• Title/Summary/Keyword: internet usage frequency

Search Result 76, Processing Time 0.024 seconds

A Study On Usage Of the dimension barcode and the RFID based on Ubiquitous (유비쿼터스 환경에서 2차원 바코드 및 RFID 응용에 관한 연구)

  • 김병찬;정성훈;임재홍
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.49-54
    • /
    • 2004
  • Ubiquitous computing support to use various informations through any machine which can connect the computer in any where and any time. Recently barcode and RFID which is improved business model to store large scale information and certify security in on- and off-line internet technology is applied the credit curd and payment service and so on However this technology has serious problem that RFID In this paper, we investigate method used example of 2D barcode and RFID and compare and analysis characteristics of recent technology to solve former problem in Ubiquitous environment.

  • PDF

Reticence and Communication Preferences in the Classroom: Comparing "E-mail" and "Face-to-face" Interactions

  • Ha, Jae-Sik;Shin, Dong-Hee;Lee, Chung Gun
    • International Journal of Contents
    • /
    • v.10 no.2
    • /
    • pp.18-27
    • /
    • 2014
  • This study examines underlying factors that influence undergraduate students' willingness to enhance communication with their instructor by comparing the frequency of e-mail and face-to-face interaction between students and instructors. Data was collected through a survey of 322 undergraduate journalism students at a large Midwestern university. The findings showed that the more passive students were in expressing their opinion during the class, the less likely they were to send e-mails to their instructor (Coef. = -0.180, p < .01) or to communicate with their instructor face-to-face (Coef. = -0.262, p < .01). The findings also showed that the more students described their personality as "shy," the less likely they were to e-mail their instructor (Coef. = -0.157, p < .05) or communicate with their instructor face-to-face (Coef. = -0.210, p < .01). It is noteworthy that the degrees of both passivity and shyness had a more negative effect on the probability of face-to-face interaction than they did on email interaction. In summary, email usage follows similar broader patterns of social interaction, rather than introducing a different trend in communication. This finding implies that the importance of e-mail should not be exaggerated as a communication tool for reticent students.

Perceptions and Use of Open Access Journals by Nigerian Postgraduate Students

  • Ayeni, Philips Oluwaseun
    • Journal of Information Science Theory and Practice
    • /
    • v.5 no.1
    • /
    • pp.26-46
    • /
    • 2017
  • This article investigates perceptions and use of Open Access journals (OAJs) by master's degree students in two universities in the southwestern part of Nigeria. A descriptive survey design was used in the study and the study population was comprised of 7,423 master's degree students in the University of Ibadan and 1,867 from Obafemi Awolowo University. A multistage random sampling technique was used to select a sample size of 249 and the data collection instrument was a structured questionnaire. Data were analyzed using frequency counts, percentages, mean, standard deviation, correlation, and regression analyses. The findings revealed that OAJs were used for learning, dissertation writing, personal research, and development. OAJs were not frequently used because of download delays, unavailability of Internet facilities, and limited access to computers terminals, among other issues. OAJs were found to be of relative advantage, positively perceived, and found to be compatible with existing values and quality assurance in scholarly publications, hence their use for academic activities. The regression analyses showed that there was a significant positive relationship between positive perception, perception of relative advantage, perception of compatibility, perception complexity, and master's degree students' use of OAJs. Negative perception was found to have a significant negative correlation with the use of OAJs. This article recommends that quality assurance of OAJs should be ensured in order to boost users' positive perceptions to increase their patronage and usage of these scholarly outlets for various academic activities, which will in turn encourage research and development across the various institutions of higher learning in Nigeria.

Selecting a Synthesizable RISC-V Processor Core for Low-cost Hardware Devices

  • Gookyi, Dennis Agyemanh Nana;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1406-1421
    • /
    • 2019
  • The Internet-of-Things (IoT) has been deployed in almost every facet of our day to day activities. This is made possible because sensing and data collection devices have been given computing and communication capabilities. The devices implement System-on-Chips (SoCs) that incorporate a lot of functionalities, yet they are severely constrained in terms of memory capacitance, hardware area, and power consumption. With the increase in the functionalities of sensing devices, there is a need for low-cost synthesizable processors to handle control, interfacing, and error processing. The first step in selecting a synthesizable processor core for low-cost devices is to examine the hardware resource utilization to make sure that it fulfills the requirements of the device. This paper gives an analysis of the hardware resource usage of ten synthesizable processors that implement the Reduced Instruction Set Computer Five (RISC-V) Instruction Set Architecture (ISA). All the ten processors are synthesized using Vivado v2018.02. The maximum frequency, area, and power reports are extracted and a comparison is made to determine which processor is ideal for low-cost hardware devices.

Performance Comparison of Database Management Methods on XML Document Storage Functions for both Commerce and Military Applications (XML 문서저장에 관한 민군겸용 데이터베이스 관리체계의 성능비교)

  • Gang, Seok-Hun;Lee, Jae-Yun;Lee, Mal-Sun
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.237-260
    • /
    • 2004
  • As the research work about XML based on the development of Internet and according to the information exchange standard is being carried out, the need of discovering new methods to store XML documents and manage them efficiently according to the frequency of large-capacity XML documents increases. Consequently, as a kind of back-end database system, XML storage systems such as RDBMS, OODBMS and Native XML DBMS etc. are coming forth in order to save XML documents. It is an urgent task to make comparisons among usage expense, function comparison storage, inquiry, and manage dimension for each DBMS. This paper makes an analysis and comparison of DTD-independent XML document access methods in RDBMS, OODBMS and Native XML DBMS for XML storage and management. After analyzing the advantages and disadvantages of each access method and comparing the function of typical commerce DBMS such as Oracle 8i, eXcelon and Tamino for finding the possibility of military applications, an another appropriate method to save XML documents is proposed as to find an implementation approach to save structural XML documents.

  • PDF

Wastewater Treatment Plant Control Strategies

  • Ballhysa, Nobel;Kim, Soyeon;Byeon, Seongjoon
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.16-25
    • /
    • 2020
  • The operation of a wastewater treatment plant (WWTP) is a complex task which requires to consider several aspects: adapting to always changing influent composition and volume, ensuring treated effluents quality complies with local regulations, ensuring dissolved oxygen levels in biological reaction tanks are sufficient to avoid anoxic conditions etc. all of it while minimizing usage of chemicals and power consumption. The traditional way of managing WWTPs consists in having employees on the field measure various parameters and make decisions based on their judgment and experience which holds various concerns such as the low frequency of data, errors in measurement and difficulty to analyze historical data to propose optimal solutions. In the case of activated sludge WWTPs, parts of the treatment process can be automated and controlled in order to satisfy various control objectives. The models developed by the International Water Association (IWA) have been extensively used worldwide in order to design and assess the performance of various control strategies. In this work, we propose to review most recent WWTP automation initiatives around the world and identify most currently used control parameters and control architectures. We then suggest a framework to select WWTP model, control parameters and control scheme in order to develop and benchmark control strategies for WWTP automation.

The Effect of Pornography Use Among Adolescents on Violent Sexual Behavior and the Moderating Effect of Family Support (청소년의 음란물 이용이 성폭력 가해행동에 미치는 영향 : 가족지지의 조절효과를 중심으로)

  • Kim, Jae Yop;Choi, Sunah;Lim, Jeong Su
    • Human Ecology Research
    • /
    • v.59 no.4
    • /
    • pp.489-500
    • /
    • 2021
  • The purpose of this study was to identify the impact of pornography use among adolescents on their subsequent violent sexual behavior, and to ascertain the moderating effect of family support. The study was conducted with a sample of 2,087 Korean middle and high-school students. To analyze the data, a descriptive analysis, a correlation analysis, and a Poisson regression were conducted using SPSS 24.0. A Poisson regression was performed because the dependent variable, violent sexual behavior, was measured by the frequency of occurrence, and most responses were distributed at '0', indicating a non-normal distribution. The results indicated that 8.1% of adolescents admitted to having sexually violent experiences over the past year, with a relatively high rate of sexual harassment. Secondly, 53.3% of adolescents had used pornography over the past couple of years, with the highest percentage of use occurring via the Internet. Finally, pornography use among adolescents had a significant and direct impact on their sexually violent behavior, with family support playing a moderating role. This indicated that, for adolescents with a high level of family support, the impact of pornography usage on sexually violent behavior decreased. Based on these results, we discuss practical and policy interventions to prevent sexually violent behavior by adolescents.

Mobility-Aware Interference Avoidance Scheme for Vehicular WLANs

  • Park, Lai-Hyuk;Na, Woong-Soo;Lee, Gun-Woo;Lee, Chang-Ha;Park, Chang-Yun;Cho, Yong-Soo;Cho, Sung-Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.12
    • /
    • pp.2272-2293
    • /
    • 2011
  • Communication technology of future networks is predicted to provide a large variety of services including WiFi service in vehicular network. In this paper, we assume that vehicles are embedded with WiMAX antenna and in-vehicle terminals receive WiMAX traffic through WiFi interface. This assumption will impose severe performance degradation due to interference among mobile BSSs when WiFi access points (APs) are densely located. Existing interference avoidance techniques cannot properly resolve the above problems and do not cope with dynamically moving vehicular scenario since they focus only on the fixed network topology. In this paper, we propose a mobility-aware interference avoidance scheme for WiFi services. The proposed scheme computes the interference duration by exploiting mobility vector and location information of neighboring APs. If the interference duration is not negligible, our scheme searches for another channel in order to avoid interference. However, if the interference duration is negligible, our scheme continues to use the channel to reduce switching overhead. To measure the effectiveness of the proposed scheme against other existing techniques, we evaluated performance by using OPNET simulator. Through the simulation, we obtained about 60% reduction in the maximum interference frequency and about 67% improvement in throughput. Furthermore, our scheme provides fair channel usage.

Health Behavior Factors Associated with Sugar-sweetened Beverage Intake among Adolescents (한국 청소년의 가당음료 섭취 관련 건강 행동 요인 분석)

  • Gu, Hyae Min;Park, Jong;Ryu, So Yeon
    • Korean Journal of Community Nutrition
    • /
    • v.23 no.3
    • /
    • pp.193-201
    • /
    • 2018
  • Objectives: This study was conducted to measure the intake rate of SSBs (sugar sweetened beverages) and examine the relationship between health behavior factors and SSBs intake by adolescents. Methods: This study used data from the 2016 Korea Youth Risk Behavior Web-based Survey, which included 65,528 study participants. SSBs intake frequency was measured by asking respondents if they consumed soda, high-caffeinated beverages, and sugary drinks during the previous week. Type of intake was categorized into three groups according to the number of consumed drinks [SSBs (0): None; SSBs (1-2): 1 or 2 consumed; SSBs (3): 3 consumed]. Multinomial logistic regression analysis was used to examine health behaviors that affected SSBs consumption. Results: Increased SSBs intake was significantly correlated with current smoking (OR=2.4, 95% CI=1.82-3.17), current drinking (OR=2.13, 95% CI=1.82-2.51), sedentary time increase (OR=1.31, 95% CI=1.15-1.49), three days or more physical activity per week (OR=1.12, 95% CI=1.02-1.24), <8 hours sleep (OR=1.6, 95% CI=1.43-1.78), increased internet usage time (OR=1.44, 95% CI=1.25-1.65). Conclusions: Sugar-sweetened beverages intake by Korean adolescents was associated with health behaviors such as smoking, drinking, sedentary time increase, more physical activity, poor sleeping time, and increased internet use time. Based on these results, it is necessary to recognize the influence of SSBs intake and to intervene to reduce consumption of SSBs.

A Study on the Customer Relationship Management Method Using Real-Time IoT Data (실시간 IoT 데이터를 활용한 고객 관계 관리 방안에 관한 연구)

  • Bae, Ji Won;Baek, Dong Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.2
    • /
    • pp.69-77
    • /
    • 2019
  • As information technology advances, the penetration of smart devices connected to the Internet, such as smart phone and tablet PC, has rapidly expanded, and as sensor prices have fallen the Internet of Things has begun to be introduced in the industry. Today's industry is rapidly changing and evolving, requiring companies to respond to the new paradigm of business. In this situation, companies need to actively manage and maintain customer relationships in order to acquire loyal customers who bring them a high return. The purpose of this study is to suggest a method to manage customer relationship using real time IoT data including IoT product usage data, customer characteristics and transaction data. This study proposes a method of segmenting customers through RFM analysis and transition index analysis. In addition, a real-time monitoring through control charts is used to identify abnormalities in product use and suggest ways of differentiating marketing for each group. In the study, 44 samples were classified as 9 churn customers, 10 potential customers, and 25 active customers. This study suggested ways to induce active customers by providing after-sales benefit for product reuse to a group of churn customers and to promote the advantages or necessity of using the product by setting the goal of increasing the frequency of use to a group of potential customers. Finally, since the active customer group is a loyal customer, this study proposed an one-on-one marketing to improve product satisfaction.