• Title/Summary/Keyword: Pervasive domain

Search Result 17, Processing Time 0.028 seconds

Influence of Business Analytics Usage on Operational Efficiency of Information Technology Infrastructure Management

  • Elangovan N;Ruchika Gupta;Sundaravel, E
    • Asia pacific journal of information systems
    • /
    • v.32 no.1
    • /
    • pp.70-91
    • /
    • 2022
  • Organizations today depend and thrive on timely, accurate and strategically relevant information. Business analytics (BA) holds the key to many of these issues. This paper validates a model on how the usage of BA leads to operational efficiency. We identified the factors of basic analytical usage from the Business Capacity Maturity Model (BCMM). The scope of the study is restricted to the Information Technology Infrastructure and Application management domain. A survey was conducted among the managers of the IT companies in Bengaluru, India. The results showed a significant influence of data-oriented culture and BA tools and infrastructure on BA usage. We found a significant influence of BA usage and pervasive use on operational efficiency. The speed to insight is still not practised in organizations. The awareness level of analytical skills in organizations is very low.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

A Simulation-Based Development Methodology for CAS (Context-Aware Web Services) Personalization (컨텍스트 기반 맞춤형 웹 서비스 제작을 위한 시뮬레이션 기반 방법론)

  • Chang, Hee-Jung;Kim, Ju-Won;Choi, Sung-Woon;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.11-19
    • /
    • 2006
  • With the emergence of pervasive computing, personalization becomes an important issue to provide with users customized services, anywhere and anytime in their specific environment. Many researches have shown the possibilities of personalization by acquiring and processing sensor information around users. However, personalization remains still at its infancy, since most researches have failed to consider various contexts comprehensively besides sensor data, and just developed tailored services for a specific application domain. In this work, we propose a simulation-based CAS (context Aware Web Services) development methodology. Our methodology considers various contexts on users (eg. current location), web services (eg. response time), devices (eg. availability) and environment (eg. sensor data) all together by simulating them on the fly for personalized and adaptable services.

  • PDF

Analysis of Educational Effectiveness of Digital Textbooks for Elementary Students (초등 디지털교과서의 교육적 효과 분석)

  • Jeong, Youngsik;Im, Hyunjung;Kim, Jeongrang
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.1
    • /
    • pp.141-149
    • /
    • 2018
  • In order to analyze the educational effects of digital textbooks for elementary students, the 3~4 graded elementary students were selected and designated as panels in 2014 to conduct the longitudinal study. We conducted a questionnaire survey on students who were in grade 5 or 6 in elementary school in 2016 to evaluate their effects on cognitive domain, social domain, social domain, psychomotor domain, and learning competency. As a result, 5th grade students using the digital textbooks for 3 years showed higher educational effectiveness than 6th grade students using the digital textbooks for 2 years. In addition, the use of the digital textbooks for three years has been shown to have improved educational effectiveness in all areas except students' psychomotor domain. These educational effects were higher for students with higher scores, more times using digital textbooks, and higher teachers' smart education capacity.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

An IoT Patent Trend Analysis for Technological Convergence on Hyper Connected Society (초연결시대 기술융합을 위한 사물 인터넷 기술의 특허동향 분석)

  • Rho, Seungmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2724-2730
    • /
    • 2015
  • Internet of Things (IoT) is possibly the most widely discussed technological concept in today's technology circles. This technology is expected to dramatically change not only how we work but also how we live. The concept of IoT basically means a web of connected devices which can be controlled over a data network. With cost of technology required to control these devices going down and increasing internet connectivity through smartphones, IoT is expected to be an all pervasive technology in the next 10 years. In this paper, we study the technological landscape of this fast growing technology domain from an Intellectual Property (Patents) perspective. We find that the patent distribution in this domain is very fragmented with the top patent applicants in the field holding around 5% of the total patents. Especially, the US geography has seen the maximum patent filings and is closely followed by the big Asian markets of Japan and Korea.

Interface Mapping and Generation Methods for Intuitive User Interface and Consistency Provision (사용자 인터페이스의 직관적인 인식 및 일관성 부여를 위한 인터페이스 매핑 및 생성 기법)

  • Yoon, Hyo-Seok;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.135-139
    • /
    • 2009
  • In this paper we present INCUI, a user interface based on natural view of physical user interface of target devices and services in pervasive computing environment. We present a concept of Intuitively Natural and Consistent User Interface (INCUI) consisted of an image of physical user interface and a description XML file. Then we elaborate how INCUI template can be used to consistently map user interface components structurally and visually. We describe the process of INCUI mapping and a novel mapping method selection architecture based on domain size, types of source and target INCUI. Especially we developed and applied an extended LCS-based algorithm using prefix/postfix/synonym for similarity calculation.

  • PDF

Recent update of autism spectrum disorders

  • Kim, Sung Koo
    • Clinical and Experimental Pediatrics
    • /
    • v.58 no.1
    • /
    • pp.8-14
    • /
    • 2015
  • In patients with a language developmental delay, it is necessary to make a differential diagnosis for autism spectrum disorders (ASDs), specific language impairment, and mental retardation. It is important that pediatricians recognize the signs and symptoms of ASDs, as many patients with language developmental delays are ultimately diagnosed with ASDs. Pediatricians play an important role in the early recognition of ASDs, because they are usually the first point of contact for children with ASDs. A revision of the diagnostic criteria of ASDs was proposed in the Diagnostic and Statistical Manual of Mental Disorders, fifth edition (DSM-5) that was released in May 2013. The autism spectrum describes a range of conditions classified as neurodevelopmental disorders in the fifth edition of the DSM. The new diagnostic criteria encompasses previous elements from the diagnosis of autistic disorder, Asperger disorder, childhood disintegrative disorder, and pervasive developmental disorder-not otherwise specified. An additional change to the DSM includes synthesizing the section on social and communication deficits into one domain. In ASD patients, the appropriate behavioral therapies and rehabilitation treatments significantly affect the prognosis. Therefore, this makes early diagnosis and treatment very important. In conclusion, pediatricians need to be able to recognize the signs and symptoms of ASDs and be attentive to them in order to make an early diagnosis and provide treatment.

Analyses on Researches of RFID Technology and EPC System;A Literature Exploratory Assessment

  • Dungog, Ramces Paquibot;Yun, Hong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.879-886
    • /
    • 2007
  • EPC (Electronic Product Code) tags and RFID (Radio Frequency IDentification) technology are said to have potential to change the ways individuals, organizations and societies operate on the everyday basis. In the near future, it is expected that every major retailer will use RFID and EPC systems to track the movement of products from suppliers to warehouses, store backrooms and eventually to points of sale. Recent efforts in EPC tags and RFID technology attempt to achieve an appropriate kind of interaction between technical and business areas. In this paper, we explore the fundamental characteristics of RFID and EPC applications and then review the different research studies of RFID technology and EPC system that have been proposed new theories and concepts that have emerged and utilized in different business fields of manufacturing and logistics. It provides an overview of the study achievements within the domain and critically evaluates the various approaches through the use of a case study and the construction of its comparison framework. The different research studies indicated that RFID and EPC systems will become more pervasive in the future and the changes that occur over the next few years will make for a further fascinating research area.

  • PDF

Color Image Segmentations of a Vitiligo Skin Image with Android Platform Smartphone (안드로이드 기반의 스마트폰을 활용한 백반증 피부 영상 분할)

  • Park, Sang-Eun;Kim, Hyun-Tae;Kim, Jeong-Hwan;Kim, Kyeong-Seop
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.1
    • /
    • pp.173-178
    • /
    • 2014
  • In this study, the new color image processing algorithms with an android-based mobile device are developed to detect the abnormal color densities in a skin image and interpret them as the vitiligo lesions. Our proposed method is firstly based on transforming RGB data into HSI domain and segmenting the imag into the vitiligo-skin candidates by applying Otsu's threshold algorithm. The structure elements for morphological image processing are suggested to delete the spurious regions in vitiligo regions and the image blob labeling algorithm is applied to compare RGB color densities of the abnormal skin region with them of a region of interest. Our suggested color image processing algorithms are implemented with an android-platform smartphone and thus a mobile device can be utilized to diagnose or monitor the patient's skin conditions under the environments of pervasive healthcare services.