• Title/Summary/Keyword: Web-base

Search Result 597, Processing Time 0.027 seconds

Success Factors of Internet-based Business in the Start-up Phase (창업단계의 인터넷 비즈니스 성공요인에 관한 탐색적 연구)

  • 김승운
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.4
    • /
    • pp.65-84
    • /
    • 2003
  • The Purpose of this study is to Identify and analyze the factors that determine the survival or success of internet-based companies in the start-up phase. The reason why we focus on companies which are in the early stage of development is because internet business is still at its early stage, and statistics indicate that many internet businesses have failed during the start-up phase. Using the model of new product outcomes proposed by Cooper(1979), we have formulated a conceptual model for more successful internet business ventures. On the basis of this model, the relationship between the financial and non-financial performance and various variables in the model is analyzed. For collecting empirical data, a web-based survey questionnaire was designed. A total of 97 usable questionnaires were gathered from internet companies nationwide. The results showed that controllable variables such as the commercial entity and information acquired during the new business process are related to the non-financial performance, while environment variables such as the compatibility of the resource base of the firm with the business, including a few controllable variables, are related to the financial performance. Future research needs to explore more precisely how the success factors are different according to the types of internet businesses and/or the stages of growth of the business.

  • PDF

Eight new species of two genera Dysidea and Euryspongia (Demospongiae: Dictyoceratida: Dysideidae) from Korea

  • Kim, Young A;Lee, Kyung Jin;Sim, Chung Ja
    • Journal of Species Research
    • /
    • v.9 no.1
    • /
    • pp.56-67
    • /
    • 2020
  • Eight new species of two genera Dysidea and Euryspongia (Demospongiae: Dictyoceratida: Dysideidae) are described from Gageodo, Ulleungdo, Geomundo, and Jejudo Islands, Korea. Four new species of the genus Dysidea are differentiated by the fibre structure, cored detritus, and fibre arrangement. Dysidea mureungensis n. sp. is characterized by the honeycomb shape of surface and no distinction between primary and secondary fibres. Dysidea glavea n. sp. differs by large sands cored in fibres and that the membrane easily separates from fibres. Dysidea geomunensis n. sp. has fibres that are thinner than those of D. glavea n. sp.. Dysidea corallina n. sp. is characterized by folded fan shape and the arrangement of secondary fibres. Four new species of the genus Euryspongia are differentiated by the fibre structure, cored detritus, shape of sponge, and fibre arrangement. Euryspongia radicula n. sp. is very different from other species by having regularly arranged fibres. Euryspongia spina n. sp. has a fence-like skeletal structure. Bridged type secondary fibres are arranged near the surface and web types are at the base of fibres. Euryspongia flabellum n. sp. has a very unique wide, thin leaf-like shape. String-like primary fibres of E. linea n. sp. are very unique and cored with large sized sands.

A study of SSO design based SAML for public library clustering (공공도서관 클러스터링을 위해 SAML 기반의 사용자통합인증 설계에 관한 연구)

  • Byeon, Hoi Kyun;Ko, Il Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.55-67
    • /
    • 2008
  • The user has to subscribe to the library so that user use the library service. User has to register at that in order to use of the nearby another library. Moreover, service such as the inter-library loan and returning my loan book to other library in which the mutual cooperation between the library is needed necessity. But it services due to the constraint condition because of the administrative or technical problems. In this paper excludes the administrative element. The web service model is forming the cluster based on the mutual cooperation between the technologically adjacent public library and provides the technologically necessary single sign-on (SSO) in order to support the additional service. The single sign-on of the library which is concluded by this model using the security information exchange standard (Security Assertion Markup Language : SAML), it is processed by XML base. In using this model, the loan information is confirmed in the attribution in return service library and the model can utilize for the return of loan book in other library. It designs the single sign-on about it.

A Design and Implementation for Data Sharing Interface in based XML (XML 기반 데이터 공유 Interface 설계 및 구현)

  • 김철원;김상영;박종훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.424-428
    • /
    • 2004
  • Study related to a system that saves a n document, and to search is consisting actively and has a lot of cases to have left emphasis in the function that these systems efficiently save a XML document and can search. Also, It has a table or the storage structure which was especially designed in order to save a XML document and can save structure information of a document in addition to contents of a XML document together and can efficiently do content retrieval of a XML document or a structure search with an early base. As for this paper, a design implemented the data which the many different kinds of database that had currently used had with you so that did recycling and shared conversion and this XML file in Web, and output can become a XML format through various interrace.

  • PDF

A User Class-based Service Filtering Policy for QoS Assurance (QoS 보장을 위한 사용자 등급 기반 서비스 수락 정책)

  • Park, Hea-Sook;Ha, Yan;Lee, Soon-Mi
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.293-298
    • /
    • 2004
  • To satisfy the requirements for QoS and acceptance ratio of the users using multimedia content service, it is required to control mechanism for QoS assurance and allocation of the stream server' resources based on CoS(Class of Service). To compare performance of the algorithm, we have classified the user by two classes (super class, base class) and control the acceptance ratio of user's requests by user's class information. We have experimented the test of network resources and test of processing time under server/client environment and agent environment. MA-URFA based on agent increases the acceptance ratio of super class and utilization ratio of network resources.

A Study on Legal Ontology Construction (법령 온톨로지 구축에 관한 연구)

  • Jo, Dae Woong;Kim, Myung Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.11
    • /
    • pp.105-113
    • /
    • 2014
  • In this paper, we propose an OWL DL mapping rules for construction legal ontology based on the analyzed relationship between the structural features and elements of the statute. The mapping rule to be proposed is the method building the structure of the domestic statute, unique attribute of the statute, and reference relation between laws with TBox, and the legal sentence is analyzed, and the pattern type of the sentence is selected. It expresses with ABox. The proposed mapping rule is transformed to the information in which the computer can process the domestic legal document. It is usable for the legal knowledge base.

Sports Leadership Theories for Improving Retail Service Quality on Customer Value

  • SEONG, Dong-Ho
    • Journal of Distribution Science
    • /
    • v.19 no.5
    • /
    • pp.13-21
    • /
    • 2021
  • Purpose: The sports leadership theories are crucial in ensuring the success of corporations. This study shall discuss the various leadership theories employed in the sports industry and how they can be incorporated within the retailing sector to enhance the service quality and promote substantial customer value towards all the consumers visiting the retailing stores. Research design, data and methodology: The present researcher gathered textual data on potential solutions for coding of development through web searching method and coded and produced various topics as solution providers. Methods were then established to enhance quality on customer value by the leadership within their businesses, and the researcher subsequently presented the findings. Results: This study provides a total of nine solutions which are helpful systemically for practitioners in the retailer service sector. These numerous solutions can be incorporated within the retail industry through the sports leadership theories employed in the sports industry to help achieve a full and strong customer value. Conclusions: Finally, the present study concludes that the retail industry and management need to ensure that a substantial customer value is built through high-quality services rendered towards the clientele base, employing sports leadership theories such as path-goal, authentic leadership, transformation, situational and leader-member exchange theories.

Anomalies of the clivus of interest in dental practice: A systematic review

  • McCartney, Troy E.;Mupparapu, Mel
    • Imaging Science in Dentistry
    • /
    • v.51 no.4
    • /
    • pp.351-361
    • /
    • 2021
  • Purpose: The clivus is a region in the anterior section of the occipital bone that is commonly imaged on large-volume cone-beam computed tomography (CBCT). There have been several reports of incidental clivus variations and certain pathological entities that have been attributed to the variations. This study aimed to evaluate the effects of these variations within the scope of dentistry. Materials and Methods: Medical databases (PubMed, Scopus, and Web of Science) were searched using a controlled vocabulary (clival anomalies, cone-beam CT, canalis basilaris medianus, fossa navicularis magna, clival variation). The search was limited to English language, humans, and studies published in the last 25 years. The articles were exported into RefWorks® and duplicates were removed. The remaining articles were screened and reviewed for supporting information on variations of the clivus on CBCT imaging. Results: Canalis basilaris medianus and fossa navicularis magna were the most common anomalies noted. Many of these variations were asymptomatic, with most patients unaware of the anomaly. In certain cases, associated pathologies ranged from developmental (Tornwaldt cyst), to acquired (recurrent meningitis). While no distinct pathognomonic aspects were noted, there were unique patterns of radiographic diagnosis and treatment modalities. Most patients had a normal course of follow-up. Conclusion: Interpretation of CBCT volumes is a skill every dentist must possess. When reviewing large-volume CBCT scans, the clinician should be able to distinguish pathology from normal anatomic variations within the skull base. The majority of clivus variations are asymptomatic and will remain undetected unless incidentally noted on radiographic examinations.

Fake News Detector using Machine Learning Algorithms

  • Diaa Salama;yomna Ibrahim;Radwa Mostafa;Abdelrahman Tolba;Mariam Khaled;John Gerges;Diaa Salama
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.195-201
    • /
    • 2024
  • With the Covid-19(Corona Virus) spread all around the world, people are using this propaganda and the desperate need of the citizens to know the news about this mysterious virus by spreading fake news. Some Countries arrested people who spread fake news about this, and others made them pay a fine. And since Social Media has become a significant source of news, .there is a profound need to detect these fake news. The main aim of this research is to develop a web-based model using a combination of machine learning algorithms to detect fake news. The proposed model includes an advanced framework to identify tweets with fake news using Context Analysis; We assumed that Natural Language Processing(NLP) wouldn't be enough alone to make context analysis as Tweets are usually short and do not follow even the most straightforward syntactic rules, so we used Tweets Features as several retweets, several likes and tweet-length we also added statistical credibility analysis for Twitter users. The proposed algorithms are tested on four different benchmark datasets. And Finally, to get the best accuracy, we combined two of the best algorithms used SVM ( which is widely accepted as baseline classifier, especially with binary classification problems ) and Naive Base.

SANET-CC : Zone IP Allocation Protocol for Offshore Networks (SANET-CC : 해상 네트워크를 위한 구역 IP 할당 프로토콜)

  • Bae, Kyoung Yul;Cho, Moon Ki
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.87-109
    • /
    • 2020
  • Currently, thanks to the major stride made in developing wired and wireless communication technology, a variety of IT services are available on land. This trend is leading to an increasing demand for IT services to vessels on the water as well. And it is expected that the request for various IT services such as two-way digital data transmission, Web, APP, etc. is on the rise to the extent that they are available on land. However, while a high-speed information communication network is easily accessible on land because it is based upon a fixed infrastructure like an AP and a base station, it is not the case on the water. As a result, a radio communication network-based voice communication service is usually used at sea. To solve this problem, an additional frequency for digital data exchange was allocated, and a ship ad-hoc network (SANET) was proposed that can be utilized by using this frequency. Instead of satellite communication that costs a lot in installation and usage, SANET was developed to provide various IT services to ships based on IP in the sea. Connectivity between land base stations and ships is important in the SANET. To have this connection, a ship must be a member of the network with its IP address assigned. This paper proposes a SANET-CC protocol that allows ships to be assigned their own IP address. SANET-CC propagates several non-overlapping IP addresses through the entire network from land base stations to ships in the form of the tree. Ships allocate their own IP addresses through the exchange of simple requests and response messages with land base stations or M-ships that can allocate IP addresses. Therefore, SANET-CC can eliminate the IP collision prevention (Duplicate Address Detection) process and the process of network separation or integration caused by the movement of the ship. Various simulations were performed to verify the applicability of this protocol to SANET. The outcome of such simulations shows us the following. First, using SANET-CC, about 91% of the ships in the network were able to receive IP addresses under any circumstances. It is 6% higher than the existing studies. And it suggests that if variables are adjusted to each port's environment, it may show further improved results. Second, this work shows us that it takes all vessels an average of 10 seconds to receive IP addresses regardless of conditions. It represents a 50% decrease in time compared to the average of 20 seconds in the previous study. Also Besides, taking it into account that when existing studies were on 50 to 200 vessels, this study on 100 to 400 vessels, the efficiency can be much higher. Third, existing studies have not been able to derive optimal values according to variables. This is because it does not have a consistent pattern depending on the variable. This means that optimal variables values cannot be set for each port under diverse environments. This paper, however, shows us that the result values from the variables exhibit a consistent pattern. This is significant in that it can be applied to each port by adjusting the variable values. It was also confirmed that regardless of the number of ships, the IP allocation ratio was the most efficient at about 96 percent if the waiting time after the IP request was 75ms, and that the tree structure could maintain a stable network configuration when the number of IPs was over 30000. Fourth, this study can be used to design a network for supporting intelligent maritime control systems and services offshore, instead of satellite communication. And if LTE-M is set up, it is possible to use it for various intelligent services.