• 제목/요약/키워드: non-user

검색결과 1,491건 처리시간 0.034초

Complexity Results for the Design Problem of Content Distribution Networks

  • Choi, Byung-Cheon;Chung, Jibok
    • Management Science and Financial Engineering
    • /
    • 제20권2호
    • /
    • pp.7-12
    • /
    • 2014
  • Content Delivery Network (CDN) has evolved to overcome a network bottleneck and improve user perceived Quality of Service (QoS). A CDN replicates contents from the origin server to replica servers to reduce the overload of the origin server. CDN providers would try to achieve an acceptable performance at the least cost including the storage space or processing power. In this paper, we introduce a new optimization model for the CDN design problem considering the user perceived QoS and single path (non-bifurcated) routing constraints and analyze the computational complexity for some special cases.

Communal Antecedents in the Adoption of Secure Coding Methodologies

  • Kim, Sung Kun;Kim, Ji Young
    • Asia pacific journal of information systems
    • /
    • 제26권2호
    • /
    • pp.231-246
    • /
    • 2016
  • Technology acceptance model has demonstrated that technology adoption behavior can be explained by two user belief constructs: perceived usefulness and perceived ease of use. A number of studies have explored how these beliefs develop by utilizing primarily individual-level antecedents. However, because innovation and new techniques bear a direct relation to social concerns, non-individual antecedents may be necessary. Therefore, in this study, social and organizational supports are used to understand how software developers foster beliefs regarding secure coding practices. We compiled data from 83 software developers to evaluate the technology acceptance model. Our findings show that these collective antecedents can effectively explain user belief constructs and the intention to adopt secure coding methodologies. These findings imply that society and organizations offering more concrete support programs will experience smoother deployment of security-enhancing measures.

IMT-2000 이동통신시스템의 보안기능구조 및 무선링크 성능 분석 (Security Architecture and Performance Analysis of Air Interface for IMT-2000 Mobile Systems)

  • 권수근
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2001년도 춘계학술대회논문집:21세기 신지식정보의 창출
    • /
    • pp.55-63
    • /
    • 2001
  • IMT-2000이동시스템에서는 빠른 전송속도의 지원으로 무선인터넷, 전자상거래 등 많은 응용서비스의 제공이 예상된다. 이들 서비스는 인증, 데이터 무결성, 데이터 암호화 등 높은 수준의 보안기능을 요구한다. 본 논문에서는 IMT-2000에서 암호화, 인증 등 망접속 보안 기능 제공에 따른 무선링크의 성능 분석을 수행하였다. 보안 기능의 추가에 따라 모든 구성 시스템간의 링크에서 관련 메시지 전송에 따른 부하가 증가하나 추가되는 용량의 처리가 쉽게 해결 가능한 유선구간에서의 성능분석은 제시하고 메시지 증가에 가장 민감한 구간인 무선링크에 대만 성능에 미치는 영향을 분석하였다.

  • PDF

휴대폰결제 방식에 대한 소비자의 인지적 특성에 관한 연구 (A study on the consumer's perceptual characteristics of cellular-phone payment system)

  • 이석기;조영빈;김성희
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 2002년도 춘계공동학술대회
    • /
    • pp.673-677
    • /
    • 2002
  • Cellular-phone payment system is a new innovating technology emerged in Korea since fool. Previous studies concerning the electronic payment system are usually about the payment process itself, so they focused on the matter such as security or the robustness of the process. The study from the angle of behavioral science seldom exists. This article Identifies which characteristic of the cellular-phone payment service affects to the user status (user, non-users). To do this, we used perceptual 4 characteristics in Roger's Technology Acceptance Model with one additional characteristic-security.

  • PDF

Institutional Improvement of Irrigation Management System in Korea

  • Chung, Sang-Ok
    • 한국농공학회지
    • /
    • 제44권7호
    • /
    • pp.74-82
    • /
    • 2002
  • There are two major operation and management (O & M) systems in Korea, one by the Korea Agricultural and Rural Infrastructure Corporation (KARICO), a government corporation, and the other by non-KARICO, which includes Irrigation associations (IAs) and individual farmers under the supervision of city or county authorities. Main issues and constraints in the irrigation facility management are: (1) The dual system of the irrigation water management system; management by KARICO and that by IAs, and (2) From the commencement of KAICO in 2000, farmers were exempted from water charge. This is opposite to the international trend, which follows' user pay principle: Main specific strategies to improve irrigation management system are: (1) Introduction of water metering for water charge as well as water conservation, (2) Adoption of demand-oriented irrigation rather than supply-oriented to reduce waste of water, (3) To augment farmer's participation by forming water user associations, (4) To maintain consistency of government policy, (5) To promote roles of local governments, and (6) To reestablish the role of KARICO.

Acceptance-Diffusion Strategies for Tablet-PCs: Focused on Acceptance Factors of Non-Users and Satisfaction Factors of Users

  • Kim, You-Jin;Sim, Jin-Bo
    • ETRI Journal
    • /
    • 제34권2호
    • /
    • pp.245-255
    • /
    • 2012
  • Among emerging devices propelling the growth of mobile devices, smartphones and tablet-PCs are among the most recognizable. In this study, a research model is designed for exploring acceptance-diffusion strategies for tablet-PCs from the viewpoint of consumer perception, which is verified through a survey. The results of this study show that tablet-PCs have great potential to be versatile, multifunctional devices, even though they are currently considered mostly as entertainment-oriented rather than fulfilling the essential needs of everyday life. An analysis of the acceptance model for tablet-PCs revealed that playability, cost level, functionality, and complexity significantly affect user acceptance. An analysis of the diffusion model, on the other hand, showed that playability and user interface have a significant influence on satisfaction, trust, and positive behavioral intention. We also found that cost level is not a major hindrance in the market diffusion of tablet-PCs. The results of this study can be used to establish effective acceptance and diffusion strategies for tablet-PCs and other emerging devices.

개방형 무료 Wi-Fi의 해킹위험 사전경고 표시 (Method of Forewarning Display for Hacking Risk in the Open Wi-Fi)

  • 정병문;이태희;이영식;최철재
    • 한국전자통신학회논문지
    • /
    • 제12권6호
    • /
    • pp.1143-1150
    • /
    • 2017
  • 본 논문은 개방형 무료 Wi-Fi 접근영역에서 비전문가들을 위한 사용자 경험인 UX(: User Experience) 개념 차원에서 해킹위험 경고표시 방법을 제안하였다. 캡처에 의해 올라온 AP들의 위험성에 따라 색깔로 구별하며 선택 된 AP에 대하여 사용 전에 해킹의 위험을 팝업창으로 경고문을 제공하는 앱을 개발하였다.

가변성을 고려한 공동주택 설계의사결정 프로세스에 관한 연구 (A Study on the Design Decision Process for Flexibility in Apartment Housing)

  • 김병환;김현주;최무혁
    • 한국주거학회:학술대회논문집
    • /
    • 한국주거학회 2002년도 추계학술발표대회
    • /
    • pp.345-348
    • /
    • 2002
  • Recent demographic changes have increased the heterogeneity of user groups in the housing market. Smaller households(e.g. elderly, single parent) have non-traditional spatial requirements that cannot be accommodated within the conventional house layout. This has created renewed interest in Demountable/Flexible housing systems. However, the process by which designers decide which project or user groups are most suited for the use of these systems is quite often complex, uncertain and dynamic, since the decisions involve natural processes and human values that are apparently random. This study is a proposal on the design process model for the flexibility of apartment.

  • PDF

Discriminative and Non-User Specific Binary Biometric Representation via Linearly-Separable SubCode Encoding-based Discretization

  • Lim, Meng-Hui;Teoh, Andrew Beng Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.374-388
    • /
    • 2011
  • Biometric discretization is a process of transforming continuous biometric features of an identity into a binary bit string. This paper mainly focuses on improving the global discretization method - a discretization method that does not base on information specific to each user in bitstring extraction, which appears to be important in applications that prioritize strong security provision and strong privacy protection. In particular, we demonstrate how the actual performance of a global discretization could further be improved by embedding a global discriminative feature selection method and a Linearly Separable Subcode-based encoding technique. In addition, we examine a number of discriminative feature selection measures that can reliably be used for such discretization. Lastly, encouraging empirical results vindicate the feasibility of our approach.

End-to-End Delay Analysis of a Dynamic Mobile Data Traffic Offload Scheme using Small-cells in HetNets

  • 김세진
    • 인터넷정보학회논문지
    • /
    • 제22권5호
    • /
    • pp.9-16
    • /
    • 2021
  • Recently, the traffic volume of mobile communications increases rapidly and the small-cell is one of the solutions using two offload schemes, i.e., local IP access (LIPA) and selected IP traffic offload (SIPTO), to reduce the end-to-end delay and amount of mobile data traffic in the core network (CN). However, 3GPP describes the concept of LIPA and SIPTO and there is no decision algorithm to decide the path from source nodes (SNs) to destination nodes (DNs). Therefore, this paper proposes a dynamic mobile data traffic offload scheme using small-cells to decide the path based on the SN and DN, i.e., macro user equipment, small-cell user equipment (SUE), and multimedia server, and type of the mobile data traffic for the real-time and non-real-time. Through analytical models, it is shown that the proposed offload scheme outperforms the conventional small-cell network in terms of the delay of end-to-end mobile data communications and probability of the mobile data traffic in the CN for the heterogeneous networks.