• 제목/요약/키워드: Corruption

검색결과 315건 처리시간 0.033초

A Modern Analysis of 'Guanxi' of Foreign Investment in China

  • LEE, Seoung-Taek;PARK, Woo
    • 무역상무연구
    • /
    • 제68권
    • /
    • pp.197-218
    • /
    • 2015
  • China is a land of guanxi, everything is connected with guanxi. China has a business culture based on guanxi connections underpinned by strong Confucian ethics. However, there are some reasons why it is difficult for western companies to run businesses in China. Firstly, foreign firms lack the understanding and experiences necessary for doing business in China. They don't know the absence of alternatives is one of reasons that guanxi is so powerful in Chinese society. Secondly, there are many misconceptions about guanxi. It is easier for many foreign scholars or businessmen to equate guanxi with corruption due to the ambiguity of guanxi. Thus, if a foreign enterprise possesses guanxi, it can be a source of competitive advantage for doing business due to lack of law systems for anti-corruption activities in China. Furthermore, it is gaining increasing importance not only in Business to Government(B2G) but also in Business to Consumers(B2C) relationships. Therefore,managers should pay great attention to the proper use of guanxi instead of being involved in corrupt behaviours because now the governments hold a strong attitude against corruption. In particular, establishment of working guanxi through red envelops(basically giving money) or illegal gifts can cause a great problem for both parties, which were naturally accepted among most government officials and businessmen until recently.

  • PDF

배합사료의 자연부패과정 중 발생하는 저분자 유기화합물의 동정 및 분석 (Identification and analysis of low molecular organic compounds during complete feed spoilage from natural corrupt feeds)

  • 유지민;김용탁;이권정;김동운;김수기;문형인
    • 한국동물위생학회지
    • /
    • 제40권4호
    • /
    • pp.259-264
    • /
    • 2017
  • In this study, the changes of low molecular weight compounds during natural decay process for 4 weeks were analyzed. Natural corruptions were observed in the slate warehouse with summer humidity and temperature throughout the rainy season by using commercially available compound feeds. Koiganal was detected from 14 days of natural decay and corruption with chicken, pig, and Korean cattle feed. Ethyl palmitate, Ethyl pentadecanoate and, Methyl elaidatel were detected from chicken, pig, and Korean cattle feed. So, Koiganal can be useful for monitoring the degree of pollution of corruption of livestock feeds in advance.

An Enhanced Remote Data Checking Scheme for Dynamic Updates

  • Dong, Lin;Park, Jinwoo;Hur, Junbeom;Park, Ho-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1744-1765
    • /
    • 2014
  • A client stores data in the cloud and uses remote data checking (RDC) schemes to check the integrity of the data. The client can detect the corruption of the data using RDC schemes. Recently, robust RDC schemes have integrated forward error-correcting codes (FECs) to ensure the integrity of data while enabling dynamic update operations. Thus, minor data corruption can be recovered by FECs, whereas major data corruption can be detected by spot-checking techniques. However, this requires high communication overhead for dynamic update, because a small update may require the client to download an entire file. The Variable Length Constraint Group (VLCG) scheme overcomes this disadvantage by downloading the RS-encoded parity data for update instead of the entire file. Despite this, it needs to download all the parity data for any minor update. In this paper, we propose an improved RDC scheme in which the communication overhead can be reduced by downloading only a part of the parity data for update while simultaneously ensuring the integrity of the data. Efficiency and security analysis show that the proposed scheme enhances efficiency without any security degradation.

Enhancing TCP Performance over Wireless Network with Variable Segment Size

  • Park, Keuntae;Park, Sangho;Park, Daeyeon
    • Journal of Communications and Networks
    • /
    • 제4권2호
    • /
    • pp.108-117
    • /
    • 2002
  • TCP, which was developed on the basis of wired links, supposes that packet losses are caused by network congestion. In a wireless network, however, packet losses due to data corruption occur frequently. Since TCP does not distinguish loss types, it applies its congestion control mechanism to non-congestion losses as well as congestion losses. As a result, the throughput of TCP is degraded. To solve this problem of TCP over wireless links, previous researches, such as split-connection and end-to-end schemes, tried to distinguish the loss types and applied the congestion control to only congestion losses; yet they do nothing for non-congestion losses. We propose a novel transport protocol for wireless networks. The protocol called VS-TCP (Variable Segment size Transmission Control Protocol) has a reaction mechanism for a non-congestion loss. VS-TCP varies a segment size according to a non-congestion loss rate, and therefore enhances the performance. If packet losses due to data corruption occur frequently, VS-TCP decreases a segment size in order to reduce both the retransmission overhead and packet corruption probability. If packets are rarely lost, it increases the size so as to lower the header overhead. Via simulations, we compared VS-TCP and other schemes. Our results show that the segment-size variation mechanism of VS-TCP achieves a substantial performance enhancement.

The Impact of Financial Integration on Economic Growth in Southeast Asia

  • Bong, Angkeara;Premaratne, Gamini
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제6권1호
    • /
    • pp.107-119
    • /
    • 2019
  • This paper examines the impact of financial integration on economic growth in Southeast Asia over the period 1993-2013. This paper further investigates whether the relationship depends on the level of financial and economic development, government corruption, and macroeconomic policy. These questions raise important issues both from a theoretical and a policy perspective. We employ the generalized methods of moment (GMM) in the dynamic panel estimation framework to analyse several factors, including initial income, initial schooling, financial development, inflation, trade openness, corruption, and financial crisis. The study further analyzes the data using the EGLS model to examine the consistency of the GMM model. We found that financial integration has a significant positive effect on economic growth in Southeast Asia. Our findings suggest that increasing financial integration could improve the productive capacity of the economy, including more investments and efficient allocation of capital, and thus enhancing economic growth in this region. More specifically, the results suggest that the government should work towards eliminating corruption and stabilizing macroeconomics in order to enhance financial integration and economic growth. This paper sheds new insights on a better evaluation of the past and present theorizing on the subject of financial integration and economic growth; especially, in Southeast Asia.

잡음 환경 음성 인식을 위한 심층 신경망 기반의 잡음 오염 함수 예측을 통한 음향 모델 적응 기법 (Model adaptation employing DNN-based estimation of noise corruption function for noise-robust speech recognition)

  • 윤기무;김우일
    • 한국음향학회지
    • /
    • 제38권1호
    • /
    • pp.47-50
    • /
    • 2019
  • 본 논문에서는 잡음 환경에서 효과적인 음성 인식을 위하여 DNN(Deep Neural Network) 기반의 잡음 오염 함수 예측을 이용한 음향 모델 적응 기법을 제안한다. 깨끗한 음성과 잡음 정보를 입력으로 하고 오염된 음성에 대한 특징 벡터를 출력으로 하는 DNN을 학습하여 비선형 관계를 갖는 잡음 오염 함수를 예측한다. 예측된 잡음 오염 함수를 음향모델의 평균 벡터에 적용하여 잡음 환경에 적응된 음향 모델을 생성한다. Aurora 2.0 데이터를 이용한 음성 인식 성능 평가에서 본 논문에서 제안한 모델 적응 기법이 기존의 전처리, 모델 적응 기법에 비해 일치, 불일치 잡음 환경에서 모두 평균적으로 우수한 성능을 나타낸다. 특히 불일치 잡음 환경에서 평균 오류율이 15.87 %의 상대 향상률을 나타낸다.

Enhancement of SCTP Throughput using Chunk Checksum

  • Lin Cui;Koh Seok J.;Hong Yong-Geun
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2006년도 춘계학술발표대회
    • /
    • pp.1147-1150
    • /
    • 2006
  • Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted SCTP packet will be regarded as a lost packet and then discarded. This may result in degradation of SCTP's throughput performance over wireless networks. This paper proposes a new chunk checksum scheme for SCTP, in which each data chunk contains its own checksum field and SACK chunk carry corresponding Transmission Sequence Number (TSN) with timestamp for every corruption event. The proposed chunk checksum scheme is introduced with the following three purposes: 1) to distinguish the chunk corruptions from the chunk losses; 2) to avoid the unnecessary halving of the congestion window (cwnd) in the case of chunk corruption; 3) to avoid the unwanted timeouts which can be induced in conventional SCTP in the case that the retransmitted data chunks are corrupted again in wireless networks. Simulation results show that the proposed chunk checksum scheme could improve the SCTP throughput in the wireless environments with a high bit error rate.

  • PDF

Analysis and Detection of Malicious Data Hidden in Slack Space on OOXML-based Corrupted MS-Office Digital Files

  • Sangwon Na;Hyung-Woo Lee
    • International journal of advanced smart convergence
    • /
    • 제12권1호
    • /
    • pp.149-156
    • /
    • 2023
  • OOXML-based MS-Office digital files are extensively utilized by businesses and organizations worldwide. However, OOXML-based MS-Office digital files are vulnerable to forgery and corruption attack by including hidden suspicious information, which can lead to activating malware or shell code being hidden in the file. Such malicious code can cause a computer system to malfunction or become infected with ransomware. To prevent such attacks, it is necessary to analyze and detect the corruption of OOXML-based MS-Office files. In this paper, we examine the weaknesses of the existing OOXML-based MS-Office file structure and analyzes how concealment and forgery are performed on MS-Office digital files. As a result, we propose a system to detect hidden data effectively and proactively respond to ransomware attacks exploiting MS-Office security vulnerabilities. Proposed system is designed to provide reliable and efficient detection of hidden data in OOXML-based MS-Office files, which can help organizations protect against potential security threats.

The State-Owned Enterprises Reform in Vietnam

  • Lam, Tran Dinh
    • 수완나부미
    • /
    • 제6권2호
    • /
    • pp.37-63
    • /
    • 2014
  • The economic renovation in Vietnam has shown promising achievements. The process of reforming and equitizing state-owned enterprises, and reducing subsidies from the government have made significant progress since 1986. However, this policy has not received the adequate valuation from leaders. Big companies have not been equitized, and are still managed and subsidized by the government, resulted in budget losses. Corporations have been dominated by political interests. This has led to arguments for better and more feasible measures which could save national budget. Corruption in Vietnam mostly originates from state-owned enterprises, for the monopoly was given by government to those enterprises as foreign partners continue to compete under market-oriented mechanism and transparent supervision. Therefore, renovation of the business mechanism, as well as speeding up equitization and minimizing people's properties, have become crucial in the regional integration trend. This is entirely a vital factor in the renovation process. This study explores plans, as well as the merits of the renovation process in Vietnam, ultimately envisioning to overcome current consequences and motivate Vietnam's economy.

  • PDF