significant predictor of behavioral intention. Last, present study was also verified the relationship between value and behavioral intention. Based on these results, this study will contribute to provide valuable implication for developing various marketing strategies for restaurant industry especially in Kiosk business. Furthermore, this study will help to find better way effective ways to increase customer value and behavioral intention by using the Kiosk system.
SW 감정평가에서 디자인 단가산정을 위한 핵심 평가요소 연구
김양훈 한국소프트웨어감정평가학회 2018 한국소프트웨어감정평가학회 논문지 Vol.14 No.2
Typical software is implemented around functional elements, and design elements are considered as additional concepts. However, the design elements of software play an important role in assisting intuitive interpretation of functions in addition to aesthetic functions. In assessment and valuating the current software, it is difficult to derive the objective price because the evaluation criteria for design factors are ambiguous. Therefore, in this study, we derive the key evaluation factor of design factor in software assessment and valuation which can reasonably judge unit price for design effort in software development. As a result, we can indirectly estimate the efforts by distinguishing page design, screen design, main screen and core screen design, and other external icons and design.
16:1 부분 표본 추출 블럭 정합 알고리즘과 이의 하드웨어 설계
김양훈,임종석,민병기 대한전자공학회 1995 전자공학회논문지-B Vol.b32 No.12
Conventional full search block matching algorithm for motion estimation is computationally intensive and the resulting hardware cost is very high. In this paper, we present an efficient block matching algorithm using a 16:1 subsampling technique, and describe its hardware design. The algorithm reduces the number of pixels in calculating the mean absolute difference at each search location, instead of reducing the search locations.The algorithm is an extension of the block mating algorithm with 4:1 subsampling proposed by Liu and Zaccarin such that the amount of computation is reduced by a fact of 4(16 compared to the full search block matching algorithm) while producing similar performance.The algorithm can efficiently be designed into a hardware for real-time applications.
대표발의자의 법률안심사소위원회 직책이 법률안 가결에 미치는 영향 분석 : 위원회 이론 중 이익분배 이론의 관점에서
김양훈,이동성 한국정치학회 2023 한국정치학회보 Vol.57 No.1
This study pays attention to the decline in the National Assembly's legislative productivity(= number of passed bills/number of proposed bills). Given limited external checks on the National Assembly in the bill-making process, improving legislative productivity is essential for the development of democracy. We thus analyze 1) the probability of passing a bill and 2) the probability of passing a bill over time, depending on the position of the bill initiator in the subcommittee, which plays a key role in the legislative review process. First, we find that bill proposals initiated by subcommittee chairs have significantly higher passing rates than those initiated by general members of the subcommittee as well as by those who are not members of subcommittees, and bill proposals initiated by subcommittee members(both chairs and general members) have significantly higher passage rates than those initiated by non-members. In addition, we also find that bill proposals initiated by chairs and general members of the subcommittee are passed significantly faster than those initiated by non-members. Our finding suggests that with exclusive authority within the subcommittee, its members exert influence over the legislative review process, thereby increasing the probability of passing their proposed bills and decreasing the time required for passing them. Our analysis based on the data from subcommittees of the National Assembly seems aligned with the distributive benefits theory, where lawmakers perceive the committee as an instrumental target for pursuing political interests.
핵심기술 유출과 보안수준 상관관계 연구 : 중소기업 기술유출을 중심으로
김양훈 한국산업보안연구학회 2014 한국산업보안연구 Vol.4 No.1
비 인가된 사용자들이 정보시스템의 고유기능인 저장, 복사, 이동의 용이한 기 능을 이용하여 기업의 핵심기술은 유출하였으며, 매해 그 규모가 증가하는 추세 이다. 일반적으로 기업의 핵심기술 보호역량이 낮을수록 핵심기술 유출 가능성 이 높은 것으로 인지하고 있지만, 실제 기업들의 형태도 같은 비례 현상을 보이 는지, 그리고 그렇다면 핵심기술 유출에 영향을 미치는 요소는 무엇이며, 어떠한 역량요소를 우선적으로 향상시켜야 하는지에 대한 실증분석이 미흡한 시점이다. 본 논문에서는 핵심기술 유출기업군과 일반기업군들 사이의 보안 역량을 측정 하고, 그 상관관계를 실증분석하였다. 그 결과, 핵심기술 유출 기업군은 일반 기 업군에 비하여 일반적인 보안역량이 미흡한 것으로 분석되었다. Non-authorized users have flowed out the core technology of corporation by using specific function of the information system such as storage, copy, move and etc. Those tend to increase every year. In General, it is recognized that there is a high possibility of core technology outflow in corporation which had the lower security capability. However, empirical analysis are lacking about actual companies are also looking for same proportion symptoms about that and if so, what the elements that affect the outflow of core technology is and which capacity elements should be improved priority. In this paper, we measured the security capacity between important technology outflow group and the general group of companies, and analyzed the correlation about those. As a result, important technology outflow group have insufficient security capacity compared to the general group.