• Title/Summary/Keyword: Online device

Search Result 237, Processing Time 0.027 seconds

The Technology of Personal Cloud Computing and Market Research (퍼스널 클라우드 컴퓨팅의 기술과 시장 분석)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.239-251
    • /
    • 2014
  • The personal cloud is a service which approaches the personal contents scattering to all terminals and online space at the personal information-oriented age in which the person's digital device including the Smart-phone, MID, PC, IPTV and etc, increases and the personal online service including the blog, E-mail, UCC, social network service and ect, rapidly increasing for the cloud computing regardless of the terminal anywhere independently and can provide the high vale added personalization service through the analysis of the contents and processing. The future of the personal cloud market is prospected through the service and technology which enhances the understanding about the cloud computing, that is the next generation IT paradigm which the world IT companies pay attention to, and is provided and business strategy analysis of the security and normalizing and related companies.

The Use of Travel-Related WeChat Mini-Programs in China: An Affordance Theory Perspective

  • Cheng, Ao;Koo, Chulmo;Yoon, Hyejin
    • Journal of Smart Tourism
    • /
    • v.1 no.2
    • /
    • pp.37-46
    • /
    • 2021
  • The travel-related applications on a smartphone help tourists make a reservation before their trip conveniently; use a map, direction guidance, and translation services during the travel; evaluate and recommend travel services communicating with others after their journey. This study examines the relationships among affordances and constraints provided by the mini-program, users' perceived value, and travel-related mini-program (TRMP) usage by analyzing the structural equation modeling. An online questionnaire was developed from the available scales in the published literature. A total of 651 TRMP users responded to the survey, and 448 valid responses were included for analysis. Affordance, including physical, cognitive, sensory, and functional affordance, significantly influenced the hedonic value of TRMP; utilitarian value except for cognitive affordance. There were negative relationships between unfamiliarity and both types of value. The utilitarian and hedonic value of TRMP significantly influenced both the exploitative and explorative use of TRMP. Travel-related mobile applications are dramatically increased in the tourism field. This research sheds light on TRMP usage, as a new and smart device, from a user's perspective based on the affordance theory. This study represents a valuable direction regarding the emerging travel-related online platforms in tourism.

An Evaluative Analysis of 'U-KNOU Campus' System and its Mobile Platform

  • Seol, Jinah
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.79-86
    • /
    • 2019
  • This paper is an overview of key elements of Korea National Open University's smart mobile learning system, and an attempt to evaluate its main services relative to the FRAME model and the Mobile Learning Development Model for distance learning in higher education. KNOU improved its system architecture to one based on xMOOC e-learning content delivery while also upgrading its PC-based online/mobile learning services to facilitate an easier and more convenient access to lectures and for better interactivity. From the users' viewpoint, the upgraded 'U-KNOU Campus' allows for a more integrated search capability coupled with better course recommendations and a customized notification service. Using the new system, the students can access not only the school- and peer-issued messages via online bulletin boards but also share information and pose questions to others including to the school faculty/officials and system administrators. Additionally, a new mobile payment method has been incorporated into the system so that the students can select and pay for additional courses from anywhere. In spite of these advances, the issue of device usability and content development remain; specifically U-KNOU Campus needs to improve its instructor-learner and learner-to-learner interactivity and mobile evaluation interface.

Security Enhancement of Lightweight User Authentication Scheme Using Smartcard (스마트카드를 이용한 안전한 경량급 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.209-215
    • /
    • 2020
  • The environment of the Internet provides an efficient communication of the things which are connected. While internet and online service provide us many valuable benefits, online services offered and accessed remotely through internet also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication on client-server environment. In 2016, Ahmed et al. proposed an efficient lightweight remote user authentication protocol. However, Kang et al. show that it's scheme still unstable and inefficient. It cannot resist offline identity guessing attack and cannot provide session key confirmation property. Moreover, there is some risk of biometric information's recognition error. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since we only use hash function and XOR operation.

The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

  • Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.203-209
    • /
    • 2023
  • The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.

EHMM-CT: An Online Method for Failure Prediction in Cloud Computing Systems

  • Zheng, Weiwei;Wang, Zhili;Huang, Haoqiu;Meng, Luoming;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4087-4107
    • /
    • 2016
  • The current cloud computing paradigm is still vulnerable to a significant number of system failures. The increasing demand for fault tolerance and resilience in a cost-effective and device-independent manner is a primary reason for creating an effective means to address system dependability and availability concerns. This paper focuses on online failure prediction for cloud computing systems using system runtime data, which is different from traditional tolerance techniques that require an in-depth knowledge of underlying mechanisms. A 'failure prediction' approach, based on Cloud Theory (CT) and the Hidden Markov Model (HMM), is proposed that extends the HMM by training with CT. In the approach, the parameter ω is defined as the correlations between various indices and failures, taking into account multiple runtime indices in cloud computing systems. Furthermore, the approach uses multiple dimensions to describe failure prediction in detail by extending parameters of the HMM. The likelihood and membership degree computing algorithms in the CT are used, instead of traditional algorithms in HMM, to reduce computing overhead in the model training phase. Finally, the results from simulations show that the proposed approach provides very accurate results at low computational cost. It can obtain an optimal tradeoff between 'failure prediction' performance and computing overhead.

An Analysis on Barriers and Solutions of the Older Adults'Online Information Activities (고령층의 온라인 정보활동 장애요인 및 해결방안 분석)

  • Kim, Heesop;Moon, Jinhyun;Lee, Misook
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.4
    • /
    • pp.79-88
    • /
    • 2014
  • The purpose of this study is to investigate the barriers and the solutions of the older adults' online information activities. The barriers were categorized into 8 and the solutions into 9 based on the literature review. It revealed that the lack of information devices use skill was the most serious barrier in their online information activities, and the results were different according to gender, academic careers, and residential area.; the improvement of information device environment was the most important solution to resolve the barrier, and different according to academic careers, economic status, and residential area contrary to the barrier. To get rid of the digital devide according to socioeconomic variables, a customized education of information literacy and an elderly-oriented information devices are necessary to resolve the barriers.

  • PDF

Efficient Dynamic Index Structure for SSD (SPM) (SSD에 적합한 동적 색인 저장 구조 : SPM)

  • Jin, Du-Seok;Kim, Jin-Suk;You, Beom-Jong;Jung, Hoe-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.54-62
    • /
    • 2010
  • Inverted index structures have become the most efficient data structure for high performance indexing of large text collections, especially online index maintenance, In-Place and merge-based index structures are the two main competing strategies for index construction in dynamic search environments. In the above-mentioned two strategies, a contiguity of posting information is the mainstay of design for online index maintenance and query time. Whereas with the emergence of new storage device(SSD, SCRAM), those do not consider a contiguity of posting information in the design of index structures because of its superiority such as low access latency and I/O throughput speeds. However, SSD(Solid State Drive) is not well suited for traditional inverted structures due to the poor random write throughput in practical systems. In this paper, we propose the new efficient online index structure(SPM) for SSD that significantly reduces the query time and improves the index maintenance performance.

Security Association and Testbed Implementation for Separated Business and Organizational Networks (업무망/기관망의 보안 연결 방안 연구 및 테스트베드 구축)

  • Park, Se-Chul;Jang, In-Sik;Lee, Jae-Yong;Kim, Byung-Chul;Lee, Myung-Sin;Hyun, Dae-Hwan;Chung, Dae-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.12
    • /
    • pp.42-53
    • /
    • 2011
  • As IT industry using networks have been developed explosively, online operations that were conducted in offline are increasing rapidly, and even relationship with other people made online. As online crimes are increasing accordingly, building security networks is getting very important. As a result, network separation between business and organization network has been performed recently, but this causes network user inconvenience and efficiency reduction. In this paper, we propose reassociation methods for already separated networks for many public organizations. We implement two reassociation methods using NAT device and shared storage and show their experimental results.

A Mapping Table Caching Scheme for NAND Flash-based Mobile Storage Devices (NAND 플래시 기반 모바일 저장장치를 위한 사상 테이블 캐싱 기법)

  • Yang, Soo-Hyeon;Ryu, Yeon-Seung
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.21-31
    • /
    • 2010
  • Recently e-business such as online financial trade and online shopping using mobile computes are widely spread. Most of mobile computers use NAND flash memory-based storage devices for storing data. Flash memory storage devices use a software called flash translation layer to translate logical address from a file system to physical address of flash memory by using mapping tables. The legacy FTLs have a problem that they must maintain very large mapping tables in the RAM. In order to address this issues, in this paper, we proposed a new caching scheme of mapping tables. We showed through the trace-driven simulations that the proposed caching scheme reduces the space overhead dramatically but does not increase the time overhead. In the case of online transaction workload in e-business environment, in particular, the proposed scheme manifests better performance in reducing the space overhead.