• Title/Summary/Keyword: Cost sharing

Search Result 533, Processing Time 0.028 seconds

Analysis of Flood Control Effect by Applying the Connecting Channel in Estuary Area Including the Confluence of Two Rivers (2개의 하천이 합류하는 하구역에서의 연결수로 통수능에 따른 홍수위저감효과 분석)

  • Kim, Sooyoung;Kim, Hyung-Jun;Yoon, Kwang Seok
    • Journal of Korea Water Resources Association
    • /
    • v.48 no.12
    • /
    • pp.1065-1075
    • /
    • 2015
  • In the estuary where the structure such as river-mouth weir has been installed, the flow is developed very complicatedly due to river water from upstream, tide of the sea and floodgate operation. Especially, if basin outlets more than one exists in one estuary, the boundary conditions will be significantly more complex form. Saemangeum(SMG) project area in Korea is the most typical example. There are Mankyung river and Dongjin river in upstream. The water of them inflows into SMG project area. In the downstream, river flow was drained from inland to sea over the SMG sea dike through the sluice. The connecting channel was located between Mankyung and Dongjin basins. It functions not only as transportation by ship in ordinary period but also as flood sharing by sending flood flow to each other in flood period. Therefore, in order to secure the safety against flood, it is very important to understand the flood sharing capacity for connecting channel. In this study, the flood control effect was analyzed using numerical simulation. Delft3D was used to numerical simulation and simulated period was set up with neap tide, in which the maximum flood stage occurred due to poor drainage. Actually, three connecting channels were designed in land use plan of the SMG Master Plan, but they were simplified to a single channel for conciseness of analysis in this study. According to the results of numerical analysis, the water level difference between two basins was increased and the maximum flood stage at dike sluice was also upraised depending on decrease of conveyance. And the velocity induced by same water level difference was decreased when the conveyance became smaller. In certain conveyance above, there was almost no flood control effect. Therefore, if the results of this study are considered for design of connecting channel, it will be expected to draw the optimal conveyance for minimizing dredging construction cost while maximizing the flood control effect.

Intents of Acquisitions in Information Technology Industrie (정보기술 산업에서의 인수 유형별 인수 의도 분석)

  • Cho, Wooje;Chang, Young Bong;Kwon, Youngok
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.123-138
    • /
    • 2016
  • This study investigates intents of acquisitions in information technology industries. Mergers and acquisitions are a strategic decision at corporate-level and have been an important tool for a firm to grow. Plenty of firms in information technology industries have acquired startups to increase production efficiency, expand customer base, or improve quality over the last decades. For example, Google has made about 200 acquisitions since 2001, Cisco has acquired about 210 firms since 1993, Oracle has made about 125 acquisitions since 1994, and Microsoft has acquired about 200 firms since 1987. Although there have been many existing papers that theoretically study intents or motivations of acquisitions, there are limited papers that empirically investigate them mainly because it is challenging to measure and quantify intents of M&As. This study examines the intent of acquisitions by measuring specific intents for M&A transactions. Using our measures of acquisition intents, we compare the intents by four acquisition types: (1) the acquisition where a hardware firm acquires a hardware firm, (2) the acquisition where a hardware firm acquires a software/IT service firm, (3) the acquisition where a software/IT service firm acquires a hardware firm, and (4) the acquisition where a software /IT service firm acquires a software/IT service firm. We presume that there are difference in reasons why a hardware firm acquires another hardware firm, why a hardware firm acquires a software firm, why a software/IT service firm acquires a hardware firm, and why a software/IT service firm acquires another software/IT service firm. Using data of the M&As in US IT industries, we identified major intents of the M&As. The acquisition intents are identified based on the press release of M&A announcements and measured with four categories. First, an acquirer may have intents of cost saving in operations by sharing common resources between the acquirer and the target. The cost saving can accrue from economies of scope and scale. Second, an acquirer may have intents of product enhancement/development. Knowledge and skills transferred from the target may enable the acquirer to enhance the product quality or to expand product lines. Third, an acquirer may have intents of gain additional customer base to expand the market, to penetrate the market, or to enter a foreign market. Fourth, a firm may acquire a target with intents of expanding customer channels. By complementing existing channel to the customer, the firm can increase its revenue. Our results show that acquirers have had intents of cost saving more in acquisitions between hardware companies than in acquisitions between software companies. Hardware firms are more likely to acquire with intents of product enhancement or development than software firms. Overall, the intent of product enhancement/development is the most frequent intent in all of the four acquisition types, and the intent of customer base expansion is the second. We also analyze our data with the classification of production-side intents and customer-side intents, which is based on activities of the value chain of a firm. Intents of cost saving operations and those of product enhancement/development can be viewed as production-side intents and intents of customer base expansion and those of expanding customer channels can be viewed as customer-side intents. Our analysis shows that the ratio between the number of customer-side intents and that of production-side intents is higher in acquisitions where a software firm is an acquirer than in the acquisitions where a hardware firm is an acquirer. This study can contribute to IS literature. First, this study provides insights in understanding M&As in IT industries by answering for question of why an IT firm intends to another IT firm. Second, this study also provides distribution of acquisition intents for acquisition types.

A Study of Family Caregiver's Burden for the Terminally III Patients (지역사회 말기질환자 가족 부담감에 관한 연구)

  • Han, Sung-Suk;Ro, You-Ja;Yang, Soo;Yoo, Yang-Sook;Kim, Sek-Il;Hwang, Hee-Hyung
    • Journal of Home Health Care Nursing
    • /
    • v.10 no.1
    • /
    • pp.58-72
    • /
    • 2003
  • The purpose of this study was to describe the perceived burden of the terminally III patients's caregiver and to analyze relationship between the perceived burden and the various demographics, illness characteristics, family relationships, and economic factor of the family & patients. The sample of 132 caregivers who care for the terminally III patients Kyung-Gi province, Seoul, Korea. The period of this study was from August to September, 2002. The perceived burden of the family caregiver was measured by the burden scale(20 items, 4 point scale) developed by Montgomery et al. (1985). The Data was analyzed using SAS-program by t-test and ANOVA. The results were as follows; 1. The mean of the family caregiver's burden score was 3.02. The score showed that caregivers perceive severe the level of burden. The hight items of the family caregiver's burden were' I feel it is painful to watch patient's diseases'(3.77). 'I feel afraid for what the future holds for my patients'(3.66), 'I feel it reduced to amount of privacy time'(3.64). 2. The caregiver's burden was significantly related to patient's gender(F=3.17, p= 0.0020), patient's job(F=2.49, p=0.0476), caregiver's age(F=4.29, p=0.0030), and caregiver's job(F=2.49, p=0.0476). 3. The caregiver's burden according to illness characteristics showed no significant difference. 4. The caregiver's burden was significantly associated with patient's family relationship (F=4.05, p=0.0041), patient's care mean period in a day(F=47.18,

  • PDF

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

The Genealogical Study on SWIFTNet Trade Service Utility and Bank Payment Obligation (SWIFTNet TSU BPO의 계보학적 연구)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.3-21
    • /
    • 2016
  • The thesis examines genealogical study of various aspects to overcome lots of problems which come by when we execute SWIFTNet TSU BPO. Practical implications regarding the innovation of electronic trade infrastructure are as follows. First, the shipping documents in the SWIFTNet TSU BPO are directly sent to an importer by an exporter after the baseline is confirmed. With this process itself, therefore, the bank cannot secure the account receivable. When initiating the SWIFTNet TSU BPO deal, it is needed to set regulations on the bank's account receivable security in the contract. Second, the SWIFTNet TSU BPO should also have an institutionally unified sharing platform with security, stability and convenience. It other words, it is needed to develop services which meet e-payment paradigm and international environments through continued analysis on market changes and flow. Third, the SWIFTNet TSU is useful in terms of promptness, reduction of risk in foreign exchange payment, cost reduction. Therefore, the SWIFT should be perfectly united and linked among the banks, importer and exporter to make the SWIFTNet TSU more convenient in countries around the world. Fourth, the SWIFT should be approached from the aspect of expansion of network and creation of a new business model through analysis on these problems with a worldwide perspective. At the same time, it is necessary to build a cooperative system to share information and promote comprehensive management for efficient operation.

  • PDF

A Study on DGPS Framework and Performance Evaluation for High-Accurate Localization based on GPS/AGPS (GPS/AGPS 기반의 고정밀 측위가 가능한 DGPS 프레임워크 및 성능평가에 관한 연구)

  • Seo, Ho-Seok;Jung, Se-Hoon;Oh, Min-Joo;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.8
    • /
    • pp.927-938
    • /
    • 2014
  • A number of crime and disease relief situation show a clear increasing trend in domestic and overseas country. In particular, we desperately need a fast location information sharing with high accuracy for dealing with this situation efficiently. In this paper, we propose a DGPS framework and performance evaluation based on Web service enable increase location accuracy using low-cost GPS or AGPS. The framework consists of mobile station to realize the final service by receiving the correction values that are created in the base station closest to the current position from DGPS server, base station system to transmit the correct values to DPGS server by installing at base point and DGPS framework working at DGPS server. Our framework is fundamentally designed to respond based on XML to service request. In addition, for performance evaluation, we make use of 3 sites of Level 2 city base-station among the base stations being operated in Suncheon-si. Through performance evaluation, we show that our framework outperforms about 10%~15% in terms of error improvement rate, compared with the existing schemes. And we have the advantage that various services can be expanded owing to receiving the correction values through mobile device such as, smart phone, smart pad, net-book by using XML based Web services.

The Effect of Doctor's Payment Method on Patient's Medical Care Use: Revisit of the Patient's Asymmetric Information Problem (환자의 의료이용에 대한 의사의 지불방식의 효과: 재방문 환자의 비대칭적 정보의 문제)

  • Jo, Changik;Lim, Jae-Young
    • KDI Journal of Economic Policy
    • /
    • v.33 no.1
    • /
    • pp.125-148
    • /
    • 2011
  • Although the patient's problem with access to health information has been improved due to rapidly developing information technologies, such as the internet, some patients still do not have enough ability to understand, interpret, and analyze the health information. Given this view on the patient's asymmetric information problem, if a doctor provides sufficient effort to help patients understand and interpret medical information, the efficiency of patient's medical care use could be improved. This paper shows firstly that the patient's inefficient use of medical care originates from his information problems, such as the misperception of the effectiveness of medical care and secondly suggests that if the doctor makes sufficient effort to correct patient's information problems, the inefficiency can be ameliorated. This paper also suggests the manipulation of a doctor's payment method can lead a doctor to provide optimal level of efforts which can in turn lead patients to use the optimal level of medical care. With an optimal level of effort, a doctor can more easily achieve a patient's compliance with the newly recommended amount of medical care.

  • PDF

The Study on the Sustainable Sharing Plans of Military Installations for a Civil Military Co-existence (민군상생을 위한 지속가능한 군사시설 공유방안 연구)

  • Park, Young Jun;Son, Kiyoung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.2
    • /
    • pp.110-117
    • /
    • 2016
  • This paper shows procedure and strategies to improve military facilities and local residents' welfare through a civil-military sustainable cooperation project. Military installations tend to impede urban developments, so that a few civil compliant have been often filed. Meanwhile, it is sometimes impossible to relocate military units due to their own unique purpose, even though they belong to core sites of civil developments, which are generally indispensible due to urban expansion, magnified road networks and so on. The solution to offset these conflicts between civil and military demands, which are associated with military units and urbanization surrounding them, is to establish sustainable strategies which enable both civil and military be beneficial. In this study, it is described, decision making procedure to make some facilities of a military unit be better as well as promote local residents' welfare through securing high-quality sports facilities. Delphi-technique and Paired Comparison Method are used to collect civil and military opinions regarding sustainable agreements. As a case study, a civil military cooperation project between a military unit and a local government is introduced. With successful projects, it is expected that the better installations could lead positive images of a military unit, provide advanced athletic environments for both local residents and military personnels, and lessen defense cost to maintain them. Moreover, this project will go down as a paragon of civil military sustainable cooperation.

An Empirical Study on R&D Effectiveness of IT SMEs (IT중소기업의 R&D시스템 효과성에 관한 실증연구 : 대구경북지역을 중심으로)

  • Shin, Jin-Kyo;Hwang, Su-Jung
    • Management & Information Systems Review
    • /
    • v.28 no.4
    • /
    • pp.109-129
    • /
    • 2009
  • This study aims at investigating the effectiveness of SME's R&D system empirically. Specifically, this study analyze the relationships among R&D inputs(R&D investment, R&D human resource management), process(R&D planning, external network, internal cooperation), and output(technological innovation). A questionnaire was developed to measure the above variables. To test these relations, data were collected from the small and medium-sized IT firms located in Daegu-Kyungbuk region. The survey data of 154 firms were integrated as the empirical base for testing the relations. Most respondents were from the managers. Structural equation modeling analyses were used to examine the relations. Major results are as follows: Firstly, R&D HRM was positively and significantly influenced on the R&D planning. Secondly, R&D planning was positively and significantly affected on the external network, internal cooperation, and technological innovation. Thirdly, the both relations between R&D investment and R&D planning, and external network and technological innovation were not significant statistically. These results suggest the following implications. First, R&D human resource management is very important for IT SMEs. Secondly, internal cooperation mediates R&D inputs and technological innovation by approaching the other department's unique resources and by sharing the cost of new resource development. Several future researches need to overcome the limitations of this research. First, this study's sample was based on the small and medium-sized IT firms just located in Daegu-Kyungbuk region. This limitation may imply that empirical results can not represent overall small and medium-sized firm's situations. Therefore, future research needs to include different samples. Secondly, this study depends on the latitudinal study.

  • PDF

The introduction of Traffic Inducement Security System in Korea - Centering on Curriculums - (한국의 교통유도경비 도입방안 -교과과정을 중심으로-)

  • Lee, Sang-Won;Lee,, Seung-Chal
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.147-164
    • /
    • 2010
  • A variety of work zone including road single-sharing construction add surrounding disorder and increase inconvenience of vehicles and pedestrians and furthermore danger of traffic accidents, which sometimes result in human life damages. Traffic delay due to vehicles and users generating in the course of using large-scale multiplex facilities bring about a great economic loss. Now, a lot of regulations and laws related to traffic safety system on construction sites etc. are established, but can not display efficacy desirably. It brings about continuous economic loss due to human life accidents and delay. For the purpose of solving the problems, it is necessary to import systems such as traffic inducement Security (Japan) and traffic controller (CANADA, USA) This article suggest how improve civil safety and reduce Social cost. therefore This thesis aims at analyzing advanced cases of foreign countries, looking into Korean status, and presenting importing ways of traffic inducement Security appropriate to Korea. It is reasonable to grant grade1, grade2, and technical experts to traffic inducement Security who pass regulated educations and examinations. In addition, by reversing regulations and laws, it is necessary only those who have the licenses of traffic induction guarder etc. can establish construction sites and disordered places on roads. Theory educations for education time must include basic educations and expert educations. Basic educations must include understanding regulations and laws and understanding affairs. Expert educations must include traffic control, safety educations, understanding of traffic accidents, operation of traffic control facilities, and traffic accident settlements. Traffic affairs educations must include traffic induction affairs in sites (hand signals, safety material establishment, traffic accident settlements, and urgent treatments).

  • PDF