• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.024 seconds

Consumer Impairment and Its Improvement on Longterm Care Insurance Service : Focused on the Current Conditions and the Analysis of Counseling Cases in Korea and Japan (노인장기요양보험 서비스에 관한 소비자피해와 개선방안 : 한일 서비스이용현황 및 상담사례 분석을 중심으로)

  • Lee, Hyun-Jin
    • Journal of Families and Better Life
    • /
    • v.28 no.1
    • /
    • pp.51-67
    • /
    • 2010
  • This study looked into the current conditions in Korean and Japanese care management for the elderly, cases of consumer counseling in these countries, and the supporting institutions for Japanese users regarding the use of care management for the elderly. The number of recipients of care management for the elderly in both Korea and Japan is growing every year, and more Japanese users receive various services compared to Korean users. The results of an analysis on consumer counseling regarding the use of Korean and Japanese care management revealed, two types of complaints: counseling for the improvement of the institution and complaints related to the procurement of service. Regarding the insurance system, the complaints were mostly related to affirmation of a rating and the burden incurred by cost-sharing. Regarding the use of service, such key impairment cases were related to in-service medical accidents, illegal acts including caregiver contract violations and forced retirement, careless service by workers, and human rights violations of the elderly. Japan has developed governmental and, related-administrative and business services as well as a local governmental system to redress customer impairment issues as this pertains to service for better quality care management. In addition, they have enlarged the locally closed service, provided exact information about the services offered, and improved service appraisal techniques. The Japanese cases will serve as a good reference to improve the Korean system. In particular, the construction of a system that reduces customer losses and the availability of more counseling information are urgently required to improve the system in terms of customer experiences when they seek care management.

Economic application of structural health monitoring and internet of things in efficiency of building information modeling

  • Cao, Yan;Miraba, Sepideh;Rafiei, Shervin;Ghabussi, Aria;Bokaei, Fateme;Baharom, Shahrizan;Haramipour, Pedram;Assilzadeh, Hamid
    • Smart Structures and Systems
    • /
    • v.26 no.5
    • /
    • pp.559-573
    • /
    • 2020
  • One of the powerful data management tools is Building Information Modeling (BIM) which operates through obtaining, recalling, sharing, sorting and sorting data and supplying a digital environment of them. Employing SHM, a BIM in monitoring systems, would be an efficient method to address their data management problems and consequently optimize the economic aspects of buildings. The recording of SHM data is an effective way for engineers, facility managers and owners which make the BIM dynamic through the provision of updated information regarding the occurring state and health of different sections of the building. On the other hand, digital transformation is a continuous challenge in construction. In a cloud-based BIM platform, environmental and localization data are integrated which shape the Internet-of-Things (IoT) method. In order to improve work productivity, living comfort, and entertainment, the IoT has been growingly utilized in several products (such as wearables, smart homes). However, investigations confronting the integration of these two technologies (BIM and IoT) remain inadequate and solely focus upon the automatic transmission of sensor information to BIM models. Therefore, in this composition, the use of BIM based on SHM and IOT is reviewed and the economic application is considered.

Study on the Key of Relationship Between Labor-Management Cooperation (협력 상생을 위한 노사문화 형성 요인 연구)

  • Bae, Jeong-Hwan;Choi, Ho-Taek
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.299-307
    • /
    • 2012
  • This study aims to look into factors which exert an important effect on the formation of cooperative employer-employee management systems of enterprises and finally to suggest an alternative for establishing the future's union-management relations. To accomplish the purpose, this research find each of important factors of the formation of cooperative employer-employee management systems through a theoretical consideration of those factors. The importance and priority order of the factors were systematized by the AHP analysis. The analysis showed the following two things. First of all, the management expecting the employees should be strengthened. Then, the establishment of transparent management and union-management systems sharing the enterprise's vision and values play important roles in the formation cooperative employer-employee management systems. In conclusion, this study provided alternative for establishing the future's union-management relations, based on the analysis results.

A Case Study on Determinants of e-SCM Performances (e-SCM의 성과에 영향을 미치는 요인에 관한 사례 연구)

  • Kim, Do-Heon;Kim, Sang-Deok
    • Journal of Distribution Science
    • /
    • v.6 no.2
    • /
    • pp.21-39
    • /
    • 2008
  • This paper is a case study on determinants of e-SCM performances. It suggested effective factors related with e-SCM performances for common feature, and point of difference between case firms. So the paper investigated former literature. Then it derived determinants on e-SCM performances. The authors found that establishment of e-SCM project team, mind change of top management, sharing of information, establishment of exact demand and supply plan, the best use of information technology, scale of organization, and collaboration of between firms are key success factors of e-SCM. Case company were three companies. The paper chose SONY, and Samsung Electronics among electronic companies, and HAITAI among confectionary companies. It analyze three companies about common feature, and point of difference, regarding seven effective factors as mentioned above.

  • PDF

A Review of Studies on Knowledge Ecosystem (지식생태계 연구 경향, 한계 그리고 제언)

  • Yu, Jae Mi;Oh, Cheol H.
    • Informatization Policy
    • /
    • v.18 no.4
    • /
    • pp.3-21
    • /
    • 2011
  • Knowledge ecosystem means a dynamic knowledge circulation, including knowledge creation, exchange and sharing and utilization. It is also the field of knowledge practice, which creates interactions in knowledge exchange between people and groups. The key premises of knowledge ecosystem, based on the nature of general ecosystems, can be characterized as follows: first, it primarily focuses on social networks between people and organizations participating in the process of knowledge circulation; secondly, knowledge ecosystem thrives on diversity of knowledge; and thirdly, it is significant for selection of valuable knowledge and adoption of appropriate knowledge. This review attempts to make a systematic examination of a wide range of existing studies on knowledge ecosystem. In so doing, it is expected to provide a basis for further inquiry into more critical and complicated issues. Although the scarcity of existing research-at least those in Korea-may limit the implications of findings, this review offers a set of suggestions for future research.

  • PDF

Implementation and Evaluation of IoT Service System for Security Enhancement (보안성 향상을 위한 IoT 서비스 시스템 구현 및 평가)

  • Kim, Jin-bo;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.181-192
    • /
    • 2017
  • Internet of Things includes the whole process of collected information generated from a variety of objects, as well as analyzing and sharing it, and providing useful information services to people. This study seeks ways to improve security and safety in the areas of service security technology, ID management technology and service access control, all of which take place in the IoT environment. We have implemented the services that can design and issue C&C (Certificate and Capability) service token authentication, which is based on a public key, to improve the service security. In addition, we suggest LCRS (Left Child-Right Sibling) resource model management for the efficient control of resources when generating the resource services from the data collected from node devices. We also implemented an IoT services platform to manage URL security of the resource services and perform access control for services.

Application Behavior-oriented Adaptive Remote Access Cache in Ring based NUMA System (링 구조 NUMA 시스템에서 적응형 다중 그레인 원격 캐쉬 설계)

  • 곽종욱;장성태;전주식
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.9
    • /
    • pp.461-476
    • /
    • 2003
  • Due to the implementation ease and alleviation of memory bottleneck effect, NUMA architecture has dominated in the multiprocessor systems for the past several years. However, because the NUMA system distributes memory in each node, frequent remote memory access is a key factor of performance degradation. Therefore, efficient design of RAC(Remote Access Cache) in NUMA system is critical for performance improvement. In this paper, we suggest Multi-Grain RAC which can adaptively control the RAC line size, with respect to each application behavior Then we simulate NUMA system with multi-grain RAC using MINT, event-driven memory hierarchy simulator. and analyze the performance results. At first, with profile-based determination method, we verify the optimal RAC line size for each application and, then, we compare and analyze the performance differences among NUMA systems with normal RAC, with optimal line size RAC, and with multi-grain RAC. The simulation shows that the worst case can be always avoided and results are very close to optimal case with any combination of application and RAC format.

An HEVC intra encoder sharing DCT with RDO for a low complex hardware (하드웨어 복잡도를 줄이기 위한 RDO내 DCT 공유구조의 HEVC 화면내 예측부호화기)

  • Lee, Sukho;Jang, Juneyoung;Byun, Kyungjun;Eum, Nakwoong
    • Smart Media Journal
    • /
    • v.3 no.4
    • /
    • pp.16-21
    • /
    • 2014
  • HEVC is the latest joint video coding standard with ITU-T SG16 WP and ISO/IEC JTC1/SC29/WG11. Its coding efficiency is about two times compared to H.264 high profile. Intra prediction has 35 directional modes including dc and planer. However an accurate mode decision on lots of modes with SSE is too costly to implement it with hardware. The key idea of this paper is a DCT shared architecture to reduce the complexity of HEVC intra encoder. It is to use same DCT block to quantize as well as to calculate SSE in RDO. The proposed intra encoder uses two step mode decision to lighten complexity with simplified RDO blocks and shares the transform resources. Its BD-rate increase is negligible at 20% on hardware aspect and the operating clock frequency is 300MHz@60fps on FHD ($1920{\times}1080$) image.

Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks

  • Lin, Chow-Sing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.491-508
    • /
    • 2010
  • In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable clients to watch videos from beginning to end. As long as clients are able to buffer the initial part of the video they are watching, on-demand service can provide access to the video to the next clients who request to watch it. Therefore, the key challenge is how to keep the initial part of a video in a peer's buffer for as long as possible, and thus maximize the availability of a video for stream relay. In addition, to address the issues of delivering data on lossy network and providing scalable quality of services for clients, the adoption of multiple description coding (MDC) has been proven as a feasible resolution by much research work. In this paper, we propose a novel caching scheme for P2P on-demand streaming, called Dynamic Buffering. The proposed Dynamic Buffering relies on the feature of MDC to gradually reduce the number of cached descriptions held in a client's buffers, once the buffer is full. Preserving as many initial parts of descriptions in the buffer as possible, instead of losing them all at one time, effectively extends peers’ service time. In addition, this study proposes a description distribution balancing scheme to further improve the use of resources. Simulation experiments show that Dynamic Buffering can make efficient use of cache space, reduce server bandwidth consumption, and increase the number of peers being served.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.