• Title/Summary/Keyword: Internet Uses

Search Result 1,469, Processing Time 0.03 seconds

Knowledge Representation Using Decision Trees Constructed Based on Binary Splits

  • Azad, Mohammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4007-4024
    • /
    • 2020
  • It is tremendously important to construct decision trees to use as a tool for knowledge representation from a given decision table. However, the usual algorithms may split the decision table based on each value, which is not efficient for numerical attributes. The methodology of this paper is to split the given decision table into binary groups as like the CART algorithm, that uses binary split to work for both categorical and numerical attributes. The difference is that it uses split for each attribute established by the directed acyclic graph in a dynamic programming fashion whereas, the CART uses binary split among all considered attributes in a greedy fashion. The aim of this paper is to study the effect of binary splits in comparison with each value splits when building the decision trees. Such effect can be studied by comparing the number of nodes, local and global misclassification rate among the constructed decision trees based on three proposed algorithms.

The Effect of Clothing Involvement and Internet Usage on Internet Shopping Attitude and Internet Purchase of Clothing Products (의복관여와 인터넷사용이 의류제품의 인터넷 쇼핑태도 및 인터넷 구매에 미치는 영향)

  • 황진숙
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.2
    • /
    • pp.177-187
    • /
    • 2003
  • The purpose of this study was to investigate the effects of clothing involvement and internet usage on internet shopping attitude and internet purchase of clothing products. The subjects used for the study were 210 male and 338 female college students. The clothing involvement consisted of pleasure/interest, symbolism/expression, and perceived risk factors. The internet usage consisted of information and entertainment uses. The internet shopping attitude had convenience and security factors. The results showed that there were positive relationships between clothing involvement factors and internet shopping attitude factors. Regarding the relationship between internet usage and internet shopping attitude, there was a positive relationship between internet information use and internet attitude for convenience while there was a positive relationship between internet entertainment use and internet attitude for security. According to clothing involvement and internet usage, the respondents were segmented by four groups. The results showed that these segmented groups were different in regard to internet shopping attitude, internet purchase, and demographics. For example, symbolishm/internet information use group considered internet shopping more convenient and purchased clothing more frequently through internet than did other groups. The implications of the study were discussed.

Internet Information Service using Telephony and Fax, ITC-CSCC’2000

  • Jang, Young-Gun;Cho, Kyoung-Hwan
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.691-694
    • /
    • 2000
  • This paper is addressed to Internet telephony based service implementation. It describes an implementation method which uses ARS as a gateway which combines Internet and traditional public switched telephone network for Internet information service using telephony and fax, is different to traditional Internet telephony which provide enhanced speech quality and low cost functionality. This method allows telephony and/or fax user to get Internet information without additional Internet bill, Internet infrastructure and low connection quality from low signal bandwidth connected him. Implemented system is useful to a special kind information service such as climate information of Korea etc and simpler than WAP based service as for wireless mobile telephony user. We implement job opportunity information and advertisement service supported by Home page of Choong Book Small & Medium Business Administration and e-mail service supported by Korean Society for Rehabilitation of persons with Disabilities to demonstrate the system ability. As a result of test implementation, this service system works good fur blind persons and graduated persons without job, is expected to apply for special Internet information provider via Voice and Fax.

  • PDF

WSDL and CORBA IDL (WSDL과 CORBA IDL)

  • 황의철;정선태
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1323-1326
    • /
    • 2003
  • CORBA has been a popular middleware, but recently Web Services has been emerging as a promising web middleware since it uses Internet established standards such as URL, HTTP, XML, and etc. CORBA uses IDL for describing CORBA object interface and Web Services uses WSDL for its description. Thus, in order to port or integrate CORBA objects into Web Services, one needs to understand the relationship between CORBA IDL and WSDL. In this paper, we analyze IDL and WSDL, and compare between two. It turns out that there exists a direct mapping between two, and that understanding operational environments and logic of two technologies is much more important in converting or integrating CORBA objects into Web services successfully.

  • PDF

The Effect of Fare-To-Fare Communication Situation on New Media Uses (면대면 커뮤니케이션 환경이 새로운 대인커뮤니케이션 매체 이용에 미치는 영향: 인터넷, 이동전화를 중심으로)

  • Bae, Jin-Han
    • Korean journal of communication and information
    • /
    • v.23
    • /
    • pp.47-77
    • /
    • 2003
  • Despite the near ubiquity of mobile phone and internet, the 'meta research' that deals with face-to-face(FTF), mobile phone and internet together as interpersonal media is very rare in Korea. This study begin with the purpose of fair repositioning of mobile phone and internet in Korean's interpersonal communication horizon. To accomplish this purpose, We examined the effect of face-to-face communication situation on uses of mobile phone and internet as interpersonal communication media. The related raw data were collected from on-line survey process, and statistically analyzed. The result showed that persons who are more troublesome in FTF communication because of their timidness or personality problem are more restricted in human communication network via mobile phone and internet than the others who are not. And more 'addicted' in internet use and more active in trying another personality(Persona) in cyber space. And more shrunk in meeting and conversation with family members and friends after internet adoption.

  • PDF

Research on Signature Maintenance Method for Internet Application Traffic Identification using Header Signatures (헤더 기반 인터넷 응용 트래픽 분석을 위한 시그니쳐 관리 방법에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.19-33
    • /
    • 2011
  • The need for application traffic classification becomes important for the effective use of network resources. The header-based identification method uses the header signature {IP address, port number, transport layer protocol TCP/UDP)}extracted from Internet application server to overcome some limitations overhead, payload encryption, etc.) of previous methods. A lots signature is extracted because this method uses header information of server. So, we need a maintenance method to keep essential signatures. In this paper, we represent the signature maintenance method using properties of identified traffic and history of the signature. Also, we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

A Study of Regulating Internet Escrow Services in Electronic Commerce (전자상거래상의 인터넷 에스크로 서비스의 규제에 관한 연구)

  • 김정곤
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.215-226
    • /
    • 2004
  • As with the fast spread of internet uses in recent years, electronic commerce has evolved. The proliferation of electronic commerce has increased diverse forms of fraud cases since internet helps intended criminals remain anonymous. In absence of effective tools to warrant the reliability of parties offering products or services through electronic commerce, consumers have to absorb damages unfairly. Internet escrow service has been considered to be an option to establish reliability between buyers and sellers and to protect consumers from possible fraud cases. However, like other industries, fraudulent escrow services have appeared in internet. This study has been intended to analyze fraudulent internet escrow services and to propose an effective regulatory system of internet escrow services. To do that, this study benchmarked the regulation of the State of California, primarily focusing on the formation of escrow company, regulation of escrow business, and remedies for wrongdoing, so Korea can consider the adoption of similar systems.

  • PDF

A video transmission system for a high quality and fault tolerance based on multiple paths using TCP/IP (다중 경로를 이용한 TCP/IP 기반 고품질 및 고장 감내 비디오 전송 시스템)

  • Kim, Nam-Su;Lee, Jong-Yeol;Pyun, Kihyun
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.1-8
    • /
    • 2014
  • As the e-learning spreads widely and demands on the internet video service, transmitting video data for many users over the Internet becomes popular. To satisfy this needs, the traditional approach uses a tree structure that uses the video server as the root node. However, this approach has the danger of stopping the video service even when one of the nodes along the path has a some problem. In this paper, we propose a video-on-demand service that uses multiple paths. We add new paths for backup and speed up for transmitting the video data. We show by simulation experiments that our approach provides a high-quality of video service.

Study on Introduction of Internet Number Resource (인터넷 번호 자원 도입 방안 연구)

  • 정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.866-870
    • /
    • 2002
  • In case user uses e-mail, SIP, internet FAX etc., the user possess as many addresses as services. ENUM is attracting interests which can approach various internet information resources. This paper analyzed some plan that must consider to introduce in domestic about ENUM that shows interests in many country.

  • PDF

A Study on XML/EDI Security using XML Signature (XML 전자서명을 이용한 XML/EDI보안에 관한 연구)

  • 고규준;정경찬;박정선
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • As the Internet spreads rapidly, the industrial structure is changing to a new paradigm. The previous EDI system was asked to be changed and WEB EDI, E-Mail EDI, FTP EDI etc. based on the internet have appeared. Recently, the XML/EDI which is based on XML documents has appeared. EDI system has to assure a safe exchange between senders and receivers. But, the internet has security problems because it uses a open TCP/IP protocol. In this paper, we will propose an XML/EDI system with XML Signature.