• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.03 seconds

A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT

  • Tandon, Aditya;Kumar, Pramod;Rishiwal, Vinay;Yadav, Mano;Yadav, Preeti
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1317-1341
    • /
    • 2021
  • Nowadays, the Internet of Things (IoT) is adopted to enable effective and smooth communication among different networks. In some specific application, the Wireless Sensor Networks (WSN) are used in IoT to gather peculiar data without the interaction of human. The WSNs are self-organizing in nature, so it mostly prefer multi-hop data forwarding. Thus to achieve better communication, a cross-layer routing strategy is preferred. In the cross-layer routing strategy, the routing processed through three layers such as transport, data link, and physical layer. Even though effective communication achieved via a cross-layer routing strategy, energy is another constraint in WSN assisted IoT. Cluster-based communication is one of the most used strategies for effectively preserving energy in WSN routing. This paper proposes a Bio-inspired cross-layer routing (BiHCLR) protocol to achieve effective and energy preserving routing in WSN assisted IoT. Initially, the deployed sensor nodes are arranged in the form of a grid as per the grid-based routing strategy. Then to enable energy preservation in BiHCLR, the fuzzy logic approach is executed to select the Cluster Head (CH) for every cell of the grid. Then a hybrid bio-inspired algorithm is used to select the routing path. The hybrid algorithm combines moth search and Salp Swarm optimization techniques. The performance of the proposed BiHCLR is evaluated based on the Quality of Service (QoS) analysis in terms of Packet loss, error bit rate, transmission delay, lifetime of network, buffer occupancy and throughput. Then these performances are validated based on comparison with conventional routing strategies like Fuzzy-rule-based Energy Efficient Clustering and Immune-Inspired Routing (FEEC-IIR), Neuro-Fuzzy- Emperor Penguin Optimization (NF-EPO), Fuzzy Reinforcement Learning-based Data Gathering (FRLDG) and Hierarchical Energy Efficient Data gathering (HEED). Ultimately the performance of the proposed BiHCLR outperforms all other conventional techniques.

BMT Derivation of Evaluation Item about Anti-DDoS SW (Anti-DDoS SW BMT 평가항목 도출)

  • Shin, Suk-Jo;Lee, Jae-Guen;Jo, In-June;Shin, Seok Kyoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.375-378
    • /
    • 2009
  • DDoS attacks make people can't using normal internet service, because DDoS attacks cause exhaustion of network bandwidth or exhaustion of computer system resources by using many personal computers or servers which already infected computer virus from hackers. Recent DDoS attacks attack government brach, financial institution, even IT security company. IT security companies make Anti-DDoS product for defense from DDoS attack. But, There is no standard for BMT of Anti-DDoS product. In this dissertation, Anti-DDoS product quality characteristics of the survey analysis to evaluate them by comparing the assessment items were derived.

  • PDF

The Proposals of Identity Escrow Scheme to Control User's Anonymity (사용자의 익명성을 제어하는 신원 위탁 방식 제안)

  • 황보성;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.617-624
    • /
    • 2000
  • We introduce the concept of a Identity Escrow Scheme, an application of key escrow ideas to solve the problem of authentication. In the Identity Escrow Scheme, the User escrows a own real identity to the Issuer and receives a Authentication Information. In authentication step, between the User to the Service Provider, the User only gives a Authentication Information to the Service Provider. Therefore, the Service Provider don't know a real identity of user's. However, when the User does unlawful actions, the Lawful Agent is called by the Service Provider, and his anonymity is revoked by cooperation of the Issuer and the Lawful Agent. We propose new Identity Escrow Schemes and analyze these.

  • PDF

Progressive Retrieval Method using Intimacy between SNS Users in Internet of Things (사물인터넷에서 소셜 네트워크 사용자 친밀도를 이용한 점진적 검색 기법)

  • Kim, Sungrim;Kwon, Joonhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.1-10
    • /
    • 2018
  • Social network services allow you to share your thoughts and preferences more easily. They share your views with a large number of people who are friends with you without restriction of time or place. In the IoT environment, the amount of data is massively increasing as social network services spread rapidly. This change in the environment is driving the need for research into new retrieval methods that are different from conventional retrieval methods. In this paper, we propose a progressive retrieval method using the intimacy of social network users in the IoT. The first thing is to extract the user with the highest intimacy by using the property that the number of the owner of the information stored in the IoT environment is small. By accessing information in objects owned by these extracted users, the amount of information retrieved is reduced. It also improves retrieval efficiency by gradually retrieving information according to the user's level of interest. We present a new retrieval method and algorithm. The scenario also illustrates the effectiveness of the proposed method.

Studies on Determinant Factors of SCM Performance: From the Supplier Perspective (SCM 성과 결정요인에 관한 통합적 연구: 공급업체 관점으로)

  • Park, Kwang-Oh;Chang, Hwal-Sik
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.1-27
    • /
    • 2011
  • In an attempt to cope with widespread, dynamic, and accelerating changes in both internal and external business environments, companies often utilize information technologies such as SCM(Supply Chain Management). To date, SCM research has mainly focused on the effects of dynamic factors on SCM success and emphasized adoption strategies and critical success factors. Consequently, the effects of more static factors such as interdependency between SCM partners have been largely ignored. The purpose of this study, therefore, is to examine the effects of both dynamic and static factors on SCM performance by controlling for information quality and partnership quality. The five factors examined in this study include innovative ness, mutual dependency, quality of information, partnership quality, and SCM performance. All factors were examined from the perspective of part suppliers, except the mutual dependency which was examined from two aspects: supplier's dependency on customer and customer's dependency on supplier. Data was collected through five hundred survey questionnaires distributed to the part supplier companies that have implemented SCM systems for at least one year. As a result, a total of 170 valid responses were obtained. A structural equation research model was fitted using SAS 9.1.3 and SMART-PLS 2.0. The results of this study can be summarized as follows. First, innovativeness positively affected SCM information quality. SCM partnership quality, and ultimately SCM performance. The path coefficient between innovativeness and information quality was 0.387, with a t-value of 3.528. Innovativeness also had a positively direct effect on partnership quality. The path coefficient was 0.351 with a t-value of 3.366. The total effect of innovativeness on partnership quality was significant, although its indirect effect on partnership quality by altering information quality was negligible. The total indirect effect of innovativeness on SCM performance by affecting information quality and partnership quality was significant with a p-value of 0.014. Innovativeness played an important role in determining SCM performance. Second, mutual dependency showed no significant effect on SCM information quality. This result contradicts the earlier assertion that the more dependent two companies are, the more accurate and timely the information they exchange ought to be. This study showed that this may not be the case; a partner may provide information of poor quality even when it is strongly dependent on the other. Mutual dependency showed significant effect on partnership quality. However, when the mutual dependency perceived by suppliers was divided into two parts, one being a supplier's dependency on its customer company and the other being a customer's dependency on the supplier, the latter showed a significant impact on the perceived SCM partnership quality. This result indicates that a customer company can hardly improve the partnership quality perceived by suppliers by making them more dependent. It improves only when the suppliers perceive that their partners, typically having more bargaining power, are more dependent on them. The overall effect of mutual dependency of any kind on SCM performance, however, was not significant. Although mutual dependency has been mentioned as an important static factor influencing almost every aspect of cooperation on a supply chain, its influences may not be as significant as it was initially perceived to be. Third, the correlation between information quality and partnership quality was 0.448 with a p-value of less than 0.001. Information quality had a path coefficient of 0.256 to partnership quality with a t-value of 2.940. The quality of information exchanged between partners may have an impact on their partnership quality. Fourth, information quality also had a significant impact on SCM performance with a path coefficient of 0.325 with a t-value of 3.611. In this study, SCM performance was divided into four categories: product quality, cost saving, service quality, and order fulfillment. Information quality has Significant impacts on product quality, cost saving and service quality, but not on order fulfillment. Fifth, partnership quality, as expected, had a significant impact on SCM performance. The path coefficient was 0.403 with a t-value of 3.539. Partnership quality, like information quality, had positive impacts on product quality, cost saving and service quality, but showed no impact on order fulfillment. It seemed that order fulfillment is the hardest category of performance that SCM can satisfy. One major limitation of this study is that it surveyed only the suppliers. To better understand the dual aspects of SCM, it is important to survey both suppliers and the assemblers, especially in pairs. This research, to our best knowledge, was the first attempt to study the level of dependency between the two groups by measuring the dual aspects of SCM and studying mutual dependency from the categories of suppliers and assemblers each.. In the future, a more comprehensive and precise measurement of SCM characteristics needs to be achieved by examining from both the supplier's and assembler's perspectives.

Customize Service Platform using Beacon (Beacon을 활용한 사용자맞춤 서비스 플랫폼)

  • Kim, Heejoo;Yang, Seyoung;Lim, Sunghee;Kim, Hyungjong
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.1198-1200
    • /
    • 2017
  • IoT기술이 발전함에 따라 기업에서도 Beacon을 활용하여 다양한 플랫폼서비스를 제공하고 있다. 하지만 오늘날 사용자들은 개인마다 필요로 하는 서비스기능이 다르고 제공되는 상황적 시나리오 또한 한정적이기 때문에 사용자들의 만족을 충족시켜주기에는 무리가 있다. 본 논문에서는 일반적으로 사용하는 기능을 바탕으로 사용자가 직접 기능을 추가할 수 있는 '사용자 지정'기능을 구현하며, 플랫폼의 한계를 극복하였다. 우리의 연구는 비콘이 제공하는 위치정보와 데이터베이스정보와의 효율적인 매핑을 통한 새로운 플랫폼을 구현한다. 비콘을 활용한 플랫폼서비스 연구에 좋은 시작이 될 것이다.

The Service Log Analyser for Blocking Unused Account on Internet Services (인터넷 서비스 미 사용 계정 차단을 위한 서비스 로그 분석기)

  • Jung, Kyu-Cheol;Lee, Jin-Kwan;Lee, Dae-Hyung;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.73-80
    • /
    • 2007
  • The fact that since Internet has been spreaded widely to people, Many security problems also have been grown too much. Due to sudden growth, administrator's responsibility for secure network and services has been growing more and more. This paper represents how to prevent account which didn't use for long period on multi domains environment using service log analysis. hence administrator can find security hole on systems and can dealing with it. The Service Log Analyzer is that loading log file which are written by each service and analyzing them. as a result it makes a list named Used User List contains a number of account names which uses specific services. When the time has come - means cron job schedule time, User Usage Shifter is the next runner. it's mission is finding the person who didn't used service for a specific period of time. Then modifying the expire day of the account information.

  • PDF

Chinese Consumers' Satisfaction with On-line Purchasing Agent Services of Korean Fashion Products according to Their Selection Criteria and Information Source (중국 소비자의 패션상품 선택기준과 정보원 이용에 따른 한국 패션상품 온라인 구매대행 서비스 만족도: 상해지역 20-30대를 중심으로)

  • Liu, Jia;Hwang, Choon-Sup
    • Journal of Distribution Science
    • /
    • v.14 no.11
    • /
    • pp.117-128
    • /
    • 2016
  • Purpose - In order to collect information needed for the establishment of more effective marketing strategies of on-line purchasing agent services targeting Chinese consumers, the study investigated the relationship among Chinese selection criteria. They included fashion products, use of information source, and satisfaction with on-line purchasing agent services. The study also identified the differences in the Chinese selection criteria of fashion products, use of information source, and the satisfaction level with on-line purchasing agent services according to their age and gender. Research design, data, and methodology - The study was implemented through a normative-descriptive survey method using a self-administered questionnaire. Data were collected from February 9 to 28, 2016, and analyzed by factor analysis, ANOVA and Duncan test, t-test, and multiple regression analysis. Results - Differences were found in selection criteria of fashion products and use of information sources among groups. Thirty's age group was concerned about price/brand more than the twenty's were. Twenty's were concerned about practicality/quality of the products more than the thirty's. Hallyu/broadcasting was used by men more than by women as an information source of Korean fashion. SNS/WOM(word of mouth) was used more by women than by man. Twenty's showed lower level of satisfaction with customer services/credibility than other factors. The thirty's showed lower level of satisfaction with informational role of the service than other factors. Those who utilize each type of fashion information source more showed higher satisfaction level with on-line purchasing agent service of Korean fashion products.. In general, according to the selection criteria and use of information, there were differences in satisfaction with on-line purchasing agent service of Korean fashion products. Conclusions - Considering the findings of the study, as well as age, gender, selection criteria and use of information source, Chinese consumers could be used as a criteria of market segmentation for on-line purchasing agent services of Korean fashion products. The results manifested that there is a need to differentiate marketing strategies according to the satisfaction levels with each satisfaction factors of on-line purchasing agent service of Korean fashion products.

The TV Audience's Traits, Media Usage and the Adoption of the Satellite DMB : Focus on the Understanding and Evaluation of the Local TV Audience (시청자 특성, 미디어 이용과 위성 DMB의 수용 : 지역 시청자의 인식과 평가를 중심으로)

  • Lee, Si-Hoon
    • Korean journal of communication and information
    • /
    • v.28
    • /
    • pp.141-169
    • /
    • 2005
  • This study considered the factor of the adoption of the satellite DMB. This study focus on the TV audience's demographic traits and media usage. The results are follows : 1) the elder-aged group, high-educated group and car driver group have high intention to be subscriber for the satellite DMB service. 2) the white collar group and the middle income group have high intention to be subscriber for the satellite DMB service. 3) the many media use group and the many function use of mobile phone group have high intention to be subscriber for the satellite DMB service. 4) the local TV audience like the entertainment genre in video and audio service and the information genre in data service 5) the local TV audience don't mind of the re-transmission territorial broadcasting by the satellite DMB service.

  • PDF

Wireless Supply Web Modeling using Mobile Service (모바일 서비스를 이용한 Wireless Supply Web 모델링)

  • Kim, T.;Kim, H.;Yang, S.;Cha, M.;Suh, D.;Seong, N.
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.89-99
    • /
    • 2004
  • Mobile service, which is related to all stages of supply chain, can enhance the efficiency of perception and response of the participants. The advantage of mobile service is ubiquity, speed, traceability, positioning, personalization and safety. The purpose of this paper is to propose an overall framework utilizing mobile service in SCM. In the areas of inventory management, remote diagnostics, communications with field workers, and order fulfillment, customer-centric mobile supply web is proposed and implemented for the wireless warehousing and replenishment system.