• Title/Summary/Keyword: User's Number

Search Result 1,219, Processing Time 0.026 seconds

A Countermeasures on the Hacking for the Internet Shopping Mall (인터넷 쇼핑몰의 해킹 사고에 대한 대응방법)

  • Lee, Young Gyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.33-43
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the hacking to the internet shopping mall go on increasing. If the large shopping mall is attacked by the hacker, a number of user's information are exposed to the hacker. The private information as like a resident registration number, user's real name, the date of user's birth, the mobile phone number, the office phone number / address, the home phone number / address and so on include the information. These information are used in the phishing e-mails / call and spam. And them are selling and buying maliciously. The large internet shopping mall 'auction' was hacked in April, 2008. After the incident, this paper suggested a countermeasures on the hacking for the internet shopping mall. The technical item and political item are included among the countermeasures. The countermeasures can protect the hacking not only the internet shopping mall but also the web sites basically.

Improvement in Operation Efficiency for Chip Mounter Using Web Server

  • Lim, Sun-Jong;Joon Lyou
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.4 no.6
    • /
    • pp.5-11
    • /
    • 2003
  • The number of the enterprises which utilize network technology has been increasing for solving problems such as productivity improvement, market trend analysis, and material collection for making decision. Especially, the management of equipment and the recovery time reduction when machines break down are very important factors in productivity improvement of the enterprise. Currently, most of the remote trouble diagnosis of equipment using the internet have just one function of transmitting the trouble information to the user. Therefore it does not directly reflect the user's recovery experience or the developer's new recovery methods. If the user's experienced recovery methods or the developer's recovery methods as well as the basic recovery methods are reflected online or on the internet, it makes it possible to recover faster than before. In this paper, we develop a Remote Monitoring Server (RMS) for chip mounters, and make it possible to reduce the recovery time by reflecting the user's experience and developer's new methods in addition to presenting the basic recovery methods. For this, trouble recovery concept will be defined. Based on this, many functions(trouble diagnosis, the presentation of the basic recovery methods, user's and developer's recovery method, counting function of the trouble number of each code, and presentation of usage number of each recovery methods) were developed. By utilizing the reports of the actual results of chip mounter and the notice function of the parts change time, the rate of operation of the chip mounter can be improved.

Dynamic Feedback Selection Scheme for User Scheduling in Multi-user MIMO Systems (다중 사용자 MIMO 시스템의 사용자 스케쥴링을 위한 동적 피드백 선택 기법)

  • Kim, I-Cheon;Kang, Chung G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.646-652
    • /
    • 2015
  • In this paper, the system-level performance is evaluated for the feedback scheme on the pre-coding matrix index (PMI) and channel quality indication (CQI), which are required for user selection in the multi-user MIMO system. Our analysis demonstrates that the number of users, the number of selected users, and codebook size are the key factors that govern the performance of the best companion grouping (BCG)-based user scheduling. Accordingly, we have confirmed that the probability of forming the co-scheduled user group is determined by these factors, which implies that the number of PMI's and codebook size can be dynamically determined so as to maximize the average system throughput as the number of users varies in the cell.

Generalized User Selection Algorithm im Downlink Multiuser MIMo System (하향링크 다중 사용자 MIMO 시스템에서의 일반화된 사용자 선택 알고리즘)

  • Kang, Dae Geun;Shin, Change Ui;Kuem, Dong Hyun;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.99-105
    • /
    • 2012
  • Recently, there are many user selection algorithms in multi user multiple-input multiple-output (MU-MIMO) systems. One of well-known user selection methods is Semi orthogonal user selection (SUS). It is an algorithm maximizing channel capacity. However, it is applicable only when user's antenna is one. We propose a generalized user selection algorithm regardless of the number of user's antennas. In the proposed scheme, Base station (Bs) selects the first user who has the highest determinant of channel and generates a user group that correlation with first user's channel is less than allowance of correlation. Then, each determinant of channels made up of first user's channel and a user's channel in the generated group is calculated and BS selects the next user who has the highest determinant of that. BS selects following users by repeating above procedure. In this paper, we get better performance because of selecting users who have the highest determinant of channel as well as allowance of correlation optimally calculated through matrix operations.

Machine Learning-based model for predicting changes in user evaluation reflecting the period of the product (제품 사용 기간을 반영한 기계학습 기반 사용자 평가 변화 예측 모델)

  • Boo Hyunkyung;Kim Namgyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.91-107
    • /
    • 2023
  • With the recent expansion of the commerce ecosystem, a large number of user evaluations have been produced. Accordingly, attempts to create business insights using user evaluation data have been actively made. However, since user evaluation can change after the user experiences the product, it is difficult to say that the analysis based only on reviews immediately after purchase fully reflects the user's evaluation of the product. Moreover, studies conducted so far on user evaluation have overlooked the fact that the length of time a user has used a product can affect the user's product evaluation. Therefore, in this study, we build a model that predicts the direction of change in the user's rating after use from the user's rating and reviews immediately after purchase. In particular, the proposed model reflects the product's period of use in predicting the change direction of the star rating. However, since the posterior information on the duration of product use cannot be used as input in the inference process, we propose a structure that utilizes information about the product's period of use using an auxiliary classifier. As a result of an experiment using 599,889 user evaluation data collected from the shopping platform 'N' company, we confirmed that the proposed model performed better than the existing model in terms of accuracy.

Factors Influencing Photo Sharing for Creating Social Relationships on Instagram (인스타그램에서 사회적 관계 형성을 위한 사진 공유에 영향을 미치는 요인에 관한 연구)

  • Chung, Namho;Um, Taehyee;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.17 no.4
    • /
    • pp.129-145
    • /
    • 2016
  • Nowadays, owing to the diffusion of smartphones and the growth of social networking services (SNS), the number of people who share their life with other SNS users by posting photos is increasing. The number of Instagram users has been particularly increasing since Instagram started its service in 2010. Compared to other SNS such as Facebook and Twitter, Instagram runs its service by focusing solely on photos, which is a major differentiation factor compared with other existing SNS. Previous studies, however, do not examine SNS that focus on photo sharing adequately. Therefore, we establish a hypothesis relating to the motivations behind a user's photo sharing attitude and posting intention through Instagram. Moreover, this will be achieved by employing TRA(Theory of Reasoned Action) and focusing on intrinsic and extrinsic motivations. The analysis results show that intrinsic motivation influences a user's sharing attitude and subjective norms. Apart from this, Instagram's expressivity influences a user's photo sharing attitude and posting intention.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

The Effect of Co-rating on the Recommender System of User Base

  • Lee, Hee-Choon;Lee, Seok-Jun;Chung, Young-Jun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.17 no.3
    • /
    • pp.775-784
    • /
    • 2006
  • This study is to investigate the effect of the number of co-rated users to the MAE. User based collaborative algorithm generally uses similarity weight to compute the relation of active user and other users. The original estimation algorithm of the GroupLens used the Pearson's correlation coefficient, soon after other researchers used various weighting. The Pearson’s correlation coefficient and Vector similarity, which is used in the field of information retrieval, are commonly used to the estimation algorithm. In prediction, we analyze the effect of the number of co-rated users on the user based recommender system.

  • PDF

A user behavior prediction technique using mobile-based Lifelog (모바일 기반 라이프로그를 이용한 사용자 행동 예측 기법)

  • Bang, Jae-Geun;Kim, Byeong Man
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.6
    • /
    • pp.63-76
    • /
    • 2014
  • Recently the desired information has been recommended to many people in a number of ways using the smartphone. Though there are many applications for that purpose, but most applications does not consider the user's current situation. In order to automatically recommend the information considering the user's situation, it is necessary to predict the future behavior of the user from the records of the past behavior of the user. Therefore, in this paper, we propose a method that predicts the user's future behavior through association analysis based on the user's current behavior which is identified by applying the user's current situation data collected via a smartphone to the Bayesian network built from the user's life log. From the experiments and analysis for five students and five virtual workers, the usefulness of the proposed method is confirmed.

EXAMINING THE WAY OF PRESENTING RELIABLE INFORMATION ON WEB PAGE

  • Okamoto, Takuma;Yamaoka, Toshiki;Matsunobe, Takuo
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2001.05a
    • /
    • pp.131-135
    • /
    • 2001
  • Recently, Internet is used widely. Many Web sites, however, are not designed based on user's view. So, this research aimed at grasping the user needs and structure of Web site which user used easily. First, to grasp user needs, questionnaires about the motivation, the purpose and the evaluation items of Web page were done. As a result, we found the easiness for the user. Next, we made subjects operated test pages in which the number of classes and the amount of information were changed. We collected the quantitative data of the optimum number of classes, amount of information and retrieval time. As a result, there was a significant difference in each numerical value. The results of this research are available when constructing a web site. so, usability of Web site can be improved by them.

  • PDF