• Title/Summary/Keyword: information overload

Search Result 530, Processing Time 0.029 seconds

The Effect of Community Type and Service Quality on User Satisfaction of Brand Community (브랜드 커뮤니티 개설유형 및 서비스 품질 특성이 사용자 만족에 미치는 영향)

  • Yun, Hae-Jung;Lee, Ji-Yeon;Lee, Choong-C.
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.167-184
    • /
    • 2009
  • New internet trend, such as Web 2.0, has brought about new roles of users and changes in the web ecosystem. In the age of information overload like nowadays, activities in the brand community sites help to make more reasonable decisions in choosing certain brands and products. In order to examine organizational strategic aspects of brand community, this study examine (1) what difference exists in user satisfaction according to the brand community types (the user-initiated type and the corporate-established type), and (2) which dimensions of service quality affect brand community users' satisfaction. Research findings show that types of brand community influence perceived user satisfaction, and tangibility, reliability, interactivity, and stability dimensions of service quality make a positive influence on user satisfaction as well. Practical implications for managing brand community sites in marketing perspectives are further discussed.

  • PDF

Design of Cloud-based Context-aware System Based on Falling Type

  • Kwon, TaeWoo;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.44-50
    • /
    • 2017
  • To understand whether Falling, which is one of the causes of injuries, occurs, various behavior recognition research is proceeding. However, in most research recognize only the fact that Falling has occurred and provide the service. As well as the occurrence of the Falling, the risk varies greatly based on the type of Falling and the situation before and after the Falling. Therefore, when Falling occurs, it is necessary to infer the user's current situation and provide appropriate services. In this paper, we propose to base on Fog Computing and Cloud Computing to design Context-aware System using analysis of behavior data and process sensor data in real-time. This system solved the problem of increase latency and server overload due to large capacity sensor data.

Prioritized Data Transmission Mechanism for IoT

  • Jung, Changsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2333-2353
    • /
    • 2020
  • This paper proposes a novel data prioritization and transmission mechanism to minimize the number of packets transmitted and reduce network overload using the constrained application protocol (CoAP) in resource-constrained networks. The proposed scheme adopts four classification parameters to classify and prioritize data from a sensor. With the packet prioritization scheme, the sensed data having the lowest priority is only delivered using the proposed keep-alive message notification to decrease the number of packets transmitted. The performance evaluation demonstrates that the proposed scheme shows the improvement of resource utilization in energy consumption, and bandwidth usage compared with the existing CoAP methods. Furthermore, the proposed scheme supports quality-of-service (QoS) per packet by differentiating transmission delays regarding priorities.

A study on the matrix-based RFID authentication protocol (행렬기반 RFID 인증 프로토콜에 관한 연구)

  • Shin, Hyo-Young;Jung, Kye-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.800-803
    • /
    • 2012
  • Recently, research on security of RFID system has been conducted actively in order to utilize RFID system in various fields including distribution and logistics. This paper suggests an authentication protocol which supplement the flaws of previous RFID authentication protocols and we improved its performance using matrix-based authentication. The suggested authentication protocol provides mutual authentication, protects from wiretapping attack, replay attack, spoofing attack, and traffic analysis attack and so on, and reduces overload of back-end database so that has efficient performance.

  • PDF

An Analysis of Multi-processor System Performance Depending on the Input/Output Types (입출력 형태에 따른 다중처리기 시스템의 성능 분석)

  • Moon, Wonsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.71-79
    • /
    • 2016
  • This study proposes a performance model of a shared bus multi-processor system and analyzes the effect of input/output types on system performance and overload of shared resources. This system performance model reflects the memory reference time in relation to the effect of input/output types on shared resources and the input/output processing time in relation to the input/output processor, disk buffer, and device standby places. In addition, it demonstrates the contribution of input/output types to system performance for comprehensive analysis of system performance. As the concept of workload in the probability theory and the presented model are utilized, the result of operating and analyzing the model in various conditions of processor capability, cache miss ratio, page fault ratio, disk buffer hit ratio (input/output processor and controller), memory access time, and input/output block size. A simulation is conducted to verify the analysis result.

An empirical study on the Job Stress in IS Organization (IS 조직의 직무스트레스에 관한 실증적 연구)

  • 이선규;이웅희;서명지
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.26 no.1
    • /
    • pp.40-46
    • /
    • 2003
  • The employees in information system organization are highly exposed to stress. However, there is little theoretical or empirical study on the effects of job stress on IS organizations. A major reason is because few researchers consider consequences of job stress. The major purpose of this study is to verify negative effects of job stress for IS organization. This study have three purposes : to investigate the relationship between job stressors and perceived job stress; to understand the effect of perceived job stress and job attitude - job satisfaction, job involvement; to examine the role of moderators such as social support and personality in the relationship between job stressors and perceived job stress in information system organizations. The results of this study suggest that job stressors such as role overload and role ambiguity are significantly related to perceived job stress, the higher the perceived job stress is the lower the job attitudes such as job satisfaction and job involvement, and the employees' personality has moderating effects between the job stressor and perceived job stress.

Design and Implementation of an Object Migration System Using the Java Language (Java 언어를 이용한 객체이동시스템의 설계 및 구현)

  • Jeon, Byeong-Guk;Lee, Geun-Sang;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.49-56
    • /
    • 1999
  • Distributed object Computing, owing to the development of distributed computing, has improved the performance of distributed processing conducted between homogeneous and heterogeneous systems in network. However, it has failed to solve fundamental problems such as network overload and enormous requests demands by servers and clients. In this paper, we propose to design and implement an Object Migration system that uses the java language to tackle the mentioned problems. As the first step of the implementation of the system, we justify the characteristics of t도 mobile object model that keeps codes and states of an object. Implemented Object Migration System would accept objects being migrated to a specific node and support the virtual place in which objects could be executed automatically. Therefore, the Object Migration system we suggest could not only solve problems imposed to traditional distributed computing but also offer transparency of object migration between homogeneous and heterogeneous systems.

  • PDF

A Study on the use of Multicast Protocol Traffic overload for Active Network (액티브 네트워크를 활용한 멀티캐스트 프로토콜 트래픽 분석에 관한 연구)

  • Choi, Won-Hyuck;Kim, Jung-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1475-1478
    • /
    • 2002
  • 멀티캐스트는 현재 일-대-일 통신서비스로 부터 일-대-다 또는 다-대-다 통신서비스에서 신뢰성을 요구하는 새로운 요구가 많아지고 있다. 그리고 최근 대두되고 있는 멀티미디어 응용을 지원하기 위해서는 광대역 네트워크의 링크, 실시간 전송, 보나 효과적인 멀티캐스트 프로토콜이 요구된다. 그러나 DVMRP, MOSPF, CBT, PIM 구조의 멀티캐스팅 프로토콜은 단지 송수신의 패킷의 경로비용으로 라우터 자체의 근거리 알고리즘이 적용되기 때문에 멀티캐스트가 수행될 때 통신의 전반적 사항인 통신처리능력, 대역폭, QoS(quality of service)대한 능력이 부족하다. 그러므로 멀티미디어에서 사용되는 패킷의 계층적 특성이 제외된 상태로 데이터가 전송되는 단점이 있다. 본 연구에서는 액티브 네트워크를 이용해서 카 데이터 패킷 전송을 위한 공정하고 실용적인 대역폭 사용하고 대역폭과 데이터처리능력을 액티브 전송 패킷을 통해서 액티브 라우터로 전송된 데이터를 필터링 해서 보나 효과적인 멀티미디어 데이터 패킷을 카 계층에 따라 다양한 수신자가 데이터 패킷을 전송 받고 액티브 라우터로부터 공정한 대역폭 전송할 수 있는 라우터를 시뮬레이션 상에서 구현하고 성능을 평가한다.

  • PDF

A study on an Efficient Kerberos Authentication based on X.509 (X.509 공개키 기반구조에서 Kerberos 인증에 관한 연구)

  • Kim, Cheol-Hyun;Kim, Young-Ja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1177-1180
    • /
    • 2002
  • 본 논문에서는 IETF CAT Working Group에서 발표한 PKINIT기반의 인증서비스를 향상시킨 Kerberos 인증 메커니즘을 제안한다. PKINIT기반의 X.509, DS/DNS를 적용하여 영역간의 서비스를 제공하는 인증과 키 교환방식으로 DNS를 통해 외부영역의 위치를 탐색하고 X.509 디렉토리 인증 시스템을 적용, 영역간 인증은 DNS 서버로부터 공개키를 획득하여 다른 영역을 인증하도록 하였다. 영역간 인증과 키 교환은 Kerberos의 관용키 암호방식을 사용하고 세션 연결은 X.509 공개키 방식에 기반을 두고 있다. 효율적인 TGT(티켓승인 티켓) 교환과 통신상의 Overload를 감소시키는 효과와 인증절차의 간소화를 가지는 Kerberos시스템을 설계하였다.

  • PDF

Study on the Digital ADM for Expanding the Frequency Range (광대역 신호전송을 위한 Digital ADM에 관한 연구)

  • 이윤현;김정선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.5 no.1
    • /
    • pp.54-59
    • /
    • 1980
  • Adaptive version of the delta modulator that is akin to wyllabic companding for telephony is described. A digital technique is used to sense the slope of the input signal and to control the amplitude of the pulses supplied to the RC network in the feed back loop. Thus the development was stimulated by the suitability of delta modulator for low-cost integrated circuits. Analysis are made of the optimum overload characteristics, stability, SNR for improving the frequency range and these results have been esperimentally verfied.

  • PDF