• 제목/요약/키워드: Key share

검색결과 443건 처리시간 0.025초

Inter-oraganisational Information Systems (IOIS) and Cybermediaries for Agriculture and Food Supply Chain

  • Rajaguru, Rajesh;Swar, Bobby
    • Agribusiness and Information Management
    • /
    • 제5권1호
    • /
    • pp.1-10
    • /
    • 2013
  • Competition in supply chain has moved from between being organizations to between supply chain. To enhance competitiveness in supply chain, there is a need for organisations to establish and manage collaborative relationships among supply chain partners and share operational and strategic information timely and accurately. As a result, food supply chain partners have adopted of inter organisational information systems (IOIS) such as EDI, IEDI, RFID, internet, and extranets to facilitate exchange of information, streamline production and to effectively manage inventory processes so as to deliver value to the customer. Together with IOIS, cybermediaries also plays a key role in facilitating agriculture and food supply chain. This paper investigates the role and significance of IOIS and cybermediaries in facilitating agriculture and food supply chain. Convergent interviewing was conducted with agriculture producers, food processors and retailers. The study identified logistics, supply chain and customer services benefits perceived from implementing IOIS and utilising cybermediaries services in the food supply chain. To conclude the conceptual paper outlined managerial implications and areas for future research.

  • PDF

식스 시그마 성공사례 (Successes in Six Sigma)

  • 홍성훈;김상부;권혁무;이민구
    • 품질경영학회지
    • /
    • 제27권3호
    • /
    • pp.202-208
    • /
    • 1999
  • A new campaign, known as "Six Sigma", to increase market share, decrease costs, and grow profit margins has been adopted by a selected group of leaders in American industry. Although the initial emphasis of Six Sigma was for quality improvement in manufacturing, it is rapidly being applied in key areas beyond manufacturing, and beyond what would traditionally be considered quality. There are a lot of Six Sigma success stories in companies such as Motorola, AlliedSignal, Asea Brown Boveri, and GE. The financial results of Six Sigma in those companies are investigated and their success factors are discussed. The applications of Six Sigma in Korean companies such as Samsung Display Device, Hanjung, and LG Electronics are also introduced.

  • PDF

플랫폼 비즈니스에서의 승자독식 현상에 영향을 미치는 서비스 특성 (Service Characteristics Leading to "Winner-takes-all" Phenomenon in Platform Business)

  • 전익진;안재현;김도훈
    • 경영과학
    • /
    • 제33권4호
    • /
    • pp.33-49
    • /
    • 2016
  • The market of platform business is typically served by a few dominant players, presenting "winner-takes-all" phenomenon. This study aims to find service characteristics leading to the phenomenon. Six different service-characteristics were considered : Same-side network effect, cross-side network effects, entry barrier, multi-homing cost, switching cost, and heterogeneity of preference. To assess the degree of concentration of market share, HHI (Herfindahl-Hirschman Index) is calculated for top three major players. Based on the HHI value, 10 most eminent platform businesses are classified into three different segments and each segment is characterized with key factors. The results from this study provide some insight into the strategic management of platform business.

오디오 e-Book 스트리밍을 지원하는 스테가노그래피 모델 (Secure Steganographic Model for Audio e-Book Streaming Service)

  • 이윤정;이봉규;김철수
    • 한국산학기술학회논문지
    • /
    • 제12권12호
    • /
    • pp.5878-5884
    • /
    • 2011
  • 본 논문은 오디오 e-Book 스트리밍 콘텐츠에 저작권과 인증과 관련되는 비밀 데이터를 인코딩하고 추출할 수 있도록, 스트리밍 서비스 특성에 적합한 스테가노그래피 서비스 모델과 알고리즘을 제안한다. 은닉 데이터는 송신측과 수신측에서 공유하는 비밀키 k를 사용하여 생성한 의사난수로 암호화하여 안전도를 높였다. 또한 은닉데이터가 커버데이터의 초반 일정구간 안에 랜덤하게 고루 분포하도록 하였고, 스트리밍의 상황을 고려하여 기타의 연산을 단순화하여 처리율을 높였다.

Interference-limited Resource Allocation in Cognitive Radio Networks with Primary User Protection.

  • Mui, Nguyen Van;Hong, Choong-Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2011년도 한국컴퓨터종합학술대회논문집 Vol.38 No.1(A)
    • /
    • pp.352-354
    • /
    • 2011
  • The performance of multihop cognitive radio networks (CRN) can be improved significantly by using multiple channels in spectrum underlay fashion. However, interference due to the sharing of common radio channel and congestion due to the contention among those flows that share the same links become an obstacle to meet this challenge. How to control efficiently congestion and allocate power optimally to obtain a high end-to-end throughput is a key objective in this work. We reexamined the Network Utility Maximum (NUM) problem with a new primary outage constraint and proposed a novel resource allocation strategy to solve it effectively and efficiently.

An Improved Shared-Path Protection Algorithm for Double-Link Failures in Meshed WDM Optical Networks

  • Wang, Xingwei;Guo, Lei;Li, Lemin;Wei, Xuetao
    • Journal of Communications and Networks
    • /
    • 제10권3호
    • /
    • pp.331-337
    • /
    • 2008
  • In this paper, we investigate survivability in wavelength division multiplexing (WDM) mesh networks and propose a new algorithm called improved shared-path protection (ISPP) to completely tolerate the double-link failures. Compared with previous algorithms for protecting double-link failures, i.e., shared-path protection (SPP) and shared-link protection (SLP), the advantage of ISPP is to allow primary paths and backup paths to share the mixed wavelength-links based on the proposed new rules in which some primary wavelength-links can be changed to mixed wavelength-links, which can be shared by primary paths and backup paths. In addition, some mixed wavelength-links also can be shared by different backup paths for saving resources. Simulation results show that ISPP algorithm performs better in resource utilization ratio and blocking probability than conventional SPP and SLP algorithms.

전자결제에 관한 연구 - 위험분석과 신뢰성확보방안을 중심으로 - (A Study on the Electronic Payment - Laying Stress on the Risk Analysis and Reliability-)

  • 최석범
    • 한국중재학회지:중재연구
    • /
    • 제9권1호
    • /
    • pp.323-365
    • /
    • 1999
  • The digital revolution is happening much more quickly and Internet Commerce and Electronic Commerce is having a profound influence on the global trade and internal commerce, revolutionize the way of doing business, especially retail and direct marketing. Owing to Internet, an increasing share of business transactions occurs online. Electronic payment is essential for the smooth progress of the electronic commerce as electronic payment plays the important role in the electronic commerce, that is, the value transfer resulting from the electronic commerce. So far, there have not been a considerable emphasis on the risks residing in the electronic payment and money. So, this paper deals with the risks in the electronic payment and money, in particular technical risks and social risks, and the reliability-increasing schemes to prevent the risks in the electronic payment. The reliability-increasing schemes relate to the security of the electronic payment systems and certification authority and key management, transaction rules between the parties concerned in the electronic payment.

  • PDF

시뮬레이션 기반 육군전술지휘정보체계 웜 피해평가에 관한 연구 (A Study on Simulation-Based Worm Damage Assessment on ATCIS)

  • 김기환;김완주;이수진
    • 한국군사과학기술학회지
    • /
    • 제11권1호
    • /
    • pp.43-50
    • /
    • 2008
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. But, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

Towards Scalable and Cost-efficient Software-Defined 5G Core Network

  • 박종한;최창순;정상수;나민수;조성호
    • 정보와 통신
    • /
    • 제33권6호
    • /
    • pp.18-26
    • /
    • 2016
  • Network and network functions virtualization (NFV) promise a number of attractive benefits and thus have driven mobile network operators to transform their previously static networks to more dynamic and software-defined networks. In this article, we share a mobile network operator's view based on implementation and deployment experiences in the wild during the past few years towards a software-defined 5G core network. More specifically, we present a practical point of view from mobile network operators and elaborate on why some of the virtualization benefits such as total cost of ownership (TCO) reduction are not easily realized as initially intended. Then, we describe 5G visions, services, and their requirements commonly agreed across mobile operators globally. Given the requirements, we then introduce desirable characteristics of 5G mobile core network and its key enabling technologies.

개념 네트워크를 이용한 정보 검색 방법 (Document Retrieval using Concept Network)

  • 허원창;이상진
    • Asia pacific journal of information systems
    • /
    • 제16권4호
    • /
    • pp.203-215
    • /
    • 2006
  • The advent of KM(knowledge management) concept have led many organizations to seek an effective way to make use of their knowledge. But the absence of right tools for systematic handling of unstructured information makes it difficult to automatically retrieve and share relevant information that exactly meet user's needs. we propose a systematic method to enable content-based information retrieval from corpus of unstructured documents. In our method, a document is represented by using several key terms which are automatically selected based on their quantitative relevancy to the document. Basically, the relevancy is calculated by using a traditional TFIDF measure that are widely accepted in the related research, but to improve effectiveness of the measure, we exploited 'concept network' that represents term-term relationships. In particular, in constructing the concept network, we have also considered relative position of terms occurring in a document. A prototype system for experiment has been implemented. The experiment result shows that our approach can have higher performance over the conventional TFIDF method.