• Title/Summary/Keyword: data dissemination

Search Result 395, Processing Time 0.03 seconds

An Analysis of Web Courseware Development, Dissemination and Usage Status in Elementary School (웹 코스웨어 개발·보급·활용 실태 및 개선 방안에 관한 연구 - 초등학교 중심으로)

  • Lee, Mi Jar;Kim, In-Sook;Park, Seung-Ryul
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.2
    • /
    • pp.71-83
    • /
    • 2001
  • The purpose of this study was to explore the status of development, dissemination, and usage of web courseware for elementary school. Also, this study investigated the problems and improvement strategies. The subjects were 52 researchers from Offices of Education and private companies and 528 teachers and 527 students from elementary schools. Questionnaires were used to collect the data. The study results indicated as follows: First, web courseware are insufficient. It is necessary to provide sufficient budgetary support for development of web courseware. Second, many of web courseware are inconsistent with the curriculum and class environment. To resolve this problem, more teachers should be involved in web courseware development. Third, web courseware usage level was very low because of the lack of information and training. In-service training program should be changed from computer literacy oriented to teaching method with web courseware.

  • PDF

Unspecified Event Detection System Based on Contextual Location Name on Twitter (트위터에서 문맥상 지역명을 기반으로 한 불특정 이벤트 탐지 시스템)

  • Oh, Pyeonghwa;Yim, Junyeob;Yoon, Jinyoung;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.9
    • /
    • pp.341-348
    • /
    • 2014
  • The advance in web accessibility with dissemination of smart phones gives rise to rapid increment of users on social network platforms. Many research projects are in progress to detect events using Twitter because it has a powerful influence on the dissemination of information with its open networks, and it is the representative service which generates more than 500 million Tweets a day in average; however, existing studies to detect events has been used TFIDF algorithm without any consideration of the various conditions of tweets. In addition, some of them detected predefined events. In this paper, we propose the RTFIDF VT algorithm which is a modified algorithm of TFIDF by reflecting features of Twitter. We also verified the optimal section of TF and DF for detecting events through the experiment. Finally, we suggest a system that extracts result-sets of places and related keywords at the given specific time using the RTFIDF VT algorithm and validated section of TF and DF.

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.103-118
    • /
    • 2014
  • Over the last couple of years, traditional VANET (Vehicular Ad Hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage resources in middle and high-end vehicles. This phenomenon became the driving force for the birth of VANET-based clouds. In this paper, we envision a novel application layer of VANET-based clouds based on the cooperation of the moving cars on the road, called CaaS (Cooperation as a Service). CaaS is divided into TIaaS (Traffic Information as a Service), WaaS (Warning as a Service), and IfaaS (Infotainment as a Service). Note, however, that this work focuses only on TIaaS and WaaS. TIaaS provides vehicular nodes, more precisely subscribers, with the fine-grained traffic information constructed by CDM (Cloud Decision Module) as a result of the cooperation of the vehicles on the roads in the form of mobility vectors. On the other hand, WaaS provides subscribers with potential warning messages in case of hazard situations on the road. Communication between the cloud infrastructure and the vehicles is done through GTs (Gateway Terminals), whereas GTs are physically realized through RSUs (Road-Side Units) and vehicles with 4G Internet access. These GTs forward the coarse-grained cooperation from vehicles to cloud and fine-grained traffic information and warnings from cloud to vehicles (subscribers) in a secure, privacy-aware fashion. In our proposed scheme, privacy is conditionally preserved wherein the location and the identity of the cooperators are preserved by leveraging the modified location-based encryption and, in case of any dispute, the node is subject to revocation. To the best of our knowledge, our proposed scheme is the first effort to offshore the extended traffic view construction function and warning messages dissemination function to the cloud.

An Analysis of Image Use in Twitter Message (트위터 상의 이미지 이용에 관한 분석)

  • Chung, EunKyung;Yoon, JungWon
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.4
    • /
    • pp.75-90
    • /
    • 2013
  • Given the context that users are actively using social media with multimedia embedded information, the purpose of this study is to demonstrate how images are used within Twitter messages, especially in influential and favorited messages. In order to achieve the purpose of this study, the top 200 influential and favorited messages with images were selected out of 1,589 tweets related to "Boston bombing" in April 2013. The characteristics of the message, image use, and user are analyzed and compared. Two phases of the analysis were conducted on three data sets containing the top 200 influential messages, top 200 favorited messages, and general messages. In the first phase, coding schemes have been developed for conducting three categorical analyses: (1) categorization of tweets, (2) categorization of image use, and (3) categorization of users. The three data sets were then coded using the coding schemes. In the second phase, comparison analyses were conducted among influential, favorited, and general tweets in terms of tweet type, image use, and user. While messages expressing opinion were found to be most favorited, the messages that shared information were recognized as most influential to users. On the other hand, as only four image uses - information dissemination, illustration, emotive/persuasive, and information processing - were found in this data set, the primary image use is likely to be data-driven rather than object-driven. From the perspective of users, the user types such as government, celebrity, and photo-sharing sites were found to be favorited and influential. An improved understanding of how users' image needs, in the context of social media, contribute to the body of knowledge of image needs. This study will also provide valuable insight into practical designs and implications of image retrieval systems or services.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

Study on vertical variation of horizontal wind energy resources distribution using clustering analysis (군집분석을 통한 풍력자원 수평 공간 분포의 연직 변화에 관한 연구)

  • Kim, Min-Jung;Lee, Hwa-Woon;Lee, Soon-Hwan;Kim, Dong-Hyuk;Jung, Woo-Sik;Kim, Hyun-Goo
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2009.06a
    • /
    • pp.554-556
    • /
    • 2009
  • Wind classification for exact estimation of wind energy resources was carried out using numerically simulated wind data for three years. The MM5(a fifth-generation Mesoscale Model), developed at Penn State University and the National Center for Atmospheric Research (NCAR), was used to estimate the wind fields in this study. We also use a variant of the K-mean clustering to classify the wind district and define the relation between districts. Wind estimated at surface and 100 m high at Busan area is classified into the 10 and 7 classes, respectively. These discrepancies of wind districts pattern at surface and upper air meteorological data indicates the quantity of wind resources can be changed according to the level of wind data used in estimation. Therefore, the estimation of wind district classification by reasonable wind data is utilized to build the effective policy for wind energy dissemination.

  • PDF

The Effect of Consumer Affinity and Country Image Toward Willingness to Buy

  • Halim, Rizal Edy;Zulkarnain, Elszuary Abrar Uzi
    • Journal of Distribution Science
    • /
    • v.15 no.4
    • /
    • pp.15-23
    • /
    • 2017
  • Purpose - This research aims to determine whether the consumer affinity and ethnocentrism as well as the image of a foreign country (Japanese product as the most popular product in Indonesia) are able to influence behavior related to the perceived risk and willingness to buy foreign products from the affinity country. Research design, data, and methodology - Using survey techniques with 164 respondents, the study uses structural equation model with confirmatory factor analysis (CFA). To ensure the research objective and appropriate respondent, then we select an individual who have interest on Japanese culture & language. The primary and secondary data used in this study. Primary data refers to information collected directly from respondent by questionnaires dissemination while secondary data is provided from well-established literatures. Results - The results show us that the ethnocentrism has dominant affection role compared to affinity in order to influence consumer behavior meanwhile, the product country image has cognition role to evoke consumer desire to consume foreign products. Conclusions - From a theoretical perspective, the study contributes to international marketing literature by refining the conceptualization of the consumer affinity construct and highlighting its multidimensional nature. The consumer affinity research need to enrich in term of the context and the different culture and situation.

DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks

  • Gazdar, Tahani;Belghith, Abdelfettah;AlMogren, Ahmad S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1533-1556
    • /
    • 2017
  • The concept of trust in vehicular ad hoc networks (VANETs) is usually utilized to assess the trustworthiness of the received data as well as that of the sending entities. The quality of safety applications in VANETs largely depends on the trustworthiness of exchanged data. In this paper, we propose a self-organized distributed trust computing framework (DTCF) for VANETs to compute the trustworthiness of each vehicle, in order to filter out malicious nodes and recognize fully trusted nodes. The proposed framework is solely based on the investigation of the direct experience among vehicles without using any recommendation system. A tier-based dissemination technique for data messages is used to filter out non authentic messages and corresponding events before even going farther away from the source of the event. Extensive simulations are conducted using Omnet++/Sumo in order to investigate the efficiency of our framework and the consistency of the computed trust metrics in both urban and highway environments. Despite the high dynamics in such networks, our proposed DTCF is capable of detecting more than 85% of fully trusted vehicles, and filtering out virtually all malicious entities. The resulting average delay to detect malicious vehicles and fraudulent data is showed to be less than 1 second, and the computed trust metrics are shown to be highly consistent throughout the network.

A Reliable Data Transfer Mechanism Using Directed Diffusion in Wireless Sensor Networks (무선 센서 네트워크에서 Directed Diffusion을 이용한 신뢰성 있는 데이터 전달 기법)

  • Choi Jae-Won;Lee Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.77-83
    • /
    • 2006
  • In this paper, we have pesented a reliable data transfer mechanism using Directed Diffusion in WSNs (fireless Sensor Networks). This mechanism involves selecting a route with higher reachability and transferring data along the route chosen, which is based on the end-to-end reliability calculated by the dissemination procedure of Interest packets, while each node of a sensor network maintains the only information on its neighborhood. We performed various experiments changing the link error rates and the number of nodes and discovered that this proposed mechanism improves event-to-sink data transfer reliability in WSNs. We also found that this mechanism spreads traffic load over and reduces energy consumption, which in turn prolongs network lifetime.

Linking Omnichannel Integration Quality and Customer Loyalty in Vietnamese Banks

  • Thu Trang PHAM
    • Journal of Distribution Science
    • /
    • v.22 no.6
    • /
    • pp.95-106
    • /
    • 2024
  • Purpose: This study investigates the complex dynamics of consumer behavior in Vietnamese banking omnichannel environments, focusing on the roles of service consistency, service transparency, flow, perceived privacy risk, and loyalty intention. Research design, data and methodology: Using a sample of 422 Vietnamese bank customers, data analysis revealed significant relationships among the variables under investigation. Results: Firstly, service consistency was found to positively influence flow experiences and negatively impact perceived privacy risk, highlighting the importance of uniform service quality across channels in enhancing consumer engagement while mitigating privacy concerns. Similarly, service transparency was positively associated with flow experiences and negatively associated with perceived privacy risk, underscoring the importance of transparent information dissemination in fostering immersive consumer experiences while alleviating privacy apprehensions. Furthermore, both flow experiences and perceived privacy risk significantly influenced loyalty intentions, indicating the pivotal roles of engaging experiences and data security in driving consumer loyalty. Additionally, mediated relationships were observed, demonstrating the interplay between service consistency, service transparency, flow, perceived privacy risk, and loyalty intention in shaping consumer behavior in omnichannel contexts. Conclusions: These findings provide valuable insights for retailers and marketers seeking to optimize consumer experiences and cultivate loyalty in omnichannel environments by prioritizing consistency, transparency, and data privacy protection.