• Title/Summary/Keyword: Internet use patterns

Search Result 182, Processing Time 0.032 seconds

Modeling and Analysis of Load-Balancing Based on Base-Station CoMP with Guaranteed QoS

  • Feng, Lei;Li, WenJing;Yin, Mengjun;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.2982-3003
    • /
    • 2014
  • With the explosive deployment of the wireless communications technology, the increased QoS requirement has sparked keen interest in network planning and optimization. As the major players in wireless network optimization, the BS's resource utilization and mobile user's QoS can be improved a lot by the load-balancing technology. In this paper, we propose a load-balancing strategy that uses Coordinated Multiple Points (CoMP) technology among the Base Stations (BS) to effectively extend network coverage and increase edge users signal quality. To use universally, different patterns of load-balancing based on CoMP are modeled and discussed. We define two QoS metrics to be guaranteed during CoMP load balancing: call blocking rate and efficient throughput. The closed-form expressions for these two QoS metrics are derived. The load-balancing capacity and QoS performances with different CoMP patterns are evaluated and analyzed in low-dense and high-dense traffic system. The numerical results present the reasonable CoMP load balancing pattern choice with guaranteed QoS in each system.

A Comparative Study of Internet Addiction among Middle and High School Students in Seoul, Cheonan, and Rural Area (서울, 천안, 농촌지역 중 고교 학생들의 인터넷 중독에 대한 비교 연구)

  • Lee, Seok-Bum;Lee, Kyung-Kyu;Paik, Ki-Chung;Kim, Hyun-Woo
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.12 no.2
    • /
    • pp.145-156
    • /
    • 2004
  • Objectives : Internet addiction is a newly appeared addictive phenomenon that is defined as 'difficulty in real life due to internet over-use', 'excessive time spent on the internet or replacement of genuine real relationships with superficial virtual ones' or 'weakness in self-control about internet use and if discontinued, fallen in psychological confusion and anergic state'. This study was aimed to compare the internet addiction rate, demographic factors, computer using patterns, anxiety, depression, and internet self-efficacy and outcome expectancy between Korean middle and high school students in three areas - Seoul, Cheonan, and Rural areas - that were different in economic, cultural, and geographic state. Methods : Subjects are consisted of middle and high school students in Seoul, Chunan, and Rural areas(N=1718). Self-rating questionnaire included demographic data, Korean Spielberger State-Trait Anxiety Inventory, Korean Self-Rating Depression Scale(SDS), questions for internet-using pattern, Korean version of Internet Addiction Scale invented by K. S. Young, Internet Self-efficacy and Out-come Expectancy Scale. Results: In this study, prevalence of internet addiction was 2.9%. There was no significant difference found in prevalence of internet addiction among three areas. In all subjects, there were significant differences in anxiety, depression, internet self-efficacy and outcome expectancy, leisure style, places of internet use, internet connecting method, and insight on internee addiction. But, in addicted group, there was no significant difference among three areas. Conclusion: This study suggested that the difference in economic, cultural, and geographic state was not related to prevalence of internet addiction. Although there were significant differences in anxiety, depression, self-efficacy associated with internee use, leisure style, places of internet use, internet connecting method, insight on internet addiction among three areas, there were no significant difference in addicted group among three areas. So, we concluded that the difference in economic, cultural, and geographic state did not influence the prevalence of internet addiction, and despite the difference in economic, cultural, and geographic state, people in three areas were equally influenced by internet addiction.

  • PDF

Research for the Transformable Knit Design Applied by North European Traditional Knit Patterns (북유럽 전통 니트 문양을 활용한 트랜스포머블(Transformable) 니트 디자인 연구)

  • Lee, Yejin;Lee, Younhee
    • Journal of the Korean Society of Costume
    • /
    • v.66 no.1
    • /
    • pp.108-121
    • /
    • 2016
  • The objective of the study is to propose diverse knitwear designs by expanding the scope of the use and application of knit fabric. The study looked into diversifying the knitwear designs by using different types of zippers and with the combination of the diversity given by the zipper used in attachable and detachable method and the traditional North European knit patterns. One way of contributing to the diversity of fashion design is to use the zipper, as it can be implemented as an attachable and detachable fastening system. Also, the combination of North European traditional knit patterns with knit fabric can create a new and unique knit styling. The content of the research focuses on the history and definition of North European traditional knitwear based on the analysis of theoretical background, types, and characteristics of the knit patterns. Case studies were observed to show the application of knit patterns. The methods of the study used are preceding research along with research, collection, analysis of data, information from Korean and foreign literature, and Internet websites. During knitwear production, the two types of zippers were used in combination with four traditional Northern European knitwear Aran, Fair Isle, Nordic, and Ropy. The knitting techniques applied in the process were cable fisherman (5GG, SES 124CS) and Tubular Jacquard (3GG, 7GG, SES 122CS) for knitting machinery, and the technique of whole garment for hand knitting.

East Asian Communication Technology Use and Cultural Values

  • Danowski, James A.;Park, Han Woo
    • Journal of Contemporary Eastern Asia
    • /
    • v.19 no.1
    • /
    • pp.43-58
    • /
    • 2020
  • This study examines media used for information in the East Asian countries of China, Japan, South Korea, Taiwan, and Singapore, using data from the World Values Survey. The sharing of Confucian culture may lead to a uniform media structure across these nations. Another possibility is technological determinism, which would also lead to similarity across nations. However, it is possible that countries are at different stages of technology development and will eventually become more similar. An opposing notion is that differences in other values among nations predict digital media use. To examine the evidence considering these possibilities, we factor analyze each population's use of nine traditional and digital media to see how similar the structures are. What results is a three-dimensional solution for four out of five countries, except Singapore, which has a more simple two-dimensional structure. Analysts regard Singapore as the most digitally connected society, which raises the question as to whether it is higher on a technological development trajectory, to which other countries may transition. Perhaps a more simple media use structure is an adaptation to increasing information load. As well, as mobile devices have become a primary means of accessing the range of traditional and social media, it may have an expanded role in reducing media channel entropy. In terms of frequency of media use, Singapore is highest, while China is the lowest. Singapore stands out in high mobile use, and China for low Internet use. There appear to be developmental differences across the nations. Regressions on Internet use for 18 values indices find different values predictors in the East Asian countries, ruling out Confucianism as producing similar media patterns.

Study on Virtual Reality and E-commerce

  • Lee, Soowook;Oh, Younghwan
    • International Journal of Advanced Culture Technology
    • /
    • v.4 no.4
    • /
    • pp.70-74
    • /
    • 2016
  • Electronic commerce (E-commerce) using virtual reality (VR) has the advantage of being able to purchase products without restrictions of time and location by overcoming the limitations of existing offline transactions. It is still a rudimentary but fast growing technology, and the use of E-commerce in VR is expanding. The barriers that consumers might face in utilizing E-commerce in VR is the relevance to Information and Communications Technologies (ICT) technology. Fundamentally, it requires Internet access and use through PCs or mobile devices such as smart phones. Because unlike off-line markets, it is difficult to determine the purchase patterns of customers, customer purchasing behavior analysis must be done using computer access records. In order to expand and develop E-commerce in VR in the future, learning ability should be improved through combining with artificial neural network by deep learning that is recently in the spotlight, and the ability to overcome errors need to be improved to enable use in various fields.

Optimizing of Intrusion Detection Algorithm Performance and The development of Evaluation Methodology (침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발)

  • Shin, Dae Cheol;Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.125-137
    • /
    • 2012
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. For such reason, lots of intrusion detection system has been developed. Intrusion detection system has abilities to detect abnormal behavior and unknown intrusions also it can detect intrusions by using patterns studied from various penetration methods. Various algorithms are studying now such as the statistical method for detecting abnormal behavior, extracting abnormal behavior, and developing patterns that can be expected. Etc. This study using clustering of data mining and association rule analyzes detecting areas based on two models and helps design detection system which detecting abnormal behavior, unknown attack, misuse attack in a large network.

Predicting Selling Price of First Time Product for Online Seller using Big Data Analytics

  • Deora, Sukhvinder Singh;Kaur, Mandeep
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.193-197
    • /
    • 2021
  • Customers are increasingly attracted towards different e-commerce websites and applications for the purchase of products significantly. This is the reason the sellers are moving to different internet based services to sell their products online. The growth of customers in this sector has resulted in the use of big data analytics to understand customers' behavior in predicting the demand of items. It uses a complex process of examining large amount of data to uncover hidden patterns in the information. It is established on the basis of finding correlation between various parameters that are recorded, understanding purchase patterns and applying statistical measures on collected data. This paper is a document of the bottom-up strategy used to manage the selling price of a first-time product for maximizing profit while selling it online. It summarizes how existing customers' expectations can be used to increase the sale of product and attract the attention of the new customer for buying the new product.

A Study on the Automatic Parallelization Method and Tool Development

  • Shin, Woochang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.87-94
    • /
    • 2020
  • Recently, computer hardware is evolving toward increasing the number of computing cores, not increasing the clock speed. In order to use the performance of parallelized hardware to the maximum, the running program must also be parallelized. However, software developers are accustomed to sequential programs, and in most cases, write programs that operate sequentially. They also have a lot of difficulty designing and developing software in parallel. We propose a method to automatically convert a sequential C/C++ program into a parallelized program, and develop a parallelization tool that supports it. It supports open multiprocessing (OpenMP) and parallel patterns library (PPL) as a parallel framework. Perfect automatic parallelization is difficult due to dynamic features such as pointer operation and polymorphism in C/C++ language. This study focuses on verifying the conditions of parallelization rather than focusing on fully automatic parallelization, and providing advice to developers in detail if parallelization is not possible.

Small-Sized High-Power PIN Diode Switch with Defected Ground Structure for Wireless Broadband Internet

  • Kim, Dong-Wook
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.84-86
    • /
    • 2006
  • This letter presents a small-sized, high-power single-pole double-throw (SPDT) switch with defected ground structure (DGS) for wireless broadband Internet application. To reduce the circuit size by using a slow-wave characteristic, the DGS is used for the quarter-wave (${\lambda}$/4) transmission line of the switch. To secure a high degree of isolation, the switch with DGS is composed of shunt-connected PIN diodes. It shows an insertion loss of 0.8 dB, an isolation of 50 dB or more, and power capability of at least 50 W at 2.3 GHz. The switch shows very similar performance to the conventional shunt-type switch, but the circuit size is reduced by about 50% simply with the use of DGS patterns.

  • PDF

Smoke Image Recognition Method Based on the optimization of SVM parameters with Improved Fruit Fly Algorithm

  • Liu, Jingwen;Tan, Junshan;Qin, Jiaohua;Xiang, Xuyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3534-3549
    • /
    • 2020
  • The traditional method of smoke image recognition has low accuracy. For this reason, we proposed an algorithm based on the good group of IMFOA which is GMFOA to optimize the parameters of SVM. Firstly, we divide the motion region by combining the three-frame difference algorithm and the ViBe algorithm. Then, we divide it into several parts and extract the histogram of oriented gradient and volume local binary patterns of each part. Finally, we use the GMFOA to optimize the parameters of SVM and multiple kernel learning algorithms to Classify smoke images. The experimental results show that the classification ability of our method is better than other methods, and it can better adapt to the complex environmental conditions.