• Title/Summary/Keyword: Key sharing

Search Result 615, Processing Time 0.025 seconds

A Study on Obstacles and Promotion of Faculty Technology Entrepreneurship (교수 기술창업 장애요인 및 활성화 방안에 관한 연구)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.81-88
    • /
    • 2019
  • This study suggests the ways to promote the technology startups founded by professor, who differs from student or researcher in social status, risk-taking tendency, and motivation. Literatures were reviewed to understand the advantage of faculty's tech start-up, foreign cases, and related researches. In addition, key stakeholders were interviewed. The study shows that domestic faculty entrepreneurship is currently in infant stage while facing obstacles in institutional, financial and practical aspects. In order to promote faculty entrepreneurship, the study suggests that university and professor set up the benefit sharing structure in advance, that the public sector establishes a holding company or investment fund dedicated to support a faculty startup, that proactive effort be made to attract passive professors to the startup world, and that private companies join faculty startups in the process of concept proofing and product commercialization. The study is expected to provide government, university, and industry with practical implication in promoting faculty startup.

A Study on the Research Trend in the Dyslexia and Learning Disability Trough a Keyword Network Analysis (키워드 네트워크 분석을 통한 난독증과 학습장애 관련 연구 동향 분석)

  • Lee, Woo-Jin;Kim, Tae-Gang
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.91-98
    • /
    • 2019
  • The present study was performed to investigate the general research trends of dyslexia and learning disability to explore the centrality of related variables though analysis of keyword networks. Data were collected from ten years articles research information sharing service(RISS) which is provided by korea education and research information service(KERIS). The research subjects selected for the analysis were keyword cleansing work, extraction major keyword using KrKwic program and using NodeXL program to Visualize the center of connection between keyword. The results of this were as follows. First, totally 72 of keyword were extracted from keyword cleansing process and among those keyword. major keywords included learning disability, dyslexia, RTI. Second, analysis of the betweenness centrality of dyslexia and learing disabilities shows that learning disabilities are a key word that has been addressed in the study of dyslexia and learning disabilities in korea. The results of these studies suggest a method of analyzing trends in qualitative and qualitative analysis in relation to dyslexia and learning disorder.

Implementation of Ring Topology Interconnection Network with PCIe Non-Transparent Bridge Interface (PCIe Non-Transparent Bridge 인터페이스 기반 링 네트워크 인터커넥트 시스템 구현)

  • Kim, Sang-Gyum;Lee, Yang-Woo;Lim, Seung-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.3
    • /
    • pp.65-72
    • /
    • 2019
  • HPC(High Performance Computing) is the computing system that connects a number of computing nodes with high performance interconnect network. In the HPC, interconnect network technology is one of the key player to make high performance systems, and mainly, Infiniband or Ethernet are used for interconnect network technology. Nowadays, PCIe interface is main interface within computer system in that host CPU connects high performance peripheral devices through PCIe bridge interface. For connecting between two computing nodes, PCIe Non-Transparent Bridge(NTB) standard can be used, however it basically connects only two hosts with its original standards. To give cost-effective interconnect network interface with PCIe technology, we develop a prototype of interconnect network system with PCIe NTB. In the prototyped system, computing nodes are connected to each other via PCIe NTB interface constructing switchless interconnect network such as ring network. Also, we have implemented prototyped data sharing mechanism on the prototyped interconnect network system. The designed PCIe NTB-based interconnect network system is cost-effective as well as it provides competitive data transferring bandwidth within the interconnect network.

Asia and Europe: So Distant So Close? The Case of Lipoptena fortisetosa in Italy

  • Andreani, Annalisa;Giangaspero, Annunziata;Marangi, Marianna;Barlaam, Alessandra;Ponzetta, Maria Paola;Roy, Lise;Belcari, Antonio;Sacchetti, Patrizia
    • Parasites, Hosts and Diseases
    • /
    • v.58 no.6
    • /
    • pp.661-668
    • /
    • 2020
  • In Europe, 5 Lipoptena species have been recorded, including Lipoptena fortisetosa. This species, native to Asian countries, was described as a parasite of sika deer and its appearance in Europe dates back to more than 50 years ago. Lipoptena fortisetosa has been recently reported in Italy, sharing its hosts with Lipoptena cervi. A morpho-molecular approach was developed to determine the phylogenetic interrelationship of Italian and Asian CO1 haplotypes sequenced from Lipoptena fly individuals collected in Italy, and their DNA sequences were compared with conspecifics available in GenBank; morphological key-characters (terminalia) of L. fortisetosa were compared with the original description. Two haplotypes were recorded from Italy and assigned to L. cervi and L. fortisetosa, respectively. The latter was part of the monophyletic clade L. fortisetosa, along with 2 Central European and 2 Korean haplotypes (100% identical to one of the Korean haplotypes); moreover, Italian L. fortisetosa female terminalia were consistent with the original description of Asian individuals. Pending more in-depth investigations, this study provides a first answer to the hypothesis of the recent colonization of Italy by L. fortisetosa from Asia as we did not detect any obvious and stable morphological and molecular differences in specimens from the 2 geographical areas. The presence of the sika deer in Europe was retraced and the possible route traveled by the parasite from Asia and the eco-biological factors that may have enhanced its settlement are discussed.

Resource Allocation for Heterogeneous Service in Green Mobile Edge Networks Using Deep Reinforcement Learning

  • Sun, Si-yuan;Zheng, Ying;Zhou, Jun-hua;Weng, Jiu-xing;Wei, Yi-fei;Wang, Xiao-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2496-2512
    • /
    • 2021
  • The requirements for powerful computing capability, high capacity, low latency and low energy consumption of emerging services, pose severe challenges to the fifth-generation (5G) network. As a promising paradigm, mobile edge networks can provide services in proximity to users by deploying computing components and cache at the edge, which can effectively decrease service delay. However, the coexistence of heterogeneous services and the sharing of limited resources lead to the competition between various services for multiple resources. This paper considers two typical heterogeneous services: computing services and content delivery services, in order to properly configure resources, it is crucial to develop an effective offloading and caching strategies. Considering the high energy consumption of 5G base stations, this paper considers the hybrid energy supply model of traditional power grid and green energy. Therefore, it is necessary to design a reasonable association mechanism which can allocate more service load to base stations rich in green energy to improve the utilization of green energy. This paper formed the joint optimization problem of computing offloading, caching and resource allocation for heterogeneous services with the objective of minimizing the on-grid power consumption under the constraints of limited resources and QoS guarantee. Since the joint optimization problem is a mixed integer nonlinear programming problem that is impossible to solve, this paper uses deep reinforcement learning method to learn the optimal strategy through a lot of training. Extensive simulation experiments show that compared with other schemes, the proposed scheme can allocate resources to heterogeneous service according to the green energy distribution which can effectively reduce the traditional energy consumption.

Fixing Security Flaws of URSA Ad hoc Signature Scheme (URSA 애드혹 서명 알고리즘의 오류 수정)

  • Yi, Jeong-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.131-136
    • /
    • 2007
  • Ad hoc networks enable efficient resource aggregation in decentralized manner, and are inherently scalable and fault-tolerant since they do not depend on any centralized authority. However, lack of a centralized authority prompts many security-related challenges. Moreover, the dynamic topology change in which network nodes frequently join and leave adds a further complication in designing effective and efficient security mechanism. Security services for ad hoc networks need to be provided in a scalable and fault-tolerant manner while allowing for membership change of network nodes. In this paper, we investigate distributed certification mechanisms using a threshold cryptography in a way that the functions of a CA(Certification Authority) are distributed into the network nodes themselves and certain number of nodes jointly issue public key certificates to future joining nodes. In the process, we summarize one interesting report [5] in which the recently proposed RSA-based ad hoc signature scheme, called URSA, contains unfortunate yet serious security flaws. We then propose new scheme by fixing their security flaws.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Construction of an Asymmetric Traitor Tracing Schemes with Anonymity (익명성을 보장하는 비대칭 공모자 추적 기법의 설계)

  • Lee, Moonsik;Kang, SunBu;Lee, Juhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1231-1242
    • /
    • 2012
  • Traitor tracing schemes deter traitors from sharing their private keys by tracing at least one of the subscribers who were implicated in the construction of a pirate decoder. In general, it is assumed that the system manager in the scheme generates and distributes the subscribers' private key. But if the system manager knows the subscribers' private keys, he cannot convince a third party of a certain subscriber's piracy. To solve this problem, the system manager should not know the whole parts of subscribers' private keys and this leads to researches of asymmetric schemes. Moreover for the purpose of enhancing subscribers' privacy, there were two proposals of introducing anonymity onto asymmetric traitor tracing schemes, but one of them turned out to be a failure. In this paper, we point out that the other proposal also has flaws. We consider how to introduce anonymity to traitor tracing schemes, as a result, we suggest a new framework which is practical. We also construct a scheme by using an anonymous credential system and an asymmetric traitor tracing scheme. We prove the security of our scheme and consider the typical applications.

A Study on the Perception of Fashion Platforms and Fashion Smart Factories using Big Data Analysis (빅데이터 분석을 이용한 패션 플랫폼과 패션 스마트 팩토리에 대한 인식 연구)

  • Song, Eun-young
    • Fashion & Textile Research Journal
    • /
    • v.23 no.6
    • /
    • pp.799-809
    • /
    • 2021
  • This study aimed to grasp the perceptions and trends in fashion platforms and fashion smart factories using big data analysis. As a research method, big data analysis, fashion platform, and smart factory were identified through literature and prior studies, and text mining analysis and network analysis were performed after collecting text from the web environment between April 2019 and April 2021. After data purification with Textom, the words of fashion platform (1,0591 pieces) and fashion smart factory (9750 pieces) were used for analysis. Key words were derived, the frequency of appearance was calculated, and the results were visualized in word cloud and N-gram. The top 70 words by frequency of appearance were used to generate a matrix, structural equivalence analysis was performed, and the results were displayed using network visualization and dendrograms. The collected data revealed that smart factory had high social issues, but consumer interest and academic research were insufficient, and the amount and frequency of related words on the fashion platform were both high. As a result of structural equalization analysis, it was found that fashion platforms with strong connectivity between clusters are creating new competitiveness with service platforms that add sharing, manufacturing, and curation functions, and fashion smart factories can expect future value to grow together, according to digital technology innovation and platforms. This study can serve as a foundation for future research topics related to fashion platforms and smart factories.

A Study on Antecedents of Consumer's Revisit Intention in the Context of Accommodation Sharing Platform: The Role of Relative Attractiveness, Brand Identification, and Enjoyment (숙박 공유 플랫폼에서 고객들의 재방문 의도의 선행 요인에 대한 연구: 상대적 매력, 브랜드 동일화, 즐거움의 역할)

  • Kim, Seon Ju;Kim, Byoungsoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.269-278
    • /
    • 2022
  • Recently, the travel and lodging industries have been suffering from the spread of COVID-19. But Airbnb recovered its profits with a differentiated strategy. This study identified the characteristics of Airbnb and examined their effects on customer's revisit intention in the Airbnb context. Perceived value, trust about Airbnb, and social norms were considered as the key factors of revisit intention. In addition, the effects of relative attractiveness, brand identification, and enjoyment on perceived value and trust about Airbnb were examined. The proposed research model was tested based on 285 consumers who had Airbnb experience more than twice. The analysis results showed that relative attractiveness, brand identification, and enjoyment had a significant influence on perceived value and trust. Perceived value had a significant influence on revisit intention. However, trust about Airbnb and social norms did not significantly affect revisit intention. Moreover, ths analysis results found no significant moderating effect of share of wallet. Based on the results of this study, Airbnb would establish effective marketing and operation strategies by understanding the formation mechanism of consumer's revisit intention toward Airbnb.