• Title/Summary/Keyword: invisible infrastructure

Search Result 9, Processing Time 0.021 seconds

An Analysis of Statistical Indicators on the Infrastructure of Science and Technology Culture in Korea (과학기술문화 하부구조에 관한 통계지표 분석)

  • Song, Sung-Soo
    • Journal of Science and Technology Studies
    • /
    • v.6 no.2 s.12
    • /
    • pp.185-205
    • /
    • 2006
  • This article analyzes statistical indicators on the infrastructure of S&T culture in Korea. In the case of visible infrastructure, science museums, S&T programs in TV, and S&T books are not sufficiently secured except for internet. The utilization of visible infrastructure tends to be increased but in rudimentary stage. In relation to invisible infrastructure, public interest and understanding of &T is underdeveloped, social status of S&T personnel is low compared to social importance, and participation in S&T policy of S&T personnel and citizens organization is limited. For the development of statistical indicators in S&T culture, personal, institutional, and social contexts should be much considered, surveys on the particular social groups are systematically pursued, and a white paper on the S&T culture in Korea needs to be published.

  • PDF

Effect of information infrastructure level on financial institution's competitive power (정보인프라 수준이 금융기관의 경쟁력에 미치는 영향)

  • 조규산;김영걸
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.433-436
    • /
    • 1996
  • 최근들어 금융산업에 있어서 중요한 패러다임의 전환은 정치 경제질서의 변화에 수반되는 개방화 '자율화 추세이며, 국내 금융기관들은 이러한 전환기를 극복하고자 다양한 경영전략을 구사하고 있다. 그 중에서 가장 두드러져 보이는 것이 경영변화 모색을 위한 정보기술의 활용 촉진이며, 이는 어느 산업보다도 정보강도가 높은 금융기관 있어 경쟁우위를 확보하는데 결정적인 힘을 가진다 할 것이다. 본 논문에서는 이와 같은 배경과 정보시스템 평가이론을 바탕으로 금융기관의 정보인프라 (Information Infrastructure) 수준을 측정하고 이 수준이 금융기관의 경쟁력에 어느 정도 영향을 미치는지에 대하여 고찰하고자 하였다. 연구대상 기관은 국내 예금은행중 선발시중은행, 후발시중은행, 지방은행 등 3그룹에서 각각 3개은행씩을 선정하였으며, 정보인프라 수준을 독립변수로 그리고 업무 생산성을 나타내는 직원1인당 부가가치및 정보화지수를 각각 종속변수로 활용하였다. 연구결과 분명한 것은 금윤산업에 있어서 정보인프라의 효율적인 구축이 경쟁우위를 확보하는데 있어 매우 중요한 전략으로 제시될 수 있다는 것이며, 특히 생산성 향상을 지속하기 위해서는 유형의 자원 (Visible Resource)과 아울러 조직, 인력, 전략 등 무형의 자원 (Invisible Resource)에 대한 정책지원이 폭넓게 이루어져야 한다는 것이다.

  • PDF

University/Hospital Collaborations to Promote Research and Evidence Based Practice in Clinical Environments

  • Griffiths, Rhonda
    • Perspectives in Nursing Science
    • /
    • v.4 no.1
    • /
    • pp.19-25
    • /
    • 2007
  • Systems and processes to provide clinical education to students of nursing have been established between universities and health facilities in all countries where nurse education is tertiary based. However, systems and processes to link nurse researchers based in universities to their clinical colleagues are less well developed. When collaborations are established they are frequently based on personal networks, and while the rhetoric of the organizations encourages these collaborations, they are largely unrecognised by senior administrators in health facilities. The research is frequently "invisible" and the clinician researchers usually do not have access to appropriate infrastructure and other resources that are required to support large projects that have the potential to change practice across organisations. This situation influences the focus and scope of nursing research and limits opportunities for clinicians to be engaged in the generation of professional knowledge. The University of Western Sydney (UWS) has taken a strategic approach to the development of collaborations for research and has linked with health services in Western Sydney to establish and maintain research centres and adjunct appointments. The partner organisations jointly fund the infrastructure of the centres which include a Professor, research assistant position(s) and administrative staff. Five Professors of Nursing have been appointed to positions in one of three nursing research centres. This paper describes the approach established by the School of Nursing at UWS to build collaborations with clinical areas to promote research. This approach could be adopted or adapted by other facilities.

  • PDF

Core Factors Governing Manufacturing Procedures and Systems (의류 생산 시스템을 지배하는 핵심 요소들에 대한 고찰)

  • Lee, Duck-Weon;Lim, Ho-Sun;Shim, Woo-Sub
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.12
    • /
    • pp.1910-1923
    • /
    • 2009
  • This paper reviews four factors involved in apparel and textile manufacturing procedures under international economic fluctuation. This work will be helpful to evaluate the efficiency of global manufacturing systems. Production costs including direct costs related to material and labor costs, and indirect costs associated with manufacturing running ones are significantly correlated to diverse visible and invisible elements such as infrastructure and the labor skills of foreign manufacturing areas, which might create an apparent difference in production costs. Manufacturers can consider how to improve the efficiency of manufacturing systems through a review of the co-relationship between manufacturing procedures and four factors such as manufacturing systems, production outsourcing types, manufacturing locations, and production costs in detail. In addition, the four factors are the core parameters of determining or contributing to the efficiency of a production schedule that is ultimately associated with the supply chain management (SCM) to efficiently conduct Quick Response (QR).

On the Analysis of Transportation Process of Pusan Port (시뮬레이션에 의한 부산항만 운송과정의 분석에 관하여)

  • 박계각
    • Journal of the Korean Institute of Navigation
    • /
    • v.10 no.1
    • /
    • pp.101-127
    • /
    • 1986
  • Transportation provides an infrastructure vital to economic growth, and it is an integral part of production . As a port is the interface between the maritime transport and domestic transport sectors, it certainly plays a key role in any economic development. Therefore, it is doubtless that inadequacy of a nation's port will depress the level of throughput, to the level where it fails to meet the target set by the national economic planning schemes. Korea is surrounded by the seas and the economic structure of Korea consists of processing trades, so that it cannot be overstated that substantial economy in maritime transport coasts can be achieved through the improvement of the port transport system. This paper treats the transportation process in Pusan Port by Queueing Simulation method, and the reasonable size of Pusan Port is suggested from the point of view of efficiency maximization. The results of the analysis are summarized as follows; 1) the utility rate is 47.91 percents in general piers, 85-52 percents in container piers, and waiting time 5.2hrs, in general piers, 0.8 hrs, in container piers, and the probability of maximum queue length 12 ships in general piers, 2 ships in container piers, and the probability of waiting is 44 percents in general piers, 8 percents in container pier. 2) in general piers, the improvement of app. 30 percents in port capacity is desirable for operating effectively concerning the current arrival rate. By introducing the traffic control ion container piers, there is no apparent necessity of port investment, but I is expected to reduce invisible congestion occurred along the waiting line. 3) On Pusan Port, the optimal utility rate and the optimal arrival rate for reducing waiting time are 3.5 to 4.0(hrs./ship) in general piers, 5.1 to 6.0(hrs./ship) in container piers.

  • PDF

DEVELOPMENT TRENDS OF THE DIGITAL ECONOMY: E-BUSINESS, E-COMMERCE

  • Volkova, Nelia;Kuzmuk, Ihor;Oliinyk, Nataliia;Klymenko, Iryna;Dankanych, Andrii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.186-198
    • /
    • 2021
  • The introduction of digital technologies affects most socio-economic processes and activities in the economy, from agriculture to public services. Even though the world is currently only in the early stages of digital transformation, the digital economy is growing rapidly, especially in developing countries. Shortly, digital platforms will be able to replace the "invisible hand" of the market and turn it into digital. Some digital platforms have already reached global reach in some sectors of the economy. The growing value of data and artificial intelligence is reflected in the high capitalization of these enterprises. Their growing role has far-reaching consequences for the organization of economic activity and integration into the field of e-business. However, their importance and level of development in different countries differ significantly. The main purpose of this article is an assessment of the level and trends of the digital economy in the world and the identification of homogeneous groups of states following the main trends in the development of its components from among the EU countries. The methodology of the conducted research is based on the use of general scientific research methods in the analysis of secondary sources and the application of statistical methods of correlation-regression and cluster analysis. Macroeconomic indicators and components of DESI (Digital Economy and Society Index) were used for the analysis. Results. Based on the analysis established that most developed countries have a medium level of digitalization of the business environment and a high level of digitalization of socially oriented public services, while countries with lower GDP focus their policies on building digital infrastructure and training qualified personnel. The study summarizes and analyzes current trends in digital technology, analyzes the level and dynamics of integration of digital technologies of the studied EU countries, the level of development of e-business and e-commerce. The conceptualization of mechanisms of creation of added value in the digital economy is offered and the possible consequences of digitalization of the economy of developing countries are generalized.

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

Preliminary Study on Black-Ice Detection Using GPS Ground Reflection Signals

  • Young-Joo Kwon;Hyun-Ju Ban;Sumin Ryu;Suna Jo;Han-Sol Ryu;Yerin Kim;Yun-Jeong Choi;Sungwook Hong
    • Journal of the Korean earth science society
    • /
    • v.45 no.4
    • /
    • pp.318-326
    • /
    • 2024
  • Black ice, a thin and nearly invisible ice layer on roads and pavements, poses a significant danger to drivers and pedestrians during winter due to its transparency. We propose an efficient black ice detection system and technique utilizing Global Positioning System (GPS)-reflected signals. This system consists of a GPS antenna and receiver configured to measure the power of GPS L1 band signal strength. The GPS receiver system was designed to measure the signal power of the Right-Handed Circular Polarization (RHCP) and Left-Handed Circular Polarization (LHCP) from direct and reflected signals using two GPS antennas. Field experiments for GPS LHCP and RHCP reflection measurements were conducted at two distinct sites. We present a Normalized Polarized Reflection Index (NPRI) as a methodological approach for determining the presence of black ice on road surfaces. The field experiments at both sites successfully detected black ice on asphalt roads, indicated by NPRI values greater than -0.1 for elevation angles between 45° and 55°. Our findings demonstrate the potential of the proposed GPS-based system as a cost-effective and scalable solution for large-scale black ice detection, significantly enhancing road safety in cold climates. The scientific significance of this study lies in its novel application of GPS reflection signals for environmental monitoring, offering a new approach that can be integrated into existing GPS infrastructure to detect widespread black ice in real-time.

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.