• Title/Summary/Keyword: Distributed Online

Search Result 355, Processing Time 0.023 seconds

End-to-end Delay Analysis and On-line Global Clock Synchronization Algorithm for CAN-based Distributed Control Systems (CAN 기반 분산 제어시스템의 종단 간 지연 시간 분석과 온라인 글로벌 클럭 동기화 알고리즘 개발)

  • Lee, Hee-Bae;Kim, Hong-Ryeol;Kim, Dae-Won
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.677-680
    • /
    • 2003
  • In this paper, the analysis of practical end-to-end delay in worst case is performed for distributed control system considering the implementation of the system. The control system delay is composed of the delay caused by multi-task scheduling of operating system, the delay caused by network communication, and the delay caused by the asynchronous between them. Through simulation tests based on CAN(Controller Area Network), the proposed end-to-end delay in worst case is validated. Additionally, online clock synchronization algorithm is proposed here for the control system. Through another simulation test, the online algorithm is proved to have better performance than offline one in the view of network bandwidth utilization.

  • PDF

Online Searching Behavior of Social Science Researchers' in IR Interfaces of E-journal Database Systems: A Study on JMI, JNU, and DU

  • Kumar, Shailendra;Rai, Namrata
    • Journal of Information Science Theory and Practice
    • /
    • v.1 no.4
    • /
    • pp.48-66
    • /
    • 2013
  • The aim of this study is to examine the user's online searching behavior in IR interfaces of e-journal database systems. The study is purely based on survey methods and tries to analyse the online searching behavior of respondents of social science disciplines who were doing research in three target central universities of Delhi (i.e. DU, JMI, and JNU). For measuring the responses of the respondents in IR interfaces of e-journal database systems, a total of 396 questionnaires were distributed among the students and out of all, 305 responses were used for the study. The findings of the study reveal that most of the students were not using all the facilities offered in IR interfaces of e-journal database systems for their retrieval process and also encourages menu based searches rather than command based searching.

The Influence Relationship among Consumers' Characteristics, Information Search, and Purchase Decision in On/Offline Retailing Environment (온/오프라인 유통환경에서 소비자특성, 정보탐색, 구매결정 간 영향관계에 관한 연구)

  • Chae, Jin Mie
    • Fashion & Textile Research Journal
    • /
    • v.22 no.3
    • /
    • pp.323-334
    • /
    • 2020
  • This study analyzed the effects of consumers' characteristic variables on information search and purchase decisions in a decision-making process that validated the path model in purchasing apparel products. In constructing a structural equation model using AMOS 19.0., the variables including enjoyment pursuit, price pursuit, product involvement and product risk were selected as consumers' characteristic variables affecting the stage of information search. A questionnaire was distributed to consumers over 20 years old who purchased apparel products using offline and online channels within one year; consequently, we were able to analyze 468 effective data. The results were as follows. First, the path model of this research proved to be the appropriate model explaining the effects of consumers' characteristic variables on the stage of purchase decision-making. Second, enjoyment pursuit had a significant positive influence on offline information search; in addition, price pursuit and product risk affected the online information search significantly. Product involvement affected online information search as well as offline information search. Third, the offline information search affected offline purchase and online information search affected online purchase. However, consumer's channel switching behavior between the stage of information search and the stage of purchase decision was not proven. The findings suggest that companies need to develop distribution strategies according to consumers' characteristic factors that effect consumer's purchase decision-making.

A Study on the Factors Affecting Knowledge Contribution and Knowledge Utilization in an Online Knowledge Network (온라인 지식네트워크 내에서의 지식기여 및 지식활용 활동에 영향을 미치는 요인)

  • Jung, Jae-Hwuen;Yang, Sung-Byung;Kim, Young-Gul
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.3
    • /
    • pp.1-27
    • /
    • 2009
  • Since online knowledge networks usually consist of a larger, loosely knit, and geographically distributed group of "strangers" who may not know each other very well, members may not willingly share their knowledge with others. In order to address this challenge, this study looks Into the factors that are expected to affect knowledge sharing in an online knowledge network. For empirical validation, we choose "the global network of Korean scientists and engineers (KOSEN)" as one of the best practices of online knowledge networks. By using the archival, network, and survey data, we validate two models of knowledge sharing in sequence (i.e., knowledge contribution and knowledge utilization models) and then discuss the results. The findings of this study show that individuals not only contribute but also utilize knowledge in an online knowledge network when they are structurally embedded and perceive a strong reciprocity. In the network. In addition, taking pleasure in helping is found to positively affect knowledge contribution, whereas perceiving usefulness is found to Influence knowledge utilization. Contributions of this study and future research opportunities are also discussed.

The Effect of Design Quality on Hedonic Search, Utilitarian Search and Impulse Buying in Distribution Market

  • BUDIMAN, Santi;PALUPI, Majang;HARYONO, Tulus;UDIN, Udin
    • Journal of Distribution Science
    • /
    • v.20 no.5
    • /
    • pp.49-64
    • /
    • 2022
  • Purpose: This research aims to determine the quality of online store designs that make consumers who use online market board applications have the urge to make impulse buying. This research was conducted because impulse buying is the most common buying behavior. Research design, data and methodology: This research used non-probability sampling. The sample size was 195 respondents from the distribution and service industries by applying a purposive sampling technique. The data collection technique employed a questionnaire distributed online according to predetermined criteria: mobile device users who accessed the online market board application and made at least one purchase in the last six months. The data analysis method utilized was structural equation modeling (SEM). Results: The findings revealed that usability, functionality, and sociability factors affected hedonic and utilitarian search. Furthermore, these findings proved that hedonic search affected impulse buying drives. In contrast, the utilitarian search did not affect impulse buying drives. Conclusions: The usability, functionality, and sociability factors supported hedonic and utilitarian searches. Consumer information security increased consumer confidence in an online store because it was considered to protect matters related to their privacy. The hedonic search also increased impulse buying drives. Consumers prefer to use their spare time to search through online market board applications, which provide many attractive promos.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

The Effects of Online Brand Community Members' Interactions on Values, Participation, and Brand Loyalty: The Mediating Effects of Virtual Interactivity

  • Yongsoo, HA;Alona J., GUBALANE
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.1
    • /
    • pp.1-12
    • /
    • 2023
  • Purpose: This study identified the effects of the three types of consumer interactions on the utilitarian and hedonic values experienced by community members, their degree of participation, and brand loyalty. In addition, the mediating effect of virtual interactivity between the interactions that occur within the online brand community and the value experienced by community members was also identified. Research design, data and methodology: An online survey was distributed, and the data gathered was analyzed using structural equations modeling. Results: Test results showed that product-information interaction has a positive effect on utilitarian value and interpersonal interaction has a positive effect on hedonic value. Human-computer interaction was found to have a negative effect on hedonic value and no significant effect on utilitarian value. Furthermore, it was revealed that among the three types of interactions, virtual interactivity had a mediating effect only in the relationship between human-computer interaction and hedonic value. Moreover, utilitarian values experienced by community members affected their level of participation which ultimately enhances brand loyalty. Hedonic value did not affect their level of participation within the online brand community. Conclusions: When marketers establish online brand community strategies, they must place elements that can directly help the use of brands and products.

Featured Student Profiles: An Instructional Blogging Strategy to Promote Student Interactions in Online Courses

  • LIM, Taehyeong;DENNEN, Vanessa P.
    • Educational Technology International
    • /
    • v.23 no.1
    • /
    • pp.67-96
    • /
    • 2022
  • Although blogs have been used in online learning environments with optimistic expectations, the distributed nature of blogs can pose some challenges. Currently, we do not have a robust collection of tested blogging strategies to help students interact more effectively with each other when blogs are used as a primary form of engagement in an online class. Thus, the purpose of the study was to test an early iteration of an instructional blogging strategy, "Featured Student Profiles," which is designed to help students become acquainted with each other better and encourage them to visit and comment on each other's blogs. Sixteen pre-service teachers who were enrolled in an online course in which student blogs are the primary medium of peer interactions, participated in the study. Using a design case approach, seven students participated in interviews and all student blog interactions were analyzed. Thematic analysis was applied to analyze the interview data and identify salient themes of students' blogging experiences overall under the study strategy. The findings indicated that students took the most direct and efficient path they experienced to complete the blog task. Their peer interaction patterns varied, but several shifted from random to targeted relationships as the semester progressed. Although all students perceived the strategy as a positive approach to peer awareness, there was no clear evidence of its effect on student interactions.

Reliable blockchain-based ring signature protocol for online financial transactions

  • Jinqi Su;Lin He;Runtao Ren;Qilei Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2083-2100
    • /
    • 2023
  • The rise of Industry 5.0 has led to a smarter and more digital way of doing business, but with it comes the issue of user privacy and security. Only when privacy and security issues are addressed, will users be able to transact online with greater peace of mind. Thus, to address the security and privacy problems associated with industry blockchain technology, we propose a privacy protection scheme for online financial transactions based on verifiable ring signatures and blockchain by comparing and combining the unconditional anonymity provided by ring signatures with the high integrity provided by blockchain technology. Firstly, we present an algorithm for verifying ring signature based on distributed key generation, which can ensure the integrity of transaction data. Secondly, by using the block chain technique, we choose the proxy node to send the plaintext message into the block chain, and guarantee the security of the asset transaction. On this basis, the designed scheme is subjected to a security analysis to verify that it is completely anonymous, verifiable and unerasable. The protection of user privacy can be achieved while enabling online transactions. Finally, it is shown that the proposed method is more effective and practical than other similar solutions in performance assessment and simulation. It is proved that the scheme is a safe and efficient online financial transaction ring signature scheme.