• Title/Summary/Keyword: Network Overload

Search Result 238, Processing Time 0.044 seconds

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

A Study on the Realtime Cert-Validation of Certification based on DARC (DARC 기반에서의 실시간 인증서 유효성 검증에 관한 연구)

  • Jang, Heung-Jong;Lee, Seong-Eun;Lee, Jeong-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.517-524
    • /
    • 2001
  • There are cases that revoke the certification because of disclosure of private key, deprivation of qualification and the expiration of a term of validity based on PKI. So, a user have to confirm the public key whether valid or invalid in the certification. There are many method such as CRL, Delta-CRL, OCSP for the cert-validation of certification. But these method many problems which are overload traffic on network and the CRL server because of processing for cert-validation of certification. In this paper we proposed the realtime cert-validation of certification method which solved problems that are data integrity by different time between transmission and receiving for CRL, and overload traffic on network and the CRL server based on DARC.

  • PDF

ECG Monitoring using High-Reliability Functional Wireless Sensor Node based on Ad-hoc network (고신뢰도 기능성 무선센서노드를 이용한 Ad-hoc기반의 ECG 모니터링)

  • Lee, Dae-Seok;Do, Kyeong-Hoon;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1215-1221
    • /
    • 2009
  • A novel approach for electrocardiogram (ECG) analysis within a functional sensor node has been developed and evaluated. The main aim is to reduce data collision, traffic overload and power consumption in healthcare applications of wireless sensor networks(WSN). The sensor node attached on the patient's body surface around the heart can perform ECG analysis based on a QRS detection algorithm to detect abnormal condition of the patient. Data transfer is activated only after detected abnormality in the ECG. This system can reduce packet loss during transmission by reducing traffic overload. In addition, it saves power supply energy leading to more reliable, cheap and user-friendly operation in the WSN for ubiquitous health monitoring.

Performance Improvement of Cert-Validation of Certification based on FM Subcarrier Broadcasting (FM방식을 이용한 인증서 유효성 검증의 성능 향상)

  • 장홍종;이성은;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.3-13
    • /
    • 2002
  • There are cases that revoke the certification because of disclosure of private key, deprivation of qualification and the expiration of a term of validity on PKI. So, a user has to confirm the public key whether valid or invalid in the certification. There are many methods such as CRL, Delta-CRL, OCSP for the cert-validation of certification. But these methods have many problems, which cause overload traffic on network and the CRL server because of realtime processing for cert-validation of certification. In this paper we proposed cert-validation of certification improvement method based on FM Subcarrier Broadcasting, which solved problems that are data integrity by different time between transmission and receiving for CRL, and overload traffic on network and the CRL server the realtime management.

Developing a Graph Convolutional Network-based Recommender System Using Explicit and Implicit Feedback (명시적 및 암시적 피드백을 활용한 그래프 컨볼루션 네트워크 기반 추천 시스템 개발)

  • Xinzhe Li;Dongeon Kim;Qinglong Li;Jaekyeong Kim
    • Journal of Information Technology Services
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2023
  • With the development of the e-commerce market, various types of products continue to be released. However, customers face an information overload problem in purchasing decision-making. Therefore, personalized recommendations have become an essential service in providing personalized products to customers. Recently, many studies on GCN-based recommender systems have been actively conducted. Such a methodology can address the limitation in disabling to effectively reflect the interaction between customer and product in the embedding process. However, previous studies mainly use implicit feedback data to conduct experiments. Although implicit feedback data improves the data scarcity problem, it cannot represent customers' preferences for specific products. Therefore, this study proposed a novel model combining explicit and implicit feedback to address such a limitation. This study treats the average ratings of customers and products as the features of customers and products and converts them into a high-dimensional feature vector. Then, this study combines ID embedding vectors and feature vectors in the embedding layer to learn the customer-product interaction effectively. To evaluate recommendation performance, this study used the MovieLens dataset to conduct various experiments. Experimental results showed the proposed model outperforms the state-of-the-art. Therefore, the proposed model in this study can provide an enhanced recommendation service for customers to address the information overload problem.

Design and Implementation of DHCP with Minimized Broadcasting Traffic (브로드캐스팅 트래픽을 최소화한 DHCP의 설계 및 구현)

  • An, Seong-Jin;Jeong, Jin-Uk;Lee, Sang-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.709-719
    • /
    • 1996
  • DHCP(Dynamic Host Configuration Protocol)is a protocol which dynamically allocates an IP address and/or host configuration parameters to a host. But because this protocol uses broadcasting for message exchange, it causes heavy traffic and overload on the network. By avoiding unnecessary broadcasting and using a simple and efficient implementation model, we can reduce such heavy traffic and overload. We have studied on characteristics of the broadcasting the traffic caused by DHCP, and implement the model which can reduce traffic by improving algorithm and unicasting messages.

  • PDF

Operation Policy for Enhancing Availability of a Web Server against DoS Attacks (서비스 거부 공격에 대응한 웹서버 가용성 향상을 위한 운용 정책 방안)

  • Baik, Nam-Kyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.735-744
    • /
    • 2008
  • This paper proposes a 'secure node' to be robust against network-based DoS attacks. The secure node selectively accepts new sessions based on the Zipf's law while a link is in the overload state. Our scheme calculates a threshold value for overload state, and provides a dynamic service mechanism for enhancing availability of a web server. The simulation results show performance improvement of the proposed scheme in terms of completion/connection ratios.

A study on the Optimal Operation of Distirbution System Using the Modified Block Model Method (수정블럭 모델 법에 의한 배전계통의 최적운용에 관한 연구)

  • 송길영;홍상은;김재영
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.36 no.4
    • /
    • pp.231-239
    • /
    • 1987
  • Distribution system is one of large and complicated sytem, consisted of a great number of components. Therefore efficient operation based on precise analysis and computation methods is indispensable accommodating growing loads. This paper describes an optimal operation problem to relieve overload flow in radial distribution systems by using modified block model. The problem is formulated as a network problem of synthesizing the optimal spanning tree in a graph, branch and bound method is used for the optimization. Especially modified block model proposed in this paper is validated more practical than conventional model. These methods can be applied to two types of distribution system problems such as, 1) planning problem to check the capability of relieving overload at normal rating, 2) emergency operation problem to determine switching scheme for minimizing customer loads affected by a fault. Examples of application to these problems are discussed.

  • PDF

Development of Web-based Bio-Image Retrieval System (웨이블릿 변환을 이용한 실시간 화재 감지 알고리즘)

  • Cheong, Kwang-Ho;Ko, Byoung-Chul;Nam, Jae-Yeal
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.227-230
    • /
    • 2006
  • A content-based image retrieval system using MPEG-7 is designed and implemented in this thesis. The implemented system uses existing MPEG-7 Visual Descriptors. In addition, a new descriptor for efficient retrieval of bio images is proposed and utilized in the developed content-based image retrieval system. Comparing proposed CBSD(Compact Binary Shape Descriptor) with Edge Histogram Descriptor(EHD) and Region Shape Descriptor(RSD), it shows good retrieval performance in NMRR. The proposed descriptor is robust to large modification of brightness and contrast and especially improved retrieval performance to search images with similar shapes. Also proposed system adopts distributed architecture to solve increased server overload and network delay. Updating module of client efficiently reduces downloading time for metadata. The developed system can efficiently retrieve images without causing server's overload.

  • PDF

Proposal Scheme of a D2D Communication in Smart Shipyard (스마트 조선소내 D2D 통신 기술 적용 방안 제안)

  • Kim, Su-Hyun;Lee, Seong Ro;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1261-1266
    • /
    • 2014
  • Smart shipyard, all of the business of shipyard by using a mobile application, and the rapid spread of smart equipment, the overload of infrastructure due to a variety of mobile services is expected. Because macrocell and femtecell to reduce the overloading of existing infrastructure, additional core network devices have a problem, in this paper, the efficiency of resources than the communication over the existing infrastructure smart shipyard network to improve, to apply the D2D communication technology that can reduce the load on the infrastructure. The proposed routing path plan in accordance with the transfer method and the traffic type of network configuration and D2D equipment navigation and data for applying a smart shipyard. Whether to execute the function to overload traffic in the core network can send to the optimized path was confirmed by using the state transition diagram. Smart shipyard, by applying D2D communication allow efficient traffic handling than conventional communication method.