• 제목/요약/키워드: connectivity management

검색결과 399건 처리시간 0.029초

모바일 인터넷의 사용에 영향을 미치는 중요 요인에 대한 실증적 연구 (An Empirical Research on Important Factors of Mobile Internet Usage)

  • 김호영;김진우
    • Asia pacific journal of information systems
    • /
    • 제12권3호
    • /
    • pp.89-113
    • /
    • 2002
  • As Mobile Internet users grow rapidly, Mobile Internet Companies will be in a fierce race to catch a new customer. In this situation, companies want to identify of what factors make peoples use Mobile Internet in order to develop the effective Mobile Internet services and to supply the higher service quality. However, prior researches on Mobile Internet focused on technical area such as higher data delivery, efficient compression of images, so they do not have given companies beneficial materials for making fascinating Mobile Internet service. To offer the service development materials, this research investigated important factors to use Mobile Internet from the viewpoint of customer. Moreover, the study was progressed how much these factors influenced Mobile Internet actual usage. After being surveyed service adopting model and significant factors in Marketing and in MIS(Management Information System), this study was suggested Mobile Internet Adopting Model reflected in Mobile Internet characteristics. To collect the effective data, Internet survey had been done for two weeks. The respondents were identified if they were real Mobile Internet users and how much they had used Mobile Internet for a month. The results were that important factors of Mobile Internet usage were Usefulness, Usability, System Quality and Instant Connectivity. Perceived Value of Mobile Internet influenced Mobile Internet Behavioral Intention significantly and Behavioral Intention had a significant effect on Mobile Intent usage by results. This paper concludes with discussion of these results and their implications for researcher and Mobile Internet company managers.

물류산업에서의 클라우드 컴퓨팅 활용 방안 (Deployment of Cloud Computing in Logistics Industry)

  • 정재운;김현수
    • 디지털융복합연구
    • /
    • 제12권2호
    • /
    • pp.163-171
    • /
    • 2014
  • 클라우드 컴퓨팅(클라우드)은 물류정보시스템이 갖는 취약점(표준화할 수 없는 복잡 다양한 방식, 지리적 산재 및 매끄럽지 못한 연계성 등)의 보완 및 물류의 혁신적 활동을 지원할 수 있는 안성맞춤의 기술로 여겨진다. 이러한 의미에서 본 연구는 물류산업에 특화된 클라우드 활용 방안을 연구하고자 하였다. 이를 위해 물류분야의 클라우드 관련 최신 동향 분석, 물류산업에서 필요로 하는 클라우드와 플랫폼, 도입 방안에 대한 분석을 진행하였다. 본 연구는 후속연구에서 물류분야에 특화된 클라우드의 개발 방향을 설정하고, 보다 구체화된 클라우드를 개발하는 데 시사점을 제공한다.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

4차산업혁명시대의 R&D 프로세스 고찰과 제안 (A Study on the R&D Process of the 4th Industrial Revolution Era)

  • 백창화;최재호;임성욱
    • 품질경영학회지
    • /
    • 제45권4호
    • /
    • pp.697-708
    • /
    • 2017
  • Purpose: The purpose of this study is to investigate the characteristics and limitations of various R&D processes. And to propose new R&D processes by analyzing the characteristics of the era of the fourth industrial revolution that will lead to innovative changes throughout the industry. Methods: Research method is to analyze the previous research on existing R&D process and draw out implications, and develop a new R&D process model that reflects characteristics of the fourth industrial revolution era. Results: This study analyzes the characteristics and situation of existing R&D process and derives the features of parallel structure and modularity suitable for the 4th industrial revolution era, characterized by super connectivity, super intelligence, super fusion. And propose a R&D process model that can respond flexibly and promptly to various market and customer needs. Conclusion: Suggestions for the development of R&D processes suitable for the fourth industrial revolution era will present new strategies and measures and provide diverse & innovative opportunities.

지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘 (A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack)

  • 김남욱;엄정호
    • 디지털산업정보학회논문지
    • /
    • 제16권3호
    • /
    • pp.37-47
    • /
    • 2020
  • The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.

자바 애플릿을 이용한 웹기반 전자회로 가상실험실의 구현 (Implementation of A Web-based Virtual Laboratory For Electronic Circuits Using Java Applets)

  • 김동식;최관순;이순흠;서삼준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 하계학술대회 논문집 D
    • /
    • pp.2625-2627
    • /
    • 2002
  • A virtual laboratory for measurement and instrumentation must aim to realize an integrated environment. To achieve this goal, we designed and implemented a client/server distributed environment and developed a web-based virtual laboratory system for electronic circuits. The proposed virtual laboratory system is composed of four important components : Principle Classroom, Virtual Experiment Classroom, Evaluation Classroom and Overall Management System. Through our virtual laboratory, the learners will be capable of learning the concepts and theories related to electronic circuit experiments and how to operate the experimental equipments. Also, every activity occurred in our virtual laboratory is recorded on database and printed out on the preliminary report form. All of these can be achieved by the aid of the Management System. The database connectivity is made by PHP and the virtual laboratory environment is set up slightly differently for each learner. Finally, we have obtained several affirmative effects such as reducing the total experimental hours and the damage rate for experimental equipments and increasing learning efficiencies as well as faculty productivity.

  • PDF

A Traffic Adaptive MAC Scheduling for Bluetooth with Maximized throughput and Guaranteed fairness

  • Kim Tae suk;Choi Sung-Gi;Kim Sehun
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 2002년도 춘계공동학술대회
    • /
    • pp.418-425
    • /
    • 2002
  • Bluetooth is an emerging technology expected to provide users with short range, low cost, pico-cellular wireless connectivity. The access to the medium for Bluetooth is based on a Master driven Time Division Duplexing (TDD) scheme. A slave transmits packets in the reverse slot only after the master polls the slave (or transmits a packet to the slave) in a forward slot. The master transmits packets to a slave in even slots while the slave transmits packets to the master in an odd slot. The way in which the master schedules packets transmission to slaves or polls them determines system performance. In this paper. we propose a traffic adaptive MAC scheduling scheme for Bluetooth. The proposed scheme adopts the ISAR (Intelligent Segmentation and Reassembly) policy, which adjusts the packet size to the traffic patterns, to adapt the polling frequency to the traffic conditions. Also for achieving fairness among master-slave connections our scheme includes a priority policy assinging prioritised service tlimes to each connection. By considering a scenario where a Bluetooth master is used as wireless access point to the Internet, we show that our scheme improve the system throughput and average queue delay with regard to a naive Round Robin (RR) scheme.

  • PDF

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • 제33권5호
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

Access, Skills and Constraints of Barangay Officials towards the Use of Information and Communications Technology (ICT)

  • Santiago, Cereneo S. Jr.;Ulanday, Ma. Leah P.;Centeno, Zarah Jane R.;Bayla, Ma. Cristina D.
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제11권2호
    • /
    • pp.37-54
    • /
    • 2021
  • The study determined the access, skills and constraints towards the usage of ICT among barangay officials. A complete enumeration technique was used due to the small size of the population. A total of 121 barangay secretaries and barangay treasurers comprised the study respondents. The findings revealed that most of barangay officials have access to personal computer at home and in the office using their own mobile data and office internet connectivity. With the support from the Local Government Unit (LGU), it was found that most of the respondents are advance and proficient in computer usage. As constraints to ICT usage, the study respondents still experienced slow internet bandwidth that makes connection and communication weak along with the low income status. Consequently, it was found that there were no significant differences in terms of skills and constraints among barangay secretaries and barangay treasurers towards using ICT. It can be concluded that study respondents prefer to use office computer to access the information they need due to the convenience and availability of resources. The study respondents were competent enough to handle their job well but listed slow internet and low financial resources may hamper their ICT usage. Research implications were also offered.

Deep Neural Network-Based Critical Packet Inspection for Improving Traffic Steering in Software-Defined IoT

  • 담프로힘;맛사;김석훈
    • 인터넷정보학회논문지
    • /
    • 제22권6호
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid growth of intelligent devices and communication technologies, 5G network environment has become more heterogeneous and complex in terms of service management and orchestration. 5G architecture requires supportive technologies to handle the existing challenges for improving the Quality of Service (QoS) and the Quality of Experience (QoE) performances. Among many challenges, traffic steering is one of the key elements which requires critically developing an optimal solution for smart guidance, control, and reliable system. Mobile edge computing (MEC), software-defined networking (SDN), network functions virtualization (NFV), and deep learning (DL) play essential roles to complementary develop a flexible computation and extensible flow rules management in this potential aspect. In this proposed system, an accurate flow recommendation, a centralized control, and a reliable distributed connectivity based on the inspection of packet condition are provided. With the system deployment, the packet is classified separately and recommended to request from the optimal destination with matched preferences and conditions. To evaluate the proposed scheme outperformance, a network simulator software was used to conduct and capture the end-to-end QoS performance metrics. SDN flow rules installation was experimented to illustrate the post control function corresponding to DL-based output. The intelligent steering for network communication traffic is cooperatively configured in SDN controller and NFV-orchestrator to lead a variety of beneficial factors for improving massive real-time Internet of Things (IoT) performance.