• Title/Summary/Keyword: 시나리오 기법

Search Result 1,005, Processing Time 0.022 seconds

The Study of Recovering trust and Rebuilding Loyalty on Applications services in SmartPhone: Focusing on Service Type (스마트폰 앱에서 서비스 유형에 따른 신뢰 회복 및 로열티 재구축에 대한 연구)

  • Choi, Hun;Choi, Yoo-Jung
    • Management & Information Systems Review
    • /
    • v.33 no.1
    • /
    • pp.65-81
    • /
    • 2014
  • Although the study of IT services has increased in recent years, few study have focused on trust based recovery process. Additionally, users of IT services have different use purpose depending on service type. Therefore, the purposes of this research is to propose trust recovery model of smartphone applications and to examine the moderating effect of service type on the use of smartphone applications. To achieve research purposes, we suggested service failure type using the scenario technique and empirically verified by conducting survey. The results showed that the procedural justice and interpersonal justice have influence on trust and trust had an effect on the all quality factors (system, information, service quality). Also, information quality and service quality had an effect on the customer loyalty. Finally, service type had significant moderating effects on the relationship between perceived justice and quality.

  • PDF

Underwater Acoustic Communication Channel Modeling Regarding Magnitude Fluctuation Based on Ocean Surface Scattering Theory and BELLHOP Ray Model and Its Application to Passive Time-reversal Communication (해수면에 의한 신호 응답 강도의 시변동성 특성이 적용된 벨홉 기반의 수중음향 통신 채널 모델링 및 수동 시역전 통신 응용)

  • Kim, Joonsuk;Koh, Il-Suek;Lee, Yongshik
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.2
    • /
    • pp.116-123
    • /
    • 2013
  • This paper represents generation of time-varying underwater acoustic channels by performing scattering simulation with time-varying ocean surface and Kirchhoff approximation. In order to estimate the time-varying ocean surface, 1D Pierson-Moskowitz ocean power spectrum and Gaussian correlation function were used. The computed scattering coefficients are applied to the amplitudes of each impulse of BELLHOP simulation result. The scattering coefficients are then compared with measured doppler spectral density of signal components which were scattered from ocean surface and the correlation time used in the Gaussian correlation function was estimated by the comparison. Finally, bit-error-rate and channel correlation simulations were performed with the generated time-varying channel based on passive time-reversal communication scenario.

Construction of Global Finite State Machine from Message Sequence Charts for Testing Task Interactions (태스크 상호작용 테스팅을 위한 MSC 명세로부터의 전체 유한 상태 기계 생성)

  • Lee, Nam-Hee;Kim, Tai-Hyo;Cha, Sung-Deok;Shin, Seog-Jong;Hong, H-In-Pyo;Park, Ki-Wung
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.9
    • /
    • pp.634-648
    • /
    • 2001
  • Message Sequence Charts(MSC) has been used to describe the interactions of numerous concurrent tasks in telecommunication software. After the MSC specification is verified in requirement analysis phase, it can be used not only to synthesize state-based design models, but also to generate test sequences. Until now, the verification is accomplished by generating global state transition graph using the location information only. In this paper, we extend the condition statement of MSC to describe the activation condition of scenarios and the change of state variables, and propose an approach to construct global finite state machine (GFSM) using this information. The GFSM only includes feasible states and transitions of the system. We can generate the test sequences using the existing FSM-based test sequence generation technology.

  • PDF

Decision-making system for the resource forecasting and risk management using regression algorithms (회귀알고리즘을 이용한 자원예측 및 위험관리를 위한 의사결정 시스템)

  • Han, Hyung-Chul;Jung, Jae-Hun;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.311-319
    • /
    • 2015
  • In this paper, in order to increase the production efficiency of the industrial plant, and predicts the resources of the manufacturing process, we have proposed a decision-making system for resource implementing the risk management effectively forecasting and risk management. A variety of information that occurs at each step efficiently difficult the creation of detailed process steps in the scenario you want to manage, is a frequent condition change of manufacturing facilities for the production of various products even within the same process. The data that is not contiguous products production cycle also not constant occurs, there is a problem that needs to check the variation in the small amount of data. In order to solve these problems, data centralized manufacturing processes, process resource prediction, risk prediction, through a process current status monitoring, must allow action immediately when a problem occurs. In this paper, the range of change in the design drawing, resource prediction, a process completion date using a regression algorithm to derive the formula, classification tree technique was proposed decision system in three stages through the boundary value analysis.

An Attack Scheme with a T-DMB TPEG Update based Vulnerability (T-DMB 기반의 TPEG 업데이트 취약점을 이용한 공격 기법)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.1-5
    • /
    • 2014
  • The development of communication method for a variety of intelligent automobiles are delivering comfortable and safe information. However the development of such communication method must also think about security. Even the update of navigation to be used for intelligent automobiles uses the wireless updating methods but the updating methods currently being used has no reliable security measures. The navigation communications used in the intelligent automobiles are being provided with TTI(Traffic and Travel Information) service using a variety of methods by the countries. In the case of Korea, most are based on T-DMB using the TPEG method for transmitting the information. By identifying the characteristics on the navigation wireless update, a security solution is proposed for delivering the reliable update information after creating the attack scenario.

Development of Context Awareness and Service Reasoning Technique for Handicapped People (멀티 모달 감정인식 시스템 기반 상황인식 서비스 추론 기술 개발)

  • Ko, Kwang-Eun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.34-39
    • /
    • 2009
  • As a subjective recognition effect, human's emotion has impulsive characteristic and it expresses intentions and needs unconsciously. These are pregnant with information of the context about the ubiquitous computing environment or intelligent robot systems users. Such indicators which can aware the user's emotion are facial image, voice signal, biological signal spectrum and so on. In this paper, we generate the each result of facial and voice emotion recognition by using facial image and voice for the increasing convenience and efficiency of the emotion recognition. Also, we extract the feature which is the best fit information based on image and sound to upgrade emotion recognition rate and implement Multi-Modal Emotion recognition system based on feature fusion. Eventually, we propose the possibility of the ubiquitous computing service reasoning method based on Bayesian Network and ubiquitous context scenario in the ubiquitous computing environment by using result of emotion recognition.

Mobile Ad Hoc Routing Protocol Supporting Unidirectional Links (단방향 링크를 지원하는 이동 Ad Hoc 라우팅 프로토콜)

  • Lee, Kwang-Bae;Kim, Hyun-Ug;Jung, Kun-Won
    • Journal of IKEEE
    • /
    • v.5 no.1 s.8
    • /
    • pp.59-66
    • /
    • 2001
  • In this paper, we propose a dynamic source routing protocol supporting asymmetric paths for mobile Ad Hoc networks that contain unidirectional links. At present, the existing dynamic source routing protocol supports only symmetric paths that consist of bidirectional links for routing. However, in fact, there can exist unidirectional links due to asymmetric property of mobile terminals or current wireless environment. Thus, we implement a mobile Ad Hoc routing protocol supporting unidirectional links, which is fit for more general wireless environment. Especially, the proposed protocol uses an improved multipath maintenance method in order to perform rapid route reconfiguration when route error due to mobility is detected. For performance evaluation, we consider the following factors: average route discovery time and average data reception rate. In order to obtain the factors of the performance evaluation, we did simulation for 900 seconds in the step of 100 seconds with the following scenarios: usage of route cache in intermediate nodes on route path, and different mobility/connection patterns.

  • PDF

Performance Analysis of Transport in MANET including Interworking Functionality using the Edge Cost Based Modeling Method (에지코스트기반 모델링 방법에 의한 연동기능이 포함된 MANET의 전달성능 분석)

  • Song, Sang-Bok;Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2593-2600
    • /
    • 2010
  • A growth of mobile and wireless networking technologies have enabled mobile ad hoc networks applicable to a wide range of areas. This paper analyzes dynamics of network transport performance with respect to dynamics of network states especially for the mobile ad hoc networks called MANET. The edge cost based modeling methodology is adopted for the analysis, which can express well the characteristics of MANET. In this methodology the network state at arbitrary time can be specified as one of four edge states. We extracts ten target network scenarios for the simulation analysis by employing not only the Real Edge/Infinity Edge concept but also interworking functionality between different transport protocols. Then we could acquire from simulation of them with the DEVSim++ engine that the more sorts of transport protocols and the more number of interworking nodes are included in the network, the more contribution is for improving network transport performance.

Rotational Antenna based Clutter Imaging Algorithm in Helicopter Landing Mode (헬리콥터에 장착된 회전 안테나를 이용한 착륙지형의 이미지 생성 기법)

  • Bae, Chang-Sik;Jeon, Hyeon-Mu;Kim, Jae-Hak;Yang, Hoon-Gee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1860-1866
    • /
    • 2016
  • Helicopter-related collision accidents with structures mostly occur at landing, especially in a limited visibility environment, which necessitates some secondary equipment like a radar that can generate stationary clutter image. In this paper, we propose an algorithm that makes an image of stationary ground clutter in two dimensional range and azimuth angle domain. We present a mathematical model for the received signals from each clutter patch in the iso range ring and analyze their clutter and Doppler characteristics, assuming that a helicopter-borne radar has a rotational antenna. We propose a filter structure, which suppresses side lobe signal components while extracting a main lobe signal component, and suggest a solution for a problem stemmed from the filtering process. Finally, by conducting a simulation we show the performance of the suggested imaging algorithm on a two dimensional virtual scenario of the topographic clutter.

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.