• Title/Summary/Keyword: Information transfer

Search Result 4,707, Processing Time 0.03 seconds

Relations between The Elderly's Transfer Incomes and Life Satisfaction

  • Lee, Hyoung-Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.165-172
    • /
    • 2018
  • This study was conducted to investigate the relationship between life satisfaction of the elderly and their transfer income (public transfer and private transfer income) using the 11th data of the Korea welfare panel study. In the analysis results, the public transfer income was analyzed to have a significantly positive (+) effect on the life satisfaction in the case of the elderly in general households while in the case of the elderly in low income households, private transfer income was analyzed to have a significantly positive (+) effect on life satisfaction. These results suggest that the public transfer income is 1,019,200 won (monthly average 849,000 won) in the case of the elderly in general households, and the public transfer income is found to have an effect to stabilize the income, which can be expected to increase the life satisfaction. However, in the case of the elderly in low income households, it was found to be 5,080,500 won (monthly average 424,000 won), half of the public transfer income of the elderly in general households. In the case of the elderly of low income households, it can be assumed that the private transfer income, which is the "uncomfortable" income source, fills up the unstable income stabilization gap and raises the life satisfaction. As a policy suggestion, first, by supplementing the basic pension system, which is an irrational part of public transfer income for the elderly with low income, it is necessary to design policy alternatives to enable economic stabilization of the elderly in low income households. Second, it is also necessary to actively review the introduction of income deduction plans for the transfer income of family members for the low income elderly households.

A Latent Factor (PLS-SEM) Approach: Assessing the Determinants of Effective Knowledge Transfer

  • ANJUM, Reham;KHAN, Hadi Hassan;BANO, Safia;NAZIR, Sidra;GULRAIZ, Hira;AHMED, Wahab
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.851-860
    • /
    • 2021
  • The Knowledge Transfer (KT) for higher education institutions (HEIs) is boundless. Still and all, the members of the staff affiliated with these institutions do recognize an array of hitches in relation to KT practices. The study in question underscores social interactions, training, and Information and Communication Technology (ICT) as the primary barriers and treats them as the independent variables of the study. The study posits that inadequate management of the above-mentioned barriers would impact effective KT unfavorably. Besides, putting forth some striking solutions needed to fix the obstructions that hamper the adequate management of the KT exercises is another aim of the study. For data collection purposes, the study picks out higher education institutions (public) of the Quetta district. The reckoned sample size is 317 subjects. The research type that has been used is cross-sectional research and, in this context, the cross-sectional explanatory sequential design has been used. Concerning the findings of the paper, the results of PLS-SEM show positive and significant relationships of social interaction and training with knowledge transfer, while ICT shows an insignificant positive relationship with the knowledge transfer. The most influencing factor for the knowledge transfer is social interaction as suggested by social interaction theory.

Thermal Transfer Pixel Patterning by Using an Infrared Lamp Source for Organic LED Display (유기 발광 소자 디스플레이를 위한 적외선 램프 소스를 활용한 열 전사 픽셀 패터닝)

  • Bae, Hyeong Woo;Jang, Youngchan;An, Myungchan;Park, Gyeongtae;Lee, Donggu
    • Journal of Sensor Science and Technology
    • /
    • v.29 no.1
    • /
    • pp.27-32
    • /
    • 2020
  • This study proposes a pixel-patterning method for organic light-emitting diodes (OLEDs) based on thermal transfer. An infrared lamp was introduced as a heat source, and glass type donor element, which absorbs infrared and generates heat and then transfers the organic layer to the substrate, was designed to selectively sublimate the organic material. A 200 nm-thick layer of molybdenum (Mo) was used as the lightto-heat conversion (LTHC) layer, and a 300 nm-thick layer of patterned silicon dioxide (SiO2), featuring a low heat-transfer coefficient, was formed on top of the LTHC layer to selectively block heat transfer. To prevent the thermal oxidation and diffusion of the LTHC material, a 100 nm-thick layer of silicon nitride (SiNx) was coated on the material. The fabricated donor glass exhibited appropriate temperature-increment property until 249 ℃, which is enough to evaporate the organic materials. The alpha-step thickness profiler and X-ray reflection (XRR) analysis revealed that the thickness of the transferred film decreased with increase in film density. In the patterning test, we achieved a 100 ㎛-long line and dot pattern with a high transfer accuracy and a mean deviation of ± 4.49 ㎛. By using the thermal-transfer process, we also fabricated a red phosphorescent device to confirm that the emissive layer was transferred well without the separation of the host and the dopant owing to a difference in their evaporation temperatures. Consequently, its efficiency suffered a minor decline owing to the oxidation of the material caused by the poor vacuum pressure of the process chamber; however, it exhibited an identical color property.

Development of control module for FMS construction (FMS 구축을 위한 제어 module 개발)

  • 최홍태;배용환;박재홍;이석희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.1090-1095
    • /
    • 1992
  • This paper describes the systematic control method of process information transfer and machine cell control in FMS implementation. We have constructed an experimental FMS computer network and control system. The system hardware consists of host computer to manage process data and information transfer of machine cells, cell control computers to control machine cells(NC lathe, machining center). On the other hand, software is made up of oredr management module, NC program searching and generation module, NC part program error check module and cell control module. In this study, we could arrive at conclusion as following : The first, each task could be accomplihed by the efficient information transfer in hierachical computer network. The second, data base system of part programs and process control data is needed for the efficint information transfer and production management. Lastly, expansion of FMS control system could be achieved by the hierachical and decentralized computer control system.

  • PDF

Recognizing Actions from Different Views by Topic Transfer

  • Liu, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2093-2108
    • /
    • 2017
  • In this paper, we describe a novel method for recognizing human actions from different views via view knowledge transfer. Our approach is characterized by two aspects: 1) We propose a unsupervised topic transfer model (TTM) to model two view-dependent vocabularies, where the original bag of visual words (BoVW) representation can be transferred into a bag of topics (BoT) representation. The higher-level BoT features, which can be shared across views, can connect action models for different views. 2) Our features make it possible to obtain a discriminative model of action under one view and categorize actions in another view. We tested our approach on the IXMAS data set, and the results are promising, given such a simple approach. In addition, we also demonstrate a supervised topic transfer model (STTM), which can combine transfer feature learning and discriminative classifier learning into one framework.

Conjoint Analysis for Contract Strategy for Promoting Successful Transfer of Patented Technology in Korean University (특허기술의 성공적인 거래 촉진을 위한 컨조인트 분석)

  • Ku, Min Joung;Sohn, So Young
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.34 no.3
    • /
    • pp.355-361
    • /
    • 2008
  • Technology developers in academia tend to be short of professional knowledge and recognition of technology transfer strategies. It is even severe in Korea where the concept of employee's invention has just started to effect in academia. Wasteful contract negotiation disputes cannot only be painful but also can hamper better invention. The main purpose of this paper is to design guidelines for an optimal contract strategy for technology transfer from the perspective of the technology developer in academia, the intermediary and the receiver. Applying conjoint analysis, this study shows not only the relative importance of the attributes related to the technology transfer contract but also the most important conditions of the contract. It is expected that this study may improve the efficiency of technology transfer activities in academia in Korea.

The Impacts of Technology Transfer on Productivity Growth of Firms based on Malmquist Productivity Index

  • Han, Jaeseung;Kwon, Youngkwan;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.26 no.4
    • /
    • pp.542-560
    • /
    • 2016
  • This study determines whether or not firms can achieve high productivity growth through external technology acquisition. It also identifies the key factors affecting adopting firms' productivity growth by employing the Malmquist productivity index (MPI) methodology, which features computational ease, low data dependency, and decomposition of productivity growth into technical efficiency change and technical change. Results showed that the effects of productivity growth arising from technology transfer became stronger over time. Moreover, patent transfer guaranteed firms' productivity growth, but no evidence was found that factors such as age and size could increase productivity. Finally, cultural similarity could be another factor conditioning the effectiveness of technology transfer in the productivity of adopting firms.

A Study on Transfer Convenience Evaluation Indicators for Urban Railway Stations (도시철도 역사의 환승 편의성 평가지표 연구)

  • Kim, Hwang Bae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.6
    • /
    • pp.793-799
    • /
    • 2023
  • This study classifies the types of urban railway stations that reflect the location characteristics of urban railway stations, the structure and form of station taxes, and the number of users, and the level of inconvenience in the transfer movement line for users by station type, the number and connectivity of transfer information, and the level of transfer convenience facilities. The number of installations, conflicts between users, and transfer information signs were analyzed. As a result of data analysis, it was found that the factors that cause the most inconvenience to urban rail users when transferring are the length and curvature of the transfer line, pedestrian density and number of passengers in the transfer passage, presence or absence of transportation convenience facilities, and the size and height of transfer information letters. These transfer inconveniences were objectified, quantified, and presented as evaluation indicators that can measure the transfer convenience of urban railway stations. Additionally, an evaluation scale was developed to measure the service level for each evaluation indicator. The evaluation scale for each indicator presented six levels by applying linear interpolation based on the maximum and minimum values of data derived through field surveys. However, it is judged that a comprehensive evaluation of transfer convenience that combines the importance and weight of each convenience evaluation indicator should be established through future research.

The Effects of Information Transfer of Personal Information Security Breaches (개인정보 유출의 정보전이 효과)

  • Park, Sang-Soo;Lee, Hyun-Chul
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.

Alternate path transfer mechanism on ATM switch (ATM 스위치에서의 여분 경로 전송 메커니즘)

  • 이주영;임인칠
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.8
    • /
    • pp.45-55
    • /
    • 1997
  • To design a ATM Switch which ahs advantages in high sped packet switching, it is essential to set multiple paths between input ports and output ports and to design a new packet transfer technique on that paths for decreasing Packet Loss by conflicts in internal Switch Plane. We propose new packet transfer method, Alternate Path Transfer Mechanism by Dynamic Bypass Transfer Method which can solve conflict problem in Banyan network easily. Proposed ATM Switch consists of Banyan networks, Input/Ouput Port, Bypass Link, and Bypass Link Controller. Packets caused conflicts in SEs have another chances of packet transfer over alternate switching planes by using this mechanism.

  • PDF