• 제목/요약/키워드: probability of Internet use

Search Result 102, Processing Time 0.024 seconds

Digital divide among women: Focusing on the effects of socio-economic variables on Internet use (여성의 정보화촉진을 위한 인터넷 사용행동 연구)

  • 이성림;박명희;서정희
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.2
    • /
    • pp.177-193
    • /
    • 2004
  • Using data from the 2001 Computer and Internet Use Survey by the National Statistical Office, this study investigated digital divide among women aged between 20 and 55. Following were the major findings. first, two-thirds of women did not use Internet even though many of these had Internet access at home. Second, those who did not have Internet access at home, those with a lower level of educational attainment, those with blue color or service occupations, and those with higher age were less likely to use Internet than their counterparts in these socio-economic variables. Third, expanding Internet infrastructure would not improve Internet use of the Elderly. Forth, the majority of those who did not use Internet did not recognize the Internet itself. Based on the result the policy implications for digital divide were suggested.

Spectrum Sensing Techniques for Cognitive radio-A Review

  • Matin, Mohammad A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3638-3654
    • /
    • 2014
  • Cognitive Radio (CR) users need to sense the environment or channel at regular time interval for sharing the spectrum band of the primary users (PUs). Once find the spectrum idle, CR users start their transmission through it. Even while transmitting, they need to continue the sensing process so that they can leave the spectrum immediately whenever find a PU wanting to use the band. Therefore, detecting PUs is one of the main functions of cognitive radio before transmission and higher the detection probability ensures better protection to the primary users. However, it is not possible to attain a high detection probability (or a low miss detection probability) and low false alarm probability simultaneously as there is a tradeoff between false alarm probability ($P_{fa}$) and the probability of detection ($P_d$). In this paper, the author has provided a comprehensive study on different sensing techniques and discussed their advantages and disadvantages. Moreover, it is expected that, with this article, readers can have a through understanding of sensing techniques in CR and the current research trends in this area.

Development and Comparison of Data Mining-based Prediction Models of Building Fire Probability

  • Hong, Sung-gwan;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.101-112
    • /
    • 2018
  • A lot of manpower and budgets are being used to prevent fires, and only a small portion of the data generated during this process is used for disaster prevention activities. This study develops a prediction model of fire occurrence probability based on data mining in order to more actively use these data for disaster prevention activities. For this purpose, variables for predicting fire occurrence probability of various buildings were selected and data of construction administrative system, national fire information system, and Korea Fire Insurance Association were collected and integrated data set was constructed. After appropriate data cleansing and preprocessing, various data mining methodologies such as artificial neural network, decision trees, SVM, and Naive Bayesian were used to develop a prediction model of the fire occurrence probability of buildings. The most accurate model among the derived models is Linear SVM model which shows 68.42% as experimental data and 63.54% as verification data and it is the best model to predict fire occurrence probability of buildings. As this study develops the prediction model which uses only the set values of the specific ranges, future studies may explore more opportunites to use various setting values not shown in this study.

Analysis on Co-use Performance of System according to Transmission Probability (전송확률에 따른 시스템 공유 성능 분석)

  • Cho, Ju-Phil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.173-178
    • /
    • 2011
  • In this paper, we analyze the total performance according to transmit probability of interfering transmitter in hetero systems. We analyze this criteria as a parameter for co-use when hetero systems share the same frequency channels. In order to make an analysis of relationship between transmit probability and performances of two systems. We take into consideration on the case that WLAN is a victim receiver and WiBro is an interfering transmitter. Analyzed coexistence results may be widely applied into the technique developed to get the coexisting condition for wireless devices using many communication protocols in same frequency.

Frequent Internet Pornography Use: Korean Adolescents' Internet Use Time, Mental Health, Sexual Behavior, and Delinquency

  • Cho, Eunsuk
    • International Journal of Human Ecology
    • /
    • v.17 no.1
    • /
    • pp.27-37
    • /
    • 2016
  • This study was to understand associated factors with frequent exposure to Internet pornography among Korean adolescents. We used data (N = 45,783) from the 2012 Korea Youth Risk Behavior Web-based Survey to examine demographics, family environmental variables, Internet use time, mental health indicators, sexual behavior, and delinquency among Korean adolescents identified as frequent users of Internet pornography. Multiple logistic regression analysis revealed that frequent users of Internet pornography were more likely to be older males with differences in living arrangements and perceived economic status of the family. They were heavy Internet users with mental health issues, such as a higher likelihood of sadness, suicidal ideation, suicide attempts, high stress, and a lower likelihood of feeling happiness. Their higher probability of exploratory (OR =1.79-4.60), and high-risk sexual behavior (OR = 2.20-7.46), and other delinquencies (OR = 1.74-7.68) requires more attention from public health professionals.

Security Framework for Improving the Performance of the Malicious Process Control System (악성 프로세스 제어 시스템의 성능 향상을 위한 보안 프레임워크)

  • Kim, Iksu;Choi, Jongmyung
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.61-71
    • /
    • 2013
  • Until now, there have been various studies against Internet worms. Most of intrusion detection and prevention systems against Internet worms use detection rules, but these systems cannot respond to new Internet worms. For this reason, a malicious process control system which uses the fact that Internet worms multicast malicious packets was proposed. However, the greater the number of servers to be protected increases the cost of the malicious process control system, and the probability of detecting Internet worms attacking only some predetermined IP addresses is low. This paper presents a security framework that can reduce the cost of the malicious process control system and increase the probability of detecting Internet worms attacking only some predetermined IP addresses. In the proposed security framework, virtual machines are used to reduce the cost of control servers and unused IP addresses are used to increase the probability of detecting Internet worms attacking only some predetermined IP addresses. Therefore the proposed security framework can effectively respond to a variety of new Internet worms at lower cost.

A Study on VoIP Information Security for Vocie Security based on SIP

  • Sung, Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.1
    • /
    • pp.68-72
    • /
    • 2008
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eaves-drop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

Performance Analysis of LAN Interworking Unit for Capacity Dimensioning of Internet Access Links

  • Park, Chul-geun;Han, Dong-hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.692-699
    • /
    • 2000
  • We build and analyze some types of queueing model to discuss capacity dimensioning of access links of a LAN interworking unit connected to the Internet backbone network. We assume that the IWU has a FIFO buffer to transmit IP packets to the Internet through the backbone. In order to analyze the system, we use a Poisson process and an MMPP process as input traffic models of IP packets and we use a general service time distribution as a service time model. But we use both an exponential service time and a deterministic service time in numerical examples for simple and efficient performance comparisons. As performance measures, we obtain the packet loss probability and the mean packet delay. We present some numerical results to show the effect of arrival rate, buffer size and link capacity on packet loss and mean delay.

  • PDF

Analysis of Error Probability of Mobile Satellite Communication System In Korea Peninsula Area (한반도 지역에서 이동형 위성단말의 오류확률 분석)

  • Lee, Huikyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.67-71
    • /
    • 2019
  • In this paper, we derive a reference error probability performance in the environment where mobile satellite terminal is operated. When the satellite terminal moves, shadowing occurs due to the surrounding obstacles and the BER is lowered. We use the Lutz model simulating the environment in which mobile satellite terminals operate The Lutz model combines the Rician distribution with the Suzuki model. The error probability is derived from the numerical analysis of two distribution functions. The simulated results using the measured results in the Korean Peninsula forest area were similar to the BER results obtained using the Lutz model. Intuitively, the approximated results are similar to the measured results. Numerically, the BER error is about 3e-4 or less at an SNR of 30dB.

Design of Internet Phon(VoIP) System for Voice Security based on VPN (VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계)

  • Kim Suk-Hun;Kim Eun-Soo;Song Jung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.942-949
    • /
    • 2006
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.