• Title/Summary/Keyword: Information release

Search Result 783, Processing Time 0.025 seconds

Does Online Social Network Contribute to WOM Effect on Product Sales? (온라인 소셜네트워크의 제품판매 관련 구전효과에 대한 기여도 분석)

  • Lee, Ju-Yoon;Son, In-Soo;Lee, Dong-Won
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.85-105
    • /
    • 2012
  • In recent years, IT advancement has brought out the new Internet communication environment such as online social network services, where people are connected in global network without temporal and spatial limitation. The popular use of online social network helps people share their experience and preference for specific products and services, thus holding large potential to significantly affect firms' business performance through Word-of-Mouth (WOM). This study examines the role of online social network in raising WOM effect on the movie industry by comparing with the similar role of Internet portal, another major online communication channel. Analyzing 109 movies and data from both Twitter and Naver movie, we found that significant WOM effect exists simultaneously in both Twitter and Naver movie. However, we also found that different figures of online viral effects exist depending on the popularity of movies. In the hit movie group, before the movie release, the WOM effect occurs only in Twitter while the WOM effect arises in both Twitter and Naver movie at the same time after the movie release. In the less-popular (or niche) movie group, the WOM effect occurs in both Twitter and Naver movie only before the movie release. Our findings not only deepen theoretical insights into different roles of the two online communication channels in provoking the WOM effect on entertainment products but also provide practitioners with incentive to utilize SNS as strategic marketing platform to enhance their brand reputations.

Application of Artificial Intelligence Technology for Dam-Reservoir Operation in Long-Term Solution to Flood and Drought in Upper Mun River Basin

  • Areeya Rittima;JidapaKraisangka;WudhichartSawangphol;YutthanaPhankamolsil;Allan Sriratana Tabucanon;YutthanaTalaluxmana;VarawootVudhivanich
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.30-30
    • /
    • 2023
  • This study aims to establish the multi-reservoir operation system model in the Upper Mun River Basin which includes 5 main dams namely, Mun Bon (MB), Lamchae (LC), Lam Takhong (LTK), Lam Phraphoeng (LPP), and Lower Lam Chiengkrai (LLCK) Dams. The knowledge and AI technology were applied aiming to develop innovative prototype for SMART dam-reservoir operation in future. Two different sorts of reservoir operation system model namely, Fuzzy Logic (FL) and Constraint Programming (CP) as well as the development of rainfall and reservoir inflow prediction models using Machine Learning (ML) technique were made to help specify the right amount of daily reservoir releases for the Royal Irrigation Department (RID). The model could also provide the essential information particularly for the Office of National Water Resource of Thailand (ONWR) to determine the short-term and long-term water resource management plan and strengthen water security against flood and drought in this region. The simulated results of base case scenario for reservoir operation in the Upper Mun from 2008 to 2021 indicated that in the same circumstances, FL and CP models could specify the new release schemes to increase the reservoir water storages at the beginning of dry season of approximately 125.25 and 142.20 MCM per year. This means that supplying the agricultural water to farmers in dry season could be well managed. In other words, water scarcity problem could substantially be moderated at some extent in case of incapability to control the expansion of cultivated area size properly. Moreover, using AI technology to determine the new reservoir release schemes plays important role in reducing the actual volume of water shortfall in the basin although the drought situation at LTK and LLCK Dams were still existed in some periods of time. Meanwhile, considering the predicted inflow and hydrologic factors downstream of 5 main dams by FL model and minimizing the flood volume by CP model could ensure that flood risk was considerably minimized as a result of new release schemes.

  • PDF

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.

Channel Capacity Analysis of DNA-based Molecular Communication with Length Encoding Mechanism

  • Xie, Jialin;Liu, Qiang;Yang, Kun;Lin, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2923-2943
    • /
    • 2021
  • The double helix structure of DNA makes it diverse, stable and can store information with high density, and these characteristics are consistent with the requirements of molecular communication for transport carriers. In this paper, a specific structure of molecular communication system based on DNA length coding is proposed. Transmitter (Tx) adopts the multi-layer golden foil design to control the release of DNA molecules of different lengths accurately, and receiver (Rx) adopts an effective and sensitive design of nanopore, and the biological information can be converted to the electric signal at Rx. The effect of some key factors, e.g., the length of time slot, transmission distance, the number of releasing molecules, the priori probability, on channel capacity is demonstrated exhaustively. Moreover, we also compare the transmission capacity of DNA-based molecular communication (DNA-MC) system and concentration-based molecular communication (MC) system under the same parameter setting, and the peak value of capacity of DNA-MC system can achieve 0.08 bps, while the capacity of MC system remains 0.025 bps. The simulation results show that DNA-MC system has obvious advantages over MC system in saving molecular resources and improving transmission stability.

A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map

  • Chen, Jeanne;Chen, Tung-Shou;Hong, Wien;Horng, Gwoboa;Wu, Han-Yan;Shiu, Chih-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1105-1118
    • /
    • 2014
  • In this paper, a new reversible data hiding method based on a dual binary tree of embedding levels is proposed. Four neighborhood pixels in the upper, below, left and right of each pixel are used as reference pixels to estimate local complexity for deciding embeddable and non-embeddable pixels. The proposed method does not need to record pixels that might cause underflow, overflow or unsuitable for embedment. This can reduce the size of location map and release more space for payload. Experimental results show that the proposed method is more effective in increasing payload and improving image quality than some recently proposed methods.

사물인터넷 시험 인증 관련 국제 표준 및 연구 동향

  • Choe, Seong-Chan;Kim, Hyeon-Sik;Song, Jae-Seung
    • Information and Communications Magazine
    • /
    • v.32 no.5
    • /
    • pp.9-15
    • /
    • 2015
  • 최근 다양한 주변의 정보들을 측정할 수 있는 센서, 수집된 정보에 기반하여 특정 디바이스나 시스템들을 움직이거나 제어할 수 있는 엑츄에이터 등 다양한 우리 주변의 기기들을 서로 연결하여 보다 스마트한 서비스들을 사용자들에게 제공해 주는 사물인터넷(Internet of Things, IoT)에 대한 기대와 관심이 증가하고 있으며, 관련 산업 및 시장의 규모가 급성장할 것으로 기대되어진다. 다양한 기기들이 인터넷에 연결되어 서로 연동되기 위해서는 국제 표준에 따른 개발이 필수적이며, 이를 위해 그동안 지역별로 별도로 진행되어오던 IoT 기술을 통합하여 하나의 글로벌 IoT 표준을 만들기 위해 oneM2M(원엠투엠) Partnership Project가 시작되었다. Release 1 oneM2M 표준이 개발되어 공표되고, 표준의 완성도가 높아짐에 따라, oneM2M 표준을 구현한 기기들의 호환성을 확인하고 표준 적합성을 확인하기 위한 테스팅 표준이 개발되어 지고 있다. 또한, 표준에 따라 개발된 사물인터넷 기기들을 인증하는 방법과 절차에 대한 논의가 시작되었다. 본 고에서는 다양한 ICT 관련 국제 시험 인증과 관련된 동향에 대해 살펴보고, oneM2M에서 개발 및 논의되고 있는 테스팅 관련 표준 및 시험인증 관련 내용을 소개한다.

Disaster and Safety Response Management on the Bioterrorism and Biological War (생물테러 및 생물학전의 재해안전 대응방안에 대한 고찰)

  • Wang, Soon Joo;Byun, Hyun Joo
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.2
    • /
    • pp.119-128
    • /
    • 2007
  • A bioterrorism attack is the deliberate release of viruses, bacteria, or other agents used to cause illness or death in people, animals, or plant. These agents are found in nature, but it is possible that they could be changed to increase their ability to cause disease, make them resistant to current medicines, or to increase their ability to be spread into the environment. Terrorists may use biological agents because these agents can be extremely difficult to detect and do not cause illness for several days. Some bioterrorism agents, like smallpox virus, can spread from person to person, like anthrax, can not. From these agents, we discussed the characteristics of biological agents and national safety regulation on the weapons of mass destruction including bioterrorism.

  • PDF

MMMP: A MAC Protocol to Ensure QoS for Multimedia Traffic over Multi-hop Ad Hoc Networks

  • Kumar, Sunil;Sarkar, Mahasweta;Gurajala, Supraja;Matyjas, John D.
    • Journal of Information Processing Systems
    • /
    • v.4 no.2
    • /
    • pp.41-52
    • /
    • 2008
  • In this paper, we discuss a novel reservation-based, asynchronous MAC protocol called 'Multi-rate Multi-hop MAC Protocol' (MMMP) for multi-hop ad hoc networks that provides QoS guarantees for multimedia traffic. MMMP achieves this by providing service differentiation for multirate real-time traffic (both constant and variable bit rate traffic) and guaranteeing a bounded end-to-end delay for the same while still catering to the throughput requirements of non real time traffic. In addition, it administers bandwidth preservation via a feature called 'Smart Drop' and implements efficient bandwidth usage through a mechanism called 'Release Bandwidth'. Simulation results on the QualNet simulator indicate that MMMP outperforms IEEE 802.11 on all performance metrics and can efficiently handle a large range of traffic intensity. It also outperforms other similar state-of-the-art MAC protocols.

A Study on the Reliability Growth Trend of Operational S/W Failure Reduction

  • Che, Gyu-Shik;Kim, Yong-Kyung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.143-146
    • /
    • 2005
  • The software reliability growth depends on the testing time because the failure rate varies whether it is long or not. On the other hand, it might be difficult to reduce failure rate for most of the cases are not available for debugging during operational phase, hence, there are some literatures to study that the failure rate is uniform throughout the operational time. The failure rate reduces and the reliability grows with time regardless of debugging. As a result, the products reliability varies with the time duration of these products in point of customer view. The reason of this is that it accumulates the products experience, studies the exact operational method, and then finds and takes action against the fault circumstances. I propose the simple model to represent this status in this paper.

  • PDF

A Review of Mobile Data Traffic Explosion according to Digital Convergence and Action Plans of Network Operator (디지털 컨버전스 활성화에 따른 모바일 데이터 트래픽 증가 현황에 대한 고찰 및 대응 방안 모색)

  • Park, Bok-Nyong;Moon, Tae-Hee;Kwack, Jun-Yeung;Kwon, June-Hyuk
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.4
    • /
    • pp.131-140
    • /
    • 2010
  • Recently, mobile wireless data traffic has been dramatically increased due to not only the popularization of digital convergence devices including smart phone, Net-book, and Tablet PC, but also the vitalization of wireless Internet related eco-systems such as AppStore. In addition, it is expected that a tremendous increase in mobile data is caused by the release of unlimited mobile data plans (flat-fee). In order to deal with such mobile data traffic explosion, it is necessary that network operators should make efforts to offload wireless data traffic. This paper reviews the condition of mobile wireless data traffic in domestic and international telecommunication industry and looks for various action plans to overcome the difficulty of network operators.

  • PDF