• Title/Summary/Keyword: networking services

Search Result 686, Processing Time 0.031 seconds

The Influence of Core Competence on Organizational Performance of IT Small and Medium Enterprises : The Moderating Role of Entrepreneurship and Government Support (IT중소기업의 핵심역량이 기업성과에 미치는 영향에 관한 연구 : 기업가 정신과 정부지원의 조절효과)

  • Roh, Doohwan;Park, Ho-Young
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.23-40
    • /
    • 2015
  • The purpose of this study is to analyze the influence of core competences on organizational performance in small and medium sized IT enterprises. Especially, the moderating effects of entrepreneurship and government support variables between the core competences and organizational performance were examined. To empirically prove the hypothesis, the statistical analysis were conducted based on the response from the 502 Korean domestic IT SMEs, using AMOS 18.0 and SPSS 20.0. The results of this empirical study can be summarized as follows. First, core competences (marketing, networking, and technology competence) have positive influence on organizational performance. Second, entrepreneurship and government support have moderating effects in the relationship between core competence and organizational performance. Especially, network and marketing competence appeared to be affected by more entrepreneurship than technology competence. So this paper suggests that when the R&D of SMEs and government support are properly combined, it will directly give an effect on organizational performance. The results of this research can be used for building a better government support policies and strategic planning of small and medium sized domestic IT enterprises.

A Study on the authentication scheme for Security of Wireless Internet (무선 인터넷에서 보안을 위한 인증방안에 관한 연구)

  • 최용식;강찬희;신승호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.87-91
    • /
    • 2004
  • The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.

Programming and Verification of WAVE Multi-Channel Simulation Program based on the ns-2 (ns-2 기반 WAVE 멀티채널 시뮬레이션 프로그램 작성 및 검증)

  • Kang, Woo-Sung;Jung, Jin-Uk;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1471-1478
    • /
    • 2011
  • A typical standard of vehicular ad hoc networks, WAVE which consists of IEEE 1609.x Family standards and IEEE 802.11p standard, includes the multi-channel coordination and channel synchronization function to provide safety services or public services during a car is driven. Generally, the performance of data communication and networking technologies is evaluated by using simulation tools, such as ns-2, OPNET, OPNET++, etc. However, these tools doesn't provide the operations of WAVE protocol. Therefore, in this paper, we implement and verify WAVE simulation program based on ns-2.

A Design of Filtering Technique on LBSNS using Spatial Join (LBSNS에서의 공간조인을 이용한 필터링 기법의 설계)

  • Lee, Eun-Sik;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.230-232
    • /
    • 2011
  • Owing to the advent of digital devices which equipped with GPS, such as smartphone and tablet pc, a number of LBSNS applications have been released and even SNS applications serve various Location-Based Services. In twitter's case, the news of interesting area is provided to user not by being subscribed them automatically, but by being searched on web-site. This paper describes the system designed for users want to subscribe the local news without procedure like searching using operators. This system uses PBSM(Partition Based Spatial-Merge Join) which has no index for batch processing and against a massive query. The results from Spatial Join are stored in Materialized View then provided to user.

  • PDF

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

Appearance Based Object Identification for Mobile Robot Localization in Intelligent Space with Distributed Vision Sensors

  • Jin, TaeSeok;Morioka, Kazuyuki;Hashimoto, Hideki
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.2
    • /
    • pp.165-171
    • /
    • 2004
  • Robots will be able to coexist with humans and support humans effectively in near future. One of the most important aspects in the development of human-friendly robots is to cooperation between humans and robots. In this paper, we proposed a method for multi-object identification in order to achieve such human-centered system and robot localization in intelligent space. The intelligent space is the space where many intelligent devices, such as computers and sensors, are distributed. The Intelligent Space achieves the human centered services by accelerating the physical and psychological interaction between humans and intelligent devices. As an intelligent device of the Intelligent Space, a color CCD camera module, which includes processing and networking part, has been chosen. The Intelligent Space requires functions of identifying and tracking the multiple objects to realize appropriate services to users under the multi-camera environments. In order to achieve seamless tracking and location estimation many camera modules are distributed. They causes some errors about object identification among different camera modules. This paper describes appearance based object representation for the distributed vision system in Intelligent Space to achieve consistent labeling of all objects. Then, we discuss how to learn the object color appearance model and how to achieve the multi-object tracking under occlusions.

Development of a Disaster Management System for Disaster Prevention in the Urban - Focused on the gas facilities management - (도시지역 재해방재를 위한 재해관리시스템 개발(II) -도시가스시설 관리를 중심으로-)

  • 유환희;성재열
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.17 no.4
    • /
    • pp.339-348
    • /
    • 1999
  • The information & Communication industry including internet is rapidly developing and expanding, which integrates our living space and provides diversity. Internet provides users with an variety of real-time information through networking. Also the functions and services of Geographic Information Systems are on a changing trend providing services for various organizations and users dispersed in different networks. It is necessary to understand that GIS is available not only on a desktop and server, but in any place where the network is connected using the web. Recently, Internet GIS for the search and subscription of spatial informations through the internet is receiving an active research field. So. this study aims to apply the Gas Disaster Management to the internet and develop the internet GIS techniques which make an effective utilization of GIS functions using MapObjects IMS, SDE, and Oracle.

  • PDF

Performance Evaluation of Diffserv Model for Providing QoS in Mobile IPv6 Networks (Mobile IPv6망에서 QoS 제공을 위한 Diffserv 모델의 성능 평가)

  • Kim, Mi-Sun;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.5
    • /
    • pp.380-394
    • /
    • 2006
  • Traditional Internet services provide the same level of qualify to all users without considering about their application's QoS (quality of service) requirements. Because the wireless and Internet technologies are evolving rapidly, the powerful mobile devices are more widely used. Therefore, the new applications such as DMB (digital multimedia broadcasting), VoD (video on demand), telemedicine, and etc. demand appropriate QoS and host mobility. To satisfy free mobility and QoS, we deploy Diffserv (differentiated services) model to the mobile IPv6 networks. We propose the operational procedures and cost analyzing models for providing an MN's mobility and QoS. Also its performance is presented by cost analyzing and the future works are described.

Developing Job Description for Dietitians Working in Public Health Nutrition Areas (보건소 영양사를 위한 직무 기술서 개발)

  • Cha, Jin-A;Park, Hae-Ryun;Lim, Young-Suk;Lim, Seung-Hee
    • Korean Journal of Community Nutrition
    • /
    • v.13 no.6
    • /
    • pp.890-902
    • /
    • 2008
  • The purpose of this study was to develop a standardized job description for dietitians working in the public health nutrition area. Work-oriented job analysis methodology was employed for the study purpose. Subjects of 38 dietitians currently working at health centers in 2002 were recruited. Based on the focus group interview with 7 public health nutritionists and 7 professors, information about task elements was collected. Questionnaires measuring work performance and self-perception of importance of the selected task elements were administered. Reliability and validity of this instrument were tested by Chronbach's alpha and factor analysis. SAS PC package program was used for the statistical analysis. The final developed job description for public health nutritionists included 5 duties, 20 tasks and 93 task elements. The results of this study can be summarized as follows; 1) 5 duty areas are A. plan and evaluation of public health nutrition services, B. developing nutrition education materials, C. implementing nutrition services, D. networking community, and E. self development. 2) Each duty area from A to E was composed with 6, 2, 6, 4, 2 tasks, respectively. 3) Each duty area from A to E was composed with 24, 8, 38, 14, 9, and 2 task elements, respectively.

On UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System (신기통신망 번호체계로서 번호문 번호체계를 이용한 보편개인대표 번호의 구현방안)

  • Ku Jay-Il;Chinn Yong-Ok
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.165-172
    • /
    • 2006
  • This paper describes which UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System. IT is based to UPTN and eNUM and also scribed by NAN of the ortho phonic korean alphabet. other case, in English. the UPAN system is integrated by two kind of numbering system, one is PSTN, another is domain name and address based IP. By this result we contributed personal ID and many kind of numbering of telecommunications services and all kind of personal ID and numbering system by the proper auto-raising registration. Now, we are confirmed this is key solution of ubiquitous networking and defined supra service structures.

  • PDF