• Title/Summary/Keyword: Multi-users

Search Result 1,454, Processing Time 0.021 seconds

Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection

  • Thi-Linh Ho;Anh-Cuong Le;Dinh-Hong Vu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1413-1432
    • /
    • 2023
  • Recommender systems aim to recommend items to users by taking into account their probable interests. This study focuses on creating a model that utilizes multiple sources of information about users and items by employing a multimodality approach. The study addresses the task of how to gather information from different sources (modalities) and transform them into a uniform format, resulting in a multi-modal feature description for users and items. This work also aims to transform and represent the features extracted from different modalities so that the information is in a compatible format for integration and contains important, useful information for the prediction model. To achieve this goal, we propose a novel multi-modal recommendation model, which involves extracting latent features of users and items from a utility matrix using matrix factorization techniques. Various transformation techniques are utilized to extract features from other sources of information such as user reviews, item descriptions, and item categories. We also proposed the use of Principal Component Analysis (PCA) and Feature Selection techniques to reduce the data dimension and extract important features as well as remove noisy features to increase the accuracy of the model. We conducted several different experimental models based on different subsets of modalities on the MovieLens and Amazon sub-category datasets. According to the experimental results, the proposed model significantly enhances the accuracy of recommendations when compared to SVD, which is acknowledged as one of the most effective models for recommender systems. Specifically, the proposed model reduces the RMSE by a range of 4.8% to 21.43% and increases the Precision by a range of 2.07% to 26.49% for the Amazon datasets. Similarly, for the MovieLens dataset, the proposed model reduces the RMSE by 45.61% and increases the Precision by 14.06%. Additionally, the experimental results on both datasets demonstrate that combining information from multiple modalities in the proposed model leads to superior outcomes compared to relying on a single type of information.

Development of Multi-applications for Data Broadcasting (데이터방송 멀티 애플리케이션 개발)

  • Kim Hyun-Soon;Kwon Jae-Kwang;Kang Dae-Kap
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.107-115
    • /
    • 2006
  • In the environment of single application data broadcasting, only one application can be serviced at a specific time on one channel. To overcome this, we developed the structure and the method of operation for multi-applications which are fully conformant to the ACAP (Advanced Common Application Platform), and modified data broadcasting system to support multi-applications. In multi-application environment, broadcasters can service multiple applications simultaneously at a specific airtime on one channel so users can enjoy services selectively according to their preferences. In this paper, we present an example of multi-application service which was developed to make an experiment before servicing them to users on the air. The core of the multi-application is a manager application which manages other ordinary applications, so we describe the function and structure of the manager application, and then present the experimental results to show that the proposed method is the proper model for multi-applications.

Dynamic Resource Assignment in the Multi-layer Networks (다계층 네트워크에서 동적 자원 할당 체계 방식 연구)

  • Kang, Hyun Joong;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.77-82
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing.. This paper propose three path computation scheme that not only use the resources effectively but also to minimize the information transmissions between the multi-layers in a multi-domain environment. This paper also suggested that the optimum path choice be performed through diversification of the path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

The Conceptual Design and User Requirement Analysis of the HCI Multi-function Console for Ship (HCI 기반 선박용 다기능 콘솔의 사용자 요구조건 분석 및 개념 설계)

  • Han, Jeong-Hee;Park, Jong-Won;Choi, Young-Chol;Yun, Chang-Ho;Cho, A-Ra;Lim, Yong-Kon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.674-682
    • /
    • 2011
  • The multi-function console system in ships has currently exposed operational difficulties due to its complex interfaces although it supports a variety of functionalities. In this paper the concept of a human computer interaction (HCI) based multi-function console system is proposed, which can support intuitive operation environments by the analysis of users' needs to shipboard systems. Expert interviews and surveys are carried out in order to obtain users' requirements. Through the survey results, the HCI based multi-function console system is conceptually designed, which is optimized to the input of multi-touch screen. It is expected that the HCI based multi-function console system can provide ship operators with easy interfaces to the console system as well as safe operation in a rough ocean environment.

An Extended Role-Based Access Control Model with Multi-level Security Control (다단계 보안통제가 가능한 확장된 역할 기반 접근통제 모델)

  • Yim, Hwang-Bin;Park, Dong-Gue
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.90-96
    • /
    • 2002
  • RBAC(Role-Based Access Control) is an access control method based on the user's role and it provides more flexibility on the various computer and network security fields. But, RBAC models consider only users for roles or permissions, so for the purpose of exact access control within real application systems, it is necessary to consider additional subjects and objects. In this paper, we propose an Extended RBAC model, $ERBAC_3$, for access control of multi-level security system by adding users, subjects, objects and roles level to RBAC, which enables multi-level security control. 

On-demand Allocation of Multiple Mutual-compensating Resources in Wireless Downlinks: a Multi-server Case

  • Han, Han;Xu, Yuhua;Huang, Qinfei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.921-940
    • /
    • 2015
  • In this paper, we investigate the multi-resource allocation problem, a unique feature of which is that the multiple resources can compensate each other while achieving the desired system performance. In particular, power and time allocations are jointly optimized with the target of energy efficiency under the resource-limited constraints. Different from previous studies on the power-time tradeoff, we consider a multi-server case where the concurrent serving users are quantitatively restricted. Therefore user selection is investigated accompanying the resource allocation, making the power-time tradeoff occur not only between the users in the same server but also in different servers. The complex multivariate optimization problem can be modeled as a variant of 2-Dimension Bin Packing Problem (V2D-BPP), which is a joint non-linear and integer programming problem. Though we use state decomposition model to transform it into a convex optimization problem, the variables are still coupled. Therefore, we propose an Iterative Dual Optimization (IDO) algorithm to obtain its optimal solution. Simulations show that the joint multi-resource allocation algorithm outperforms two existing non-joint algorithms from the perspective of energy efficiency.

Dynamic Multi-distributed Web Cluster Group Model for Availability of Web Business (웹 비즈니스의 고가용성을 위한 동적 다중 웹 분산 클러스터 그룹 모델)

  • Lee, Gi-Jun;Park, Gyeong-U;Jeong, Chae-Yeong
    • The KIPS Transactions:PartA
    • /
    • v.8A no.3
    • /
    • pp.261-268
    • /
    • 2001
  • With the rapid growth of the Internet, various web-based businesses are creating a new environment in an imaginary space. However, this expanding Internet and user increase cause an overflow of transmission and numerous subordinate problems. To solve these problems, a parallel cluster system is produced using different methods. This thesis recommends a multi0distribution cluster group. It constructs a MPP dynamic distribution sub-cluster group using numerous low-priced and low-speed systems. This constructed sub-cluster group is then connected with a singular virtual IP to finally serve the needs of clients (users). This multi-distribution cluster group consists of an upper structure based on LVS and a dynamic serve cluster group centered around an SC-server. It conducts the workloads required from users in a parallel process. In addition to the web service, this multi-distribution cluster group can efficiently be utilized for the calculations which require database controls and a great number of parallel calculations as well as additional controls with result from the congestion of service.

  • PDF

Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud

  • Wang, Boyang;Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.592-599
    • /
    • 2014
  • Cloud computing enables users to easily store their data and simply share data with others. Due to the security threats in an untrusted cloud, users are recommended to compute verification metadata, such as signatures, on their data to protect the integrity. Many mechanisms have been proposed to allow a public verifier to efficiently audit cloud data integrity without receiving the entire data from the cloud. However, to the best of our knowledge, none of them has considered about the efficiency of public verification on multi-owner data, where each block in data is signed by multiple owners. In this paper, we propose a novel public verification mechanism to audit the integrity of multi-owner data in an untrusted cloud by taking the advantage of multisignatures. With our mechanism, the verification time and storage overhead of signatures on multi-owner data in the cloud are independent with the number of owners. In addition, we demonstrate the security of our scheme with rigorous proofs. Compared to the straightforward extension of previous mechanisms, our mechanism shows a better performance in experiments.

A Novel Resource Allocation Algorithm in Multi-media Heterogeneous Cognitive OFDM System

  • Sun, Dawei;Zheng, Baoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.691-708
    • /
    • 2010
  • An important issue of supporting multi-users with diverse quality-of-service (QoS) requirements over wireless networks is how to optimize the systematic scheduling by intelligently utilizing the available network resource while, at the same time, to meet each communication service QoS requirement. In this work, we study the problem of a variety of communication services over multi-media heterogeneous cognitive OFDM system. We first divide the communication services into two parts. Multimedia applications such as broadband voice transmission and real-time video streaming are very delay-sensitive (DS) and need guaranteed throughput. On the other side, services like file transmission and email service are relatively delay tolerant (DT) so varying-rate transmission is acceptable. Then, we formulate the scheduling as a convex optimization problem, and propose low complexity distributed solutions by jointly considering channel assignment, bit allocation, and power allocation. Unlike prior works that do not care computational complexity. Furthermore, we propose the FAASA (Fairness Assured Adaptive Sub-carrier Allocation) algorithm for both DS and DT users, which is a dynamic sub-carrier allocation algorithm in order to maximize throughput while taking into account fairness. We provide extensive simulation results which demonstrate the effectiveness of our proposed schemes.

A Brokered Authentication Scheme Based on Smart-Card for Multi-Server Authentication (다중서버 인증을 위한 스마트카드 기반 중재 인증 기법 연구)

  • Kim, Myungsun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Since the facilities for the remote users tend to be deployed in distributed manner, authentication schemes for multi-server communication settings, which provide various web services, are required for real-world applications. A typical way to authenticate a remote user relies on password authentication mostly. However, this method is vulnerable to attacks and inconvenient as the system requires users to maintain different identities and corresponding passwords. On the other hand, the user can make use of a single password for all servers, but she may be exposed to variants of malicious attacks. In this paper, we propose an efficient and secure authentication scheme based on a brokered authentication along with smart-cards in multi-server environment. Further we show that our scheme is secure against possible attacks and analyze its performance with respect to communication and computational cost.