• Title/Summary/Keyword: Internet access

Search Result 2,622, Processing Time 0.031 seconds

Attribute Utility-Based Negotiation Agent Methodology for Customer-To-Customer Electronic Commerce (소비자간 전자상거래를 위한 속성효용기반 자동협상 방법론의 개발)

  • Song Yong U.;Hong June S.;Kim Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.73-89
    • /
    • 2004
  • Since people have come to access more and more information about products with the proliferation of the Internet, more and more customer-to-customer e-marketplaces are being introduced with rapidly increasing transaction volumes. As the role of customer-to-customer electronic commerce has become increasingly regarded as vital to the economy, much research has delved into developing intelligent agent systems to efficiently support customer-to-customer electronic commerce. Most of this research, however, has focused only on supporting simple negotiation for the price of common goods along the time span. To expand the negotiation object to the differentiated goods, the customer must be allowed to negotiate over multi-at-tributes of the product besides the price, including the attributes related to the transaction activity itself, such as delivery time and payment method. To satisfy this requirement, we propose an agent marketplace for differentiated goods where the agent of a customer can negotiate not only the price but also the various attributes of the product and the transaction in order to achieve a better utility level for both buyer and seller. The formal protocol and the architecture issues to support the proposed e-marketplace and agents are also addressed.

  • PDF

Design and Implementation of a Physical Network Separation System using Virtual Desktop Service based on I/O Virtualization (입출력 가상화 기반 가상 데스크탑 서비스를 이용한 물리적 네트워크 망분리 시스템 설계 및 구현)

  • Kim, Sunwook;Kim, Seongwoon;Kim, Hakyoung;Chung, Seongkwon;Lee, Sookyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.7
    • /
    • pp.506-511
    • /
    • 2015
  • IOV is a technology that supports one or more virtual desktops, and can share a single physical device. In general, the virtual desktop uses the virtual IO devices which are provided by virtualization SW, using SW emulation technology. Virtual desktops that use the IO devices based on SW emulation have a problem in which service quality and performance are declining. Also, they cannot support the high-end application operations such as 3D-based CAD and game applications. In this paper, we propose a physical network separation system using Virtual Desktop Service based on HW direct assignments to overcome these problems. The proposed system provides independent desktops that are used to access the intranet or internet using server virtualization technology in a physical desktop computer for the user. In addition, this system can also support a network separation without network performance degradation caused by inspection of the network packet for logical network separations and additional installations of the desktop for physical network separations.

Fast Combinatorial Programs Generating Total Data (전수데이터를 생성하는 빠른 콤비나토리얼 프로그램)

  • Jang, Jae-Soo;Won, Shin-Jae;Cheon, Hong-Sik;Suh, Chang-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1451-1458
    • /
    • 2013
  • This paper deals with the programs and algorithms that generate the full data set that satisfy the basic combinatorial requirement of combination, permutation, partial permutation or shortly r-permutation, which are used in the application of the total data testing or the simulation input. We search the programs able to meet the rules which is permutations and combinations, r-permutations, select the fastest program by field. With further study, we developed a new program reducing the time required to processing. Our research performs the following pre-study. Firstly, hundreds of algorithms and programs in the internet are collected and corrected to be executable. Secondly, we measure running time for all completed programs and select a few fast ones. Thirdly, the fast programs are analyzed in depth and its pseudo-code programs are provided. We succeeded in developing two programs that run faster. Firstly, the combination program can save the running time by removing recursive function and the r-permutation program become faster by combining the best combination program and the best permutation program. According to our performance test, the former and later program enhance the running speed by 22% to 34% and 62% to 226% respectively compared with the fastest collected program. The programs suggested in this study could apply to a particular cases easily based on Pseudo-code., Predicts the execution time spent on data processing, determine the validity of the processing, and also generates total data with minimum access programming.

Implementation of User-friendly Intelligent Space for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 사용자 친화적 지능형 공간 구현)

  • Choi, Jong-Moo;Baek, Chang-Woo;Koo, Ja-Kyoung;Choi, Yong-Suk;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.443-452
    • /
    • 2004
  • The paper presents an intelligent space management system for ubiquitous computing. The system is basically a home/office automation system that could control light, electronic key, and home appliances such as TV and audio. On top of these basic capabilities, there are four elegant features in the system. First, we can access the system using either a cellular Phone or using a browser on the PC connected to the Internet, so that we control the system at any time and any place. Second, to provide more human-oriented interface, we integrate voice recognition functionalities into the system. Third, the system supports not only reactive services but also proactive services, based on the regularities of user behavior. Finally, by exploiting embedded technologies, the system could be run on the hardware that has less-processing power and storage. We have implemented the system on the embedded board consisting of StrongARM CPU with 205MHz, 32MB SDRAM, 16MB NOR-type flash memory, and Relay box. Under these hardware platforms, software components such as embedded Linux, HTK voice recognition tools, GoAhead Web Server, and GPIO driver are cooperated to support user-friendly intelligent space.

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

Legal Research on FinTech Regulatory Sandbox Fostering Financial Innovations in Korea (핀테크 활성화를 위한 규제 샌드박스의 도입 방안 연구)

  • Ko, Young-Mi
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.213-267
    • /
    • 2017
  • Regulatory barrier is considered most challenging out of all FinTech barriers, which many technology innovators have always experienced. Even though technological solutions promise customers accessibility to more cost-effective and secured financial services, it is quite challenging to create regulatory environment that enables innovation FinTech industry. Especially, a common challenge FinTech innovators and business face is regulatory uncertainty and confusion rather than any particular regulation. Since many FinTech models are continuously introducing new innovative ways in providing financial services, significant confusion could be raised in applying principles of existing law and regulations. In addition, it is uncertain whether or not applying complex regulatory compliance model intended for large financial institutions to small start-ups is appropriate since most existing regulations and rules are established and introduced without considering innovative tools such as mobile instruments, e-trade, and internet. Therefore, new mechanism to access to regulatory information in a more cost-effective, quick and immediate way should be created. Regulators, technological innovators, and financial customers should cooperate each other to find out appropriate solutions for those issues. Many regulators are introducing regulatory sandbox which provides service providers with opportunities to test their innovations, during the test, providing regulators with enough time to understand risks of innovations. However, regulatory sandbox is not a panacea for all challenges to FinTech innovations. Therefore, regulators should make comprehensive and multidimensional efforts including regulatory sandbox in supporting FinTech ecosystem.

Health Consciousness and Health Information Orientation on Health Information Searching Behaviors of Middle-Aged Adults (중년층의 건강관심도와 건강정보추구도가 인터넷 건강정보 검색행동에 미치는 영향)

  • Lee, Hawyoung;Oh, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.73-99
    • /
    • 2021
  • The purpose of this study is to analyze the health information use experience of middle-aged people in their 40s and 50s and to observe and analyze their health information search behaviors according to health consciousness and health information orientation. This study uses Information Foraging Theory with the concept of information scents which leads users to detect and collect cues in information searching. Types and contents of information cues that middle-aged people use when searching for health information were investigated. Also, how their health consciousness and health information orientation affected using information cues were analyzed. Three methods of research were used; (1) pre-interviews, (2) search experiments, and (3) post-interviews. Thirty-two middle-aged people participated in the study. Their performance on health information searching was recorded and referred to in the post-interviews using a think-aloud protocol. Findings presented that middle-aged people's health consciousness and health information orientation affected the perception of information scents in health information search; those with high health consciousness and health information orientation consider the text made by the government office the most critical information cues. We believe findings from this study could be used for public libraries or non-profit institutions to understand middle-aged people's health information behaviors to design education programs for information retrieval considering users' health consciousness and health information orientation. Findings could also contribute to Internet portal site or health-related web site designers developing strategies for middle-aged users to access health information effectively.

Improvement of conception rate on Hanwoo; The key hormones and novel estrus detector

  • Joo, Young Ho;Jeong, Seung Min;Paradhipta, Dimas Hand Vidya;Lee, Hyuk Jun;Lee, Seong Shin;Choi, Jeong Seok;Noh, Hyeon Tak;Chang, Hong Hee;Kim, Eun Joong;Kim, Sam Churl
    • Journal of Animal Science and Technology
    • /
    • v.63 no.6
    • /
    • pp.1265-1274
    • /
    • 2021
  • Two field experiments were conducted to improve the conception rate of Hanwoo cow. The first experiment aimed to investigate the physiological condition of Hanwoo cows on estrus, including metabolic profiles and body condition score (BCS). The second experiment investigated the effect of a novel estrus detector on the artificial insemination (AI) conception rate for Hanwoo cows. For the first experiment, 80 Hanwoo cows (2.5 ± 0.10 of parity), approximately one month before estrus, were housed in 16 pens and offered the experimental diets twice daily with free water access. The BCS were recorded, and blood was collected from the jugular veins just before AI. The collected blood was used to measure physiological conditions, such as metabolite and hormone levels. For the second experiment, each cow was equipped with a neck-mounted estrus detector collar, which had a sensor connected through the internet. Approximately one month before estrus, three hundred sixty Hanwoo cows (2.4 ± 0.21 of parity) were assigned into groups with or without W-Tag collar treatments. The animals were managed the same as in the first experiment. The pregnancy rate reached 55% in the first experiment. The concentration of luteinizing hormone (LH) was higher (p < 0.012; 1.56 vs. 1.08 ng/mL) in cows that were not pregnant (NPG) than in cows that were pregnant (PG) after AI. The BCS and other concentrations of metabolites and hormones in the blood were not different in both NPG and PG cows. The ranges of estrogen, LH, and follicle-stimulating hormone for PG cows were 11.9 to 39.0 pg/mL, < 0.25 to 1.98 ng/mL, and < 0.50 to 0.82 ng/mL, respectively. In the second experiment, cows with the estrus detector had lower days open (p < 0.001; 78.1 vs. 84.8 d), insemination frequency (p < 0.001; 1.26 vs. 2.52), and return of estrus (p < 0.001; 70.9 vs. 79.1 d) than those in cows without the estrus detector. In conclusion, the present study indicated that lower LH concentration just before AI potentially increased the pregnancy rate of Hanwoo cows. Furthermore, the application of estrus detectors to Hanwoo cows could improve the conception success rate for AI.

Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System (클라우드 병원 IoT 시스템을 활용한 효율적인 환자 정보 송·수신 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular, as ICT convergence digital healthcare technology is applied to hospital medical systems, infrastructure technologies such as big data, Internet of Things, and artificial intelligence are being used in conjunction with the cloud. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from hospital IoT system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established hospital IoT systems. The proposed model allows clinicians to analyze patients' disease information so that they can collect and treat diseases associated with their eating habits through IoT devices. The analyzed disease information minimizes hospital work to facilitate the handling of prescriptions and care according to the patient's degree of illness.