• Title/Summary/Keyword: Technology Sharing

Search Result 2,060, Processing Time 0.029 seconds

An Empirical Study on the Impacts of Electronic Information Sharing on Performance between Shipping Company and Container Terminal (해운회사와 컨테이너터미널 간 전자적 정보공유가 성과에 미치는 영향)

  • Choi, Jong-Ick;Chang, Myung-Hee
    • Journal of Navigation and Port Research
    • /
    • v.31 no.8
    • /
    • pp.741-750
    • /
    • 2007
  • The purposes of the study are as follows; First, to find out valid variables from preceding studies which expedite and revitalize the electronic information sharing between shipping company and container terminal and (to) verify the effect empirically. Second, to examine the impacts of electronic information sharing between shipping company and container terminal on performance by empirical research. The results are as follows; First, the degree of support by the CEO, the stage of information technology infrastructure, committment and dependence were proved as valid factors affecting the electronic information sharing between shipping company and container terminal. Second, it was proved that the electronic information sharing between shipping company and container terminal has influenced on the performance.

A Design and Implementation of a Wireless Audio Sharing (WASH) System (Wireless Audio Sharing (WASH) 시스템 설계 및 구현)

  • Son, Ji-Yeon;Kim, Myung-Gyu;Yang, Il-Sik;Park, Jun-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.139-148
    • /
    • 2006
  • Recently with the advancement of local wireless communication technologies, digital trends of audio contents and devices are paving the way for new experiences to network-based audio streaming services. In this paper, we present the Wireless Audio Sharing (WASH) technology over Bluetooth and Wireless Local Area Network (WLAN). WASH system provides an audio sharing mechanism over multiple users and also provides stereo audio streaming between Bluetooth-enabled devices and Universal Plug and Play (UPnP) media devices connected to wired/wireless LANs. To achieve these, we extended the Bluetooth audio distribution profile and combined the extended profile with the UPnP AV architecture. With the implementation of this WASH technology, we show some experimental results of the stereo audio streaming in a real environment.

Automation System for Sharing CDM Data (CDM 데이터 공유를 위한 자동화 시스템)

  • Jeong, Chae-Eun;Kang, Yunhee;Park, Young B.
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.3-9
    • /
    • 2020
  • As the need for sharing for research purposes in the medical field increases, the use of a Common Data Model (CDM) is increasing. However, when sharing CDM data, there are some problems in that access control and personal information in the data are not protected. In this paper, in order to solve this problem, access to CDM data is controlled by using an encryption method in a blockchain network, and information of CDM data is recorded to enable tracking. In addition, IPFS was used to share a large amount of CDM data, and Celery was used to automate the sharing process. In other words, we propose a multi-channel automation system in which the information required for CDM data sharing is shared by a trust-based technology, a distributed file system, and a message queue for automation. This aims to solve the problem of access control and personal information protection in the data that occur in the process of sharing CDM data.

  • PDF

Group Key Management based on (2, 2) Secret Sharing

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Kuo, Wen-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1144-1156
    • /
    • 2014
  • In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services may require secure multicast to protect integrity and confidentiality of the group traffic, and validate message authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose a group key management scheme based on the secret sharing technology to require each member by itself to generate the group key when receiving a rekeying message multicast by the group key distributor. The proposed scheme enforces mutual authentication between a member and the group key distributor while executing the rekeying process, and provides forward secrecy and backward secrecy properties, and resists replay attack, impersonating attack, group key disclosing attack and malicious insider attack.

The content based standard data search technology under CALS integrated data environment (국방 CALS 통합 데이터 환경을 위한 내용 기반의 표준 데이터 검색 기술 개발)

  • Jeong, Seung-Uk;U, Hun-Sik
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.261-283
    • /
    • 2004
  • To build up the military strength based on information oriented armed forces, the Korean ministry of national defense (MND) promotes the defense CALS (Continuous Acquisition and Life cycle Support) initiative for the reductions of acquisition times, improvements of system qualities, and reductions of costs. These defense CALS activities are the major component of the underlying mid and long term defense digitization program and the ultimate goal of program is to bring a quick victory by providing real-time battlefield intelligence and the economical operations of the military. The concept of defense CALS is to automate the acquisition and disposition of defense systems throughout their life cycle. For implementing defense CALS, the technology for exchange and sharing CALS standard data that is created once and used many times should be considered. In order to develop an efficient CALS information exchange and sharing system, it is required to integrate distributed and heterogeneous data sources and provide systematic search tools for those data. In this study, we developed a content based search engine technology which is essential for the construction of integrated data environments. The developed technology provides the environment of sharing the CALS standard data such as SGML(Standard Generalized Markup Language) and STEP(Standard for The Exchange of Product model data). Utilizing this technology, users can find and access distributed and heterogeneous data sources without knowing its actual location.

  • PDF

Green Supply Chain Integration and Technology Innovation Performance in SMEs: A Case Study in Indonesia

  • EFFENDI, Mohamad Irhas;WIDJANARKO, Hendro;SUGANDINI, Dyah
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.909-916
    • /
    • 2021
  • The purpose of the research to analyze SMEs' technological innovation performance in the Special Region of Yogyakarta based on green supply chains. This study's technology innovation performance is influenced by environmental management practices, green supply chain integration, and supply chain knowledge-sharing. This research is important because many SMEs are underdeveloped in terms of technology innovation performance. Technology innovation performance shows that innovation has a multi-dimensional ecological performance in organizations. Therefore, SMEs' sustainable supply chain could be achieved by managing operations, support, and information by focusing on environmental and social issues to maximize the entire chain. This study used primary data. The number of respondents in this study was 200 SMEs that have implemented green supply chain management practices. The data collection method used was a questionnaire. The data analysis technique tool used is a two-step approach to SEM-AMOS. The results of this study indicate that SMEs are willing to implement a green supply chain to increase their performance. The technological innovation performance model of this study is acceptable. The findings of this research suggest that companies must be encouraged to maintain and increase the implementation of green supply chain integration and better supply chain knowledge-sharing with improved technological innovation performance enhancements.

Impacts of Buyer-Supplier Cooperation on Trust and Performance: Moderating Role of Governance Mechanism (구매자와 공급자 간 협력활동이 신뢰 및 성과에 미치는 영향: 거버넌스의 조절효과를 중심으로)

  • Kim, Kyung-Tae;Hui, Liang;Lee, Jung-Seung
    • Journal of Distribution Science
    • /
    • v.14 no.8
    • /
    • pp.113-121
    • /
    • 2016
  • Purpose - This paper aims to examine the impact of buyer-supplier cooperation on suppliers' trust on buyers and the moderating role of buyers' governance mechanism between the sharing activities and trust. Research design, data, and methodology - An integrated research model is designed to materialize the research hypotheses. First, the impact of buyer-supplier cooperation is empirically analyzed by looking into how the sharing activities, in the field of information, resource, and knowledge, of buyer with supplier will affect the trust of supplier on buyer. Second, the moderating effect of contract-based governance mechanism of buyer is empirically analyzed. Third, the influence of trust on innovation performance of suppler is empirically analyzed. Results - Our findings provide supporting evidence for some of our hypotheses. First, all of the sharing activities are significantly influential, but in different degree, to trust of supplier. Second, contract-based governance mechanism of buyer have a moderating effect on the relationship between sharing activities and trust, positively in resource-sharing activities, negatively in information-sharing activities, not significant in knowledge-sharing activities. Third, supplier's trust on buyer positively affects supplier's own innovation performance. Conclusions - The strategies applied in supply chain management have become important as the competition among firms has shifted from competition between individual firms to competition between supply chains. A customer's sharing activities with its supplier may contribute to an increase in innovation performance. The supplier's information-sharing activity with its customer could affect its information-sharing activities with its main supplier. Cooperative activity with a partner in the supply chain is cultivated and amassed into relationship knowledge, and this study shows that the cooperative relational knowledge related to information-sharing activities enables firms to participate in sharing activities with their main suppliers. Increasing evidence shows that sharing various activities between buyer and supplier improves trust and performance outcomes, and enables firms to maintain competitive advantage. From the perspective of knowledge theory, external knowledge is becoming more important in firms' innovation activities, because innovative knowledge is acquired primarily through interaction with another organization. In addition, relationship learning could be an important tool in absorbing the supplier's core technology, information, expertise, and core competencies, increasing relational value.

A Study on Rapid Prototyping using VRML Model

  • Kim, Ho-Chan;Park, Hong-Tae;Lee, Hyoung-Kook;Lee, Seok-Hee
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.3 no.2
    • /
    • pp.5-14
    • /
    • 2002
  • Internet becomes very common tool far communication and data sharing. Virtual readily(VR) on web browser, and virtual prototyping and virtual manufacturing is widely used in many engineering fields. The reduction of overall development process and error minimization during data conversion becomes very crucial where sharing data via Internet and VR. This paper deals with the advantage and disadvantage of VRML format used in RP(Rapid Prototyping), and a software for RP data preparation is developed. If VRML format as an international standard for VR, is replaced with STL format, the weak points of STL formal can be overcome and the technique related to virtual prototyping and virtual manufacturing can be addressed more systematically by sharing the data. The system developed in this work shows a good window to get access to a mare realistic observation of an object for an RP system from a long remote sites in a more systematic way.

Effects of Bearing Internal Clearance on the Load Distribution and Load Sharing in the Pitch Reducer for Wind Turbines (베어링 내부 틈새가 풍력발전기용 피치 감속기의 하중 분포와 하중 분할에 미치는 영향 분석)

  • Kim, Jeong-Kil;Park, Young-Jun;Lee, Geun-Ho;Kim, Jae-Hoon
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.22 no.1
    • /
    • pp.29-35
    • /
    • 2013
  • The pitch reducer consists of several planetary gearsets, and they should have good load distribution over gear tooth flank and load sharing among the planets to improve the durability. This work investigates how bearing internal clearances influence both the load distribution over the gear tooth flank and the planet load sharing. A whole system model is developed to analyze a pitch reducer. The model includes non-linear mesh stiffness of gears, non-linear stiffness of bearings. The results indicate that the face load factor and mesh load factor decrease, and the fatigue life of output shaft bearings increase as bearing internal clearances of output shaft decrease. Therefore, the internal clearance of output shaft bearing must be considered when designing the pitch reducer for wind turbines.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.