• Title/Summary/Keyword: Information Resource Sharing

Search Result 470, Processing Time 0.024 seconds

Hospital Healthcare Service Innovation: Interaction and Knowledge Sharing based on ICT Relatedness (병원 헬스케어 서비스 혁신: ICT 조직기능 연관성 (ICT Relatedness)에 기반한 상호작용과 지식공유)

  • Kim, Chan Young;Lee, Kang Duck;Kim, Yong Jin
    • Information Systems Review
    • /
    • v.17 no.1
    • /
    • pp.19-47
    • /
    • 2015
  • The purpose of this research is to represent how ICT relatedness and organization environment influence on interactions between healthcare specialist and patients, and how knowledge sharing influence on healthcare innovation, and how service innovation influence on service performance through structured research model. This research also has applied to resource based view, adaptive structuration theory, service innovation, ICT relatedness to find out performance effect on healthcare service innovation and service performance. In other words, organization structure environment and ICT relatedness are important factors to promote interaction between healthcare service providers and customers like patients each other, moreover, to share the tacit knowledge by creating in the interaction. Moreover in order to verify model fitness, this research has surveyed among healthcare specialists, technicians and other staffs. Model verification result, all hypotheses have been found to give a positive effect on the creation and significantly. Structured organizational environment and ICT association is to promote the organization's functions by influencing the behavior of the service organization and patient interaction and knowledge sharing, and suggests that the major factors influencing the innovation performance of hospitals and health care services.

Design and Implementation of an Information System for Storing and Querying Context Information in Ubiquitous Smart Space (지능형 유비쿼터스 공간에서 상황 정보의 효과적인 저장 및 질의를 위한 정보 시스템의 설계 및 구현)

  • Lee, Ki-Hyeok;Han, Hyung-Jin;Choi, Won-Chul;Han, Kyoung-Hoon;Han, Ji-Yean;Shon, Kirack
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.15-23
    • /
    • 2008
  • This paper proposes a CIB framework implementing a ubiquitous smart space. In a ubiquitous smart space, a ubiquitous mobile device recognizes surrounding context, and infers the situation and provides services to users. Ubiquitous mobile devices have a RDF store to manage resources and relevant information efficiently on CIB framework. This store space is flexible on the operations such as addition, modification, deletion of information and response to query by SPARQL. In addition, it provides local information to other ubiquitous mobile devices in the from of XML and stores resource information from other ubiquitous mobile devices into local ubiquitous mobile device for the purpose of discovering external resources.

  • PDF

Energy Efficiency Optimization for multiuser OFDM-based Cognitive Heterogeneous networks

  • Ning, Bing;Zhang, Aihua;Hao, Wanming;Li, Jianjun;Yang, Shouyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2873-2892
    • /
    • 2019
  • Reducing the interference to the licensed mobile users and obtaining the energy efficiency are key issues in cognitive heterogeneous networks. A corresponding rate loss constraint is proposed to be used for the sensing-based spectrum sharing (SBSS) model in cognitive heterogeneous networks in this paper. Resource allocation optimization strategy is designed for the maximum energy efficiency under the proposed interference constraint together with average transmission power constraint. An efficiency algorithm is studied to maximize energy efficiency due to the nonconvex optimal problem. Furthermore, the relationship between the proposed protection criterion and the conventional interference constraint strategy under imperfect sensing condition for the SBSS model is also investigated, and we found that the conventional interference threshold can be regarded as the upper bound of the maximum rate loss that the primary user could tolerate. Simulation results have shown the effectiveness of the proposed protection criterion overcome the conventional interference power constraint.

An Analysis of the Development Strategy of Academic Libraries in the U.S., U.K., Australia and Canada (미국, 영국, 호주 및 캐나다 대학도서관의 발전전략의 분석)

  • Yoon, Cheong-Ok
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.1
    • /
    • pp.55-82
    • /
    • 2006
  • The purpose of this study is to analyze the development strategy of academic libraries in the U.S., U.K., Australia, and Canada which have been established in response to the problems faced since the 1990s. Major problems, which academic libraries in various countries have commonly experienced include continuing decrease in library expenditures, changing role of libraries themselves, changing nature of library collections, development of information technology and technological intrastructure on campus, steep increase in prices of scholarly journals, and relative decrease in purchasing powers of libraries. In this study, discussed are the strategic planning and solutions carried out at the national or government level, rather than by individual libraries. Their efforts commonly focus on such measures as resource sharing, shared catalog and storage facilities, cooperative purchasing and negotiation for scholarly journals, etc.

  • PDF

Robust Wireless Sensor and Actuator Network for Critical Control System (크리티컬한 제어 시스템용 고강건 무선 센서 액추에이터 네트워크)

  • Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1477-1483
    • /
    • 2020
  • The stability guarantee of wireless network based control systems is still challenging due to the lossy links and node failures. This paper proposes a hierarchical cluster-based network protocol called robust wireless sensor and actuator network (R-WSAN) by combining time, channel, and space resource diversity. R-WSAN includes a scheduling algorithm to support the network resource allocation and a control task sharing scheme to maintain the control stability of multiple plants. R-WSAN was implemented on a real test-bed using Zolertia RE-Mote embedded hardware platform running the Contiki-NG operating system. Our experimental results demonstrate that R-WSAN provides highly reliable and robust performance against lossy links and node failures. Furthermore, the proposed scheduling algorithm and the task sharing scheme meet the stability requirement of control systems, even if the controller fails to support the control task.

A Study on Optimal Clock Period Selection Algorithm for Low Power RTL Design (저전력 RTL 설계를 위한 최적 클럭 주기 선택 알고리듬에 관한 연구)

  • 최지영;변상준;김희석
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.1157-1160
    • /
    • 2003
  • We proposed a study on optimal clock period selection algorithm for low power RTL design. The proposed algorithm use the way of maintaining the throughput by reducing supply voltage after improve the system performance in order to minimize the power consumption. In this paper, it select the low power to use pipeline in the transformation of architecture. Also, the algorithm is important the clock period selection in order to maximize the resource sharing. however, it execute the optimal clock period selection algorithm.

  • PDF

Disfunctional Factors of R&D Information Retrieval Utilization: the Case of Environmental Science Database & Networks (환경.에너지 과학 R&D 정보 역기능 요인 분석: 디지털 네트워크 정보검색(NIR) 환경 적응사례)

  • 유사라
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.2
    • /
    • pp.5-29
    • /
    • 2002
  • This study explored the Dis-Functional(DF) factors associated with the information and utilization of the R&D outcomes which has been left behind in the environmental & energy science research field. Of the total of 225 sample surveyed, exactly 66.2% responded to the questions about DF factors. The major factors that have been experienced by the respondents included the followings : the shortage of manpower and budget, inadequate network utilities of resource sharing, unstable policies of digitalization of R&D databases and of presenting a specimen copy(not only report itself but also experimental data), deficient knowledge resource system for the specialized sub-research areas, absence of the process of TLO and commercialization of R&D results, and underestimation of the significance of quality control (evaluation) of academic and research information. Some recommendations for utilization of the R&D outcomes were suggested according to the DF factors investigated.

Method of Knowledge Sharing Based on Multiple Ontology on the Distributed Web Environment (분산 웹 환경에서 다중 온톨로지를 기반으로 한 지식공유방식)

  • 김희수;배상현
    • Journal of Internet Computing and Services
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2001
  • This paper studies on Multiple Ontology to share and reuse know1edge stored in every system under the Distributed Web Environment using idle resource connected the Internet. Multiple Ontology is to convert to be able know1edge sharing between ontologies constructed by one and the other. This study focuses on as follows; To compose the Distributed Web Ontology multiple system, Construction Method of the Distributed Web Environment and Composition of Multiple Ontology for Know1edge sharing and reuse. System Composed by using the jini technology has constructed extension of heterogeneous systems and effective web computing environment. Also, through 'distribution operation, practical know1edge exchange among Multiple Ontologies under the Distributed Web Environment has been processed excellently.

  • PDF

Implementation and Evaluation of IoT Service System for Security Enhancement (보안성 향상을 위한 IoT 서비스 시스템 구현 및 평가)

  • Kim, Jin-bo;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.181-192
    • /
    • 2017
  • Internet of Things includes the whole process of collected information generated from a variety of objects, as well as analyzing and sharing it, and providing useful information services to people. This study seeks ways to improve security and safety in the areas of service security technology, ID management technology and service access control, all of which take place in the IoT environment. We have implemented the services that can design and issue C&C (Certificate and Capability) service token authentication, which is based on a public key, to improve the service security. In addition, we suggest LCRS (Left Child-Right Sibling) resource model management for the efficient control of resources when generating the resource services from the data collected from node devices. We also implemented an IoT services platform to manage URL security of the resource services and perform access control for services.

Fault-Tolerant, Distributed Detection of Complex Events and States in Distributed Systems (분산 시스템에서의 복잡한 사건/상태의 결함 허용 분산 탐지)

  • Shim, Young-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1464-1480
    • /
    • 1997
  • Distributed systems offer environments for attaining high performance, fault-tolerance, information sharing, resource sharing, etc. But we cannot benefit from these potential advantages without suitable management of events/states occurring in distributed systems. These events and states can be symptoms for performance degradation, erroneous functions, suspicious activities, etc. and are subject to further analysis. To properly manage events/states, we need to be able to specify and efficiently detect these events/states. In this paper we first describe an event/state specification language and a centralized algorithm for detecting events/states specified with this language. Then we describe an algorithm for distributing an event/state detection task in a distributed system which is hierarchically organized. The algorithm consists of decomposing an event/state detection task into subtasks and allocation these subtasks to the proper nodes. We also explain a method to make the distributed detection fault-tolerant.

  • PDF