• 제목/요약/키워드: Process sharing

검색결과 1,211건 처리시간 0.023초

Multi-criteria Evaluation of Mobile Network Sharing Policies in Korea

  • Song, Young-Keun;Zo, Hangjung;Ciganek, Andrew P.
    • ETRI Journal
    • /
    • 제36권4호
    • /
    • pp.572-580
    • /
    • 2014
  • Mobile operators in saturated markets increasingly favor mobile network sharing (MNS) over facility-based competition. Previous research examining MNS primarily focused on its positive effects, while the negative effects were largely overlooked. This study proposes a decision-making model using an analytic hierarchy process technique to evaluate decision-making criteria among various types of MNS policies. The decision-making model was applied to Wireless Broadband services in Korea to determine the relative importance of both positive and negative evaluation criteria and preference among multiple types of MNS policies. Positive evaluation criteria (that is, efficiency) were far greater in importance than negative evaluation criteria (that is, competition harm). The preference for adopting MNS among five alternative approaches was also revealed. The study findings offer immediate policy insights in Korea and provide a decision-making framework for policy makers in other countries to utilize.

농촌시설물 P-C-M 지원 시스템 개발 (Development the P-C-M Support System in Agricultural Facilities)

  • 김미경;신한우;김태희;김광희
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2011년도 춘계 학술논문 발표대회 1부
    • /
    • pp.135-136
    • /
    • 2011
  • This study is developing the Web-based P-C-M support system in agricultural facilities to help the users actually utilizing the system. This system can help the people accept the information and sharing the communication. P-C-M support system is the process in procurement, construction and maintenance. In conclusion, P-C-M support system is expected to the contributed to the agricultural facilities information sharing and communication between the user and suppliers.

  • PDF

정보기술이 지식경영활동에 미치는 영향: 만도와 포스코 사례를 중심으로 (The Effect of Information Technology on the Knowledge Management Activity from MANDO and POSCO)

  • 최은수
    • 지식경영연구
    • /
    • 제9권2호
    • /
    • pp.169-191
    • /
    • 2008
  • Information technology instruments arc being rampantly used for knowledge management in companies. IT is used as an interplay tool to enhance the flow of knowledge and information between people. KMS, especially, supports the knowledge management process including sharing, creating, and using of knowledge within a company, and maximizes the value of knowledge resources within an organization. The purpose of this paper is to understand how IT is changing the knowledge management activity. through various examples based on exploratory research from MANDO, the Korean automotive parts manufacturer, and POSCO, the global leading steelmaker. The result shows that IT boosts communication skills, thus creates a mutual relationship outcome. In the same context, the process of knowledge conversion by Nonaka's SECI model simplifies to an Externalization-Internalization process. This process accelerates the birth of explicit knowledge and Socialization, supplements the Limitations of the creation of knowledge in the E-I cycle. The E of knowledge simultaneously promotes the I, and eventually brings an advanced learning skill. IT aids the E of knowledge and furthermore, I and E activity, through the knowledge sharing, brings vitality into an organization. The interplay stage for knowledge activity is to be reorganized to a cyber ba. Furthermore, IT will galvanize the formation of core knowledge through systemized acquisition, management of core knowledge and standardization of work.

  • PDF

지상전투차량에서 표적정보 처리 및 공유 방안 구현 (An Implementation of Target Information Management and its Sharing Process among Ground Fighting Vehicles)

  • 최일호;노해환;손원기
    • 한국군사과학기술학회지
    • /
    • 제23권1호
    • /
    • pp.66-75
    • /
    • 2020
  • Enemy information has significant value when it comes to the process of military actions in battle field. Our Army now uses Battlefield Management Systems(BMSs) equipped in Ground Fighting Vehicles(GFVs) and we need to make research on what kind of role enemy information can play in such systems. Also, enemy information can be shared among GFVs and target information shall be extracted from it in view of KVMF scheme. Because KVMF becomes requisite standard in modern BMSs, we need to implement target information handling process in KVMF standard. In this article, we will focus on how target information and its sharing process can be managed efficiently without information conflicts. Also, situation map produced by it will be noted.

STEP표준과 Web을 이용한 RPD환경 구축 (Development of a STEP-compliant Web RPD Environment)

  • 강석호;김민수;김영호
    • 한국CDE학회논문집
    • /
    • 제5권1호
    • /
    • pp.23-32
    • /
    • 2000
  • In this paper, we present a Web-enabled product data sharing system for the support of RPD (Rapid Product Development) process by incorporating STEP (STandard for the Exchange of Product model data) with Web technology such as VRML (Virtual Reality Markup Language), SGML (Structured Generalized Markup Language) and Java. Extreme competition makes product life cycle short by incessantly deprecating current products with a brand-new one, and thus urges enterprises to devise a new product faster than ever. In this environment, an RPD process with effective product data sharing system is essential to outstrip competitors by speeding up the development process. However, the diversity of product data schema and heterogeneous systems make it difficult to exchange the product data. We chose STEP as a neutral product data schema and Web as an independent exchange environment to overcome these problems. While implementing our system, we focused on the support of STEP AP 203 UoF (Units of Functionality) views to efficiently employ STEP data models that are maximally normalized, and therefore very cumbersome to handle. Our functionality-oriented UoF view approach can increase users'appreciation since it facilitates the modular usage of STEP data models. This can also enhance the accuracy of product data. We demonstrate that our view approach is applicable to the configuration control of mechanical assemblies.

  • PDF

GRID BASED ENERGY EFFICIENT AND SECURED DATA TRANSACTION FOR CLOUD ASSISTED WSN-IOT

  • L. SASIREGA;C. SHANTHI
    • Journal of applied mathematics & informatics
    • /
    • 제41권1호
    • /
    • pp.95-105
    • /
    • 2023
  • To make the network energy efficient and to protect the network from malignant user's energy efficient grid based secret key sharing scheme is proposed. The cost function is evaluated to select the optimal nodes for carrying out the data transaction process. The network is split into equal number of grids and each grid is placed with certain number of nodes. The node cost function is estimated for all the nodes present in the network. Once the optimal energy proficient nodes are selected then the data transaction process is carried out in a secured way using malicious nodes filtration process. Therefore, the message is transmitted in a secret sharing method to the end user and this process makes the network more efficient. The proposed work is evaluated in network simulated and the performance of the work are analysed in terms of energy, delay, packet delivery ratio, and false detection ratio. From the result, we observed that the work outperforms the other works and achieves better energy and reduced packet rate.

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

A Strategy for Multi-target Paths Coverage by Improving Individual Information Sharing

  • Qian, Zhongsheng;Hong, Dafei;Zhao, Chang;Zhu, Jie;Zhu, Zhanggeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5464-5488
    • /
    • 2019
  • The multi-population genetic algorithm in multi-target paths coverage has become a top choice for many test engineers. Also, information sharing strategy can improve the efficiency of multi-population genetic algorithm to generate multi-target test data; however, there is still space for some improvements in several aspects, which will affect the effectiveness of covering the target path set. Therefore, a multi-target paths coverage strategy is proposed by improving multi-population genetic algorithm based on individual information sharing among populations. It primarily contains three aspects. Firstly, the behavior of the sub-population covering corresponding target path is improved, so that it can continue to try to cover other sub-paths after covering the current target path, so as to take full advantage of population resources; Secondly, the populations initialized are prioritized according to the matching process, so that those sub-populations with better path coverage rate are executed firstly. Thirdly, for difficultly-covered paths, the individual chromosome features which can cover the difficultly-covered paths are extracted by utilizing the data generated, so as to screen those individuals who can cover the difficultly-covered paths. In the experiments, several benchmark programs were employed to verify the accuracy of the method from different aspects and also compare with similar methods. The experimental results show that it takes less time to cover target paths by our approach than the similar ones, and achieves more efficient test case generation process. Finally, a plug-in prototype is given to implement the approach proposed.

인터넷 기반 CITIS 참조모델시스템 개발 (Development of CITIS Reference Model System on Internet)

  • 주경준;조장혁;박상봉
    • 한국전자거래학회지
    • /
    • 제4권3호
    • /
    • pp.139-158
    • /
    • 1999
  • In this paper we present the development of CITIS(Contractor Integrated Technical Information Service) reference model system which can be utilized for electronic commerce among enterprises. For the physical analysis target model, we selected switching system businesses of Korea Telecom. From analysis of life-cycle business process and data, we derived CITIS reference model containing CITIS To-Be model and CITIS scenario. Derived CITIS reference model is generalized so that it can be used not only for switching system businesses but other business areas regarding CITIS implementation. On the base of the derived CITIS reference model, We also developed CITIS information management system and CITIS-support workflow system as CITIS reference model system. Developed CITIS reference model system supports information and business process sharing among enterprises on internet and it does make a contribution to expansion of CITIS which is moving from conceptual research towards real implementation phase.

  • PDF

Proposal of a Model for Co-processing of Real Estate Mortgage Registration in China's Internet Environment

  • Wang, Long;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • 제10권2호
    • /
    • pp.53-58
    • /
    • 2021
  • In this paper, based on the real estate registration model in the Chinese internet environment, we propose a model for the joint business of banking collateral registration. This is to increase the efficiency and service level of the real estate mortgage registration process. And it can solve the problems that in the process of registering a mortgage loan, difficulty of data sharing between the real estate registration agency and the bank, and ordinary users and bank clerks duplicate unnecessary work. In addition, it realizes joint processing and data sharing of real estate registration work with real estate registration agencies and banks, increases the efficiency and level of government affairs services, and offers an optimized solution to realize a one-stop service for real estate security registration. The results of this study are expected to provide theoretical support for the application and innovation of the Internet environment real estate registration model.