• 제목/요약/키워드: ubiquity

검색결과 135건 처리시간 0.022초

모바일 서비스를 이용한 Wireless Supply Web 모델링 (Wireless supply web modeling using mobile service)

  • 김태운;김홍배;양성민;차명수;서대희;성낙운
    • 한국IT서비스학회:학술대회논문집
    • /
    • 한국IT서비스학회 2003년도 춘계학술대회
    • /
    • pp.591-597
    • /
    • 2003
  • 모바일 서비스는 공급사슬의 모든 단계와 연관되어 있는데, 특히 재고 주문관리, 주문 충족, 구매, 물류와 모니터링 분야와 밀접히 관련시켜 볼 수 있다. 기본적으로 모바일 서비스의 핵심은 참가자들 간에 정보의 공유로서 이를 통해서 공급사슬의 지각과 반응의 효율을 높일 수 있다. 모바일 서비스의 장점은 편재성(ubiquity), 속도, 추적, 위치확인, 개인화와 안전성에 있다. 공급사슬의 3가지 중요한 요소는 속도, 변화 및 가시성을 들 수 있는데, 모바일 서비스는 이 세가지 분야를 충족시킬 수 있다. 본 연구의 목적은 모바일 서비스를 이용해서 wireless 공급 웹을 모델링 하고자 한다. 재고관리, 원격 진단, 현장 작업자와의 통신, 추적과 모니터링을 포함한 고객요구 충족, 재고의 가시성, 실시간 shop floor data collection, 자산 추적 및 창고관리분야에 적용가능한 고객중심의 공급 웹을 모델링하고 RFID를 이용해서 창고관리 문제에 대한 프로토타입을 제시하고자 한다.

  • PDF

User Experience and the Multi-Stage Adoption of Mobile Apps

  • Kim, Ambrose;Kim, Kyoung-jae
    • Journal of Information Technology Applications and Management
    • /
    • 제21권2호
    • /
    • pp.49-79
    • /
    • 2014
  • The adoption of technology has always been of interest to academicians and practitioners of the field of Management Information System. This is so because without proper and adequate adoption, technology-no matter how beneficial or advanced it may be-will be of little value to users. Numerous researches, such as the researches of the Technology Acceptance Model (TAM) or the Unified Theory of Acceptance and Use of Technology (UTAUT), had been conducted to understand the human nature in association with the adoption or rejection of technologies that have bombarded the users. The coming of smart technologies (i.e., smart phones and devices), however, seems to have fundamentally changed the environment for adoption. The ubiquity combined with mobility of technology, especially when it comes to mobile apps, seem to make the old PC era of two-stage-pre and post-adoption models obsolete. A new model of adoption that identifies the determinants of technology acceptance and continuance is needed for the smart age. To this end, this paper undertakes an empirical study, by analyzing 229 users of Social Networking Service (SNS) mobile apps, to identify the role of user experience on the multi-stage adoption of technology, and provides results that User Experience (UX) plays the crucial role of bridging the separate stages of pre and post adoption of technologies. The paper concludes by providing practical implications of the new model as it relates to mobile apps and technologies, and recommendations for further studies to get a better understanding of technology adoption in the smart age.

인터넷 쇼핑몰의 고객충성도에 대한 통합적 연구 - 옥션과 인터파크 고객을 중심으로 (An Integrated Study for Customer Loyalty in Internet Shopping Mall)

  • 권영국;이선로;박현지
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제15권4호
    • /
    • pp.23-53
    • /
    • 2006
  • The main purpose of this paper is to setup a integrated model and verify the integrated model for a customer loyalty in the internet shopping environments. The results of a structural equation model (SEM) using AMOS and LISREL include: First, hypothesis that Internet environment characteristics in outside factors has a positive effect on satisfaction, trust and commitment is partially supported. However, mutual communication to satisfaction, community to commitment and open-ubiquity to trust did not reveal a positive effect. Second, hypothesis that Internet showing mall environment has a positive effect on satisfaction is partially supported. However, transaction to commitment and transaction to trust did not reveal a positive effect. Third, hypothesis that relational benefits has a positive effect on both satisfaction and commitment is partially supported. However, confident honest to commitment and economic honest to trust did not reveal a positive effect. Forth, satisfaction trust and commitment have a strong effect upon loyalty. Fifth, satisfaction has a positive effect on trust and commitment. However, trust did not show a positive effect on commitment. Outside factors(Internet environment characteristics, showing mall characteristics, and relational benefit) partially revealed a positive effect on satisfaction trust, and commitment. Mediating variables such as satisfaction, trust, and commitment again have positive effect on loyalty. But, the relationship for trust to commitment did not reveal the significant effect in this study while other studies revealed significant effect.

  • PDF

안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템 (A Secure Identity Management System for Secure Mobile Cloud Computing)

  • ;이경현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

Adsorption of microcystin onto activated carbon: A review

  • Ampiaw, Rita E.;Yaqub, Muhammad;Lee, Wontae
    • Membrane and Water Treatment
    • /
    • 제10권6호
    • /
    • pp.405-415
    • /
    • 2019
  • Microcystins (MCs) are toxins produced by cyanobacteria causing a major environmental threat to water resources worldwide. Although several MCs have been reported in previous studies, microcystin-LR (m-LR) has been extensively studied as it is highly toxic. Among the several techniques employed for the removal of this toxin, adsorption with AC has been extensively studied. AC has gained wide attention as an effective adsorbent of m-LR due to its ubiquity, high sorption capacity, cost effectiveness and renewability. In this review, the adsorption of m-LR onto AC was evaluated using the information available in existing scientific literature. The effects of the pore volume and surface chemistry of AC on the adsorption of m-LR considering the structural and chemical properties of ACs were also discussed. Furthermore, we identified the parameters that influence adsorption, including natural organic matter (NOM), pH, and ionic strength during the m-LR adsorption process. The effect of these parameters on MCs adsorption onto AC from previous studied is compiled and highlighted. This review may provide new insights into future activated carbon-m-LR adsorption research, and broaden its application prospects.

『정화』에서 『갈망』으로 -사라 케인의 '잔혹'과 사랑의 역설 (From Cleansed to Crave: The Paradox of 'Cruelty' and Love in Sarah Kane)

  • 임이연
    • 영어영문학
    • /
    • 제57권1호
    • /
    • pp.129-146
    • /
    • 2011
  • Despite the ubiquity of love in the work of Sarah Kane, the theme has been overshadowed by the violence that characterizes her early plays. This essay differentiates Kane from her contemporary "in-yer-face" playwrights, arguing that violence in Kane operates as a means of securing love. Antonin Artaud's concept of cruelty, often (mis)understood in a physical sense alone, provides a clue to the nature of Kane's violence and its relation to love. The essay focuses on Cleansed and Crave, both written in 1998, one about love's redemptive possibility, the other about its pure impossibility. What makes Cleansed hopeful is its violence that works as love's obstacle, creating the illusion that once it is removed love would be possible. The absence of violence in Crave on the contrary lays the illusion of love bare, making it Kane's most despairing play. Kane's oeuvre draws a trajectory of love from hope to despair; as a whole it stages the impossibility of love. To love the other requires the relinquishing of the self, making love logically impossible by depriving the verb of its subject. Love, if possible, would offer the bliss of unity, tearing out the constraint of the Symbolic Order. Kane's only alternative is death, as is expressed in Crave and 4.48 Psychosis.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

Debugging of Parallel Programs using Distributed Cooperating Components

  • Mrayyan, Reema Mohammad;Al Rababah, Ahmad AbdulQadir
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.570-578
    • /
    • 2021
  • Recently, in the field of engineering and scientific and technical calculations, problems of mathematical modeling, real-time problems, there has been a tendency towards rejection of sequential solutions for single-processor computers. Almost all modern application packages created in the above areas are focused on a parallel or distributed computing environment. This is primarily due to the ever-increasing requirements for the reliability of the results obtained and the accuracy of calculations, and hence the multiply increasing volumes of processed data [2,17,41]. In addition, new methods and algorithms for solving problems appear, the implementation of which on single-processor systems would be simply impossible due to increased requirements for the performance of the computing system. The ubiquity of various types of parallel systems also plays a positive role in this process. Simultaneously with the growing demand for parallel programs and the proliferation of multiprocessor, multicore and cluster technologies, the development of parallel programs is becoming more and more urgent, since program users want to make the most of the capabilities of their modern computing equipment[14,39]. The high complexity of the development of parallel programs, which often does not allow the efficient use of the capabilities of high-performance computers, is a generally accepted fact[23,31].

태양광 발전의 분포 변화: 시군구 단위에서의 분석 (Change in Spatial Distribution of Photovoltaic Power Generation )

  • 이정섭;이강원;지상현
    • 한국경제지리학회지
    • /
    • 제25권4호
    • /
    • pp.484-498
    • /
    • 2022
  • 이 연구의 목적은 전국 229개 시군구를 공간 단위로 설정하여 태양광 발전의 입지, 분포 그리고 변화를 분석하는 것이다. 이를 위해서 첫째, 2020년 시군구별 발전량과 발전설비 용량을 통해서 태양광 발전의 분포를 분석했고, 둘째 2017년부터 2021년까지 시군구별 발전설비 증가량을 확인하여 시계열적 변화를 추적했다. 분석 결과, 발전량, 발전설비 용량 및 증가량 모두 몇몇 시군구에 집중되었는데, 그 정도는 상위 5개 시군구가 차지하는 비중이 12% 이상, 상위 10개 및 20개 시군구로는 각각 20%와 33% 이상이었고, 태양광 발전에 대한 지니 계수는 약 0.6이었다. 따라서 시군구 단위에서 태양광 발전의 불균등한 분포가 확인되었다.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.