• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.038 seconds

Interoperation among WfMSs using Wf-XML HTTP binding (Wf-XML HTTP 바인딩을 이용한 WfMS 간의 연동)

  • Kwak, Myung-Jae;Shim, Jae-Yong;Han, Dong-Soo
    • Annual Conference of KIPS
    • /
    • 2000.10b
    • /
    • pp.1353-1356
    • /
    • 2000
  • 최근 B2B 시스템 통합 및 전략적 제휴가 시장을 변화시키고 있고 관련 기업들의 효율적인 연계요구가 증가됨에 따라 기업간 시스템들의 연동이 중요한 문제로 부각되고 있다. 워크플로우 표준화 단체인 WfMC 에서도 이러한 문제 해결의 일환으로 인터넷을 통한 워크플로우 관리 시스템간 연동을 위한 표준인 Wf-XML Interoperability standard 를 발표하였다. 본 논문은 Wf-XML 표준 및 관련 연구들을 조사하고 WfMC 표준에는 정의되어 있지 않으나 시스템간의 신뢰성있는 연동을 위해 고려할 사항 중에서 동기적 및 비동기적 상호연동을 위한 요구사항들을 분석한다. TCP/IP 를 기반으로 한 HTTP 프로토콜을 전송 프로토콜로 채택하는 경우 여러 오퍼레이션들을 일괄처리하기 위해서는 비동기적인 상호연동(asynchronous interoperation)을 위한 별도의 메커니즘이 필요하다. 본 연구에서는 Wf-XML 문서를 HTTP 프로토콜을 사용하여 전송하는 경우 일괄처리요청(batch request) 및 그 밖의 동기적 또는 비동기적 요청들을 처리하기 위한 상호연동 모델을 분석하고 분산 워크플로우 시스템의 일종인 ICU/COWS에서의 적용방안에 관해서 논의한다.

  • PDF

Improved at Adaptive Handoff Mechanism for the mobile hosts (휴대용 무선단말기에서 개선된 적응적 핸드오프 기법)

  • Na Geun-Woo;Lee Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.505-509
    • /
    • 2006
  • Recently, wireless Internet service has become generalized, and required the user authentication of a mobile hosts and QoS. However, time required for user authentication during handoff Processes between a wireless LAN system and mobile hosts is long, and is unsuitable for real-time communication and multimedia applications. In this paper. we improved the existing system in order to reduce a lead time of user authentication as they extended a Fast Inter-AP handoff. We use a Mechanism to assume a confidence degree with bases by the time that stayed at individual wireless LAN systems in order to reduce the handoffs. The experiment network shows that it decreases communication load, and improves communication QoS.

  • PDF

Performance Enhancement of ECC Algorithm-based Mobile Web Service System (ECC 알고리즘 기반 모바일 웹 서비스 시스템의 성능 향상)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.699-704
    • /
    • 2008
  • By the dependence on Web from popularization of internet and increasing number of users, web services capability and security problem of communication is becoming a great issue. Existing web services technology decrease the capability of web application server by limiting the number of synchronous client, decreasing the processing load and increasing average response time. The encryption process to secure communication and the early expense of handshake decrease transmission speed and server capability by increasing the calculation time for connecting. Accordingly, this paper executes an encryption procedure by elliptical encryption algorithm to satisfy secure demands, improve the overload of server for web services and get reliability and security of web server architecture and proposes an improved mobile web sever which provides better ability and the techniques for deferred processing.

An Empirical Study on the Determinants of Trust in Internet Shopping Mall : The Comparison of Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 실증연구 : 한.중국 이용자 비교 분석)

  • Jung, Chul-Ho;Chung, Young-Soo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.437-462
    • /
    • 2006
  • The objective of this study is to investigate what factors influence a major role in building trust on Internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on relevant literature review, this study posits six factors of transaction security, perceived reputation, Perceived size, interactivity, propensity of trust, and familiarity as key determinants of trust in internet shopping mall. Analysis of 470 responses(Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following; First, in terms of the relationship between influencing factors and the trust, five factors of transaction security, perceived reputation, perceived size, interactivity, and propensity to trust have a significant positive effects on the trust. Second, the differences between Korean and Chinese users are transaction security, perceived size, and familiarity. In conclusions, we suggested the factors to create user trust in internet shopping mall. Also we suggested differences in the determinant factors between Korean and Chinese users, and discussed some policies to build the trust in each user types.

  • PDF

A Review of the Methodology for Sophisticated Data Classification (정교한 데이터 분류를 위한 방법론의 고찰)

  • Kim, Seung Jae;Kim, Sung Hwan
    • Journal of Integrative Natural Science
    • /
    • v.14 no.1
    • /
    • pp.27-34
    • /
    • 2021
  • 전 세계적으로 인공지능(AI)을 구현하려는 움직임이 많아지고 있다. AI구현에서는 많은 양의 데이터, 목적에 맞는 데이터의 분류 등 데이터의 중요성을 뺄 수 없다. 이러한 데이터를 생성하고 가공하는 기술에는 사물인터넷(IOT)과 빅데이터(Big-data) 분석이 있으며 4차 산업을 이끌어 가는 원동력이라 할 수 있다. 또한 이러한 기술은 국가와 개인 차원에서 많이 활용되고 있으며, 특히나 특정분야에 집결되는 데이터를 기준으로 빅데이터 분석에 활용함으로써 새로운 모델을 발견하고, 그 모델로 새로운 값을 추론하고 예측함으로써 미래비전을 제시하려는 시도가 많아지고 있는 추세이다. 데이터 분석을 통한 결론은 데이터가 가지고 있는 정보의 정확성에 따라 많은 변화를 가져올 수 있으며, 그 변화에 따라 잘못된 결과를 발생시킬 수도 있다. 이렇듯 데이터의 분석은 데이터가 가지는 정보 또는 분석 목적에 맞는 데이터 분류가 매우 중요하다는 것을 알 수 있다. 또한 빅데이터 분석결과 통계량의 신뢰성과 정교함을 얻기 위해서는 각 변수의 의미와 변수들 간의 상관관계, 다중공선성 등을 고려하여 분석해야 한다. 즉, 빅데이터 분석에 앞서 분석목적에 맞도록 데이터의 분류가 잘 이루어지도록 해야 한다. 이에 본 고찰에서는 AI기술을 구현하는 머신러닝(machine learning, ML) 기법에 속하는 분류분석(classification analysis, CA) 중 의사결정트리(decision tree, DT)기법, 랜덤포레스트(random forest, RF)기법, 선형분류분석(linear discriminant analysis, LDA), 이차선형분류분석(quadratic discriminant analysis, QDA)을 이용하여 데이터를 분류한 후 데이터의 분류정도를 평가함으로써 데이터의 분류 분석률 향상을 위한 방안을 모색하려 한다.

Quantitative Scoring Criteria on the Importance of Software Weaknesses (소프트웨어 보안약점의 중요도에 대한 정량 평가 기준 연구)

  • Ahn, Joonseon;Bang, Ji-Ho;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1407-1417
    • /
    • 2012
  • In order to protect a software system from security attacks, it is important to remove the software security weaknesses through the entire life cycle of software development. To remove the software weaknesses more effectively, software weaknesses are prioritized and sorted continuously. In this paper, we introduce the existing scoring systems for software weakness and software vulnerability, and propose a new quantitative standard for the scoring system, which helps evaluate the importance of software weakness objectively. We also demonstrate the practicability of the proposed standard by scoring 2011 CWE/SANS Top 25 list with the proposed standard and comparing it to the original score of MITRE.

Anomalous Records Detection in Process Data Using Robust Linear Regression (로버스트 선형 회귀를 이용한 공정 데이터의 이상 기록 탐지)

  • Jung, Jin-uk;Jin, Kyo-hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.513-515
    • /
    • 2022
  • Manufacturing data collected using IoT devices in a smart factory environment is generally reliable except for noises caused by external factors. However, unlike manufacturing data that is collected mechanically, process data manually recorded by field-workers can cause problems such as the misspelled entries or the missing entries. Therefore, process data must be validated before being used as training data for artificial intelligence models. In this paper, based on the fact that which is a linear relationship between the power consumption of the MCT machine and the production of the product recorded by the field-workers, we detect anomalous records of the workers using robust linear regression.

  • PDF

A Study on the Effect of Web Site Characteristics in to Customer Performance - with the focus on the modulating effect of promotion - (웹 사이트 특성이 고객성과에 미치는 영향에 관한 연구 - 판매촉진 활동의 조절효과를 중심으로 -)

  • Hong, Sang-Jin;Rha, Dong-Kyun;Jang, Hyung-Sub
    • Management & Information Systems Review
    • /
    • v.29 no.2
    • /
    • pp.75-96
    • /
    • 2010
  • In the recent years the society has entered the stage of informatization, the base of informatization has expanded, and the internet users have exploded, which has led to revolutionary changes to all across business management of the world. The influences of customer value and satisfaction were reviewed on a web site, and their subsequent impacts on customer loyalty were suggested. It was also analyzed how the concept of sales promotion that was set as a moderating variable affected the characteristics of a web site, customer value and satisfaction, and correlations between customer value and satisfaction. Finally based on the analysis results, practical strategic alternatives were suggested. Accordingly a web site provider can't afford to ignore sales promotion just because it doesn't have modulating effect because the customers will turn to his or her competitors. It's important to make ongoing efforts into techniques of sales promotion to meet the expectations of clients.

  • PDF

A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering (자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계)

  • Kang, Heejung;Kim, Hye Ri;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.1-11
    • /
    • 2018
  • The Blockchain is a technique that prevents data from being manipulated and guarantees the integrity and reliability of the data by all participants in the network jointly owning and validating the data. Since the Blockchain characterized by security, scalability and transparency, it is used in a variety of fields including logistics, distribution, IoT and healthcare, including remittance. In particular, there is a growing interest in smart contract that can create different forms of contracts and automate implementation based on Blockchain. Smart Contract can be used to pre-programme contracts and are implemented immediately when conditions are met. As a result, digital data can be more reliable. In this paper, we are conducting a study on the smart contract design as a way to solve such problems as illegal misuse of funds on virtual currency, which has become an issue recently. Through this process, we applied the customer identification and money laundering prevention process using smart contract, and then check the possibility of preventing money laundering and propose the ASM (AML SmartContract Mechant) design.

The Sequential Effects of WebCam Wireless Moritoring Service on Customer Loyalty (웹캠 무선원격 모니터링 서비스가 고객충성도에 미치는 영향에 관한 연구)

  • Ryu, In-Soo;Chae, Myung-Sin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.51-79
    • /
    • 2009
  • Today the service industry is growing, and differentiated services for marketing and service quality is emerging as a serious problem. Until now, the WebCam is used for observation, and the negative aspects, such as from a human rights issue has become. Discipline and Punish is not to use a webcam to customer satisfaction research is needed. Therefore, wireless monitoring in WebCam service quality of the service reconfiguration and service quality factors for the configuration of the customer's preference regarding how research was recognized. Configuration of the service quality factors WebCam service customer satisfaction and customer loyalty was to identify factors that affect. These services to study the correlation between the quality variables WebCam provides wireless monitoring services for the preschool and children, a survey of the house. Configuring a wireless monitoring service quality in order to research the factors WebCam video quality and transmission speed, mobility and portability, convenience, visibility, reliability, and the interaction of the castle set. Severely and video quality and transmission speed, visibility, reliability, customer satisfaction, the interaction factors are said. Inclination to participate in social issues, innovation, digital devices that use a skilled, depending on the difference in the service quality has been confirmed. However, the age and quality of service awareness and job types showed a low correlation, and the marketing of these results will be discussed and how that can be used.

  • PDF