• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.026 seconds

The effect of Korean dentist's stereotyping on service behavioral intention toward North Korean refugees (남한 치과의사의 북한이탈주민에 대한 고정관념이 서비스 행동의도에 미치는 영향)

  • Kim, Yu-Kyoung;Kim, Yong-Beom;Noh, Hyun-Jong;Myoung, Hoon
    • Journal of Korean society of Dental Hygiene
    • /
    • v.13 no.1
    • /
    • pp.45-60
    • /
    • 2013
  • Objectives : The number of North Korean refugees is remarkably increasing nowadays and there are many social and cultural issues related to their settlements in Korea. Stereotyping of group is generally unique and has influences on emotions and behaviors. The aim of this study was to investigate the relationship among stereotyping, emotion and service behavior of South Korean dentist towards North Korean refugee. Methods : Questionnaires for stereotyping, emotions and service behaviors were devised based on previous researches. Two-hundred and eighteen Korean dentists were randomly chosen and questionnaires were distributed. Correlation analysis, reliability analysis and primary component analysis were performed. Student t-test and one-way ANOVA were done to elucidate differences according to demographic factors. To examine the relationship among constructs, regression analysis was performed. Results : Stereotyping, emotions, and service behaviors are significantly related each other construct. South Korean dentists' stereotyping and emotions toward North Korean refugees are significantly different from those toward South Korean but service behavioral intentions were not different according to any demographic factor. Conclusions : The results imply that more contacts and education system are necessary to South Korean dentists to change their negative stereotyping and emotions toward North Korean refugees although their service behaviors are not affected at the moment.

A Minimum Energy Consuming Mobile Device Relay Scheme for Reliable QoS Support

  • Chung, Jong-Moon;Kim, Chang Hyun;Lee, Daeyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.618-633
    • /
    • 2014
  • Relay technology is becoming more important for mobile communications and wireless internet of things (IoT) networking because of the extended access network coverage range and reliable quality of service (QoS) it can provide at low power consumption levels. Existing mobile multihop relay (MMR) technology uses fixed-point stationary relay stations (RSs) and a divided time-frame (or frequency-band) to support the relay operation. This approach has limitations when a local fixed-point stationary RS does not exist. In addition, since the time-frame (or frequency-band) channel resources are pre-divided for the relay operation, there is no way to achieve high channel utilization using intelligent opportunistic techniques. In this paper, a different approach is considered, where the use of mobile/IoT devices as RSs is considered. In applications that use mobile/IoT devices as relay systems, due to the very limited battery energy of a mobile/IoT device and unequal channel conditions to and from the RS, both minimum energy consumption and QoS support must be considered simultaneously in the selection and configuration of RSs. Therefore, in this paper, a mobile RS is selected and configured with the objective of minimizing power consumption while satisfying end-to-end data rate and bit error rate (BER) requirements. For the RS, both downlink (DL) to the destination system (DS) (i.e., IoT device or user equipment (UE)) and uplink (UL) to the base station (BS) need to be adaptively configured (using adaptive modulation and power control) to minimize power consumption while satisfying the end-to-end QoS constraints. This paper proposes a minimum transmission power consuming RS selection and configuration (MPRSC) scheme, where the RS uses cognitive radio (CR) sub-channels when communicating with the DS, and therefore the scheme is named MPRSC-CR. The proposed MPRSC-CR scheme is activated when a DS moves out of the BS's QoS supportive coverage range. In this case, data transmissions between the RS and BS use the assigned primary channel that the DS had been using, and data transmissions between the RS and DS use CR sub-channels. The simulation results demonstrate that the proposed MPRSC-CR scheme extends the coverage range of the BS and minimizes the power consumption of the RS through optimal selection and configuration of a RS.

An Achievement of High-rate Digital Subscriber Lines(HDSL) Interface Function into the ATM Switching System and its Service Implementation (ATM에HDSL 정합 기능 및 서비스 구현)

  • Yang, Choong-Reol;Chang, J.D.;Kim, J.T.;Kang, S.Y.;Kim, W.W.
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2378-2390
    • /
    • 1997
  • We, in this paper, have implemented E1 HDSL(high-bit-rate digital subscriber line) function over an ATM switching system. The maximum loop lengths for subscriber service and cell loss rates to meet the bit error rate of $10^{-7}$ at transmission of 2B1Q HDSL data of E1 rate over existing telephone copper wires in the presense of the significant impairments such as crosstalk, impulse noise, power line noise and longitudinal over the CSAs environment consisting of 26 gauge and 24 gauge unloaded copper telephone lines has assessed. We have confirmed the typical media services function such as video on demand(VOD) service for MPEG-1, image conference service and high-speed Internet access service over ATM switching system.

  • PDF

A Study on the Case Study of Internet Menu-Delivery-Web Site (인터넷 식단 배송 사이트의 내용 사례연구)

  • 진양호;원혜영
    • Culinary science and hospitality research
    • /
    • v.10 no.2
    • /
    • pp.59-71
    • /
    • 2004
  • This study .is about marketing of menu-delivery-web site through internet which is getting bigger in working-together-couples. The purpose of this study is suggesting the way which can make internet marketing to activate by means of analysing of a certain enterprise's homepage with marketing mix method. We draw the findings which is seperated by goods, price, promotion, distribution, other service according to marketing constituents. As a result of research, it was found that each company has given much more weight on some part in internet marketing's field of activity. In general, they put an empasis on activity of goods and promotion. On the other hands they didn't consider prices and delivery to be important compared with other parts. In a field of price, menu-site just announced price but in further advance, it had better offer and compare two price level when customer used menu-delivery-web site or not. And that site needed to promote and to be advertised what customer who just think using web site was expensive have benefit in the price. One of the most important things about internet-marketing was that fast and exact feedback and community made each enterprise to be able to help to communicate with customer. For these strategy to execute effectively, first company's name should be known well and goods and service the company had should be well advertised. But first of all, differentiated strategy should precede through consistency of taste and quality, consistant information update as a internet-company and sincere homepage management.

  • PDF

Modified Deep Reinforcement Learning Agent for Dynamic Resource Placement in IoT Network Slicing

  • Ros, Seyha;Tam, Prohim;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.17-23
    • /
    • 2022
  • Network slicing is a promising paradigm and significant evolution for adjusting the heterogeneous services based on different requirements by placing dynamic virtual network functions (VNF) forwarding graph (VNFFG) and orchestrating service function chaining (SFC) based on criticalities of Quality of Service (QoS) classes. In system architecture, software-defined networks (SDN), network functions virtualization (NFV), and edge computing are used to provide resourceful data view, configurable virtual resources, and control interfaces for developing the modified deep reinforcement learning agent (MDRL-A). In this paper, task requests, tolerable delays, and required resources are differentiated for input state observations to identify the non-critical/critical classes, since each user equipment can execute different QoS application services. We design intelligent slicing for handing the cross-domain resource with MDRL-A in solving network problems and eliminating resource usage. The agent interacts with controllers and orchestrators to manage the flow rule installation and physical resource allocation in NFV infrastructure (NFVI) with the proposed formulation of completion time and criticality criteria. Simulation is conducted in SDN/NFV environment and capturing the QoS performances between conventional and MDRL-A approaches.

A Study on u-Care Service for the Health and Safety of the Elderly Living Alone (1인 가구 고령자의 건강과 안전을 위한 u-Care에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.59-64
    • /
    • 2017
  • Korea is experiencing a rapid increase in the number of elderly living alone accompanying the aging society problem, a nd is making efforts to solve the problem through the policy of 'living alone u-care service'. The purpose of this study is to propose a better u-Care service improvement method by applying new technology to improve the user experience of ucare service for the health and safety of the elderly living alone. First, the improvement of u-Care service for elderly livin g alone by applying IoT technology. It provides remote monitoring service using health information data measured through wearable device, and transmits personal health status to medical institution by using personal device such as smart phone, so that remote medical consultation or telemedicine can be connected in the future. Second, improvement of u-Care service through consideration of emotional stability of elderly living alone as well as simple safety and health care through applica tion of emotional service robot technology.It is expected that it will be able to help independent living of one person's elde rly person in the future by providing caring function service to existing u-care service providing service.

Method of scalable video application in the advanced T-DMB (지상파 DMB 고도화 망에서의 스케일러블 비디오 부호화 기술)

  • Jun, Dong-San;Kwak, Sang-Min;Lim, Hyung-Soo;Choi, Hae-Chul;Kim, Jae-Gon;Lim, Jong-Soo;Hong, Jin-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.1
    • /
    • pp.1-9
    • /
    • 2007
  • Digital Multimedia Broadcasting is the next generation broadcasting service which enables various digital multimedia contents, i.e., audio and video, and data access for mobile users. However, due to the bandwidth limitation, the spatial resolution is limited to CIF(Common Interleaved Frame). The Advanced Terrestrial DMB (AT-DMB) secures additional bandwidth by adopting hierarchical modulation transmission technology and provides high data rate and quality for mobile multimedia broadcasting services with scalable video coding(SVC). This paper proposes scalable video coding technology for AT-DMB which enables high quality mobile multimedia broadcasting services that exceeds current DMB service's quality and contents capability.

CHALLENGES FOR THE NEW MILLENNIUM FOR STOCK ASSESSMENT SCIENTISTS

  • Sakagawa, Gary T.
    • Proceedings of the Korean Society of Fisheries Technology Conference
    • /
    • 2000.05a
    • /
    • pp.327-327
    • /
    • 2000
  • In the 1990's several economically important marine fisheries collapsed or showed signs of extreme hardship owing to overcapitalization and excessive fishing pressure on the resources. Public concern was raised and demands voiced for more prudent fishery management practices. The United Nations responded and developed international guidelines, such as the FAO Code of Conduct for Responsible Fishing and the UN Straddling Fish Socks and Highly Migratory Fish Stocks Agreement These guidelines task fishery managers to take prudent steps to ensure the long-term viability of fisheries and fishery resources. Included in the guidelines are two particular demands that will challenge stock assessment scientists in the new millennium. They are application of the precautionary approach and the inclusion of ecological considerations in assessments and management advice. High-lighted in the presentation are examples from the central-western Pacifi skipjack tuna fishery and the eastern Pacific thresher shark fishery where insufficien information is affecting stock assessments. The shortcomings are further linked t the new challenges of applying the precautionary approach, such as reference points, and ecological considerations, such as predator-prey and oceanographic-regime shift.(omitted)

  • PDF

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.

Cross-Technology Localization: Leveraging Commodity WiFi to Localize Non-WiFi Device

  • Zhang, Dian;Zhang, Rujun;Guo, Haizhou;Xiang, Peng;Guo, Xiaonan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3950-3969
    • /
    • 2021
  • Radio Frequency (RF)-based indoor localization technologies play significant roles in various Internet of Things (IoT) services (e.g., location-based service). Most such technologies require that all the devices comply with a specified technology (e.g., WiFi, ZigBee, and Bluetooth). However, this requirement limits its application scenarios in today's IoT context where multiple devices complied with different standards coexist in a shared environment. To bridge the gap, in this paper, we propose a cross-technology localization approach, which is able to localize target nodes using a different type of devices. Specifically, the proposed framework reuses the existing WiFi infrastructure without introducing additional cost to localize Non-WiFi device (i.e., ZigBee). The key idea is to leverage the interference between devices that share the same operating frequency (e.g., 2.4GHz). Such interference exhibits unique patterns that depend on the target device's location, thus it can be leveraged for cross-technology localization. The proposed framework uses Principal Components Analysis (PCA) to extract salient features of the received WiFi signals, and leverages Dynamic Time Warping (DTW), Gradient Boosting Regression Tree (GBRT) to improve the robustness of our system. We conduct experiments in real scenario and investigate the impact of different factors. Experimental results show that the average localization accuracy of our prototype can reach 1.54m, which demonstrates a promising direction of building cross-technology technologies to fulfill the needs of modern IoT context.