• Title/Summary/Keyword: WeWhere

Search Result 14,362, Processing Time 0.045 seconds

A Study on the Process Capability Model of Knowledge Management (지식경영 프로세스 능력 모델 개발 연구)

  • Kim, Hyun-Soo
    • Asia pacific journal of information systems
    • /
    • v.11 no.3
    • /
    • pp.23-42
    • /
    • 2001
  • Recently, knowledge management becomes a core management tool for efficient and effective organizations. However, there are little known researches on measuring knowledge management level. The objective of this paper is to develop a process capability model for knowledge management of an organization. We developed 5 stage process capability model for knowledge management. The 1st stage is the initial stage where no significant knowledge management activity is performed. The 2nd stage is the performed stage where planning and tracking activities are performed on organization level. The 3rd stage is the established, and the 4th stage is the predictable stage where processes and results of knowledge management can be predictable. Final stage is the optimizing stage where knowledge management process is continuously improved at an organizational level. We surveyed 37 korean companies to test the validity of the proposed stage model. Statistical tests show that the developed stage model of knowledge management is valid and sound in general conditions. The result of this study on process capability model can be a solid stepping stone for future works in this area.

  • PDF

WEAK AND STRONG CONVERGENCE CRITERIA OF MODIFIED NOOR ITERATIONS FOR ASYMPTOTICALLY NONEXPANSIVE MAPPINGS IN THE INTERMEDIATE SENSE

  • Banerjee, Shrabani;Choudhury, Binayak Samadder
    • Bulletin of the Korean Mathematical Society
    • /
    • v.44 no.3
    • /
    • pp.493-506
    • /
    • 2007
  • In this paper weak and strong convergence theorems of modified Noor iterations to fixed points for asymptotically nonexpansive mappings in the intermediate sense in Banach spaces are established. In one theorem where we establish strong convergence we assume an additional property of the operator whereas in another theorem where we establish weak convergence assume an additional property of the space.

GEOMETRIC ERGODICITY AND TRANSIENCE FOR NONLINEAR AUTOREGRESSIVE MONELS

  • Lee, Oe-Sook
    • Communications of the Korean Mathematical Society
    • /
    • v.10 no.2
    • /
    • pp.409-417
    • /
    • 1995
  • We consider the $R^k$-valued $(k \geq 1)$ process ${X_n}$ generated by $X_n + 1 = f(X_n)+e_{n+1}$, where $f(x) = (h(x),x^{(1)},x^{(1)},\cdots,x{(k-1)})'$. We assume that h is a real-valued measuable function on $R^k$ and that $e_n = (e'_n,0,\cdot,0)'$ where ${e'_n}$ are independent and identically distributed random variables. We obtained a practical criteria guaranteeing a given process to be geometrically ergodic. Sufficient condition for transience is also given.

  • PDF

A NEW ATTACK ON THE KMOV CRYPTOSYSTEM

  • Nitaj, Abderrahmane
    • Bulletin of the Korean Mathematical Society
    • /
    • v.51 no.5
    • /
    • pp.1347-1356
    • /
    • 2014
  • In this paper, we analyze the security of the KMOV public key cryptosystem. KMOV is based on elliptic curves over the ring $\mathbb{Z}_n$ where n = pq is the product of two large unknown primes of equal bit-size. We consider KMOV with a public key (n, e) where the exponent e satisfies an equation ex-(p+1)(q+1)y = z, with unknown parameters x, y, z. Using Diophantine approximations and lattice reduction techniques, we show that KMOV is insecure when x, y, z are suitably small.

THE DIMENSION OF THE CONVOLUTION OF BIPARTITE ORDERED SETS

  • Bae, Deok-Rak
    • Journal of the Korean Mathematical Society
    • /
    • v.36 no.3
    • /
    • pp.633-648
    • /
    • 1999
  • In this paper, for any two bipartite ordered sets P and Q, we define the convolution P * Q of P and Q. For dim(P)=s and dim(Q)=t, we prove that s+t-(U+V)-2 dim(P*Q) s+t-(U+V)+2, where U+V is the max-mn integer of the certain realizers. In particular, we also prove that dim(P)=n+k- {{{{ { n+k} over {3 } }}}} for 2 k n<2k and dim(Pn ,k)=n for n 2k, where Pn,k=Sn*Sk is the convolution of two standard ordered sets Sn and Sk.

  • PDF

ON OPERATORS T COMMUTING WITH CT C WHERE C IS A CONJUGATION

  • Cho, Muneo;Ko, Eungil;Lee, Ji Eun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.57 no.1
    • /
    • pp.69-79
    • /
    • 2020
  • In this paper, we study the properties of T satisfying [CTC, T] = 0 for some conjugation C where [R, S] := RS - SR. In particular, we show that if T is normal, then [CTC, C] = 0. Moreover, the class of operators T satisfy [CTC, T] = 0 is norm closed. Finally, we prove that if T is complex symmetric, then T is binormal if and only if [C|T|C, |T|] = 0.

ASYMPTOTIC FOR THE NUMBER OF STAR OPERATIONS ON ONE-DIMENSIONAL NOETHERIAN DOMAINS

  • Spirito, Dario
    • Journal of the Korean Mathematical Society
    • /
    • v.58 no.5
    • /
    • pp.1239-1260
    • /
    • 2021
  • We study the set of star operations on local Noetherian domains D of dimension 1 such that the conductor (D : T) (where T is the integral closure of D) is equal to the maximal ideal of D. We reduce this problem to the study of a class of closure operations (more precisely, multiplicative operations) in a finite extension k ⊆ B, where k is a field, and then we study how the cardinality of this set of closures vary as the size of k varies while the structure of B remains fixed.

THE ${M_1},{M_/2}/G/l/K$ RETRIAL QUEUEING SYSTEMS WITH PRIORITY

  • Choi, Bong-Dae;Zhu, Dong-Bi
    • Journal of the Korean Mathematical Society
    • /
    • v.35 no.3
    • /
    • pp.691-712
    • /
    • 1998
  • We consider an M$_1$, M$_2$/G/1/ K retrial queueing system with a finite priority queue for type I calls and infinite retrial group for type II calls where blocked type I calls may join the retrial group. These models, for example, can be applied to cellular mobile communication system where handoff calls have higher priority than originating calls. In this paper we apply the supplementary variable method where supplementary variable is the elapsed service time of the call in service. We find the joint generating function of the numbers of calls in the priority queue and the retrial group in closed form and give some performance measures of the system.

  • PDF

A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption

  • Truong, Nguyen Huy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2258-2274
    • /
    • 2020
  • In this paper we first propose a new cryptosystem based on our data hiding scheme (2,9,8) introduced in 2019 with high security, where encrypting and hiding are done at once, the ciphertext does not depend on the input image size as existing hybrid techniques of cryptography and steganography. We then exploit our automata approach presented in 2019 to design two algorithms for exact and approximate pattern matching on secret data encrypted by our cryptosystem. Theoretical analyses remark that these algorithms both have O(n) time complexity in the worst case, where for the approximate algorithm, we assume that it uses ⌈(1-ε)m)⌉ processors, where ε, m and n are the error of our string similarity measure and lengths of the pattern and secret data, respectively. In searchable encryption, our cryptosystem is used by users and our pattern matching algorithms are performed by cloud providers.

ESTIMATES FOR RIESZ TRANSFORMS ASSOCIATED WITH SCHRÖDINGER TYPE OPERATORS

  • Wang, Yueshan
    • Bulletin of the Korean Mathematical Society
    • /
    • v.56 no.5
    • /
    • pp.1117-1127
    • /
    • 2019
  • Let ${\mathcal{L}}_2=(-{\Delta})^2+V^2$ be the $Schr{\ddot{o}}dinger$ type operator, where nonnegative potential V belongs to the reverse $H{\ddot{o}}lder$ class $RH_s$, s > n/2. In this paper, we consider the operator $T_{{\alpha},{\beta}}=V^{2{\alpha}}{\mathcal{L}}^{-{\beta}}_2$ and its conjugate $T^*_{{\alpha},{\beta}}$, where $0<{\alpha}{\leq}{\beta}{\leq}1$. We establish the $(L^p,\;L^q)$-boundedness of operator $T_{{\alpha},{\beta}}$ and $T^*_{{\alpha},{\beta}}$, respectively, we also show that $T_{{\alpha},{\beta}}$ is bounded from Hardy type space $H^1_{L_2}({\mathbb{R}}^n)$ into $L^{p_2}({\mathbb{R}}^n)$ and $T^*_{{\alpha},{\beta}}$ is bounded from $L^{p_1}({\mathbb{R}}^n)$ into BMO type space $BMO_{{\mathcal{L}}1}({\mathbb{R}}^n)$, where $p_1={\frac{n}{4({\beta}-{\alpha})}}$, $p_2={\frac{n}{n-4({\beta}-{\alpha})}}$.