Earticle

현재 위치 Home

IJICTDC [International Journal of Information Communication Technology and Digital Convergence]

간행물 정보
  • 자료유형
    학술지1
  • 발행기관
    한국AI디지털융합학회(구 한국디지털융합학회) [The Korean Academic Society of AI Digital Convergence]
  • pISSN
    2466-0094
  • 간기
    반년간
  • 수록기간
    2016 ~ 2025
  • 주제분류
    사회과학 > 경영학
  • 십진분류
    KDC 300 DDC 303
Vol 5 No 1 (6건)
No
1

Predicting Loyalty of Korean Mobile Applications: A Dual-Factor Approach

Donald L. Amoroso, Chulhwan Chris Bang, Jongheon Kim

한국AI디지털융합학회(구 한국디지털융합학회) IJICTDC Vol 5 No 1 2020.06 pp.1-16

※ 기관로그인 시 무료 이용이 가능합니다.

4,900원

Recent mobile technology enables various types of mobile applications and payments and the market for those payments are still in the infant stage in Korea. In this early stage of new market development, the success of mobile application services highly depends on inducing new consumers and fostering their loyalty on the platform. This study adopts a Dual-Factor Model framework, with a dedication-constraint based model, in consideration of relevant factors that lead to consumers’ loyalty. To this end, this study collected survey data from 549 experienced users of mobile applications and payments and empirically tested the research model. The results indicate that consumers’ loyalty is highly determined by their satisfaction and their existing usage habit. Switching cost also showed a marginal effect on consumers’ loyalty. In addition, both extrinsic and intrinsic motivations - perceived value and perceived enjoyment – were found to be direct influences on the satisfaction construct. With this outcome in mind, this study reveals and suggests that future theoretical and practical exploration should focus on pursuing factors that stimulate both consumer satisfaction and habit to win and foster consumers’ loyalty in the usage of mobile applications.

2

4,200원

An ecological marketing strategy is a new marketing concept for sustainable development. The goal of ecological marketing is to build an ecological system with potential enterprises, enable members in the ecosystem to make profits, and achieve a win-win situation. This paper uses a single case (MI) study approach to aligning the concepts and guidelines prescribed by the technology-organization-environment framework. The qualitative research method of content analysis will be applied to analyze secondary sources such as MI corporate sustainability reports, journal articles, case study materials, trade publication articles, etc. Most of these materials are available on the website. By conducting the analysis through technological, organizational, and environmental aspects, the result answers the question that why the ecological marketing strategy could promote MI’s successful transformation and upgrading. After a comprehensive analysis, the other modern enterprises can learn more about ecological marketing strategy and realize ecological marketing can be concluded. Moreover, both the result and the analytic framework of Ecological marketing can also be a reference for modern enterprises to obtain their interests and establish a symbiotic ecological marketing system.

3

Authentication of PCSs with Cascaded Encryption Technique

Rajan Kaushal, Randeep Singh

한국AI디지털융합학회(구 한국디지털융합학회) IJICTDC Vol 5 No 1 2020.06 pp.28-39

※ 기관로그인 시 무료 이용이 가능합니다.

4,300원

In this paper, a new algorithm is proposed using the technique of Cascaded Encryption (CE) for authentication of small handheld and Portable Communication Systems (PCSs). In the proposed method an 8-bit session key Ks is sent to the Mobile Station (MS) from the Authentication Center (AuC) as soon as the MS is switched on in the GSM network. The MS computes a cipher key for authentication KCA using the Recursive Positional Module-2 Substitution (RPMS) cryptographic technique. The technique of Cascaded Encryption (CE) considers the 128-bit International Mobile Subscribers’ Identification (IMSI) i.e. Ki as a stream. This stream is then divided into 16 groups each of which contains 8 bits. These groups are represented as G0 to G15. The corresponding bits of each group are put through repetitive Exclusive OR (XOR) operation with the adjacent bit until it generates a single bit number. Hence each group forms a triangular bit pattern. From these triangular bit patterns, the target block T is formed which consists of 16 bits, t0 to t15, which are generated from the groups G0 to G15. Further T is divided into two sub-blocks T0 and T1 consisting of bits t0...t7 and t8...t15 respectively. The bits of the blocks T0 and T1 are put through XOR operation with the corresponding bits of the session key Ks in two different steps to obtain C0 and C1 respectively. The bitstreams C0 and C1 are concatenated to form the 16 bits intermediate key Kim. Kim is put through the mechanism of the Rotor Machine where the direction of the bits depends on the cipher key for authentication KCA. The Rotor Machine generates the 16-bit SRES. Authentication Center (AuC) computes the SRES independently in a similar method and sends SRES and Ks to Home Location Register (HLR). HLR compares SRES obtained from AuC with SRES obtained from MS to confirm its identity.

4

Detection of Sybil Attacks Using Improved AODV Protocol in Vehicular Ad Hoc Networks

Deepak Prashar, Abdirahim A. Abshir, Amandeep Nagpal

한국AI디지털융합학회(구 한국디지털융합학회) IJICTDC Vol 5 No 1 2020.06 pp.40-47

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

Vehicular ad hoc network (VANET) has become most predominant on account of their usage in a vehicle to vehicle communication. But one of the major challenges in this network is the mobility of nodes involves in the communication. Either single-hop or multi-hop communication is used within the vehicle to vehicle communication. There are reactive, proactive, and hybrid routing protocols that are generally used within the multi-hop communication and for the path establishment, a reactive routing protocol named AODV is primarily used. Because of the decentralized nature of the network, there is a possibility of various attacks that reduce the performance of the network. One of the most devastating attacks is the Sybil attack which destroys the privacy of networks. This paper proposes a novel approach for the detection and isolation of the malicious nodes that are responsible for causing Sybil attack in VANETs through an improvement in the AODV protocol and thus the overall performance of the network is improved. Moreover, the proposed approach is compared with the existing one in terms of metrics like delay, packet loss, overhead, and throughput using the network simulator. Results confirmed that the proposed approach is quite effective in handling the network under the impact of a Sybil attack.

5

Leveraging Digital Learning Platforms for Competitive Advantage in Higher Education

Devesh Lowe, Bhavna Galhotra, Yukti Ahuja

한국AI디지털융합학회(구 한국디지털융합학회) IJICTDC Vol 5 No 1 2020.06 pp.48-57

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

Higher education in India was not always confined to a learning process in four walls. Our ancient learning methodology included conversations, debates, life studies, and learning through observations. With the passage of time learning was confined to the study of written texts and prescribed syllabi. Though it has contributed remarkably in the last two centuries towards the establishment of new world order, its relevance is now often questioned due to the pace of technological changes and industries’ expectations from young graduates. In the last decade, there is an evident shift towards Digital Learning platforms as a mandatory part of the standard curriculum and as a source of obtaining extra knowledge with flexibility of choosing subjects and content for learning. Platforms like Coursera, EDX, NPTEL, STP, and Udemy are ready to efficiently fill the gap between standard university curriculum and industry requirement. In this paper, authors have identified and recognized the role of digital learning platforms as a mandatory part of higher education and have studied the impact on young learners. This paper presents an analysis based on the opinions of first-time users of such platforms. Through this study, authors have tried to identify the persisting shortcomings and effectiveness in the current scenario and have also recommended suitable measures to be integrated for the effective utilization of this resource.

6

Evaluating Machine Learning-based Fatigue Detection System

Deepak Upreti, V. Thirunavukkarasu, S. Uma Mageswari, Gyanendra Prasad Joshi

한국AI디지털융합학회(구 한국디지털융합학회) IJICTDC Vol 5 No 1 2020.06 pp.58-62

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

In this work, we implemented a fatigue detection system using machine learning and evaluated its performance. The proposed system is mainly based on the Viola-Jones face detection algorithm and the convolutional neural network (CNN). Viola-Jones object detection framework is mainly focused on the detection of the face and facial features. CNN is extended to DenseNets and made fully convolution to tackle the problem semantic image segmentation. The main idea behind the DenseNets is to capture the dense blocks that perform iterative concatenation of feature maps. The proposed system is implemented on many different video sequences and observed that its average accuracy is 99.18% and the detection rate is 99.71% out of approximately 100 image frames. The system shows high accuracy in segmentation, low error rate, and quick processing of input data distinguishes from the existing similar systems. Finally, if this system is implemented, it can minimize the number of accidents caused by drivers' fatigue.

 
페이지 저장