• Title/Summary/Keyword: Information Attribute

Search Result 1,567, Processing Time 0.026 seconds

A Study of Thinking Style and Consumption Behavior in Comsumer's Decision Making (소비자의 구매의사결정에 있어 제품별 사고유형과 소비행동에 대한 연구)

  • Choi, Nak-Hwan;Ahn, Ri-Na;Na, Kwang-Jin
    • Science of Emotion and Sensibility
    • /
    • v.14 no.2
    • /
    • pp.279-292
    • /
    • 2011
  • This research explores the differences of two consumption behaviors from the thinking style they elicit. Specifically, we predict that more utilitarian attributes(vs. hedonic attributes) may be used when evaluating utilitarian products whereas more hedonic attributes(vs. utilitarian attributes) may be used when evaluating hedonic products. In addition, this research considered two different thinking styles: rational thinking style and experiential thinking style, and try to find out whether different product attribute information could elicit different thinking style and whether the thinking style has any effect on product evaluation. The data reported in this research demonstrates the following results. Firstly, people use different criteria when judging different types of product. That is, when judging utilitarian product, they are more likely to use utilitarian attribute as evaluation criteria, on the contrary they inclined to use hedonic attribute as evaluation criteria when choosing hedonic product. Secondly, different types of attribute informations could elicit different thinking style. Utilitarian attribute informations elicit rational thinking style whereas hedonic attribute informations elicit experiential thinking style. Finally, if people engage in rational thinking elicited in processing utilitarian attribute informations, the evaluation of utilitarian product is enhanced. But even though people engage in experiential thinking in processing hedonic attribute informations, the evaluation of hedonic product is not improved.

  • PDF

A Prediction Method using WRC(Weighted Rate Control Algorithm) in DTN (DTN에서 노드의 속성 정보 변화율과 가중치를 이용한 이동 예측 기법)

  • Jeon, Il-Kyu;Oh, Young-jun;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.113-115
    • /
    • 2015
  • In this paper, we proposed an algorithm based on movement prediction using rate of change of the attribute information of nodes what is called WRC(Weighted Rate Control) in delay tolerant networks(DTNs). Existing DTN routing algorithms based on movement prediction communicate by selecting relay nodes increasing connectivity with destination node. Thus, because the mobile nodes are in flux, the prediction algorithms that do not reflect the newest attribute information of node decrease reliability. In this paper, proposed algorithm approximate speed and direction of attribute information of node and analysis rate of change of attribute information of node. Then, it predict movement path of node using proposed weight. As the result, proposed algorithm show that network overhead and transmission delay time decreased by predicting movement path of node.

  • PDF

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

An Attribute Replicating Vertical File Partition Method by Genetic Algorithm (유전알고리듬을 이용한 속성의 중복 허용 파일 수직분할 방법)

  • 김재련;유종찬
    • The Journal of Information Technology and Database
    • /
    • v.6 no.2
    • /
    • pp.71-86
    • /
    • 1999
  • The performance of relational database is measured by the number of disk accesses necessary to transfer data from disk to main memory. The paper proposes to vertically partition relations into fragments and to allow attribute replication to reduce the number of disk accesses. To reduce the computational time, heuristic search method using genetic algorithm is used. Genetic algorithm used employs a rank-based-sharing fitness function and elitism. Desirable parameters of genetic algorithm are obtained through experiments and used to find the solutions. Solutions of attribute replication and attribute non-replication problems are compared. Optimal solutions obtained by branch and bound method and by heuristic solutions(genetic algorithm) are also discussed. The solution method proposed is able to solve large-sized problems within acceptable time limit and shows solutions near the optimal value.

  • PDF

Ticket-Based Authentication Protocol Using Attribute Information over Home Network (홈네트워크 상에서 속성정보를 이용한 티켓기반의 인증 프로토콜)

  • Lee, Won-Jin;Kim, Kee-Won;Kim, HyunSung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.1
    • /
    • pp.53-59
    • /
    • 2012
  • Recently, LEE et al. proposed an attribute-based authenticated key agreement protocol over home network, which aimed to support authentication and key agreement between user and home server. However, if the home server is attacked in the protocol, the effects are influenced to the overall home network components severly. Thereby, this paper proposes a new ticket-based authentication protocol using user attributes between user and home devices to solve the problem. The proposed protocol supports the various levels of security to user by diversifying the network accessibility depending on user attribute. Thereby, the protocol could support more secure home network services.

Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures (비단조 접근 구조를 갖는 CP-ABE 방식)

  • Sadikin, Rifki;Moon, SangJae;Park, YoungHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control mechanism without a trusted server. We propose an attribute-based access control mechanism by incorporating a CP-ABE scheme to ensure only authorized users can access the sensitive data. The idea of CP-ABE is to include access control policy in the ciphertexts, in which they can only be decrypted if a user possesses attributes that pass through the ciphertext's access structure. In this paper, we prove a secure CP-ABE scheme where the policy can be expressed in non-monotonic access structures. We further compare the performance of our scheme with the existing CP-ABE schemes.

The Development of a Real Estate Multi-Attribute Integrated Search System (부동산 다속성 통합 검색 시스템 개발)

  • Cho, Jae-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.3
    • /
    • pp.15-37
    • /
    • 2009
  • This study presents a new retrieval system developed to consider various preferential requirements for buyers in the real estate market. The paper analyses essential factors affecting the price of real estate and then a set of factors are classified by region-related factor and individual-related factor. After endowing the buyer's selected factors with weights in the retrieval system, the optimal solutions have been drawn by comparing with the others through an entropy measure of Multi-attribute Decision Making. This retrieval system is applied to the Busan real estate market to estimate the solutions of retrieval. Evaluation results indicate that the retrieval system can provide useful information to analyse the price determination factors of real estate, as well as to save the searching cost of the buyers.

  • PDF

Palette-based Color Attribute Compression for Point Cloud Data

  • Cui, Li;Jang, Euee S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3108-3120
    • /
    • 2019
  • Point cloud is widely used in 3D applications due to the recent advancement of 3D data acquisition technology. Polygonal mesh-based compression has been dominant since it can replace many points sharing a surface with a set of vertices with mesh structure. Recent point cloud-based applications demand more point-based interactivity, which makes point cloud compression (PCC) becomes more attractive than 3D mesh compression. Interestingly, an exploration activity has been started to explore the feasibility of PCC standard in MPEG. In this paper, a new color attribute compression method is presented for point cloud data. The proposed method utilizes the spatial redundancy among color attribute data to construct a color palette. The color palette is constructed by using K-means clustering method and each color data in point cloud is represented by the index of its similar color in palette. To further improve the compression efficiency, the spatial redundancy between the indices of neighboring colors is also removed by marking them using a flag bit. Experimental results show that the proposed method achieves a better improvement of RD performance compared with that of the MPEG PCC reference software.

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing

  • Zhang, Leyou;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1343-1356
    • /
    • 2013
  • Cloud computing has emerged as perhaps the hottest development in information technology at present. This new computing technology requires that the users ensure that their infrastructure is safety and that their data and applications are protected. In addition, the customer must ensure that the provider has taken the proper security measures to protect their information. In order to achieve fine-grained and flexible access control for cloud computing, a new construction of hierarchical attribute-based encryption(HABE) with Ciphertext-Policy is proposed in this paper. The proposed scheme inherits flexibility and delegation of hierarchical identity-based cryptography, and achieves scalability due to the hierarchical structure. The new scheme has constant size ciphertexts since it consists of two group elements. In addition, the security of the new construction is achieved in the standard model which avoids the potential defects in the existing works. Under the decision bilinear Diffie-Hellman exponent assumption, the proposed scheme is provable security against Chosen-plaintext Attack(CPA). Furthermore, we also show the proposed scheme can be transferred to a CCA(Chosen-ciphertext Attack) secure scheme.

The Analysis and Integration of Graphic and Attribute Information for Intelligent Transportation Systems (지능형 교통시스템을 위한 도형.속성정보의 통합 분석)

  • 강준묵;이형석;조성호
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.18 no.4
    • /
    • pp.335-342
    • /
    • 2000
  • This study is to integrate and to analyzegraphic and attribute data in features which should be preceding for the ITS construction. A 1:5000 scale map as a national basemap was used and was checked for feasibility. For the convenience of position confirmation, the analysis component was developed and was linked to addresses. Also, the attribute information was considered on the shortest route, and optimal route was selected by investigating traffic volumes on main crossroads depending on the time zone. The optimal route could be selected by analyzing user's demands, position and statistical data, and the position information could be provided efficiently by combining the graphic information with the land register information.

  • PDF