• Title/Summary/Keyword: Data-Communication

Search Result 17,043, Processing Time 0.046 seconds

A Study on the Effects of Decision Making by Data Communication (정보통신이 의사결정에 미치는 효과에 관한 연구)

  • 이종호
    • The Journal of Information Systems
    • /
    • v.5
    • /
    • pp.115-147
    • /
    • 1996
  • 1. Introduction The new computing era started with the various computer technologies and services having been used in communication and automation area since 1980's. We call that era information technology(IT) era. In such era, especially communication plays very important roles in every aspect. So Schoderbek named that era the ege of c2. Therefore, communition became widely used in organizations. Now the majority of organizations have computer-aided communication capabilities that facilitate access to people and information, both within and outside organization. So one objective of this study is to assess the effects of these changes in data communication on decision making. Decision making is the essence of management and is too important to organizational success. This dissertation has three basic objectives: 1)to clarify the concept of data communication, who influences on decision making, and the concept of decision types, managerial and operational, may be affected differently by data communication 2)to investigate whether the effects of data communication upon decision making may be organizational variables. 3)to verify that business and decision types may affect different impact on decision making.2. Hypotheses Four attributes are selected to make hypotheses from the information attributes presented by famous scholars. They are as follows. ①effectiveness ②routinization ③communication easiness ④timeliness Hypotheses are developed according to these attributes, which are chosen from the literature study and theory H1 : Data communication is positively related to the effectiveness of DM H2 : Data communication is positively related to the routinization of DM H3 : Data communication is positively related to the communication easiness of DM H4 : Data communication is positively related to the timeliness of information for DM3. Methodology After pilot study, data are collected from the decision makers in 200 companies located at Seoul and the metropolitan area. A random sample of 174 employees sent back their questionnaires(response rate of 87%). Among them, 151 questionnaires was useful to the analysis of this study(useful rate of 75.5%).4. Conclusion and Discussion Among four proposed hypotheses, all hypotheses are fully supported. They are as follows. 1)effectiveness 2)routinization 3)communication easiness 4)timeliness. So, first objective of this study is proved. Namely, to clarify that the effects of data communication upon DM is fully supported. But they are different from the decision types. Second one is not apparently verfied. i.e. the effect of data communication on the decision variables is not moderated by organizational variables. Third is inspected. The effects of data communication differs from the industry and decision types evidently. This study has many limitations to generalize the statistical results. Since the definition of data communication has broad meanings in reality. So allare not contained in this research. Another restrict in this study is like this. Decision types are usually divided into three types-operational, managerial, strategic DM. But in this study, strategic DM is left out.

  • PDF

A data corruption detection scheme based on ciphertexts in cloud environment

  • Guo, Sixu;He, Shen;Su, Li;Zhang, Xinyue;Geng, Huizheng;Sun, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3384-3400
    • /
    • 2021
  • With the advent of the data era, people pay much more attention to data corruption. Aiming at the problem that the majority of existing schemes do not support corruption detection of ciphertext data stored in cloud environment, this paper proposes a data corruption detection scheme based on ciphertexts in cloud environment (DCDC). The scheme is based on the anomaly detection method of Gaussian model. Combined with related statistics knowledge and cryptography knowledge, the encrypted detection index for data corruption and corruption detection threshold for each type of data are constructed in the scheme according to the data labels; moreover, the detection token for data corruption is generated for the data to be detected according to the data labels, and the corruption detection of ciphertext data in cloud storage is realized through corresponding tokens. Security analysis shows that the algorithms in the scheme are semantically secure. Efficiency analysis and simulation results reveal that the scheme shows low computational cost and good application prospect.

Applying a sensor energy supply communication scheme to big data opportunistic networks

  • CHEN, Zhigang;WU, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2029-2046
    • /
    • 2016
  • Energy consumption is an important index in mobile ad hoc networks. Data packet transmission increases among nodes, particularly in big data communication. However, nodes may be unable to transmit data packets because of energy over-consumption. Consequently, information may be lost and network communication may block. While opportunistic network is a kind of mobile ad hoc networks, researchers do not focus on energy consumption in opportunistic network communication. This study proposed an effective sensor energy supply scheme that can be applied in opportunistic networks. This scheme considers nodes sensor requests and communication model. In this scheme, nodes do not only accomplish energy supply in communication, but also extend communication time in opportunistic networks. Compared with the Spray and Wait algorithm and the Binary Spray and Wait algorithm in simulations, the proposed scheme extends communication time, increases data packet transmission, and accomplishes energy supply among nodes.

L2 Learners' Communication Strategies: A Data Convergence Analysis (제 2 언어 학습자의 의사소통 전략: 자료융합 분석)

  • Kang, Su-Ja
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.263-270
    • /
    • 2015
  • L2 learners deal with communication problems encountered during the course of their oral communication by employing what are known as communication strategies(CSs). As CSs play a significant role in communication and language learning, identifying CSs that facilitate communication has become important in L2 research. However, there have been some controversies about how to identify CSs, especially about data sources: conversation data, retrospective interview data, or combining two types of data. Drawing on the advantages of converged data, this study aimed to identify CSs that L2 learners use in their English communication through a convergence analysis of data. In this qualitative case study, the data were collected from Korean L2 learners' conversations and retrospective verbal reports in stimulated recall interviews. Using a data convergence approach, various CSs were identified: definition replacement CSs, message change CSs, time-gaining CSs, and comprehension CSs. This study suggests the effectiveness of CSs in handling L2 communication problems and the usefulness of data convergence in L2 CS research.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

Constructive Steganography by Tangles

  • Qian, Zhenxing;Pan, Lin;Huang, Nannan;Zhang, Xinpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3911-3925
    • /
    • 2018
  • This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

MobPrice: Dynamic Data Pricing for Mobile Communication

  • Padhariya, Nilesh;Raichura, Kshama
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.2
    • /
    • pp.86-96
    • /
    • 2015
  • In mobile communication, mobile services [MSs] (e.g., phone calls, short/multimedia messages, and Internet data) incur a cost to both mobile users (MUs) and mobile service providers (MSPs). The proposed model MobPrice consists of dynamic data pricing schemes for mobile communication in order to achieve optimal usage of MSs at minimal prices. MobPrice inspires MUs to subscribe MSs with flexibility of data sharing and intra-peer exchanges, thereby reducing overall cost. The main contributions of MobPrice are three-fold. First, it proposes a novel k-level data-pricing (kDP) scheme for MSs. Second, it extends the kDP scheme with the notion of service-sharing-based pricing schemes to a collaborative peer-to-peer data-pricing (pDP) scheme and a cluster-based data-pricing (cDP) scheme to incorporate the notion of 'cluster' (made up of two or more MUs) in mobile communication. Third, our performance study shows that the proposed schemes are indeed effective in maximizing MS subscriptions and minimizing MS's price/user.

The Implementation of Communication Protocol for Semiconductor Equipments using Directed Diffusion (직접 확산 방식을 이용한 반도체 장비 통신 프로토콜 구현)

  • Kim, Doo Yong;Cho, Hyun Chan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.12 no.2
    • /
    • pp.39-43
    • /
    • 2013
  • The semiconductor equipments generate necessary data through communication networks for the effective manufacturing processes and automation of semiconductor equipments. For transferring data between semiconductor equipments and sending data to monitor equipments, several standards for communication protocols have been proposed. Communication networks in semiconductor manufacturing systems will transmit a lot of data traffic, which can be vulnerable in data delay and network failure. Therefore, it is required that data traffic need to be distributed. To accomplish this objective, we recommend the use of a redundant and valuable communication path which is constructed by a wireless sensor network. In this paper, the directed diffusion method for wireless sensor networking is suggested for networking semiconductor equipments. It is shown that how the directed diffusion is employed to connect semiconductor equipments. Also, we show how to implement the SECS of semiconductor equipments communication protocols based on the directed diffusion.

Compressed Sensing-Based Multi-Layer Data Communication in Smart Grid Systems

  • Islam, Md. Tahidul;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2213-2231
    • /
    • 2013
  • Compressed sensing is a novel technology used in the field of wireless communication and sensor networks for channel estimation, signal detection, data gathering, network monitoring, and other applications. It plays a significant role in highly secure, real-time, well organized, and cost-effective data communication in smart-grid (SG) systems, which consist of multi-tier network standards that make it challenging to synchronize in power management communication. In this paper, we present a multi-layer communication model for SG systems and propose compressed-sensing based data transmission at every layer of the SG system to improve data transmission performance. Our approach is to utilize the compressed-sensing procedure at every layer in a controlled manner. Simulation results demonstrate that the proposed monitoring devices need less transmission power than conventional systems. Additionally, secure, reliable, and real-time data transmission is possible with the compressed-sensing technique.

High-speed visible light communication system using space division processing (공간 분할 처리를 이용한 고속 가시광통신 시스템)

  • Park, Jun Hyung;Lee, Kyu Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.237-242
    • /
    • 2018
  • There are various 'wireless communication technologies' around us. Wireless mobile communication has evolved through various stages, and its utilization is also diverse. However, due to the development of wireless communication technology, the demand for frequency resources is much higher than the supply, so frequency shortage is serious. Recently, 'visible light communication' has been attracting attention as an emerging communication technology that can solve the frequency shortage. 'Visible light communication' is a communication method based on serial data transmission / reception, and there is a difficulty in transmitting / receiving parallel data because the transmitter and the receiver are arbitrarily present. In this paper, we have studied parallel data processing of visible light communication. We could solve the problem by analyzing parallel data using image processing. Through this study, communication performance can be verified through I / O data comparison by implementing parallel data analysis method. It is expected that diversity in parallel data analysis will be presented through the results.