• Title/Summary/Keyword: Internet Model

Search Result 5,369, Processing Time 0.03 seconds

S/W model of Plastic Slice for Semi-federated Slice Control of Future Internet Testbed (미래인터넷 테스트베드의 Semi-federated Slice Control을 위한 Plastic Slice의 S/W 모델)

  • Cha, Byung-Rae;Kim, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.817-830
    • /
    • 2012
  • In rapid changes in communications and computing environment, due to the increasing variety of user requirements, and an effort to solve the fundamental problems with the current Internet, Future Internet researches actively have been performed at domestic and abroad. In this paper, we proposed the idea and basic concept of Plastic slice software mode about federation job control in study topic of future internet.

Empirical Study on a Business Model for the Internet-Based Stock Trade (국내 인터넷 주식거래를 위한 비즈니스 모델에 관한 실증연구)

  • Lee, Kun-Chang;Chung, Nam-Ho
    • Asia pacific journal of information systems
    • /
    • v.10 no.2
    • /
    • pp.125-147
    • /
    • 2000
  • The objective of this paper is to propose additional features for the success of the Internet-based stock trading companies in Korea which attempt to improve competitiveness in the stock trading market. Literature about this issue has been rarely reported. To clarify our research intention, therefore, we surveyed 24 stock trading companies which support the Internet-based stock trading systems, and gathered data about appropriate Internet business model which is deemed promising and effective in the future. Analysis results revealed that besides cheap trading transaction cost, those additional features such as convenience, reliability, speed delay, superiority, and profitability are also important as well for the success of the Internet-based stock trading.

  • PDF

A Study on the Inter-constructive Design Dictionary through the Internet. (인터넷을 통한 상호구축적 디자인 용어사전의 연구)

  • 김태균
    • Archives of design research
    • /
    • v.14 no.4
    • /
    • pp.25-33
    • /
    • 2001
  • With the increasing access to the internet, the number of designers who rely on internet to use information on design is on the rise. Therefore common dictionary of design terminology need to be formed and shared among designers. To do so, internet is very useful medium. However as relating terminology increases rapidly through interactivity among designers, it will be far from taking full advantage of features of internet to set up and provide such information unilaterally on internet. This indicates that providing data on the internet, not via traditional books, requires in-depth study on process of establishment of database structure and appropriate interface design. Thus this study will show design terms database model that harnesses internet feature that enables establishment of information spontaneously through user's interactivity, departing from a model that conveys information unilaterally. This report summarized and analyzed various models and suggested classification system in accordance with user's learning cognition. Problems on existing dictionary of design terminology were identified and new methods addressing such problems were exploited. In a word, this report is intended to propose user oriented inter-constructive database model that highlights high level of openness and interactivity by enabling changes of text in the cyber space and encouraging user to participate in making design dictionary.

  • PDF

Antecedents to Internet Privacy Concern and Their Effect on Perceived Trust for the Internet Transaction (온라인 거래에서 프라이버시 염려의 선행요인과 프라이버시 염려, 신뢰간의 관계에 관한 연구)

  • Choi, Hyuk-Ra;Shin, Jeong-Shin
    • The Journal of Information Systems
    • /
    • v.16 no.3
    • /
    • pp.21-44
    • /
    • 2007
  • Internet privacy is named as one of the major barriers to the expansion and further development of e-commerce. This study is to identify the antecedents to Internet privacy concerns, to investigate the relationship of the antecedents and the perceived trust and to validate Internet privacy's effect on the perceived trust. A conceptual model which identifies Internet literacy and perceived vulnerability as antecedents to Internet privacy concern is proposed and tested based on the sample of 276 Internet users. Empirical findings show that Internet literacy affect Internet privacy concern negatively while perceived vulnerability affect positively. Also perceived vulnerability's effect on and privacy concern's effect on perceived trust has both directional negative support. Implications and further research agenda are provided with the limitation of the study.

  • PDF

A Study on Searching for Valuation Model of Internet Security (인터넷 보안성의 가치 모형 탐색에 관한 연구)

  • Kim, Min-Choel
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.2
    • /
    • pp.337-344
    • /
    • 2005
  • This research is a study on the model of the economic value measurement of Internet Business properties(especially security property) that will take considerable parts in ail transactions. The study can contribute to decide the priority of investment among several Internet Business properties and justify the cost for improving Internet Business elements. However the study have some research limits not to be analyzed by the empirical verification. Future research agenda includes the practical survey of WTP of Internet Business properties, and the practical availability of the proposed model. Especially, many problems will occur in the process of the empirical analysis, so additional works should be done in the future.

  • PDF

A Study on the Organizational Culture and Performance of Xiaomi Corporation

  • Piao, Xue-Lian;Choi, Myeong-Cheol;Shang, Xian-Fa;Han, Joo-Hee;Pan, Xing-Chen
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.52-57
    • /
    • 2021
  • Most internet companies in China are learning from Xiaomi Corporation's management model and to improving their organizational structures and human resource management practices. This study analyzed the development situation of Chinese Internet economy and the Internet thinking of Xiaomi which is a role model of Chinese Internet companies. In addition, we studied Xiaomi's organizational structure, human resource management, employee training, performance management and incentive system. In particular, Xiaomi's human resource management system has a great influence on the company's high performance and efficient service culture. Furthermore, the organization of Xiaomi is horizontally divided into three floors (7 key founders, department heads, and employees), each floor is managed by one founder. Xiaomi is interested in and considers not only the work of new employees, but also personal issues, and is concerned with the work of others in performance management and shares responsibility. Xiaomi adopts a unique and rational human resource management model, guaranteeing a lot of work autonomy for employees, and improving organizational performance.

An Efficient Markov Chain Based Channel Model for 6G Enabled Massive Internet of Things

  • Yang, Wei;Jing, Xiaojun;Huang, Hai;Zhu, Chunsheng;Jiang, Qiaojie;Xie, Dongliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4203-4223
    • /
    • 2021
  • Accelerated by the Internet of Things (IoT), the need for further technical innovations and developments within wireless communications beyond the fifth generation (B5G) networks is up-and-coming in the past few years. High altitude platform station (HAPS) communication is expected to achieve such high levels that, with high data transfer rates and low latency, millions of devices and applications can work seamlessly. The HAPS has emerged as an indispensable component of next-generations of wireless networks, which will therefore play an important role in promoting massive IoT interconnectivity with 6G. The performance of communication and key technology mainly depend on the characteristic of channel, thus we propose an efficient Markov chain based channel model, then analyze the HAPS communication system's uplink capability and swing effect through experiments. According to the simulation results, the efficacy of the proposed scheme is proven to meet the requirements of ubiquitous connectivity in future IoT enabled by 6G.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

The Effect of Presentation of Apparel Products on Consumers' Approach Behavior using 3D Avatar Model (3차원 아바타 모델을 활용한 의류상품 제시가 소비자 접근행동에 미치는 영향)

  • Yang, Hee-Soon;Choi, Young-Lim
    • Fashion & Textile Research Journal
    • /
    • v.15 no.1
    • /
    • pp.65-72
    • /
    • 2013
  • This study utilizes a S-O-R model to investigate the effects of apparel product presentations using a 3D avatar model in Internet fashion malls for pleasure(emotional state) and approach behavior. We chose a 3D avatar model to present a fashion product in this study. The model walked for about one minute on stage; subsequently, respondents completed a questionnaire after they viewed it. The questionnaire consists of telepresence, pleasure and approach behavior. Respondents are limited to females 20s and 30s years old who have purchased fashion products in an Internet mall and are highly interested in fashion products. A total of 226 samples were used for the final analysis. Cronbach's alpha, correlation analysis, confirmatory factor analysis, and structural equation modeling were utilized in this study. The results are as follows. First, telepresence has a significant influence on pleasure; subsequently, pleasure influenced consumer approach behavior. Second, telepresence positively influenced the approach behavior (directly and indirectly). This verified the effectiveness of a 3D avatar model using S-O-R. A 3D avatar model can be a strategic alternative in the fiercely competitive Internet shopping sector.

Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model

  • Yan, Xiefei;Zou, Yun
    • ETRI Journal
    • /
    • v.30 no.1
    • /
    • pp.81-88
    • /
    • 2008
  • The security threat posed by worms has steadily increased in recent years. This paper discusses the application of the optimal and sub-optimal Internet worm control via Pontryagin's maximum principle. To this end, a control variable representing the optimal treatment strategy for infectious hosts is introduced into the two-factor worm model. The numerical optimal control laws are implemented by the multiple shooting method and the sub-optimal solution is computed using genetic algorithms. Simulation results demonstrate the effectiveness of the proposed optimal and sub-optimal strategies. It also provides a theoretical interpretation of the practical experience that the maximum implementation of treatment in the early stage is critically important in controlling outbreaks of Internet worms. Furthermore, our results show that the proposed sub-optimal control can lead to performance close to the optimal control, but with much simpler strategies for long periods of time in practical use.

  • PDF