• 제목/요약/키워드: data communication

검색결과 17,235건 처리시간 0.038초

정보통신이 의사결정에 미치는 효과에 관한 연구 (A Study on the Effects of Decision Making by Data Communication)

  • 이종호
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제5권
    • /
    • pp.115-147
    • /
    • 1996
  • 1. Introduction The new computing era started with the various computer technologies and services having been used in communication and automation area since 1980's. We call that era information technology(IT) era. In such era, especially communication plays very important roles in every aspect. So Schoderbek named that era the ege of c2. Therefore, communition became widely used in organizations. Now the majority of organizations have computer-aided communication capabilities that facilitate access to people and information, both within and outside organization. So one objective of this study is to assess the effects of these changes in data communication on decision making. Decision making is the essence of management and is too important to organizational success. This dissertation has three basic objectives: 1)to clarify the concept of data communication, who influences on decision making, and the concept of decision types, managerial and operational, may be affected differently by data communication 2)to investigate whether the effects of data communication upon decision making may be organizational variables. 3)to verify that business and decision types may affect different impact on decision making.2. Hypotheses Four attributes are selected to make hypotheses from the information attributes presented by famous scholars. They are as follows. ①effectiveness ②routinization ③communication easiness ④timeliness Hypotheses are developed according to these attributes, which are chosen from the literature study and theory H1 : Data communication is positively related to the effectiveness of DM H2 : Data communication is positively related to the routinization of DM H3 : Data communication is positively related to the communication easiness of DM H4 : Data communication is positively related to the timeliness of information for DM3. Methodology After pilot study, data are collected from the decision makers in 200 companies located at Seoul and the metropolitan area. A random sample of 174 employees sent back their questionnaires(response rate of 87%). Among them, 151 questionnaires was useful to the analysis of this study(useful rate of 75.5%).4. Conclusion and Discussion Among four proposed hypotheses, all hypotheses are fully supported. They are as follows. 1)effectiveness 2)routinization 3)communication easiness 4)timeliness. So, first objective of this study is proved. Namely, to clarify that the effects of data communication upon DM is fully supported. But they are different from the decision types. Second one is not apparently verfied. i.e. the effect of data communication on the decision variables is not moderated by organizational variables. Third is inspected. The effects of data communication differs from the industry and decision types evidently. This study has many limitations to generalize the statistical results. Since the definition of data communication has broad meanings in reality. So allare not contained in this research. Another restrict in this study is like this. Decision types are usually divided into three types-operational, managerial, strategic DM. But in this study, strategic DM is left out.

  • PDF

A data corruption detection scheme based on ciphertexts in cloud environment

  • Guo, Sixu;He, Shen;Su, Li;Zhang, Xinyue;Geng, Huizheng;Sun, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3384-3400
    • /
    • 2021
  • With the advent of the data era, people pay much more attention to data corruption. Aiming at the problem that the majority of existing schemes do not support corruption detection of ciphertext data stored in cloud environment, this paper proposes a data corruption detection scheme based on ciphertexts in cloud environment (DCDC). The scheme is based on the anomaly detection method of Gaussian model. Combined with related statistics knowledge and cryptography knowledge, the encrypted detection index for data corruption and corruption detection threshold for each type of data are constructed in the scheme according to the data labels; moreover, the detection token for data corruption is generated for the data to be detected according to the data labels, and the corruption detection of ciphertext data in cloud storage is realized through corresponding tokens. Security analysis shows that the algorithms in the scheme are semantically secure. Efficiency analysis and simulation results reveal that the scheme shows low computational cost and good application prospect.

Applying a sensor energy supply communication scheme to big data opportunistic networks

  • CHEN, Zhigang;WU, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2029-2046
    • /
    • 2016
  • Energy consumption is an important index in mobile ad hoc networks. Data packet transmission increases among nodes, particularly in big data communication. However, nodes may be unable to transmit data packets because of energy over-consumption. Consequently, information may be lost and network communication may block. While opportunistic network is a kind of mobile ad hoc networks, researchers do not focus on energy consumption in opportunistic network communication. This study proposed an effective sensor energy supply scheme that can be applied in opportunistic networks. This scheme considers nodes sensor requests and communication model. In this scheme, nodes do not only accomplish energy supply in communication, but also extend communication time in opportunistic networks. Compared with the Spray and Wait algorithm and the Binary Spray and Wait algorithm in simulations, the proposed scheme extends communication time, increases data packet transmission, and accomplishes energy supply among nodes.

제 2 언어 학습자의 의사소통 전략: 자료융합 분석 (L2 Learners' Communication Strategies: A Data Convergence Analysis)

  • 강수자
    • 한국융합학회논문지
    • /
    • 제6권6호
    • /
    • pp.263-270
    • /
    • 2015
  • 제2언어 학습자들은 의사소통전략을 사용하여 그들이 구두 의사소통에서 직면하게 되는 문제들에 대처한다. 이 전략들이 의사소통과 언어학습에서 주요한 역할을 하기 때문에 제2언어 연구에서 의사소통을 용이하게 하는 전략을 찾아내는 것이 중요하다. 그러나 어떻게 전략을 확인하는가, 특히 연구 자료로 대화 자료, 회상인터뷰 자료, 또는 두 가지의 융합된 자료를 사용하는 것에 대해 논란이 있다. 이 연구에서는 융합자료 분석을 통해 제2언어 학습자들이 사용하는 의사소통전략을 발견해 내고자 하였다. 이 질적 사례연구를 위해 한국인 제2언어 학습자들의 대화 자료와 전략사용을 회고하는 인터뷰 자료가 수집되었다. 이 수집된 자료들의 융합분석을 통해 한국인 제2언어 학습자들이 사용하는 정의대치 전략, 메시지변환 전략, 시간얻기 전략, 이해전략 등의 다양한 의사소통전략들이 확인되었다. 이 연구는 제2언어 의사소통시의 문제점을 해결하는 데 의사소통전략들이 효율적임을 보여주며, 의사소통 연구에 융합자료 분석이 유용하다는 것을 시사해준다.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

Constructive Steganography by Tangles

  • Qian, Zhenxing;Pan, Lin;Huang, Nannan;Zhang, Xinpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3911-3925
    • /
    • 2018
  • This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

MobPrice: Dynamic Data Pricing for Mobile Communication

  • Padhariya, Nilesh;Raichura, Kshama
    • Journal of information and communication convergence engineering
    • /
    • 제13권2호
    • /
    • pp.86-96
    • /
    • 2015
  • In mobile communication, mobile services [MSs] (e.g., phone calls, short/multimedia messages, and Internet data) incur a cost to both mobile users (MUs) and mobile service providers (MSPs). The proposed model MobPrice consists of dynamic data pricing schemes for mobile communication in order to achieve optimal usage of MSs at minimal prices. MobPrice inspires MUs to subscribe MSs with flexibility of data sharing and intra-peer exchanges, thereby reducing overall cost. The main contributions of MobPrice are three-fold. First, it proposes a novel k-level data-pricing (kDP) scheme for MSs. Second, it extends the kDP scheme with the notion of service-sharing-based pricing schemes to a collaborative peer-to-peer data-pricing (pDP) scheme and a cluster-based data-pricing (cDP) scheme to incorporate the notion of 'cluster' (made up of two or more MUs) in mobile communication. Third, our performance study shows that the proposed schemes are indeed effective in maximizing MS subscriptions and minimizing MS's price/user.

직접 확산 방식을 이용한 반도체 장비 통신 프로토콜 구현 (The Implementation of Communication Protocol for Semiconductor Equipments using Directed Diffusion)

  • 김두용;조현찬
    • 반도체디스플레이기술학회지
    • /
    • 제12권2호
    • /
    • pp.39-43
    • /
    • 2013
  • The semiconductor equipments generate necessary data through communication networks for the effective manufacturing processes and automation of semiconductor equipments. For transferring data between semiconductor equipments and sending data to monitor equipments, several standards for communication protocols have been proposed. Communication networks in semiconductor manufacturing systems will transmit a lot of data traffic, which can be vulnerable in data delay and network failure. Therefore, it is required that data traffic need to be distributed. To accomplish this objective, we recommend the use of a redundant and valuable communication path which is constructed by a wireless sensor network. In this paper, the directed diffusion method for wireless sensor networking is suggested for networking semiconductor equipments. It is shown that how the directed diffusion is employed to connect semiconductor equipments. Also, we show how to implement the SECS of semiconductor equipments communication protocols based on the directed diffusion.

Compressed Sensing-Based Multi-Layer Data Communication in Smart Grid Systems

  • Islam, Md. Tahidul;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권9호
    • /
    • pp.2213-2231
    • /
    • 2013
  • Compressed sensing is a novel technology used in the field of wireless communication and sensor networks for channel estimation, signal detection, data gathering, network monitoring, and other applications. It plays a significant role in highly secure, real-time, well organized, and cost-effective data communication in smart-grid (SG) systems, which consist of multi-tier network standards that make it challenging to synchronize in power management communication. In this paper, we present a multi-layer communication model for SG systems and propose compressed-sensing based data transmission at every layer of the SG system to improve data transmission performance. Our approach is to utilize the compressed-sensing procedure at every layer in a controlled manner. Simulation results demonstrate that the proposed monitoring devices need less transmission power than conventional systems. Additionally, secure, reliable, and real-time data transmission is possible with the compressed-sensing technique.

공간 분할 처리를 이용한 고속 가시광통신 시스템 (High-speed visible light communication system using space division processing)

  • 박준형;이규진
    • 융합정보논문지
    • /
    • 제8권6호
    • /
    • pp.237-242
    • /
    • 2018
  • 우리 주변에는 다양한 '무선 통신 기술'이 존재한다. 하지만 무선 통신 기술의 발달로 인해 주파수 자원을 필요로 하는 기술이 늘어나면서 주파수 부족 현상이 심각하게 대두되었다. 최근 이러한 문제를 해결할 수 있는 대안으로 떠오르는 통신기술로 '가시광 통신'이 주목받고 있다. '가시광 통신'은 직렬데이터 송수신을 기반으로 하는 통신 방법으로 발신부의 한계 및 포토다이오드를 이용하는 수신단의 문제 때문에 병렬데이터 송수신에 어려움이 있다. 본 논문에서는 이러한 가시광 통신의 병렬데이터 처리에 대하여 연구했다. 가시광 통신 시스템에 영상처리를 적용한 병렬데이터 분석을 통해 병렬데이터 분석 방법을 구현하였다. 제안 시스템에서 입출력 데이터 매칭 비교를 통해 병렬 통신 성능을 확인할 수 있었으며 병렬데이터 분석에 다양성을 제시할 것으로 기대된다.