• Title/Summary/Keyword: information overload

Search Result 531, Processing Time 0.031 seconds

A Design of Mobile Web Server Framework for SOAP Transaction and Performance Enhancement in Web2.0 (웹2.0에서 SOAP 처리와 성능 향상을 위한 모바일 웹 서버 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1866-1874
    • /
    • 2008
  • Existing web server lowers the whole capacity of system because of the problem on the processing load of server by closing connection increasing code handshake operation, and remarkable decrease of server capacity if it is the state of overload. Also, there occurs disadvantages of increasing connection tine about client's request and response time because handling of client's multi-requests is not smooth because of thread block and it requests a lot of time and resources for revitalization of thread. Therefore, this paper proposes the extended web server which provides the technique for delay handling and improves the overload of server for better system capacity, communication support, and the unification which is the advantage of web service. And it evaluates the existing system(implemented at Tomcat 5.5) and the proposed mobile web server architecture. The extended server architecture provides excellent exchange condition for system capacity and evaluates improved web server architecture which combines multi-thread with thread pool. The proposed web service architecture in this paper got the better result of improved capacity benefit than the evaluation result of original Tomcat 5.5.

A study on the radio protocol for ALE of digital communications in HF band (HF대 디지털통신의 ALE를 위한 무선프로토콜 연구)

  • Go, Yun-Gyu;Choi, Jo-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.811-814
    • /
    • 2009
  • The HF band maritime communication is have developing to digital methode that techniques should be readied the automatic link establishment of 1:N by coast station to many ship station. Because can use way by polling simply that communication environment calls particular station wicked fellow HF communication states which is much redundancy times for coast station to set link. In amateur radio particular station selective calling do to be using ALE(Automatic Link Establishment) controller by 1:1 automatic link setting way, but expect 1:N link setting by these way in maritime communication very difficult. That is difficult to avoid collision by traffic overload to induce calling of ship stations. Because HF communication considers channel special quality traffic state radio link should be established, and should be applied automatically secures stability of channel as accommodative at traffic overload. In this paper is studied the new radio protocol by 3 step sequency driving of free access, group free access and polling access using multi-tone in single channel.

  • PDF

The moderating effect of mindfulness on the relationship between job stressors and innovative behaviors

  • Kwon-Su Kim;Jae-Won Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.9
    • /
    • pp.207-216
    • /
    • 2024
  • The purpose of this study was to determine the relationship between job stressors (role conflict, role ambiguity, and role overload), innovation behavior, and mindfulness in organizational employees and to examine the moderating effect of mindfulness on the relationship between job stressors and innovation behavior. For this purpose, data were collected and analyzed through a structured questionnaire from 337 employees of companies and organizations. The results of the study showed that job stress has a negative effect (-) on innovation behavior and mindfulness has a positive effect (+) on innovation behavior. Mindfulness was found to play a moderating role in the relationship between job stress and innovation behavior. Therefore, mindfulness is identified as an individual resource and competency that can mitigate job stress and promote innovative behavior, and organizations should provide training to harness and enhance mindfulness to control job stress and increase innovative behavior.

The Personal Information Management Practices of the Graduates of the Department of Information Studies at Kuwait University

  • AlRukaibani, Bashaer;Chaudhry, Abdus Sattar
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.1
    • /
    • pp.19-42
    • /
    • 2019
  • This study examined activities involving the finding, organizing, managing, and re-finding of information by knowledge workers in Kuwait. This research also conducted a review of the tools needed for effective personal information management (PIM) and assessed perceptions about improving PIM through Internet use. Data were collected through semi-structured interviews conducted among 26 graduates of the Department of Information Studies at Kuwait University. These participants are currently employed in different sectors engaged in a variety of information-related activities. This study's findings indicated that participants gathered different types of information from a variety of sources. This information was stored using several devices and services, including desktop computers, shared drives, clouds, bookmarked websites, e-mail correspondence, and favorites lists. Participants organized information in personal folders according to categories such as subject/topic, time, project, document type, and geographical region. Preferred methods for information re-finding included searching by keyword and browsing through folders. Interviewees reported problems of information overload, fragmentation, and anxiety. Most were active in social media via mobile device, while some of them used Siri or Ask Google to retrieve information. Tools used for PIM included calendars, tasks, schedules, e-mail management tools, clouds, and social networking tools. Participants reported that the Internet helped with personal information management practices, but that some privacy issues arose in this context.

A Study on the Efficiency of the EPCIS using Simulation (시뮬레이션을 이용한 EPCIS의 효율화 방안에 관한 연구)

  • Li, Zhong-Shi;Lee, Chang-Ho
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2010.11a
    • /
    • pp.349-355
    • /
    • 2010
  • EPCIS(EPC Information Services) system is a core component of EPCglobal Architecture Framework offering information of the freights, the time of awareness and the location of awareness on the EPCglobal Network. The role of EPCIS is to exchange information based on EPC. There are four kinds of event data which are object event data, aggregation event data, quantity event data, and transaction event data. These EPCIS events data are stored and managed in EPCIS repository. This paper leads to separate a in-out data overload of integrated EPCIS event and suggests the method to effectively manage EPCIS repository for exchanging data smoothly. In order to verify a effectiveness, we measure the performance of the system using a simple testing simulation by comparing existing method and suggested method.

  • PDF

Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms

  • Gunes, Ihsan;Bilge, Alper;Polat, Huseyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1272-1290
    • /
    • 2013
  • Privacy-preserving collaborative filtering schemes are becoming increasingly popular because they handle the information overload problem without jeopardizing privacy. However, they may be susceptible to shilling or profile injection attacks, similar to traditional recommender systems without privacy measures. Although researchers have proposed various privacy-preserving recommendation frameworks, it has not been shown that such schemes are resistant to profile injection attacks. In this study, we investigate two memory-based privacy-preserving collaborative filtering algorithms and analyze their robustness against several shilling attack strategies. We first design and apply formerly proposed shilling attack techniques to privately collected databases. We analyze their effectiveness in manipulating predicted recommendations by experimenting on real data-based benchmark data sets. We show that it is still possible to manipulate the predictions significantly on databases consisting of masked preferences even though a few of the attack strategies are not effective in a privacy-preserving environment.

A study on a Preventive measure of traffic congestion in building security system (빌딩 출입 보안 시스템의 정보폭주 방지방법에 관한 연구)

  • 서창옥;김계국
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.71-77
    • /
    • 2004
  • In general, security server controls information of people who usually come to building. In order to exit and entrance, while they bring Identification card into contact with card reader, server admits them into building after asks whether their informations are or not in database. However if many People want to exit and entrance in all direction. it may give rise to a serious traffic congestion. Therefore the delay is due to server's overload. In this paper, we suggested IZA(Identification Zone Algorithm) in order to prevent of traffic congestion.

  • PDF

User-centered multimedia design: The application of discount usability engineering (사용자 중심의 멀티미디어 설계: 할인 사용성 공학의 적용)

  • 임치환
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.41
    • /
    • pp.189-196
    • /
    • 1997
  • Multimedia systems present information by various media, for example, video, sound, music, animation, movie, etc., in addition to the text which has long been used for conveying the information. But using several media may cause users' confusion and poorly designed user interface often aggravate the situation. Hypermedia systems allow the retrieval and representation of multimedia information using navigation and browsing mechanisms. Typically, there are two major navigation problems in a hypermedia compared to the ordinary user interface: disorientation and cognitive overload. In this study, the multimedia system was studied from the viewpoint of usability. Practical usability evaluation needs cost-effective, low-skill, and low- investment methods. The 'discount usability engineering' method, one of these methods, is based on the use of the following techniques: scenarios, simplified thinking aloud, and heuristic evaluation. The discount usability engineering method was applied to the usability evaluation of multimedia CD-ROM title.

  • PDF

Topic Modeling-based Book Recommendations Considering Online Purchase Behavior (온라인 구매 행태를 고려한 토픽 모델링 기반 도서 추천)

  • Jung, Youngjin;Cho, Yoonho
    • Knowledge Management Research
    • /
    • v.18 no.4
    • /
    • pp.97-118
    • /
    • 2017
  • Thanks to the development of social media, general users become information and knowledge providers. But customers also feel difficulty to decide their purchases due to numerous information. Although recommender systems are trying to solve these information/knowledge overload problem, it may be asked whether they can honestly reflect customers' preferences. Especially, customers in book market consider contents of a book, recency, and price when they make a purchase. Therefore, in this study, we propose a methodology which can reflect these characteristics based on topic modeling and provide proper recommendations to customers in book market. Through experiments, our methodology shows higher performance than traditional collaborative filtering systems. Therefore, we expect that our book recommender system contributes the development of recommender systems studies and positively affect the customer satisfaction and management.

Tag-Based Collaborative Filtering Approach Using Analysis of the Correlation Between User's Preference and Tags (사용자 선호도와 태그 간 상관도 분석을 통한 태그 기반 협력적 필터링 기법)

  • Lee, Gyeong-Jong;Gong, Gi-Hyun;Lee, Sang-Gu
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.72-77
    • /
    • 2007
  • 웹의 성장에 따른 기하급수적인 정보의 축적으로 인한 정보과다(Information Overload) 현상의 심화를 해결하기 위해 이루어져 온 많은 연구 중 하나인 추천 시스템은 사용자에게 고수준의 편의성을 제공하기 위한 시스템으로써 발전해 왔다. 그러나 과거에 고도로 집중화되어 관리, 구축되어 오던 정보와는 달리 Web2.0라는 새로운 웹 환경의 도래와 함께 태그, 블로그 등 새로운 형태와 특성을 가지는 점보들이 등장하게 되었다. 웹의 컨텐츠에 대한 메타정보를 사용자가 직접 입력한 Web2.0 기반의 태그 데이터론 활용해서 추천 시스템의 성능을 향상시킬 수 있는 기법을 연구하였다. 추천 기법 중 가장 대표적이고 기초적인 협업 필터링 기법에 태그를 활용하며 태그에 사용자에 대한 중요도를 감안한 가중치 부여 기법에 연구한다. 유사한 성향을 가진 사용자를 식별하는데 있어 태그 집합간의 유사도를 비교하는 방법을 사용하며 사용자의 성향을 반영하기 위해서 태그와 사용자의 선호도 정수와의 연관성을 분석해서 이를 태그의 가중치로 환산하는 기법을 제안한다.

  • PDF