• Title/Summary/Keyword: resource share

Search Result 366, Processing Time 0.032 seconds

The Qualitative Trade Competitiveness of China in IT Industry: A Comparison to Korea and USA

  • Yu, Jae-Seon;Ding, Hao
    • Journal of Korea Trade
    • /
    • v.23 no.3
    • /
    • pp.20-37
    • /
    • 2019
  • Purpose - The purpose of this paper is to analyze the trade structure and competitiveness of China's information technology (IT) industry in comparison to that of Korea and the United States, particularly in terms of quality. Design/methodology/approach - Indices such as trade specialization index (TSI), Revealed Comparative Advantage (RCA), and Market Comparative Advantage (MCA) are used. Further, an Intra-industry Trade (IIT) index is used to analyze qualitative changes in horizontal intra-industry trade and intra-industry trade of high- and low-quality goods. Findings - China's IT industry has a comparative competitive advantage over that of Korea and the United States, and mainly exports goods of inferior quality and imports goods of superior quality. Further, China's horizontal intra-industry trade has been decreasing, while its vertical intra-industry trade has been increasing and vertical trade of inferior quality goods outweighs that of superior quality goods. This shows that China is rapidly catching up with Korea and the United States, even though its qualitative competitiveness has not significantly improved. Research limitations/implication - This study has academic and political implications, as it analyzes changes in China's IT trade competitiveness. However, it is somewhat limited as factors determining qualitative aspects has not been considered. Originality/value - Most studies aggregate analyses of export competitiveness using methodologies such as TSI, RCA, and market share. However, the focus of these methods is price competitiveness. Hence, an examination of the objective and qualitative trade competitiveness of China's IT industry is necessary. this study the trade structure and quantitative competitiveness of the industry by analyzing intra-industry trade focusing on the quality of competitiveness. Therefore, the changes in China's IT industry in the USA and Korea and in foreign trade competitiveness and quality competitiveness are clarified. The results show that the academic and policy implications of these changes in the IT industry will be a useful resource. This is the first study in Korea to attempt such an analysis. This is the first study in Korea to attempt such an analysis.

Analysis and Ethical Review of the Compensation System for Clinical Trial Injury in India (인도 임상시험 피해보상제도 분석 및 윤리적 고찰)

  • Lee, Chan Joo;Choe, Byung In
    • The Journal of KAIRB
    • /
    • v.3 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • In 2004, India began investing in the clinical trial industry; the country now boasts a 20% market share with the help of a valuable resource - the world's second largest population. The Contract Research Organization has been able to generate profits efficiently conducting clinical trials via a large pool of participants, skilled researchers, and reduced developmental costs. As the demand and sheer number of global clinical trials increased, the International Council of Harmonization-Good Clinical Practice was introduced, and the need for the Institutional Review Board increased. While the clinical trial industry in India boomed, it came at the expense of the participants' civil rights. The increased media attention regarding the ethical issues forced the Indian Supreme Court to take action. Consequently, India is the only country, by law, that specifically compensates participants suffering from injury directly resulting from participation in clinical trials. This research paper will describe and compare the relevant laws of India and Korea including compensation criteria. In addition, the ethical issues and aspects of indemnity in clinical trials will be discussed. While the clear advantage of the compensation is one of the protected rights of a clinical subject, the current system is not perfect. Furthermore, laws created to redeem ethical issues can have unintended, negative consequences.

  • PDF

A Study on Information Need and Use Behavior of Elementary Teachers According to Their Task (초등학교 교사의 정보 요구 및 이용 행태에 관한 연구)

  • Lee, Seung-Min;Jeong, Jiun
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.2
    • /
    • pp.209-233
    • /
    • 2021
  • This study aims to obtain implications for educational information services for elementary school teachers by analyzing their information seeking behavior. The in-depth interview was carried out in-depth interviews with 11 elementary school teachers and it analyzed of the core roles and tasks of elementary school teachers, the required information and usage behavior of information sources. The study result showed that elementary school teachers perceived homeroom duties, teaching/learning activities, school duties, and other as their works and tasks, and the response to the importance of task performance was homeroom teacher, teaching-learning activities, school works, and other tasks. Also, elementary school teachers needed information in order of teaching-learning activities, homeroom teacher, school works and they used various information sources including web, interpersonal sources and book. Moreover, this study observed some factors that elementary school teacher mainly used web information source which other elementary school teacher developed and that they got teaching-learning materials from fellow teachers. Based on these findings, the author proposed teacher librarian share library based instruction materia in web resource, provide cooperative educational information service through learning community, and provide homeroom work material for elementary school teachers.

P2P Systems based on Cloud Computing for Scalability of MMOG (MMOG의 확장성을 위한 클라우드 컴퓨팅 기반의 P2P 시스템)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2021
  • In this paper, we propose an approach that combines the technological advantages of P2P and cloud computing to support MMOGs that allowing a huge amount of users worldwide to share a real-time virtual environment. The proposed P2P system based on cloud computing can provide a greater level of scalability because their more resources are added to the infrastructure even when the amount of users grows rapidly. This system also relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. In this paper, we describe the concept and basic architecture of cloud computing-based P2P Systems for scalability of MMOGs. An efficient and effective provisioning of resources and mapping of load are mandatory to realize this architecture that scales in economical cost and quality of service to large communities of users. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed P2P system can reduce the bandwidth at the server while utilizing their enough bandwidth when the number of simultaneous users keeps growing.

Performance Management Technique of Remote VR Service for Multiple Users in Container-Based Cloud Environments Sharing GPU (GPU를 공유하는 컨테이너 기반 클라우드 환경에서 다수의 사용자를 위한 원격 VR 서비스의 성능 관리 기법)

  • Kang, Jihun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.9-22
    • /
    • 2022
  • Virtual Reality(VR) technology is an interface technology that is actively used in various audio-visual-based applications by showing users a virtual world composed of computer graphics. Since VR-based applications are graphic processing-based applications, expensive computing devices equipped with Graphics Processing Unit(GPU) are essential for graphic processing. This incurs a cost burden on VR application users for maintaining and managing computing devices, and as one of the solutions to this, a method of operating services in cloud environments is being used. This paper proposes a performance management technique to address the problem of performance interference between containers owing to GPU resource competition in container-based high-performance cloud environments in which multiple containers share a single GPU. The proposed technique reduces performance deviation due to performance interference, helping provide uniform performance-based remote VR services for users. In addition, this paper verifies the efficiency of the proposed technique through experiments.

Survey on Analysis and Improvement of the Stress Status of Customer-facing Workers in the Corporation (공단 고객 응대 근로자의 스트레스 현황과 개선을 위한 인식도 조사)

  • Seung-Han, Kim;Gyou-Beom, Kim;Woo-jin, Hyun
    • Journal of the Korea Safety Management & Science
    • /
    • v.24 no.4
    • /
    • pp.85-93
    • /
    • 2022
  • Today's customer service providers, who have the greatest impact on customer satisfaction, are experiencing severe stress and job burnout due to various causes. Unlike general companies, the corporation has a relatively high level of dissatisfaction with customer service since there is a large conflict between the provision of kindness and the reasonable handling of civil complaints according to laws and regulations. In order to analyze the environment of the NPS' customer service providers, 5.583 branch employees working at the National Pension Service and 407 call center employees were surveyed online using the questionnaire function of the Enterprise resource planning system. The contents of the survey consisted of a survey on customer-facing employees, the level of awareness of customer-facing workers protection measures, and opinions on improvement and supplementation related to customer-facing workers protection measures. As a result of the survey, 72.8% of the total respondents experienced grievance complaints, and the proportion of call center employees was even higher at 89.0%. In addition, both the branch and the call center had the largest share of complaints about obstruction of business, unreasonable demands, abusive language, and verbal abuse. More than 40% of call center employees in their 20s and 30s experienced the highest frequency of complaints 13 or more times a year. The most difficult thing in the process of responding to complaints was that both branch offices and call centers had insufficient psychological recovery time, lack of space, and lack of help from colleagues and superiors. Based on the survey analysis, it is suggested to establish a countermeasure through case analysis rather than the right to suspend work for civil complaints that cannot be handled, such as customized manuals and action strategies for the age group with high grievance complaints.

IoT Collaboration System Based on Edge Computing for Smart Livestock System (스마트 축사를 위한 에지 컴퓨팅 기반 IoT 협업 시스템)

  • Ahn, Chi-Hyun;Lee, Hyungtak;Chung, Kwangsue
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.258-264
    • /
    • 2022
  • The smart farm for livestock, in which information and communication technology (ICT) is combined with livestock farm, is mostly based on the cloud computing paradigm. A cloud-based smart livestock farm has disadvantages such as increased response time, burden on cloud resource caused by the increased number of IoT sensors, traffic burden on the network, and lack of failure resilience mechanisms through collaboration with adjacent IoT devices. In this paper, with these problems in mind, we propose an IoT collaboration system based on edge computing. By using the relatively limited computing resources of the edge device to share the cloud's web server function, we aim to reduce the cloud's resources needed and improve response time to user requests. In addition, through the heartbeat-based failure recovery mechanism, IoT device failures were detected and appropriate measures were taken.

A Study on the Metadata Design for Standardization of Food Composition Research Data (식품성분 연구데이터의 표준화를 위한 메타데이터 설계에 관한 연구)

  • Lee, Sang Hoon;Park, Eunji;Kim, Juseop;Kim, Suntae
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.3
    • /
    • pp.241-262
    • /
    • 2022
  • The purpose of this study was to designed the structure and elements of metadata that can manage and share research data produced in the food composition database. In order to derive metadata elements, mapping crosswalk was performed on 5 metadata such as DCAT, DataCite metadata schema 4.4, TTAK.KO-10.0976, AgMES, and FoodData Central. As a result of the study, the top 15 elements of the 'Resource information' metadata were derived, and 7 mendatory, 3 recommended and 5 optional elements, and the 'Composition analysis' metadata included 8 mendatory, 3 recommended and 1 optional element were derived to describe food composition research data, respectively. The derived metadata elements will be used as an item for systematic management of food composition data and can be used as basic data for sharing with domestic and international food composition databases.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Collaborative Modeling of Medical Image Segmentation Based on Blockchain Network

  • Yang Luo;Jing Peng;Hong Su;Tao Wu;Xi Wu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.958-979
    • /
    • 2023
  • Due to laws, regulations, privacy, etc., between 70-90 percent of providers do not share medical data, forming a "data island". It is essential to collaborate across multiple institutions without sharing patient data. Most existing methods adopt distributed learning and centralized federal architecture to solve this problem, but there are problems of resource heterogeneity and data heterogeneity in the practical application process. This paper proposes a collaborative deep learning modelling method based on the blockchain network. The training process uses encryption parameters to replace the original remote source data transmission to protect privacy. Hyperledger Fabric blockchain is adopted to realize that the parties are not restricted by the third-party authoritative verification end. To a certain extent, the distrust and single point of failure caused by the centralized system are avoided. The aggregation algorithm uses the FedProx algorithm to solve the problem of device heterogeneity and data heterogeneity. The experiments show that the maximum improvement of segmentation accuracy in the collaborative training mode proposed in this paper is 11.179% compared to local training. In the sequential training mode, the average accuracy improvement is greater than 7%. In the parallel training mode, the average accuracy improvement is greater than 8%. The experimental results show that the model proposed in this paper can solve the current problem of centralized modelling of multicenter data. In particular, it provides ideas to solve privacy protection and break "data silos", and protects all data.