• Title/Summary/Keyword: Link Types

Search Result 430, Processing Time 0.026 seconds

Post-Adoption Behavior : Role of Customer Satisfaction and Customer Loyalty in the Next-Generation Service Upgrading (혁신기술수용 이후 : 차세대 서비스 업그레이드 의향에 대한 서비스 속성만족은 차원과 고객 충성도의 역할)

  • Son, Min-Hee;Han, Kye-Sook
    • Korean Management Science Review
    • /
    • v.26 no.3
    • /
    • pp.79-100
    • /
    • 2009
  • Recently, most tech-based products are of multiple generations, since new-generation products are replacing the older ones as technologies continue to improve. Although, this means that research is needed to examine as much about the role of post-adoption behavior as the missing link between the adoptions of successive generation as first adoption of innovation, there is a dearth of literature explicitly examining consumers' post-adoption behavior, especially in the context of subscription-based service. For the subscription-based services, in spite of the important role of consumer satisfaction, research on the post-adoption behavior can not carefully examine the direct impact of consumer satisfaction on their decision to upgrade by considering usage instead of satisfaction as the missing link between buyers' first adoption and their next-generation adoption. This study identified two types of attribute satisfaction such as basic attribute and core attribute using both literature review and FGI (Focus Group Interview), and tries to investigate how two types of attribute satisfaction has influence on customers' intention to upgrade to the next-generation services. and a moderating role of customer loyalty between attribute satisfaction and intention. The empirical results show that core-attribute satisfaction has a negative influence on customers' intention to upgrade, due to the moderating role of customer loyalty, but it can raise their intention to upgrade next-generation services. However, basic-attribute satisfaction, on the other hand, appears to positively influence both customer loyalty and the intention to upgrade. We also find that the consumer attribute satisfaction is influenced by consumer innovativeness, her perception of service and the usage of each features' type in different ways. Finally, academic and practical implication is made, limitation is clarified and a direction for further studies is suggested.

Context-based Web Application Design (컨텍스트 기반의 웹 애플리케이션 설계 방법론)

  • Park, Jin-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.111-132
    • /
    • 2007
  • Developing and managing Web applications are more complex than ever because of their growing functionalities, advancing Web technologies, increasing demands for integration with legacy applications, and changing content and structure. All these factors call for a more inclusive and comprehensive Web application design method. In response, we propose a context-based Web application design methodology that is based on several classification schemes including a Webpage classification, which is useful for identifying the information delivery mechanism and its relevant Web technology; a link classification, which reflects the semantics of various associations between pages; and a software component classification, which is helpful for pinpointing the roles of various components in the course of design. The proposed methodology also incorporates a unique Web application model comprised of a set of information clusters called compendia, each of which consists of a theme, its contextual pages, links, and components. This view is useful for modular design as well as for management of ever-changing content and structure of a Web application. The proposed methodology brings together all the three classification schemes and the Web application model to arrive at a set of both semantically cohesive and syntactically loose-coupled design artifacts.

  • PDF

Interoperable XML Messaging System for Tactical Data Link (전술데이터링크 상호운용을 위한 XML 기반 메시징 시스템)

  • Kim, Hong-Jae;Oh, Sang-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.75-87
    • /
    • 2011
  • Tactical Data Links are standardized radio communication data links for military armed forces and used to transmit and receive data. Because they are the core elements of achieving information superiority in a NCW environment, various kinds of TDL are used by the Korean armed forces. Operating various types of TDL is very helpful in getting more information; however, at the same time, it is hard to integrate and make them co-operate with other TDLs or C4ISR systems. In this paper, we propose a XML based messaging system to make various types of TDL interoperable in a NCW environment. For the messaging system between TDL and C4ISR systems, we define XML message processing interfaces and suggest binary XML for serialization to save transmission loads over constrained military communication bandwidth. Our experiment results show that the TDL message can be transformed into generalized XML data that is interoperable with other TDLs and binary XML serialization, and it saves parsing and transmission time.

Control of 30kW Grid-Connected PCS for Wave Power Generation (파력발전용 30kW 계통연계형 PCS 제어)

  • Kim, Wan-Seok;Kim, Jae-Hyuck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.470-475
    • /
    • 2019
  • This paper deals with a 30kW grid-connected PCS (Power Conversion System) for an Oscillating Water Column (OWC) wave-power generation system. Wave power generation in marine energy is suitable for Korea with the characteristics of a peninsula with three sides facing the sea. In the case of coastal disasters, wave generators can act as a breakwater to reduce damage, and can be integrated with other marine power generation systems to increase efficiency. Wave power generation systems are classified into various types, such as oscillating bodies, OWC, and overtopping according to the operation principle, and they can also be classified into two types according to the installation method: a fixed structure and floating structure. This paper proposes a 30kW grid-connected PCS topology and model for OWC wave power generation that is structurally stable with a turbine and generator that are relatively easy to maintain, and then provide a control method required for grid connection, including DC link voltage control. Simulation verification was performed to verify the proposed PCS.

GMPLS-based Recovery Scheme Handling the Requirements for Various Service Types (다양한 서비스들의 요구사항을 만족하는 GMPLS 기반 복구 기법)

  • Lee, Yonggyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.714-724
    • /
    • 2022
  • The spread of mobile devices comes to increase explosive data traffic and then results in various types of service demands. In order to satisfy the increment of traffic and the requirements for various services, optical internet technologies that transmit several Tbps through only a single optical fiber have been actively studied. Because of the large bandwidth, an optical link can accommodate a large number of service types. Therefore, new technologies are required to guarantee the survivability of optical internet and handle the requirements of each service. So, in this article, a new scheme based on GMPLS technologies is proposed to deal with the various service demands and survivability issues in IP over WDM networks.

Enhancing Security in Mobile IPv6

  • Modares, Hero;Moravejosharieh, Amirhossein;Salleh, Rosli Bin;Lloret, Jaime
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.51-61
    • /
    • 2014
  • In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man-in-the-middle attack, the session hijacking attack, and the denial-of-service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.

Implementation of Network Level Simulator for Tactical Network Performance Analysis (전술통신망 성능분석을 위한 네트워크 시뮬레이터 구현)

  • Choi, Jeong-In;Shin, Sang-Heon;Baek, Hae-Hyeon;Park, Min-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.5
    • /
    • pp.666-674
    • /
    • 2013
  • This paper studied about the design and implementation of tactical communication network simulator in order to obtain tactical communication network parameter, such as link capacity and routing plan, and a number of exceptional cases that may occur during actual deployment by conducting simulation of a large-scale tactical communication networks. This tactical communication network simulator provides equipment models and link models of commercial OPNET simulator for tactical communication network. In addition, 6 types of simulation scenario writings convenience functions and traffic generation models that may occur in situations of tactical communication network environment were implemented in order to enhance user friendliness. By taking advantages of SITL(System-In-The-Loop) function of OPNET, the tactical communication network simulator allows users to perform interoperability test between M&S models and actual equipment in operating simulation of tactical communication network, which is run on software. In order to confirm the functions and performance of the simulator, small-scale of tactical communication network was configured to make sure interoperability between SITL-based equipment and a large-scale tactical communication network was simulated and checked how to cope with traffic generated for each network node. As the results, we were able to confirm that the simulator is operated properly.

A BI-Level Programming Model for Transportation Network Design (BI-Level Programming 기법을 이용한 교통 네트워크 평가방법 연구)

  • Kim, Byung-Jong;Kim, Won-Kyu
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.7 s.85
    • /
    • pp.111-123
    • /
    • 2005
  • A network design model has been proposed. which represents a transportation facility investment decision problem. The model takes the discrete hi-level programming form in which two types of decision makers, government and travelers, are involved. The model is characterized by its ability to address the total social costs occurring in transportation networks and to estimate the equilibrium link volumes in multi-modal networks. Travel time and volume for each link in the multi-modal network are predicted by a joint modal split/traffic assignment model. An efficient solution algorithm has been developed and an illustrative example has been presented.

A Handover Technique in a Dual-mode Base Station (이중모드 기지국에서의 핸드오버 기법)

  • Jeong Tae-Eui;Shin Yeon-Seung;Ju Sang-Don;Song Byung-Kwon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.177-184
    • /
    • 2006
  • A handover is a technology that enables data transmission and receipt seamlessly while a mobile station moves from the current base station to another base station. The handover is basically classified into two types; a horizontal handover which changes a radio link only without changing a network link, and a vertical handover which changes both in heterogeneous networks. In this paper, we propose a vertical handover protocol in a dual base station which supports both of W-CDMA and WiBro networks based on SDR (Software Defined Radio), verify the rightness using a state transition diagram and a Petri-net, and evaluate the performance of the proposed protocol using NS-2 simulator.

Finite element analysis of shear critical prestressed SFRC beams

  • Thomas, Job;Ramaswamy, Ananth
    • Computers and Concrete
    • /
    • v.3 no.1
    • /
    • pp.65-77
    • /
    • 2006
  • This study reports the details of the finite element analysis of eleven shear critical partially prestressed concrete T-beams having steel fibers over partial or full depth. Prestressed concrete T-beams having a shear span to depth ratio of 2.65 and 1.59 and failing in the shear have been analyzed using 'ANSYS'. The 'ANSYS' model accounts for the nonlinear phenomenon, such as, bond-slip of longitudinal reinforcements, post-cracking tensile stiffness of the concrete, stress transfer across the cracked blocks of the concrete and load sustenance through the bridging of steel fibers at crack interface. The concrete is modeled using 'SOLID65'-eight-node brick element, which is capable of simulating the cracking and crushing behavior of brittle materials. The reinforcements such as deformed bars, prestressing wires and steel fibers have been modeled discretely using 'LINK8' - 3D spar element. The slip between the reinforcement (rebar, fibers) and the concrete has been modeled using a 'COMBIN39'-non-linear spring element connecting the nodes of the 'LINK8' element representing the reinforcement and nodes of the 'SOLID65' elements representing the concrete. The 'ANSYS' model correctly predicted the diagonal tension failure and shear compression failure of prestressed concrete beams observed in the experiment. The capability of the model to capture the critical crack regions, loads and deflections for various types of shear failures in prestressed concrete beam has been illustrated.