• 제목/요약/키워드: formal networks

검색결과 83건 처리시간 0.025초

표상의 실재성과 가능성 (Reality and Function of Representation)

  • 소흥렬
    • 인지과학
    • /
    • 제2권2호
    • /
    • pp.205-220
    • /
    • 1990
  • 물질적으로 존재하는 모든 실체는 질료인과 형상인을 갖춘 개별 물체로 실재하면서 어떤 기능을 할 \ 수도 있고,동력인과 기능인을 갖춘 비물체적 양상으로 실재하면서 기능망(functional network)으로서 형상을 가질 수도 있다.기능망은 신경망,신경기능망,심리기능망 등 차원을 다르게 하면서 상하로 연관된 계층으 이루고 있으며 심리기능망 안에서도 비언어적 기능망,언어적 기능망이 구별되어 차원적 언어기능을 가능하게 하는 것으로 볼수 있다.이러한 기능망의 실재성은 신경과학과 인공지능학의 발전에 따라 확인, 수정,보완될 수 있을 것이다.

Networks and Innovative Performance of the Korean Manufacturing Firms

  • 성태경
    • 기술경영경제학회:학술대회논문집
    • /
    • 기술경영경제학회 2005년도 통합학술대회 논문집
    • /
    • pp.5-28
    • /
    • 2005
  • This paper estimates the effect of networks on innovative performance at the firm level , using Korean Innovation Survey (KIS) dataset Product innovation, product improvement , and process innovation are used as proxies for innovative activity. The explanatory variables such as firm size, market concentration ratio, lagged profitability, foreign ownership, export ratio, firm's age, formal R&D activity, and industrial R&D intensity are yet other considerations. With two year-long (2000 and 2001) data from 1,124 Korean manufacturing firms, we estimated the logistic regression model. The research finding indicates that the external networks have a strong positive effect on innovative output regardless of type of innovation. However, the network effects by partner (other firms or research institutions) vary across the type of innovation. Especially, we found that the user-supplier linkage plays an important role in product ion innovation, product improvement, and process innovation.

  • PDF

기업규모, 네트워크, 그리고 기술혁신: 우리나라 제조업에 대한 실증 분석 (Firm Size, Networks, and Innovation: Evidence from the Korean Manufacturing Firms)

  • 성태경
    • 기술혁신연구
    • /
    • 제13권3호
    • /
    • pp.77-100
    • /
    • 2005
  • This paper analyzes the determinants of firm's innovative activity, using Korean Innovation Survey (KIS) dataset. Especially, we focused on the role of external networks by partners(other firms or research institutions) in performing innovative activities. The product innovation, product improvement, and process innovation are used as proxies for innovative activity. The explanatory variables such as market concentration ratio, lagged profitability, foreign ownership, export ratio, firm's age, formal R&D activity, and industrial R&D intensity are also considered. With data from 1,124 firms for the two years (2000-2001), we estimated the logistic regression model. The finding is that the determinants of firm's innovative activities differ by type of innovations. We also found that the innovative behavior of SMEs differs from that of large firms. The result confirms that external networks have a strong positive effect on innovative activity. However, the network effects by partners vary across both firm size and type of innovations.

  • PDF

사회자본 패러다임과 사회·감성재화에 관한 소고 (A Thought on Social Captial Paradigm and Social-Emotional Goods)

  • 박성쾌
    • 수산해양교육연구
    • /
    • 제16권2호
    • /
    • pp.199-209
    • /
    • 2004
  • The main purpose of this study is to explore a social capital paradigm which can be applied to many forms of social capital and intangible goods. The social capital paradigm introduces a new form of capital. This new form of capital produces a flow of socio-emotional goods that have value. Moreover, these socio-emotional goods can attach themselves to the objects used to convey them and change their value and meaning. This change in value and meaning is defined as attachment values. Exchanges of socio-emotional goods occur in networks where social capital resides. Formal and informal institutions provide order and meaning to exchanges of tangible and intangible goods. Social capital is a powerful resource that makes our choices interdependent. The social capital paradigm does not alter or contradict the basic economic theories of exchange. While the social capital paradigm accepts that selfish preferences motive many actions, it adds that sympathy and the desire to consume socio-emotional goods are powerful motivators. In case of marine affairs, ocean and fishing villages and their culture have been not only a fundamental basis of fisheries development but they also have made a great deal of contribution to forming social capital. In spite of this fact, the main reason that the problems of fisheries fishing villages fishermen in our society are kept at a distance is because they have been loosing their capability of forming social capital and producing socio-emotional goods, in addition to lowered relative economic share.

SDN 응용 검증을 위한 프로세스 알지브라 기반 정형 기법 (Process Algebra Based Formal Method for SDN Application Verification)

  • 신명기;이종화;최윤철;이지현;이승익;강미영;곽희환;최진영
    • 한국통신학회논문지
    • /
    • 제39B권6호
    • /
    • pp.387-396
    • /
    • 2014
  • 최근 SDN (Software Defined Networking) 기반의 다양한 네트워크 제어 및 관리 플랫폼들이 서비스제공자 및 통신사업자들에 의해 연구되고 있다. SDN의 중요한 특징 중 하나는 소프트웨어 프로그램으로 작성된 간단한 응용에 의해 네트워크가 쉽게 제어되고 관리된다는 점에 있다. 이러한 관점에서 잘못 작성된 SDN 응용은 네트워크 전체에 오류를 발생시킬 수 있어, 해당 응용은 작성된 오픈플로우 포워딩 규칙(rule)을 SDN 컨트롤러(controller)를 통해 스위치에 반영하기 전에 토폴로지와 네트워크 환경의 안전성(safety)과 일관성(consistency)이 반드시 검증되어야 한다. 본 논문에서는 SDN 응용 검증을 위한 프로세스 알지브라 (process algebra) 기반의 언어인 pACSR (Packet based Algebra of Communicating Shared Resources)와 이를 기반으로 한 정형 검증 프레임워크를 제안하고, 이에 대한 SDN 정형검증 도구 연구시제품 구현 현황을 기술한다.

ASK 모바일 프로토콜 취약점 분석 및 수정 (Analyzing and Fixing the Vulnerabilities of ASK Protocol)

  • 류갑상;김일곤;김현석;이지현;강인혜;최진영
    • 한국정보과학회논문지:정보통신
    • /
    • 제33권1호
    • /
    • pp.1-8
    • /
    • 2006
  • 지금까지의 많은 보안프로토콜들은 비정형화된 설계 및 검증 방법을 통해 개발되었다. 그 결과 유.무선 네트워크 분야에서 보안상 안전하다고 여겨왔던 많은 보안 프로토콜들의 보안 취약점들이 하나둘씩 발견되어오고 있다. 이에 따라, 통신 프로토콜을 개발하기 이전에 설계단계에서부터, 수학적인 기호 및 의미에 바탕을 둔 설계 언어로, 프로토콜의 안전성을 분석하기 위한 정형적 설계 및 검증 방법의 중요성이 점차 증대되고 있다. 현재, 모바일 통신 네트워크의 확산과 더불어 다양한 모바일 프로토콜들이 제안되고 있다. 본 논문에서는 정형적 검증 방법을 이용해서 ASK 모바일 프로토콜의 보안 취약점을 지적한다. 또한, 보안 취약점을 개선한 새로운 ASK 모바일 프로토콜을 제안하고 검증하였다.

보안 프로토콜의 안전성 분석을 위한 정형적 방법론 (Formal Methodology for Safety Analysis of Security Protocols)

  • 김일곤;전철욱;김현석;최진영;강인혜
    • 정보보호학회논문지
    • /
    • 제15권1호
    • /
    • pp.17-27
    • /
    • 2005
  • 유ㆍ무선 네트워크의 활성화와 더불어 중요 자원 혹은 사용자 정보 보호를 위해 다양한 보안프로토콜들이 개발되고 있다. 하지만, 대부분의 많은 보안 프로토콜들은 개발된 후, 시간이 지남에 따라 점차 보안 취약점들이 하나둘 발견되고 있다. 본 논문에서는 안전한 보안프로토콜을 개발하기 위해, EKE 프로토콜 분석 예제를 통해, 설계단계에서 보안 프로토콜의 안전성을 검증하는 정형적 방법론에 대해 소개하고, 정형적 검증 방법론의 실효성을 보이기 위해, Casper 및 FDR 도구론 이용하여 BCY 프로토콜의 안전성을 분석한 후, 보안성을 향상시킨 새로운 BCY 프로토콜을 제안한다.

공동 출원 특허정보와 정형적 개념분석을 활용한 기술협력 성과 분석 연구 (Exploring Technology Cooperation Performance Using co-patent Information and Formal Concept Analysis)

  • 박찬호;이희정
    • 산업경영시스템학회지
    • /
    • 제46권spc호
    • /
    • pp.39-53
    • /
    • 2023
  • Recently, the market competition has been fiercer due to the acceleration of technological change and the launch of intelligent products. In this situation, technology cooperation activities through networks rather than independent technological innovation activities of a single company or institution are recognized as a crucial strategy to gain competitiveness. Technology cooperation can take various forms depending on the target technology, and researchers have conducted performance analyses of technology cooperation types. However, there have not been data-based quantitative studies on the types and trends of technology cooperation for the target technology. In this paper, we explored the difference between the technology cooperation types by technology and time using the formal concept analysis method and co-patent information. In particular, the proposed methodology has been verified through the case study of electric vehicles, and it is intended to suggest the direction of technological cooperation according to specific technologies and cooperation targets in the future

SIP Dealing with Location Based Information

  • Requena, Jose-Costa;Haitao Tang;Inmaculada Espigares Del Pozo
    • Journal of Communications and Networks
    • /
    • 제3권4호
    • /
    • pp.351-360
    • /
    • 2001
  • This paper introduces an approach for providing Location Based Services (LBS) using Spatial Location (SLO) information within the Session Initiation Protocol (SIP). The aim of the paper is to set up the framework for providing LBS services in devices connected to wire and wireless IP networks. This method uses SIP as transport and the SLO as data formal inserted in the SIP pay-load. It analyses the relationship among the network elements involved in the architecture, and its functionality fur providing access to network services regardless of the user location. In conclusion, this proposal enables SIP to support location-related services such as messaging, location-based commerce, and any location-based computing. Furthermore, it describes the advantage of adding the user location information network resources optimization in mobile environments and future networks.

  • PDF

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks

  • Fu, Anmin;Zhang, Gongxuan;Yu, Yan;Zhu, Zhenchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3250-3265
    • /
    • 2014
  • Integrated WiMAX and WiFi networks is of great potential for the future due to the wider coverage of WiMAX and the high data transport capacity of WiFi. However, seamless and secure handover (HO) is one of the most challenging issues in this field. In this paper, we present a novel vertical HO authentication scheme with privacy preserving for WiMAX-WiFi heterogeneous networks. Our scheme uses ticket-based and pseudonym-based cryptographic methods to secure HO process and to achieve high efficiency. The formal verification by the AVISPA tool shows that the proposed scheme is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of communication and computation cost.