• Title/Summary/Keyword: 분산 자원

Search Result 1,472, Processing Time 0.027 seconds

An Analysis of Waterfront Development Type based on Residents' Attitudes - Focused on Yeoju-Si - (지역주민 태도에 의한 수변공간 개발 형태 분석 - 여주시를 중심으로 -)

  • You, Soo-Jin;Seok, Young-Sun;Choi, Yun Eui;Chon, Jinhyung
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.6
    • /
    • pp.171-184
    • /
    • 2013
  • The importance for local development, which residents' attitudes have reflected, is well known. Therefore, in order to formulate an approach for sustainable development, a study on sustainable waterfront development has become necessary. This study performed the first step analysis of Limits of Acceptable Change(LAC) System that considers the local residential attitude to make the analysis and standard for acceptable development type in the waterfront. This study used the characteristics of the residents, the social exchange theory, and the LAC System. This was done because it is useful to ensure that basic data can be used for the establishment of management objectives. Yeoju-Si was selected as the site for the investigation. A total of 240 surveys were obtained. Analyses were conducted to 1) determine the relationships between the residents' attitudes toward the waterfront development type and the acceptable development type and 2) to examine relationships between the residents' characteristics and the residents' attitudes toward the waterfront development. The results of this study are as follows: The development pertaining to the parameter 'nature education' arguably has the potential to generate substantial revenues for Yeoju-Si and could link the local development and conservation. This study concludes that the area of residence were closely correlated with the residents' attitudes.

Case Study for Information Quality Maturity Model (정보 품질 성숙도 모델에 관한 연구)

  • Kim Chang-Jae;Choi Yong-Rak;Rhew Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.557-564
    • /
    • 2006
  • Information is used effectively and contributes in profit creation and not only support management judgment quick but important resource to be possible recycled. The recent information systems improve enterprise's competitive power by reflection of user's various requirements and becoming big and complex for adaptation of rapidly circumstance change. Also it is trend that importance of information quality is emphasized gradually. The biggest problem in user requirement that is based on low quality data support. In case of business management is achieved by low quality information, company can not help dropping their competitive power such as company's strategy establishment, strategy achievement and management concentration breakup against competitor. Information of low quality increase time and expense to improve inaccurate data or revise and it is hard to accept correct information from specific situation. To solve these problems, we have to gain high quality data through definite comprehension, data management system establishment, and systematic data management achievement etc. Up to now, information quality and connected study were developed partially, but systematic methodology of information quality management's whole condition was not existed. Therefore, in this paper can show you how to extract process for information quality management & related evaluate factor with CMM (Capacity Maturity Mode]) 5 steps that is information warranty of quality process step. This paper whishes to contributes in competitive company or organization activity through information quality improvement management process.

An Architecture for User Level End-to-end QoS using Overlay in NGN (NGN에서 오버레이를 이용한 사용자 관점의 End-to-end QoS 지원 구조)

  • Lee Jihyun;Lim Kyungshik;Oh Hangseok;Nam Taekyong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.781-792
    • /
    • 2005
  • This study proposes an Architecture for user level End-to-end Quality of Service(QoS) using overlay In Next Generation Network(NGN). Inexisting NGNs, the IMS of a control plane provides user QoS through direct traffic control and resource-reservation over the IP packet transport network of a user plane. Further, a set of torrent studies are ongoing not only to maximize the QoS for users, but also to minimize the quality deterioration for supporting the user End-to-end QoS. Along with that, an extended QoS in user level must be considered, for Instance, differentiating service quality to support users' expectation, providing optimized contents by users' equipments, and so forth. Accordingly, the Overlay Service Network Architecture proposed by this study provides protocol adaptation for maximum throughput on transport layer by using the most efficient transport layer protocol to various network circumstances. Also, the Overlay Service Network Architecture on application layer distributes processing delay from the data transformation process of the user equipment to the network, and it is capable of intermediate processing depending on user service level. application service feature, and equipment circumstance as well. Thus, this study mainly proposes the Overlay Service Network Architecture for user level end-to-end QoS in NGN with the quality control features both on the transport layer and the application layer, an internal component feature, and a service scenario providing the QoS linking with 3GPP.

The Effect of Centralities of Alliance Network on Innovation Performace in Korean Defense Industry (한국 방위산업 제휴네트워크 중심성이 혁신성과에 미치는 영향)

  • Ahn, Hoil;Kim, Changone;Lee, Heesang
    • Journal of Korea Technology Innovation Society
    • /
    • v.18 no.2
    • /
    • pp.292-317
    • /
    • 2015
  • As modern science and technology and warfare become to be advanced and precise, the weapon systems becomes more complex based on state-of-the-art technology. Therefore, firms in the defense industry continue to accelerate research and development for up-to-date weapon systems with high complexity which urge the firms to collaborate with the external organizations to obtain the knowledge required and eventually to reduce costs and risk. This study tries an empirical study about the effect of collaboration on the innovation performances from the network analysis perspective. By surveying collaboration relationships among 530 firms in the Korean defense industry, we analyzed the alliance network of the defense industry. Network centrality including degree, closeness, and betweenness centralities is investigated and then the relationship among the network centrality property, internal R&D capabilities and innovation is analysed. The results show that firms with high internal R&D capabilities place the firm at center of the network. On the other hand, except for the firms with highly connected centrality, no relationship was found between the internal R&D capabilities and its performance and in turn. these capabilities had both direct and indirect effects on innovation performances through mediated collaboration among firms. This study implied that Korean firms with a high internal R&D capabilities in the defense industry which utilize knowledge, information and resources within the network more frequently show more innovative performance. This result claims the policy makers to participate more firms in fostering open innovation for the defense industry.

A Study on the Protection for Original Technology and Improved Patent when Research Institutes or Universities Transfer their Research Outputs (출연연 및 대학에서 연구성과물의 기술이전 시 개량특허와 원천기술의 보호에 관한 검토 : H대학교와 D제약사의 신약후보물질 관련 개량특허 탈취논쟁여부를 중심으로 (대상판결: 서울중앙지방법원 2014.12.24. 선고 2013가합85597 판결))

  • Kang, Sun Joon;Kim, Min Ji;Won, Yoo Hyung;Oh, Keon Taek
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.313-333
    • /
    • 2017
  • As science and technology advanced, specialized and massive, development through mutual cooperation or research based on patent licensing such as material transfer contract, technology transfer contract etc are actively taking place to minimize or separate the cost and risk of R&D. In R&D, such mutual work can enjoy the merit of division of labor by effectively allocating resources and manpower to accomplish its goal. Inevitably, however, there are also many possibilities of disputes regarding the ownership and use of intellectual property rights resulting from such mutual/post-studies, or inventions upgraded by using prior patents. The case reviewed by this paper is noticeable regarding the recent trend of upgraded inventions. In the case, a pharmaceutical company conducted tests/assessments on the complete technology of patent owned by a university on the premise of transferring the technology, and then terminated the technology transfer contract due to reasons of toxicity. The university then filed a damage claim suit against the company for infringing the contract. This is a dispute case betw een a university which developed a potential ingredient for new medicine and a pharmaceutical company which agreed to transfer and receive the technological later on. Regarding the upgraded inventions of source patents, this case has many implications on the protection of prior patents, research contract, and research security to protect the accomplishment of research. This paper reviews the subject ruling and the protection of upgraded patents and source technologies. As critical notes, the paper also summarizes the major issues of case ruling to observe the standard of ruling patent infringement related to the extortion of upgraded patents. Then, through the ruling of the case above, the paper suggests implications and future strategies.

A Goodness of Fit and Validity Study of the Korean Radiological Technologists' Core Job Com petency Model (방사선사 핵심 직무역량 모델의 적합성 및 타당성 검증)

  • Lim, Chang-Seon;Cho, A Ra;Hur, Yera;Choi, Seong-Youl
    • Journal of radiological science and technology
    • /
    • v.40 no.3
    • /
    • pp.469-484
    • /
    • 2017
  • Radiological Technologists deals with the life of a person which means professional competency is essential for the job. Nevertheless, there have been no studies in Korea that identified the job competence of radiologists. In order to define the core job competencies of Korean radiologists and to present the factor models, 147 questionnaires on job competency of radiology were analyzed using 'PASW Statistics Version 18.0' and 'AMOS Version 18.0'. The valid model consisted of five core job competencies ('Patient management', 'Health and safety', 'Operation of equipment', 'Procedures and management') and 17 sub - competencies. As a result of the factor analysis, the RMSEA value was 0.1 and the CFI, and TLI values were close to 0.9 in the measurement model of the five core job competencies. The validity analysis showed that the mean variance extraction was 0.5 or more and the conceptual reliability value was 0.7 or more, And there was a high correlation between subordinate competencies included in each subordinate competencies. The results of this study are expected to provide specific information necessary for the training and management of human resources centered on competence by clearly showing the job competence required for radiologists in Korea's health environment.

Benefit Evaluation for Traffic Transfer System using Contingent Valuation Method in Tourist Resort (CVM을 이용한 관광지 환승 교통시스템의 편익 추정에 관한 연구)

  • Lee, Byeong-Ju;Seo, Im-Gi;NamGung, Mun
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.4
    • /
    • pp.57-66
    • /
    • 2007
  • According to the rapid economic growth and the escalation of recreational tourism activities due to the change of job and working patterns, currently various traffic problems often occur in tourist areas. As tourist traffic, contrary to general traffic, is not regional but rather from outside the area of interest, it is hard to grasp the traffic situation surrounding the tourist area. Furthermore, since the traffic is concentrated during a limited tourist season, it is difficult to examine and solve the problem. In this study, in order to test the feasibility of introducing a traffic transfer system to reduce congestion in tourist areas, the authors considered the differences in traffic congestion between typical and tourist seasons and designed a willingness to pay model. The willingness to pay amount for a shuttle bus fare is assumed as 1,430 Won and 1,650 Won is assumed for a transfer parking charge. These amounts were slightly above the current bus fare in the study area, but many people thought that the introduction of a traffic transfer system would help to relieve the traffic congestion approaching the tourist area and to develop tourism resources. As the willingness to pay appeared high from the persons used in this study, it was indirectly confirmed that the introduction of a traffic transfer system would be a step in the right direction.

On Generating Backbone Based on Energy and Connectivity for WSNs (무선 센서네트워크에서 노드의 에너지와 연결성을 고려한 클러스터 기반의 백본 생성 알고리즘)

  • Shin, In-Young;Kim, Moon-Seong;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.41-47
    • /
    • 2009
  • Routing through a backbone, which is responsible for performing and managing multipoint communication, reduces the communication overhead and overall energy consumption in wireless sensor networks. However, the backbone nodes will need extra functionality and therefore consume more energy compared to the other nodes. The power consumption imbalance among sensor nodes may cause a network partition and failures where the transmission from some sensors to the sink node could be blocked. Hence optimal construction of the backbone is one of the pivotal problems in sensor network applications and can drastically affect the network's communication energy dissipation. In this paper a distributed algorithm is proposed to generate backbone trees through robust multi-hop clusters in wireless sensor networks. The main objective is to form a properly designed backbone through multi-hop clusters by considering energy level and degree of each node. Our improved cluster head selection method ensures that energy is consumed evenly among the nodes in the network, thereby increasing the network lifetime. Comprehensive computer simulations have indicated that the newly proposed scheme gives approximately 10.36% and 24.05% improvements in the performances related to the residual energy level and the degree of the cluster heads respectively and also prolongs the network lifetime.

  • PDF

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Multi-hop Routing Protocol based on Neighbor Conditions in Multichannel Ad-hoc Cognitive Radio Networks (인지 무선 애드혹 네트워크에서의 주변 상황을 고려한 협력적 멀티홉 라우팅 방법)

  • Park, Goon-Woo;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4A
    • /
    • pp.369-379
    • /
    • 2011
  • During the routing process between nodes on the CR(Cognitive Radio) network conducting for efficient use of limited frequency resources, spectrum handover process due to the appearance of the PU occupies most of the routing latency, and also decreases the reliability of the path. In this paper, a cooperative routing protocol in a multi-channel environment is proposed. The source node broadcasts a message with available channel lists and probability of PU appearance during its route guidance. The intermediate nodes re-transmit the message, received from the source node, and update and maintain the information, status table of the path. The destination node determines the optimal path and sends a reply message to the selected path after it receives the messages from the intermediate nodes. The average probability of the PU appearance and the average time of the PU appearance are updated while transferring data. During data transmission the channel with the lowest probability of appearance of the PU is selected dynamically and if a PU appears on the current channel partial repairment is performed. It is examined that reliability of the selected path considerably is improved and the routing cost is reduced significantly compared to traditional routing methods.