• Title/Summary/Keyword: Internet access

Search Result 2,614, Processing Time 0.028 seconds

A Study on Consumer Satisfaction according to Fashion Life Style on the Internet Shopping (인터넷상에서 패션 라이프스타일에 따른 소비자 만족요인에 관한 연구)

  • Jeong, Yu-Jeong;Park, Ok-Lyun
    • Korean Journal of Human Ecology
    • /
    • v.13 no.1
    • /
    • pp.123-133
    • /
    • 2004
  • To investigate the factors that contribute to consumer satisfaction with the purchase of clothing, questionnaires were distributed and then consumer groups were classified according to their fashion life style on the internet shopping. The results were as follows: 1. Consumers groups were classified into trendy, Indifferent, brand inclined, conservative, and practicality- minded group by the fashion life style of the internet users. 2. From the analysis of the satisfaction factors on the internet clothing shopping, the factors were product variety, shopping convenience, customer service, confidence in order filling. 3. The most important consumer satisfaction factors according to the fashion life style were as follows: the trendy group considered the variety of clothing design most important. As for the Indifferent group, the tn, diversified collection of the products, and the convenience of unlimited time and space access that the internet site provided, were highly appreciated. With regard to the brand-inclined group, the presentation of product information and the convenience of unlimited time and space factors were highly appreciated. For the conservative group, the time and space factor were highly regarded, As far as the practicality-minded group was concerned, product price and size, the convenience of unlimited time and space access, and punctual delivery schedule were focused.

  • PDF

Analysis of Termination Capacity in IEEE 802.16 Broadband Wireless Access Environments (IEEE 802.16 BWA 환경에서의 가입자 수용용량 분석)

  • Lim Seog-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.65-73
    • /
    • 2005
  • Request about fast diffusion of internet and high-capacity multimedia service is increasing day after day. Because existent wireless LAN is short range, if subscriber is far away in base station transceiver system(Base Station), subscriber's quality of service becomes low, and wileless internet is expensive. Lately, WiBro(Wireless Broadband Internet) system that is developed in domestic by world first, is high-speed portable internet service that is situated in middle area of mobile phone and wireless LAN. In this paper, service traffic model and characteristics are analyzed to provide multimedia service based on IEEE 802.16 BWA accomplishes base of WiBro and simulation is conducted according to various traffic mixing ratio. Finally, on the basis of these simulation results, maximum allowable number of subscriber per cell is calculated.

  • PDF

Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel

  • Joshi, Gyanendra Prasad;Nam, Seung Yeob;Acharya, Srijana;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.911-923
    • /
    • 2014
  • Ad hoc cognitive radio wireless sensor networks allow secondary wireless sensor nodes to recognize spectrum opportunities and transmit data. Most existing protocols proposed for ad hoc cognitive radio wireless sensor networks require a dedicated common control channel. Allocating one channel just for control packet exchange is a waste of resources for channel-constrained networks. There are very few protocols that do not rely on a common control channel and that exchange channel-negotiation control packets during a pre-allocated time on the data channels. This, however, can require a substantial amount of time to access the channel when an incumbent is present on the channel, where the nodes are intended to negotiate for the data channel. This study examined channel access delay on cognitive radio wireless sensor networks that have no dedicated common control channel.

Wireless Access Technologies for Smart Highway: Requirements and Preliminary Results (스마트하이웨이 무선전송기술: 요구사항 및 기본시험결과)

  • Cho, Woong;Oh, Hyun-Seo;Park, Byoung-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.237-244
    • /
    • 2011
  • Vehicular communications extend their application areas by combining communication technologies with roads/vehicles, and one of major applications is Smart Highway project. Smart Highway is a new advanced highway system which enhances the current highway system in Korea by improving reliability, safety and convenience. In this paper, we introduce wireless access technologies for vehicular communications especially focusing on Smart Highway. We first introduce the overall communication system architecture and the basic service and communication requirements for Smart Highway. Then, we discuss wireless access technologies including L2-level hand-over scheme. In addition, the results of experimental measurements of Wireless Access in Vehicular Environments (WAVE) system are introduced.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Holistic Joint Optimal Cooperative Spectrum Sensing and Transmission Based on Cooperative Communication in Cognitive Radio

  • Zhong, Weizhi;Chen, Kunqi;Liu, Xin;Zhou, Jianjiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1301-1318
    • /
    • 2017
  • In order to utilize the licensed channel of cognitive radio (CR) when the primary user (PU) is detected busy, a benefit-exchange access mode based on cooperative communication is proposed to allow secondary user (SU) to access the busy channel through giving assistance to PU's communication in exchange for some transmission bandwidth. A holistic joint optimization problem is formulated to maximize the total throughput of CR system through jointly optimizing the parameters of cooperative spectrum sensing (CSS), including the local sensing time, the pre-configured sensing decision threshold, the forward power of cooperative communication, and the bandwidth and transmission power allocated to SUs in benefit-exchange access mode and traditional access mode, respectively. To solve this complex problem, a combination of bi-level optimization, interior-point optimization and exhaustive optimization is proposed. Simulation results show that, compared with the tradition throughput maximizing model (TTMM), the proposed holistic joint optimization model (HJOM) can make use of the channel effectively even if PU is busy, and the total throughput of CR obtains a considerable improvement by HJOM.

A Frame Collision Reduction Method for Safety Message Broadcasting in IEEE1609.4/IEEE802.11p based VANETs

  • Wang, Lei;Jing, Weiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1031-1046
    • /
    • 2018
  • Vehicular ad hoc network (VANET) is a dedicated network to connect vehicles without any centralized administration or infrastructure. The wireless access in vehicular environments (WAVE) protocol leveraging IEEE 1609/802.11p is widely implemented for VANETs. However, in congested traffic situation, the performance of the WAVE system degrades significantly due to serious collision, especially for safety related broadcast services on the control channel (CCH) interval due to the inherent drawback of its collision avoidance mechanisms called carrier sense multiple access with collision avoidance (CSMA/CA). In this paper, we propose a method that can decrease the number of frame collisions in CCH with a few modifications to the IEEE 802.11p protocol. In the paper, vehicles still employ CSMA/CA to compete for the channel access opportunity. However, by taking advantage of periodicity of synchronization interval, a two-state switching scheme introducing two new inter frame space (IFS) is proposed to reduce the number of competing vehicles substantially and as a result, the collision probability is significantly decreased. The simulation results demonstrate the superiority of the proposed method in packet collision rate.

Performance Analysis of Large CDMA Random Access Systems with Retransmission Diversity over Fading Channels

  • Yu, Kai;Sun, Yi;Fan, Pingzhi;Lei, Xianfu;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.509-528
    • /
    • 2010
  • The random access systems, with retransmission diversity (RD) employment, over large random spreading code division multiple access (CDMA) channel subject to fading is investigated, under the assumption of infinite number of users and infinite spreading gain with their ratio converging to a constant. The low bound of the signal to interference and noise ratio (SINR) is shown to converge almost surely to a constant. The throughput, spectrum efficiency and energy efficiency in the dominating systems are obtained. The analytical results are confirmed by simulations. We find that in high traffic loads the throughput with fading is higher than that without. When the energy efficiency increases, the spectrum efficiency tends to two contrary values due to SNR increases or decreases. For the ordinary stable systems, the stability region is shown to shrink as the traffic increases and enlarge with RD employment.

Synch. RA-based Uplink Packet Transmission in OFDMA Systems (OFDMA 시스템에서 동기 RA 방식 기반의 상향링크 패킷 전송)

  • Oh, Sang-Kyu;Moon, Jin-Soo;Shin, Seok-Joo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.25-33
    • /
    • 2008
  • In this paper we propose uplink packet transmission scheme based on Synchronized RA. The scheme can afford to support diverse QoS required from diverse multimeda traffics. In order to minimze the collision probability occurred in contention based channel access, we assign a reservation access channel additionally to the traffic channels. Access probability function for controlling collisions occurred in the reservation access channel is applied. Through assigning different access probability to each traffic user with respect to priority issued by his required QoS, the proposed scheme guarantees minimum throughput required by higher priority users in the whole range of system load.

  • PDF