• Title/Summary/Keyword: switched model

Search Result 209, Processing Time 0.028 seconds

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

Leased Line Traffic Prediction Using a Recurrent Deep Neural Network Model (순환 심층 신경망 모델을 이용한 전용회선 트래픽 예측)

  • Lee, In-Gyu;Song, Mi-Hwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.391-398
    • /
    • 2021
  • Since the leased line is a structure that exclusively uses two connected areas for data transmission, a stable quality level and security are ensured, and despite the rapid increase in the number of switched lines, it is a line method that is continuously used a lot in companies. However, because the cost is relatively high, one of the important roles of the network operator in the enterprise is to maintain the optimal state by properly arranging and utilizing the resources of the network leased line. In other words, in order to properly support business service requirements, it is essential to properly manage bandwidth resources of leased lines from the viewpoint of data transmission, and properly predicting and managing leased line usage becomes a key factor. Therefore, in this study, various prediction models were applied and performance was evaluated based on the actual usage rate data of leased lines used in corporate networks. In general, the performance of each prediction was measured and compared by applying the smoothing model and ARIMA model, which are widely used as statistical methods, and the representative models of deep learning based on artificial neural networks, which are being studied a lot these days. In addition, based on the experimental results, we proposed the items to be considered in order for each model to achieve good performance for prediction from the viewpoint of effective operation of leased line resources.

A Performance Analysis of the Virtual CellSystem for Mobile Hosts (이동 호스트를 위한 가상 셀 시스템의 성능 분석)

  • Lim, Kyung-Shik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.10
    • /
    • pp.2627-2640
    • /
    • 1998
  • In this paper, we analyze the performance of the virtual cell system[1] for the transmission of IP datagrams in mobile computer communications. A virtual cell consistsof a group of physical cells shose base stationsl are implemented b recote bridges and interconnected via high speed datagram packet switched networks. Host mobility is supported at the data link layer using the distributed hierachical location information of mobile hosts. Given mobility and communication ptems among physical cells, the problem of deploying virtual cells is equivalent to the optimization cost for the entire system where interclster communication is more expesive than intracluster communication[2]. Once an iptimal partitionof disjoint clusters is obtained, we deploy the virtual cell system according to the topology of the optimal partition such that each virtual cell correspods to a cluser. To analyze the performance of the virtual cell system, we adopt a BCMP open multipel class queueing network model. In addition to mobility and communication patterns, among physical cells, the topology of the virtual cell system is used to determine service transition probabilities of the queueing network model. With various system parameters, we conduct interesting sensitivity analyses to determine network design tradeoffs. The first application of the proposed model is to determine an adequate network bandwidth for base station networking such that the networks would not become an bottleneck. We also evaluate the network vlilization and system response time due to various types of messages. For instance, when the mobile hosts begin moving fast, the migration rate will be increased. This results of the performance analysis provide a good evidence in demonsratc the sysem effciency under different assumptions of mobility and communication patterns.

  • PDF

Performance Analysis of The CCITT X.25 Protocol (X. 25 Protocol의 성능 분석)

  • 최준균;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.1
    • /
    • pp.25-39
    • /
    • 1986
  • In this paper, we analyze the performance, particularly the flow control mechanism, of the CCITT X.25 protocol in a packet-switched network. In this analysis, we consider the link and packet layers separately, and investigate the performance in three measures; normalized channel throughput, mean transmission time, and transmission efficiency. Each of these measures is formulated in terms of given protocol parameters such as windos size, $T_1$ and $T_2$ values, message length, and so forth. We model the service procedure of the inpur traffic based on the flow control mechanism of the X.25 protocol, and investigate the mechanism of the sliding window flow control with the piggybacked acknowlodgment scheme using a discrete-time Markov chain model. With this model, we study the effect of variation of the protoccol parameters on the performance of the X.25 protocol. From the numerical results of this analysis one can select the optimal valuse of the protocol parameters for different channel environments. it has been found that to maintain the trasnmission capacity satisfactorily, the window size must be greater than or equal to 7 in a high-speed channel. The time-out value, $T_1$, must carefully be selected in a noisy channel. In a normal condition, it should be in the order of ls. The value of $T_2$ has some effect on the transmission efficiency, but is not critical.

  • PDF

A New Measurement Method of the Ground Resistance Using a Low-pass Filter in Energized Substations (지역필터를 이용한 수변전실 접지저항의 새로운 측정방법)

  • Lee, Bok-Hui;Eom, Ju-Hong;Lee, Seung-Chil;Kim, Seong-Won;An, Chang-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.50 no.8
    • /
    • pp.387-393
    • /
    • 2001
  • This paper describes an advanced measuring method and precise evaluation of the ground resistance for the grounding system of energized substations and power equipments. A grounding system of substations consists of all interconnected grounding connections of grounded conductors, neutral ground wires, underground conductors of distribution lines, cable shields, grounding terminals of equipments, and etc. It is very difficult to measure the accurate ground resistance of the grounding terminals of equipments, and etc. It is very difficult to measure the accurate ground resistance of the grounding system of high voltage energized substations because of harmonic components caused by switched power supplies or overloads. The conventional fall-of-potential method may be subject to big error if stray ground currents and potentials are present. In this work, to improve the precision in measurements of the ground resistance by eliminating the effects of harmonic components and stray currents and potentials, the investigations of the ground resistance measurement by using a low pass filter in a model energized grounding system were conducted. The accuracy of ground resistance mesurements was evaluated as a function of the ratio of the test signal to noise (S/N). The errors due to the proposed ground resistance measurement method were decreased with increasing S/N and were less than 5[%] as S/N is 10. The proposed ground resistance measurement method appears to be considerably more accurate than the conventional fall-of -potential method. It is allows cancellation of the parasitic resistance of energized grounding systems, to employ the measurement method that allows cancellation of the parasitic effects due to other circulating ground currents and ground potential rises in practical situations.

  • PDF

A Study on the Application of Spatial Information Standards to Existing Technical Regulations (기존 기술기준의 공간정보 표준 적용연구)

  • Ko, Jae-Yong;Kim, Young-Wook;Kim, Eun-Hyung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.47 no.2
    • /
    • pp.121-133
    • /
    • 2017
  • Technical regulations in the spatial information domain have been developed by a variety of independent organizations and raised inconsistent and overlapping problems with spatial information standards. Many research projects have been done to solve these problems but due to the difficulty of changing or modifying existing administrative regulations, almost nothing has happened for the harmonization. As a response to the fundamental problem, KATS (Korean Agency for Technology and Standards) recently switched the existing system to "trans- governmental participatory standard operation system" and the administrative change created an independent and consistent standard system in the Ministry of Land, Infrastructure and Transport. The Ministry, as a part of the effort, established its own KSDI(Korean Spatial Data Infrastructure) Standard system. From this context this paper presents a redefinition of technical regulation for the harmonization with spatial information standards, an association model between the standards and regulations, and a maintenance methodology to solve the fore-mentioned problems.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

Preparation and Release Characteristics of Polymer-Reinforced and Coated Alginate Beads

  • Lee, Beom-Jin;Min, Geun-Hong
    • Archives of Pharmacal Research
    • /
    • v.18 no.3
    • /
    • pp.183-188
    • /
    • 1995
  • Polymeric reinforcement and coatings of alginate beads were carried out to control the release rate of drug from alginate beads. A poorly water-soluble ibuprofen (IPF) was selected as a model drug. A commercially available $Eudragit^{\circledR}$ RS100 was also used as a polymer. Effects of polymeric contents, the presence of plasticizers and amount of drug loading on the release rate of drug were investigated. The release rate of drug from alginate beads in the simulated gastric fluid did not occur within 2 h but released immediately when dissolution media were switched to the simulated intestinal fluid. No significant difference of release rate from polymer-reinforced alginate bead without plasticizers was observed when compared to plain (simple) beads. However, the release rate of drug from polymer-reinforced alginate beads was further sustained and retarded when aluminium tristearate (AT) as a plasticizer was added to polymer. However, polyethylene glycol 400 (PEG400) did not change the release rate of drug from alginate beads although PEG400 was used to improve dispersion of polymer and sodium alginate, and plasticize $Eudragit^{\circledR}$ RS100 polymer. The presence of plasticizer was crucial to reinforce alginate gel matrices using a polymer. As the amount of drug loading increased, the release rate of drug increased as a result of decreasing effects of polymer contents in matrices. The significantly sustained release of drug from polymer-coated alginate beads occurred as the amount of polymer increased because the thickness of coated membrane increased so that cracks and pores of the outer surface of alginate beads could be reduced. The sustained and retarded action of polymer-reinforced and coated beads may result from the disturbance of swelling and erosion (disintegration) of alginate beads. From these findings, polymeric-reinforcement and coatings of alginate gel beads can provide an advanced delivery system by retarding the release rate of various drugs.

  • PDF

Call Admission Control for Shared Buffer Memory Switch Network with Self-Similar Traffic (Self-Similar 트래픽을 갖는 공유버퍼 메모리 스위치 네트워크 환경에서 호 수락 제어 방법)

  • Kim Ki wan;Kim Doo yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.162-169
    • /
    • 2005
  • Network traffic measurements show that the data traffic on packet switched networks has the self-similar features which is different from the traditional traffic models such as Poisson distribution or Markovian process model. Most of the call admission control researches have been done on the performance analysis of a single network switch. It is necessary to consider the performance analysis of the proposed admission control scheme under interconnected switch environment because the data traffic transmits through switches in networks. From the simulation results, it is shown that the call admission control scheme may not operate properly on the interconnected switch even though the scheme works well on a single switch. In this parer, we analyze the cell loss probability, utilization and self-similarity of output ports of the interconnected networks switch by using shared buffer memory management schemes and propose the new call admission control scheme considering the interconnected network switches under self-similar traffic environments.

The NNI Interface Model of the ATM-Based Information Infra-Network of Korea (국내 ATM 기반 초고속정보통신망의 NNI 적용 모델 연구)

  • Yang, Seon-Hui;Jeong, Tae-Su;Kim, Eun-A;Choe, Jun-Gyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.729-741
    • /
    • 1999
  • ATM networks are widely deployed as the network that is capable of supporting multimedia services efficiently now. To date, a large portion of ATM connections, particularly in the WAN environment, have been of a permanent virtual circuits-requiring management intervention for set-up and tear-down. However, switched virtual circuits are required to support a range of desired characteristics on demand, to a reachable end user. To establish, maintain and release on-demand call/connections, the user-network interface(UNI) and node-node interface(NNI) signalling capabilities are required. Two protocols have been specified for NNI signalling within a public network: the broadband integrated-services user part(B-ISUP) protocol specified by the ITU-T, and the private network-network interface(PNNI) protocol specified by the ATM Forum. PNNI offers different type of internetwork or internodal interface from the traditional B-ISUP approach favored to date public network operators. In spite of its name, PNNI may find its place in network service provide networks as well as in private networks. Thus many public network operators and ATM equipment manufacturers are still unable to choose the NNI interface architecture of their system. In this paper, we survey the characteristics of the B-ISUP and PNNI protocols, and investigate the applicability issue of these specifications to the ATM-based Information Infra-Network of Korea. Analyzing the characteristics of the two protocols and clarifying the NNi requirements of the ATM-based Information Infra-Network of Korea, we propose that the B-ISUP protocol is more suitable than PNNI.

  • PDF