• Title/Summary/Keyword: Trip Function

Search Result 102, Processing Time 0.026 seconds

Evaluation of MOS for the Access Delay of Internet Service (인터넷 서비스의 접속지연에 대한 MOS 평가)

  • Lee, Hoon;Lee, Young-Ok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.900-907
    • /
    • 2009
  • With the introduction of the concept such as QoS, QoE, and MOS for the multimedia services over the high-speed network the user's concern about the degradation in the perceived quality of service for the conventional data service has become a new problem to the Internet service providers. In this work we propose a method to evaluate the subjective QoE such as MOS for the high-speed Internet service, where the round trip time for the data transfer is taken into account as a performance parameter for the experienced delay. We develop a tool to evaluate an MOS that enables us to investigate the behavior of users for diverse delay times for the web access service, via which we analyze the sensitivity of users with regard to MOS as a function of delay.

An EDA Analysis of Seoul Metropolitan Area's Mountain Usage Patterns of Users in Their 20~30s after COVID-19 Occurrence

  • Lee, BoBae;Yeon, PoungSik
    • Journal of People, Plants, and Environment
    • /
    • v.24 no.2
    • /
    • pp.229-244
    • /
    • 2021
  • Background and objective: The purpose of this study was to comprehensively analyze the user behavior in order to cope appropriately with the increasing demand for mountain usage of those in their 20s and 30s and to allocate resources efficiently. Methods: To analyze the behavior of mountain hiking users, an exploratory data analysis (EDA) was conducted on the data which had been collected in the app Tranggle. The main target are users in their 20s and 30s who visited the mountains in the metropolitan area in 2019-2020. Among them, we have selected data on the top 13 mountains based on the frequency of visits. After data pre-processing, mountain usage patterns were analyzed through statistical analysis and visualization. Results: Compared to 2019, the number of users in 2020 increased 1.36 times. The utilization rate of the well-established hiking trails has also increased. The usage of mountain on weekends (Saturday > Sunday) was still the highest, and the difference in the usage between the days of the week decreased. Outside of work hours, early morning usage has increased and night-time usage has decreased. There was no significant change in usages depending on activity type, level (experience point) and exercise properties. Conclusion: Since the COVID-19 outbreak, the usage of mountains has been changing towards low user density and short-distance trip. in the post-COVID-19 era, the function and role of forests in daily life are expected to increase. To cope with this, further research needs to be carried out with consideration of the wider demographic and social characteristics.

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.

The Effect of Deal-Proneness in the Searching Pattern on the Purchase Probability of Customer in Online Travel Services (소비자 키워드광고 탐색패턴에 나타난 촉진지향성이 온라인 여행상품 구매확률에 미치는 영향)

  • Kim, Hyun Gyo;Lee, Dong Il
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.39 no.1
    • /
    • pp.29-48
    • /
    • 2014
  • The recent keyword advertising does not reflect the individual customer searching pattern because it is focused on each keyword at the aggregate level. The purpose of this research is to observe processes of customer searching patterns. To be specific, individual deal-proneness is mainly concerned. This study incorporates location as a control variable. This paper examines the relationship between customers' searching patterns and probability of purchase. A customer searching session, which is the collection of sequence of keyword queries, is utilized as the unit of analysis. The degree of deal-proneness is measured using customer behavior which is revealed by customer searching keywords in the session. Deal-proneness measuring function calculates the discount of deal prone keyword leverage in accordance with customer searching order. Location searching specificity function is also calculated by the same logic. The analyzed data is narrowed down to the customer query session which has more than two keyword queries. The number of the data is 218,305 by session, which is derived from Internet advertising agency's (COMAS) advertisement managing data and the travel business advertisement revenue data from advertiser's. As a research result, there are three types of the deal-prone customer. At first, there is an unconditional active deal-proneness customer. It is the customer who has lower deal-proneness which means that he/she utilizes deal-prone keywords in the last phase. He/she starts searching a keyword like general ones and then finally purchased appropriate products by utilizing deal-prone keywords in the last time. Those two types of customers have the similar rates of purchase. However, the last type of the customer has middle deal-proneness; who utilizes deal-prone keywords in the middle of the process. This type of a customer closely gets into the information by employing deal-prone keywords but he/she could not find out appropriate alternative then would modify other keywords to look for other alternatives. That is the reason why the purchase probability in this case would be decreased Also, this research confirmed that there is a loyalty effect using location searching specificity. The customer who has higher trip loyalty for specificity location responds to selected promotion rather than general promotion. So, this customer has a lower probability to purchase.

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

An Analysis on Consumers' Awareness of a Rural Specialties Exhibition Shop and the Design Development : Focusing on Rural Tourism Village (농촌 농특산품 전시판매시설 디자인 소비자 의식 분석 및 디자인 개발 - 농촌관광마을을 중심으로 -)

  • Jin, Hye-Ryeon;Seo, Ji-Ye;Jo, Lok-Hwan
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.4
    • /
    • pp.253-262
    • /
    • 2014
  • This, an association research for design-improvement and model-development of exhibition shops at rural tourism communities, is to secure objective data by analyzing customers' awareness-tendency of and demand for agricultural-specialty exhibition shops. Survey-questions for finding out consumers' awareness-tendency and demand were determined through brainstorming of a professional council, 30 rural communities of which visit-rate by consumers is considerably high were selected for the recruit of 200 consumers. For investigation and analysis, survey and in-depth interview were carried out at the scene with the application of frequency analysis and summarization of their opinions, which revealed that they have a strong will to visit the rural tourism communities for the purchase of agricultural specialties along with the experience of learning-program and on-the-scene direct dealing and that their viewpoint on the direct dealing at the scene was very positive. Also it was confirmed hat their satisfaction with the purchase of agricultural specialties by on-the-scene direct dealing, their pleasure at the purchase, their satisfaction with services and their intention for re-purchase of them were very high while their satisfaction with the exhibition shops was very low. With on-the-scene survey, the consumers' opinions could be listened to in depth. Almost all of them said their satisfaction with the trip to those rural tourism communities was considerably high since they could go to those communities themselves to relieve the stress from their modern life, to experience healing and to see the goods on the scene. Their satisfaction also was attributed to the fact that they have enough trust in purchase along with feeling the warm-heartedness of rural residents. As to their awareness of exhibition shops, they showed a positive response to the on-the-scene direct dealing at rural communities while they, thinking that the space in those exhibition shops was not sufficiently wide, demanded for more systematic counters in more accessible and affordable exhibition shops so that they might be more satisfied with the exhibition shops. Their demand for the necessity of exhibition shops selling agricultural specialties was found to be over 80%, which indicates that the necessity is very high. As to the suitability of function, they have the opinion that the business at those shops had better be focused on sales since they have the understanding of information when they take a trip to the rural communities, while there was another opinion: since agricultural products are seasonal items they should be exhibited and sold at the same time. More than 90% of the respondents had a positive viewpoint on direct dealing of agricultural specialties on the scene, which showed that their response to it was very high. They preferred the permanent shops equipped with roll-around table-booths. In addition, it was revealed that they want systematic exhibition shops in rural communities because they frequent those communities for on-the-scene direct purchase. The preferred type and opinion resulting from estimation of consumers' demands have been reflected for development of practical designs. The structure of variable principles has been designed so that the types of display-case and table-booth might be created. The result of this study is a positive data as a design model which can be utilized at rural communities and will be commercialized for the verification of its validity.

Implementation of a Predictor for Cell Phase Monitoring at the OLT in the ATM-PON (ATM-PON의 OLT에서 상향 셀 위상감시를 위한 예측기의 구현)

  • Mun, Sang-Cheol;Chung, Hae;Kim, Woon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.2C
    • /
    • pp.160-169
    • /
    • 2002
  • An ATM-PON (Passive Optical Network) system consists of an OLT (Optical Line Termination), multiple ONUs (Optical Network Units) and the optical fiber which has a PON (Passive Optical Network)configuration with a passive optical splitter. To avoid cell collisions on the upstream transmission, an elaborate procedure called as ranging is needed when a new ONU is installed. The ONU can send upstream cells according to the grant provided by the OLT after the procedure. To prevent collisions being generated by the variation of several factors, OLT must performs continuously the cell phase monitoring. It means that the OLT predicts the expected arrival time, monitors the actual arrival time for all upstream cells and calculates the error between the times. Accordingly, TC (Transmission Convergence) chip in the OLT needs a predictor which predicts the time that the cell will arrive for the current grant. In this paper, we implement the predictor by using shift registers of which the length is equivalent to the equalized round trip delay. As each register consists of 8 bit, OLT can identify which ONU sends what type of cell (ranging cell, user cell, idle cell, and mini-slot). Also, TC chip is designed to calculate the effective bandwidth for all ONUs by using the function of predictor. With the time simulation and the measurement of an implemented optical board, we verify the operation of the predictor.

Estimates of Time-varying Values of Traffic Information on Variable Message Sign (첨두 및 비첨두시 VMS 교통정보의 가치 변화 연구)

  • Rhee, Kyoung-Ah;Lee, Young-Ihn
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.1
    • /
    • pp.135-147
    • /
    • 2012
  • The benefit of traffic information on variable message sign can be divided into two. At the public level, the benefit of ATIS is the travel time saving, which is not only induced from ATIS, but also mixed with that of ATMS. In the economic appraisal of ITS, the benefit of ATIS has so far been regarded as the derived benefit from ATMS. At the user level, the benefit of ATIS is reduced driver uncertainty through the forward traffic status information. User can benefit from the information on VMS and therefore may have the willingness to pay for it. Recently attempt to qualify the value of information on VMS was increased, but there was a danger of distorting or over-estimates of the ATIS benefit because the related studies didn't consider the time-dependent attributes of traffic information and provided the single value. Estimates of the time-varying value should be needed for a rigorous economic appraisal of ATIS. In this study, we varied the value of information on VMS according to peak and non peak trip and verified the hypothesis that time-varying of value was statistically significant.

Fault Tolerant Design of Universal Soft Controller for Advanced Power Reactor (신형원전(APR+)을 위한 범용소프트제어기의 내고장성 설계)

  • Ye, Song-Hae;Lyou, Joon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.279-286
    • /
    • 2012
  • Recently, design of Universal Soft Controller(USC) has been applied to the advanced control room for nuclear power plant. USC is software-based manual control means to control safety components as well as non-safety components in the highly-integrated control room. Therefore, design feature of USC is essential for the implementation of a single workstation in the advanced control room. The traditional control room is replaced by computer-driven consolidated operator interfaces. Considering our design has further reduced the probability of USC spurious signals by requiring two distinct operator control actions to generate any control signal. The reality of USC does not increase the probability of reactor trip because the probability of spurious USC signal is negligible. Universal Soft Control represents a significant evolution in nuclear I&C/HSI System. USC integrates the indicators and controls from multiple divisions into a single integrated visual display unit(VDU) based HSI(Human System Interface). In order to prevent adverse influence on safety function performance from USC failure, ESFAS signals are applied to safety components or functions. In addition, safety manual switches have priority over USC's signals. Therefore, spurious USC signals can be momentarily blocked by selecting a soft control command from the safety VDU.

A Study on Pet-monitoring Robot Design (애완견 모니터링 로봇 디자인 연구)

  • Chung, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.463-471
    • /
    • 2017
  • Recently, the number of pet-owning households drastically increased and many people took their pets as lifelong companion animals and look after them like their children. Pet business has continued to increase gradually and the need for pet supplies has increased, too. Though there are a variety of pet supplies in pet dog market which takes up many parts in the pet market, there is no design guideline on pet supplies. Thus, there are many wrong pet supplies design created by wrong idea of people. Therefore, this study aims to suggest the guideline on pet supplies design focusing on the pet-monitoring system among the various pet products. So, the pet-monitoring robot was designed to monitor pet simply using smartphone anywhere on the trip and feed by using bowl that control the signal. This study figured out types and function of existing IP camera, reflected the behavior and physical characteristics of pets and suggested the design guideline which is minimum required as pet-monitoring products. Also, trial product for which design guide was applied was produced to observe the pet behavior and identify problems while operating trial product. However, there was limit in securing data and study period to examine the satisfaction of various pets since the subject of this study was dog and it's required to conduct follow-up study by observing continuously and improving the problems in future to secure more data.