• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.026 seconds

Key Success Factors for Collaborative Technology Development Projects: The Case of Small & Medium Firms in the Korean Electronics Parts Industry (공동기술개발 프로젝트의 성패요인: 우리나라 전자부품 중소기업 분석)

  • 이광희;김영배
    • Journal of Technology Innovation
    • /
    • v.6 no.2
    • /
    • pp.122-158
    • /
    • 1998
  • This study empirically examined different patterns of collaborative R&D project with their key success factors(KSFs), using data from 82 projects in the Korean electronic parts industry. The patterns of R&D collaboration were categorized into 4 types by two criteria development motive(technology Push/market pull) and Project initiator (focal firm/partner). The bivariate relationships revealed that project characteristics (technological complexity, market uncertainty), management characteristics (participation in project formulation), problem solving characteristics(problem solving performance of the focal firm, users active role in problem solving, active role of university or research institute in problem solving) and success rates appear to be different among four types of collaboration. Each type of collaborative R&D projects also had different KSFs. The KSFs of type 1 (technology Push and focal firm initiation), for instance, include the strategic importance of the project, focal firms share of cost, active role of university or research institute in problem solving, while those of type 4(market pull and customer initiation) cover reliability of partner relationship, a time at partners involvement, information sharing. The findings suggest that the different contingencies brought different patterns and KSFs of collaborative R&D project, since different information, resources, and partners roles were needed to successfully implement the projects according to development motive and project initiator Finally, managerial, policy, and theoretical implications for the collaborative R&D activities in the Korean electronics parts industry were discussed, based on empirical results of this study.

  • PDF

The Commercialization of Academic Research in the Context of Shifting Intellectual Property Regimes in the Twentieth Century (20세기 대학연구의 상업화와 지적재산권 제도의 변화)

  • Yi, Doogab
    • Korean Journal of Environmental Biology
    • /
    • v.32 no.4
    • /
    • pp.403-412
    • /
    • 2014
  • This article chronicles key shifts in intellectual property regimes in the twentieth century as they related to the commercialization of academic research. The institutionalization and growth of scientific research in the research university in the twentieth century and the increasing awareness of its potential to promote technology innovation and economic growth posited an important question of the ownership of knowledge created in the academic setting, where knowledge was traditionally regarded as a common property among academic researchers. This paper shows the ownership of academic knowledge emerged as a key public policy and legal issue in the latter half of the twentieth century for academic researchers and government officials who pursue the commercialization of academic knowledge for private gain and public benefit. The resulting institutionalization of patent management in the research university and shifts in federal patent policy in turn opened a new legal avenue for the establishment of the private ownership of academic knowledge and the expansion of intellectual property rights in academia, especially in the area of biological and biomedical research. Reflecting upon historical shifts in intellectual property regimes in the twentieth century, this paper suggests recent controversies regarding ownership of biological knowledge and profit sharing in developing counties are linked to critical issues pertinent to the welfare of indigenous population, utilization of new natural resources, and sustainable development for humanity.

A Study on a Diffusion Mechanism for the Knowledge-based Service Industry in Later-comer Countries: The Case of ASYCUDA (지식집약서비스산업의 저개발국 확산 메커니즘 연구)

  • Kim, Jun-Youn;Lim, Hyung-Kyu
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.127-130
    • /
    • 2008
  • Recently, a wide variety of research on the knowledge-based industries, which are considered a key area of social science research, has been conducted. In this light, this study examines a case of knowledge diffusion taken from the IT service field. The IT service industry has been considered difficult to diffuse due to its unique technological regimes and sophisticated market demand. In particular, the established public service systems have limited markets and encompass national characteristics, thereby making their international diffusion difficult. However, despite these limitations, the automated customs system ASYCUDA has been distributed successfully and is now operating in about 100 countries, making the case very unusual. Using various industrial innovation models, and an analysis of lead markets, with regard to ASYCUDA, this research examines patterns of technological learning activities by actors, characteristics of the lead markets, and paths of technology transfer. The findings indicate that when active technology providers attempt to streamline and standardize the technology to make it suitable for the characteristics of the initial technology application areas(lead markets), this helps to diffuse the technology to passive recipients and the surrounding nations. The findings also confirm that south-south cooperation in the acquired technologies was of considerable help in sharing knowledge among the passive technology recipients, and that the active technology providers' programmed, well-organized technology assistance was a key driving force behind technology transfer and diffusion between the surrounding nations.

  • PDF

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

Analysis of Smart City Core Technology Using Quantitative Indicators of Patentes (특허의 정량적 지표를 활용한 스마트시티 주요기술 분석)

  • Kwon, Won Jin;Lee, Jung Hoon;Lee, Nam Jung
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.4
    • /
    • pp.79-101
    • /
    • 2021
  • The purpose of this research is to define detailed technologies of smart city based on excellent patents through patent analysis related to major technologies of smart city, and to use quantitative indicators to classify relatively high technology importance and identify related technologies. To achieve the purpose of the study, patent collection is conducted by reflecting literature research and expert opinions based on information related to the smart city Internet of Things/Internet of Things communication core technology. Also, DEA were used to determine the relatively high technology. The inputs and outputs used in the study used quantitative indicators to determine technical value and made up of impact assessment, performance assessment and value assessment. As a result of the analysis, various technology groups were classified into smart city-related platform technologies, information sharing technologies, and network-related technologies, and based on the results of this research, it is expected that it will be able to apply technology patents related to smart cities to research and development strategies through key detailed technologies by major technologies of Smart City.

An Efficient Hardware Implementation of Block Cipher Algorithm LEA (블록암호 알고리듬 LEA의 효율적인 하드웨어 구현)

  • Sung, Mi-ji;Park, Jang-nyeong;Shin, Kyung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.777-779
    • /
    • 2014
  • The LEA(Lightweight Encryption Algorithm) is a 128-bit high-speed/lightweight block cipher algorithm developed by National Security Research Institute(NSRI) in 2012. The LEA encrypts plain text of 128-bit using cipher key of 128/192/256-bit, and produces cipher text of 128-bit, and vice versa. To reduce hardware complexity, we propose an efficient architecture which shares hardware resources for encryption and decryption in round transformation block. Hardware sharing technique for key scheduler was also devised to achieve area-efficient and low-power implementation. The designed LEA cryptographic processor was verified by using FPGA implementation.

  • PDF

Performance Improvement Strategy for Parallel-operated Virtual Synchronous Generators in Microgrids

  • Zhang, Hui;Zhang, Ruixue;Sun, Kai;Feng, Wei
    • Journal of Power Electronics
    • /
    • v.19 no.2
    • /
    • pp.580-590
    • /
    • 2019
  • The concept of virtual synchronous generators (VSGs) is a valuable means for improving the frequency stability of microgrids (MGs). However, a great virtual inertia in a VSG's controller may cause power oscillation, thereby deteriorating system stability. In this study, a small-signal model of an MG with two paralleled VSGs is established, and a control strategy for maintaining a constant inertial time with an increasing active-frequency droop coefficient (m) is proposed on the basis of a root locus analysis. The power oscillation is suppressed by adjusting virtual synchronous reactance, damping coefficient, and load frequency coefficient under the same inertial time constant. In addition, the dynamic load distribution is sensitive to the controller parameters, especially under the parallel operation of VSGs with different capacities. Therefore, an active power increment method is introduced to improve the precision of active power sharing in dynamic response. Simulation and experimental is used to verify the theoretical analysis findings.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

  • Yixiang Fang;Kai Tu;Kai Wu;Yi Peng;Yunqing Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.471-485
    • /
    • 2023
  • As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the private message. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.

Perception of Local Community on Forest Partnership in Indonesia: Expectation and Challenges - A Case of Forest Partnership between Forest Management Unit and local community in Lombok - (인도네시아의 산림 파트너십에 대한 지역주민의 인식: 기대와 도전 - 롬복 산림 파트너십 사례를 중심으로 -)

  • Bae, Jae Soo
    • Journal of Korean Society of Forest Science
    • /
    • v.105 no.3
    • /
    • pp.366-376
    • /
    • 2016
  • The "Forest Partnership" mechanism in Indonesia allows those with authority to manage forests, including Forest Management Units (KPH) and concession holders, to partner with local communities for forest management and profit sharing. The objective of this study is to identify the challenges that this new mechanism is facing and develop practical policy recommendations for its successful implementation. "Lombok Forest Partnership" is the first of its kind in Indonesia between Forest Management Unit (KPH) and a local community. The local community members participating in this partnership were surveyed for their expected outcomes, degree of their satisfaction about the process and profits sharing, as well as other factors affecting their participation. Respondents reported that they have obtained the information on Forest Partnership completely from KPH and NGO. Local peoples participated in Lombok Forest Partnership to improve their incomes, and recognized timber production as the most important income source with high possibility of success. However, timber production will require sizable initial capital investment for establishing nursery and other supporting activities, which cannot come from local communities lacking economic means. Thus, Forest Partnership would be difficult to succeed if KPH does not take the initiative to permit and promote local community to use special area and generate profits in their jurisdiction. KPH, in turn, can share the profits with local peoples. In this regard, KPH's leadership is the key factor in the success of Forest Partnership. However, KPH will need to cultivate their capacity to develop and implement income-generating business with local community. Although profit sharing ratio of timber and non-timber forest products among local community who participated in Lombok Forest Partnership was very high at 75%, and 90%, the level of satisfaction on profit sharing ratio was only average. The cooperative organized by the local community is also dealing with sensitive nature of allocating forest area internally among their members. Thus, keeping the principle of fairness, equity and transparency is the key for successful implementation of Forest Partnership mechanism. This first case of Forest Partnership can serve as a model for the future cases and provide the early lessons.