• Title/Summary/Keyword: quality of information

Search Result 18,738, Processing Time 0.046 seconds

A Study on Consumer Trust Building in an Internet Marketplace (인터넷 오픈마켓 거래안전 요인과 소비자신뢰의 관계 연구)

  • Lee, Ki-Heon
    • CRM연구
    • /
    • v.1 no.1
    • /
    • pp.23-48
    • /
    • 2006
  • Internet B2C marketplace such as 'Auction', 'G Market', 'Daum onket' etc.(called open market) has grown sharply in sales about yearly 100% rate increase in recent 1-2 years in Korea. Although Open marketplace has much reputation and the customer loyalty, almost of merchants participated in open market, which size in sales are medium/small, has poor reputation and trust. Consumers, who have to get in touch with untrustworthy merchants for trade in openmarket, perceive high trade risk which undergo the monetary damages such as 'merchandise never received'. This examines what factors consumer trust develop in online marketplace. This study explores several perceived risk factors in an open market by factor analysis and multi-regression to prove the relationships between the degree of trust for the merchants and the perceived trade risk. 133 data collected from the open market user data in this survey. In this study, the consumer's trade satisfaction in open market is low by 4.2 point degree of 7 point likert scale. and perceives 4 trade risk factors such as (1) 'failure to honor warranty or guarantee' (2) 'defective/poor goods in quality' (3) 'merchandise never received or received late' (4) 'poor information'. the degree of merchant's trust has significant relationship with the degree of perceived risk(sig. = 0.0000, $R^2=.327$) We find that the open market has to enhance the relationship marketing of trust by developing the strategies.

  • PDF

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

P2P Streaming Method for QoS-sensitive Multimedia Multicast Applications (QoS에 민감한 멀티미디어 멀티캐스트 응용을 위한 P2P 스트리밍 기법)

  • Park, Seung-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.68-78
    • /
    • 2010
  • As the IP multicast function is very slowly deployed in Internet due to its scalability problem and inter-domain interoperability problem, interest in the P2P(Peer-to-Peer) streaming technologies for the realtime multimedia multicast applications such as IPTV is highly growing. This paper proposes a P2P streaming method for the QoS-sensitive multimedia multicast applications such as highly-interactive personal IPTV and video conferences. The proposed P2P streaming method allows an application to construct a reliable streaming tree in which a proper number of backup peers are placed according to its reliability requirement. The reliable streaming tree reduces the reconnection delay, occurred in the case of a normal and/or abnormal peer leave, so as to minimize the loss of streaming data. In the proposed P2P streaming method, the join delay of a peer called startup delay is also substantially reduced because the bandwidth and end-to-end delay information of every peer kept in a distributed way allows the target peer for a joining peer to be able to be quickly determined. Moreover, the proposed method's peer admission control mechanism based on the bandwidth and end-to-end delay enables the delay-bounded streaming services to be provided for its corresponding applications.

Effects of Shading and Organic Matter Applications on Growth and Aromatic Constituents of Codonopsis lanceolata (차광과 유기물 시용이 더덕의 생육 및 향기성분에 미치는 영향)

  • 이승필;김상국;남명숙;최부술;이상철
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.41 no.4
    • /
    • pp.496-504
    • /
    • 1996
  • The study was conducted to obtain the basic information on increasing aromatic degrees by shading and organic matter application on Condonopsis lanceolata. The result were as followings : Fresh root wt. in shading 55 % treatment was increased about twices, whereas fresh root weight in non-shading was decreased. But growth of ground parts such as vine length, leaf width, and leaf number was promoted under non-shading treatment. Macroelements such as K, Ca, and Mg, were increased in non-shading and higher organic matter application. The components such as crude protein, fiber, and ash were increased in the shading 55% treatment compared with non-shading. In the sixteen amino acids, arginine contents were the highest in non-shading and organic matter 30M/T. Recovery yield of essential oil was 0.005% in non-shading. The highest was organic matter 30M/T in the non-shading as 0.007%. Major aromatic constituents were 11 kinds of aliphatic alcohols such as I-hexanol, cis-3-hexenol, and trans-2-hexanal. As a result, major aromatic degree was higher in shading 55%, also increased in the much organic matter application. It was considered to be applied dense shading 55% and much organic matters to produce Condonopsis lanceolata plants which have high aroma and good quality.

  • PDF

Nursing Needs for Elderly Patients with Regional Anesthesia during Operation (부위마취 수술 노인환자의 수술 중 간호요구)

  • Eom, Hea-Kyoung;Ko, Sung-Hee;Lee, Young-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.351-360
    • /
    • 2016
  • Purpose: The purpose of this study was to identify the nursing needs of elderly patients who got a surgical operation under regional anesthesia(spinal, epidural, nerve block). Methods: The participants were 126 elderly patients who completed a questionnaire. The data were collected October 1 and October 31, 2012, and analyzed using descriptive statistics, t-test and ANOVA, $Scheff{\acute{e}}$ test. Results: The mean score for the nursing needs of elderly patients administered regional anesthesia during surgery was $3.08{\pm}0.38$, The scores for specific nursing needs were as follows: educational needs ($3.47{\pm}0.50$), spiritual needs ($3.37{\pm}0.78$), physical needs ($3.31{\pm}0.46$), emotional needs ($2.72{\pm}0.50$), and environmental needs ($2.51{\pm}0.47$). There were significant differences in nursing needs relative to gender, religion, and spouse status. Additionally, there were significant differences in nursing needs according to surgery department, the length of time the surgery, and the ASA(American Society of Anesthesiologists) physical classification. of the operation-related characteristics. Conclusion: When caring for elderly patients during the surgery, nurses must provide adequate information about the surgery and anesthesia. Further studies are needed to develop and evaluate nursing interventions to provide quality surgical care for the elderly patients.

Example-based Super Resolution Text Image Reconstruction Using Image Observation Model (영상 관찰 모델을 이용한 예제기반 초해상도 텍스트 영상 복원)

  • Park, Gyu-Ro;Kim, In-Jung
    • The KIPS Transactions:PartB
    • /
    • v.17B no.4
    • /
    • pp.295-302
    • /
    • 2010
  • Example-based super resolution(EBSR) is a method to reconstruct high-resolution images by learning patch-wise correspondence between high-resolution and low-resolution images. It can reconstruct a high-resolution from just a single low-resolution image. However, when it is applied to a text image whose font type and size are different from those of training images, it often produces lots of noise. The primary reason is that, in the patch matching step of the reconstruction process, input patches can be inappropriately matched to the high-resolution patches in the patch dictionary. In this paper, we propose a new patch matching method to overcome this problem. Using an image observation model, it preserves the correlation between the input and the output images. Therefore, it effectively suppresses spurious noise caused by inappropriately matched patches. This does not only improve the quality of the output image but also allows the system to use a huge dictionary containing a variety of font types and sizes, which significantly improves the adaptability to variation in font type and size. In experiments, the proposed method outperformed conventional methods in reconstruction of multi-font and multi-size images. Moreover, it improved recognition performance from 88.58% to 93.54%, which confirms the practical effect of the proposed method on recognition performance.

Adolescents' Purchasing Behavior for Hair-care Products (청소년의 헤어제품 구매 행동에 관한 연구)

  • Song, Yean-Hwa;Oh, Kyung-Wha
    • Journal of Korean Home Economics Education Association
    • /
    • v.23 no.2
    • /
    • pp.1-16
    • /
    • 2011
  • This study investigates the relationship between the purchasing behavior for hair-care products and the attitude toward hair-care products by adolescents. A total of 412 middle and high school students located in Seoul and Gyunggi-do province participated in this research. SPSS 12.0 for Windows Program was utilized for statistical analysis. As a result, the hair concerns and the satisfaction of adolescents as well as their attitudes towards hair-care products were significantly affected by gender, school level, and educational experiences. Female high school students with some degree of educational experiences had a more rational and brand-oriented attitude. Students having a higher rational and brand-oriented attitude bought hair-care products in regards to the quality of the product and environmental impact. On the other hand, those having a conspicuous and fashion pursuit attitude showed an image and fashion concern purchasing behavior. Adolescents usually purchased styling and dyeing products at a cosmetic specialty store and hair-care cleaning products from a discount store. They obtained the information about hair-care products from relatives, personal experiences, and TV advertisements.

  • PDF

Multi-classifier Decision-level Fusion for Face Recognition (다중 분류기의 판정단계 융합에 의한 얼굴인식)

  • Yeom, Seok-Won
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.4
    • /
    • pp.77-84
    • /
    • 2012
  • Face classification has wide applications in intelligent video surveillance, content retrieval, robot vision, and human-machine interface. Pose and expression changes, and arbitrary illumination are typical problems for face recognition. When the face is captured at a distance, the image quality is often degraded by blurring and noise corruption. This paper investigates the efficacy of multi-classifier decision level fusion for face classification based on the photon-counting linear discriminant analysis with two different cost functions: Euclidean distance and negative normalized correlation. Decision level fusion comprises three stages: cost normalization, cost validation, and fusion rules. First, the costs are normalized into the uniform range and then, candidate costs are selected during validation. Three fusion rules are employed: minimum, average, and majority-voting rules. In the experiments, unfocusing and motion blurs are rendered to simulate the effects of the long distance environments. It will be shown that the decision-level fusion scheme provides better results than the single classifier.

Dynamic Distributed Adaptation Framework for Quality Assurance of Web Service in Mobile Environment (모바일 환경에서 웹 서비스 품질보장을 위한 동적 분산적응 프레임워크)

  • Lee, Seung-Hwa;Cho, Jae-Woo;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.839-846
    • /
    • 2006
  • Context-aware adaptive service for overcoming the limitations of wireless devices and maintaining adequate service levels in changing environments is becoming an important issue. However, most existing studies concentrate on an adaptation module on the client, proxy, or server. These existing studies thus suffer from the problem of having the workload concentrated on a single system when the number of users increases md, and as a result, increases the response time to a user's request. Therefore, in this paper the adaptation module is dispersed and arranged over the client, proxy, and server. The module monitors the contort of the system and creates a proposition as to the dispersed adaptation system in which the most adequate system for conducting operations. Through this method faster adaptation work will be made possible even when the numbers of users increase, and more stable system operation is made possible as the workload is divided. In order to evaluate the proposed system, a prototype is constructed and dispersed operations are tested using multimedia based learning content, simulating server overload and compared the response times and system stability with the existing server based adaptation method. The effectiveness of the system is confirmed through this results.

A Method to Manage Requirements Analyzing the Commonality and Variability in Product Line (프로덕트 라인에서 공통성과 가변성 분석을 통한 요구사항 관리방법)

  • Park, Dong-Su;Kim, Dong-Kyu;Chong, Ki-Won
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.909-922
    • /
    • 2006
  • The core assets include all properties which consist of an application in Product Line Engineering. The requirement, one of the core assets, is a basis of other core assets and commonality and variability of other core assets are classified by the requirement. accordingly, commonality and variability of the domain requirement should be managed objectively and it is necessary to make a process to reuse the domain requirements. However the requirement is analyzed by domain experts or developers without proper process. In this paper, we proposed the 4 activities: (1)the domain scoping, (2)the extraction and generalization of the domain requirement, (3)the domain requirement analyzing and modeling, (4)the change management, and sub activities. For all reasons given previously, it is possible to reduce the development time and cost by reusing the architectures and components related to the domain requirement. In addition, it is possible to increase the quality of the artifacts produced based on the requirements by managing them systematically.