• Title/Summary/Keyword: sign systems

Search Result 369, Processing Time 0.025 seconds

The Financial Impact Generated by Shifts in Value Strategic Emphasis (가치전략 중점의 변화가 재무성과에 미치는 영향)

  • Hong, Kichul;Park, Kwangho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.26-39
    • /
    • 2016
  • Korea's main manufacturing industries, which have led its economy for the past three decades, are faced with a serious downturn and loss of competitive advantages due to the current economic depression, China's rise, and the drop of oil prices. Korean business firms must adopt the paradigm shift in their value strategies, along with a government-led industrial restructuring in order to gain sustainable competitive advantages. Business firms allocate their limited resources between value creation and value appropriation, however, what effect does strategic emphasis on value creation versus value appropriation have on a business firm's financial performance? This paper empirically addresses this issue by examining the effect of shifts in strategic emphasis on stock return. Furthermore, this study examines appropriate choices of strategic emphasis to gain differential financial performance. The data set used in this regression analysis comes from the KISLINE database of NICE Information Service. The variables that form the basis of this analysis are stock return, ROA, and Strategic Emphasis [(advertising expenditures-R&D expenditures)/assets]. The interactive effect with situational factors regarding the firm and the type of technological environment in which the firm is operating was also analyzed. Our results show that investors acknowledge a shift of strategic emphasis as a sign of stock valuation. In comparison to US, Korean business firms have weak value creation capabilities in high-technology industries, and weak value appropriation capabilities in low-technology industries. This proves Korean firms are fast followers in the global market. Our findings suggest that Korean firms have to adopt a balanced value strategy, nurturing value creation and developing value appropriation for overcoming the current economic downturn and becoming a first mover in the dawn of "Industry 4.0."

Corporate Vertical Coordination, and Farmer's Land Use in Contract Farming Relations between Discount Store and Contract Farmers: A Case Study of the Watermelon Farming District in Buyeo-gun, Chungcheongnam-do (대형마트와 농가 간 계약생산에서 계약기업의 수직적 조정과 계약농가의 토지이용: 충청남도 부여군 일대 수박 주산지를 사례로)

  • Jang, YoungJin
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.19 no.4
    • /
    • pp.712-728
    • /
    • 2016
  • This study examines the foundations of contract farming, the extent of corporate vertical coordination, and farmer's land use in regards to the contract farming between discount store and watermelon farmers in Buyeo-gun, Chungcheongnam-do. In the above case, contract farming is led by the group of producers. As the corporate's role is limited due to the specification of watermelon breed, contract farming takes the form of procurement contract with restrained levels of corporate vertical coordination. Thus, it has become common for contract farmers to freely enter and leave contracts and sign contracts with multiple clients. Furthermore, farmers participate in contract farming by using contract breeds in existing crop rotation systems. Through this process, watermelon farming is undergoing a process of diversification via the spread of contract varieties in this region.

Genetic diversity and structure of natural populations of Picea jezoensis in South Korea

  • Lee, Seok Woo;Yang, Byeong Hoon;Hur, Seong Doo;Lee, Jung Joo;Song, Jeong Ho;Moriguchi, Yoshinari
    • Journal of Korean Society of Forest Science
    • /
    • v.97 no.2
    • /
    • pp.187-195
    • /
    • 2008
  • Picea jezoensis (Sieb. et Zucc.) Carriere is one of the major and widespread components of the cold-temperate and boreal forests in Russian Far East, northeast China, Korea, and Japan. However, it is restricted to a highly fragmented range in South Korea with small populations. Mean expected heterozygosity $(H_e)$ based on 22 loci in 11 isozyme systems was 0.077 for four sampled populations that covered the whole distribution range of P. jezoensis in South Korea. This value is within the range reported for conifers, but it is very low compared to that of other spruce species as well as that of P. jezoensis populations in Russian Far East. Most populations had a slight excess of heterozygotes and the Wright's $F_{IS}$ (-0.019) was comparable to that previously reported for other spruce species. In all of the four populations, the Wilcoxon sign-rank test indicated no greater heterozygosity than that expected for populations at mutation-drift equilibrium, suggesting that the populations have not been bottlenecked recently. Despite a fragmented range and isolated populations, population differentiation was not high $(F_{ST}=0.047)$ and the number of migrants per generation was 5.09. Nei's genetic distances were also small $({\bar{D}}=0.005)$ but strongly related to geographic distances between populations, suggesting an Isolation by Distance. The northernmost isolate, Mt. Gyebang population was genetically distinct from the other three populations. Implications for the conservation of genetic variation of P. jezoensis in South Korea were discussed.

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing

  • Hundera, Negalign Wake;Mei, Qian;Xiong, Hu;Geressu, Dagmawit Mesfin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.455-472
    • /
    • 2020
  • As a user in modern societies with the rapid growth of Internet environment and more complicated business flow processes in order to be effective at work and accomplish things on time when the manager of the company went for a business trip, he/she need to delegate his/her signing authorities to someone such that, the delegatee can act as a manager and sign a message on his/her behalf. In order to make the delegation process more secure and authentic, we proposed a secure and efficient identity-based proxy signcryption in cloud data sharing (SE-IDPSC-CS), which provides a secure privilege delegation mechanism for a person to delegate his/her signcryption privilege to his/her proxy agent. Our scheme allows the manager of the company to delegate his/her signcryption privilege to his/her proxy agent and the proxy agent can act as a manager and generate signcrypted messages on his/her behalf using special information called "proxy key". Then, the proxy agent uploads the signcrypted ciphertext to a cloud service provider (CSP) which can only be downloaded, decrypted and verified by an authorized user at any time from any place through the Internet. Finally, the security analysis and experiment result determine that the proposed scheme outperforms previous works in terms of functionalities and computational time.

Development of Control Algorithm for Intersection Safety System Using the Fusion of V2X and Environmental Sensors (V2X 및 환경 센서 융합 기반 교차로 안전 시스템 알고리즘 개발)

  • Park, Manbok;Lee, Sanghyun;Jun, Sibum;Kee, Seokcheol;Kim, Jungbeom;Kee, Changdon;Kim, Kyuwon;Yi, Kyongsu
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.22 no.5
    • /
    • pp.126-135
    • /
    • 2014
  • This paper describes the development and verification of control algorithms for V2X and environmental sensor integrated intersection support and safety systems. The objective of the research is to develop core technologies for effective fusion of V2X and environmental sensors and to develop new safety function for intersection safety. One of core technologies is to achieve the improvement of GPS accuracy, and the other is to develop the algorithm of a vehicle identification which matches all data from V2X, vehicle sensors and environmental sensors to specific vehicles. A intersection optimal pass (IOP) algorithm is designed based on these core technologies. IOP recommends appropriate speed to pass the intersection in the consideration of traffic light signal and preceeding vehicle existence. Another function is developed to prevent a collision avoidance when car crash caused by traffic violation of surrounding vehicles is expected. Finally all functions are implemented and tested in three test vehicles. It is shown that IOP can support convenient and comfortable driving with recommending optimal pass speed and collision avoidance algorithm can effectively prevent collision caused by traffic sign violation of surrounding vehicles.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

An Authentication Protocol using Fuzzy Signature Vault Scheme (퍼지서명볼트스킴을 이용한 인증 프로토콜)

  • Moon, Hyun-Yi;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.4
    • /
    • pp.172-177
    • /
    • 2008
  • In this paper, we design an authentication protocol based on Fuzzy Signature Vault Scheme using a light signature feature extraction method for user convenience and efficiency of electronic commerce. The signature is used broadly in electronic commerce because it is one of the simple and low-cost biometric items. However, signature has a problem that there are few low-cost and safe protocols. To solve this problem, we design a feature extraction method which is adequate for characters of signature and Fuzzy Vault Scheme. In addition, we design and analyze an efficient authentication protocol with some parameters used in this procedure. The followings are advantages when this protocol is applied to authentication procedure; 1) using convenient and low-cost signatures, 2) being possible to verify users with spending only about second for signature processing and authentication, 3) one time on transmission for sign-in and verification and 4) getting user authentication with secret value at the same time.

Privilege Delegation Protocol Providing Delegation Traceability Using ID-based Cryptosystem in X.509 Proxy Certificate Environment (X.509 대리 인증서 환경에서 위임 추적 기능을 제공하는 ID 기반 암호 시스템 기반 권한 위임 프로토콜)

  • Lee, Youn-Ho;Kim, Byung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.441-451
    • /
    • 2008
  • Currently, the X.509 proxy certificate is widely used to delegate an entity's right to another entity in the computational grid environment. However it has two drawbacks: the potential security threat caused by intraceability of a delegation chain and the inefficiency caused by an interactive communication between the right grantor and the right grantee on the delegation protocol. To address these problems for computational grids, we propose a new delegation protocol without additional cost. We use an ID-based key generation technique to generate a proxy private key which is a means to exercise the delegated signing right. By applying the ID-based key generation technique, the proposed protocol has the delegation traceability and the non-interactive delegation property. Since the right delegation occurs massively in the computational grid environment, our protocol can contribute the security enhancement by providing the delegation traceability and the efficiency enhancement by reducing the inter-domain communication cost.

Method for Designing VMS Messages Based on Drivers' Legibility Performance (운전자 판독능력을 고려한 VMS 메시지 설계 방법론 개발 및 적용)

  • Kim, Seong-Min;O, Cheol;Jang, Myeong-Sun;Kim, Tae-Hyeong
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.3
    • /
    • pp.99-109
    • /
    • 2007
  • Variable message signs (VMS), which are used for providing real-time information on traffic conditions and accident occurrences, are one of the important components of intelligent transportation systems VMS messages need to meet human factor requirements: messages should be readable and understandable while driving. Lab-controlled experiments on VMS messages were conducted to obtain useful data for analyzing drivers' responsive characteristics for VMS messages. Binary logistic regression (BLR) modeling techniques were applied to explore the relationships among drivers' message perceptions, message reading time, and amount of VMS messages. Probabilistic outcomes of the proposed BLR-based perception model could be greatly utilized to design VMS messages considering drivers' legibility performance. The major contribution of this study is to develop invaluable statistical models that can be used in designing VMS messages more effectively from the human factor point of view. The results could be further applied to establish the scheme of VMS message phase and duration.

3D LIDAR Based Vehicle Localization Using Synthetic Reflectivity Map for Road and Wall in Tunnel

  • Im, Jun-Hyuck;Im, Sung-Hyuck;Song, Jong-Hwa;Jee, Gyu-In
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.6 no.4
    • /
    • pp.159-166
    • /
    • 2017
  • The position of autonomous driving vehicle is basically acquired through the global positioning system (GPS). However, GPS signals cannot be received in tunnels. Due to this limitation, localization of autonomous driving vehicles can be made through sensors mounted on them. In particular, a 3D Light Detection and Ranging (LIDAR) system is used for longitudinal position error correction. Few feature points and structures that can be used for localization of vehicles are available in tunnels. Since lanes in the road are normally marked by solid line, it cannot be used to recognize a longitudinal position. In addition, only a small number of structures that are separated from the tunnel walls such as sign boards or jet fans are available. Thus, it is necessary to extract usable information from tunnels to recognize a longitudinal position. In this paper, fire hydrants and evacuation guide lights attached at both sides of tunnel walls were used to recognize a longitudinal position. These structures have highly distinctive reflectivity from the surrounding walls, which can be distinguished using LIDAR reflectivity data. Furthermore, reflectivity information of tunnel walls was fused with the road surface reflectivity map to generate a synthetic reflectivity map. When the synthetic reflectivity map was used, localization of vehicles was able through correlation matching with the local maps generated from the current LIDAR data. The experiments were conducted at an expressway including Maseong Tunnel (approximately 1.5 km long). The experiment results showed that the root mean square (RMS) position errors in lateral and longitudinal directions were 0.19 m and 0.35 m, respectively, exhibiting precise localization accuracy.