• Title/Summary/Keyword: Computer and Information Service Trade

Search Result 43, Processing Time 0.028 seconds

Joint routing, link capacity dimensioning, and switch port optimization for dynamic traffic in optical networks

  • Khan, Akhtar Nawaz;Khan, Zawar H.;Khattak, Khurram S.;Hafeez, Abdul
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.799-811
    • /
    • 2021
  • This paper considers a challenging problem: to simultaneously optimize the cost and the quality of service in opaque wavelength division multiplexing (WDM) networks. An optimization problem is proposed that takes the information including network topology, traffic between end nodes, and the target level of congestion at each link/ node in WDM networks. The outputs of this problem include routing, link channel capacities, and the optimum number of switch ports locally added/dropped at all switch nodes. The total network cost is reduced to maintain a minimum congestion level on all links, which provides an efficient trade-off solution for the network design problem. The optimal information is utilized for dynamic traffic in WDM networks, which is shown to achieve the desired performance with the guaranteed quality of service in different networks. It was found that for an average link blocking probability equal to 0.015, the proposed model achieves a net channel gain in terms of wavelength channels (𝛾w) equal to 35.72 %, 39.09 %, and 36.93 % compared to shortest path first routing and 𝛾w equal to 29.41 %, 37.35 %, and 27.47 % compared to alternate routing in three different networks.

NextAuction: A DID-based Robust Auction Service for Digital Contents

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.115-124
    • /
    • 2022
  • In this paper, we present an NFT auction service for the next generation, named NextAuction, which can reliably trade ownership of individual content using DID technology. Recently, as the types and sizes of tradable digital assets have expanded, the number of NFT transactions has also increased, and a significant number of marketplaces are being operated. But, the current user authentication methods of NFT marketplaces are done only through the associated blockchain wallets. It is desirable that ownership transfer through NFT transactions be transparently managed based on a more reliable identity authentication service. NextAuction increases the reliability of auction service participants by transparently and consistently providing identity authentication for users of auction services based on the DID technique using the Klaytn blockchain. In addition, in preparation for server failure that may occur during the auction of individual content, it provides users with a robust auction service using the BR2K technique that continuously provides consistent service through the replication of a target service. The NextAuction service is developed by extending BCON, a blockchain-based content management service.

Systematizing Information Use to Address Determinants of Health Worker Health in South Africa: A Cross-sectional Mixed Method Study

  • Muzimkhulu Zungu;Annalee Yassi ;Jonathan Ramodike;Kuku Voyi;Karen Lockhart;David Jones;Spo Kgalamono;Nkululeko Thunzi;Jerry Spiegel
    • Safety and Health at Work
    • /
    • v.14 no.4
    • /
    • pp.368-374
    • /
    • 2023
  • Background: Recognizing that access to safe and healthy working conditions is a human right, the World Health Organization (WHO) calls for specific occupational safety and health (OSH) programs for health workers (HWs). The WHO health systems' building blocks, and the International Labour Organization (ILO), highlight the importance of information as part of effective systems. This study examined how OSH stakeholders access, use, and value an occupational health information system (OHIS). Methods: A cross-sectional survey of OSH stakeholders was conducted as part of a larger quasi experimental study in four teaching hospitals. The study hospitals and participants were purposefully selected and data collected using a modified questionnaire with both closed and open-ended questions. Quantitative analysis was conducted and themes identified for qualitative analysis. Ethics approval was provided by the University of Pretoria and University of British Columbia. Results: There were 71 participants comprised of hospital managers, health and safety representatives, trade unions representatives and OSH professionals. At least 42% reported poor accessibility and poor timeliness of OHIS for decision-making. Only 50% had access to computers and 27% reported poor computer skills. When existing, OHIS was poorly organized and needed upgrades, with 85% reporting the need for significant reforms. Only 45% reported use of OHIS for decision-making in their OSH role. Conclusion: Given the gap in access and utilization of information needed to protect worker's rights to a safe and healthy workplace, more attention is warranted to OHIS development and use as well as education and training in South Africa and beyond.

The Evaluation-based CBR Model for Security Risk Analysis (보안위험분석을 위한 평가기반 CBR모델)

  • Bang, Young-Hwan;Lee, Gang-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.282-287
    • /
    • 2007
  • Information society is dramatically developing in the various areas of finance, trade, medical service, energy, and education using information system. Evaluation for risk analysis should be done before security management for information system and security risk analysis is the best method to safely prevent it from occurrence, solving weaknesses of information security service. In this paper, Modeling it did the evaluation-base CBD function it will be able to establish the evaluation plan of optimum. Evaluation-based CBD(case-based reasoning) functions manages a security risk analysis evaluation at project unit. it evaluate the evaluation instance for beginning of history degree of existing. It seeks the evaluation instance which is similar and Result security risk analysis evaluation of optimum about under using planning.

Use of Emoji as a Marketing Tool: An Exploratory Content Analysis

  • Mathews, Stanley;Lee, Seung-Eun
    • Fashion, Industry and Education
    • /
    • v.16 no.1
    • /
    • pp.46-55
    • /
    • 2018
  • The purpose of this exploratory study was to enhance the understanding of how brands tilize emojis in their marketing practices. A content analysis was conducted utilizing Google News as a search tool to access articles containing information pertaining to the use of emojis by brands. The combination of keywords used for the search were "emoji", "business", and "marketing". The search was narrowed down to the period of January $1^{st}$, 2014 - November $29^{th}$, 2017. This method generated a total of 604 trade publications with 55 of them providing information pertaining to specific brands and their use of emojis in their marketing strategies. A content analysis of trade publications has revealed that a variety of marketers have utilized emojis in their brand marketing practices. The entertainment, service, and food/drink industries have predominantly utilized emojis in their marketing practices, and their primary purpose for using emojis was to increase consumer engagement. Brands applied most of these emoji marketing strategies to an online or digital setting, whether it was social media pages, mobile applications, or any other form of computer-based marketing. Although there are limitations to this exploratory research in terms of its methodology, the findings of this study provide interesting insights into the potential of emojis as a marketing tool.

The Effects of Digital Consumption Trust and Corporate Trust on IT Device and Service Satisfaction

  • Park, Seungbae;Hong, Jaewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.217-222
    • /
    • 2021
  • Recently, trust in online transactions and corporate trust are most important at the corporate level as social overhead capital in commercial transactions using digital devices such as online, mobile, and SNS platforms. Therefore, this study used data from the Korea Consumer Agency's consumer policy indicators to identify the impact of digital consumption trust and corporate responsibility trust on the satisfaction of information and communication products and services. According to the analysis, trust in digital consumption conditions and responsibility of companies have a positive impact on satisfaction of information and communication devices and satisfaction of information and communication services. In addition, it was found that trust in corporate responsibility has a greater impact on satisfaction of information and communication devices and satisfaction of information and communication services than trust in digital consumption conditions. Theoretical and practical implications for these findings and suggestions for future research were presented.

A study on the exportation of the e-clearance system of Korea Customs Service to overseas aiming to lead the global trend of Customs informatization (정보화시대 글로벌 리더로의 도약을 위한 관세청 전자통관시스템 해외수출 전략에 대한 연구)

  • Seo, Jae-Yong;Jo, Jeong-Hun
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.45-53
    • /
    • 2006
  • Ever since the computer came into being in early 20th century, rapid development of the information technology has led to the opening of the ubiquitous age where daily works can be done anywhere, anytime, and with any devices. The information technology has drawn attention from Customs around the world as a key means to fulfill multi-faced responsibilities of strengthening regional cooperation in the international trade, simplifying clearance procedures, expediting logistics flow, and ensuring security in the global supply chain. Korea Customs Service, which began the informatization effort by establishing the electronic export declaration system in 1992, completed the 100% electronic clearance system in 2000, with a number of countries now conducting benchmarking studies on the successful use of IT by KCS. This paper is to address the changes brought to the Customs administration in the information age, the progress and achievement of the Customs informatization as a proactive strategy to deal with the changing environment, and the exportation to overseas administration of the e-clearance system of KCS which strives to become the global leader of Customs informatization. The exportation. in particular, will not only lead to increased foreign currency earnings and shared know how, but also create an opportunity to reflect Korea's system in the standardization of Customs procedures around the world.

  • PDF

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

Efficiency and Productivity on ICT Industry (ICT 제조업과 서비스업의 효율성과 생산성)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.16 no.4
    • /
    • pp.55-75
    • /
    • 2014
  • Non-parametric method such as technology efficiency, DEA/Window model and Malmquist Productivity Index (MPI) are used to measure efficiency and productivity of ICT (Information and Communication Technology) manufacturing industry and service industry over the period 2007-2011. The results of this paper indicate following: (1) Technology efficiency of the ICT manufacturing industry were found as the range of 0.34 and 0.39 over the sample period. Technology efficiency of the ICT service industry were found as the range of 0.16 and 0.20 over the sample period. (2) The geometric average of the Malmquist TFP indexes on ICT manufacturing industry indicated the productivity improvement an average of 8.3 percent. The geometric average of the Malmquist TFP indexes on ICT service industry indicated the productivity improvement an average of 1.6 percent. (3) TIER analysis result on ICT manufacturing industry showed that optimal bench marking made by storage devices${\rightarrow}$wireless communication equipment${\rightarrow}$broadcasting equipment${\rightarrow}$radio, recording and playback devices${\rightarrow}$computers, printers, video and audio-visual equipment path. TIER analysis result on ICT service industry indicated that optimal bench marking made by computers and packaged software${\rightarrow}$wired communication${\rightarrow}$communication, information, detection equipment${\rightarrow}$consulting and construction for computer systems integration${\rightarrow}$industrial machinery and equipment rental${\rightarrow}$telecommunications reseller${\rightarrow}$system software development and delivery${\rightarrow}$hosting path.

  • PDF

Research on John School as a policy to prevent recidivism of online sex trafficking

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.143-149
    • /
    • 2018
  • Recently, President Donald Trump signed FOSTA (Fight Online Sex Trafficking Act) in April 11, 2018, which makes online service no more immune from civil liability for the action of third party facilitating sex trafficking content. Although it is also important to enhance security regulations and cognition on law, but it will be economically more effective to put more energy on preventing recidivism. For John School in Korea, it should increase implementation rate by putting core manpower and budget for preventing needs of sex purchase and then, check operation method and efficacy to improve the actual program. One way is first, empirical analysis and data is required on efficacy of John School program. Second, should have clear definition in Special Sex Trade Law. Third, more strick regulation for selecting participant is required. Fourth, more manpower and budget is required. Fifth, charging the participant for educational fee shall be reviewed. Sixth, educational program should be reviewed. The most important point of education is to make those criminals feel guilty about financially purchasing the sex, basically making them to recognize that it is ethically wrong. However, the current education system contains no clear explanation about the ethical issue of such problem but focusing more on other factors such as sexual disease and structural problem of sexual business. Therefore, this failed to deliver the right psychological training to those criminals without any ethical control. Knowing why women feel hurt when having unwanted sexual relationship by being paid is required part in terms of education for preventing sex trafficking.