• Title/Summary/Keyword: Internet reply

Search Result 47, Processing Time 0.021 seconds

Selecting Instructional Contents for Nutritional Education Program for Junior/Senior High School Students Through Instructional Analysis and Analysis of Entry Behaviors and Learner Characteristics (중ㆍ고등학생 대상 영양교육 내용 및 성취 목표 선정을 위한 교수분석과 출발점 행동 및 학습자 특성분석)

  • 강여화;양일선;김혜영;이해영
    • Korean Journal of Community Nutrition
    • /
    • v.9 no.4
    • /
    • pp.464-471
    • /
    • 2004
  • For the purpose of developing ‘Web-Based Nutritional Education Program’, this study did instructional analysis, analysis of entry behaviors and learner characteristics to select instructional contents for nutritional education program for junior/senior high school students. Survey questionnaires were distributed from October 21, 2002 to October 26, 2002 to a total of 564 junior/senior high school students in Seoul. The total number of questionnaires collected and used in our study was 479, which is 84.9% of the total questionnaires distributed. As a result of the curriculum analysis of ‘Technology-Home economics’, subjects related with ‘food and nutrition’ in the 7$^{th}$ educational course study result, lessons including the contents of food and nutrition were ‘nutrition and meal of adolescent’ in 7th grade, ‘family meal management’ in 9th grade and ‘practice of home life’ in 10th grade. According to the curriculum analysis, ‘nutrition’ and ‘food’ were chosen for the superior subjects of nutrition education program and four subordinate subjects per superior one were developed. Then, entry behaviors and learner characteristics were analyzed: life characteristics, internet usage, anthropometrics data and nutritional knowledge. Students were interested in using computer and preferred passive activity to dynamic activity. According. to the analysis of internet usage, WBI for students should composed active parts such as game, moving image, immediate reply and follow-up bye-mail, bulletin board and com- munity activity. Students’ BMI were in normal range but they were lacked nutritional knowledge. We wrote performance objectives that were specific behavior skills to be learned, the conditions under which they must be performed and the criteria for successful performance. The next step for developing the WBI nutrition education program would be based on the results mentioned above.

Session Key Agreement Protocol for IoT Home Devices using Shadow Passwords (그림자 패스워드를 사용한 IoT 홈 디바이스 사이의 세션키 공유 프로토콜)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.93-100
    • /
    • 2020
  • Although various home services are developed as increasing the number of home devices with wire and wireless connection, privacy infringement and private information leakage are occurred by unauthorized remote connection. It is almost caused by without of device authentication and protection of transmission data. In this paper, the devices' secret value are stored in a safe memory of a smartphone. A smartphone processes device authentication. In order to prevent leakage of a device's password, a shadow password multiplied a password by the private key is stored in a device. It is proposed mutual authentication between a smartphone and a device, and session key agreement for devices using recovered passwords on SRP. The proposed protocol is resistant to eavesdropping, a reply attack, impersonation attack.

Agent based Multicast Handoff Mechanism for All-IP Wireless Network (All-IP 무선망을 위한 에이전트 기반의 멀티캐스트 랜드오프 메커니즘)

  • Kim, Byung-Soon;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.197-203
    • /
    • 2002
  • This paper proposes a new agent based mechanism called a Multicast Handoff Agent (MHA) to reduce handoff latency for IP multicast. The MHA acts as a proxy for an Internet Group Management Protocol (IGMP) of Mobile Nodes (MNs) at each Base Station (BS) and keeps information for members of multicast groups in a cell. When an MN moves to a next cell, the MHA immediately sends unsolicited reports without waiting for the IGMP query. The mechanism was evaluated through simulation and analysis and compared with the IGMPv2 for micro-mobility and the IGMP traffic. Simulation results show that handoff latency for micro-mobility can be largely reduced and the IGMP control traffic on the wireless links during the duration of membership can be eliminated. Thus, this mechanism is superior to the existing mechanism in both micro-mobility and battery duration, as the need not to reply to a query conserves battery power.

WiMAX Security Mechanism for Minimizing Performance load of Base Station (베이스 스테이션의 성능부하를 최소화하기 위한 WiMAX 보안 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1875-1882
    • /
    • 2008
  • Nowadays, usage of mobile unit which has a characteristic of low cost and high efficiency is being generalized because of frequent use of internet-based variable service and application in IEEE 802.16 WiMAX. A study for handling a security problem of high speed internet service is rising while the use of a mobile is being generalized. This paper suggests a security mechanism which provides safety from certification load of SS and a security attack as well as a basic function which is provided from IEEE 802.16e standard to satisfy security demand of IEEE802.16 WiMAX. The proposed mechanism exchangeskey material information for TEK and data code by using 난수(?) and secret value created by SS and BS, also reduces capacity load of BS not to perform an additional certificate procedure of BS by using the early certification information and certificate of SS.

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.

Product Community Analysis Using Opinion Mining and Network Analysis: Movie Performance Prediction Case (오피니언 마이닝과 네트워크 분석을 활용한 상품 커뮤니티 분석: 영화 흥행성과 예측 사례)

  • Jin, Yu;Kim, Jungsoo;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.49-65
    • /
    • 2014
  • Word of Mouth (WOM) is a behavior used by consumers to transfer or communicate their product or service experience to other consumers. Due to the popularity of social media such as Facebook, Twitter, blogs, and online communities, electronic WOM (e-WOM) has become important to the success of products or services. As a result, most enterprises pay close attention to e-WOM for their products or services. This is especially important for movies, as these are experiential products. This paper aims to identify the network factors of an online movie community that impact box office revenue using social network analysis. In addition to traditional WOM factors (volume and valence of WOM), network centrality measures of the online community are included as influential factors in box office revenue. Based on previous research results, we develop five hypotheses on the relationships between potential influential factors (WOM volume, WOM valence, degree centrality, betweenness centrality, closeness centrality) and box office revenue. The first hypothesis is that the accumulated volume of WOM in online product communities is positively related to the total revenue of movies. The second hypothesis is that the accumulated valence of WOM in online product communities is positively related to the total revenue of movies. The third hypothesis is that the average of degree centralities of reviewers in online product communities is positively related to the total revenue of movies. The fourth hypothesis is that the average of betweenness centralities of reviewers in online product communities is positively related to the total revenue of movies. The fifth hypothesis is that the average of betweenness centralities of reviewers in online product communities is positively related to the total revenue of movies. To verify our research model, we collect movie review data from the Internet Movie Database (IMDb), which is a representative online movie community, and movie revenue data from the Box-Office-Mojo website. The movies in this analysis include weekly top-10 movies from September 1, 2012, to September 1, 2013, with in total. We collect movie metadata such as screening periods and user ratings; and community data in IMDb including reviewer identification, review content, review times, responder identification, reply content, reply times, and reply relationships. For the same period, the revenue data from Box-Office-Mojo is collected on a weekly basis. Movie community networks are constructed based on reply relationships between reviewers. Using a social network analysis tool, NodeXL, we calculate the averages of three centralities including degree, betweenness, and closeness centrality for each movie. Correlation analysis of focal variables and the dependent variable (final revenue) shows that three centrality measures are highly correlated, prompting us to perform multiple regressions separately with each centrality measure. Consistent with previous research results, our regression analysis results show that the volume and valence of WOM are positively related to the final box office revenue of movies. Moreover, the averages of betweenness centralities from initial community networks impact the final movie revenues. However, both of the averages of degree centralities and closeness centralities do not influence final movie performance. Based on the regression results, three hypotheses, 1, 2, and 4, are accepted, and two hypotheses, 3 and 5, are rejected. This study tries to link the network structure of e-WOM on online product communities with the product's performance. Based on the analysis of a real online movie community, the results show that online community network structures can work as a predictor of movie performance. The results show that the betweenness centralities of the reviewer community are critical for the prediction of movie performance. However, degree centralities and closeness centralities do not influence movie performance. As future research topics, similar analyses are required for other product categories such as electronic goods and online content to generalize the study results.

A study on the Purchasing and Wearing Conditions of Accessary in University Students (대학생의 액세서리 구매 및 착용실태에 관한 연구)

  • Lee, Jin Hee;Do, Wol Hee;Kim, Nam Soon
    • Korean Journal of Human Ecology
    • /
    • v.24 no.1
    • /
    • pp.69-77
    • /
    • 2015
  • The study will furnish university students-oriented accessary market with preliminary data by virtue of university students' wearing accessary conditions. It conducted by 151 university students in Jeon-Nam and Jeon-Buk during october through november, 2014. The questionnaire is composed of 17 questions and used 151 out of 152 copies as the final data, except for one insufficient reply. The analysis method carried out a technological statistics such as frequency count, percentage, average and t-test for every questions, used by SPSS 20.0. The investigation result is as follows; The overall numbers of answerers were 151 people, 36 male and 115 female, and showed that they purchase accessaries of less than 20,000won in a jewelry shop. According to the 86.1% of university students' answers, the most well known brand is OST and then Metrocity(76.2%), Swarovski(68.9%) came after. The most visit count is to a jewelry shop, once or twice in a month, on-line shopping malls and department stores came after. Rings and bracelets are purchased once or twice in a month, and earrings are mainly put on. When purchasing accessaries, quality and scarcity design are the most significant conditions, getting the information through internet and fashion magazines. The ground of purchasing accessaries is for self-contentment and for coordinating with their fashion, and also the difficult maintenance as well as untangled wool are defined as uneasiness of using accessaries. Furthermore, the original goods are preferred for rings and necklaces, unlike earrings and bracelets.

A Case Based e-Mail Response System for Customer Support

  • Yoon, Young-Suk;Lee, Jae-Kwang;Han, Chang-Hee
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.2
    • /
    • pp.121-133
    • /
    • 2003
  • Due to the rapid growth of Internet, means of communication with customers in a traditional customer support environment such as telephone calls are being replaced by mainly e-mail in a Web-based customer support system. Although such a Web-based support is efficient and promises potential benefits for firms, including reduced transaction costs, reduced time, and high quality of support, there are some difficulties associated with responding to many types of customer's inbound e-mails appropriately. As many types of e-mail are received, considerable attention is being paid to methods for increasing the efficiency of managing and responding e-mails. This research proposes an intelligent system for managing customer's inbound e-mails in organizations by applying case based reasoning technique for responding to various customers' inbound e-mails more effectively. In this approach, a case is represented as a frame-typed data structure corresponding to an inbound e-mail, keywords, and its reply e-mail. In the retrieval procedure, keywords and affinity set is developed to index a case, and then the case is represented as a vector, a case vector. Also, cosines value is calculated to measure the similarity between a new inbound e-mail and the cases in the case base. In the adaptation procedure, we provide several adaptation strategies to adapt and modify the retrieved case. The strategies guide to make an outbound e-mail using product databases, databases for customer support, etc. Additionally, the Web-based system architecture is proposed to implement our methodology. The proposed methodology and system will be helpful for developing more efficient Web-based customer support.

  • PDF

A Web-based CBR System for e-Mail Response

  • Yoon, Young-Suk;Lee, Jae-Kwang;Han, Chang-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.185-190
    • /
    • 2003
  • Due to the rapid growth of Internet, means of communication with customers in a traditional customer support environment such as telephone calls are being replaced by mainly e-mail in a Web-based customer support system. Although such a Web-based support is efficient and promises potential benefits for firms, including reduced transaction costs, reduced time, and high quality of support, there are some difficulties associated with responding to many types of customer’s inbound e-mails appropriately .As many types of e-mail are received, considerable attention is being paid to methods for increasing the efficiency of managing and responding e-mails. This research proposes an intelligent system for managing customer’s inbound e-mails in organizations by applying case based reasoning technique for responding to various customers' inbound e-mails more effectively. In this approach, a case is represented as a frame-typed data structure corresponding to an inbound e-mail, keywords, and its reply e-mail. In the retrieval procedure, keywords and affinity set is developed to index a case, and then the case is represented as a vector, a case vector. Also, cosines value is calculated to measure the similarity between a new inbound e-mail and the cases in the case base. In the adaptation procedure, we provide several adaptation strategies to adapt and modify the retrieved case. The strategies guide to make an outbound e-mail using product databases, databases for customer support, etc. Additionally, the Web-based system architecture is proposed to implement our methodology. The proposed methodology and system will be helpful for developing more efficient Web-based customer support.

  • PDF

P2P-based Regional Matchmaking Techniques for Distributing Redundant-works in Volunteer Computing Environments (자발적 컴퓨팅 환경에서 중복작업 분배를 위한 P2P 기반 지역적 매치메이킹 기법)

  • Cheon, Eun-Young;Kim, Mi-Kyoung;Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.831-835
    • /
    • 2009
  • Volunteer computing is a computing paradigm in which the operations of a large-scale application are processed using idle resources of Internet-connected computers. The redundant-work distribution techniques used in the volunteer computing environment cause some problems like delay of the work completion time or inefficiency of the work execution due to continuous requests of the work redistribution because the techniques do not consider the characteristics of works and dynamic resources. To cope with such problems this paper suggests a P2P based regional matchmaking technique which can redistribute works in consideration of the characteristics of the works and the participant resources. The techniques consist of the profiles for works/resources, the module for monitoring the available resources spaces, the protocols for the matching request/reply, the module for match-ratio calculation, and so on.