• Title/Summary/Keyword: Information communication

Search Result 42,841, Processing Time 0.066 seconds

A Study on Netwotk Effect by using System Dynamics Analysis: A Case of Cyworld (시스템 다이내믹스 기법을 이용한 네트워크 효과 분석: 싸이월드 사례)

  • Kim, Ga-Hye;Yang, Hee-Dong
    • Information Systems Review
    • /
    • v.11 no.1
    • /
    • pp.161-179
    • /
    • 2009
  • Nowadays an increasing number of Internet users are running individual websites as Blog or Cyworld. As this type of personal media has a great influence on communication among people, business comes to care about Network Effect, Network Software, and Social Network. For instance, Cyworld created the web service called 'Minihompy' for individual web-logs, and acquired 2.4milion users in 2007. Although many people assumed that the popularity of Minihompy, or Blog would be a passing fad, Cyworld has improved its service, and expanded its Network with various contents. This kind of expansion reflects survival efforts from infinite competitions among ISPs (Internet Service Provider) with focus on enhancing usability to users. However, Cyworld's Network Effect is gradually diminished in these days. Both of low production cost of service vendors and the low searching/conversing costs of users combine to make ISPs hard to keep their market share sustainable. To overcome this lackluster trend, Cyworld has adopted new strategies and try to lock their users in their service. Various efforts to improve the continuance and expansion of Network effect remain unclear and uncertain. If we understand beforehand how a service would improve Network effect, and which service could bring more effect, ISPs can get substantial help in launching their new business strategy. Regardless many diverse ideas to increase their user's duration online ISPs cannot guarantee 'how the new service strategies will end up in profitability. Therefore, this research studies about Network effect of Cyworld's 'Minihompy' using System-Dynamics method which could analyze dynamic relation between users and ISPs. Furthermore, the research aims to predict changes of Network Effect based on the strategy of new service. 'Page View' and 'Duration Time' can be enhanced for the short tenn because they enhance the service functionality. However, these services cannot increase the Network in the long-run. Limitations of this research include that we predict the future merely based on the limited data. We also limit the independent variables over Network Effect only to the following two issues: Increasing the number of users and increasing the Service Functionality. Despite of some limitations, this study perhaps gives some insights to the policy makers or others facing the stiff competition in the network business.

Experimental Design of S box and G function strong with attacks in SEED-type cipher (SEED 형식 암호에서 공격에 강한 S 박스와 G 함수의 실험적 설계)

  • 박창수;송홍복;조경연
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.123-136
    • /
    • 2004
  • In this paper, complexity and regularity of polynomial multiplication over $GF({2^n})$ are defined by using Hamming weight of rows and columns of the matrix ever GF(2) which represents polynomial multiplication. It is shown experimentally that in order to construct the block cipher robust against differential cryptanalysis, polynomial multiplication of substitution layer and the permutation layer should have high complexity and high regularity. With result of the experiment, a way of constituting S box and G function is suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with a nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over $GF({2^8})$ which has neither a fixed pout, whose input and output are the same except 0 and 1, nor an opposite fixed number, whose output is one`s complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes linear transform with 4 S-box outputs using the matrix of 4${\times}$4 over $GF({2^8})$. The components in the matrix of linear transformation have high complexity and high regularity. Furthermore, G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, and there can be no weak input where a fixed point an opposite fixed point, and output can be two`s complement of input. The primitive polynomials of nonlinear function affine transform and linear transformation are different each other. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.

Managing Technological Risk and Risk Conflict : Public Debates on Health Risks of Mobile Phones EMF (기술위험 관리와 위험갈등 : 휴대전화 전자파의 인체유해성 논란)

  • Jung, Byung-Kul
    • Journal of Science and Technology Studies
    • /
    • v.8 no.1
    • /
    • pp.97-129
    • /
    • 2008
  • We are living in the time of high probability of technological risk due to increased rate of technology development and diffusion of new technologies. Resolving uncertainties, the basic attribution of risk, by accumulating knowledge over the risk factors of certain technology is critical to management of technological risk. In many cases of technological risks, high uncertainty of knowledge is commonly mentioned reason for public controversies on risk management. However, the type of technological risk with low social agreement and low uncertainty of knowledge, the main reason for public controversy is absence of social agreement. Public debates on the risks of mobile phones electromagnetic fields(EMF) to human health comes under this category. The knowledge uncertainty on human health effect of mobile phones EMF has been lowered increasingly by accumulating enormous volume of knowledge though scientists have not reached a final conclusion whether it pose a risk to the physical and mental health of the general population or not. In contrast with civil organizations calling for precautionary approach based regulation, the mobile phone industry is cling to the position of no-regulation-needed by arguing no clear evidence to prove health risks of mobile phone EMF has found. In Korea, government set exposure standards based on a measurement called the 'specific absorption rate'(SAR) and require the mobile phone industry to open SAR information to the public by their own decision. From the view of pro-regulation side based on precautionary approach, technology risk managament of mobile phones EMF in Korea is highly limited and formalized one with limited measuring of SAR on head part only and problematic self-regulated opening of information about SAR to the public. As far as the government keeps having priority on protecting interest of mobile phone industry over precautionary regulation of mobile phones EMF, the disagreement between civil organizations and the government will not resolved. The risk of mobile phones EMF to human health have high probability of being underestimated in the rate and damage of risk than objectively estimated ones due to familiarity of mobile phone technology. And this can be the cause of destructive social dispute or devastating disaster. To prevent such disastrous results, technology risk management, which integrating the goals of safety with economic growth in public policy and designing and promoting risk communication, is required.

  • PDF

Analysis of body surface temperature by Pulsed Magnetic Fields system for evaluation of therapeutic effect of Delayed Onset Muscle Soreness (지연성 근육통증 회복 평가를 위한 경혈 부위에서의 자기장자극에 대한 체열변화 분석)

  • Lee, Na-Ra;Lee, Seung-Wook;Kim, Young-Dae;Kim, Soo-Byeong;Lee, Kyong-Joung;Lee, Yong-Heum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.645-653
    • /
    • 2011
  • The aim of this study was to develop a Pulsed Magnetic Fields(PMFs) system which can produce effects locally and simulate muscular tissues equally. To evaluate the PMFs system we caused DOMS(Delayed Onset Muscle Soreness) to subjects in biceps of the arm. Then, we stimulated acupoint HT2 using PMFs(20 minutes) and TEAS(20 minutes) for 2 days. The other subjects did not stimulate. Then we checked body surface temperature in biceps of the arm. All subjects had an asymmetrical body surface temperature in biceps after exercise(Non-stimulation group=$2.00{\pm}1.16^{\circ}C$, TEAS group=$1.73{\pm}0.52^{\circ}C$, PMFs group=$1.48{\pm}0.51^{\circ}C$). After 1st stimulation all subjects had decreased temperature differences(Non-stimulation group=$1.37{\pm}0.71^{\circ}C$, TEAS group=$1.08{\pm}0.43^{\circ}C$, PMFs group=$1.23{\pm}0.15^{\circ}C$). PMFs group had a symmetry body surface temperature after 24 hours($0.05{\pm}0.06^{\circ}C$) and TEAS group had that after 48 hours($0.1{\pm}0.08^{\circ}C$). Non-stimulation group did not recovery after 48 hours($0.37{\pm}0.06^{\circ}C$). Therefore, PMFs on acupoint had an therapeutic effect in DOMS.

An Effect of the Personality Types on the Preference of the Conflicts Handling Styles (성격유형이 갈등관리유형 선호에 미치는 영향에 관한 연구)

  • Chung, Bhum-Suk;Yang, Gi-Dong
    • Management & Information Systems Review
    • /
    • v.24
    • /
    • pp.125-154
    • /
    • 2008
  • The purpose of this study is to analyze how the organizational structure, task group functioning and need styles have influence on the conflicts handling styles such as integrating, avoiding, dominating, obliging and compromising as the employee's personality engaged in the service industry. This study uses the hierarchical regression analysis method. Data were collected by the survey method from employees engaged in the service industry located Seoul, the Province of Gyeonggi, and the Province of Gangwon. The study result shows that to the employees with the type A style, need styles are significantly related to the conflicts handling styles such as avoiding. But to the employees with the type B style, need styles are significantly related to the conflicts handling styles such as integrating and avoiding. On the other hand the result shows that the higher the need for achievement and the lower the need for autonomy, employees with the type B style prefer integrating styles to other conflicts handling styles. Or the higher the need for dominance, employees with the type B style prefer dominating styles to other conflicts handling styles. And the higher the need for dominance, employees with the type A style prefer dominating styles to other conflicts handling styles. The study result shows that to the employees with the type A and type X style, task group functioning are significantly related to the conflicts handling styles such as obliging and compromising. But to the employees with the type B style, task group functioning are significantly related to the conflicts handling styles such as obliging and dominating. On the other hand the result shows that the lower faith in peers and management and the higher confidence in peers and management, employees with the type B style prefer obliging style to other conflicts handling styles. But the higher group homogeneity and group cohesiveness, the lower faith in peers and management and the higher confidence in peers and management, employees with the type X style prefer obliging style to other conflicts handling styles. And the higher confidence in peers and management, employees with the type A style prefer compromising style to other conflicts handling styles. The study result shows that to the employees with the type A, organizational structure functioning are significantly related to the conflicts handling styles such as avoiding, obliging and compromising. But to the employees with the type X style, organizational structure functioning are significantly related to the conflicts handling styles such as dominating. On the other hand the result shows that the higher role conflict, the lower role ambiguity and the higher communication system, employees with the type A style prefer avoiding style to other conflicts handling styles. But the lower role ambiguity, employees with the type X style prefer compromising style to other conflicts handling styles. To conclude from these results, employees with the type A style have influence on the organizational structure functioning to other factors on the preference of the conflicts handling styles. And employees with the type B style have influence on the needs styles to other factors on the preference of the conflicts handling styles. Or employees with the type X style have influence on the task group functioning to other factors on the preference of the conflicts handling styles. Although this study provides several managerial implications, this study has some limitations. Specifically data were collected from only the service industry in Seoul, the Province of Gyeonggi, and the Province of Gangwon. In spite of the limitations, the study results could be used valuably in case of the personnel managers which manage the employees under the conflict situations.

  • PDF

Longest First Binary Search on Prefix Length for IP Address Lookup (최장 길이 우선 검색에 기초한 프리픽스 길이에 따른 이진 IP 검색 구조)

  • Chu Ha-Neul;Lim Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.691-700
    • /
    • 2006
  • Based on the destination IP address of incoming packets, the Internet routers determine next hops and forward packets toward final destinations through If address lookup. The bandwidth of communication links increases exponentially fast as well as the routing table size grows significant as the number of single host networks attached to the Internet increases. Since packets should be processed at wire-speed, the increased link speed reduces the processing time of a packet in routers, and hence more efficient and fast IP address lookup algorithms and architectures are required in the next generation routers. Most of the previous IP lookup schemes compare routing prefixes of shorter length first with a given input IP address. Since IP address lookup needs to find the most specific route of the given input, search continues until the longest matched prefix is found while it keeps remembering the current test matching prefix. In this paper, based on binary search on prefix length, we proposed a new IP address lookup algorithm which compares longer prefixes first. The proposed scheme is consisted of multiple tries with prefixes on leaves only. The trie composed of the longest prefixes is primarily searched whether there is a match with the given input. This processing is repeated for the trio of the next longer prefixes until there finds a match. Hence the proposed algorithm provides the fast search speed. The proposed algorithm also provides the incremental update of prefixes while the previous binary search on length scheme does not provide the incremental update because of pre-processing requirement. In this paper, we performed extensive simulations and showed the performance comparisons with related works.

A Study on Establishment of the Optimum Mountain Meteorological Observation Network System for Forest Fire Prevention (산불 방지를 위한 산악기상관측시스템 구축방안)

  • Lee, Si-Young;Chung, Il-Ung;Kim, Sang-Kook
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.1
    • /
    • pp.36-44
    • /
    • 2006
  • In this study, we constructed a forest fire danger map in the Yeongdong area of Gangwon-do and Northeastern area of Gyeongsangbuk-do using a forest fire rating model and geographical information system (GIS). We investigated the appropriate positions of the automatic weather station (AWS) and a comprehensive network solution (a system including measurement, communication and data processing) for the establishment of an optimum mountain meteorological observation network system (MMONS). Also, we suggested a possible plan for combining the MMONS with unmanned monitoring camera systems and wireless relay towers operated by local governments and the Korea Forest Service for prevention of forest fire.

Study on sea fog detection near Korea peninsula by using GMS-5 Satellite Data (GMS-5 위성자료를 이용한 한반도 주변 해무탐지 연구)

  • 윤홍주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.4
    • /
    • pp.875-884
    • /
    • 2000
  • Sea fog/stratus is very difficult to detect because of the characteristics of air-sea interaction and locality ,and the scantiness of the observed data from the oceans such as ships or ocean buoys. The aim of our study develops new algorism for sea fog detection by using Geostational Meteorological Satellite-5(GMS-5) and suggests the technics of its continuous detection. In this study, atmospheric synoptic patterns on sea fog day of May, 1999 are classified; cold air advection type(OOUTC, May 10, 1999) and warm air advection type(OOUTC, May 12, 1999), respectively, and we collected two case days in order to analyze variations of water vapor at Osan observation station during May 9-10, 1999.So as to detect daytime sea fog/stratus(OOUTC, May 10, 1999), composite image, visible accumulated histogram method and surface albedo method are used. The characteristic value during day showed A(min) .20% and DA < 10% when visible accumulated histogram method was applied. And the sea fog region which is detected is similar in composite image analysis and surface albedo method. Inland observation which visibility and relative humidity is beneath 1Km and 80%, respectively, at OOUTC, May 10,1999; Poryoung for visble accumulated histogram method and Poryoung, Mokp'o and Kangnung for surface albedo method. In case of nighttime sea fog(18UTC, May 10, 1999), IR accumulated histogram method and Maximum brightness temperature method are used, respectively. Maxium brightness temperature method dectected sea fog better than IR accumulated histogram method with the charateristic value that is T_max < T_max_trs, and then T_max is beneath 700hPa temperature of GDAPS(Global Data Assimilation and Prediction System). Sea fog region which is detected by Maxium brighness temperature method was similar to the result of National Oceanic and Atmosheric Administratio/Advanced Very High Resolution Radiometer (NOAA/AVHRR) DCD(Dual Channel Difference), but usually visibility and relative humidity are not agreed well in inland.

  • PDF

A Hardware Implementation of the Underlying Field Arithmetic Processor based on Optimized Unit Operation Components for Elliptic Curve Cryptosystems (타원곡선을 암호시스템에 사용되는 최적단위 연산항을 기반으로 한 기저체 연산기의 하드웨어 구현)

  • Jo, Seong-Je;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.88-95
    • /
    • 2002
  • In recent years, the security of hardware and software systems is one of the most essential factor of our safe network community. As elliptic Curve Cryptosystems proposed by N. Koblitz and V. Miller independently in 1985, require fewer bits for the same security as the existing cryptosystems, for example RSA, there is a net reduction in cost size, and time. In this thesis, we propose an efficient hardware architecture of underlying field arithmetic processor for Elliptic Curve Cryptosystems, and a very useful method for implementing the architecture, especially multiplicative inverse operator over GF$GF (2^m)$ onto FPGA and futhermore VLSI, where the method is based on optimized unit operation components. We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed and inversion speed has been improved 150 times, 480 times respectively compared with the thesis presented by Sarwono Sutikno et al. [7]. The designed underlying arithmetic processor can be also applied for implementing other crypto-processor and various finite field applications.

A Page Replacement Scheme Based on Recency and Frequency (최근성과 참조 횟수에 기반한 페이지 교체 기법)

  • Lee, Seung-Hoon;Lee, Jong-Woo;Cho, Seong-Je
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.469-478
    • /
    • 2001
  • In the virtual memory system, page replacement policy exerts a great influence on the performance of demand paging. There are LRU(Least Recently Used) and LFU (Least Frequently Used) as the typical replacement policies. The LRU policy performs effectively in many cases and adapts well to the changing workloads compared to other policies. It however cannot distinguish well between frequently and infrequently referenced pages. The LFU policy requires that the page with the smallest reference count be replaced. Though it considers all the references in the past, it cannot discriminate between references that occurred far back in the past and the more recent ones. Thus, it cannot adapt well to the changing workload. In this paper, we first analyze memory reference patterns of eight applications. The patterns show that the recently referenced pages or the frequently referenced pages are accessed continuously as the case may be. So it is rather hard to optimize page replacement scheme by using just one of the LRU or LFU policy. This paper makes an attempt to combine the advantages of the two policies and proposes a new page replacement policy. In the proposed policy, paging list is divided into two lists (LRU and LFU lists). By keeping the two lists in recency and reference frequency order respectively, we try to restrain the highly referenced pages in the past from being replaced by the LRU policy. Results from trace-driven simulations show that there exists points on the spectrum at which the proposed policy performs better than the previously known policies for the workloads we considered. Especially, we can see that our policy outperforms the existing ones in such applications that have reference patterns of re-accessing the frequently referenced pages in the past after some time.

  • PDF