• Title/Summary/Keyword: e-call

Search Result 295, Processing Time 0.021 seconds

Efficient Processing of Temporal Aggregation including Selection Predicates (선택 프레디키트를 포함하는 시간 집계의 효율적 처리)

  • Kang, Sung-Tak;Chung, Yon-Dohn;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.35 no.3
    • /
    • pp.218-230
    • /
    • 2008
  • The temporal aggregate in temporal databases is an extension of the conventional aggregate to include the time on the range condition of aggregation. It is a useful operation for Historical Data Warehouses, Call Data Records, and so on. In this paper, we propose a structure for the temporal aggregation with multiple selection predicates, called the ITA-tree, and an aggregate processing method based on the structure. In the ITA-tree, we transform the time interval of a record into a single value, called the T-value. Then, we index records according to their T-values like a $B^+$-tree style. For possible hot-spot situations, we also propose an improvement of the ITA-tree, called the eITA-tree. Through analyses and experiments, we evaluate the performance of the proposed method.

Design and Experiment of a Micro Electronic System for Prediction of Alveolar-Gas Partial Pressures

  • Kim, Da-Jung;Chang, Keun-Shik;Kim, Sa-Ji;Park, Hye-Yun;Suh, Gee-Young
    • Journal of Biomedical Engineering Research
    • /
    • v.31 no.3
    • /
    • pp.187-193
    • /
    • 2010
  • In this study we have designed and fabricated an inexpensive micro electronic system that we call Alvitek. It can indirectly but accurately predict and display the partial pressures of alveolar oxygen and carbon dioxide for the patients in the ICU of a hospital. Alvitek consists of both hardware part and software part. Performance of the system is tested by animal experiment with pigs for various $F_{t}e_{2}$ and RR(Respiratory Rate) values under the mechanical ventilation. The predicted alveolar gas partial pressures are cprpared with the approximate alveolar oxygen partial pressures easily calculated by the physician’s bedside formula. As a result, we have concluded that the relative error of A-$aDe_2$ calculated by the bedside formula grows seriously for lower $F_{t}e_{2}$ values. The present prediction method of Alvitek is henceforth believed very meaningful to the physicians. The system hardware and software are described in the text.

A Case Study of Feasibility Analysis Based On Black-Sholes Model for Ubiquitous Computing Technology Development (블랙-숄즈 모형을 활용한 유비쿼터스 기술 개발 타당성 분석 사례 연구)

  • Kwon, Oh-Byung;Kim, Ji-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.4
    • /
    • pp.49-69
    • /
    • 2008
  • Recently, ubiquitous computing technology becomes available to develop advanced electronic commerce:u-commerce. Hence, it is the very time to perform feasibility analysis in applying ubiquitous computing technology, especially estimating economical value of the on-going technology. Hence, the purpose of this paper is to propose a financial value estimating methodology in performing feasibility test on ubiquitous computing technology. To do so, Black and Scholes model is basically adopted. To show the feasibility if the idea proposed in this paper, actual case study through focused group interview with those who are actually performing on-going ubiquitous computing projects. As the result, we validated the possibility of applying Black-Sholes model to assessing feasibility analysis for ubiquitous technology development with the price of call option, volatility, and the comparison with other similar technologies.

  • PDF

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

Call for an Open Discussion on Empirical Viability of Causal Indicators

  • Kim, Gi Mun;Shin, Bong Sik;Grover, Varun;Howell, Roy D.;Kim, Ki Joo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.6
    • /
    • pp.71-84
    • /
    • 2017
  • Over the past decade, we have witnessed Serious Debates in MISQ and Other Journals Between Two Camps that have Differing Views on the use of Causal Indicators to Measure Constructs. There is the Camp that advocates Causal Indicators (ADVOCATE) and the Camp that opposes Their Usage (OPPONENT). The Debates have been primarily centered on the OPPONENT's Argument that the Meaning of a Latent Variable is determined by its Outcome Variables. However, Little Effort has been made to Validate the ADVOCATE's Dispute (Against the OPPONENT's Arguments) that the Meaning of a Latent Variable is decided by its Causal Indicators if there is no Misspecification. Our Study precisely examines the Integrity of the Argument. For this, we empirically examine how the two Primary Psychometric Properties-Comprehensiveness and Interrelationship-of Causal Indicators Influence Theory Testing between Latent Variables through Three Different Tests (i.e., Comprehensive Test, Interrelationship Test, and Mixed Test). Conducted on Two Different Datasets, Our Analysis Consistently Reveals that Structural Path Coefficients are Hardly Sensitive to the Changes (i.e., Misspecification) in the Properties of Causal Indicators. The Discovery offers Important Evidence that the Sound Theoretical Logic of a Causal Model is not in Sync with the Empirical Mechanism of Parameter Estimation. This Underscores that a Latent Variable Formed by Causal Indicators is empirically an elusive notion that is Difficult to Operationalize. As Our Results have Significant Implications on the Integrity of Numerous IS studies which have conducted Theory or Hypothesis Testing Using Causal Indicators, we strongly advocate Open Discussions among Methodologists regarding Our Findings and Their Implications for Both Published IS Research and Future Practices.

Context-based Web Application Design (컨텍스트 기반의 웹 애플리케이션 설계 방법론)

  • Park, Jin-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.111-132
    • /
    • 2007
  • Developing and managing Web applications are more complex than ever because of their growing functionalities, advancing Web technologies, increasing demands for integration with legacy applications, and changing content and structure. All these factors call for a more inclusive and comprehensive Web application design method. In response, we propose a context-based Web application design methodology that is based on several classification schemes including a Webpage classification, which is useful for identifying the information delivery mechanism and its relevant Web technology; a link classification, which reflects the semantics of various associations between pages; and a software component classification, which is helpful for pinpointing the roles of various components in the course of design. The proposed methodology also incorporates a unique Web application model comprised of a set of information clusters called compendia, each of which consists of a theme, its contextual pages, links, and components. This view is useful for modular design as well as for management of ever-changing content and structure of a Web application. The proposed methodology brings together all the three classification schemes and the Web application model to arrive at a set of both semantically cohesive and syntactically loose-coupled design artifacts.

  • PDF

eBusiness Portal System for Cosmetic Market Distribution (화장품 시장 유통망을 위한 e비즈니스 포탈 시스템)

  • Jeon, Heung-Seok;Kim, Jin-Soo;Ahn, Jeong-Wie
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.479-484
    • /
    • 2004
  • Recently, cosmetic shop market, which is made up of company, agent, and market shop, has got into trouble caused by economic crisis and the coming of new distribution systems such as internet shopping mall. To overcome the problems, in this paper, we propose a cosmetic distribution portal system, which we call COSPO. COSPO is a portal system that has three functions. The first is automation of the business process for product distribution between the company, agent, and market shops. The second is communication between them. The final is sharing information generated through the automated process. In this paper, we build a prototype that support distribution channel of a company. Then, ultimately it should be extended to cover the distribution network of all companies. COSPO will contribute to the modernization of the cosmetic market industry in the country as well as to the increase of the profits.

Survey on Fake Review Detection of E-commerce Sites (전자 상거래 사이트의 가짜 리뷰 판별 기법 조사)

  • Ji, Chengzhang;Zhang, Jinhong;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.79-81
    • /
    • 2014
  • People increasingly rely on sources of information from E-commerce reviews. Product reviews is an important determinant of potential customers' buying choices. They are also utilized by product manufacturers to find problems of their products and to collect competitive intelligence information about their competitors. Unfortunately, it is well-known that many online product reviews are not made by genuine costumers of products. Reviewers could write some undeserving positive reviews to promote or fake negative reviews to defame some certain product, and we call them fake product reviews. Fake product review detection makes an attempt to detect fake reviews and removes them to restore the truthful ones for readers. To the best of our knowledge, there is still less published study on this problem. In this paper, we make a survey and an attempt to give a brief overview on fake product review detection. The related work of fake product review detection is presented including web spam and spam email. Then some methods to detect fake reviews are introduced and summarized. The trend of fake product review detection is concluded finally.

  • PDF

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.

A Study on the Various Attributes of E-Sport Influencing Flow and Identification (e-스포츠의 다양한 속성이 유동(flow)과 동일시에 미치는 영향에 관한 연구)

  • Suh, Mun-Shik;Ahn, Jin-Woo;Kim, Eun-Young;Um, Seong-Won
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.1
    • /
    • pp.59-80
    • /
    • 2008
  • Recently, e-sports are growing with potentiality as a new industry with conspicuous profit model. But studies that dealing with e-sports are not enough. Hence, proposes of this paper are both to establish basic model that is for the design of e-sport marketing strategy and to contribute toward future studies which are related to e-sports. Recently, the researches to explain sports-sponsorship through the identification theory have been discovered. Many researches say that somewhat proper identification is a requirement for most sponsors to improve the their images which is essential to sponsorship activity. Consequently, the research for sponsorship associated with identification in the e-sports, not in the physical sports is the core sector of this study. We extracted the variables from online's major characteristics and existing sport sponsorship researches. First, because e-sports mean the tournaments or leagues in the use of online game, the main event of the game is likely to call it online game. Online media's attributes are distinguished from those of offline. Especially, interactivity, anonymity, and expandibility as a e-sport game attributes are able to be mentioned. So, these inherent online attributes are examined on the relationship with flow. Second, in physical sports games, Fisher(1998) revealed that team similarity and team attractivity were positively related to team identification. Wann(1996) said that the result of former game influenced the evaluation of the next game, then in turn has an effect on the identification of team supporters. Considering these results in the e-sports side, e-sports gamer' attractivity, similarity, and match result seem to be important precedent variables of the identification with a gamer. So, these e-sport gamer attributes are examined on the relationship with both flow and identification with a gamer. Csikszentmihalyi(1988) defined the term flow as feeling status for him to be making current positive experience optimally. Hoffman and Novak(1996) also said that if a user experienced the flow he would visit a website without any reward. Therefore flow might be positively associated with user's identification with a gamer. And, Swanson(2003) disclosed that team identification influenced the positive results of sponsorship, which included attitude toward sponsors, sponsor patronage, and satisfaction with sponsors. That is, identification with a gamer expect to be connected with corporation identification significantly. According to the above, we can design the following research model. All variables used in this study(interactivity, anonymity, expandibility, attractivity, similarity, match result, flow, identification with a gamer, and identification with a sponsor) definitely were defined operationally underlying precedent researches. Sample collection was carried out to the person who has an experience to have enjoyed e-sports during June 2006. Much portion of samples is men because much more men than women enjoy e-sports in general. Two-step approach was used to test the hypotheses. First, confirmatory factor analysis was committed to guarantee the validity and reliability of variables. The results showed that all variables had not only intensive and discriminant validity, but also reliability. Then, research model was examined with fully structural equation using LISREL 8.3 version. The fitness of the suggested model mostly was at the acceptable level. Shortly speaking about the results, first of all, in e-sports game attributes, only interactivity which is called a basic feature in online situation affected flow positively. Secondly, in e-sports gamer's attributes, similarity with a gamer and match result influenced flow positively, but there was no significant effect in the relationship between the attractivity of a gamer and flow. And as expected, similarity had an effect on identification with a gamer significantly. But unexpectedly attractivity and match result did not influence identification with a gamer significantly. Just the same as the fact verified in the many precedent researches, flow greatly influenced identification with a gamer, and identification with a gamer continually had an influence on the identification with a sponsor significantly. There are some implications in these results. If the sponsor of e-sports supports the pro-game player who absolutely should have the superior ability to others and is similar to the user enjoying e-sports, many amateur gamers will feel much of the flow and identification with a pro-gamer, and then after all, feel the identification with a sponsor. Such identification with a sponsor leads people enjoying e-sports to have purchasing intention for products produced by the sponsor and to make a positive word-of-mouth for those products or the sponsor. For the future studies, we recommend a few ideas. Based on the results of this study, it is necessary to find new variables relating to the e-sports, which is not mentioned in this study. For this work to be possible, qualitative research seems to be needed to consider the inherent e-sport attributes. Finally, to generalize the results related to e-sports, a wide range of generations not a specific generation should be researched.

  • PDF