• Title/Summary/Keyword: inbound

Search Result 206, Processing Time 0.026 seconds

The Effect of Seriousness and Controllability of Service Failure on Perceived Fairness, Reliability, Satisfaction and Loyalty of Customers - Focused on the Use of Korean Restaurants by Inbound Japanese Tourists - (서비스 실패의 심각성과 통제성이 고객의 지각된 공정성, 신뢰, 만족, 충성도에 미치는 영향 - 방한 일본 관광객의 국내 외식업체 이용을 중심으로 -)

  • Park, Ji-Soo;Choi, Soo-Keun
    • Culinary science and hospitality research
    • /
    • v.16 no.2
    • /
    • pp.15-30
    • /
    • 2010
  • This study investigates the effect of seriousness and controllability of service failure on perceived fairness, reliability, satisfaction and loyalty of customers. The result of the study is as follows. First, it was expected that a control-attribute and a seriousness-attribute would have an negative(-) impact on perceived fairness-attribute; however, the result showed that both did not have an negative impact on it. Next, a fairness-attribute of a procedure had a significant effect on trust, and a fairness-attribute of interaction and a fairness-attribute of distribution had a significant effect on trust and satisfaction. Lastly, trust had a significant effect on satisfaction while satisfaction had a significant effect on loyalty. Based of the result of this study, food-service enterprises need to perform a fast process of a recovery to overcome service failure rather than confirming a control-attribute and a seriousness-attribute of service failure. Also, they should set up a process of the recovery in the order of trust, satisfaction, and loyalty and check if this process is promptly carried out.

  • PDF

Development of a Cycle-free Based, Coordinated Dynamic Signal Timing Model for Minimizing Queue-Lengths (Using Genetic Algorithm) (대기차량 최소화를 위한 주기변동기반 (Cycle-free based) 동적 신호시간 결정모형 개발)

  • 이영인;임재승;윤경섭
    • Journal of Korean Society of Transportation
    • /
    • v.18 no.2
    • /
    • pp.73-89
    • /
    • 2000
  • This Paper documents the development of a cycle free based, coordinated dynamic signal timing model for minimizing queue lengths using Genetic A1gorithm. The model was embodied using MAT-LAB, the language of technical computing. A special feature of this model is its ability to manage queue lengths of turning movements at the start of green times. The model produces a cycle-free based signal timing(cycles and green times) for each intersection to minimize queue lengths of turning movements on the cycle basis. Concurrently, appropriate offsets could be accomplished by applying cycle-free based signal timings for respective intersections. The model was applied to an example network which consists of three intersections. The result shows that the model produces superior signal timings to the existing signal timing model in terms of managing queue lengths of turning movements.

  • PDF

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

A Model-based Performance Study of the EPCglobal Network (모델 기반 EPCglobal 네트워크의 성능 분석)

  • Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae
    • IE interfaces
    • /
    • v.24 no.2
    • /
    • pp.139-150
    • /
    • 2011
  • The EPCglobal Network is a computer network used to share product data among trading partners. It provides the supply chain with improved visibility and traceability by using Electronic Product Code (EPC), which is stored on an RFID tag. Although this network model is widely accepted as a global standard and the growth of EPCglobal-subscriber base is considerable, the EPC technology adoption process is still in its infancy. This is because some of the critical issues on this model still remain to be verified such as scalability, data management, security, privacy and the economic value of data sharing. In this paper, we focus on scalability issue among the challenges to overcome and we regard performance of the EPCglobal Network only as a track and trace query-processing cost in the network. We developed performance models consisting of three elements of the EPCglobal Network : Discovery Services (DS), EPC Information Services (EPCIS), Object Naming Services (ONS). Then we abstracted out the track and trace query execution model to evaluate performance of the overall EPCglobal Network. Finally using the proposed models, we carried out simulation analysis based on an RFID-based inbound logistics process of automobile parts. This work is an important step towards the EPC technology diffusion and provides guidelines for businesses looking to buy or build the EPCglobal Network-based systems.

An Empirical Study on the Clothing Merchandise Purchase Motivation and Behavior of Foreign Visitors in South Korea (방한 외래관광객의 의류상품 구매동기와 구매행동에 관한 실증적 연구)

  • Suh, Chul-Hyun;Cho, Ji-Hyun
    • Korean Journal of Human Ecology
    • /
    • v.11 no.4
    • /
    • pp.367-380
    • /
    • 2002
  • This study tries to search and analyze empirically the clothing merchandise purchase motivation and behavior made by foreign visitors who bought clothes as tour memorials in South Korea. To make a empirical study we made survey research and evaluated 30 items for the survey of clothing purchase motivation and 25 items for the survey of the importance and satisfaction revealed at the time of purchase with the standard of Likert 5 point. We had chosen 614 sample participants including 176 English speakers, 211 Japanese speakers, and 277 Chinese speakers among those foreign tourists who had purchased clothing materials at the Dongdaemun Shopping Mall. The result of analysis is as follows : As the result of factor analysis about the clothing merchandise purchase, we had 6 factors. They are (1)impulse, (2)utility, (3)fashionableness, (4)tour commemoration (5)psychology (6)economy. As the result of cluster analysis based on the standard of selected 6 factors of clothing merchandise purchase motivation, we could divide three groups such as (1)the pursuit type of clothing merchandise purchase, (2)the pursuit type of recreation of feeling (3)the pursuit type of tour memorial. As the result of analysis on the items of purchased clothing merchandise, the highest frequency of purchase was made by T-shirt, then by the order of sweater, blouse, and aloha shirt, pants, and jacket. In regard to the importance of items related to clothing merchandise, the highest importance was made by design, then by the order of price, size, color and utility, and style. In regard to the items related to the service of shopping mall, the highest satisfaction was made by the convenience of business hour. Meanwhile, the lowest satisfaction was made by the inconvenience of fitting room, the speaking and by ability of foreign languages by sales agents.

  • PDF

An Efficient Method for Allocating Storage Yard for Container Terminal (컨테이너 터미널의 장치장 활용 방안에 관한 연구)

  • Song Yong-Seok;Nam Ki-Chan;Yoo Ju-Young;Kim Tae-Won
    • Journal of Navigation and Port Research
    • /
    • v.30 no.3 s.109
    • /
    • pp.203-209
    • /
    • 2006
  • Maritime transport has been occupying the biggest part of the container transportation market. With regard to container terminal management, the planning technology and the space allocation system on the yard are very significant factors to secure the stability of ship and to ensure the reliability of schedules of ship throughout keeping barycenter of vessel by right loading and fast handling of cargoes. The purposes of this paper are to illustrate the existing yard management systems such as Grouping method and Random Grounding method, and then to evaluate and compare the efficiency of yard availability between the existing management system(Grouping method) and Random Grouping which uses the forecasted inbound cargo volume at the gate by Time Base Operation.

Design and Implementation of an InfiniBand System Interconnect for High-Performance Cluster Systems (고성능 클러스터 시스템을 위한 인피니밴드 시스템 연결망의 설계 및 구현)

  • Mo, Sang-Man;Park, Kyung;Kim, Sung-Nam;Kim, Myung-Jun;Im, Ki-Wook
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.389-396
    • /
    • 2003
  • InfiniBand technology is being accepted as the future system interconnect to serve as the high-end enterprise fabric for cluster computing. This paper presents the design and implementation of the InfiniBand system interconnect, focusing on an InfiniBand host channel adapter (HCA) based on dual ARM9 processor cores The HCA is an SoC tailed KinCA which connects a host node onto the InfiniBand network both in hardware and in software. Since the ARM9 processor core does not provide necessary features for multiprocessor configuration, novel inter-processor communication and interrupt mechanisms between the two processors were designed and embedded within the KinCA chip. Kinch was fabricated as a 564-pin enhanced BGA (Bail Grid Array) device using 0.18${\mu}{\textrm}{m}$ CMOS technology Mounted on host nodes, it provides 10 Gbps outbound and inbound channels for transmit and receive, respectively, resulting in a high-performance cluster system.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

LoRa Network based Parking Dispatching System : Queuing Theory and Q-learning Approach (LoRa 망 기반의 주차 지명 시스템 : 큐잉 이론과 큐러닝 접근)

  • Cho, Youngho;Seo, Yeong Geon;Jeong, Dae-Yul
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1443-1450
    • /
    • 2017
  • The purpose of this study is to develop an intelligent parking dispatching system based on LoRa network technology. During the local festival, many tourists come into the festival site simultaneously after sunset. To handle the traffic jam and parking dispatching, many traffic management staffs are engaged in the main road to guide the cars to available parking lots. Nevertheless, the traffic problems are more serious at the peak time of festival. Such parking dispatching problems are complex and real-time traffic information dependent. We used Queuing theory to predict inbound traffics and to measure parking service performance. Q-learning algorithm is used to find fastest routes and dispatch the vehicles efficiently to the available parking lots.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF