• Title/Summary/Keyword: Information Source Selection

Search Result 304, Processing Time 0.03 seconds

Integrative Review of Sexual Health Information Seeking Behaviors among Adolescents: Based on Qualitative Research (청소년의 성 건강정보 추구행동: 질적연구를 중심으로 한 통합적 문헌고찰)

  • Kim, Sookyung;Kim, Sanghee
    • Journal of the Korean Society of School Health
    • /
    • v.34 no.1
    • /
    • pp.42-52
    • /
    • 2021
  • Purpose: With the development of media, the ways adolescents can obtain information related to sexual health have diversified. Prior quantitative research on adolescents' sexual health information seeking behaviors (HISB) has limitations in grasping the details, and sexual issues of adolescents have tended to be underreported in quantitative studies. It is necessary to explore sexual HISB through an integrative review of qualitative research. The aim of the study was to analyze the literature on sexual HISB among adolescents, focusing on qualitative research. Methods: An integrative review was undertaken to explore the studies conducted between 2009 and 2018 that addressed sexual HISB such as source preferences, perceived trustworthiness, and tendency according to age and gender among adolescents. Results: Seven studies met the selection criteria and were analyzed according different sexual HISB. It was identified that adolescents preferred trustworthy sources and had a pattern of reviewing and comparing the content among diverse sources to confirm the quality of the information. Female adolescents valued privacy and confidentiality, while male adolescents would like to earn information along with their peers and perceived it as an opportunity to exchange their experiences and thoughts. Late adolescents preferred to seek sexual health information from peers and on the internet such as websites and social platforms compared to early adolescents. Conclusion: This study is significant in that it provides evidence that can be applied when developing programs for promoting sexual health in adolescents. It is suggested that programs should focus on building trustworthiness and consider differences in age and gender to improve the use of sexual health information among adolescents.

Efficient Link Aggregation in Delay-Bandwidth Sensitive Networks (지연과 대역폭이 민감한 망에서의 효율적인 링크 집단화 방법)

  • Kwon, So-Ra;Jeon, Chang-Ho
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.11-19
    • /
    • 2011
  • In this paper, Service Boundary Line approximation method is proposed to improve the accuracy of aggregated link state information for source routing in transport networks that conduct hierarchical QoS routing. The proposed method is especially useful for aggregating links that have both delay and bandwidth as their QoS parameters. This method selects the main path weight in the network and transports the data to the external networks together with the aggregation information, reducing information distortion caused from the loss of some path weight during aggregation process. In this paper, the main path weight is defined as outlier. Service Boundary Line has 2k+5parameters. k is the number of outliers. The number of storage spaces of Service Boundary Line changes according to the number of outliers. Simulation results show that our approximation method requires a storage space that 1.5-2 times larger than those in other known techniques depending on outlier selection method, but its information accuracy of proposed method in the ratio between storage space and information accuracy is higher.

A Study on the Eating Behaviors and Characteristics of Consumption Propensities on Dining out as Perceived by Silver Generation in Seoul (서울지역 실버고객들의 외식식습관과 소비행동 속성에 관한 연구)

  • Choi, Mi-Sook;Kim, Dong-Ho;Park, Hyo-Nam;Kim, Seong-Su
    • Culinary science and hospitality research
    • /
    • v.21 no.1
    • /
    • pp.250-266
    • /
    • 2015
  • This study concentrated on the dining out consumption behaviors, dining out selection attributes, and changes in eating habits of silver generation. Total 216 residents in metropolitan area were employed for statistical analysing. The results are as follows. First, as the result of t-test and ANOVA showed that female and higher academic background tended to regularly take high level of fruits, vegetables, meat, and fish eating habits. These results identified that dining out culture and dietary lifestyle are closely linked. Second, as the result of difference in dining out consumption attitudes on eating habit of silver generation, consumers who have better eating behaviors tended to consider the physical environment, variety of menu, and service quality when they choose a restaurant. Third, as the result of analysis on changes in dining out consumption behavior based on eating behavior of silver consumers, groups differences were found from only the source for information on dining out business and standard variable in selection of dining out business. Fourth, physical environment, variety of menu, business quality, and service were indicated as significant selection attributes of dining out among silver peoples. Fifth, dining out consumption behaviors of silver consumers were developed through newspapers, magazines, and previous visiting experiences. In conclusion, the results of present study showed that silver consumers tend to select a restaurant based on word-of-mouth and various factors related to experiences. Hence, various promotional activities are necessary for the business succession.

An Analysis on BitTorrent Performance Based on the Number of Unchoked Peers (Unchoked Peer 개수에 따른 BitTorrent 성능 분석)

  • Chung, Tae-Joong;Han, Jin-Young;Kim, Hyun-Chul;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1197-1203
    • /
    • 2010
  • A strength of BitTorrent, which is widely used for file sharing today, is due to its peer selection mechanism which is designed to encourage peers to contribute data. In the peer selection phase in BitTorrent, peers to upload the file in a swarm are selected by determining which peers upload the most to themselves. However, the number of peers to upload (i.e., number of unchoked peers) is fixed to four in its peer selection mechanism of BitTorrent, which yields inefficiency because the situation of the swarm may vary frequently (e.g., number of peers in the swarm, download rates, and upload rates). In this paper, we analyze the swarming system performance when the number of unchoked in BitTorrents is not static, but dynamic. For empirical investigation, we established a testbed in Seoul National University by modifying an open-source BitTorrent client, which is popular. Through our experiments, we show that an adaptive mechanism to adjust the number of unchoked peers considering the situation of the swarm is needed to improve the performance of BitTorrent.

A Location Information-based Gradient Routing Algorithm for Wireless Ad Hoc Networks (무선 애드혹 네트워크를 위한 위치정보 기반 기울기 라우팅 알고리즘)

  • Bang, Min-Young;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.259-270
    • /
    • 2010
  • In this paper, a Location Information-based Gradient Routing (LIGR) algorithm is proposed for setting up routing path based on physical location information of sensor nodes in wireless ad-hoc networks. LIGR algorithm reduces the unnecessary data transmission time, route search time, and propagation delay time of packet by determining the transmission direction and search range through the gradient from the source node to sink node using the physical location information. In addition, the low battery nodes are supposed to have the second or third priority in case of forwarding node selection, which reduces the possibility of selecting the low battery nodes. As a result, the low battery node functions as host node rather than router in the wireless sensor networks. The LIGR protocol performed better than the Logical Grid Routing (LGR) protocol in the average receiving rate, delay time, the average residual energy, and the network processing ratio.

A Novel Multi-Path Routing Algorithm Based on Clustering for Wireless Mesh Networks

  • Liu, Chun-Xiao;Zhang, Yan;Xu, E;Yang, Yu-Qiang;Zhao, Xu-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1256-1275
    • /
    • 2014
  • As one of the new self-organizing and self-configuration broadband networks, wireless mesh networks are being increasingly attractive. In order to solve the load balancing problem in wireless mesh networks, this paper proposes a novel multi-path routing algorithm based on clustering (Cluster_MMesh) for wireless mesh networks. In the clustering stage, on the basis of the maximum connectivity clustering algorithm and k-hop clustering algorithm, according to the idea of maximum connectivity, a new concept of node connectivity degree is proposed in this paper, which can make the selection of cluster head more simple and reasonable. While clustering, the node which has less expected load in the candidate border gateway node set will be selected as the border gateway node. In the multi-path routing establishment stage, we use the intra-clustering multi-path routing algorithm and inter-clustering multi-path routing algorithm to establish multi-path routing from the source node to the destination node. At last, in the traffic allocation stage, we will use the virtual disjoint multi-path model (Vdmp) to allocate the network traffic. Simulation results show that the Cluster_MMesh routing algorithm can help increase the packet delivery rate, reduce the average end to end delay, and improve the network performance.

Research of Verifying the Remote Test Answer Sheets Authentication (원격시험 컴퓨터활용 답안지 진본성 검증에 관한 연구)

  • Park, Kee-Hong;Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.135-141
    • /
    • 2012
  • Development of the Internet has brought many changes in methods of education and assesment. When enforcing the on-line distance education, the tests to check the outcomes of the learning are taken on the Internet. The current trends of education evaluation are focused on the types of questions and the detachments of exam proctor but verifying the authentication of answer sheet. There are several forms to make answers; selection type, short-answer type, write-out answer type, practical exercise type, etc. All the forms can be done on the Internet except the practical exercise type because the source of the examinee's answer sheet is unreliable. In this paper, we made the verification system to solve the doubt by setting the proved information on the answer sheet. Putting the information down to confirm the authenticity during the exam on the server is distinct character of this system. After the test finished, the system will operate when examinee turn in the answer sheet.

Improved Routing Metrics for Energy Constrained Interconnected Devices in Low-Power and Lossy Networks

  • Hassan, Ali;Alshomrani, Saleh;Altalhi, Abdulrahman;Ahsan, Syed
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.327-332
    • /
    • 2016
  • The routing protocol for low-power and lossy networks (RPL) is an internet protocol based routing protocol developed and standardized by IETF in 2012 to support a wide range of applications for low-power and lossy-networks (LLNs). In LLNs consisting of resource-constrained devices, the energy consumption of battery powered sensing devices during network operations can greatly impact network lifetime. In the case of inefficient route selection, the energy depletion from even a few nodes in the network can damage network integrity and reliability by creating holes in the network. In this paper, a composite energy-aware node metric ($RER_{BDI}$) is proposed for RPL; this metric uses both the residual energy ratio (RER) of the nodes and their battery discharge index. This composite metric helps avoid overburdening power depleted network nodes during packet routing from the source towards the destination oriented directed acyclic graph root node. Additionally, an objective function is defined for RPL, which combines the node metric $RER_{BDI}$ and the expected transmission count (ETX) link quality metric; this helps to improve the overall network packet delivery ratio. The COOJA simulator is used to evaluate the performance of the proposed scheme. The simulations show encouraging results for the proposed scheme in terms of network lifetime, packet delivery ratio and energy consumption, when compared to the most popular schemes for RPL like ETX, hop-count and RER.

Analysis of Extension Pattern for Network of Movie Stars from Korea Movies 100 (한국영화 100선에 등장하는 영화배우 네트워크 확장 패턴 분석)

  • Ryu, Jea-Woon;Kim, Hak-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.420-428
    • /
    • 2010
  • The advancement of the Science for complex systems enables the analysis of many social networks. We constructed and analyzed a Korean movie star network as one of social networks, based on the 100 Korean movie selection for a main data source. Until now, the research trend has been the structural analysis of network, focused on link numbers, such as degree, betweenness and clustering coefficient. But it is time that the research is not limited by the structural analysis of networks only. Rather, the research goal should be aimed to an information analysis, performed by identifying and analyzing central modules that are regarded as the core of complex networks, using k-core analysis method. In this research, we constructed a network of movie stars who have appeared in 100 Korean movie selection, provided by Korean movie database, also we analyzed its core modules with and without weights, and the trend of seasonal expansion of the network. We expect our findings can be used as the basic data applicable to a model for understanding of the expansion and evolution of networks.

A Study on Automatic Generation Method of Proxy Client Code to Quality Information Collection (품질 정보 수집을 위한 프록시 클라이언트 코드의 자동 생성 방안에 관한 연구)

  • Seo, young-jun;Han, jung-soo;Song, young-jae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.121-125
    • /
    • 2007
  • This paper proposes automatic generation method of proxy client code to automation of web service selection process through a monitoring agent. The technique of this paper help service consumer to provide source code of proxy client as it bring an attribute value of specific element of WSDL document using template rule. Namely, a XSLT script file provide code frame of dynamic invocation interface model. The automatic code generation technique need to solving starvation status of selection architecture. It is required to creating request HTTP message for every service on the result of search. The created proxy client program code generate dummy message about services. The proposed client code generation method show us a possibility of application in the automatic generation programming domain.

  • PDF