• Title/Summary/Keyword: information flow

Search Result 5,716, Processing Time 0.036 seconds

Method of Payment Service based on Open API (개방형 인터페이스를 이용한 지불 서비스 제공 방법)

  • Hong, Sun-Hwan;Lee, Jae-Yong;Kim, Byung-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.572-575
    • /
    • 2008
  • In this paper we designed a Payment Service. This service is based on Parlay X Web Services. In the design process we described a functional entity and the information flow between entities. Also, we described a physical entity and the information flow between entities.

  • PDF

A study on the Influences of flow and Identity Perspectives Toward User behaviors in Micro blog Services (마이크로블로그 서비스에서 사용자 행동에 미치는 플로우와 정체성의 영향에 대한 연구)

  • Shin, Ho-Kyoung;Ha, Na-Yeon;Lee, Ki-Won
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.59-77
    • /
    • 2009
  • Microblog services are such new communication channels with some considerable potential to improve information sharing. The idea of sharing short messages using multiple access points seems to be appealing to people worldwide. Through the lens of flow and social identity, we explored factors that influence information sharing behaviors in microblog services. With an empirical study, we examined enjoyment and concentration(flow) and self-presentation(social identity) in microblog services like twitter can contribute to the user behaviors. Our aim was to gain insight into ways of creating an environment that facilitating voluntary sharing of information. Our findings suggested that enjoyment, concentration, and selfpresentation were crucial determinants of information sharing behaviors in microblog services. This study has important implications for academic researchers and practitioners who seek to understand why microblog service users share their information with other members in microblog services.

  • PDF

A Program Complexity Measure using the Slice-based Information Flow Graph(SIFG) (SIFG를 이용한 프로그램 복잡도 척도)

  • Choi, Wan-Kyoo;Chung, Il-Yong;Lee, Sung-Joo
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.12
    • /
    • pp.910-920
    • /
    • 2001
  • We developed a SIFC(Slice-based Information Flow Graph) For modeling the information flow on program on the basis of the information flow of a data tokens on program slices. Then we defined a SCM(Slice-based Complexity Measure) for measuring the program complexity by measuring the complexity of information flow on SIFG, We showed that, according to Zuse's approach, it assumed ordinal scale based on atomic modifications on SIFG and that it was additive to binary operation MBSEQ and that it was not additive to binary operation MBALT but satisfied Weyuker's 9th axiom. Also based on comparison with the existing measures, we showed that SCM could measure not only the control and data flow in program but also the physical size of program.

  • PDF

The Effect of Psychological Temptation, Site Quality and Sense of Community upon Online Game (심리적 유인과 사이트 품질, 공동체의식이 온라인게임에 미치는 영향)

  • Lee, Sang-Chul;Kim, Nam-Hee;Moon, Jae-Young;Suh, Young-Ho
    • Asia pacific journal of information systems
    • /
    • v.13 no.4
    • /
    • pp.207-227
    • /
    • 2003
  • The purpose of this research is to identify if psychological temptation, site quality and sense of community influence user's flow and addiction and to identify causalities among flow, addiction, customer satisfaction and customer loyalty in online industry. Many previous researches in the area of online games have been carried out about addiction by psychologist and about the development of related technologies by scientists. There are only a few studies about the customer satisfaction from the online business perspective. However, this research is different from the previous ones in the sense that both flow and addiction are considered in the study of the relationship between customer satisfaction/loyalty and flow/addiction in the area of online industry. The empirical results of high-order factor analysis indicate that six independent variables such as design, information, feedback, impulsiveness and motivation have converge three second-order variables such psychological temptation, site quality and sense of community. Consequently, site quality and sense of community have impacts on the flow, while on the other hand, psychological temptation has impacts on the addiction. Conclusively, customer satisfaction and loyalty are positively related not with the addiction but with the flow. Besides, customer loyalty is significantly influenced by the flow and the customer satisfaction. This indicates that companies in the online game industry have to develop a strategy for the flow which is more socially and ethically allowable than the addiction.

Developing a Data Model of Product Manufacturing Flow for an IC Packaging WIP System

  • Lin, Long-Chin;Chen, Wen-Chin;Sun, Chin-Huang;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • v.6 no.3
    • /
    • pp.70-94
    • /
    • 2005
  • The IC packaging industry heavily relies on shop floor information, necessitating the development of a model to flexibly define shop floor information and timely handle manufacturing data. This study presents a novel data model of product manufacturing flow to define shop floor information to effectively respond to accelerated developments in IC package industry. The proposed data model consists of four modules: operation template setup, general process setup, enhanced bill of manufacture (EBOMfr) setup, and work-order process setup. The data model can flexibly define the required shop floor information and decision rules for shop floor product manufacturing flow, allowing one to easily adopt changes of the product and on the shop floor. However, to handle floor dynamics of the IC packaging industry, this work also proposes a WIP (i.e. work-in-process) system for monitoring and controlling the product manufacturing flow on the shop floor. The WIP system integrates the data model with a WIP execution module. Furthermore, an illustrative example, the MIRL WIP System, developed by Mechanical Industrial Research Laboratories of Industrial Technology Research Institute, demonstrates the effectiveness of the proposed model.

A Real Time Traffic Flow Model Based on Deep Learning

  • Zhang, Shuai;Pei, Cai Y.;Liu, Wen Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2473-2489
    • /
    • 2022
  • Urban development has brought about the increasing saturation of urban traffic demand, and traffic congestion has become the primary problem in transportation. Roads are in a state of waiting in line or even congestion, which seriously affects people's enthusiasm and efficiency of travel. This paper mainly studies the discrete domain path planning method based on the flow data. Taking the traffic flow data based on the highway network structure as the research object, this paper uses the deep learning theory technology to complete the path weight determination process, optimizes the path planning algorithm, realizes the vehicle path planning application for the expressway, and carries on the deployment operation in the highway company. The path topology is constructed to transform the actual road information into abstract space that the machine can understand. An appropriate data structure is used for storage, and a path topology based on the modeling background of expressway is constructed to realize the mutual mapping between the two. Experiments show that the proposed method can further reduce the interpolation error, and the interpolation error in the case of random missing is smaller than that in the other two missing modes. In order to improve the real-time performance of vehicle path planning, the association features are selected, the path weights are calculated comprehensively, and the traditional path planning algorithm structure is optimized. It is of great significance for the sustainable development of cities.

An Enhanced Optical Flow Calculation Using Scalar Edges (스칼라 경계선을 이용한 개선된 Optical Flow 계산)

  • Yoon, Sang-Oon;Cho Seok-Je;Ha, Yeong-Ho
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.7
    • /
    • pp.132-139
    • /
    • 1989
  • Optical flow is important not only for determining velocity and trajectory of the object but also for image segmentation and 3D information. The gradient-based method is mostly used to compute optical flow form image sequences, but it accomanies smoothing effect of velocity vectors. In this paper, an enhanced algorithm for computing optical flow using scalar edge to restrict is also applied to reduce errors both around motion boundary and in the occlusion region.

  • PDF

A study on the measurement of Blood flow-turbulence (혈류의 Flow-Turbulence 측정에 관한 연구)

  • Ko, Yeon-Soon;Kang, Chung-Shin;Kim, Young-Kil
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.294-296
    • /
    • 1988
  • The tomographic imaging that employs ultrasonic echos has achieved outstanding advances in recent years, and today, ultrasonic diagnostic equipment has become the tool that is absolutely indispensible for clinical operations. Meanwhile, the feasility of measuring blood flow in the heart and vessels by the use of Doppler effect in ultrasonic waves is a well known fact. With respect to the method of blood flow measurment, there are two kinds which employ continous wave and pulse wave doppler system. In this paper, we describe the measurment of Blood flow-turbulence using general purpose Digital Signal Processing Board which had been implemented for the purpose of real-time spectrum analyser. Blood flow-turbulence means the blood-flow behavior. And it's value proportional to the spectrum variance. Therefore mean frequency of blood signal and variance provide useful diagnostic information. We have applied to the major arteries and vein, obtained the information about the time dependent blood-flow behavior.

  • PDF

Anomaly Removal for Efficient Conformance Test (효율적인 프로토콜 적합성 시험을 위한 변칙성 제거)

  • Lee, Hyeon-Cheol;Heo, Gi-Taek
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.750-757
    • /
    • 1999
  • The protocol conformance testing is to check whether an implementation of a protocol conforms to its specification. And it is important to improve the interoperability of protocol and the efficiency of cost. In general, protocol is composed of the control flow representing observable behaviors and the data flow representing internally used variables. Until now, research for generation of test suite has been realized only consideration the control flow of protocol or separation control flow from data flow. Case of considering control flow, contents of test was simple and definite. Length of test was short. But it was of little application, and it didn't manage each kind errors in data flow. Therefore, we must generate test case that can manage control and data flow. So, anomaly of variable must be removed for efficient conformance testing. Therefore in this dissertation, we proposed algorithm which can remove anomaly of variable for efficient conformance testing. And it showed that anomaly of variable was got rid of applying this algorithm to real protocol.

  • PDF

Precise control flow protection based on source code (소스코드 기반의 정밀도 높은 실행 흐름 보호 기법)

  • Lee, JongHyup;Kim, Yong Seung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1159-1168
    • /
    • 2012
  • Control Flow Integrity(CFI) and Control Flow Locking(CFL) prevent unintended execution of software and provide integrity in control flow. Attackers, however, can still hijack program controls since CFI and CFL does not support fine-granularity, context-sensitive protection. In this paper, we propose a new CFI scheme, Source-code CFI(SCFI), to overcome the problems. SCFI provides context-sensitive locking for control flow. Thus, the proposed approach protects software against the attacks on the previous CFI and CFL schemes and improves safety.