• Title/Summary/Keyword: Information Use Environments

Search Result 1,185, Processing Time 0.029 seconds

The Effect of SNS Usage in Small Business (소규모 비즈니스 SNS활용의 효과)

  • Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.199-200
    • /
    • 2015
  • ICT environments without limitations of time and space have been used for various purposes such as advertisement and marketing in various businesses. However, in the case of small businesses, some of small businesses have not used ICT environments for their business purposes or have not known how-to-use. In this point, this study is to understand the differences of ICT business effect between ICT usage and non-usage group. And then, it suggests the road map for the usage of SNS and ICT environments in small businesses.

  • PDF

A Practical Connection Admission Control Scheme in ATM Networks (ATM망에서 실용적 연결수락제어 기법)

  • Kang, Koo-Hong;Park, Sang-Jo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.181-187
    • /
    • 2002
  • Connection admission control(CAC), which decides whether or not to accept a new call request, is one of the most Important preventive congestion control techniques in asynchronous transfer mode(ATM) networks. To develop a practical CAC scheme, first we propose a "Modified Cell Loss Probability MP${\nu}"$, which is based on "Virtual Cell Loss Probability P${\nu}"$, taking into account mean burst duration of input traffic source and buffer size in ATM networks. MP${\nu}"$ computes more accurate cell loss probability than P${\nu}"$ without increasing computational complexity, since P${\nu}"$ is formulated simply form the maximum and the average cell rate of input traffic. P${\nu}"$ is overestimated as compared to the real cell loss probability when the mean burst duration is relatively small to the buffer capacity. Then, we Propose a CAC scheme, based on "Modified Virtual Bandwidth(MVB)" method, which may individualize the cell loss probabilities in heterogeneous traffic environments. For the proposed approach, we define the interference intensity to identify interferences between heterogeneous traffic sources and use it as well as MP${\nu}"$ to compute MVB. Our approach is well suitable for ATM networks since it provides high bandwidth utilization and guarantees simple and real time CAC computation for heterogeneous traffic environments.heterogeneous traffic environments.

An Empirical Investigation for EIS Utilization:On the Basis of TAM (중역정보 시스템의 활용에 관한 실증연구)

  • Kim, Jong-Weon
    • The Journal of Information Systems
    • /
    • v.6 no.1
    • /
    • pp.257-291
    • /
    • 1997
  • Today, executives in the company operate their organizations under highly competitive environments with dynamic technological, economic, and political changes. Under these new environment changes, they play the important role in establishing the future directions and strategic orientations of organizations. In general, executive information systems (EIS) are designed to support these roles of executives. They can help executives access and use the information they require about the organization's internal and external environments. In spite of such potential EIS support for executives, only a limited number of empirical studies have been published in this area. by employing a well-established theory of computer usage behavior (Technology Acceptance Model : TAM), this study systematically investigates the key factors in the successful utilization of an EIS. The empirical results from this study may prove useful for both IS researchers and practitioners.

  • PDF

A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart city Environments

  • Donghyun Kim;Jiho Shin;Jung Taek Seo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.17-26
    • /
    • 2023
  • A smart city is a massive internet of things (IoT) environment, where all terminal devices are connected to a network to create and share information. In accordance with massive IoT environments, millions of IoT devices are connected, and countless data are generated in real time. However, since heterogeneous IoT devices are used, collecting the logs for each IoT device is difficult. Due to these issues, when an IoT device is invaded or is engaged in malicious behavior, such as infection with malware, it is difficult to respond quickly, and additional damage may occur due to information leakage or stopping the IoT device. To solve this problem, in this paper, we propose identifying the attack technique used for initial access to IoT devices through MITRE ATT&CK, collect the logs that can be generated from the identified attack technique, and use them to identify the cause of malware infection.

Secure Authentication Scheme with Anonymity for Wireless Environments

  • Xiu, Anna;Li, Kun;Kim, Hyoung-Joong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1033-1036
    • /
    • 2011
  • With the development of wireless networks and the use of mobile devices, mobile user's privacy issue is becoming more and more important. Privacy includes ID anonymity and unlinkability. Unlinkability requires that any two temporary IDs which have been used before should not be associated with each other. In other words, these temporary IDs should be generated in such a way that no direct relationship among them should be derived. The existing schemes only focus on ID anonymity of mobile users. In this paper, we proposed a scheme not only holding all the merits of previous works, but also achieving unlinkability which is guaranteed by using one-time-use temporary ID. And the mobile user can also updates its one-time-use temporary ID with the help of the visited foreign agent.

A Study on Classifications of Remote Sensed Multispectral Image Data using Soft Computing Technique - Stressed on Rough Sets - (소프트 컴퓨팅기술을 이용한 원격탐사 다중 분광 이미지 데이터의 분류에 관한 연구 -Rough 집합을 중심으로-)

  • Won Sung-Hyun
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.15-45
    • /
    • 1999
  • Processing techniques of remote sensed image data using computer have been recognized very necessary techniques to all social fields, such as, environmental observation, land cultivation, resource investigation, military trend grasp and agricultural product estimation, etc. Especially, accurate classification and analysis to remote sensed image da are important elements that can determine reliability of remote sensed image data processing systems, and many researches have been processed to improve these accuracy of classification and analysis. Traditionally, remote sensed image data processing systems have been processed 2 or 3 selected bands in multiple bands, in this time, their selection criterions are statistical separability or wavelength properties. But, it have be bring up the necessity of bands selection method by data distribution characteristics than traditional bands selection by wavelength properties or statistical separability. Because data sensing environments change from multispectral environments to hyperspectral environments. In this paper for efficient data classification in multispectral bands environment, a band feature extraction method using the Rough sets theory is proposed. First, we make a look up table from training data, and analyze the properties of experimental multispectral image data, then select the efficient band using indiscernibility relation of Rough set theory from analysis results. Proposed method is applied to LANDSAT TM data on 2 June 1992. From this, we show clustering trends that similar to traditional band selection results by wavelength properties, from this, we verify that can use the proposed method that centered on data properties to select the efficient bands, though data sensing environment change to hyperspectral band environments.

  • PDF

A Study for Efficient Transaction Management in Broadcast Environments (방송 환경에서 효율적인 트랜잭션 관리 방법에 관한 연구)

  • 김치연
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.648-651
    • /
    • 2002
  • In data broadcast environments, data is disseminated from a small number of sewers to a much larger number of clients. The advancing technology of hardware and increasing needs of users' have extended a broadcast environments. A mobile environment use the data broadcasting. A user carrying a portable computer can submit the operations of a transaction. Some limitations such as the poor-resource, user mobility, and low bandwidth are difficult to apply traditional transaction management to the mobile environments. So, the new mechanisms are needed and one of the them is the correctness criteria of transactions. Serializability is the most used criteria, but serializability is not appropriate to the broadcast environment because unnecessary abort and additional message exchanges are occurred. Hence, in this paper, we will address the need of the new correctness criteria weaker than serializability and describe the adoption of the update consistency.

  • PDF

Are Adverse Working Environments Adequately Compensated in South Korea? (근로자들은 나쁜 근로환경에 대해 보상 받는가?)

  • Lee, Yong-Kwan
    • Journal of Labour Economics
    • /
    • v.39 no.1
    • /
    • pp.33-55
    • /
    • 2016
  • This paper examines the role of adverse working environments in the determination of workers' compensation in South Korean. I use the Third Korean Working Conditions Survey(2011), Occupational Safety and Health Research Institute that provide relevant variables in objective and subjective compensation and workers of diverse working environment. I find that risk factors in adverse working environments have a very minor role in the determination of individual wages. In contrast, adverse working environments have significant relationship with the level of compensation satisfaction. In addition, the results show that workers are more likely to receive compensation from psychological risk than physical risk. And women receive much more compensation in the psychological risk. These results provide useful information for improvement of working environments.

  • PDF

DL-RRT* algorithm for least dose path Re-planning in dynamic radioactive environments

  • Chao, Nan;Liu, Yong-kuo;Xia, Hong;Peng, Min-jun;Ayodeji, Abiodun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.3
    • /
    • pp.825-836
    • /
    • 2019
  • One of the most challenging safety precautions for workers in dynamic, radioactive environments is avoiding radiation sources and sustaining low exposure. This paper presents a sampling-based algorithm, DL-RRT*, for minimum dose walk-path re-planning in radioactive environments, expedient for occupational workers in nuclear facilities to avoid unnecessary radiation exposure. The method combines the principle of random tree star ($RRT^*$) and $D^*$ Lite, and uses the expansion strength of grid search strategy from $D^*$ Lite to quickly find a high-quality initial path to accelerate convergence rate in $RRT^*$. The algorithm inherits probabilistic completeness and asymptotic optimality from $RRT^*$ to refine the existing paths continually by sampling the search-graph obtained from the grid search process. It can not only be applied to continuous cost spaces, but also make full use of the last planning information to avoid global re-planning, so as to improve the efficiency of path planning in frequently changing environments. The effectiveness and superiority of the proposed method was verified by simulating radiation field under varying obstacles and radioactive environments, and the results were compared with $RRT^*$ algorithm output.

An Empirical Study on the Use of CASE Tools for Efficient Software Development (효율적 S/W 개발을 위한 CASE 도구 활용의 실증적 연구)

  • Jeon, Eung-Seop;Nam, Sang-Jo
    • Asia pacific journal of information systems
    • /
    • v.3 no.1
    • /
    • pp.31-53
    • /
    • 1993
  • Computer Aided Software Engineering(CASE) tools are suggested as an automated method for the efficient development of softwares. This study are intended to measure the use level of CASE tools and to provide the meaningful information on the whole software development environment supported by CASE tools. Therefore, the results of a survey on CASE environment in Korea are empirically reported and analyzed. The use of CASE tools is measured; purposes purchasing CASE tools and achievement levels are investigated. Implications from the comparative analysis of the utilization of software engineering methodologies between the CASE user group and the non-user group are described. A proposition is suggested to check the request frequency for program change. Further studies on the reverse engineering, program reuse and the use of CASE tools under distributed processing systems such as client-server environments are suggested.

  • PDF