• Title/Summary/Keyword: User Distribution

Search Result 1,125, Processing Time 0.027 seconds

Study on Performance Evaluation of Academic Information Distribution Project in Scientific Technology Field (과학기술분야 학술정보 유통사업 성과평가에 관한 연구)

  • Kwak, Seung-Jin;Kim, Jeong-Taek;Park, Yong-Jae
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.4
    • /
    • pp.441-462
    • /
    • 2007
  • As country try expand R&D investment and enhance its efficiency to improve the national competitiveness, research is needed to conduct qualitative enhancement and derive progressive future strategy in relation to the academic information distribution project in scientific technology field. In this study, BSC-based performance indicators were applied to an institute that is the representative of domestic academic information distribution institutes in the field of scientific technology to evaluate project performance, and then to analyze portfolio of using such evaluation results. As for the items of evaluation for the performance indicators of academic information distribution project in the scientific technology field, 12 items that includes information resource quality, information service quality, user satisfaction and economically useful value of academic information from four(4) viewpoints such as information resource, information service, user and economic viewpoints. In the portfolio analysis, it was conducted by performance indicators and by elements of the individual performance indicators as well. Based on the results of performance evaluation and portfolio analysis, the improvement method by viewpoints on academic information distribution project of an institute was suggested.

  • PDF

Provably Secure Tree-Based Centralized Group Key Distribution: Security Model and Modular Approach (증명 가능한 트리기반 중앙 분배 방식의 그룹키 기법: 안전성 모델 및 변환모듈)

  • Kim Hyun-Jeong;Lee Su-Mi;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.69-78
    • /
    • 2004
  • During the last decade, security models have been defined for two- and three-parity key exchange protocols. Currently there is a growing research interest in security models for group key management schemes. While various security models and provably secure protocols have been proposed for distributed group key exchange schemes, no results are hewn for centralized group key distribution schemes in spite of their theoretical and practical importance. We describe security requirements and a formal security model for centralized group key distribution scheme: we define the model on the channel controlled by adversaries with the ability of strong user corruption. In the security model, we propose a conversion module which can transform centralized tree-based group key distribution schemes in the literature to provably secure centralized tree-based group key distribution schemes.

Development of Current Distribution Analysis Program for Railway Electrification System (전차선로의 전류분포분석 프로그램 개발)

  • 이욱화;김정훈;홍재승;오광해;창상훈
    • Proceedings of the KSR Conference
    • /
    • 1999.05a
    • /
    • pp.336-343
    • /
    • 1999
  • This paper presents development of the program which calculates the electric quantities such as current, voltage at each pan of railway electrification system in static state. The purpose of this program is to estimate the adequacy of railway electrification system through simulations. And it contributes the estimations for optimal railway electrification system by calculating the maximum of current and voltage. The results are represented through GUI(Graphic User Interface) for user to understand easily.

  • PDF

A Study on the Password-based Key distribution for the Roaming User (로밍 유저를 위한 패스워드 기반 키 분배에 관한 연구)

  • 이덕규;이임영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.437-442
    • /
    • 2003
  • 네트워크에 대한 접근성이 높아짐으로 인해 사용자는 자신의 클라이언트 터미널을 벗어나 다른 터미널에서의 네트워크 접속을 요구하는 사용자(Roaming User)가 증가하고 있다 이러한 사용자는 패스워드를 기반으로 하여 현재 위치하고 있는 서버와 새로운 비밀키를 생성할 수 있다. 본 논문에서는 기존의 패스워드 기반의 프로토콜을 간략하게 살펴보고 이를 통하여 프로토콜의 구성 방법과 사전공격 등 여러 가지 일반적인 공격으로부터 안전한 프로토콜을 제안한다. 또한 본 제안 방식은 기존 패스워드를 이용하여 로밍 방식에 적용할 수 있도록 하였다.

  • PDF

Checking Spam Mail Filter Need for Each User Group from Computing Distribution of User Email Responses (사용자 이메일 반응 분포 계산과 사용자 그룹 스팸 메일 필터 필요성 점검)

  • Kim, Jongwan;Kim, In-Gil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.47-49
    • /
    • 2009
  • 본 연구에서는 이메일 사용자별로 제공받은 사용자 선호 정보 대상으로 EM 클러스터링을 수행하여 사용자 클러스터를 만든 후, 사용자 클러스터들의 이메일 반응 분포를 계산함으로써 사용자 취향에 따라 동일한 이메일에 대해서도 서로 다른 반응을 가질 수 있다는 사실을 확인하려고 한다. 그 결과로부터 현재의 내용기반 방식과는 다르게 사용자 선호도를 고려한 스팸 메일 필터 구축 방법을 제안한다.

A Study on the Determinants of Third Party Logistics Service Suppliers in Dongdaemun Market

  • Zhang, Yu-Liang;Yoo, Chang-Gwon;Kim, Gi-Pyoung
    • Journal of Distribution Science
    • /
    • v.15 no.2
    • /
    • pp.27-36
    • /
    • 2017
  • Purpose - This study was intended to find the selection attribution factors and service satisfaction determinants of third party logistics suppliers in Dongdaemun wholesale market. Research design, data, and methodology - A questionnaire survey was performed, and the retailers and wholesalers in Dongdaemun wholesale market were asked to fill in it. Company employees using third party logistics service were selected by a random sampling method. Results - It is easy for both retailers and wholesalers to use third party logistics service. The logistics companies in Dongdaemun wholesale market have paid more heed to the security of freight and the operability. That is, the freight safety and operating service are the most important factors in selecting third party logistics suppliers, and they both have a close relationship with user satisfaction. There is no relation between service level and recognition in selection factors of third party logistics suppliers. All the responsiveness, operability and informativeness of third-party logistics providers has a significant relationship with user satisfaction. Conclusions - Third party logistics service is entirely different from the existing delivery or transport service. The most market vendors' wish for third party logistics suppliers is the stability of freight and robust operating service. They also demand the responsiveness for special or emergency situation with having information strength.

On the Distribution of the Movement Speed of Smartphone Users (스마트폰으로 측정된 사용자의 이동속도분포에 관한 연구)

  • Kim, Woojin;Jang, Woncheol;Song, Ha Yoon
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.11
    • /
    • pp.567-575
    • /
    • 2016
  • With the popularity of smartphone, user's location information is of great interest as mobile apps based on the location information are increasing. In this paper, we are interested in analyzing user's speed data based on the location information. It is not uncommon to observe locations with great measurement errors, removing them is necessary. The distribution of speed can be considered as a mixture model in accordance with transportation means. We identify a tail part as a component of a mixture model and fit a simple parametric model to the tail part of the speed distribution.

A Study on the Behavior of the User according to the Distribution Development of Online Travel Agency

  • MIN, So-Ra;LEE, Sun-Mi
    • Journal of Distribution Science
    • /
    • v.18 no.6
    • /
    • pp.25-35
    • /
    • 2020
  • Purpose:Travel agencies have use digital tools in order to shift the paradigm in how business is conducted. Online travel agencies provide the same services as a normal travel agency, including hotels, transportation, guided tours, reservations, and related services, but using an "online platform. Travelers planning a trip can use a lot of forms to collect information and have access to a larger amount of information, so the factors that influence the user's behavioral intention are very important. This research has the conducted to find what factors lead to the attitudes of consumers in using OTA using the UTAUT model. Research design, data and methodology: The object of this study were respondents of a google survey using convenient sample extraction method, chosen among consumers who gathered information, or purchased a product. A total of 217 of the 235 questionnaires Google survey answered were used in the final analysis, excluding insincere responses. Using PSS v.21 and AMOS v.21, frequency analysis, feasibility and reliability analysis, path analysis was performed. Results: UTAUT affects OTA use satisfaction and trust, and OTA satisfaction and trust affect behavior intention. Conclusions: Research was conducted using the UTAUT model to explore factors that affect the attitudes of users of online travel agencies (OTA).

Study of Digital Content Integrated Model for Massive Multimedia User (대용량 멀티미디어 사용자를 위한 디지털 콘텐츠 통합모델에 관한 연구)

  • Lim Yong-Muk;Park Sang-Cho;Kim Hee-Nam;Kim Young-Deuk;Kim Woo-Sung;Oh Soo-Hyun;Oh Yong-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.352-356
    • /
    • 2005
  • Content management, distribution system and DRM technology have been developed respectively, many contents services are more focused on the system like stability of distribution system or contents security than user-orient. In this paper, we would suggest multimedia contents management based on DRM and distribution model for the users of massive multimedia. The suggested model will be a total solution of content management, DRM and Watermarking functions as well as it will offer convenience to the users with Indexing DBMS which is focused on users.

  • PDF

Simulation of Contaminant Draining Strategy with User Participation in Water Distribution Networks

  • Marlim, Malvin S.;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.146-146
    • /
    • 2021
  • A contamination event occurring in water distribution networks (WDNs) needs to be handled with the appropriate mitigation strategy to protect public health safety and ensure water supply service continuation. Typically the mitigation phase consists of contaminant sensing, public warning, network inspection, and recovery. After the contaminant source has been detected and treated, contaminants still exist in the network, and the contaminated water should be flushed out. The recovery period is critical to remove any lingering contaminant in a rapid and non-detrimental manner. The contaminant flushing can be done in several ways. Conventionally, the opening of hydrants is applied to drain the contaminant out of the system. Relying on advanced information and communication technology (ICT) on WDN management, warning and information can be distributed fast through electronic media. Water utilities can inform their customers to participate in the contaminant flushing by opening and closing their house faucets to drain the contaminated water. The household draining strategy consists of determining sectors and timeslots of the WDN users based on hydraulic simulation. The number of sectors should be controlled to maintain sufficient pressure for faucet draining. The draining timeslot is determined through hydraulic simulation to identify the draining time required for each sector. The effectiveness of the strategy is evaluated using three measurements, such as Wasted Water (WW), Flushing Duration (FD), and Pipe Erosion (PE). The optimal draining strategy (i.e., group and timeslot allocation) in the WDN can be determined by minimizing the measures.

  • PDF