• Title/Summary/Keyword: Number of Users

Search Result 3,043, Processing Time 0.031 seconds

Restoration Plan and Ecological Characteristics of Vegetation in the Area Adjacent to GeumJeong Mountain Fortress (금정산성 주변 식생의 생태적 특성과 복원방안)

  • Kim, Seok-Kyu
    • Journal of Environmental Impact Assessment
    • /
    • v.19 no.3
    • /
    • pp.231-245
    • /
    • 2010
  • The the purpose of this study was to analyze of the vegetation structure and phytosociological changes in the area adjacent to GeumJeong Mountain Fortress for fifteen years. The result of this study was as follows; Of the 8 quadrates, site of the North Gate 2 was having a highest in the number of extinct trees, 15 kinds. This is probably due to trampling effect caused by climbers' steps. Site of the West Gate 1 and South gate 1 each had 8 kinds of extinct trees, respectively. The number of newly appeared trees was highest at site of the North Gate 1, (8 kinds) followed by the sites of South gate 1 and South gate 2, respectively (5 kinds). The highest decrease in number of tree species was observed in North Gate 1, therefore, there is a strong relationship between vegetation diversity and the number of users of the available spaces. In order to revitalize the unstable vegetation structure of the Area Adjacent to GeumJeong Mountain Fortress, Robinia pseudo-acacia has to be well maintained in the shrub tree layer, and vines, such as Smilax china, Humulus japonicus, and Pueraria thungergiana, should be removed. To recover natural vegetation, dead leaf layer should be protected, and more shrub trees need to be planted. In the understory and shrub tree layer, multi layer tree planting is highly recommended to recover natural vegetation and increase tree diversity. In order to improve bad soil condition caused by trampling effect of recreational users, special treatments to the soil structure are required, such as mulching and raking soil. Also, depending on its soil damage from users trampling, the areas in the park should be divided into usable areas and user limited areas by the sabbatical year system. To improve the soil acidity due to acidic rain, soil buffering ability should be improved by activating microorganisms in the soil by using lime and organic material.

A Study on the Maximum Rate of Daily Users and the Turnover Rate of Parks in Korea (한국공원의 최대일율 및 회전율에 관한 연구)

  • 임승빈;조형준;김대현
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.18 no.4
    • /
    • pp.29-44
    • /
    • 1991
  • The purpose of this study is to investigate the maximum rate of daily users and the turnover rate of parks in Korea. Median calculation, percentile analysis, and regression analysis methods were adopted for the investigation of the maximum rate of daily users. The maximum level, adaptable level and current dispersion of each index were analyzed. The results are summarized as follows. 1) It is location, kinds of facility, and purpose of visiting that mainly affect the concentration pattern of the number of park users. 2) Parks are devided into such three types as common urban park, royal tomb park, and large amusement park. 3) Spring is the peak season in all parks. 4) The maximum daily rates of the three types of parks are 0.92%, 1.86%, 1.18% respectively and the turnover rates are 18%, 54%, 63% respectively. 5) The results of this study show the necessity of the revision of the existing maximum daily rate and turnover rate.

  • PDF

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

The Effects of the Service Quality of Smartphone Applications on User Satisfaction and Loyalty (스마트폰 애플리케이션의 서비스품질이 사용자 만족도 및 충성도에 미치는 영향)

  • Jung, Wonjin;Lee, Ki-Kwang
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.3
    • /
    • pp.79-86
    • /
    • 2013
  • Recently, the number of smartphone users has skyrocketed because of a plenty of useful services that smartphone applications provide. In the Information Systems (IS) literature, however, there has been little understanding about the effects of the service quality of smatphone applications on user satisfaction and loyalty. Thereby, this study examined 1) the effects of the service quality of smartphone applications on users beliefs, perceived usefulness and easiness and 2) the effects of the user beliefs as mediating variables on users' attitude, satisfaction, and loyalty. A survey was conducted and SEM was employed to analyze the data. The results showed that the service quality of smartphone applications affect users' attitude, satisfaction, and loyalty through the mediating variables.

The Analysis on the Effects of Interference between HAPS and NGSO system in the Service Link (HAPS와 NGSO 시스템의 Service Link상의 간섭영향 분석)

  • 함형일;김규환;양의장;강영훙
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.151-155
    • /
    • 2002
  • In this paper, interference effects between NGSO and HAPS analyze into two cases. One is HAPS interference effect into NGSO, another is NGSO interference effect into HAPS. First, same case of number of users for LEO and HAPS interference received to LEO mobile station are over the -8.82dB. But in case of 1/10 and 1/100, I/N values are lowest 16.9dB and -20.3dB respectively. In case of interference received to HPAS mobile station, as LEO is 87$^{\circ}$, if the HAPS and LEO users is same, interference criterion over the 2200 users. but in the case of 1/10 and 1/100 of LEO is HAPS users, we don't know over the interference criterion. In accordance with, for reduce to effects of interference important suitable establishment of transmission power, number of users and cell radius of two system.

  • PDF

Characteristics of the Required Signal Power for Multimedia Traffic in CDMA Systems (CDMA 이동통신시스템에서 멀티미디어 트래픽의 요구 신호 전력 특성)

  • 강창순
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6B
    • /
    • pp.593-600
    • /
    • 2002
  • The reverse link signal power required for multimedia traffic in multipath faded single-code (SC-) and multi-code CDMA (MC-CDMA) systems is investigated. The effect of orthogonality loss among multiple spreading code channels is herein characterized by the orthogonality factor. The required signal power in both the CDMA systems is then analyzed in terms of the relative required signal power ratio of data to voice traffic. The effect of varying system parameters including spreading bandwidth, the of orthogonality factor, and the number of spreading codes are examined. Analytical results show that MC-CDMA users transmitting only a single traffic type require significantly more power than SC-CDMA users with only a single traffic type. On the other hand, MC-CDMA users transmitting multimedia traffic require power levels approximately identical to SC-CDMA users with multimedia traffic. The results can be used in the design of radio resource management (e.g., power allocation) scheme for wireless multimedia services.

Strategies for Selecting Initial Item Lists in Collaborative Filtering Recommender Systems

  • Lee, Hong-Joo;Kim, Jong-Woo;Park, Sung-Joo
    • Management Science and Financial Engineering
    • /
    • v.11 no.3
    • /
    • pp.137-153
    • /
    • 2005
  • Collaborative filtering-based recommendation systems make personalized recommendations based on users' ratings on products. Recommender systems must collect sufficient rating information from users to provide relevant recommendations because less user rating information results in poorer performance of recommender systems. To learn about new users, recommendation systems must first present users with an initial item list. In this study, we designed and analyzed seven selection strategies including the popularity, favorite, clustering, genre, and entropy methods. We investigated how these strategies performed using MovieLens, a public dataset. While the favorite and popularity methods tended to produce the highest average score and greatest average number of ratings, respectively, a hybrid of both favorite and popularity methods or a hybrid of demographic, favorite, and popularity methods also performed within acceptable ranges for both rating scores and numbers of ratings.

Performance Analysis of Layered Cell Protocol for the Integrated Traffic of Packetized Voice and Low Bit-rate Data (패킷화된 음성과 저속의 데이터가 혼합된 트래픽을 위한 Layered Cell 프로토콜의 성능해석)

  • 이영교;박기식;정해원;조성준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.964-972
    • /
    • 1999
  • In this paper, we proposed a simulation model to which apply the AAL 2 (AAL type 2) between BSC and MSC in the cellular mobile communication systems. We suggested the frame structure of processing the packets of short length and the scheme which multiplex to one or more ATM cell. Also, we analyzed the performance of the APR, transmission delay, and channel transmission efficiency used in the packetized voice traffic and the low bit-rate data traffic such as fax. From the simulation results, the maximum number of users are 47 users without using AAL 2 multiplexing, but the maximum number of users are 70 (Non-Overlapping scheme) users, 110 (Overlapping scheme) users, respectively. Thus, we knew that the Overlapping scheme is more efficient than the Non-Overlapping scheme. Finally, we showed that the optimum transmission buffer size is 4 ATM cells in the cellular communication systems with the bandwidth of 2 Mbps.

  • PDF

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks

  • Singh, Devendra Kumar;Shrivastava, Manish
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.272-276
    • /
    • 2021
  • Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.

Attack-Proof Cooperative Spectrum Sensing Based on Consensus Algorithm in Cognitive Radio Networks

  • Liu, Quan;Gao, Jun;Guo, Yunwei;Liu, Siyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1042-1062
    • /
    • 2010
  • Cooperative spectrum sensing (CSS) is an effective technology for alleviating the unreliability of local spectrum sensing due to fading/shadowing effects. Unlike most existing solutions, this paper considers the use of CSS technology in decentralized networks where a fusion center is not available. In such a decentralized network, some attackers may sneak into the ranks of cooperative users. On the basis of recent advances in bio-inspired consensus algorithms, an attack-proof, decentralized CSS scheme is proposed in which all secondary users can maintain cooperative sensing by exchanging information locally instead of requiring centralized control or data fusion. Users no longer need any prior knowledge of the network. To counter three potential categories of spectrum sensing data falsification (SSDF) attacks, some anti-attack strategies are applied to the iterative process of information exchange. This enables most authentic users to exclude potentially malicious users from their neighborhood. As represented by simulation results, the proposed scheme can generally ensure that most authentic users reach a consensus within the given number of iterations, and it also demonstrates much better robustness against different SSDF attacks than several existing schemes.