• Title/Summary/Keyword: Access Networking

Search Result 303, Processing Time 0.025 seconds

Facebook Fatigue: Narcissism, Reputation Concern, and Expectation of Others' Responses (페이스북 피로감에 대한 연구: 자기애, 평판근심, 반응기대를 중심으로)

  • Lee, Jongmin;Lee, Jihye;Sung, Yongjun
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.3
    • /
    • pp.35-42
    • /
    • 2018
  • Social Networking Sites (hereafter SNSs) have become a part of people's daily routines. Beginning as a hobby/communicating tool for a specific group of people, SNSs have expanded in terms of the number of users, frequency of access, and depth and range of sharing. It is recently reported that the users experience SNS fatigue from being connected at all time. However, limited research has addressed this issue. The purpose of the present study was to examine the mediating role of reputational concern and expectation of others' responses on the relationship between narcissism and Facebook fatigue. A total of 329 Facebook users completed an online survey. The results showed that individuals who rated high on narcissism experienced a high level of Facebook fatigue, and that both reputational concern and expectation of others' responses partially mediated the relationship between narcissism and fatigue. Implications of the findings and suggestions for future research are discussed.

  • PDF

A Sutdy on the Multiple Access Protocol and Middleware Algorithm USN Foundation (USN기반 다중접속 프로토콜 및 미들웨어에 적합한 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1A
    • /
    • pp.67-73
    • /
    • 2008
  • Our research is aimed at developing an architectural frame-work of USN sensor network discovery service systems. The research is fo-cused on the four areas a survey of USN technology, development of a USN software model, development of the design space of the USN sensor network discovery service, and finally the architectural framework of the USN sensor network dicovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology, USN networking technology, and USN middleware along with the service platform, With respect to each technological division, domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research output To provide a means to analyze sensor network discovery services, we devel-oped the design space of the sensor network discovery services by exploring the scalability with respect to query scope, lookup performance, and resolution network.

ElggSpace: Extension of Elgg SNS for Supporting Collaborative Workspace (ElggSpace: 협업 워크스페이스를 지원하는 Elgg SNS의 확장)

  • Cha, Won-Jun;Park, Jongmoon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.631-637
    • /
    • 2014
  • Recently, SNS is widely used for various purposes such as fast decision making or effective business process in educational institutions or enterprise as well as general services for social networking. Unfortunately, all of existing general SNS platforms do not provide user groups with workspaces for sharing information in a hierarchical way, nor support the functionality of workspace backup for migrations. In this paper, we present a collaborative workspace environment named ElggSpace which extends the Elgg SNS platform with the C3ware collaborative middleware. With the help of C3ware, ElggSpace systematically supports collaborative workspaces that enable user groups to share massive resource in cloud storages. In addition, ElggSpace allows high-level access controls for resources management and the functionality of resource backup, supporting effective collaboration.

A Patching-Based VOD System supporting VCR Operations (VCR 동작을 지원하는 패칭 기반의 주문형 비디오 시스템)

  • 조창식;마평수;이기호;강지훈
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.9-16
    • /
    • 2003
  • In this paper, we propose a method for supporting VCR operations in a patching based multicast VOD system. Random access, pause and resume operations are supported in our system, and the channel and session scheduling algorithms for the VCR operations are proposed. When it is necessary to join a sharable multicast channel in the admission control for the VCR operations, the patching technique, which shares an on-going regular channel and allocates a new patching channel for the missing data, is used. Therefore, unlike the previous approach that allocates an excessive number of I-channels, service latency is minimized and channel usage is optimized in our system. Moreover buffered data. which is saved in disk during patching, is reused to prevent unnecessary patching channel allocation. For this. the patching management information is extended and a buffed data management scheme is proposed. In our system, the First-Come-First-Served scheduling is used to inform clients the service latency for the VCR operations immediately.

A Probabilistic Seamless Communication Method to Provide Multimedia Services in Mobile Networks (이동 네트워크에서 멀티미디어 서비스 제공을 위한 확률적 무단절 통신 방법)

  • Kim, Yoon-Jeong;Bae, Ihn-Han
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.446-453
    • /
    • 2000
  • Mobile computing refers to an emerging new computing environment incorporating both wireless and wired high-speed networking technologies. In the near future, it is expected that mobile users will have access to a wide variety of services that will be made available over highspeed networks. The quality of these services in the high-speed networks can be specified in terms of several QoS paameters. The important QoS parameter in mobile computings is the guarantee for seamless communication which is to provide disruption free service to mobile users. A disruption in service could occur due to active handoffs. This paper proposes an extended staggened muticast approach which provides a probabilistic guarantee for disruption free service. The extended staggerd multicast approach estimates mobility direction and mobility velocity for a user. It is possible that data packets for a mobile host are multicasted to not all neighbor cells but a part of neighbor cells on the basis of these information. Therefore, the extended staggered multicast significantly reduces the static network bandwidth usage also provides a probabilistic guarantee for disruption free service.

  • PDF

Study on Model Case of Ideal Digitization of Korean Ancient Books (국학고전자료의 디지털화를 위한 모범적인 방안 연구)

  • Lee, Hee-Jae
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.1 s.55
    • /
    • pp.105-123
    • /
    • 2005
  • The most of all, this study is planned to search an ideal methods to develop the digital library system for our korean ancient books for their safe preservation and, at the same time, for their perusal of transcendental time and space : first. to offer the various access points like traditional oriental Four parts Classics classification, current subject classification and index keyword, etc. : second, to program a digital library system using MARC or XML, but with all bibliographic descriptive elements as possible; third, to prepare the more easy annotated bibliography and index for users' better comprehension, and last, to build original text database for practical reading to avoid the damage of original text. This type of korean ancient books digital library will be developed to the real international bibliographic control by networking enter the same kinds of internal and external organizations.

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

A Selection Method of Reference Access Points to Improve the Localization Accuracy in Indoor Environments (실내 환경에서 측위 정확도 향상을 위한 기준 AP 선택 기법)

  • Lim, Yu-Jin;Park, Jae-Sung
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.489-493
    • /
    • 2010
  • In an indoor localization method taking the lateration-based approach, the distance between a target and an AP (Anchor Point) is estimated using RSS (Received Signal Strength) measurements. Since the characteristics of a radio signal randomly vary in time and space, errors are unavoidable in distance estimation with measured RSS. Since the accuracy of distance estimation affects the localization accuracy of a lateration-based method, additional APs hearing a target have been used for localization in the literature. However, lots of experimental results show that the accuracy of a lateration-based method is improved by using carefully selected APs measuring the high quality RSSs which the distances estimated is close to the actual distances between nodes as reference APs, not using merely more APs. In this paper, we focus on selection method of reference AP and distance estimation method reflecting on environmental dynamics. We validate our method by implementing an indoor localization system and evaluating the accuracy of our method in the various experimental environments.

Adaptive Route Optimization for Proxy Mobile IPv6 Networks (Proxy Mobile Ipv6 네트워크에서의 적응적 경로 최적화)

  • Kim, Min-Gi;Lee, Su-Kyoung
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.204-211
    • /
    • 2009
  • Proxy Mobile IPv6(PMIPv6) is that network-based mobility management protocol that network supports mobile node's mobility on behalf of the Mobile Node(MN). In PMIPv6 network, data packets from a Correspondent Node(CN) to a MN will always traverse the MN's Local Mobility Anchor(LMA). Even though, CN and MN might be located close to each other or within the same PMIPv6 domain. To solve this problem, several PMIPv6 Route Optimization(RO) schemes have been proposed. However, these RO schemes may result in a high signaling cost when MN moves frequently between MAGs. For this reason, we propose an adaptive route optimization(ARO) scheme. We analyze the performance of the ARO. Analytical results indicate that the ARO outperforms previous schemes in terms of signaling overhead.

A Fair MAC Algorithm under Capture Effect in IEEE 802.11 DCF -based WLANs (IEEE 802.11 무선랜에서 캡쳐 효과를 고려한 Fair MAC 알고리즘)

  • Jeong, Ji-Woong;Choi, Sun-Woong;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.386-395
    • /
    • 2010
  • Widespread deployment of infrastructure WLANs has made Wi-Fi an integral part of today's Internet access technology. Despite its crucial role in affecting end-to-end performance, past research has focused on MAC protocol enhancement, analysis, and simulation-based performance evaluation without sufficiently considering a misbehavior stemming from capture effect. It is well known that the capture effect occurs frequently in wireless environment and incurs throughput unfairness between nodes. In this paper, we propose a novel Fair MAC algorithm which achieves fairness even under physically unfair environment. While satisfying the fairness, the proposed algorithm maximizes the system throughput. Extensive simulation results show that the proposed Fair MAC algorithm substantially improves fairness without throughput reduction.