• Title/Summary/Keyword: User Distribution

Search Result 1,120, Processing Time 0.027 seconds

Design of GE subgroup based User Authentication Protocol For efficient Electric Commerce (효율적 전자상거래를 위한 유한체 서브그룹 기반의 사용자 인증 프로토콜 설계)

  • 정경숙;홍석미;정태충
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.209-220
    • /
    • 2004
  • If protocol has fast operations and short key length, it can be efficient user authentication protocol. Lenstra and Verheul proposed XTR. XTR have short key length and fast computing speed. Therefore, this can be used usefully in complex arithmetic. In this paper, to design efficient user authentication protocol we used a subgroup of Galois Field to problem domain. Proposed protocol does not use GF(p/sup 6/) that is existent finite field, and uses GF(p²) that is subgroup and solves problem. XTR-ElGamal based user authentication protocol reduced bit number that is required when exchange key by doing with upside. Also, proposed protocol provided easy calculation and execution by reducing required overhead when calculate. In this paper, we designed authentication protocol with y/sub i/ = g/sup b.p/sup 2(i-1)//ㆍv mol q, 1(equation omitted) 3 that is required to do user authentication.

  • PDF

An Analysis of the Research Trend on The Information User studies (이용자 연구에 관한 연구동향 분석)

  • Hahn Bock Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.23
    • /
    • pp.107-125
    • /
    • 1992
  • The purpose of this study is to investigate the research trend of information user studies. The following findings are made. The literature on information user studies during 1980-1990 reveals 120 titles. The faculty members of university tend to publish their results in scientific journals and university publication while non-faculty members are more likely to represent their research papers in unpublished master thesis and bulletin. Subject distribution of research were classified into ten: user studies, material use studies, information needs and uses, user education, library use pattern, citation analysis, journal use, catalog use, information system, non-use study. Survey research, literature research, survey reserch and literature research use jointly, experimental research and citation analysis were employed for information user studies.

  • PDF

An Authentication Technology for On-line Computer Program Distribution (컴퓨터 프로그램 온라인 판매를 위한 유통 및 인증 기술)

  • Lim, Shin-Young;Lee, Sung-Min;Kim, Tai-Yun
    • IE interfaces
    • /
    • v.13 no.1
    • /
    • pp.141-146
    • /
    • 2000
  • Through an on-line software distribution, a user can get the software easily using Internet. As purchase, receipt and installation of software are executed via on-line batch process the time for software purchase and installation can be reduced. In this paper, we describe technologies for on-line software distribution and propose a secure software distribution and installation protocol for electronic commerce.

  • PDF

Effect of the VOD Holdback Strategy Change on IPTV and Cable TV VOD Usage (VOD 홀드백 정책 변화가 IPTV와 케이블TV VOD 이용에 미치는 영향)

  • Cho, Sukhyun;Chung, Donghun
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.142-150
    • /
    • 2015
  • This study examines the effect of changes in the content distribution strategy on VOD usage by comparing the VOD usage pattern following the changes in the IPTV and Digital Cable SVOD holdback policy. The result of this study shows that after changing the SVOD holdback from one week to three weeks, the VOD usage decreased up to 50 percent while paid VOD revenue increased as a result of the rise in PPM. The time series analysis shows statistical decrease in the number of SVOD usage, SVOD usage per user, and PPV revenue per user while VOD revenue per user increased significantly. Moreover, SVOD usage within the drama genres such as mini-series, weekend series, weekend special series, and sitcom decreased significantly. This research provides a case study on the effect of the broadcaster's content distribution policy on the VOD user behavior thus proposing broadcasters and platform operators the ways of establishing distribution strategy as well as invigorating the VOD usage.

PKI-based Distribution System of the User's Permission about Broadcast Program (PKI를 통한 방송프로그램 사용자 권한 유통시스템)

  • Im, Dae-Myung;Park, Ki-Chul;Lee, Joo-Young;Nam, Je-ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.649-652
    • /
    • 2009
  • Now Broadcasting system of TV has been developed from analogue to digital we call that IPTV(Internet Protocol Television) or DCATV(Digital Cable Television). But, The characteristics of digital broadcasting is the high-quality contents of easily and almost no damage piracy, and Copyright loss is increasing by Internet, P2P(Peer to Peer) and personal path. Nevertheless user's permissions that recorded and reuse of broadcasting can't restraint, And Training Materials etc. use of fair program needs to be separated from illegality. In this paper using a digital certificate permit the use of stored program to authorized user and user of fair purpose, And illegal distribution of restriction design and implement a distribution system.

  • PDF

A Efficient Key Generation and Renewal for Broadcast Encryption (브로드캐스트 암호화에서의 효율적인 키 생성과 갱신 방법)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.149-156
    • /
    • 2004
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. Important thing is that only user who is permitted before only must be able to get digital information in broadcast encryption schemes. If broadcast message transfers, users who authority is get digital information to use private key given in the advance by oneself. Thus, user acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. Take advantage of two technique of proposal system. One is method that server creates key forecasting user without user's agreement, and another is method that server and user agree each other and create key Advantage of two proposal system because uses a secret key broadcast message decryption do can and renewal is available effectively using one information whatever key renewal later.

Analysis of Commercial Continuous Media Server Workloads on Internet (인터넷 환경에서의 상용 연속미디어 서버의 부하 분석)

  • Kim, Ki-Wan;Lee, Seung-Won;Park, Seong-Ho;Chung, Ki-Dong
    • The KIPS Transactions:PartB
    • /
    • v.10B no.1
    • /
    • pp.87-94
    • /
    • 2003
  • A study on the characteristics of server workloads based on user access pattern offers insights for the strategies on continuous media caching and network workloads distribution. This paper analyses characteristics of continuous media filet in each fervor and user access requests to each of them, using log data of three commercial sites, which are providing continuous media files in the form of real time streaming on the Internet. These servers have more continuous files than ones in the previously reported studies and are processing very large number of user access requests. We analyse the characteristics of continuous media files in each server by the size of files. playback time and encoding bandwidth. We also analyse the characteristics of user access requests by the distribution of user requests to continuous media files, user access time, access rate based on the popularity of the files and the number if access requests to serial continuous media files.

Outage Performance of Uplink NOMA Systems with CDF Scheduling (CDF 스케쥴링을 적용한 상향링크 NOMA 시스템의 오수신 성능)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.37-42
    • /
    • 2021
  • NOMA (Non-orthogonal multiple Access) system has been focused on the next generation cellular system for higher spectral efficiency. However, this requires user scheduling as the NOMA system is a multi-user system which accesses simultaneously. There are two representative scheduling schemes, proportionate scheduling (FP) and cumulative distribution function (CFD) scheduling. The PF scheduling is applied, the cell edge user is hard to obtain a transmit opportunity. Recently, CDF scheduling is obviously noted that it offers the same possibility of transmission for a user regardless of the location in a cell. We consider an uplink NOMA system with CDF scheduling, and obtain the channel access probabilities, the outage probabilities of the system with different number of users and different kinds of weights through simulation. The results indicate that the likelihood of each user accessing the channel is the same and the probability of failure decreases as the number of users increases. We found that the effect of the probability of failure is negligible as the weight of the cell edge user increases.

Design and Implementation of the Image Creation System based on User-Media Interaction (사용자와 미디어 사이의 상호작용 기능 제공 기반 영상 창작 시스템 설계 및 구현)

  • Song, Bok Deuk;Kim, Sang Yun;Kim, Chae Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.932-938
    • /
    • 2016
  • Recently, interactive media which maximizes audience engagement by making the audience appeal on a stage in digital media environment has been distributed more widely. In fact, there has been active movement to develop and promote a new participatory media genre with higher immersion by applying this kind of interactive media concept to advertisement, film, game and e-learning. In the conventional interactive media, digital media had to be enjoyed in particular environment where diverse sensors were installed or through a certain device to recognize a user's motion and voice. This study attempted to design and implement an image creation system which ensures interactions between a user and media in popular distribution-enabled web environment and through PC and smart devices to minimize the image producer-user constraints.

Dynamic User Association based on Fractional Frequency Reuse

  • Ban, Ilhak;Kim, Se-Jin
    • Journal of Integrative Natural Science
    • /
    • v.13 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • This paper proposes a novel fractional frequency reuse(FFR) based on dynamic user distribution. In the FFR, a macro cell is divided into two regions, i.e., the inner region(IR) and outer region(OR). The criterion for dividing the IR and OR is the distance ratio of the radius. However, these distance-based criteria are uncertain in measuring user performance. This is because there are various attenuation phenomena such as shadowing and wall penetration as well as path loss. Therefore, we propose a novel FFR based on dynamic user classification with signal to interference plus noise ratio(SINR) of macro users and classify the FFR into two regions newly. Simulation results show that the proposed scheme has better performance than the conventional FFR in terms of SINR and throughput of macro cell users.