• Title/Summary/Keyword: Cost information

Search Result 10,989, Processing Time 0.033 seconds

Effect of The Relationship between Flexibilities, Types of Strategies, Characteristics of Management accounting Information on Manufacturing Performance (유연성, 전략유형, 관리회계정보특성간의 관계가 생산성과에 미치는 영향)

  • Jung, Jae-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.218-226
    • /
    • 2014
  • In order to improve manufacturing performance by flexibilities, type of strategies, types of information with manufacturing companies in Korea. This study is based on the situation theory. The variables of flexibility were applied with 'product flexibility' and 'mix flexibility'. 'low-cost strategy' and 'differentiation strategy' were applied at strategy types. Financial information and non-financial information, information attributes are applied at. At this study, product flexibility is significantly influenced the differentiation strategy. Mix flexibility is significantly influenced the low cost strategy. Only the low-cost strategy significantly affected on financial information and non-financial information. financial information and non-financial information were significantly influenced on Productive performance. To achieve the purpose of this study, Structural Equation Model (SEM) has been applied.

How to Design Trade Policy under Asymmetric Information? (비대칭 정보하에 무역정책 설계)

  • Yang Seung Lee
    • Korea Trade Review
    • /
    • v.46 no.2
    • /
    • pp.107-119
    • /
    • 2021
  • Using a trade policy, government can shift profits from foreign firms to domestic firms. This paper will reexamine how asymmetric information can affect the equivalence of tariff and quota in a duopoly, where one domestic firm competes with one foreign firm. It can happen that the domestic firm has informational advantage against the government. Within this framework, the domestic firm has private information about own marginal cost as well as the foreign firm's. The domestic firm would exploit the advantage to draw a favorable policy from the government. When the government is misled, social welfare would decline. This paper will guide how the government can extract information from the domestic firm by offering a menu of tariff or quota. Previous studies showed that quota demands information more than tariff. With the principle of revealed information, the domestic firm chooses tariff (quota) if the marginal cost of foreign firm is low (high). The quota level will be high (low) if the marginal cost of domestic firm is high (low). To prevent misrepresentation, the domestic firm should be charged when quota is implemented. When the quota level is low, the domestic firm is charged additionally. This paper can contribute to the literature of trade policy and information.

Low-Cost IR Sensor-based Localization Using Accumulated Range Information (누적된 거리정보를 이용하는 저가 IR 센서 기반의 위치추정)

  • Choi, Yun-Kyu;Song, Jae-Bok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.8
    • /
    • pp.845-850
    • /
    • 2009
  • Localization which estimates a robot's position and orientation in a given environment is very important for mobile robot navigation. Although low-cost sensors are preferred for practical service robots, they suffer from the inaccurate and insufficient range information. This paper proposes a novel approach to increasing the success rate of low-cost sensor-based localization. In this paper, both the previous and the current data obtained from the IR sensors are used for localization in order to utilize as much environment information as possible without increasing the number of sensors. The sensor model used in the monte carlo localization (MCL) is modified so that the accumulated range information may be used to increase the accuracy in estimating the current robot pose. The experimental results show that the proposed method can robustly estimate the robot's pose in indoor environments with several similar places.

A Novel Certificate Revocation List Distribution for Vehicle Communications in Mobile Communication Networks

  • Dan, Du Anh;Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.109-116
    • /
    • 2017
  • Short-lived pseudonym certificates as vehicle identities could satisfy both security and privacy requirements. However, to remove revoked certificates especially in vehicle communications, pseudonym certificate revocation list (CRL) should be distributed resource-efficiently from a practical deployment point of view and in a timely manner. In this paper, we propose a novel CRL distribution scheme capable of CRL multicast to only activated vehicles registered to the CRL multicast group using the group communication system enabler, namely, the GCSE which is being standardized. The scheme is resource efficient by using CRL distribution paths instead of paging processes to find out multicast vehicle(s) within a certain region. The analyzed results show that the proposed scheme outperforms in terms of paging cost, packets transmission cost, and the processing cost at the respective entities compared to the existing four schemes in the literature.

Specificity and Commitment: UX approach to Netflix

  • Hwang, Joon Suk;Cheon, Youngjoon;Kwak, Kyu Tae
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.127-136
    • /
    • 2017
  • The strategy that using data collection from Netflix uses for its services is different from traditional human interaction and the communication, and it is represented by the systematic algorithm that rooted from intelligent information system based on the human interaction and communication. These characteristics allowed the study to reflect the influence of 'Asset specificity' which affects the continuous consumption of the media services of Netflix users through economic psychological analysis based on transactional cost economics. The result from the survey on actual Netflix users, three types of specificity (Space specificity, time specificity, relational specificity) reduced perceived searching cost whereas perceived instrumentality has increased, eventually reinforces the commitment to the service. This implies that the service characteristics of Netflix, trying to communicate with the individuals based on intelligent information system are distinct from the existing platform services and it gives the significance of work very effective for user's continuous consumption of the media services.

The Strategic Management for Innovation and Competition of Small and Medium Firms (중소기업 기술.경영혁신과 경쟁력우위를 위한 전략경영 -원가절감과 매출액 증대를 중심으로-)

  • Choi Seong-Wook
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.169-186
    • /
    • 2001
  • The strategic management for Innovation and competetion of small and medium firms is practical innovation strategic of cost down and sales increace. Framework of the strategic management for thr forecast of changed industry and formal competetion. Practice and planning to the small and medium firms for innovation, cost down, sales increace, revolution management, etc. The results of study are as follows ; 1) study of pre-model for innovation and competetive advantage. 2) Draw of the creative factor for industrial structure analysis, cost advantage analysis and competetive advantage. 3) Exhibit of the practice model for strategic management approach. 4) Application and modification to the small and medium firms for results of study.

  • PDF

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

Development of a Low-cost Automatic Water Quality Diagnosis System for Cooling Towers (저가형 냉각탑 자동 수질 진단 시스템 개발)

  • Kim, Jung Hwan;Park, Han-Bin;Kang, Taesam;Park, Jungkeun
    • Journal of Sensor Science and Technology
    • /
    • v.23 no.1
    • /
    • pp.58-65
    • /
    • 2014
  • We developed a low-cost automatic diagnosis system for water quality in cooling towers to measure the concentrations of key ingredients such as $Ca^{2+}$, $Cl^-$, $PO{_4}^{3-}$, and $Fe^{2+}$. $Ca^{2+}$, and $Cl^-$ are the main factors that cause the generation of scale, corrosion, and sludge in water pipes. $PO{_4}^{3-}$ prevents corrosion, sludge and scale by inhibiting the ions (i.e., $Ca^{2+}$, $Cl^-$) from sticking to the pipes. $Fe^{2+}$ is an indicator of pipe corrosion. The proposed system consists of a microprocessor, a specimen container and heater, a precision pump, relays and valves, LED optical sources, and photo detectors. It automatically collects water samples and carries out pretreatment for determining the concentration of each chemical, and then estimates the concentration of each ion using low-cost LED optical sources and detectors. Experimental results showed that the accuracy of the proposed system is sufficiently high for water quality diagnosis and management of cooling towers, demonstrating the possibility of the proposed system's wide usage in real environments.

An Efficient Attitude Reference System Design Using Velocity Differential Vectors under Weak Acceleration Dynamics

  • Lee, Byungjin;Yun, Sukchang;Lee, Hyung-Keun;Lee, Young Jae;Sung, Sangkyung
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.17 no.2
    • /
    • pp.222-231
    • /
    • 2016
  • This paper proposes a new method achieving computationally efficient attitude reference system for low cost strapdown sensors and microprocessor platform. The main idea in this method is to define and compare velocity differential vectors, geometrically computed from INS and GPS data with different update rate, for generating attitude error measurements which is further used for filter construction. A quaternion based Kalman filter configuration is applied for the attitude estimation with the adapted measurement model of differential vector comparison. Linearized model for Extended Kalman Filter and low pass filtered characteristics of measurement greatly extend the affordability of the proposed algorithm to the field of simple low cost embedded systems. For performance verification, experiment are done employing a practical low cost MEMS IMU and GPS receiver specification. Performance comparison with a high grade navigation system demonstrated good estimation result.

A User-based MicroPayment System Using Secret Key (비밀키를 이용한 사용자 중심의 소액지불시스템)

  • Baek Seung-Ho;Jeong Yun-Soo;Won Jong-Kwon;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.189-199
    • /
    • 2005
  • Now it is increasing the necessity for micropayment system according to activation for trade on internet. Because of the reason, it is requesting safety for personal information as well as for payment cost. But current micropayment systems cannot support anonymity or have heavy overheads in payment process. This paper suggests a micropayment system to keep anonymity of users and also to keep payment cost safe. The proposed system is to use blind signature anonymous ID which is combined nonce with an encryption of personal information. It also keeps payment cost of users by reconfirmation payment cost and product from certification and increases the computational efficiency by using secret key and session key instead of public key.

  • PDF