• 제목/요약/키워드: Internet Uses

검색결과 1,469건 처리시간 0.03초

국내기업의 인터넷 이용에 관한 실증적 연구

  • 장명희
    • 한국산업정보학회논문지
    • /
    • 제1권1호
    • /
    • pp.236-265
    • /
    • 1996
  • It is quite a necessity for the small and medium corporations(Abbre : SMC) to have information technology in order to survive in ever changing global business environment . Especially recently, the importance and uses of Internet have greatly increased by SMCs facing changing environment. This thesis aims to propose various application alternatives of Internet through the analysis of the Internet uses by SMCs. For the analysis, questionaires were distributed nationally to 126 small and medium corporate entities, and 64 out of 82 retrived questionaires have been used for the analysis. The analysis revealed several notable points related with Internet applications by SMCs that , although SMCs strongly feel the need for the use of Internet. -the level of recognition for the existence of the Internet was relatively low -the time used was also at low level -the job which uses Internet was mainly marketing related -and the fields applied were concentrated in those of search and e-mail. The benefits which are derived from the use of Internet include swift provision of technological information to SMCs ,improvement of active interchanges of information through the whole relate networks, strengthened promotion of products made by Internet to promote smooth communications (among related divisions or personnels), to automate work systems , and to systemizestrategic management planning process etc. Consequently, it is expected that, althgough the level of application of Internet is quite low, Internet can be served as a source of information technology and futher as a weapon to better combat strong competition through various supports at government level, since small and medium corporations feel its strong need for Internet.

  • PDF

몽골 소비자들의 인터넷 이용 특성에 따른 구매집단 비교연구 (The Comparative Study between Purchasers and Non-Purchasers by the Consumers' Internet Using Characteristics in Mongolia)

  • 유호종
    • 통상정보연구
    • /
    • 제11권3호
    • /
    • pp.101-123
    • /
    • 2009
  • This research which applied with Uses and Gratification Theory tried the comparative analysis between internet purchasers and internet non-purchasers by the user's motivation, attitudes, and behavior in Mongolia, By utilizing the two-group discriminant analysis method, which tested the hypotheses of this study. In Internet Market of Mongolia, This research classifies all internet consumers into internet purchasers, and non-internet purchasers and examines the differences in motivations, behaviors, and attitudes between the two groups; based on the assumption that these two groups have different needs and expectations while using the internet. The two group discriminant analysis was conducted to identify a lot of differences between the two groups. Research results show that important differences are found in motivations for using the Internet, attitudes toward the Internet, amount of Internet usage, and frequency of visiting a certain type of Web site. In the practical aspect, This result provides an understanding of the Mongolia Internet shopping, also it could give some valuable implication for the Internet company marketers who are trying to find out how to penetrate into Mongolia internet market.

  • PDF

방화벽 문제를 극복한 인터넷 전화 서비스의 구현 (Implementation of an Internet Telephony Service that Overcomes the Firewall Problem)

  • 손주영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제27권1호
    • /
    • pp.65-75
    • /
    • 2003
  • The internet telephony service is one of the successful internet application services. VoIP is the key technology for the service to come true. VoIP uses H.323 or SIP as the standard protocol for the distributed multimedia services over the internet environment, in which QoS is not guaranteed. VoIP carries the packetized voice by using the RTP/UDP/IP protocol stack. The UDP-based internet services cause the data transmission problem to the users behind the internet firewall. So does the internet telephony service. The users are not able to listen the voices of the counter-parts on the public internet or PSTN. It makes the problem more difficult that the internet telephony service addressed in this paper uses only one UDP port number to send the voice data of all sessions from gateway to terminal node. In this paper, two schemes including the usage of dummy UDP datagrams, and the protocol conversion are suggested. The implementation of one of the schemes, the protocol conversion, and the performance evaluation are described in detail.

인터넷전화(VoIP)의 신규고객 유치를 지원하는 데이터마이닝 모델 (A Data-Mining Model to Support new Customer Acquisition for Internet Telephony(VoIP))

  • 하성호;양정원;송영미
    • Journal of Information Technology Applications and Management
    • /
    • 제17권2호
    • /
    • pp.133-154
    • /
    • 2010
  • Recently, Internet Telephony has become increasingly popular in telecommunication industry. However, previous research on Internet Telephony has focused on analyzing specific Internet Telephonysolutions, identifyingthe Internet Telephony movement itself. The research on prediction models about Internet Telephony adoption has been minimal. The main propose of this study is to develop models for predicting transition intention from using traditional telephones to using Internet Telephony. To do so, this study uses data mining methods to analyze demands in the IT communications market and to provide management strategies for Internet telephony providers. Especially this study uses discriminant analysis, logistic regression, classification tree, and neural nets to develop those prediction models toward Internet Telephony adoption. The models are compared with each other and a superior model is chosen.

  • PDF

IP기반 유선인터넷전화 가입요인 도출을 위한 분석적 연구: 통신상품결합서비스의 영향

  • 하성호;양정원
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 2010년도 춘계국제학술대회
    • /
    • pp.187-199
    • /
    • 2010
  • Recently, Internet Telephony has become increasingly popular in telecommunication industry. However, previous research on Internet Telephony has focused on analyzing specific Internet Telephony solutions, identifying the Internet Telephony movement itself. The research on prediction models about Internet Telephony adoption has been minimal. The main propose of this study is to develop models for predicting transition intention from using traditional telephones to using Internet Telephony. To do so, this study uses data mining methods to analyze demands in the IT communications market and to provide management strategies for Internet telephony providers. Especially this study uses discriminant analysis, logistic regression, classification tree, and neural nets to develop the prediction models for the Internet Telephony adoption. The models are compared with each other and a superior model is chosen.

  • PDF

인터넷을 이용한 분산제어 구현을 위한 네트워킹 (Internet-based Distributed Control Networks.)

  • 송기원;최기상;최기흥
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2001년도 춘계학술대회 논문집
    • /
    • pp.582-585
    • /
    • 2001
  • Requirements for device networks differ greatly from those of data(business) networks. Consequently, any control network technology which uses a fieldbus protocol is, in general, different from IP network protocol TCP/IP. One needs to integrate fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. This paper suggests a basic concept that can be applied to distributed control over IP network or internet. Specifically, LonWorks technology that uses LonTalk protocol is reviewed as device network. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. It is also addressed that many hardwired PLCs can be replaced by LonWorks devices. Connecting these remote LonWorks networks to the Internet can provide a powerful, integrated, distributed control system.

  • PDF

중고생의 인구학적 특성, 건강, 인터넷 중독과 약물사용과의 관계 (Relationship between Demographic Characteristics, Health and Internet Addiction and Drug Uses among the Korean High School Students)

  • 이현숙;김광선;김광회;남길우;민경원;이삼순;정찬희;이홍직;박지현
    • 한국전자통신학회논문지
    • /
    • 제8권6호
    • /
    • pp.963-969
    • /
    • 2013
  • 본 연구는 제5차 청소년건강행태 온라인조사 자료를 통해 중고생의 인구학적 특성, 건강, 인터넷 중독 요인에 따른 약물사용의 차이를 비교하고자, 첫째, 각 변인에 대한 빈도분석, 백분율, 평균 등의 기술 통계분석을 진행하였으며, 둘째, 각 독립변인에 따른 약물사용 여부의 차이를 고찰하고자 카이자승 검증을 진행하였다. 연구결과를 정리하면, 인구학적 특성 요인에 있어서는 남학생이 여학생보다, 부모와 동거하지 않는 경우에, 가계의 경제수준이 높은 경우에, 중학생의 경우에, 성적이 낮은 경우에, 건강 요인에서는 주관적으로 건강하지 못하다고 느끼는 경우에, 주관적으로 행복하지 못하다고 느끼는 경우에, 스트레스정도가 낮은 경우에, 우울을 경험한 경우에, 그리고 인터넷 중독 요인에 있어서는 인터넷 중독인 경우에 그렇지 않은 경우에 비해 통계학적으로 유의한 수준에서 높은 약물사용 빈도를 보이는 것으로 나타났다. 이상의 결과를 토대로 본 연구에서는 중고생의 약물 사용에 대한 예방과 대책에 대해 논의를 진행하였다.

멀티 에이전트를 이용한 인터넷 채용 협상 시스템의 구현 (Implementation of Internet Recruiting Negotiation System using Multi Agents)

  • 이근수;윤선희
    • 한국컴퓨터정보학회논문지
    • /
    • 제11권2호
    • /
    • pp.341-349
    • /
    • 2006
  • 본 논문은 인터넷을 이용한 채용이 보편화되어 지원자와 고용자의 채용 조건에 대한 협상이 요구되는 시점에서, 지원자와 고용자를 대신하는 협상 에이전트를 이용한 인터넷 채용 협상 시스템을 제안한다. 기존 협상 시스템이 다중 속성에 대하여 사용자의 선호도와 순차적 협상을 이용하는 것에 반하여, 제안하는 협상 시스템은 각 속성의 병렬적 협상을 수행한다. 각 속성에 대한 병렬적 협상은 단일 속성을 포함하는 다중 속성에 대한 협상을 가능하게 하며 각 속성에 대한 개별적인 협상을 통한 협상결과를 제공한다. 본 논문에서는 사용자의 선호도에 따른 가중치를 적용함으로써 보다 효율적인 협상을 제공한다는 것을 실험을 통하여 우수한 결과를 얻었다.

  • PDF

Traffic Engineering Based on Local States in Internet Protocol-Based Radio Access Networks

  • Barlow David A.;Vassiliou Vasos;Krasser Sven;Owen Henry L.;Grimminger Jochen;Huth Hans-Peter;Sokol Joachim
    • Journal of Communications and Networks
    • /
    • 제7권3호
    • /
    • pp.377-384
    • /
    • 2005
  • The purpose of this research is to develop and evaluate a traffic engineering architecture that uses local state information. This architecture is applied to an Internet protocol radio access network (RAN) that uses multi-protocol label switching (MPLS) and differentiated services to support mobile hosts. We assume mobility support is provided by a protocol such as the hierarchical mobile Internet protocol. The traffic engineering architecture is router based-meaning that routers on the edges of the network make the decisions onto which paths to place admitted traffic. We propose an algorithm that supports the architecture and uses local network state in order to function. The goal of the architecture is to provide an inexpensive and fast method to reduce network congestion while increasing the quality of service (QoS) level when compared to traditional routing and traffic engineering techniques. We use a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm. We use the network simulator ns-2 as the core of our simulation environment. Around this core we built a system of pre-simulation, during simulation, and post-processing software that enabled us to simulate our traffic engineering architecture with only very minimal changes to the core ns-2 software. Our simulation environment supports a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm.

Implementation of Search Engine to Minimize Traffic Using Blockchain-Based Web Usage History Management System

  • Yu, Sunghyun;Yeom, Cheolmin;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • 제17권5호
    • /
    • pp.989-1003
    • /
    • 2021
  • With the recent increase in the types of services provided by Internet companies, collection of various types of data has become a necessity. Data collectors corresponding to web services profit by collecting users' data indiscriminately and providing it to the associated services. However, the data provider remains unaware of the manner in which the data are collected and used. Furthermore, the data collector of a web service consumes web resources by generating a large amount of web traffic. This traffic can damage servers by causing service outages. In this study, we propose a website search engine that employs a system that controls user information using blockchains and builds its database based on the recorded information. The system is divided into three parts: a collection section that uses proxy, a management section that uses blockchains, and a search engine that uses a built-in database. This structure allows data sovereigns to manage their data more transparently. Search engines that use blockchains do not use internet bots, and instead use the data generated by user behavior. This avoids generation of traffic from internet bots and can, thereby, contribute to creating a better web ecosystem.