• Title/Summary/Keyword: Interactive exchange

Search Result 73, Processing Time 0.027 seconds

An Empirical Study on The Pattern of Interactive Learning in Strategic Networks (전략네트워크에서 발생하는 학습패턴에 관한 실증연구)

  • Jeong, Jong-Sik;Kim, Hyun-Jee
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.3-19
    • /
    • 2007
  • The purpose of this paper is to study the pattern of interactive learning in strategic networks. Interactive learning is defined as the exchange and sharing of knowledge resources conducive to innovation between an innovator firm, its suppliers, and/or its customers. The strength of internal knowledge resources can either hamper or facilitate levels of interactive learning. We assume that more complex innovative activities urge firms to co-ordinate and exchange information between users and producers, which implies a higher level of interactive learning. To test our theoretical claims, we estimated the level of interactive learning of firms in strategic networks with: (1) their customers, (2) their suppliers. Theses analyses allow a comparison of the antecedents of interactive learning of firms participating in strategic networks. Our findings suggest that interactive learning with customers is positively affected by company's capabilities and value-created activities, and with supplies is positively affected by value-created activities and technology innovation centers.

  • PDF

Certificateless Non-Interactive Key Exchange Protocol with Forward Secrecy (전방향 안전성을 만족하며 인증서 기반이 아닌 비대화형 키 교환 프로토콜)

  • Lee, Young Kyung;Eom, Ji Eun;Seo, Seung-Hyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.531-546
    • /
    • 2015
  • A non-interactive key exchange protocol provides an efficiency of overall system by eliminating additional communication. However, traditional non-interactive key exchange protocols without updating a private key fail to provide forward secrecy, since there is no usage of ephemeral key for randomness of session key. In 2012, Sang et al. proposed a certificateless non-interactive key exchange(CL-NIKE) protocol, but they do not prove the security of the protocol and it does not provide forward secrecy. In this paper, we propose a new CL-NIKE protocol and it's security model. Then we prove the proposed protocol is secure under the security model based on DBDH(Decision Bilinear Diffie-Hellman) assumption. Moreover, we propose a CL-NIKE protocol with forward secrecy which updates user's private key by using multilinear map and prove it's security.

Design and Implementation of Learning Contents Using Interactive Genetic Algorithms with Modified Mutation (변형된 돌연변이를 가진 대화형 유전자 알고리즘을 이용한 학습 콘텐츠의 설계 및 구현)

  • Kim Jung-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.85-92
    • /
    • 2005
  • In this Paper, we develope an effective web-based learning contents using interactive genetic algorithms with modified mutation operation. In the interactive genetic algorithm, reciprocal exchange mutation is used. But. we modify the mutation operator to improve the learning effects. The new web-based learning contents using interactive genetic algorithm provide the dynamic learning contents providing and real-time test system. Especially, learners can execute the interactive genetic algorithm according to the learners' characters and interests to select the efficient learning environments and contents sequences.

  • PDF

A research on non-interactive multi agents by ACS & Direction vector algorithm (ACS & 방향벡터 알고리즘을 이용한 비 대화형 멀티에이전트 전략에 관한 연구)

  • Kim, Hyun;Yoon, Seok-Hyun;Chung, Tae-Choong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.11-18
    • /
    • 2010
  • In this paper, We suggest new strategies on non-interactive agents applied in a prey pursuit problem of multi agent research. The structure of the prey pursuit problem by grid space(Four agent & one prey). That is allied agents captured over one prey. That problem has long been known in interactive, non-interactive of multi agent research. We trying hard to find its own solution from non-interactive agent method on not in the same original environment(circular environment). We used ACS applied Direction vector to learning and decide on a direction. Exchange of information between agents have been previously presented (an interactive agent) out of the way information exchange ratio (non-interactive agents), applied the new method. Can also solve the problem was to find a solution. This is quite distinct from the other existing multi agent studies, that doesn't apply interactive agents but independent agent to find a solution.

Virtuality in Digital Fashion Images (디지털 패션영상에 나타난 가상성 연구)

  • Kim, Hyang-Ja;Kim, Young-Sam
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.2
    • /
    • pp.233-246
    • /
    • 2015
  • Focus on Digital Fashion Image, the conceptual framework for the thesis is established from Virtuality in Digital Art. Formative characteristics and aesthetic characteristics were studied by classifying the Digital Fashion Image applied and expressed by digital media and technology. A detective research method was used for a case study. A literature study for case-by-case data was analyzed with focus on the works expressing fashion that utilized digital media and technology since the 2000s. Through this study, the Digital revolution has created the socio-cultural impact of a Virtual representation to implement technology and fashion culture that finds ways to take advantage of the image shown in a Digital Fashion Media by understanding Virtuality. The results are as follows. First, it was a re-formation of the fashion culture through the experience of virtuality with mental zone parameters between the media 'Mediation Code'. Reflect the reality of the virtual environment as represented by a cultural image of fashion brands and fashion that reset the team relationship and formed a Homo Ludens cultural code. Second, 'Interactive Exchange' acts on the exchange interaction between the method of digital technology, the human and the machine as well as the technical interoperability of network elements and techniques. This exchange is applied to fashion images that express emotion. Forming personalized fashion items and the user interactively storage that expresses the interactive exchange to forward the identity of the emotional fashion by a change in the message delivery system fashion. Third, the emphasis on intuitive artistic expression 'Synesthesia Immersion' induces a sense of immersion and excitement through the fusion of the interconnected. Enhance a visual image in fashion sensory representation and maximize a tactile and visual virtual reality involvement.

Magnetic Behaviors of Isolated Fe-Co-Ni Nanoparticles in a Random Arrangement

  • Yang, Choong Jin;Kim, Kyung Soo;Wu, Jianmin
    • Journal of Magnetics
    • /
    • v.6 no.3
    • /
    • pp.94-100
    • /
    • 2001
  • Fe-Co-Ni particles with an average size of 45 and 135 nm are characterized in terms of magnetic phase transformation and magnetic properties at room temperature. BCC structure of Fe-Co-Ni spherical particles can be synthesized from Fe-Co-Ni-Al-Cu precursor films by heating at 600-80$0^{\circ}C$ for the phase separation of Fe-Co rich Fe-Co-Ni particles, followed by a post heating at $600^{\circ}C$ for 5 hours. The average size of nanoparticles was directly determined by the thickness of precursor films. Exchange interactive hysteresis was observed for the nano-composite (Fe-Co-Ni)+(Fe-Ni-Al) films resulting from the short exchange interface between ferromagnetic Fe-Co-Ni particles surrounded by almost papramagnetic Ni-Al-Fe matrix. Arraying the isolated Fe-Co-Ni nano-particles in a random arrangement on $Al_2O_3$substrate the particle assembly showed a behavior of dipole interactive ferromagnetic clusters depending on their volume and inter-particle distance.

  • PDF

How to Exchange Secrets by OT (공평한 비밀정보 교환)

  • Yongju Yi;Young-Il Choi;Byung-Sun Lee
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.541-548
    • /
    • 2003
  • A fair exchange protocol enable two parties to exchange secrets with fairness, so that neither can gain any information advantage by quitting prematurely or otherwise misbehaving. Therefore a fair exchange is the most important for electronic transactions between untrusted parties. To design new fair exchange, after describing basic concepts, definitions and existing protocols and designing a non-interactive OT protocol using ELGamal's public key system, I will design new protocol to support fair exchange. In my designed new protocol, untrusted parties exchange secrets obliviously and verify that their received secrets are true by using transformed Zero Knowledge Interactive Proof extended to duplex. At this time, concerned two parties can't decrypt the other's ciphertext. .After all of the steps, two parties can do it. It is the most important to provide perfect fairness and anonymity to untrusted parties in this protocol.

A Secure Non-Interactive Transfer Protocol for the Exchange of Secret Information (비밀정보 교환을 위한 안전한 비대화형 전송 프로토콜)

  • 김순곤;박인규
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.280-286
    • /
    • 2000
  • 본 논문에서는 기존의 비대화형 전송 프로토콜을 기반으로 하여 비밀정보교환을 위한 여러 가지 부가기능을 가지는 새로운 비대화형 전송 프로토콜을 설계 제안한다. 제안한 방식은 기존의 프로토콜의 구조를 그대로 따르면서 Bit Commitment 기법을 적용한 형태로서 여러가지 안전한 기능을 가진다. 본 논문에서 제안한 기법은 서로 신뢰하지 못하는 두 당사자 사이에서 비밀 정보를 교환하고자 하는 분야에 있어서 보다 안전한 프로토콜로서 활용될 수 있다.

  • PDF

Secure Transmission for Interactive Three-Dimensional Visualization System

  • Yun, H.Y.;Yoo, Sun Kook
    • Journal of International Society for Simulation Surgery
    • /
    • v.4 no.1
    • /
    • pp.17-20
    • /
    • 2017
  • Purpose Interactive 3D visualization system through remote data transmission over heterogeneous network is growing due to the improvement of internet based real time streaming technology. Materials and Methods The current internet's IP layer has several weaknesses against IP spoofing or IP sniffing type of network attacks since it was developed for reliable packet exchange. In order to compensate the security issues with normal IP layer, we designed a remote medical visualization system, based on Virtual Private Network. Results Particularly in hospital, if there are many surgeons that need to receive the streaming information, too much load on the gateway can results in deficit of processing power and cause the delay. Conclusion End to end security through the network method would be required.

Impacts of the Real Effective Exchange Rate and the Government Deficit on Aggregate Output in Australia

  • Hsing, Yu
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.1
    • /
    • pp.19-23
    • /
    • 2017
  • Based on a simultaneous-equation model consisting of aggregate demand and short-run aggregate supply, this paper estimates a reduced-form equation specifying that the equilibrium real GDP is a function of the real effective exchange rate, the government deficit as a percent of GDP, the real interest rate, foreign income, labor productivity, the real oil price, the expected inflation rate, and the interactive and intercept binary variables accounting for a potential change in the slope of the real effective exchange rate and shift in the intercept. Applying the exponential GARCH technique, it finds that aggregate output in Australia has a positive relationship with the real effective exchange rate during 2003.Q3 - 2013.Q2, the government deficit as a percent of GDP, U.S. real GDP, labor productivity and the real oil price and a negative relationship with the real effective exchange rate during 2013.Q3 - 2016.Q1, the real lending rate and the expected inflation rate. These results suggest that real appreciation was expansionary before 2013.Q3 whereas real depreciation was expansionary after 2013.Q2 and that more government deficit as a percent of GDP would be helpful to stimulate the economy. Hence, the impact of real appreciation or real depreciation on real GDP may change overtime.