• Title/Summary/Keyword: online communication

Search Result 1,532, Processing Time 0.025 seconds

Component analysis and reformative plan for Educational On-Line Game - especially on the User Interface Design elements - (교육용 온라인 게임의 구성요소분석 및 개선방안 -사용자 인터페이스 디자인 요소 중심으로-)

  • Kim, Hyo-Suk;Sung, Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.199-205
    • /
    • 2009
  • Supporting the interactive relation between gamer and computer, and offering the game world information, the user interface in online games plays an important role for a gamer to lead game into the intended direction. The purpose of this study is to analyse a currently utilized online game with educational implications and to analyse its user interface design elements, in order to suggest the strategy how to reformative educational online games.

An Online Response System for Anomaly Traffic by Incremental Mining with Genetic Optimization

  • Su, Ming-Yang;Yeh, Sheng-Cheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.375-381
    • /
    • 2010
  • A flooding attack, such as DoS or Worm, can be easily created or even downloaded from the Internet, thus, it is one of the main threats to servers on the Internet. This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association rules from network packets, in which membership functions of fuzzy variables are optimized by a genetic algorithm. The incremental mining approach makes the system suitable for detecting, and thus, responding to an attack in real-time. This system is evaluated by 47 flooding attacks, only one of which is missed, with no false positives occurring. The proposed online system belongs to anomaly detection, not misuse detection. Moreover, a mechanism for dynamic firewall updating is embedded in the proposed system for the function of eliminating suspicious connections when necessary.

Information Sharing on Blogosphere: An Impact of Trust and Online Privacy Concerns

  • Chai, Sang-Mi
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.1-18
    • /
    • 2011
  • Blog have become very popular with Internet users as one of the latest forms of online communication as well as knowledge sharing tools. However, blogs generate growing concerns regarding information privacy issues. This study, based on social exchange theory, presents results about bloggers' information sharing behavior. The 157 surveys are collected from a large university in the eastern U.S. The survey results indicate that trust which has four second order factors: economy based trust, trust in reciprocity, trust in other bloggers and trust in social interaction positively affects bloggers' information sharing behavior. However, online information privacy concerns have a negative impact on the relationship between trust and bloggers' information sharing behavior.

Antecedents and Consequences of Flow Experience in Online Movie Information Sharing Behavior: An Empirical Study of Young Chinese Moviegoers Living in Korea

  • Zhu, Zong-yi;Kim, Hyeon-Cheol
    • International journal of advanced smart convergence
    • /
    • v.9 no.1
    • /
    • pp.141-153
    • /
    • 2020
  • This study aims to understand the antecedents and consequences of flow experience in online movie information sharing behavior of young Chinese moviegoers residing in Korea to explore a potential market. We followed the Stimulus-Organism-Response (S-O-R) theory and flow theory approaches for developing measures of constructs and investigated previous related studies. This study collected 186 data from Chinses students who attend Korean university. Statistical analysis revealed that information seeking behavior and telepresence are related to online flow experience. In addition, the online flow experience affected consumer satisfaction and information sharing behavior. Flow experience also has been predicted the mediation effect between stimulus information seeking behavior, telepresence and satisfaction and information sharing behavior. Our research findings offer insights for marketers in the movie distribution business who are interested in a better understanding of the behaviors of Chinese moviegoers residing in Korea

ONLINE TEST BASED ON MUTUAL INFORMATION FOR TRUE RANDOM NUMBER GENERATORS

  • Kim, Young-Sik;Yeom, Yongjin;Choi, Hee Bong
    • Journal of the Korean Mathematical Society
    • /
    • v.50 no.4
    • /
    • pp.879-897
    • /
    • 2013
  • Shannon entropy is one of the widely used randomness measures especially for cryptographic applications. However, the conventional entropy tests are less sensitive to the inter-bit dependency in random samples. In this paper, we propose new online randomness test schemes for true random number generators (TRNGs) based on the mutual information between consecutive ${\kappa}$-bit output blocks for testing of inter-bit dependency in random samples. By estimating the block entropies of distinct lengths at the same time, it is possible to measure the mutual information, which is closely related to the amount of the statistical dependency between two consecutive data blocks. In addition, we propose a new estimation method for entropies, which accumulates intermediate values of the number of frequencies. The proposed method can estimate entropy with less samples than Maurer-Coron type entropy test can. By numerical simulations, it is shown that the new proposed scheme can be used as a reliable online entropy estimator for TRNGs used by cryptographic modules.

Motivation of Emoticon Usage in Online Messenger Service: Focusing on Regulatory Focus (온라인 메신저 서비스에서의 이모티콘 사용 동기: 조절초점 성향을 중심으로)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Knowledge Management Research
    • /
    • v.21 no.2
    • /
    • pp.101-118
    • /
    • 2020
  • The usage of emoticons used in the online environment continues to increase, and also the market for emoticons is growing rapidly. Emoticons go beyond simply conveying the meaning of a message and play various roles such as smooth communication, pursuit of fun, and intimacy. In this study, we first identify the factors that motivate users to use emoticons in an online messenger service, and then determine whether the derived factors have a significant effect on emoticon usage. Furthermore, based on Regulatory Focus Theory, we will distinguish between the group of promotion focus and the group of prevention focus to see how the influence of motives on emoticon usage differs.

Online Evolution for Cooperative Behavior in Group Robot Systems

  • Lee, Dong-Wook;Seo, Sang-Wook;Sim, Kwee-Bo
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.2
    • /
    • pp.282-287
    • /
    • 2008
  • In distributed mobile robot systems, autonomous robots accomplish complicated tasks through intelligent cooperation with each other. This paper presents behavior learning and online distributed evolution for cooperative behavior of a group of autonomous robots. Learning and evolution capabilities are essential for a group of autonomous robots to adapt to unstructured environments. Behavior learning finds an optimal state-action mapping of a robot for a given operating condition. In behavior learning, a Q-learning algorithm is modified to handle delayed rewards in the distributed robot systems. A group of robots implements cooperative behaviors through communication with other robots. Individual robots improve the state-action mapping through online evolution with the crossover operator based on the Q-values and their update frequencies. A cooperative material search problem demonstrated the effectiveness of the proposed behavior learning and online distributed evolution method for implementing cooperative behavior of a group of autonomous mobile robots.

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'

  • Tallapally, Shirisha;Padmavathy, R.
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.43-52
    • /
    • 2010
  • In the secure communication areas, three-party authenticated key exchange protocol is an important cryptographic technique. In this protocol, two clients will share a human-memorable password with a trusted server, in which two users can generate a secure session key. On the other hand the protocol should resist all types of password guessing attacks. Recently, STPKE' protocol has been proposed by Kim and Choi. An undetectable online password guessing attack on STPKE' protocol is presented in the current study. An alternative protocol to overcome undetectable online password guessing attacks is proposed. The results show that the proposed protocol can resist undetectable online password guessing attacks. Additionally, it achieves the same security level with reduced random numbers and without XOR operations. The computational efficiency is improved by $\approx$ 30% for problems of size $\approx$ 2048 bits. The proposed protocol is achieving better performance efficiency and withstands password guessing attacks. The results show that the proposed protocol is secure, efficient and practical.

Machine Learning-Based Programming Analysis Model Proposal : Based on User Behavioral Analysis

  • Jang, Seonghoon;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.179-183
    • /
    • 2020
  • The online education platform market is developing rapidly after the coronavirus infection-19 pandemic. As school classes at various levels are converted to non-face-to-face classes, interest in non-face-to-face online education is increasing more than ever. However, the majority of online platforms currently used are limited to the fragmentary functions of simply delivering images, voice and messages, and there are limitations to online hands-on training. Indeed, digital transformation is a traditional business method for increasing coding education and a corporate approach to service operation innovation strategy computing thinking power and platform model. There are many ways to evaluate a computer programmer's ability. Generally, piecemeal evaluation methods are used to evaluate results in time through coding tests. In this study, the purpose of this study is to propose a comprehensive evaluation of not only the results of writing, but also the execution process of the results, etc., and to evaluate the programmer's propensity habits based on the programmer's coding experience to evaluate the programmer's ability and productivity.

A Study of Factors Influencing on Receivers' Communication Style in Internet Shopping Mall Contents (인터넷 쇼핑몰 콘텐츠에서 정보수신자의 커뮤니케이션 스타일에 미치는 영향요인에 관한 연구)

  • Chun Myung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.3
    • /
    • pp.75-84
    • /
    • 2006
  • The internet has the capabilities of supporting and facilitating several forms of consumer interaction including one-to-one, one to many, or many-to-many interactions. Especially, previous studies revealed that the Online Word-of-Mouth communication is widely used as a source of customer's information seeking and purchase decision making. Even with this importance of the Online Word-of-Mouth communication on internet, few research has systematically addressed the issue. This study investigates the effect of interpersonal communication on consumers' information search activities and develops a model that depicts the key antecedents and mediating variables of interpersonal communication in internet shopping environment. The results are as follows: First, choice uncertainty, perceived risk, and knowledge uncertainty play an important role for perceived usefulness. Second, perceived usefulness has directly affected interactive communication of consumers' communication style. Thus, it is essential for internet companies to find ways to encourage their customers to engage in word-of-mouth communication.

  • PDF