• Title/Summary/Keyword: Information network service provider

Search Result 265, Processing Time 0.028 seconds

A study on Mobile SNS Attributes Effects on Information share, Relationship formation, and User satisfaction (모바일 SNS속성이 관계형성과 정보공유를 매개로 사용자 만족도에 미치는 영향)

  • Sim, Sun-Hee;Moon, Jae-Young
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.1
    • /
    • pp.60-72
    • /
    • 2012
  • This research conducted a survey targeting mobile SNS users in order to see whether mobile SNS attribute( accessibility, usefulness, newness, connectivity) through the medium of information share and relationship formation had a positive influence on user satisfaction. The results of the analysis showed that usefulness and accessibility had a significant influence on information share, while accessibility and connectivity had a significant influence on relationship formation. Information share and relationship formation both had a significant influence on user satisfaction. Based on this research, an angle of approach different from the business transactions and information services offered in existing mobile networks is necessary when corporations provide SNS through mobiles. When considering that the most important part in the use of mobile SNS is the social component, this can be actively used for the development and marketing of SNS services. Therefore, the SNS provider must focus its efforts on finding a method to stimulate user sensibilities in order to increase customer satisfaction and draw out continuous usage.

Context Awareness Model using the Improved Google Activity Recognition (개선된 Google Activity Recognition을 이용한 상황인지 모델)

  • Baek, Seungeun;Park, Sangwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.1
    • /
    • pp.57-64
    • /
    • 2015
  • Activity recognition technology is gaining attention because it can provide useful information follow user's situation. In research of activity recognition before smartphone's dissemination, we had to infer user's activity by using independent sensor. But now, with development of IT industry, we can infer user's activity by using inner sensor of smartphone. So, more animated research of activity recognition is being implemented now. By applying activity recognition system, we can develop service like recommending application according to user's preference or providing information of route. Some previous activity recognition systems have a defect using up too much energy, because they use GPS sensor. On the other hand, activity recognition system which Google released recently (Google Activity Recognition) needs only a few power because it use 'Network Provider' instead of GPS. Thus it is suitable to smartphone application system. But through a result from testing performance of Google Activity Recognition, we found that is difficult to getting user's exact activity because of unnecessary activity element and some wrong recognition. So, in this paper, we describe problems of Google Activity Recognition and propose AGAR(Advanced Google Activity Recognition) applied method to improve accuracy level because we need more exact activity recognition for new service based on activity recognition. Also to appraise value of AGAR, we compare performance of other activity recognition systems and ours and explain an applied possibility of AGAR by developing exemplary program.

Energy-Aware Traffic Engineering in Hybrid SDN/IP Backbone Networks

  • Wei, Yunkai;Zhang, Xiaoning;Xie, Lei;Leng, Supeng
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.559-566
    • /
    • 2016
  • Software defined network (SDN) can effectively improve the performance of traffic engineering and will be widely used in backbone networks. Therefore, new energy-saving schemes must take SDN into consideration; this action is extremely important owing to the rapidly increasing energy consumption in telecom and Internet service provider (ISP) networks. Meanwhile, the introduction of SDN in current networks must be incremental in most cases, for technical and economic reasons. During this period, operators must manage hybrid networks in which SDN and traditional protocols coexist. In this study, we investigate the energy-efficient traffic engineering problem in hybrid SDN/Internet protocol (IP) networks. First, we formulate the mathematical optimization model considering the SDN/IP hybrid routing mode. The problem is NP-hard; therefore, we propose a fast heuristic algorithm named hybrid energy-aware traffic engineering (HEATE) as a solution. In our proposed HEATE algorithm, the IP routers perform shortest-path routing by using distributed open shortest path first (OSPF) link weight optimization. The SDNs perform multipath routing with traffic-flow splitting managed by the global SDN controller. The HEATE algorithm determines the optimal setting for the OSPF link weight and the splitting ratio of SDNs. Thus, the traffic flow is aggregated onto partial links, and the underutilized links can be turned off to save energy. Based on computer simulation results, we demonstrate that our algorithm achieves a significant improvement in energy efficiency in hybrid SDN/IP networks.

A Study on Online Authenticate Themselves Techniques according to Resident Registration Number collect Prohibited (주민등록번호 수집금지에 따른 온라인 본인인증 기법 연구)

  • Son, Seung-wan;Kim, Kwang-seok;Lee, Gang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.271-274
    • /
    • 2013
  • From February 18, 2013, an information and communications service provider, we will not be able to collect the resident registration number by paragraph 2 of Article 23 of the Act on the Promotion of the use and protection of information and information network. Rather than a revision in accordance with resident registration number, than these laws, it had been used in the alternative, such as OTP authentication phone authentication I-PIN authentication of certificates that are recognized as such authentication. In this paper, we propose a new online identity authentication technology was and Utilization of IMEI, the OTP to introduce online identity authentication technology replacing the resident registration number.

  • PDF

Automatic Generation of Network Topology for Large Scale Internet Simulation (대규모 인터넷 시뮬레이션을 위한 네트워크 토폴로지 자동 생성 기법)

  • Ryu, Key-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun;Lee, Sang-Hun;Park, Eung-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1187-1190
    • /
    • 2005
  • 인터넷 토폴로지 생성 기법에 대하여 많은 연구가 진행되고 있다. 이는 인터넷 토폴로지가 라우팅, 멀티캐스트, 프로토콜 등의 성능과 사이버 테러 공격에 대한 분석 및 방어체계와 밀접한 관계가 있기 때문이다. 토폴로지를 생성하는 GT-ITM[5], INET-3.0[6] 등은 Autonomous System (AS) 노드들로 이루어진 네트워크 토폴로지를 생성한다. 즉, 이들 도구들은 AS 가 노드인 토폴로지를 생성하며, AS 내의 네트워크에 대해서는 표현하지 않는다. 이에, 본 논문에서는 대규모 네트워크의 시뮬레이션을 위한 토폴로지를 구성하는 데 필요한 PoP (Presence of Point), ISP(Internet Service Provider) 등 하위 레벨의 토폴로지를 자동 생성함으로써 네트워크 토폴로지를 표현하는 방법을 제안한다. 본 연구에서 제안하는 방법은 서로 다른 특성을 가진 하부 서브넷을 가지고 있으며 hierarchy 를 반영한 토폴로지를 생성할 수 있다는 장점을 가지고 있다.

  • PDF

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments (이동통신 환경에서 네트워크 제공자 및 제 3자로부터 안전한 위치정보 보호기법)

  • Kim, Soon-Seok;Lee, Chang-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.867-878
    • /
    • 2003
  • In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.

A User Anonymous Mutual Authentication Protocol

  • Kumari, Saru;Li, Xiong;Wu, Fan;Das, Ashok Kumar;Odelu, Vanga;Khan, Muhammad Khurram
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4508-4528
    • /
    • 2016
  • Widespread use of wireless networks has drawn attention to ascertain confidential communication and proper authentication of an entity before granting access to services over insecure channels. Recently, Truong et al. proposed a modified dynamic ID-based authentication scheme which they claimed to resist smart-card-theft attack. Nevertheless, we find that their scheme is prone to smart-card-theft attack contrary to the author's claim. Besides, anyone can impersonate the user as well as service provider server and can breach the confidentiality of communication by merely eavesdropping the login request and server's reply message from the network. We also notice that the scheme does not impart user anonymity and forward secrecy. Therefore, we present another authentication scheme keeping apart the threats encountered in the design of Truong et al.'s scheme. We also prove the security of the proposed scheme with the help of widespread BAN (Burrows, Abadi and Needham) Logic.

Resource Allocation Method for Improving Energy Efficiency and Receiver Fairness in Wireless Networks (무선 네트워크의 전력 효율성과 수신기 공평성 향상을 위한 자원 할당 방안)

  • Lee, Kisong;Cho, Dong-Ho;Chung, Byung Chang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.826-832
    • /
    • 2015
  • In wireless networks, it is important to guarantee the energy efficiency and receiver fairness for satisfying service provider and customer at the same time. In this paper, we propose a resource allocation algorithm which improves energy efficiency as well as receiver fairness based on optimization techniques. In the proposed algorithm, subchannel and power are allocated to receivers iteratively in the consideration of channel state information, amount of dissipated power, and receiver rate, in order to improve energy efficiency and receiver fairness. Through simulation, we show the effectiveness and superiority of the proposed algorithm in terms of energy efficiency and receiver fairness.

Governance of A Public Platform Project in the Context of Digital Transformation Focusing on the 'Special Delivery' (공공플랫폼 구축사업의 거버넌스: 경기도 배달플랫폼 '배달특급'의 사례를 중심으로)

  • Seo, Jeongone
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.15-28
    • /
    • 2022
  • Recently, government agencies are actively adopting the platform model as a means of public policy. However, existing studies on the public platform are minimal and have focused on user experiences or the possibility of public usage of the platform model. Now the research concerning building governance structure and utilizing network effects of the platform after adopting the platform model in the public sector is keenly required. This study intended to ignite academic dialogue on the governance of public platforms in the context of digital transformation. This study focused on a case of the 'Special delivery,' a public delivery app established by Gyeonggi-do. In order to analyze the characteristics of the public platform and its governance structure, data were collected from press releases, policy reports, and news articles. Data was analyzed using the frame of Hagui's platform design factors and Ansell & Gash's collaborative governance model. The results of the public platform analyses showed 1) incompleteness in the value trade-off accounting, which was designed for platform business based on general cost-benefit analysis, and 2) a closed governance structure that limits direct participation of diverse user groups(i.e., service provider, customer) in order to enhance providers' utility by preventing customers' excessive online activities. The results of this study provided theoretical and policy implications regarding designing the strategy for accounting for value trade-offs and functioning governance structure for public platforms.

Development of Hybrid Filtering Recommendation System using Context-Information in Mobile Environments (모바일 환경에서 상황정보를 이용한 하이브리드 필터링 추천시스템 설계)

  • Ko, Jung-Min;Nam, Doo-Hee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.3
    • /
    • pp.95-100
    • /
    • 2011
  • Due to rapid growth and development of telecommunication information technology, interest has been amplified regarding ubiquitous network computing and user-oriented service. Also, the rapid development of related technologies has been a big spotlight. Smart phone, with features such as a PC with advanced features is a mobile phone. According to environment and infrastructure development, a variety of mobile-based application software to provide various kinds of information and services has been released. However, most of them are provider-driven information systems and aim to provide large amounts of information simply to an unspecified number of users. Therefore, customized or personalized provision of information and service explained earlier for individual users has been hardly come true. According to background and need, this study wants to design and implement recommendations system for personalization and customization in mobile environments. To acquire more accurate recommendation results, recommendation system shall be composed using the Hybrid Filtering. Effective information recommendation according to user's situation by using user's context-information of purpose and location that are available in mobile devices before running the filtering of the information to improve the quality of recommendations.