研究生: |
賴郁仁 Yu-Jen Lai |
---|---|
論文名稱: |
電子票券效能評估模擬系統-設計及實作 Simulation evaluation for the performance an e-ticket system |
指導教授: |
楊維寧
Wei-ning Yang |
口試委員: |
吳宗成
Tzong-Chen Wu 陳雲岫 Yun-Shiow Chen |
學位類別: |
碩士 Master |
系所名稱: |
管理學院 - 資訊管理系 Department of Information Management |
論文出版年: | 2011 |
畢業學年度: | 99 |
語文別: | 中文 |
論文頁數: | 40 |
中文關鍵詞: | 系統模擬 、績效指標 、電子票券 、決策支援 |
外文關鍵詞: | simulation, performance, e-ticket, decision making |
相關次數: | 點閱:180 下載:4 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本研究利用系統模擬方法評估 NFC (Near Field Communication) 系統績效。目的是提供系統建構者在系統建構前,針對不同的硬體配置估計系統運轉效能,選擇最佳系統設計。當系統建構完成後,針對消費者不同的隱私協商需求,估計系統的服務品質,支援消費者決策選擇。另可預估往後當需求增加時,系統可能面臨的窘境,提早構思解決之道以為因應。
我們以電子票券購票系統為例,建構電子購票系統的電腦模擬模型,經由統計數據分析確認影響系統績效的顯著因子,並搜尋在不同系統情境下最佳的決策變數組合,提供系統建構者、消費者的决策参考。
In this study, we evaluate the NFC(Near Field Communication) system performance using simulation method. The purpose is to provid the recommendations to set parameters for different hardware configuration before construction of the system.
After the system was built, we can evaluate the service quality according to the system's situation for the consumer to choice their privacy policy when they are doing privacy negotiation.
Besides, we could estimate the dilemma that we may face in the future and figure out the solution when the demand increases.
Take the E-ticket system for example, we construct the computer simulation model for the system, identity the significant factor that influences system performance through statistical and numerical analysis, finally provide the optimal solution for the system developer and the consumer to make decision.
[1]張吟如,「具可攜性之數位票券交易機制」,碩士論文,世新大學資訊管理學研究所,2006年。
[2]陳星百,「行動票卷交易之研究」,碩士論文,朝陽科技大學資訊管理研究所,2003年。
[3]鄧宇佑,求解醫院運輸部門運輸中心個數最佳化,碩士論文,國立成功大學工業管理研究所
[4] 沈明來, 實驗設計學(第四版),九州圖書文物有限公司
[5] MBA智庫百科(http://wiki.mbalib.com.),迴歸分析預測法,2009年
[6] 蕭文龍(2009) ,多變量分析最佳入門實用書,碁峰,2010年
[7] B. R. Lee, T. Y. Kim, and S. S. Kang, “Ticket Based Authentication and Payment Protocol for Mobile Telecommunications Systems,” Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing, Seoul, South Korea, pp. 218-221, 2001.
[8] K. Fujimura and K. Matsuyama, “Distributed Digital-Ticket Management for Rights Trading System,” Proceedings of the First ACM Conference on Electronic Commerce, Colorado, United States, pp. 110-118, 1999.
[9]Q. Daniele and H. Stephen., “Mobile Transactions using Electronic Tickets,” in Proceedings of the 2005 IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks, 374-383, 2005.
[10]S. Kim and W. Lee., “A PayWord-based Micro-Payment Protocol Supporting Multiple Payments,” in Proceeding of the 12th International Conference on Computer Communications and Networks, 609-612, 2003.
[11] Yuh-Jzer Joung, Cheng Yen, Chung-Tang Huang and Yi-Jhan Huang,"On Personal Data License Design and Negotiation," Proceedings ofCOMPSAC 2005, 2005.
[12] Cai Li, “Research of User Privacy Negotiation and ProtectionArchitecture Based on Semantic Web,” Proceedings of the 2008International Conference on Semantic Web and Web Services, pp.42-48, 2008.
[13] M. Hansen, A. Schwartz and A. Cooper, “Privacy and IdentityManagement,” IEEE Security & Privacy vol. 6, no. 2, pp. 38-45,Mar./Apr. 2008, doi:10.1109/MSP.2008.41
[14] R. Bhatti, E. Bertino, and A. Ghafoor, “An Integrated Approach to Federated Identity and Privilege Management in Open Systems,” Commun. ACM, vol.50, no.2, pp.81-87, 2007.
[15] E. Maler and D. Reed, “The Venn of Identity: Options and Issues in Federated Identity Management,” IEEE Security and Privacy, vol.6, no.2, pp.16-23, 2008.
[16] Averill M.Law and W. David Kelton , Simulation Modeling and Analysis(Third Edition)(2000).