• 제목/요약/키워드: set sharing

검색결과 346건 처리시간 0.023초

공공조직 구성원의 신뢰기반에 따른 신뢰유형이 지식공유에 미치는 영향 - 지방공무원의 인식수준을 중심으로 - (The Effects of the Types of Source-Based Trust on Knowledge Sharing of Public Employees: Based on Officials' Perceptions in Local Government)

  • 김구
    • 정보화정책
    • /
    • 제20권4호
    • /
    • pp.23-50
    • /
    • 2013
  • 이 연구는 공공조직 구성원의 신뢰기반에 따른 신뢰유형이 지식공유(암묵지식과 명시지식)에 미치는 영향관계를 경험적으로 살펴보고 최적모형을 도출하는데 목적을 두었다. 분석모형의 구성변수로는 신뢰기반에 따른 신뢰유형을 조직의 절차적 및 분배적 공정성에 기인한 타산적 신뢰, 조직과 상사 그리고 동료에 대한 인지적 신뢰, 동료에 대한 감성적 신뢰 요인 등을 독립변수로 설정하였으며, 종속변수로는 지식내용을 중심으로 암묵지식 공유와 명시지식 공유로 구분하였다. 분석 과정에서는 신뢰기반에 따른 신뢰유형과 지식공유를 구성하는 개별요인은 물론 이들 개별 요인들의 상위개념을 통합요인으로 구분하여 분석하였다. 분석결과 각 모형의 적합도는 요구수준에 근사하게 도달되었으며, 가설적 영향관계에서는 통합요인 및 개별요인 모두에서 '동료에 대한 감성적 신뢰'가 지식공유에 유의적 영향을 미치는 것으로 파악되었다. 연구결과의 정책적 함의로는 첫째, 지식공유에 영향을 미치는 신뢰 개념을 구체적으로 구분하여 유형화하고 유형별로 지식공유의 영향모형을 도출함으로써 상황에 적합한 지식공유 활성화 방안을 마련할 수 있는 토대를 제공했다는 점과 둘째, 지식공유를 암묵지식과 명시지식으로 구분함으로써 지식공유의 내용에 따른 차별화된 지식공유의 촉진 방안을 모색하는 토대를 제공했다는 점 등을 제시하였다.

  • PDF

과학기술지식 생산과 공유를 위한 협력 유형분류체계 (A typology of Collaboration Modes for Scientific and Technological Knowledge Production and Sharing)

  • 황금주
    • 지식경영연구
    • /
    • 제11권2호
    • /
    • pp.133-152
    • /
    • 2010
  • This paper suggests a typology of the modes of collaboration for scientific and technological knowledge production and sharing (STKPS) based on knowledge communication types, including organizational factors, communication channel, intensity, and decision-making, that affect STKPS processes. It is mainly designed to rearrange ideas about collaboration drawn from the literature in order to develop a conceptual framework for categorizing modes of collaboration based on how communication patterns shape four modes of collaboration. In the conclusion and discussion part, practical implications, limitations of this study, and further studies are discussed. In particular, the practical implications propose communication patterns suitable for five stages of collaboration processes. As the collaboration initiation or set-up stage is critical, extensive face-to-face communication is recommended in the auditing stage. In the execution stage, media-based communication can be actively utilized, because collaborators will mostly exchange explicit codified knowledge supported by IT. The evaluation and reinforcement stages concentrate on tacit knowledge exchange and explicit knowledge evaluation, which requires intensive face-to-face communication including negotiations for evaluating collaboration outcomes and partnership.

  • PDF

하이브리드 SPM을 위한 버퍼 공유를 활용한 새로운 버퍼 매핑 기법 (New buffer mapping method for Hybrid SPM with Buffer sharing)

  • 이대영;오현옥
    • 대한임베디드공학회논문지
    • /
    • 제11권4호
    • /
    • pp.209-218
    • /
    • 2016
  • This paper proposes a new lifetime aware buffer mapping method of a synchronous dataflow (SDF) graph on a hybrid memory system with DRAM and PRAM. Since the number of write operations on PRAM is limited, the number of written samples on PRAM is minimized to maximize the lifetime of PRAM. We improve the utilization of DRAM by mapping more buffers on DRAM through buffer sharing. The problem is formulated formally and solved by an optimal approach of an answer set programming. In experiment, the buffer mapping method with buffer sharing improves the PRAM lifetime by 63%.

공급사슬 내의 파워유형이 정보역량에 미치는 영향: CSV 가치창출 관점 (The Effect of Power Type within Supply Chain on the Information Capability: Perspective of CSV Value Creation)

  • 박광오;장활식;정대현
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제27권3호
    • /
    • pp.1-24
    • /
    • 2018
  • Purpose The purpose of this study is to attempt to incorporate power theory to evaluate information capability of SCM adopters. Therefore, this study focuses on the relationship of information sharing, partnership quality, and information capacity according to the power intensity of the variables of SCM. and CSV value creation. Design/methodology/approach The questionnaire of SCM builder was conducted and 302 samples were analyzed. Based on the theoretical background of power and information capacity, we set up a structural equation model. Hypothesis testing and statistical analysis were done through AMOS and SPSS. Findings First, it shows that the compensation power among the constrained power has a positive effect on the partnership quality, and the legitimacy power has the positive influence only on the information sharing. Compulsive power, compensation, and legitimacy, which are generally restrictive powers, may reduce the quality of information sharing and partnership, but the results of this study are rather higher. Second, both non-binding power expertise and criterion have a positive effect on information sharing and partnership quality. Third, information sharing has a positive effect on partnership quality. Supporting a number of research results, it is well reflected in SCM attributes where interdependence is important. Fourth, information sharing and partnership quality have a positive effect on information capacity. Information literacy has become an essential element in modern management. Fifth, the enhancement of CSV value creation plays a role of a controlling variable to further strengthen information sharing through non - binding power attribute, expertise and conformity. In addition, the strengthening of CSV value creation has been shown to play a role as a controlling variable to further strengthen the quality of partnership through the non-binding power attribution, but expertise has been rejected.

SOME RESULTS ON THE UNIQUE RANGE SETS

  • Chakraborty, Bikash;Kamila, Jayanta;Pal, Amit Kumar;Saha, Sudip
    • 대한수학회지
    • /
    • 제58권3호
    • /
    • pp.741-760
    • /
    • 2021
  • In this paper, we exhibit the equivalence between different notions of unique range sets, namely, unique range sets, weighted unique range sets and weak-weighted unique range sets under certain conditions. Also, we present some uniqueness theorems which show how two meromorphic functions are uniquely determined by their two finite shared sets. Moreover, in the last section, we make some observations that help us to construct other new classes of unique range sets.

A PROCESSOR SHARING MODEL FOR COMMUNICATION SYSTEMS

  • Lim, Jong Seul;Park, Chul Guen;Ahn, Seong Joon;Lee, Seoyoung
    • Journal of applied mathematics & informatics
    • /
    • 제15권1_2호
    • /
    • pp.511-525
    • /
    • 2004
  • we model communication and computer systems that process interactive and several and several types of background jobs. The scheduling policy in use is to share the processor among all interactive jobs and, at most, one background job of each type at a time according to the process sharing discipline. Background jobs of each type are served on a first-come-first-served basis. Such scheduling policy is called Processor Sharing with Background jobs (PSBJ). In fact, the PSBJ policy is commonly used on many communication and computer systems that allow interactive usage of the systems and process certain jobs in a background mode. In this paper, the stability conditions for the PSBJ policy are given and proved. Since an exact analysis of the policy seems to be very difficult, an approximate analytic model is proposed to obtain the average job sojourn times. The model requires the solution of a set of nonlinear equations, for which an iterative algorithm is given and its convergence is proved. Our results reveal that the model provides excellent estimates of average sojourn times for both interactive and background jobs with a few percent of errors in most of the cases considered.

연속 주조 공정에서 평균 토크전류 추종에 의한 인발력 분배 제어 (Load Sharing Control by Following Average Torque Current in Continuous Casting)

  • 천창근;김철우
    • 조명전기설비학회논문지
    • /
    • 제18권3호
    • /
    • pp.74-80
    • /
    • 2004
  • 연속 주조 공정에서 설정한 속도로 주편을 인발하는 스트랜드 구동롤에 인발력이 적절하게 분배가 되지 않으면 주형 레벨의 주기적인 변동을 유발시킴과 동시에 주편의 품질을 저하하게 된다. 따라서 본 논문에서는 주편의 속도를 제어함과 동시에 각 구동롤에 운전자가 원하는 비율로 인발력을 분배할 수 있는 알고리즘을 제안한다. 제안된 방법은 전동기에 작용하는 토크 전류를 상위 제어기로 귀환하여 평균 토크 전류를 산출하고 각 구동롤 전동기의 토크 전류와 비교하여 전동기의 속도 기준값을 미소하게 변경함으로써 각 구동롤 전동기의 토크 전류가 평균 토크 전류에 추종하도록 하여 인발력을 분배한다. 그리고 과도상태 개선을 위하여 안티와인더업(anti-wind up) 제어기를 가진 인발력 제어기를 적용하였으며, 제안된 알고리즘의 확인을 위하여 포스코의 시험연주기에 적용하여 우수성을 입증하였다.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

공유 모빌리티 서비스의 이용의도에 영향을 미치는 요인에 관한 연구 (A Study of Factors Affecting Intention to Use Mobility Sharing Service)

  • 김용석;피채희;최정일
    • 한국IT서비스학회지
    • /
    • 제20권5호
    • /
    • pp.73-87
    • /
    • 2021
  • The COVID-19 pandemic has brought about many changes in our daily lives and in industries as a whole. The most notable change was the spread of the untact culture to minimize face-to-face contact. The spread of the untact culture has changed the use of public transportation. Looking at the results of previous SARS and MERS studies, it was found that as the pandemic spreads, the use of public transportation decreased. Recently, the mobility sharing service is attracting attention as a personalized means of transportation instead of public transportation. Therefore, in this study, the factors affecting the intention to use the mobility sharing service were to be identified by the actual users. In this study, economic benefit, convenience, sustainability, and sense of belonging were set as independent variables based on previous studies. In addition, the relationship between the perceived usefulness and perceived pleasure of these factors of use on intention to use was empirically analyzed through PLS-SEM. As a result of the study, it was found that economic benefits, convenience, sustainability, and sense of belongingness had a significant effect on intention to use through perceived usefulness and enjoyment. This study was meaningful in that it was verified through the study that economic benefits, convenience, sustainability, and a sense of belongingness were significant variables affecting the intention to use through usefulness and pleasure.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.