• Title/Summary/Keyword: Service Rejection

Search Result 46, Processing Time 0.026 seconds

A Study on Influencing Factors on User's Adoption Resistance to Personal Cloud Computing Service (개인용 클라우드 컴퓨팅 서비스 수용저항에 영향을 미치는 요인에 관한 연구)

  • Jo, In-Jea;Kim, Sun-Kyu;Yang, Sung-Byung
    • Knowledge Management Research
    • /
    • v.16 no.1
    • /
    • pp.117-142
    • /
    • 2015
  • Recently, the personal cloud computing service has been being spotlighted as an individual tool of productivity enhancement. However, compared to the rosy forecast, its diffusion rate in the domestic (Korean) market is much slower than expected. In order to find the reason for the slow growth of personal cloud computing service, we attempt to identify influencing factors on user's adoption resistance, while most prior research has focused on the factors affecting its adoption. Based on both the person-technology fit model and the privacy calculus model, we propose technostress and perceived value as key antecedents of adoption resistance. In addition, we identify (1) technical (pace of change and complexity) and personal (self-efficacy) influencing factors on technostress, and (2) beneficial (perceived mobility and perceived availability) and harmful (perceived vulnerability) influencing factors on perceived value. To validate our research model, 133 individual samples were gathered from undergraduate and graduate students who had actual experience of using at least one of personal cloud computing services. The results of the structural equation modeling confirm that both technostress and perceived value have significant effects on adoption resistance, but they have different influencing mechanisms to different types of adoption resistance (indifference, postponement, and rejection). Theoretical and practical contributions are discussed in the conclusion.

An Approximation of the M/G/1 System with Finite Workload Capacity (부하량에 제한이 있는 M/G/1 시스템의 근사법)

  • Lee, Hyung Joong;Hur, Sun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.3
    • /
    • pp.247-252
    • /
    • 2003
  • We propose an approximation of the M/G/1 system with finite workload capacity, where those customers whose admission to the system would increase the workload beyond a prespecified finite capacity limit are not accepted. Our approximation method is based on the idea that the service time of a customer in the M/G/1 system can be approximated as the sum of service times of a batch of customers in the $M^X/d/1$ system where the deterministic service time d is small enough. That is, the original service time is discretized and approximated by the batch size. We exemplified our method by obtaining the average workload of the M/M/1 system by means of the $M^X/d/1$ system, where the batch size is geometric. In addition, the approximate blocking probabilities of the M/M/1 and $M/E_k/1$ system with finite workload capacities are sought. The proposed method turns out to give a good approximation, which is compared with a simulation.

Individual service application for consumers's food safety

  • Lau, Shuai
    • Korean Journal of Artificial Intelligence
    • /
    • v.3 no.1
    • /
    • pp.1-4
    • /
    • 2015
  • These days, men live better lives owing to economic growth. They are interested in basic desire such as clothing, food and dwelling. This study investigated food and/or eating. Men like to take better quality food to be healthy. They can hear food problems easily by news to satisfy desire. On October 13, 2014, Dongsuh Food Company was prohibited to distribute a serial product named 'Post Almond Flake' (Statistics Korea). Dongsuh Food was found to produce finished product by mixing contaminants without inspection of colon bacillus, and Crown Confectionery was found to produce 'Organic farming wafer' and 'Organic farming choco wafer' from March 2009 to early August, 2016 cognizing rejection at inspection not to inform Ministry of Health and to sell product amounting to 3.1 billion KRW .

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

The Effect of Fashion Consumer's Browsing Motives and Risk Perception on Purchase Intention in Social Commerce (소셜커머스에서 패션제품 소비자의 브라우징 동기, 위험지각이 구매의도에 미치는 영향)

  • Woo, Seung Hyun;Hwang, Jin Sook
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.37 no.6
    • /
    • pp.772-785
    • /
    • 2013
  • This study investigated the effects of fashion consumer's browsing motives and risk perception on impulse buying and purchase intention in social commerce. The online survey results of 317 customers who experienced using fashion products via social commerce were used for the final analysis. Exploratory factor analysis, reliability analysis, and frequency analysis were conducted using SPSS 18.0, and confirmatory factor analysis and path analysis were performed with AMOS 18.0. Three browsing motives (hedonic motive, rational motive, and informational motive) and three risk perceptions (products-related risk, customer service risk, and opportunity loss risk) were identified. The results from the structure equation model were as follows. 1) It was deducted that the browsing motive did not have a significant effect on risk perception due to the rejection of most of the hypotheses in regards to the browsing motive influence on risk perception. 2) Product-related risk and customer service risk had a significantly negative effect on purchase intention. Opportunity loss risk had significantly positive effect on impulse buying and purchase intention. 3) Hedonic browsing motive had a significant effect on impulse buying, and rational motive had a significant effect on impulse buying and purchase intention. The informational browsing motive had a significant effect only on purchase intention.

A Study of Major Issues in the Act (Draft) on Remedy for Damage from Medical Accident and Medical Dispute Mediation, etc. (의료사고 피해구제 및 의료분쟁 조정 등에 관한 법률(안)의 주요 쟁점에 관한 고찰)

  • Park, Joon-Su
    • The Korean Journal of Health Service Management
    • /
    • v.4 no.2
    • /
    • pp.107-117
    • /
    • 2010
  • In this paper, the researcher looked into major issues in the "Act (Draft) on Remedy for Damage from Medical Accident and Medical Dispute Mediation, etc." which was proposed by the Health & Welfare Committee, the National Assembly of the Republic of Korea, and which was pending with the Legislation & Judiciary Committee. Then the researcher pointed out worrisome problems therein and presented suggestion" to improve problematic situations. First of all, the researcher examined the following items which are major points in the aforementioned Act: 1) Establishment of Korea Medical Dispute Mediation and Arbitration Center, 2) Procedures for mediation and arbitration of medical disputes, 3) Establishment of Medical Injury Compensation Association, 4) Introduction of proxy payment for damages, 5) Compensation for no-fault medical accidents, 6) A system concerned with special cases on criminal punishment. Next, the researcher closely reviewed the following possible issues: 1) Limit of arbitrary mediation, 2) Postponement of the system concerned with special case on criminal punishment, 3) Examination of reasons for rejection, 4) Function and role of the Appraisal department, 5) A possibility of being reduced to an evidence collection procedure for lawsuit, 6) A possibility of no-fault compensation rather than injury compensation, 7) Operational issues related proxy payment for damages. Lastly, the researcher presented suggestions on how to improve each problematic issue.

ForwardCast : A New VOD Streaming Method in P2P (포워드캐스트(ForwardCast) : P2P에서의 새로운 VoD 스트리밍 방법)

  • Yoon Soo-Mi;Kim Sang-Chul;Kim Joong-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.12B no.7 s.103
    • /
    • pp.783-788
    • /
    • 2005
  • Recently researches that apply P2P networks to VOD streaming have been actively published In the previous works on VOD streaming, they aimed at achieving two major goals, which are zero-delay transmission and minimization of service rejection ratio. This paper proposes a new method, called ForwardCast, for VOD streaming based on a P2P-based multicasting tree in order to achieve theses two goals. In this method,- basically a new client selects one of the preceding clients and starts receiving a whole video from the selected one without any delay. In some situation, two preceding clients are selected to transfer the ending part of the video and its the remaining part simultaneously. In our experiment, ForwardCast can reduce the rejection ratio compared to previous works without increasing server stress.

Condition Monitoring of Check Valve Using Neural Network

  • Lee, Seung-Youn;Jeon, Jeong-Seob;Lyou, Joon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2198-2202
    • /
    • 2005
  • In this paper we have presented a condition monitoring method of check valve using neural network. The acoustic emission sensor was used to acquire the condition signals of check valve in direct vessel injection (DVI) test loop. The acquired sensor signal pass through a signal conditioning which are consisted of steps; rejection of background noise, amplification, analogue to digital conversion, extract of feature points. The extracted feature points which represent the condition of check valve was utilized input values of fault diagnosis algorithms using pre-learned neural network. The fault diagnosis algorithm proceeds fault detection, fault isolation and fault identification within limited ranges. The developed algorithm enables timely diagnosis of failure of check valve’s degradation and service aging so that maintenance and replacement could be preformed prior to loss of the safety function. The overall process has been experimented and the results are given to show its effectiveness.

  • PDF

Performance Evaluation of Nonkeyword Modeling and Postprocessing for Vocabulary-independent Keyword Spotting (가변어휘 핵심어 검출을 위한 비핵심어 모델링 및 후처리 성능평가)

  • Kim, Hyung-Soon;Kim, Young-Kuk;Shin, Young-Wook
    • Speech Sciences
    • /
    • v.10 no.3
    • /
    • pp.225-239
    • /
    • 2003
  • In this paper, we develop a keyword spotting system using vocabulary-independent speech recognition technique, and investigate several non-keyword modeling and post-processing methods to improve its performance. In order to model non-keyword speech segments, monophone clustering and Gaussian Mixture Model (GMM) are considered. We employ likelihood ratio scoring method for the post-processing schemes to verify the recognition results, and filler models, anti-subword models and N-best decoding results are considered as an alternative hypothesis for likelihood ratio scoring. We also examine different methods to construct anti-subword models. We evaluate the performance of our system on the automatic telephone exchange service task. The results show that GMM-based non-keyword modeling yields better performance than that using monophone clustering. According to the post-processing experiment, the method using anti-keyword model based on Kullback-Leibler distance and N-best decoding method show better performance than other methods, and we could reduce more than 50% of keyword recognition errors with keyword rejection rate of 5%.

  • PDF

A dynamic resource allocation and call admission control considering 'satisfaction degree of quality of service' for the VBR video sources with QoS constraints (QoS 제약 조건을 갖는 VBR 비디오에 대한 서비스 품질 만족도를 고려한 동적 자원 할당 및 호 수락 제어)

  • Yoo, Sang-Jo;Kim, Seong-Dae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.1
    • /
    • pp.1-13
    • /
    • 2001
  • In this paper, we propose a new dynamic bandwidth allocation and call admission control for VBR video sources with QoS constraints to support an efficient resource management and at the same Lime to satisfy the user's quality or service requirements. For the dynamic bandwidth allocation, first the next amount of traffic is predicted using a modified adaptive linear prediction method that considers abrupt scene change effects. And then, we dynamically allocate the necessary bandwidth to each connection based on the currently provided quality degree by the network with respect to the user's QoS requirements in terms of average delay and loss ratio. For the admission control, we determine the acceptance or rejection or a new connection based on the quality satisfaction degrees of the existing connections. Simulation results show that our proposed dynamic schemes are able to provide a stable service, which well meets the user's quality requirements.

  • PDF