• Title/Summary/Keyword: Physical parameter

Search Result 872, Processing Time 0.022 seconds

A Study on Startups' Dependence on Business Incubation Centers (창업보육서비스에 따른 입주기업의 창업보육센터 의존도에 관한 연구)

  • Park, JaeSung;Lee, Chul;Kim, JaeJon
    • Korean small business review
    • /
    • v.31 no.2
    • /
    • pp.103-120
    • /
    • 2009
  • As business incubation centers (BICs) have been operating for more than 10 years in Korea, many early stage startups tend to use the services provided by the incubating centers. BICs in Korea have accumulated the knowledge and experience in the past ten years and their services have been considerably improved. The business incubating service has three facets : (1) business infrastructure service, (2) direct service, and (3) indirect service. The mission of BICs is to provide the early stage entrepreneurs with the incubating service in a limited period time to help them grow strong enough to survive the fierce competition after graduating from the incubation. However, the incubating services sometimes fail to foster the independence of new startup companies, and raise the dependence of many companies on BICs. Thus, the dependence on BICs is a very important factor to understand the survival of the incubated startup companies after graduation from BICs. The purpose of this study is to identify the main factors that influence the firm's dependence on BICs and to characterize the relationships among the identified factors. The business incubating service is a core construct of this study. It includes various activities and resources, such as offering the physical facilities, legal service, and connecting them with outside organizations. These services are extensive and take various forms. They are provided by BICs directly or indirectly. Past studies have identified various incubating services and classify them in different ways. Based on the past studies, we classify the business incubating service into three categories as mentioned above : (1) business infrastructure support, (2) direct support, and (3) networking support. The business infrastructure support is to provide the essential resources to start the business, such as physical facilities. The direct support is to offer the business resources available in the BICs, such as human, technical, and administrational resources. Finally, the indirect service was to support the resource in the outside of business incubation center. Dependence is generally defined as the degree to which a client firm needs the resources provided by the service provider in order to achieve its goals. Dependence is generated when a firm recognizes the benefits of interacting with its counterpart. Hence, the more positive outcomes a firm derives from its relationship with the partner, the more dependent on the partner the firm must inevitably become. In business incubating, as a resident firm is incubated in longer period, we can predict that her dependence on BICs would be stronger. In order to foster the independence of the incubated firms, BICs have to be able to manipulate the provision of their services to control the firms' dependence on BICs. Based on the above discussion, the research model for relationships between dependence and its affecting factors was developed. We surveyed the companies residing in BICs to test our research model. The instrument of our study was modified, in part, on the basis of previous relevant studies. For the purposes of testing reliability and validity, preliminary testing was conducted with firms that were residing in BICs and incubated by the BICs in the region of Gwangju and Jeonnam. The questionnaire was modified in accordance with the pre-test feedback. We mailed to all of the firms that had been incubated by the BICs with the help of business incubating managers of each BIC. The survey was conducted over a three week period. Gifts (of approximately ₩10,000 value) were offered to all actively participating respondents. The incubating period was reported by the business incubating managers, and it was transformed using natural logarithms. A total of 180 firms participated in the survey. However, we excluded 4 cases due to a lack of consistency using reversed items in the answers of the companies, and 176 cases were used for the analysis. We acknowledge that 176 samples may not be sufficient to conduct regression analyses with 5 research variables in our study. Each variable was measured through multiple items. We conducted an exploratory factor analysis to assess their unidimensionality. In an effort to test the construct validity of the instruments, a principal component factor analysis was conducted with Varimax rotation. The items correspond well to each singular factor, demonstrating a high degree of convergent validity. As the factor loadings for a variable (or factor) are higher than the factor loadings for the other variables, the instrument's discriminant validity is shown to be clear. Each factor was extracted as expected, which explained 70.97, 66.321, and 52.97 percent, respectively, of the total variance each with eigen values greater than 1.000. The internal consistency reliability of the variables was evaluated by computing Cronbach's alphas. The Cronbach's alpha values of the variables, which ranged from 0.717 to 0.950, were all securely over 0.700, which is satisfactory. The reliability and validity of the research variables are all, therefore, considered acceptable. The effects of dependence were assessed using a regression analysis. The Pearson correlations were calculated for the variables, measured by interval or ratio scales. Potential multicollinearity among the antecedents was evaluated prior to the multiple regression analysis, as some of the variables were significantly correlated with others (e.g., direct service and indirect service). Although several variables show the evidence of significant correlations, their tolerance values range between 0.334 and 0.613, thereby demonstrating that multicollinearity is not a likely threat to the parameter estimates. Checking some basic assumptions for the regression analyses, we decided to conduct multiple regression analyses and moderated regression analyses to test the given hypotheses. The results of the regression analyses indicate that the regression model is significant at p < 0.001 (F = 44.260), and that the predictors of the research model explain 42.6 percent of the total variance. Hypotheses 1, 2, and 3 address the relationships between the dependence of the incubated firms and the business incubating services. Business infrastructure service, direct service, and indirect service are all significantly related with dependence (β = 0.300, p < 0.001; β = 0.230, p < 0.001; β = 0.226, p < 0.001), thus supporting Hypotheses 1, 2, and 3. When the incubating period is the moderator and dependence is the dependent variable, the addition of the interaction terms with the antecedents to the regression equation yielded a significant increase in R2 (F change = 2.789, p < 0.05). In particular, direct service and indirect service exert different effects on dependence. Hence, the results support Hypotheses 5 and 6. This study provides several strategies and specific calls to action for BICs, based on our empirical findings. Business infrastructure service has more effect on the firm's dependence than the other two services. The introduction of an additional high charge rate for a graduated but allowed to stay in the BIC is a basic and legitimate condition for the BIC to control the firm's dependence. We detected the differential effects of direct and indirect services on the firm's dependence. The firms with long incubating period are more sensitive to indirect service positively, and more sensitive to direct service negatively, when assessing their levels of dependence. This implies that BICs must develop a strategy on the basis of a firm's incubating period. Last but not least, it would be valuable to discover other important variables that influence the firm's dependence in the future studies. Moreover, future studies to explain the independence of startup companies in BICs would also be valuable.

Memory Organization for a Fuzzy Controller.

  • Jee, K.D.S.;Poluzzi, R.;Russo, B.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1041-1043
    • /
    • 1993
  • Fuzzy logic based Control Theory has gained much interest in the industrial world, thanks to its ability to formalize and solve in a very natural way many problems that are very difficult to quantify at an analytical level. This paper shows a solution for treating membership function inside hardware circuits. The proposed hardware structure optimizes the memoried size by using particular form of the vectorial representation. The process of memorizing fuzzy sets, i.e. their membership function, has always been one of the more problematic issues for the hardware implementation, due to the quite large memory space that is needed. To simplify such an implementation, it is commonly [1,2,8,9,10,11] used to limit the membership functions either to those having triangular or trapezoidal shape, or pre-definite shape. These kinds of functions are able to cover a large spectrum of applications with a limited usage of memory, since they can be memorized by specifying very few parameters ( ight, base, critical points, etc.). This however results in a loss of computational power due to computation on the medium points. A solution to this problem is obtained by discretizing the universe of discourse U, i.e. by fixing a finite number of points and memorizing the value of the membership functions on such points [3,10,14,15]. Such a solution provides a satisfying computational speed, a very high precision of definitions and gives the users the opportunity to choose membership functions of any shape. However, a significant memory waste can as well be registered. It is indeed possible that for each of the given fuzzy sets many elements of the universe of discourse have a membership value equal to zero. It has also been noticed that almost in all cases common points among fuzzy sets, i.e. points with non null membership values are very few. More specifically, in many applications, for each element u of U, there exists at most three fuzzy sets for which the membership value is ot null [3,5,6,7,12,13]. Our proposal is based on such hypotheses. Moreover, we use a technique that even though it does not restrict the shapes of membership functions, it reduces strongly the computational time for the membership values and optimizes the function memorization. In figure 1 it is represented a term set whose characteristics are common for fuzzy controllers and to which we will refer in the following. The above term set has a universe of discourse with 128 elements (so to have a good resolution), 8 fuzzy sets that describe the term set, 32 levels of discretization for the membership values. Clearly, the number of bits necessary for the given specifications are 5 for 32 truth levels, 3 for 8 membership functions and 7 for 128 levels of resolution. The memory depth is given by the dimension of the universe of the discourse (128 in our case) and it will be represented by the memory rows. The length of a world of memory is defined by: Length = nem (dm(m)+dm(fm) Where: fm is the maximum number of non null values in every element of the universe of the discourse, dm(m) is the dimension of the values of the membership function m, dm(fm) is the dimension of the word to represent the index of the highest membership function. In our case then Length=24. The memory dimension is therefore 128*24 bits. If we had chosen to memorize all values of the membership functions we would have needed to memorize on each memory row the membership value of each element. Fuzzy sets word dimension is 8*5 bits. Therefore, the dimension of the memory would have been 128*40 bits. Coherently with our hypothesis, in fig. 1 each element of universe of the discourse has a non null membership value on at most three fuzzy sets. Focusing on the elements 32,64,96 of the universe of discourse, they will be memorized as follows: The computation of the rule weights is done by comparing those bits that represent the index of the membership function, with the word of the program memor . The output bus of the Program Memory (μCOD), is given as input a comparator (Combinatory Net). If the index is equal to the bus value then one of the non null weight derives from the rule and it is produced as output, otherwise the output is zero (fig. 2). It is clear, that the memory dimension of the antecedent is in this way reduced since only non null values are memorized. Moreover, the time performance of the system is equivalent to the performance of a system using vectorial memorization of all weights. The dimensioning of the word is influenced by some parameters of the input variable. The most important parameter is the maximum number membership functions (nfm) having a non null value in each element of the universe of discourse. From our study in the field of fuzzy system, we see that typically nfm 3 and there are at most 16 membership function. At any rate, such a value can be increased up to the physical dimensional limit of the antecedent memory. A less important role n the optimization process of the word dimension is played by the number of membership functions defined for each linguistic term. The table below shows the request word dimension as a function of such parameters and compares our proposed method with the method of vectorial memorization[10]. Summing up, the characteristics of our method are: Users are not restricted to membership functions with specific shapes. The number of the fuzzy sets and the resolution of the vertical axis have a very small influence in increasing memory space. Weight computations are done by combinatorial network and therefore the time performance of the system is equivalent to the one of the vectorial method. The number of non null membership values on any element of the universe of discourse is limited. Such a constraint is usually non very restrictive since many controllers obtain a good precision with only three non null weights. The method here briefly described has been adopted by our group in the design of an optimized version of the coprocessor described in [10].

  • PDF