• 제목/요약/키워드: Information Use Environments

검색결과 1,188건 처리시간 0.031초

소규모 비즈니스 SNS활용의 효과 (The Effect of SNS Usage in Small Business)

  • 김도관;진찬용
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.199-200
    • /
    • 2015
  • 현재의 시간과 공간의 제약이 없는 ICT 환경은 다양한 비즈니스에서 광고, 마케팅 등 다양한 목적으로 활용되고 있다. 그러나 소규모 자영업자들의 경우 이러한 ICT 환경을 활용하지 않는 못하는 사례가 더욱 많다. 이러한 점에서 본 연구는 SNS 및 블로그와 같은 ICT 수단을 활용하는 그룹과 활용하지 않는 그룹에 대하여 비즈니스 측면에서 어떤 차이가 있는지에 대한 사례분석을 하고자 한다. 아울러 SNS 및 다양한 ICT를 활용 방법에 대한 로드맵을 제시하고자 한다.

  • PDF

ATM망에서 실용적 연결수락제어 기법 (A Practical Connection Admission Control Scheme in ATM Networks)

  • 강구홍;박상조
    • 한국정보과학회논문지:정보통신
    • /
    • 제29권2호
    • /
    • pp.181-187
    • /
    • 2002
  • Connection admission control(CAC), which decides whether or not to accept a new call request, is one of the most Important preventive congestion control techniques in asynchronous transfer mode(ATM) networks. To develop a practical CAC scheme, first we propose a "Modified Cell Loss Probability MP${\nu}"$, which is based on "Virtual Cell Loss Probability P${\nu}"$, taking into account mean burst duration of input traffic source and buffer size in ATM networks. MP${\nu}"$ computes more accurate cell loss probability than P${\nu}"$ without increasing computational complexity, since P${\nu}"$ is formulated simply form the maximum and the average cell rate of input traffic. P${\nu}"$ is overestimated as compared to the real cell loss probability when the mean burst duration is relatively small to the buffer capacity. Then, we Propose a CAC scheme, based on "Modified Virtual Bandwidth(MVB)" method, which may individualize the cell loss probabilities in heterogeneous traffic environments. For the proposed approach, we define the interference intensity to identify interferences between heterogeneous traffic sources and use it as well as MP${\nu}"$ to compute MVB. Our approach is well suitable for ATM networks since it provides high bandwidth utilization and guarantees simple and real time CAC computation for heterogeneous traffic environments.heterogeneous traffic environments.

중역정보 시스템의 활용에 관한 실증연구 (An Empirical Investigation for EIS Utilization:On the Basis of TAM)

  • Kim, Jong-Weon
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제6권1호
    • /
    • pp.257-291
    • /
    • 1997
  • Today, executives in the company operate their organizations under highly competitive environments with dynamic technological, economic, and political changes. Under these new environment changes, they play the important role in establishing the future directions and strategic orientations of organizations. In general, executive information systems (EIS) are designed to support these roles of executives. They can help executives access and use the information they require about the organization's internal and external environments. In spite of such potential EIS support for executives, only a limited number of empirical studies have been published in this area. by employing a well-established theory of computer usage behavior (Technology Acceptance Model : TAM), this study systematically investigates the key factors in the successful utilization of an EIS. The empirical results from this study may prove useful for both IS researchers and practitioners.

  • PDF

A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart city Environments

  • 김동현;신지호;서정택
    • 인터넷정보학회논문지
    • /
    • 제24권1호
    • /
    • pp.17-26
    • /
    • 2023
  • A smart city is a massive internet of things (IoT) environment, where all terminal devices are connected to a network to create and share information. In accordance with massive IoT environments, millions of IoT devices are connected, and countless data are generated in real time. However, since heterogeneous IoT devices are used, collecting the logs for each IoT device is difficult. Due to these issues, when an IoT device is invaded or is engaged in malicious behavior, such as infection with malware, it is difficult to respond quickly, and additional damage may occur due to information leakage or stopping the IoT device. To solve this problem, in this paper, we propose identifying the attack technique used for initial access to IoT devices through MITRE ATT&CK, collect the logs that can be generated from the identified attack technique, and use them to identify the cause of malware infection.

Secure Authentication Scheme with Anonymity for Wireless Environments

  • Xiu, Anna;Li, Kun;Kim, Hyoung-Joong
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.1033-1036
    • /
    • 2011
  • With the development of wireless networks and the use of mobile devices, mobile user's privacy issue is becoming more and more important. Privacy includes ID anonymity and unlinkability. Unlinkability requires that any two temporary IDs which have been used before should not be associated with each other. In other words, these temporary IDs should be generated in such a way that no direct relationship among them should be derived. The existing schemes only focus on ID anonymity of mobile users. In this paper, we proposed a scheme not only holding all the merits of previous works, but also achieving unlinkability which is guaranteed by using one-time-use temporary ID. And the mobile user can also updates its one-time-use temporary ID with the help of the visited foreign agent.

소프트 컴퓨팅기술을 이용한 원격탐사 다중 분광 이미지 데이터의 분류에 관한 연구 -Rough 집합을 중심으로- (A Study on Classifications of Remote Sensed Multispectral Image Data using Soft Computing Technique - Stressed on Rough Sets -)

  • 원성현
    • 경영과정보연구
    • /
    • 제3권
    • /
    • pp.15-45
    • /
    • 1999
  • Processing techniques of remote sensed image data using computer have been recognized very necessary techniques to all social fields, such as, environmental observation, land cultivation, resource investigation, military trend grasp and agricultural product estimation, etc. Especially, accurate classification and analysis to remote sensed image da are important elements that can determine reliability of remote sensed image data processing systems, and many researches have been processed to improve these accuracy of classification and analysis. Traditionally, remote sensed image data processing systems have been processed 2 or 3 selected bands in multiple bands, in this time, their selection criterions are statistical separability or wavelength properties. But, it have be bring up the necessity of bands selection method by data distribution characteristics than traditional bands selection by wavelength properties or statistical separability. Because data sensing environments change from multispectral environments to hyperspectral environments. In this paper for efficient data classification in multispectral bands environment, a band feature extraction method using the Rough sets theory is proposed. First, we make a look up table from training data, and analyze the properties of experimental multispectral image data, then select the efficient band using indiscernibility relation of Rough set theory from analysis results. Proposed method is applied to LANDSAT TM data on 2 June 1992. From this, we show clustering trends that similar to traditional band selection results by wavelength properties, from this, we verify that can use the proposed method that centered on data properties to select the efficient bands, though data sensing environment change to hyperspectral band environments.

  • PDF

방송 환경에서 효율적인 트랜잭션 관리 방법에 관한 연구 (A Study for Efficient Transaction Management in Broadcast Environments)

  • 김치연
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2002년도 추계종합학술대회
    • /
    • pp.648-651
    • /
    • 2002
  • 데이터를 방송하는 환경에서 데이터는 소수의 서버로부터 다수의 클라이언트에게 전파된다. 하드웨어 발전과 사용자 요구 증가로 방송 환경은 확장되고 있다. 사용자의 이동을 허락하는 이동 컴퓨팅 환경에서도 방송을 사용하여 데이터를 전파한다. 사용자들은 이동 가능한 컴퓨터를 이용하여 트랜잭션을 제출한다. 이동 환경이 갖는 제한된 자원과 이동성, 낮은 대역폭과 같은 특징들로 인하여 전통적인 환경에서 사용되는 트랜잭션 관리 방법은 적합하지 않다. 따라서 새로운 관리 방법을 필요로 하는데, 그 중 하나가 트랜잭션의 정확성 기준이다. 지금까지 가장 널리 사용되어진 기준은 직렬성인데, 방송 환경이 갖는 제약으로 인하여 트랜잭션의 불필요한 철회나 잦은 메시지 교환이 발생한다. 따라서 이 논문에서는 방송 환경에 적합한 새로운 정확성 기준의 필요에 대하여 언급하고, 갱신 일관성이라 불리는 기준의 적용에 대하여 기술한다.

  • PDF

근로자들은 나쁜 근로환경에 대해 보상 받는가? (Are Adverse Working Environments Adequately Compensated in South Korea?)

  • 이용관
    • 노동경제논집
    • /
    • 제39권1호
    • /
    • pp.33-55
    • /
    • 2016
  • 본 연구는 근로환경이 근로자의 객관적 주관적 보상과 어떠한 관계를 가지는지를 분석함으로써 한국노동시장에 나쁜 근로환경에 대한 보상이 존재하는지를 확인하고 시사점을 제공한다. 근로자가 당면하고 있는 다양한 근로환경과 보상지표를 제공하는 한국근로환경조사(KWCS) 자료를 사용하여 분석한 결과 나쁜 근로환경을 대표하는 위험성은 임금과 유의미한 관계를 보이지 않는 반면 보상만족도와는 부(-)의 관계로 나타난다. 이는 근로자들은 나쁜 근로환경에 대한 보상이 이루어져야 한다고 인식하고 있으나 실제 노동시장에서는 금전적 보상이 이루어지지 않는다는 것을 시사한다. 또한, 노동시장에서 물리적인 위험요인보다 정신적인 위험요인에 대한 기대 보상수준이 높게 나타나며, 이러한 경향은 남성에 비해 여성이 더 크게 나타난다.

  • PDF

DL-RRT* algorithm for least dose path Re-planning in dynamic radioactive environments

  • Chao, Nan;Liu, Yong-kuo;Xia, Hong;Peng, Min-jun;Ayodeji, Abiodun
    • Nuclear Engineering and Technology
    • /
    • 제51권3호
    • /
    • pp.825-836
    • /
    • 2019
  • One of the most challenging safety precautions for workers in dynamic, radioactive environments is avoiding radiation sources and sustaining low exposure. This paper presents a sampling-based algorithm, DL-RRT*, for minimum dose walk-path re-planning in radioactive environments, expedient for occupational workers in nuclear facilities to avoid unnecessary radiation exposure. The method combines the principle of random tree star ($RRT^*$) and $D^*$ Lite, and uses the expansion strength of grid search strategy from $D^*$ Lite to quickly find a high-quality initial path to accelerate convergence rate in $RRT^*$. The algorithm inherits probabilistic completeness and asymptotic optimality from $RRT^*$ to refine the existing paths continually by sampling the search-graph obtained from the grid search process. It can not only be applied to continuous cost spaces, but also make full use of the last planning information to avoid global re-planning, so as to improve the efficiency of path planning in frequently changing environments. The effectiveness and superiority of the proposed method was verified by simulating radiation field under varying obstacles and radioactive environments, and the results were compared with $RRT^*$ algorithm output.

효율적 S/W 개발을 위한 CASE 도구 활용의 실증적 연구 (An Empirical Study on the Use of CASE Tools for Efficient Software Development)

  • 전응섭;남상조
    • Asia pacific journal of information systems
    • /
    • 제3권1호
    • /
    • pp.31-53
    • /
    • 1993
  • Computer Aided Software Engineering(CASE) tools are suggested as an automated method for the efficient development of softwares. This study are intended to measure the use level of CASE tools and to provide the meaningful information on the whole software development environment supported by CASE tools. Therefore, the results of a survey on CASE environment in Korea are empirically reported and analyzed. The use of CASE tools is measured; purposes purchasing CASE tools and achievement levels are investigated. Implications from the comparative analysis of the utilization of software engineering methodologies between the CASE user group and the non-user group are described. A proposition is suggested to check the request frequency for program change. Further studies on the reverse engineering, program reuse and the use of CASE tools under distributed processing systems such as client-server environments are suggested.

  • PDF