• Title/Summary/Keyword: systems-theory

Search Result 5,367, Processing Time 0.036 seconds

A Review of Research on Social Network Services Using the New Media Evolutionary Model (뉴미디어 발전단계모델을 적용한 소셜네트워크 서비스 분야의 연구동향분석)

  • Kwak, Hyun;Lee, Ho Geun
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.3-24
    • /
    • 2011
  • The purpose of this paper is to indicate possible future research directions for social network services(SNS) by reviewing past and recent trends in SNS studies. The framework used for the analysis is the New Media Evolutionary Model(NMEM) proposed by Wimmer and Dominick, a four-phase system for research on new media development. Although early forms of SNS emerged in the late 1990s, most research in this field has been published in the past five years. We searched for SNS-related articles published from 2006 to August 2011 from academic journal archives in information systems, communication, marketing, and other fields, and classified them according to the NMEM to analyze the current state of SNS research. Researchers in this field have so far focused on the first two phases of the model(the media itself and use of the media), but little research has been conducted on the third(effects of the media) and fourth phases(improvements in the media). Although SNS research is still in its early stages, we suggest the need for more studies on the effects of SNS and how it can be improved. Very few studies test existing theories or build new theories related to SNS. Thus, a more rigorous approach towards SNS research is warranted, and future research should focus on theory building and testing.

  • PDF

A Study of SIL Allocation with a Multi-Phase Fuzzy Risk Graph Model (다단계 퍼지 리스크 그래프 모델을 적용한 SIL 할당에 관한 연구)

  • Yang, Heekap;Lee, Jongwoo
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.2
    • /
    • pp.170-186
    • /
    • 2016
  • This paper introduces a multi-phase fuzzy risk graph model, representing a method for determining for SIL values for railway industry systems. The purpose of this paper is to compensate for the shortcomings of qualitative determination, which are associated with input value ambiguity and the subjectivity problem of expert judgement. The multi-phase fuzzy risk graph model has two phases. The first involves the determination of the conventional risk graph input values of the consequence, exposure, avoidance and demand rates using fuzzy theory. For the first step of fuzzification this paper proposes detailed input parameters. The fuzzy inference and the defuzzification results from the first step will be utilized as input parameters for the second step of the fuzzy model. The second step is to determine the safety integrity level and tolerable hazard rate corresponding to be identified hazard in the railway industry. To validate the results of the proposed the multi-phase fuzzy risk graph, it is compared with the results of a safety analysis of a level crossing system in the CENELEC SC 9XA WG A0 report. This model will be adapted for determining safety requirements at the early concept design stages in the railway business.

Model Based Approach to Estimating Privacy Concerns for Context-Aware Services (상황인식서비스를 위한 모델 기반의 프라이버시 염려 예측)

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.97-111
    • /
    • 2009
  • Context-aware computing, as a core of smart space development, has been widely regarded as useful in realizing individual service provision. However, most of context-aware services so fat are in its early stage to be dispatched for actual usage in the real world, caused mainly by user's privacy concerns. Moreover, since legacy context-aware services have focused on acquiring in an automatic manner the extra-personal context such as location, weather and objects near by, the services are very limited in terms of quality and variety if the service should identify intra-personal context such as attitudes and privacy concern, which are in fact very useful to select the relevant and timely services to a user. Hence, the purpose of this paper is to propose a novel methodology to infer the user's privacy concern as intra-personal context in an intelligent manner. The proposed methodology includes a variety of stimuli from outside the person and then performs model-based reasoning with social theory models from model base to predict the user's level of privacy concern semi-automatically. To show the feasibility of the proposed methodology, a survey has been performed to examine the performance of the proposed methodology.

  • PDF

Design of TMO Model based Dynamic Analysis Framework: Components and Metrics (TMO모델 기반의 동적 분석 프레임워크 설계 : 구성요소 및 측정지수)

  • Jeong, Yoon-Seok;Kim, Tae-Wan;Chang, Chun-Hyon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.377-392
    • /
    • 2005
  • A lot of studies to measure and analyze the system performance have been done in areas such as system modeling, performance measurement, monitoring, and performance prediction since the advent of a computer system. Studies on a framework to unify the performance related areas have rarely been performed although many studies in the various areas have been done, however. In the case of TMO(Time-Triggered Message-Triggered Object), a real-time programming model, it hardly provides tools and frameworks on the performance except a simple run-time monitor. So it is difficult to analyze the performance of the real-time system and the process based on TMO. Thus, in this paper, we propose a framework for the dynamic analysis of the real-time system based on TMO, TDAF(TMO based Dynamic Analysis Framework). TDAF treats all the processes for the performance measurement and analysis, and Provides developers with more reliable information systematically combining a load model, a performance model, and a reporting model. To support this framework, we propose a load model which is extended by applying TMO model to the conventional one, and we provide the load calculation algorithm to compute the load of TMO objects. Additionally, based on TMO model, we propose performance algorithms which implement the conceptual performance metrics, and we present the reporting model and algorithms which can derive the period and deadline for the real-time processes based on the load and performance value. In last, we perform some experiments to validate the reliability of the load calculation algorithm, and provide the experimental result.

Dynamic Multi-Proxy Signature Schemes based on Secret Sharing and Diffie-bellman Problem (비밀분산법과 Diffie-Hellman 문제에 기반한 동적 멀티 대리서명 프로토콜)

  • 박소영;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.465-472
    • /
    • 2004
  • Proxy signatures is a signature scheme that an original signer delegates one's signature capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Delegation of authority is a common practice in the real world, in particular, it happens naturally in hierarchical groups such as company, bank and army, etc. In this paper, we propose a new dynamic multi-proxy signature scheme allowing repetitive delegations in a hierarchical group. We adopt multi-proxy signatures to enhance the security of proxy signature. In multi-proxy signatures, plural proxy signers can generate a valid proxy signature collectively on behalf of one original signer. In our scheme, the proxy group is not fixed but constructed dynamically according to some situations. Delegations are processed from higher level to lower level in the hierarchy using delegation tickets. When the original signer wants to delegate one's signature authority, the original signer generates a delegation ticket based on secret sharing and Diffie-Hellman problems. The delegation ticket is shared among proxy signers and then all the proxy signers can generate a valid proxy signature collectively by reconstructing the original signer's delegation ticket. If a certain proxy signer can not attend the proxy signature generating protocol, the proxy signer can also delegate repetitively his partial signature authority to the lower level participants, and then the proxies are constructed dynamically.

A Hybrid Value Predictor using Static and Dynamic Classification in Superscalar Processors (슈퍼스칼라 프로세서에서 정적 및 동적 분류를 사용한 혼합형 결과 값 예측기)

  • 김주익;박홍준;조영일
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.10
    • /
    • pp.569-578
    • /
    • 2003
  • Data dependencies are one of major hurdles to limit ILP(Instruction Level Parallelism), so several related works have suggested that the limit imposed by data dependencies can be overcome to some extent with use of the data value prediction. Hybrid value predictor can obtain the high prediction accuracy using advantages of various predictors, but it has a defect that same instruction has overlapping entries in all predictor. In this paper, we propose a new hybrid value predictor which achieves high performance by using the information of static and dynamic classification. The proposed predictor can enhance the prediction accuracy and efficiently decrease the prediction table size of predictor, because it allocates each instruction into single best-suited predictor during the fetch stage by using the information of static classification. Also, it can enhance the prediction accuracy because it selects a best- suited prediction method for the “Unknown”pattern instructions by using the dynamic classification mechanism. Simulation results based on the SimpleScalar/PISA tool set and the SPECint95 benchmarks show the average correct prediction rate of 85.1% by using the static classification mechanism. Also, we achieve the average correction prediction rate of 87.6% by using static and dynamic classification mechanism.

Design and Implementation of a Hybrid TCP/IP Offload Engine Prototype (Hybrid TCP/IP Offload Engine 프로토타입의 설계 및 구현)

  • Jang Han-Kook;Chung Sang-Hwa;Oh Soo-Cheol
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.5
    • /
    • pp.257-266
    • /
    • 2006
  • Recently TCP/IP Offload Engine (TOE) technology, which processes TCP/IP on a network adapter instead of the host CPU, has become an important approach to reduce TCP/IP processing overhead in the host CPU. There have been two approaches to implementing TOE: software TOE, in which TCP/IP is processed by an embedded processor on a network adapter; and hardware TOE, in which all TCP/IP functions are implemented by hardware. This paper proposes a hybrid TOE that combines software and hardware functions in the TOE. In the hybrid TOE, functions that cannot have guaranteed performance on an embedded processor because of heavy load are implemented by hardware. Other functions that do not impose as much load are implemented by software on embedded processors. The hybrid TOE guarantees network performance near that of hardware TOE and it has the advantage of flexibility, because it is easy to add new functions or offload upper-level protocols of TCP/IP. In this paper, we developed a prototype board with an FPGA and an ARM processor to implement a hybrid TOE prototype. We implemented the hardware modules on the FPGA and the software modules on the ARM processor. We also developed a coprocessing mechanism between the hardware and software modules. Experimental results proved that the hybrid TOE prototype can greatly reduce the load on a host CPU and we analyzed the effects of the coprocessing mechanism. Finally, we analyzed important features that are required to implement a complete hybrid TOE and we predict its performance.

Optimization Method for the Design of LCD Back-Light Unit (LCD Back-Light Unit 설계를 위한 최적화 기법)

  • Seo Heekyung;Ryu Yangseon;Choi Joonsoo;Hahn Kwang-Soo;Kim Seongcheol
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.3
    • /
    • pp.133-147
    • /
    • 2005
  • Various types of ray-tracing methods are used to predict the quantity measures of radiation illumination, the uniformity of illumination, radiation performance of LCD BLU(Hack-Light Unit). The uniformity of radiation illumination is one of the most important design factor of BLU and is usually controlled by the diffusive-ink pattern printed on the bottom of light-guide panel of BLU. Therefore it is desirable to produce an improved (ideally, the optimal) ink pattern to achieve the best uniformity of radiation illumination. In this paper, we applied the Welder-Mead simplex-search method among various direct search method to compute the optimal ink pattern. Direct search methods are widely used to optimize the functions which are often highly nonlinear, unpredictably discontinuous, and nondifferentiable, The ink-pattern controlling the uniformity of radiation illumination is one type of these functions. In this paper, we found that simplex search methods are well suited to computing the optimal diffusive-ink pattern. In extensive numerical testing, we have found the simplex search method to be reasonably efficient and reliable at computing the optimal diffusive-ink pattern. The result also suggests that optimization can improve the functionality of simulation tools which are used to design LCD BLU.

Social Network-Based Knowledge Management System for P2P Environment (P2P 환경에서 사회적 연결망을 활용한 지식관리시스템의 구축)

  • Kim, Youn-Sang;Kwon, Suhn-Beom
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.1
    • /
    • pp.59-79
    • /
    • 2007
  • P2P (Peer to Peer) techniques have been well applied to file sharing due to its cost-effectiveness and convenience. Dynamic network evolution is another good thing for P2P according to addition and deletion of nodes and change of files a node has. Our research proposes a P2P-based KMS (Knowledge Management System). Knowledge of enterprises spreads all over sub-organizations like oversea factories and sales departments and is changed in dynamic manner. P2P techniques are, therefore well matched with knowledge management domain. In order to increase search efficiency, we introduce social network theory into P2P-based KMS. Social network technique makes the most similar nodes (in KMS domain, nodes which has the most similar knowledge) its own neighbors, which makes eventually search efficiency increase. We developed our prototype system P2P-SN-KMS and evaluated by simulation.

  • PDF

Effects of Hope, Grateful Disposition, Workplace Spirituality on Organizational Citizenship Behavior among Nurses (간호사의 희망, 감사성향, 일터영성이 조직시민행동에 미치는 영향)

  • Lim, So-Hee;Choi, Eun-Duck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.277-286
    • /
    • 2017
  • This study assesses the association of nurses' hope, grateful disposition, and workplace spirituality with the goals of providing human resource management plans that lead to efficient and competitive nurse structure by building a nurse organizational culture based on analyzing the influences affecting organizational citizenship behavior. Participants were 147 nurses working in four general hospitals in Seoul and Gyeonggi-do. The survey data were analyzed by frequencies, t-test, ANOVA, Pearson correlation coefficients and multiple stepwise regression via SPSS WIN 18.0. Results showed that organizational citizenship behavior is positively associated with nurse's hope (${\gamma}=.22{\sim}.36$, p<.001), grateful disposition (${\gamma}=.38$, p<.001) and workplace spirituality (${\gamma}=.38{\sim}.54$, p<.001). The significant predictors of organizational citizenship behavior were workplace spirituality (${\beta}=.54$, p<.001), hope of turnover (${\beta}=.12$, p<.001), hope (${\beta}=.09$, p<.001) and grateful disposition (${\beta}=.08$, p<.001), which explained 41.6% of the variance in organizational citizenship behavior. This study systematizes a theory for workplace spirituality processing the early stage research in nurse structure. To improve organizational citizenship behavior among nurses, educational programs and supporting systems should be developed to increase nurses' hope, disposition of grateful disposition, and workplace spirituality.