• Title/Summary/Keyword: Performance Information Use

Search Result 5,641, Processing Time 0.037 seconds

A study on Performance Evaluation for Network Architecture using Quantum Key Distribution Technology (양자암호기반의 통신망 구축 및 성능시험 검증연구)

  • Lee, Wonhyuk;Seok, Woojin;Park, Chanjin;Kwon, Woochang;Sohn, Ilkwon;Kim, Seunghae;Park, Byoungyoen
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.39-47
    • /
    • 2019
  • There are several big data-driven advanced research activities such as meteorological climate information, high energy physics, astronomy research, satellite information data, and genomic research data on KREONET. Since the performance degradation occurs in the environment with the existing network security equipment, methods for preventing the performance degradation on the high-performance research-only network and for high-speed research collaboration are being studied. In addition, the recent issue of quantum computers has been a threat to security using the existing encryption system. In this paper, we construct quantum cryptography-based communication network through environment construction and high-performance transmission test that build physical security through quantum cryptography-based communication network in end-to-end high-speed research network. The purpose of this study is to analyze the effect on network performance when performing physical encryption and to use it as basic data for constructing high-performance research collaboration network.

A System of Software Asset Management in Company using the Server (서버를 이용한 사내 소프트웨어 자산관리 시스템)

  • Lee, Young Gyo;Park, Jin Kyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.1-12
    • /
    • 2013
  • Illegal software use have been abroad through online (internet) and offline (CD, DVD, USB, etc.). It infringes intellectual property rights and weakens the will to software development. Also, it generates the software errors and virus intrusion in PC. It hinders national software industry and induces the personal and national trade friction. Many group (company, office, organization, institution, etc.) have been realized the prohibition of illegal software use. But, it is too hard to monitor and control illegal software use. In this paper, we propose a method of software management in a group. A software module of client agency is installed in all PC of the group. A main server of the software management controls the all of the PC through the communication. The server blocks the install of illegal software, permits the install / use of honest goods software, monitors the license (term, amount) in all the PC. The system prevents errors of illegal software use, all cuts the virus intrude through the illegal software, improves the performance of PC relatively.

An Empirical Study on the Determinants of Intention to Use B2B e-Marketplace

  • An, Youngsin;Yang, Haesool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.155-161
    • /
    • 2017
  • As the e-marketplace becomes the core of management activities, researches on motivation, transaction type, strategy, satisfaction, risk management, performance evaluation, etc. have been actively studied, but the factors influencing actual utilization have not been fully. Especially, the factors that affect the intention of the users are limited without consideration of internal environment, external environment, e-marketplace characteristics such as operating rules, characteristics of the company to be used. In order to derive the determinants of B2B e-marketplace use, this study was conducted to examine the relationship between internal environment, external environment, e-marketplace characteristics as independent variables, intention of use as dependent variable, participation qualification, The results were as follows. First, the previous study limited the determinants of intention to use to either internal or external, but this study presented an integrated model that considers both factors. Second, the characteristics of companies participating in e-marketplace were identified by using participation qualification and activity scope as control variables.

A Method to Avoid Mutual Interference in a Cooperative Spectrum Sharing System

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.16 no.2
    • /
    • pp.110-120
    • /
    • 2014
  • This article proposes a spectrum sharing method which can avoid the mutual interference in both primary and secondary systems. The two systems make them a priority to use two single-dimension orthogonal signals, the real and imaginary pulse amplitude modulation signals, if the primary system is not in outage with this use. A secondary transmitter is selected to be the primary relay and the active secondary source to perform this. This allows a simultaneous spectrum access without any mutual interference. Otherwise, the primary system attempts to use a full two-dimensional signal, the quadrature amplitude modulation signal. If there is no outage with respect to this use, the secondary spectrum access is not allowed. When both of the previous attempts fail, the secondary system is allowed to freely use the spectrum two whole time slots. The analysis and simulation are provided to analyze the outage performance and they validate the considerable improvement of the proposed method as compared to the conventional one.

Effect of Information System Quality, Organizational Pressure, and Team Climate on the Appropriation of an Information System and Related Task Performance (정보시스템 품질, 조직압력, 팀 풍토가 정보시스템 전유에 미치는 영향과 과업성과)

  • Min, Kyung Ui;Baek, Seung Nyoung
    • Information Systems Review
    • /
    • v.17 no.1
    • /
    • pp.65-92
    • /
    • 2015
  • Driven by the development of information technologies, information system (IS) use has been common even in military organizations. In particular, field artillery is currently using the Battalion Tactical Commanding System-A1 (BTCS-A1) to improve fire support. The use of BTCS-A1 makes fire-commanding processes simple and autonomous, which leads to shorten time to support fire. Although BTCS-A1 has been considered as a helpful system, there still exists some dispute regarding its effectiveness and impact on task performance. By conceptualizing BTCS-A1 use as appropriation, this study investigates how BTCS-A1 appropriation promotes task performance. We also hypothesize that IS quality, organizational pressure (institutional pressure and supervisor influence), and team climate (team learning climate and team empowerment climate) increase the appropriation. Survey results show that organizational pressure and team climate promote BTCS-A1 appropriation, which improves users' task performance. However, effect of IS quality is not significant. Theoretical and practical implications are presented.

A Framework for Human Motion Segmentation Based on Multiple Information of Motion Data

  • Zan, Xiaofei;Liu, Weibin;Xing, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4624-4644
    • /
    • 2019
  • With the development of films, games and animation industry, analysis and reuse of human motion capture data become more and more important. Human motion segmentation, which divides a long motion sequence into different types of fragments, is a key part of mocap-based techniques. However, most of the segmentation methods only take into account low-level physical information (motion characteristics) or high-level data information (statistical characteristics) of motion data. They cannot use the data information fully. In this paper, we propose an unsupervised framework using both low-level physical information and high-level data information of human motion data to solve the human segmentation problem. First, we introduce the algorithm of CFSFDP and optimize it to carry out initial segmentation and obtain a good result quickly. Second, we use the ACA method to perform optimized segmentation for improving the result of segmentation. The experiments demonstrate that our framework has an excellent performance.

The Effects of E-Brochure Functions and Attitudes to E-Brochures on Self-Efficacy and Salespeople Job Satisfaction in Pharmaceutical Companies

  • Choi, Kun-Dong;Lee, Hwa-Jeong;Hahm, Sang-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.67-77
    • /
    • 2019
  • Today, companies are making efforts to improve the performance of workers by utilizing various IT-based mobile and internet devices. In pharmaceutical companies, salespeople are using the e-brochure to search for diverse expertise in real time. Through the e-brochure, pharmacists and doctors can be provided with the information they need, thereby increasing confidence in pharmaceuticals and salespeople. Salespeople can also use e-brochures to improve their work performance and to be more satisfied with their jobs. This study examines which functions of e-brochures satisfy salespeople and what attitudes to the e-brochures they need to have. This paper explains the effect of satisfaction and attitude to the e-brochures on job satisfaction through self-efficacy with statistical analysis. As a statistical result, the functions of e-brochures (professional knowledge, massive amount of data, easy searching, information updates, and the reflection of feedback) and attitudes to the e-brochures (importance, intention to use, belief in improvement, efficacy to use, and negative cognition) influence on self-efficacy of salespeople. Further, self-efficacy has mediating effects on the relationship between the functions of e-brochures / attitudes to e-brochures and job satisfaction. Exceptionally, the mediating effect of self-efficacy was not significant in relation to information updates / reflection of feedback and job satisfaction. These results will explain what functions should be focused for the future development of e-brochures. It will also suggest what attitudes the salespeople should have about e-brochures. Through these efforts, salespeople will be able to utilize new technology of e-brochures to satisfy their jobs and improve their performance.

Performance Analysis of an ATM-LAN IWU with a Dynamic Bandwidth Allocation Scheme

  • Park, Chul-Geun;Han, Dong-Hwan;Baik, Kwang-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.10A
    • /
    • pp.1756-1763
    • /
    • 2001
  • In this paper, we propose an ATM-LAN IWU(interworking unit) with threshold based dynamic bandwidth allocation scheme. We analyze a discrete-time based finite queueing model with deterministic service times in order to investigate the performance of the proposed scheme. It is known that the arrival process of IP packets is bursty. So we use an MMPP(Markov Modulated Poisson Process) to model the bursty input traffic. As performance measures, we obtain the packet loss probability and the mean packet delay. We present some numerical results to show the effects of the thresholds on the performance of the DBAS(dynamic bandwidth allocation scheme).

  • PDF

A connection caching technique using host grouping (호스트 그루핑을 이용하는 연결 캐슁 기법)

  • 양수미;조유근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.9
    • /
    • pp.2373-2384
    • /
    • 1996
  • Connection caching technique is widely used to reduce the overhead incurred by frequency connection establishment in distributed computing environment using connection oriented protocol. We present an efficient connection caching scheme where we divide the system into several host groups and connection between the hosts in the same group is kept prior to others. In other words it makes the connection kept longer by sharing the connection use information between hosts in the same group. Every host group consists of hosts which have heavy intercommunication. And we present performance evaluation of the effect of host grouping upon connection caching and performance comparison of various grouping in several aspects includingmeanservice request interarrival time, mean service time, group size, grouping and type of group. Simulation results show that host grouping is effective in evrey performance criterion and proper grouping of hosts enhances the performance. We also present analysis results for Markov process model of our scheme which are consistent with the simulation results.

  • PDF

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.