• Title/Summary/Keyword: technology asset

Search Result 432, Processing Time 0.025 seconds

Technology Trends and Patenting Prospects of Medicinal Plants in Korea (한국 약용작물의 기술 동향 및 특허 전망)

  • Choi, Ji Weon;Kim, Su Yeon;Yu, Go Eun;Kim, Chang Kug
    • Korean Journal of Medicinal Crop Science
    • /
    • v.27 no.2
    • /
    • pp.75-85
    • /
    • 2019
  • Background: Medicinal plants are widely used in Asia. They have proven to be an invaluable asset in modern drug discovery and their demand has been steadily increasing across various industries. Methods and Results: Using 4,867 valid patents related to 12 oriental medicinal plants of 10 country groups, the growth and development potential of patents was evaluated. The cites per patent (CPP) and patent family size (PFS) indices were used to evaluate the market capability and technological level of the collected patents. Meanwhile, the patent impact index (PII) and technology strength (TS) were used to compare the technological competitiveness of patents among various technology types and markets. Both CPP and PFS indices showed that magnolia-vine and balloon flower have numerous core or original patents. Furthermore, an increase in both PII and TS indices was observed. A newly designed intellectual property multi-layer (IPM) model predicted that the medicine, genome and cosmetic categories have a high possibility of patent application growth. Conclusions: The IPM model can be used to provide the scope of particular technology fields for patent development. In addition, this study can assist patents to advance in the international market and guide the development of a national industrial strategy.

A Study on the Scope and Determinants of Electronic Collaboration based on IT in Interorganizational Relationships (기업간 거래에서 정보기술을 활용한 전자적 협력의 범위와 선행요인에 관한 연구)

  • Choi, Su-Jeong
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.4
    • /
    • pp.159-188
    • /
    • 2008
  • This study suggests strategies which can enable to creation of new opportunities of competitive advantages while operating a long lasting and consistent business with major trading partners, based on interorganizational information systems (IOISs) specially established and installed for interorganizational transactions. Nowadays, IOISs based mechanism having been widely expanded as a conventional business infrastructure for the interorganizational transactions and/or exchanges, it is customary difficult to obtain any strongly sound advantage over the competitors who have adopted even the simplest deployment of the IOIS mechanisms. In this connection, this study intends to investigate the interorganizational collaborative activities conducted by under the auspicious of IOISs, focused on the prospect of the exploitation of IOISs rather than the implementation of the IOISs. In this study, we, firstly, suggest the concept of Electronic Collaboration which can be defined by the collaborative activities conducted by IOISs, compared to the ones conducted on off-line. In addition, we suggest the Electronic Collaboration as a multi-dimensional concept, constituted by three sub-constructs, the Electronic Information Sharing (EIS), the Electronic Joint Activity (EJA), and the construction of the Electronic Relational Knowledge Store (ERKS). Secondly, we empirically verify the effects of relational and environmental determinants on the Electronic Collaboration. In this study, the relational determinants relate to the variables created in interorganizational relationship like Trust, Influence, Relational Specific Asset-asset invested for the transaction-, and Continuity of the relationship. On the other hand, the environmental determinants relate to the variables surrounding the relationship which are difficult to control. We consider Product Complexity, Technological Uncertainty, and Market Variability as the domain of the environmental determinants. To test our hypotheses, we conducted both paper-based survey and online-based survey. After refining the data with missing responses, a total of 150 data was used for analysis. The results were as follows : Firstly, it is statistically significant that the Electronic Collaboration is composed of EIS, EJA, and ERKS. In particular, the results imply that the firms are able to accumulate relational knowledge base as well as to exchange information or knowledge, and to conduct joint activities through effort to further expand the Electronic Collaboration. Secondly, we have verified the individual effects of the relational and the environmental determinants on the Electronic Collaboration. Product Complexity has been revealed as the most influential variable affecting the Electronic Collaboration. Next, Interorganizational Trust and Technological Uncertainty, in that order, have been seen to have significant effects on the Electronic Collaboration. In other words, when products or services seem to be difficult to standardize, and the core technologies seem to rapidly change, the need for the Electronic Collaboration increase. In addition, the observation dictates that the interorganizational trust turns out to be a critical variable in building a relationship and in seeking further collaboration. The results, further, illustrate that the environmental determinants are relatively more effective than the relational determinants, which is not consistent with a few prior researches relational determinants emphasized. It is because this study doesn't consider the size of the firm. A few researchers have given an emphasis on the relational determinants like trust and influence, especially from the perspective of small firms in interorganizational relationship. However, in our study, where all the sizes of the firms are contained, electronic collaboration is considerably affected by the environmental determinants.

  • PDF

The Effects of the Capital Adequacy and Liquidity Regulation on Internet Primary Banks (인터넷전문은행의 자본적정성과 유동성 규제에 관한 연구)

  • Bae, Jae Kwon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.6
    • /
    • pp.773-782
    • /
    • 2019
  • Basel III (Third Basel Accord or Basel Standards) is a global, voluntary regulatory framework on bank capital adequacy, stress testing, and market liquidity risk. Basel III regulatory ratios include capital adequacy, asset soundness, and liquidity. The capital adequacy variables include BIS capital adequacy ratio, BIS tier 1 capital ratio, and tangible common equity ratio. The asset soundness variables include non-performing loan ratio and non-performing loan coverage ratio. The liquidity regulation variables include KRW liquidity coverage ratio and foreign currency liquidity coverage ratio. This study aims to investigate how capital adequacy standard affects efficiency of internet primary banks. As a result of this study, BIS capital adequacy ratio of domestic internet primary banks is lower than that of commercial banks. In order to maintain sustainable operation considering capital adequacy regulations, it is necessary to expand additional capital. In addition, the delinquency rate and non-performing loan ratio of domestic internet primary banks is gradually increasing due to the maturity of high-yield loans in 2019.

Tracking of cryptocurrency moved through blockchain Bridge (블록체인 브릿지를 통해 이동한 가상자산의 추적 및 검증)

  • Donghyun Ha;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.32-44
    • /
    • 2023
  • A blockchain bridge (hereinafter referred to as "bridge") is a service that enables the transfer of assets between blockchains. A bridge accepts virtual assets from users and delivers the same virtual assets to users on other blockchains. Users use bridges because they cannot transfer assets to other blockchains in the usual way because each blockchain environment is independent. Therefore, the movement of assets through bridges is not traceable in the usual way. If a malicious actor moves funds through a bridge, existing asset tracking tools are limited in their ability to trace it. Therefore, this paper proposes a method to obtain information on bridge usage by identifying the structure of the bridge and analyzing the event logs of bridge requests. First, to understand the structure of bridges, we analyzed bridges operating on Ethereum Virtual Machine(EVM) based blockchains. Based on the analysis, we applied the method to arbitrary bridge events. Furthermore, we created an automated tool that continuously collects and stores bridge usage information so that it can be used for actual tracking. We also validated the automated tool and tracking method based on an asset transfer scenario. By extracting the usage information through the tool after using the bridge, we were able to check important information for tracking, such as the sending blockchain, the receiving blockchain, the receiving wallet address, and the type and quantity of tokens transferred. This showed that it is possible to overcome the limitations of tracking asset movements using blockchain bridges.

  • PDF

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF

Development of a Risk Assessment Program for Chemical Terrorism (화학적 테러에 대한 위험성 평가 프로그램 개발)

  • Lee, Younghee;Kim, Eunyong;Kim, Jinkyung;Moon, Il
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2008
  • This study focuses on assessing the security ri sk or the terrorism in chemical process industries. This research modifies conventional method for assessing the terrorism risk. The risk assessment method is developed and it is implemented as software to analyze the possibility of terrorism and sabotage. This program includes five steps; asset characterization, threat assessment, vulnerability analysis, risk assessment and new countermeasures. It is a systematic, risk based approach in which risk is a function of the severity of consequences of an undesired event, the likelihood of adversary attack, and the likelihood of adversary success in causing the undesired event. The reliability of the program is verified using a dock zone case. The case dock zone includes a storage farm, a manufacturing plant, an electrical supply utility, a hydrotreater unit, many containers, and administration buildings. This study represents chemical terrorism response technology, the prevention plan, and new countermeasure to mitigate by using risk assessment methods in the chemical industry and public sector. This study suggests an effective approach to the chemical terrorism response management.

  • PDF

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Dynamic Glide Path using Retirement Target Date and Forecast Volatility (은퇴 시점과 예측 변동성을 고려한 동적 Glide Path)

  • Kim, Sun Woong
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.82-89
    • /
    • 2021
  • The objective of this study is to propose a new Glide Path that dynamically adjusts the risky asset inclusion ratio of the Target Date Fund by simultaneously considering the market's forecast volatility as well as the time of investor retirement, and to compare the investment performance with the traditional Target Date Fund. Forecasts of market volatility utilize historical volatility, time series model GARCH volatility, and the volatility index VKOSPI. The investment performance of the new dynamic Glide Path, which considers stock market volatility has been shown to be excellent during the analysis period from 2003 to 2020. In all three volatility prediction models, Sharpe Ratio, an investment performance indicator, is improved with higher returns and lower risks than traditional static Glide Path, which considers only retirement date. The empirical results of this study present the potential for the utilization of the suggested Glide Path in the Target Date Fund management industry as well as retirees.

Requirments Analysis and AAS Design for Energy Digital Twin (에너지 디지털 트윈을 위한 요구사항 분석 및 AAS 설계)

  • Park, Kishik;Oh, Seongjin;Kang, Changku;Sung, Inmo;Sakar, Aranya
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.109-117
    • /
    • 2020
  • Recently, with the advent of the 4th industrial revolution, digital twins are emerging as an important technology that connects and integrates physical systems and cyber systems. In this article, we analyzed the major requirements of digital twins required for the construction of digital twins of power equipments in the energy field, focusing on the industry 4.0-based Asset Administration Shell(AAS). However, since not so many studies have been conducted yet on a common platform or demonstration model for implementing digital twins both domestically and internationally, digital twin requirements are analyzed with the consideration of digital twinning of power equipment in the energy field. Also, we suggested necessary procedures and specific functions of AAS to establish a smart energy digital twin in the future by analyzing the core requirements necessary for the construction and designing the AAS design for specific power equipment.

Preparation and Properties of Geopolymer for Cultural Asset Restoration (문화재 복원용 무기계 수지의 합성 및 특성)

  • Hwang, Yeon;Hwang, Sun-Do;Kang, Dae-Sik;Park, Mi-Hye
    • Journal of Conservation Science
    • /
    • v.25 no.1
    • /
    • pp.17-24
    • /
    • 2009
  • The feasibility of the geopolymer as a cultural asset restoration material was studied by investigating compressive strength and chromaticity change. Metakaolin that was synthesized by calcination of the kaolin at $750^{\circ}C$ for 6 hours was used as a geopolymeric starting material. Kaolin lost its crystallinity and changed into non-crystalline phase during calcination. NaOH solution and water glass were used as an initiator for the geopolymeric reaction. As the concentration of NaOH solution and water glass increased the compressive strength increased. When alumina was substituted with metakaolin, the compressive strength decreased at a small amount of alumina, but increased at a large substitution. For the most composition of geopolymers, the change of chroma values remained within the limit of slight variation after exposure to sunlight for 8 and 100 days. However, even small amount of organic pigment addition increased chroma values of metakaoline. It was shown that geopolymer had excellent chroma value change over epoxy resins.

  • PDF