• Title/Summary/Keyword: 사용자 관심

Search Result 2,456, Processing Time 0.024 seconds

Multi-Dimensional Traveling Salesman Problem Scheme Using Top-n Skyline Query (Top-n 스카이라인 질의를 이용한 다차원 외판원 순회문제 기법)

  • Jin, ChangGyun;Oh, Dukshin;Kim, Jongwan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.1
    • /
    • pp.17-24
    • /
    • 2020
  • The traveling salesman problem is an algorithmic problem tasked with finding the shortest route that a salesman visits, visiting each city and returning to the started city. Due to the exponential time complexity of TSP, it's hard to implement on cases like amusement park or delivery. Also, TSP is hard to meet user's demand that is associated with multi-dimensional attributes like travel time, interests, waiting time because it uses only one attribute - distance between nodes. This paper proposed Top-n Skyline-Multi Dimension TSP to resolve formerly adverted problems. The proposed algorithm finds the shortest route faster than the existing method by decreasing the number of operations, selecting multi-dimensional nodes according to the dominance of skyline. In the simulation, we compared computation time of dynamic programming algorithm to the proposed a TS-MDT algorithm, and it showed that TS-MDT was faster than dynamic programming algorithm.

An Anonymity Control Electronic Cash System with Divisible using KCDSA (KCDSA를 이용한 분할성 기능을 가진 익명성 제어 전자화폐 시스템)

  • Jang, Seok-Cheol;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.757-764
    • /
    • 2001
  • The increase of electronic commerce leads to the increasing attention to the way customers pay and a large number of researches on payment system. Recently many researches on a system which provides anonymity in order to protect user\`s privacy have been carried out. And some potential problems from that system are being reviewed by anonymity control system. This thesis will include the following. First, I want to analyze the old scheme related to divisible and examine general ideas of anonymity control. Second, I propose a new blind signature in addition to KCDSA, the standard digital signature in Korea. The last one I want to propose is a new electronic cash system with the divisible for more efficient use of electronic cash which can control anonymity with the help of trustee.

  • PDF

Design and Implementation of J2ME-based Wired/Wireless Interworking Mobile Wallet (J2ME 기반 유.무선 연동의 모바일 전자지갑 설계 및 구현)

  • Park, Nam-Je;Song, You-Jin
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.687-698
    • /
    • 2002
  • Together with the activation of wireless Internet, the interest for various integrated methods of the existing wired and wireless e-commerces is on the rise. For the integrated wired and wireless e-commerce, firstly, the optimized security and authentication under the radio communication environment should be decided. And also the user-friendly usage is important. In this paper, we designed and implemented wired and wireless interworking Mobile Wallet on terminal that can be used through both wired and wireless methods by developing electronic wallet module for electronic payment using MIDP (Mobile Information Device Profile) based on J2ME (Java 2 Micro Edition). The characteristics of mobile wallet implemented in this paper provide the stability through encoding/decoding payment information and on-line usage on wired/wireless environments through downloading electronic wallet. In addition, we also present safe and convenient payment method for e-commerce based on wired/wireless Internet.

A Study on Performance Enhancement of the Rate Scheme for ABR Traffic on ATM Networks (ATM 망에서 ABR 트래픽을 위한 Rate 기법이 성능 향상 연구)

  • Lee, Yo-Seob;Yu, Eun-Jin;Chang, Hyun-Hee;Pang, Hea-Ja;Jun, Moon-Seog
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2605-2614
    • /
    • 1997
  • Recently, we are concerned with effective service according as the demand increase for high speed data service. We can use high speed transfer and multiple traffic service on the ATM networks, so we concentrate on preventive-control method rather than reactive-control one. But it is possible to have low QoS and traffic congestion due to unpredictable traffic and burst traffic. Specially, ATM Forum has discussed to standardization of traffic management of ABR(Available Bit Rate) service. Because ABR traffic controls the flow of traffic using the feedback information and the current status information of cell, it allocates bandwidth systematically and dynamically to the user. In this paper, we propose a new Rate-based flow control scheme which adapted double threshold buffer idea. The double threshold buffer controls the traffic control by establishing two threshold in buffer.

  • PDF

Designing Requisite Techniques of Storage Structuresupporting Efficient Retrieval in Semantic Web (시멘틱 웹의 효율적 검색을 지원하는 저장 구조의 요소 기술 설계)

  • Shin Pan-Seop
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.3
    • /
    • pp.227-236
    • /
    • 2006
  • Semantic Web is getting popular to next web environment. Additionally, ontology language research is also activating to represent semantic relation of resource in semantic web. Specially, Ontology language as RDF and DAML+OIL appear on start point of research. But Ontology Language limited to describing characters of resource and to making a clear definition of relation of resource. So W3C suggest OWL at the next standard language for describing resource. OWL supply the lack of representation for RDF and RDF Schema. In this paper, we make Ontology to implement Online Retrieval System using OWL and propose the structure of storing Ontology document at the RDB. The structure support characters of OWL that are equivalent relationship, heterogeneous relationship, inverse relationship, union relationship and one of relationship between classes or properties. In this paper, we classify the extended elements for OWL from RDF Schema. And we propose the method of storing OWL using RDB for interoperability with many applications based on RDB. Finally, implement the storage and retrieval system based on OWL to provide advanced search function.

  • PDF

A Web Based System for Usability Project Planning and Testing (사용성 평가 계획 및 수행을 위한 웹 기반 시스템)

  • Park, Danbee;Hong, Ki-Hyung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.308-314
    • /
    • 2015
  • Usability has become an important consideration for product development, and as a result, there is a growing need for systems and tools that can support usability test projects. However, few studies so far have developed such systems and tools. During a usability test project, many participants take up different roles, such as project managers, usability testers, and subjects. We implement a web-based usability test system with which a project manager can manage and control all participants and documents throughout the entire usability test process, from the design of a usability test project to the analysis of the test results. A usability test generates many documents, such as subject agreement forms and before/after questionnaires. Since many different subjects can participate in a usability test, consistency during testing with different participants and efficient document management are the keys to success for a usability test. Since all users that participate in usability test projects can access web-based usability test systems through a web browser, regardless of the place where they are, the reliability of the testing results can improve since the tests are conducted in the locations where the target products are meant to be used. In particular, our system is useful for disabled individuals who cannot move.

BLE-OTP Authorization Mechanism for iBeacon Network Security (iBeacon 네트워크 보안을 위한 BLE-OTP 인증 메커니즘)

  • Jung, Hyunhee;Shin, Dongryeol;Cho, Kwangsu;Nam, Choonsung
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.979-989
    • /
    • 2015
  • Machine to Machine (M2M) technology has gained attention due to the fast diffusion of Internet of Things (IoT) technologies and smart devices. Most wireless network experts believe that Bluetooth Low Energy (BLE) Communications technology in an iBeacon network has amazing advantages in terms of providing communication services at a low cost in smartphone applications. Specifically, BLE does not require any pairing process during its communication phases, so it is possible to send a message to any node without incurring additional transmissions costs if they are within the BLE communication range. However, BLE does not require any security verification during communication, so it has weak security. Therefore, a security authorization process would be necessary to obtain customer confidence. To provide security functions for iBeacon, we think that the iBeacon Message Encryption process and a Decryption (Authorization) process should be designed and implemented. We therefore propose the BLE message Authorization Mechanism based on a One Time Password Algorithm (BLE-OTP). The effectiveness of our mechanism is evaluated by conducting a performance test on an attendance system based on BLE-OTP.

How to Impact the Adoption of Managed Service on IT Governance of Enterprises? (매니지드 서비스 도입이 기업의 IT 거버넌스에 미치는 영향 분석)

  • Jang, Hyuk Soo;Jun, Eunsuk;Lee, Myung Jin;Oh, Jun-Tack;Lee, Bong Gyou
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.399-409
    • /
    • 2013
  • The development of IT has led to increase the business's dependence on IT and the interests of enterprises on IT governance. Also, more enterprises have adopted managed services to save operating costs in IT departments and to maximize their business efficiency. However, until recently, there are very few academic as well as practical researches regarding managed services, IT service effectiveness, IT governance and their interrelations. This study analyzes the effects of managed services on IT governance based on the IT-BSC (Balanced Scorecard) model. Using the expert FGI (Focus Group Interview) and survey, the research results present that managed services have the most significant effect on the user-oriented and the operational efficiency in enterprises. Also, managed services through the business process standardization can improve the IT governance more effectively. This study will be a relevant guideline for enterprises that will adopt managed services.

A Dynamic Event Filtering Technique using Multi-Level Path Sampling in a Shared Virtual Environment (공유가상공간에서 다중경로샘플링을 이용한 동적 이벤트 필터링 기법)

  • Yu, Seok-Jong;Choe, Yun-Cheol;Go, Gyeon
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.11
    • /
    • pp.1306-1313
    • /
    • 1999
  • 본 연구는 인터넷 기반 공유가상공간에서 시스템의 확장성을 유지하기 위하여 이동객체를 대상으로 하는 이벤트 필터링 기법을 제안하고자 한다. 제안된 다중격자 모델 기법은 이동객체의 경로 상에서 대표적인 이벤트를 샘플링하는 방식을 사용한다. 이 방식은 메시지 트래픽의 양을 동적으로 조절하기 위하여 이동객체 간의 관심정도 정보를 수치적으로 변환하여 이벤트 갱신빈도에 반영한다. 대량의 이동객체를 생성하여 제안된 기법을 적용한 성능평가 실험에서 기존의 방식에 비하여 평균 메시지 전송량이 50%이상 감소하는 것으로 확인할 수 있었다. 다중격자 모델은 참여자의 수와 메시지 트래픽 상황에 따라 가상환경의 공유 QoS를 동적으로 조절할 수 있으며, 인터넷 상에서 다수 사용자를 위한 3차원 가상사회 구축 및 온라인 네트워크 게임 개발 등에 활용될 수 있을 것이다.Abstract This paper proposes an event filtering technique that can dynamically control a large amount of event messages produced by moving objects like avatars or autonomous objects in a distributed virtual environment. The proposed multi-level grid model technique uses the method that extracts the representative events from the paths of moving objects. For dynamic control of message traffics, this technique digitizes the DOIs of the avatars and reflects the interest information controlling the frequency of message transmission. For the performance evaluation, a large number of moving objects were created and the model was applied to these avatar groups. In the experiments, more than 50% of messages have been reduced in comparison with the existing AOI-based filtering techniques. The proposed technique can dynamically control the QoS in proportion to the number of users and the amount of messages where a large number of users share a virtual space. This model can be applied to the development of 3D collaborative virtual societies and multi-user online games in the Internet.

Efficient Broadcast Data Clustering for Multipoint Queries in Mobile Environments (이동 환경에서 다중점 질의를 위한 효율적인 방송 데이타 클러스터링)

  • Bang, Su-Ho;Chung, Yon-Dohn;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.715-722
    • /
    • 2001
  • Mobile computing has become a reality thank to the convergence of two technologies :powerful portable computers and the wireless networks. The restrictions of wireless network such as bandwidth and energy limitations make data broadcasting an attractive data communication method. This paper addresses the clustering of wireless broadcast data for multipoint queries. By effective clustering of broadcast data the mobile client can access the data on the air in short latency In the paper we define the data affinity and segment affinity measures. The data affinity is the degree that two data objects are accessed by queries, and the segment affinity is the degree that two sets of data (i.e segments) are accessed by queries Our method clusters data objects based on data and segment affinity measures we show that the performance of our method is scarcely infuenced by the growth of the number of queries.

  • PDF