• Title/Summary/Keyword: personal network

Search Result 1,440, Processing Time 0.031 seconds

Worst-case Guaranteed Scheduling Algorithm for HR-WPAN (HR-WPAN을 위한 Worst-case Guaranteed Scheduling Algorithm)

  • Kim, Je-Min;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.270-276
    • /
    • 2007
  • The proposed LDS(Link-status Dependent Scheduling) algorithm in HR-WPAN(High Rate-Wireless Personal Area Network) up to now aims at doing only throughput elevation of the whole network, when the crucial device is connected with worst-link relatively, throughput of this device becomes aggravation. The proposed the WGS(Worst-case Guaranteed Scheduling) algorithm in this paper guarantees throughput of the device which is connected with worst-link in a certain degree as maintaining throughput of all devices identically even if a link-status changes, decreases delay of the whole network more than current LDS algorithm. Therefore proposed WGS algorithm in this paper will be useful in case of guaranteeing throughput of a device which is connected worst-link in a certain degree in a design of HR-WPAN hereafter.

A Design of Voice Over Sensor Network (VoSN) Base Station with Multi-Channel Support (다중 채널을 지원하는 Voice over Sensor Network(VoSN) Base Station 설계)

  • Lee, Hoon Jae;Lee, Jae Hyoung;Kang, Min Soo;Cho, Sung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.90-96
    • /
    • 2014
  • IEEE802.15.4 that is a standard for sensor networks is mainly used the wireless personal area networks such as ZigBee networks and it features low-power, low-speed data communication. However, recently research for interworking sensor network based voice communication and Session Initiation Protocol (SIP) for long-range, multi-user support has been actively conducted. In this paper, we designed a integrated base station based existing systems for interworking sensor networks based voice communication and SIP. We measured number of packet and delay according to increase the number of users to evaluate the performance of designed Base Station.

Information Protection against The Hacker's Attack of Ubiquitous Home Networks (해커의 유비쿼터스 홈 네트워크 공격에 대한 정보보호 기술)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.145-154
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at this paper, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS. DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding against the Hacker's attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

An Empirical Study about Internet and Social Network Security Behavior of End User (최종사용자의 인터넷과 소셜 네트워크 보안 행동에 대한 실증 연구)

  • Park, Kyung-Ah;Lee, Dae-Yong;Koo, Chul-Mo
    • The Journal of Information Systems
    • /
    • v.21 no.4
    • /
    • pp.1-29
    • /
    • 2012
  • The purpose of this study was to find about personal information security of internet and social networks by focusing on end users. User competence and subjective criterion, which are the antecedents, are affecting security behaviors For these security behaviors, the study examined the relationship between security behavior intention on internet use and security behavior intention about social network that is actively achieved in many fields. Behaviors of internet and social network were classified into an action of executing security and an action of using a security technology. In addition, this study investigated a theory about motivational factors of personal intention on a certain behavior based on theory of reasoned action in order to achieve the purpose of this study. A survey was conducted on 224 general individual users through online and offline, and the collected data was analyzed with SPSS 12.0 and SmartPLS 2.0 to verify demographic characteristics of respondents, exploratory factor analysis, and suitability of a study model. Interesting results were shown that security behavior intention of social network is not significant in all security behavior execution, which is security performance behavior, and security technology use. Internet security behavior is significant to security technology use but it does not have an effect on behavior execution.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

Factors Influencing Users' Word-of-Mouth Intention Regarding Mobile Apps : An Empirical Study

  • Chen, Yao;Shang, Yu-Fei
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.1
    • /
    • pp.51-65
    • /
    • 2018
  • Purpose - This paper aims to identify factors that influence the users' word-of-mouth intention (WOMI) regarding mobile apps, focussing on the impacts of technology acceptance model (TAM) and social network theory. Research design, data and methodology - Based on TAM, this study integrates social network theory into the research model. The 317 sets of data collected in a survey were tested against the model using SmartPLS. Results - Our findings suggest the following: 1) Personal innovativeness positively influences perceived usefulness (PU), perceived ease of use (PEU) and perceived enjoyment (PE); 2) PEU affects PU and PE; 3) Both PU and Satisfaction are directly correlated with WOMI. Although PEU and PE has no direct impact on WOMI, they may indirectly affect WOMI via Satisfaction, as PU, PEU and PE all positively influence satisfaction; 4) Network density and network centrality both play a mediating role in the relation between PEU and WOMI. Referral Reward Program have a positive moderating effect on the relation between PU and WOMI. Conclusions - The findings of this study illustrate the traits of Apps that can promote users' WOMI, as well as the characteristics of people who are more likely to participate in the word-of-mouth process. The findings provide a theoretical basis for app developers to make word-of-mouth a marketing strategy.

Designing mobile personal assistant agent based on users' experience and their position information (위치정보 및 사용자 경험을 반영하는 모바일 PA에이전트의 설계)

  • Kang, Shin-Bong;Noh, Sang-Uk
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.99-110
    • /
    • 2011
  • Mobile environments rapidly changing and digital convergence widely employed, mobile devices including smart phones have been playing a critical role that changes users' lifestyle in the areas of entertainments, businesses and information services. The various services using mobile devices are developing to meet the personal needs of users in the mobile environments. Especially, an LBS (Location-Based Service) is combined with other services and contents such as augmented reality, mobile SNS (Social Network Service), games, and searching, which can provide convenient and useful services to mobile users. In this paper, we design and implement the prototype of mobile personal assistant (PA) agents. Our personal assistant agent helps users do some tasks by hiding the complexity of difficult tasks, performing tasks on behalf of the users, and reflecting the preferences of users. To identify user's preferences and provide personalized services, clustering and classification algorithms of data mining are applied. The clusters of the log data using clustering algorithms are made by measuring the dissimilarity between two objects based on usage patterns. The classification algorithms produce user profiles within each cluster, which make it possible for PA agents to provide users with personalized services and contents. In the experiment, we measured the classification accuracy of user model clustered using clustering algorithms. It turned out that the classification accuracy using our method was increased by 17.42%, compared with that using other clustering algorithms.

Tourism Information Contents and Text Networking (Focused on Formal Website of Jeju and Chinese Personal Blogs) (온라인 관광정보의 내용 및 텍스트 네트워크 (제주 공식 웹사이트와 중국 개인블로그를 중심으로))

  • Zhang, Lin;Yun, Hee Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.19-30
    • /
    • 2018
  • The main purposes of this study are to analyze the contents and text network of online tourism information. For this purpose, Jeju Island, one of the representative tourist destinations in South Korea is selected as a study site. And this study collects the contents of both JeJu official tourism website and Sina Weibo's personal blogs which is one of the most popular Social Network Systems in China. In addition, this study analyzes this online text information using ROST Content Mining System, one of the Chinese big data mining systems. The results of the content analysis show that the formal website of Jeju includes the nouns related to natural, geographical and physical resources, verbs related to existence of resources, and adjectives related to the beauty, cleanness and convenience of resources mainly. Meanwhile, personal blogs include the nouns of Korean-wave, food, local products, other destinations and shopping, verbs related to activity and feeling in Jeju, and adjectives related to their experiences and feeling mainly. Finally, the results of text network show that there are some strong centrality and network of online tourism information at formal website, but there are weak relationships in personal blogs. The results of this study may be able to contribute to the development of demand-based marketing strategies of tourists destination.

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

How to Understand the Digital Photography -A Cooperative Autoethnographic Study (디지털 사진행위를 어떻게 이해할 것인가? -협업적 자기민속지학 연구를 바탕으로)

  • Kim, Jiyoung;Joo, Hyoungil
    • Korean journal of communication and information
    • /
    • v.67
    • /
    • pp.62-87
    • /
    • 2014
  • The purpose of this study is to understand the social and cultural implication of the activities of taking 'selfies' and the use of Social Network Service(SNS)s through the personal story of a 20s female researcher. She analyzes her own digital photography activities based on the experience of the use of Cyworld photo albums for three years and the use of pictures in iPhone album for fifteen months. The other researcher(40s male) cooperates to answer the questions about how to understand the digital photography activities. We understand the digital photography activities including digital cameras, social network services and smart phones as acts of personal identity configuration and acts of making the personal documentary. As a result, digital photos are used more for archive purpose rather than for document purpose. Also, we found that the digital photography activities can be understood as the interactions between human and non-human actors in the perspective of Actor-Network Theory (ANT).

  • PDF