• Title/Summary/Keyword: set sharing

Search Result 346, Processing Time 0.028 seconds

The Effects of the Types of Source-Based Trust on Knowledge Sharing of Public Employees: Based on Officials' Perceptions in Local Government (공공조직 구성원의 신뢰기반에 따른 신뢰유형이 지식공유에 미치는 영향 - 지방공무원의 인식수준을 중심으로 -)

  • Kim, Gu
    • Informatization Policy
    • /
    • v.20 no.4
    • /
    • pp.23-50
    • /
    • 2013
  • The main purpose of this study is to empirically examine and to develop the optimal model about an influential relationship between the types of source-based trust and knowledge sharing of local government officials. Procedural and distributive justice-based calculative trust in organization, cognition-based trust in organization, cognition-based trust in supervisor, cognition-based trust in coworkers, and emotion-based trust in coworkers were set up as independent variables of this research model, and sharing of tacit knowledge and explicit knowledge based on the knowledge content as dependent variables. The research results shows that the suitability of each model has approximate value to the required level, and that emotion-based trust in coworkers significantly affects knowledge sharing for both the individual and integrated factors in hypothetical influential relationship. This study is expected to help to enable knowledge sharing in various situations by dividing the concepts of trust that affect knowledge sharing into a few types, and deriving the influential model of knowledge sharing by types.

  • PDF

A typology of Collaboration Modes for Scientific and Technological Knowledge Production and Sharing (과학기술지식 생산과 공유를 위한 협력 유형분류체계)

  • Hwang, Kumju
    • Knowledge Management Research
    • /
    • v.11 no.2
    • /
    • pp.133-152
    • /
    • 2010
  • This paper suggests a typology of the modes of collaboration for scientific and technological knowledge production and sharing (STKPS) based on knowledge communication types, including organizational factors, communication channel, intensity, and decision-making, that affect STKPS processes. It is mainly designed to rearrange ideas about collaboration drawn from the literature in order to develop a conceptual framework for categorizing modes of collaboration based on how communication patterns shape four modes of collaboration. In the conclusion and discussion part, practical implications, limitations of this study, and further studies are discussed. In particular, the practical implications propose communication patterns suitable for five stages of collaboration processes. As the collaboration initiation or set-up stage is critical, extensive face-to-face communication is recommended in the auditing stage. In the execution stage, media-based communication can be actively utilized, because collaborators will mostly exchange explicit codified knowledge supported by IT. The evaluation and reinforcement stages concentrate on tacit knowledge exchange and explicit knowledge evaluation, which requires intensive face-to-face communication including negotiations for evaluating collaboration outcomes and partnership.

  • PDF

New buffer mapping method for Hybrid SPM with Buffer sharing (하이브리드 SPM을 위한 버퍼 공유를 활용한 새로운 버퍼 매핑 기법)

  • Lee, Daeyoung;Oh, Hyunok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.4
    • /
    • pp.209-218
    • /
    • 2016
  • This paper proposes a new lifetime aware buffer mapping method of a synchronous dataflow (SDF) graph on a hybrid memory system with DRAM and PRAM. Since the number of write operations on PRAM is limited, the number of written samples on PRAM is minimized to maximize the lifetime of PRAM. We improve the utilization of DRAM by mapping more buffers on DRAM through buffer sharing. The problem is formulated formally and solved by an optimal approach of an answer set programming. In experiment, the buffer mapping method with buffer sharing improves the PRAM lifetime by 63%.

The Effect of Power Type within Supply Chain on the Information Capability: Perspective of CSV Value Creation (공급사슬 내의 파워유형이 정보역량에 미치는 영향: CSV 가치창출 관점)

  • Park, Kwang-O;Chang, Hwal-Sik;Jung, Dae-Hyun
    • The Journal of Information Systems
    • /
    • v.27 no.3
    • /
    • pp.1-24
    • /
    • 2018
  • Purpose The purpose of this study is to attempt to incorporate power theory to evaluate information capability of SCM adopters. Therefore, this study focuses on the relationship of information sharing, partnership quality, and information capacity according to the power intensity of the variables of SCM. and CSV value creation. Design/methodology/approach The questionnaire of SCM builder was conducted and 302 samples were analyzed. Based on the theoretical background of power and information capacity, we set up a structural equation model. Hypothesis testing and statistical analysis were done through AMOS and SPSS. Findings First, it shows that the compensation power among the constrained power has a positive effect on the partnership quality, and the legitimacy power has the positive influence only on the information sharing. Compulsive power, compensation, and legitimacy, which are generally restrictive powers, may reduce the quality of information sharing and partnership, but the results of this study are rather higher. Second, both non-binding power expertise and criterion have a positive effect on information sharing and partnership quality. Third, information sharing has a positive effect on partnership quality. Supporting a number of research results, it is well reflected in SCM attributes where interdependence is important. Fourth, information sharing and partnership quality have a positive effect on information capacity. Information literacy has become an essential element in modern management. Fifth, the enhancement of CSV value creation plays a role of a controlling variable to further strengthen information sharing through non - binding power attribute, expertise and conformity. In addition, the strengthening of CSV value creation has been shown to play a role as a controlling variable to further strengthen the quality of partnership through the non-binding power attribution, but expertise has been rejected.

SOME RESULTS ON THE UNIQUE RANGE SETS

  • Chakraborty, Bikash;Kamila, Jayanta;Pal, Amit Kumar;Saha, Sudip
    • Journal of the Korean Mathematical Society
    • /
    • v.58 no.3
    • /
    • pp.741-760
    • /
    • 2021
  • In this paper, we exhibit the equivalence between different notions of unique range sets, namely, unique range sets, weighted unique range sets and weak-weighted unique range sets under certain conditions. Also, we present some uniqueness theorems which show how two meromorphic functions are uniquely determined by their two finite shared sets. Moreover, in the last section, we make some observations that help us to construct other new classes of unique range sets.

A PROCESSOR SHARING MODEL FOR COMMUNICATION SYSTEMS

  • Lim, Jong Seul;Park, Chul Guen;Ahn, Seong Joon;Lee, Seoyoung
    • Journal of applied mathematics & informatics
    • /
    • v.15 no.1_2
    • /
    • pp.511-525
    • /
    • 2004
  • we model communication and computer systems that process interactive and several and several types of background jobs. The scheduling policy in use is to share the processor among all interactive jobs and, at most, one background job of each type at a time according to the process sharing discipline. Background jobs of each type are served on a first-come-first-served basis. Such scheduling policy is called Processor Sharing with Background jobs (PSBJ). In fact, the PSBJ policy is commonly used on many communication and computer systems that allow interactive usage of the systems and process certain jobs in a background mode. In this paper, the stability conditions for the PSBJ policy are given and proved. Since an exact analysis of the policy seems to be very difficult, an approximate analytic model is proposed to obtain the average job sojourn times. The model requires the solution of a set of nonlinear equations, for which an iterative algorithm is given and its convergence is proved. Our results reveal that the model provides excellent estimates of average sojourn times for both interactive and background jobs with a few percent of errors in most of the cases considered.

Load Sharing Control by Following Average Torque Current in Continuous Casting (연속 주조 공정에서 평균 토크전류 추종에 의한 인발력 분배 제어)

  • Chun, Chang-Keun;Kim, Cheul-U
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.3
    • /
    • pp.74-80
    • /
    • 2004
  • If the withdrawal force of strand driven roll which is controlled with predetermined speed isn't distributed regularly in continuous casting process, mold level is changed cyclically and slab quality is not good. In this paper, both casting speed control and load sharing control algorithm of strand driven roll according to ratio which is set up by operator at same time is proposed. The proposed algorithm is to share the withdrawal force by following torque current of each driven roll as average torque current by changing speed reference of each driven roll motor. The load sharing control with anti-wind up for improvement transient state is adopted and the proposed algorithm is implemented in POSCO pilot caster.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

A Study of Factors Affecting Intention to Use Mobility Sharing Service (공유 모빌리티 서비스의 이용의도에 영향을 미치는 요인에 관한 연구)

  • Kim, Yong Seok;Pi, Chae Hee;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.73-87
    • /
    • 2021
  • The COVID-19 pandemic has brought about many changes in our daily lives and in industries as a whole. The most notable change was the spread of the untact culture to minimize face-to-face contact. The spread of the untact culture has changed the use of public transportation. Looking at the results of previous SARS and MERS studies, it was found that as the pandemic spreads, the use of public transportation decreased. Recently, the mobility sharing service is attracting attention as a personalized means of transportation instead of public transportation. Therefore, in this study, the factors affecting the intention to use the mobility sharing service were to be identified by the actual users. In this study, economic benefit, convenience, sustainability, and sense of belonging were set as independent variables based on previous studies. In addition, the relationship between the perceived usefulness and perceived pleasure of these factors of use on intention to use was empirically analyzed through PLS-SEM. As a result of the study, it was found that economic benefits, convenience, sustainability, and sense of belongingness had a significant effect on intention to use through perceived usefulness and enjoyment. This study was meaningful in that it was verified through the study that economic benefits, convenience, sustainability, and a sense of belongingness were significant variables affecting the intention to use through usefulness and pleasure.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.