• Title/Summary/Keyword: end-point model

Search Result 338, Processing Time 0.03 seconds

Analysis of User's Continuous Utilization of Social Apps Using the Model of Gamification (게이미피케이션 모델을 이용한 사용자의 소셜 앱 지속 활용도 분석)

  • Gu, Xue-ping;Lee, Hyun-Seok
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.315-325
    • /
    • 2021
  • The value and importance of Gamification has intensified as the way Gamification is applied to social networking applications has added to users' interest and involvement to the product. Gamification entails the adoption of gaming techniques and modes of thinking in non-gaming domains to elicit user engagement. To this end, the paper draws on Gamification's analytical model, Octalysis, with the aim of identifying user loyalty of the three major Chinese social networking applications and extracting their characteristics. In this regard, the first task in the advancement of the study is to establish an understanding of the components and characteristics of Gamification within the context of available examples. Next, a questionnaire survey covering China's three dominant social applications, WeChat, QQ, and Xiaohongshu, is administered and their user loyalty is examined through Octalysis's eight analytical frameworks. By virtue of analysis, the results demonstrate that the three elements of game mechanics, Point, Badge, and Leadboard, which are external to the game, fail to sustain the user loyalty, but are merely a means to an end. Only by including a combination of social application features, contents and user needs can Gamification considerations be maximized to ensure that users are subjectively engaged with the product.

A Study on Network based Intelligent Intrusion Prevention model by using Fuzzy Cognitive Maps on Denial of Service Attack (서비스 거부 공격에서의 퍼지인식도를 이용한 네트워크기반의 지능적 침입 방지 모델에 관한 연구)

  • Lee, Se-Yul;Kim, Yong-Soo;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.148-153
    • /
    • 2003
  • A DoS(Denial of Service) attack appears in the form of the intrusion attempt and Syn Flooding attack is a typical example. The Syn Flooding attack takes advantage of the weak point of 3-way handshake between the end-points of TCP which is the connection-oriented transmission service and has the reliability This paper proposes a NIIP(Network based Intelligent Intrusion Prevention) model. This model captures and analyzes the packet informations for the detection of Syn Flooding attack. Using the result of analysis of decision module, the decision module, which utilizes FCM(Fuzzy Cognitive Maps), measures the degree of danger of the DoS and trains the response module to deal with attacks. This model is a network based intelligent intrusion prevention model that reduces or prevents the danger of Syn Flooding attack.

A Study on Prediction of Overriding Behavior Leading Vehicle in Train Collision (철도차량 충돌시 선두차량의 타고오름량 예측 연구)

  • Kim, Jun Woo;Koo, Jeong Seo;Kim, Geo Young;Park, Jeong Pil
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.40 no.8
    • /
    • pp.711-719
    • /
    • 2016
  • In this study, we derived an theoretical equation, using a simplified spring-mass model for the rolling stock, to obtain the overriding behavior of a leading vehicle, which is considered as the main factor in train accidents. To verify the derived equation, we created a simple 2D model based on the theoretical model, and a simple 3D model considering the characteristics of the power bogie. We then compared the theoretical results with the simulation results obtained using LS-DYNA. The maximum relative derivations in the vertical displacements at the first end-buffer, which is the most important point in overriding, were 3.5 [%] and 1.7 [%] between the two results. Further, we evaluated collision-induced overriding displacements using the theoretical equation for a rubber draft gear, a hydraulic buffer under various collision conditions. We have suggested a theoretical approach for the realization of overriding collision accidents or the energy absorption design of the front end of trains.

The Impact of Service Level Management(SLM) Process Maturity on Information Systems Success in Total Outsourcing: An Analytical Case Study (토털 아웃소싱 환경 하에서 IT서비스 수준관리(Service Level Management) 프로세스 성숙도가 정보시스템 성공에 미치는 영향에 관한 분석적 사례연구)

  • Cho, Geun Su;An, Joon Mo;Min, Hyoung Jin
    • Asia pacific journal of information systems
    • /
    • v.23 no.2
    • /
    • pp.21-39
    • /
    • 2013
  • As the utilization of information technology and the turbulence of technological change increase in organizations, the adoption of IT outsourcing also grows to manage IT resource more effectively and efficiently. In this new way of IT management technique, service level management(SLM) process becomes critical to derive success from the outsourcing in the view of end users in organization. Even though much of the research on service level management or agreement have been done during last decades, the performance of the service level management process have not been evaluated in terms of final objectives of the management efforts or success from the view of end-users. This study explores the relationship between SLM maturity and IT outsourcing success from the users' point of view by a analytical case study in four client organizations under an IT outsourcing vendor, which is a member company of a major Korean conglomerate. For setting up a model for the analysis, previous researches on service level management process maturity and information systems success are reviewed. In particular, information systems success from users' point of view are reviewed based the DeLone and McLean's study, which is argued and accepted as a comprehensively tested model of information systems success currently. The model proposed in this study argues that SLM process maturity influences information systems success, which is evaluated in terms of information quality, systems quality, service quality, and net effect proposed by DeLone and McLean. SLM process maturity can be measured in planning process, implementation process and operation and evaluation process. Instruments for measuring the factors in the proposed constructs of information systems success and SL management process maturity were collected from previous researches and evaluated for securing reliability and validity, utilizing appropriate statistical methods and pilot tests before exploring the case study. Four cases from four different companies under one vendor company were utilized for the analysis. All of the cases had been contracted in SLA(Service Level Agreement) and had implemented ITIL(IT Infrastructure Library), Six Sigma and BSC(Balanced Scored Card) methods since last several years, which means that all the client organizations pursued concerted efforts to acquire quality services from IT outsourcing from the organization and users' point of view. For comparing the differences among the four organizations in IT out-sourcing sucess, T-test and non-parametric analysis have been applied on the data set collected from the organization using survey instruments. The process maturities of planning and implementation phases of SLM are found not to influence on any dimensions of information systems success from users' point of view. It was found that the SLM maturity in the phase of operations and evaluation could influence systems quality only from users' view. This result seems to be quite against the arguments in IT outsourcing practices in the fields, which emphasize usually the importance of planning and implementation processes upfront in IT outsourcing projects. According to after-the-fact observation by an expert in an organization participating in the study, their needs and motivations for outsourcing contracts had been quite familiar already to the vendors as long-term partners under a same conglomerate, so that the maturity in the phases of planning and implementation seems not to be differentiating factors for the success of IT outsourcing. This study will be the foundation for the future research in the area of IT outsourcing management and success, in particular in the service level management. And also, it could guide managers in practice in IT outsourcing management to focus on service level management process in operation and evaluation stage especially for long-term outsourcing contracts under very unique context like Korean IT outsourcing projects. This study has some limitations in generalization because the sample size is small and the context itself is confined in an unique environment. For future exploration, survey based research could be designed and implemented.

  • PDF

A Parallel Axial-Flexural Hinge Model for Nonlinear Dynamic Progressive Collapse Analysis of Welded Steel Moment Frames (용접 철골모멘트골조의 비선형 동적 연쇄붕괴해석을 위한 병렬 소성힌지 모델의 개발)

  • Lee, Cheol Ho;Kim, Seon Woong;Lee, Kyung Koo
    • Journal of Korean Society of Steel Construction
    • /
    • v.21 no.2
    • /
    • pp.155-164
    • /
    • 2009
  • In this study, a computationally efficient parallel axial-flexural plastic hinge model is proposed for nonlinear dynamic progressive collapse analysis of welded steel moment frames. To this end, post-yield flexural behavior and the interaction of bending moment and axial force of the double-span beams in the column's missing event was first investigated by using material and geometric nonlinear parametric finite element analysis. A piece-wise linear parallel point hinge model that captures the moment-axial tension interaction was then proposed and applied to nonlinear dynamic progressive collapse analysis of welded steel moment frames with the use of the OpenSees Program. The accuracy as well as the efficiency of the proposed model was verified based on the inelastic dynamic finite element analysis results. The importance of including the catenary action effects for proper progressive collapse resistant analysis and design was also emphasized.

A Study on Adaptive Learning Model for Performance Improvement of Stream Analytics (실시간 데이터 분석의 성능개선을 위한 적응형 학습 모델 연구)

  • Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.201-206
    • /
    • 2018
  • Recently, as technologies for realizing artificial intelligence have become more common, machine learning is widely used. Machine learning provides insight into collecting large amounts of data, batch processing, and taking final action, but the effects of the work are not immediately integrated into the learning process. In this paper proposed an adaptive learning model to improve the performance of real-time stream analysis as a big business issue. Adaptive learning generates the ensemble by adapting to the complexity of the data set, and the algorithm uses the data needed to determine the optimal data point to sample. In an experiment for six standard data sets, the adaptive learning model outperformed the simple machine learning model for classification at the learning time and accuracy. In particular, the support vector machine showed excellent performance at the end of all ensembles. Adaptive learning is expected to be applicable to a wide range of problems that need to be adaptively updated in the inference of changes in various parameters over time.

MIPv4/MIPv6 Mobility Simulation Model of the Multihomed Node (멀티홈드 노드의 MIPv4/MIPv6 이동성 시뮬레이션 모델)

  • Zhang, Xiaolei;Wang, Ye;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.179-186
    • /
    • 2012
  • Nowadays, the multihomed host equipped with multiple network interfaces has been interested research in next generation wireless network, because the mobile users expect that they can be able to access services not only anywhere, at any time and from any network but also simultaneously. This paper addresses the mobility simulation model of the multihomed node for supporting MIPv4 and MIPv6 function in an interworking of Worldwide Interoperability for Microwave Access (WiMAX) and IEEE 802.11 WLAN. The multihomed node with two air interfaces has been developed based on WiMAX and WLAN workstation node model in simulation software. The main point of the developed model is to support both MIPv4 and MIPv6 function, and provide network selection policy for the multihomed node between WiMAX and WLAN network. Based on the received Router Advertisement along with the interface number, we can manage the access interfaces in ordered list to make handover decision while the multihomed node is moving. In the end of this paper, the simulation scenarios and results are shown for testing MIPv4 and MIPv6 function.

Connecting Online Video Clips to a TV Program: Watching Online Video Clips on a TV Screen with a Related Program (인터넷 비디오콘텐츠를 관련 방송프로그램과 함께 TV환경에서 시청하기 위한 기술 및 방법에 관한 연구)

  • Cho, Jae-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.12 no.5
    • /
    • pp.435-444
    • /
    • 2007
  • In this paper, we presented the concept and some methods to watch online video clips related to a TV program on atelevision which is called lean-back media, and we simulated our concept on a PC system. The key point of this research is suggesting a new service model to TV viewers and the TV industry, which the model provides simple and easy ways to watch online video clips on a TV screen. The paper defined new tags for metadata and algorithm for the model, then showed simple example using those metadata. At the end, it mentioned the usage of the model in the digital broadcasting environment and discuss about the issues which should handle as future works.

Phosphorus Budget of a River Reservoir, Paldang (하천형 호수인 팔당호의 인 수지)

  • Kong, Dongsoo
    • Journal of Korean Society on Water Environment
    • /
    • v.34 no.3
    • /
    • pp.270-284
    • /
    • 2018
  • Paldang is a river reservoir located in the Midwest of Korea, with a water volume of $244{\cdot}10^6m^3$ and a water surface area of $36.5km^2$. It has eutrophied since the construction of a dam at the end of 1973, and the phosphorus concentration has decreased since 2001. Average hydraulic residence time of the Paldang reservoir is about 10 days during the spring season and 5.6 days as an annual level. The hydraulics and water quality of the reservoir can differ greatly, both temporally and spatially. For the spring period (March to May) in 2001 ~ 2017, the reservoir mean total phosphorus concentration calculated from the budget model based on a plug-flow system (PF) and a continuous stirred-tank reaction system (CSTR) was 13 % higher and 10 % lower than the observed concentration, respectively. A composite flow system (CF) was devised by assuming that the transition zone was plug flow, and that the lacustrine zone was completely mixed. The mean concentration calculated from the model based on CF was not skewed from the observed concentration, and showed just 6 % error. The retention coefficient of the phosphorus derived from the CF was 0.30, which was less than those of the natural lakes abroad or river reservoirs in Korea. The apparent settling velocity of total phosphorus was estimated to be $93m\;yr^{-1}$, which was 6 ~ 9 times higher than those of foreign natural lakes. Assuming CF, the critical load line for the total phosphorus concentration showed a hyperbolic relation to the hydraulic load in the Paldang reservoir. This is different from the previously known straight critical load line. The trophic state of the Paldang reservoir has recently been estimated to be mesotrophic based on the critical-load curve of the phosphorus budget model developed in this study. Although there is no theoretical error in the newly developed budget model, it is necessary to verify the validity of the portion below the inflection point of the critical-load curve afterwards.

A Real-time Hand Pose Recognition Method with Hidden Finger Prediction (은닉된 손가락 예측이 가능한 실시간 손 포즈 인식 방법)

  • Na, Min-Young;Choi, Jae-In;Kim, Tae-Young
    • Journal of Korea Game Society
    • /
    • v.12 no.5
    • /
    • pp.79-88
    • /
    • 2012
  • In this paper, we present a real-time hand pose recognition method to provide an intuitive user interface through hand poses or movements without a keyboard and a mouse. For this, the areas of right and left hands are segmented from the depth camera image, and noise removal is performed. Then, the rotation angle and the centroid point of each hand area are calculated. Subsequently, a circle is expanded at regular intervals from a centroid point of the hand to detect joint points and end points of the finger by obtaining the midway points of the hand boundary crossing. Lastly, the matching between the hand information calculated previously and the hand model of previous frame is performed, and the hand model is recognized to update the hand model for the next frame. This method enables users to predict the hidden fingers through the hand model information of the previous frame using temporal coherence in consecutive frames. As a result of the experiment on various hand poses with the hidden fingers using both hands, the accuracy showed over 95% and the performance indicated over 32 fps. The proposed method can be used as a contactless input interface in presentation, advertisement, education, and game applications.