• 제목/요약/키워드: Information-giving

검색결과 857건 처리시간 0.024초

Reliability for Series and Parallel Systems in Bivariate Pareto Model : Random Censorship Case

  • Cho, Jang-Sik;Cho, Kil-Ho;Lee, Woo-Dong
    • Journal of the Korean Data and Information Science Society
    • /
    • 제14권3호
    • /
    • pp.461-469
    • /
    • 2003
  • In this paper, we consider the series and parallel system which include two components. We assume that the lifetimes of two components follow the bivariate Pareto model with random censored data. We obtain the estimators and approximated confidence intervals of the reliabilities for series and parallel systems based on maximum likelihood estimator and the relative frequency, respectively. Also we present a numerical example by giving a data set which is generated by computer.

  • PDF

전자도서관 환경에서 이용자-사서간 협력을 위한 상호작용에 대한 연구 (User-librarian interactions in the digital library environment)

  • 이재윤
    • 정보관리학회지
    • /
    • 제15권1호
    • /
    • pp.109-128
    • /
    • 1998
  • 전자도서관 환경에서 이용자가 원하는 바를 파악하고 이용자의 정보요구를 능동적으로 해결해주기 위해서는 이용자와 사서가 협력할 수 있는 상호작용 장치가 다양하게 마련되어야만 한다. 이 글에서는 전자도서관 환경에서 이용자와 사서의 상호작용에 대해 먼저 문헌에 보고된 사례유형을 확인한 다음 국내 연구도서관의 현황을 파악하였다. 이를 통해 국내에서 구축되는 전자도서관 환경의 효과적인 정보서비스를 위해 사서와 이용자 사이의 협력을 위한 상호작용을 활성화할 방안을 제시하였다.

  • PDF

Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings

  • Lu, Yang;Zhang, Quanling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.881-896
    • /
    • 2016
  • Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certificate management problem in traditional public key cryptography. In this paper, by giving a concrete attack, we first show that the certificate-based encryption scheme without bilinear pairings proposed by Yao et al. does not achieve either the chosen-ciphertext security or the weaker chosen-plaintext security. To overcome the security weakness in Yao et al.'s scheme, we propose an enhanced certificate-based encryption scheme that does not use the bilinear pairings. In the random oracle model, we formally prove it to be chosen-ciphertext secure under the computational Diffie-Hellman assumption. The experimental results show that the proposed scheme enjoys obvious advantage in the computation efficiency compared with the previous certificate-based encryption schemes. Without costly pairing operations, it is suitable to be employed on the computation-limited or power-constrained devices.

인터넷을 통한 자판기 원격제어 구현 연구 (A Study on the Vending Machine Remote Control through Internet)

  • 이양원;김미
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2001년도 추계종합학술대회
    • /
    • pp.537-540
    • /
    • 2001
  • 가전 정보화 및 흠 네트워킹의 발달과 더불어 전기밥솥, TV, 에어콘등의 가전기기에도 IP 부여를 통하여 인터넷 제어가 가능한 제품의 개발 연구가 활발히 행해지고 있다. 본 연구에서는 일반 Vending Machine에 Embed설 프로세서를 이용하여 인터넷을 동한 원격 제어를 구현하기 위한 연구로서 전원제어, 온도제어, 습도제어, 잔량제어 등에 관한 LED, LCD, Swich, 릴레이 등의 하드웨어 설계 및 응용 소프트웨어 개발 내용을 수행하였다. 시스템의 구성은 자바 환경하에서 클라이언트로 애플릿상에서 동작되도록 설계하였다.

  • PDF

An Analysis of Security Threats and Security Requirements on the Designated PC Solution

  • Lee, Kyungroul;Lee, Sun-Young;Yim, Kangbin
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권5호
    • /
    • pp.29-39
    • /
    • 2017
  • In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.

명령형 프로그램의 핵심부분에 대한 정보흐름 보안성의 데이타 흐름 분석 (Data Flow Analysis of Secure Information-Flow in Core Imperative Programs)

  • 신승철;변석우;정주희;도경구
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제31권5호
    • /
    • pp.667-676
    • /
    • 2004
  • 이 논문은 명령형 프로그램의 핵심 부분에 대한 정보흐름의 보안성을 데이타 흐름 분석법을 사용하여 예측하는 방법을 제시한다. 지금까지 제안된 분석 기법은 정보흐름이 안전한 프로그램을 안전하지 않다고 보수적으로 판정한다는 점에서 정밀도가 떨어지는 경우가 많이 있다. 이 논문에서는 이전의 구문중심의 접근방법보다는 분석결과가 더 정밀한 새로운 분석법을 제안하고, 그 분석의 안전성을 증명한다.

Depth Perception using A Parallel-Axis Stereoscopic Camera Rig

  • Ramesh, Rohit;Shin, Heung-Sub;Jeong, Shin-Il;Chung, Wan-Young
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.147-148
    • /
    • 2010
  • Recently, advancement in the visual technology has lead to the further development of the three dimensional (3D) imaging systems. The visual perception to view a pair of images simultaneously, is a crucial factor to build a stereoscopic 3D image. In this paper, we present the depth cues between the intensities of the two images when viewing with both eyes. Due to this stereoscopic effect, objects at different distances from the eyes differ in their horizontal positions, giving the depth cue of horizontal disparity. By simple image processing technique, we also present the binocular disparity map between the two images. A median filter has been used to filter out all the noises occurring in the disparity map image.

  • PDF

B2C 마이크로블로깅을 통한 고객참여 메커니즘의 이해 (Understanding Customer Participation Behavior via B2C Microblogging)

  • 박종필;손재열
    • Asia pacific journal of information systems
    • /
    • 제22권4호
    • /
    • pp.51-73
    • /
    • 2012
  • Social network services based on openness, connectedness, and mass participation are reshaping many aspects of how companies conduct business and create value for their customers. For instance, Facebook and Twitter are expected to play a pivotal role as a new communication channel through which companies-forge close relationships with their customers for co-creation of value for mutual benefits. Given the potential of social network services, it is not surprising that many companies have strategically invested in social network services to reach out to customers. Despite the growing interest in social network services as a platform to connect companies and their customers, few guidelines exist about how managers can effectively utilize social network services in forging relationships with their customers. As such, scholars should pay greater attention to how firms can successfully develop relationships with their customers on social network services. In particular, this study employs the S-O-R (stimulus-organism-response) framework as a theoretical lens to develop a research model that explains customers' participation in the value co-creation platform that companies opened on Twitter. According to the S-O-R framework, certain types of individuals' behaviors can be best understood based on a causal link from environmental stimulus to organism, and response. We apply the S-O-R framework to understand how ubiquitous connectivity (stimuli) can influence customers' experience (organism) with companies on Twitter, which in turn influence their participation behavior (response). Two steps have been undertaken to empirically test the research model. First, we conducted a content analysis of tweets written by customers who follow companies on Twitter. As a result, we found event/promotion participation, company support, and giving feedback as three specific types of customer participation behavior. Second, we conducted a web-based survey to test research hypotheses in the research model. Participations in the survey were solicited to customers who followed companies on Twitter. As a result, a total of 115 respondents have completed the survey. Data were analyzed using the partial least square (PLS) technique. The results of data analysis suggest that ubiquitous connectivity (stimuli) had strong positive effects on perceive usefulness, perceived enjoyment, and perceived intimacy (organism). Perceived intimacy showed positive effects on customer participation behavior (response), such as event participation, company support, and giving feedback. Perceived enjoyment was found to have strong positive effects on company support and giving feedback. On the other hand, perceived usefulness did not have significant impacts on the three types of customer participation behavior.

  • PDF

재가 치매노인의 주 수발자와 환경 실태 (A Study on Community-dwelling Elders with Dementia, their Primary Caregiver, and Living Environments)

  • 김남초;김정희;임영미
    • 한국보건간호학회지
    • /
    • 제16권1호
    • /
    • pp.13-29
    • /
    • 2002
  • The purpose of this study was to describe about elders with dementia, their families, and their living environment by visiting the households where demented elders resided. The findings will be used as a basis to develop future individualized adjustment programs for demented elders and their families living in communities. The study participants were 64 demented elders and their families who were registered to a dementia counseling center at Nam-Gu community health center located in Inchon, Korea. Data were collected for two months, from May to June 2001. The length of data collection for each home visit ranged from 1.5 to 2.5 hours. Conclusion are as follows based on these study findings: Those demented elders had more than one chronic health problem in addition to their pre-existing dementia condition. Two thirds of the demented elders were not receiving any specific treatment for dementia. They showed a moderate level of independence in basic ADL, but were mostly residing at home because of lack of ability to perform more delicate and complicate routine daily activities by themselves. In addition, the primary caregivers were not well adjusted to the care-giving activities for their demented family members due to the lack of knowledge and information about dementia. The caregivers were mostly women including daughters-in-law, woman spouses and daughters, over a half of whom perceived their physical and mental health status as poor. Their image toward the demented elders was considerably negative. while their level of knowledge on dementia was moderate. The burden for the care-giving was high, whereas their coping method was passive. As the difference in image toward elderly before and after the onset of dementia in their family member increases, the caregiver burden also increased. The main resource of social support for the caregivers was their children. The caregivers showed high level of needs for knowledge and information on dementia, and day care service was the most preferred type of service by the caregivers. There was lack of safety in the living environments for the demented elders and their families, and in the surrounding environments to prevent dementia-related symptoms. Considering that home-based family care-giving is the most culturally appropriate model of providing care for the demented elders in Korea, we need to develop and apply an individualized adjustment program for the demented elders and their families.

  • PDF

남성 잡지 표지 모델의 섹슈얼 이미지 (Sexual Image of the Cover Models in Men's Magazine)

  • 윤을요
    • 한국콘텐츠학회논문지
    • /
    • 제10권6호
    • /
    • pp.275-285
    • /
    • 2010
  • 감성사회, 무한경쟁사회로 진입하면서 남성의 스타일이나 이미지는 힘과 권위로 상징되던 과거 스타일에서 많은 변화를 보이고 있다. 오늘날 남성 스타일과 이미지에 관한 정보는 소비대중의 요구와 매체들의 보도에 의해 필요와 학습의 과정을 거치면서, 정보의 제공자나 수용자 모두에게 적절한 이익을 주고 있다. 일반적으로 잡지의 표지는 잡지의 컨셉과 이미지를 대표하며, 표지 모델은 잡지의 상징적인 이미지, 시대성, 대중의 호감도와 밀접한 연관성을 지닌다. 따라서 라이프스타일 잡지의 표지 모델에 관한 연구는 현재 스타일의 흐름을 단적으로 파악할 수 있다는 점에서 의미가 있다. 본 연구는 남성 잡지 표지 모델의 섹슈얼 이미지에 관한 연구로 현대 남성의 이미지를 호모 섹슈얼, 크로스 섹슈얼, 메트로 섹슈얼, 위버 섹슈얼의 이미지로 구분하여 연구하였다. 연구의 결과 국내 남성 잡지에서 나타나고 있는 섹슈얼 이미지는 위버 섹슈얼이 압도적이었으며, 메트로 섹슈얼이 그 다음을 차지하였다. 결과적으로 현대 남성들의 이 같은 섹슈얼 이미지는 남성 성역할의 변화와 함께 남성 이미지의 범위 확대를 뜻하는 것으로 파악할 수 있다.