• Title/Summary/Keyword: User Internet

Search Result 4,246, Processing Time 0.031 seconds

Cost-Benefit based User Review Selection Method

  • Neung-Hoe Kim;Man-Soo Hwang
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.177-181
    • /
    • 2023
  • User reviews posted in the application market show high relevance with the satisfaction of application users and its significance has been proven from numerous studies. User reviews are also crucial data as they are essential for improving applications after its release. However, as infinite amounts of user reviews are posted per day, application developers are unable to examine every user review and address them. Simply addressing the reviews in a chronological order will not be enough for an adequate user satisfaction given the limited resources of the developers. As such, the following research suggests a systematical method of analyzing user reviews with a cost-benefit analysis, in which the benefit of each user review is quantified based on the number of positive/negative words and the cost of each user review is quantified by using function point, a technique that measures software size.

An Optimized User Behavior Prediction Model Using Genetic Algorithm On Mobile Web Structure

  • Hussan, M.I. Thariq;Kalaavathi, B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1963-1978
    • /
    • 2015
  • With the advancement of mobile web environments, identification and analysis of the user behavior play a significant role and remains a challenging task to implement with variations observed in the model. This paper presents an efficient method for mining optimized user behavior prediction model using genetic algorithm on mobile web structure. The framework of optimized user behavior prediction model integrates the temporary and permanent register information and is stored immediately in the form of integrated logs which have higher precision and minimize the time for determining user behavior. Then by applying the temporal characteristics, suitable time interval table is obtained by segmenting the logs. The suitable time interval table that split the huge data logs is obtained using genetic algorithm. Existing cluster based temporal mobile sequential arrangement provide efficiency without bringing down the accuracy but compromise precision during the prediction of user behavior. To efficiently discover the mobile users' behavior, prediction model is associated with region and requested services, a method called optimized user behavior Prediction Model using Genetic Algorithm (PM-GA) on mobile web structure is introduced. This paper also provides a technique called MAA during the increase in the number of models related to the region and requested services are observed. Based on our analysis, we content that PM-GA provides improved performance in terms of precision, number of mobile models generated, execution time and increasing the prediction accuracy. Experiments are conducted with different parameter on real dataset in mobile web environment. Analytical and empirical result offers an efficient and effective mining and prediction of user behavior prediction model on mobile web structure.

Story Generation Method using User Information in Mobile Environment (모바일 환경에서 사용자 정보를 이용한 스토리 생성 방법)

  • Hong, Jeen-Pyo;Cha, Jeong-Won
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.81-90
    • /
    • 2013
  • Mobile device can get useful user information, because users have always this device. In this paper, we propose automatically story generation method and user topic extraction using user information in mobile environment. Proposed method is follows: (1) We collect user action information in mobile device. Then, (2) we extract topics from collected information. (3) For the results of (2), we determine episodes for one day. Then, (4) we generate sentences using sentence templates and we compose stories which have theme-based or time-based. Because proposed method is simpler than previous method, proposed method can work only in mobile device. There's no room to leak user information. And proposed method is expressed more informative than previous method, because proposed method is provided sentence-based result. Extracted user-topic, a result of our method, can use to analyze user action and user preference.

A Study on the User Interface of Web-based Flexible Manufacturing System (웹기반 유연 생산시스템 사용자 인터페이스)

  • PARK JE-WOONG;KIM WON-JUNG
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2004.11a
    • /
    • pp.68-72
    • /
    • 2004
  • A practical method to investigate the user interface of web based Flexible Manufacturing System(FMS) on the internet environment is established. Because the industrial FMS controller requires a lot of gadget, such as switch, dial, button, etc., for actual work-site flexible operation sufficiently, the user interface of the controller is significantly complex. The support for operational convenience of FMS controller can increase productivity and efficiency of the user, operational personnel of FMS. While most FMS provide their application programming interface(API) and graphical user interface(GUI) with adequate mechanism itself when used in stand alone, there is increasing demand for FMS that can operate with the intuitional user interface find virtual reality(V/R) environment. This thesis considers the intuitional user interface of Web-based FMS first, and from this, goes a step further, improves as virtual reality environment of FMS on the internet environments by using the feature based modeling technique approach and cartoon rendering. The feature-based modeling technique approach is applied to FMS line which is consist of facilities such as machining center, CNC lathe, autonomous guided vehicle, rail guided vehicle, and various controllers. In this study, the FMS established the intuitional user interface is able to obtain not only the operational convenience but also the enough productivity and significant efficiency.

  • PDF

A Study on Secure Remote User Authentication Scheme using Smart Card (스마트카드를 이용한 안전한 원격 사용자 인증기법에 관한 연구)

  • Go, Sung Jong;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.503-510
    • /
    • 2013
  • Recently, the rapid development of network technology has enabled people to use various services on the internet. However, the existing password-based user authentication system used in the internet environment requires a password table, which is a potential security threat as it could be leaked by an insider. To solve this issue, remote user authentication methods that do not require a user password table have been proposed. Regarding remote user authentication using a smart card in particular, various methods have been suggested to reduce expenses and to improve stability and efficiency, but the possibility of impersonation attacks and password-guessing attacks using information saved in a user's smart card still exist. Therefore, this study proposes a remote user authentication method that can safeguard against impersonation attacks and password guessing attacks, by analyzing weak points of conventional methods and creating a smart card's ID and password that are based on the user's ID and password.

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

E-customized Product: User-centered Co-design Experiences

  • Li, Pei;Liu, Zi Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3680-3692
    • /
    • 2020
  • The purpose of this study is to orient users' touchpoints in co-design experience, to identify their need via visualized experience map, to recommend valid design information in online e-customization services. A user-centered co-design experience map (UCEM) is adopted to analyze the relation between users' desire and time spent, so as to evaluate the online co-design experiences. Based on evolutionary algorithm and fuzzy theory, data of this study is collected from 30 participants. The data was analyzed by descriptive analysis in SPSS, and frequency query and word cloud in NVivo. Employing design category and evaluating users' time spent, the findings are that (a) vamp color matching is consistent with interview data; (b) supported by qualitative feedback, the virtual experience map played an important role in the co-design process and the visualized interaction process; and (c) participants prefer to get more information and professional help on color matching and exterior design. Based on the findings in design category, future work should be focused on developing a better understanding of design resource recommendations and multi-stakeholder communication.

Usability Evaluation and Improvements of Mobile Travel Apps

  • Kim, Yeonsuk;Kim, Heesun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.27-36
    • /
    • 2020
  • The popularization of smartphones allows people to instantly get the information that they want, through mobile apps, including financial services, movies and public transportation reservations, games and shopping. Furthermore, leisure activities through overseas travel are increasing due to the improvement of the living standards of people. These increases in overseas travel and the use of mobile apps lead to the increased use of mobile travel apps when booking tour packages. Although there are many studies on the usability assessment and user interface improvement for mobile apps, studies on the usability assessment for mobile travel apps are limited. We tested the usability for mobile travel apps to present some suggestions for improvements so that anyone can purchase travel packages easily and simply. We selected the top three mobile travel apps on Rankey.com that have different UIs. The heuristic method was used to evaluate usability. We present a better UI to allow users to use the app functions more easily by analyzing user interaction, ease of learning, readability, efficiency, and satisfaction for the entire use.

The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks

  • Wang, Yong;Wu, Hao;Tang, Liyang;Li, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.956-970
    • /
    • 2015
  • In this paper, we study the design of network coding for the generalized transmit scheme in multiple input multiple output Y channel, where K users wish to exchange specified and shared information with each other within two slots. Signal space alignment at each user and the relay is carefully constructed to ensure that the signals from the same user pair are grouped together. The cross-pair interference can be canceled during both multiple accessing channel phase and broadcasting channel phase. The proposed signal processing scheme achieves the degrees of freedom of ${\eta}(K)=K^2$ with fewer user antennas.

Recommendation Method considering New User in Internet of Things Environment (사물인터넷 환경에서 새로운 사용자를 고려한 정보 추천 기법)

  • Kwon, Joonhee;Kim, Sungrim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.23-35
    • /
    • 2017
  • With the popularization of mobile devices, the number of social network service users is increasing, thereby the amount of data is also increasing accordingly. As Internet of Things environment is expanding to connect things and people, there is information much more than before. In such an environment, it becomes very important to recommend the necessary information to the user. In this paper, we propose a recommendation method that considers new users in IoT environment. In the proposed method, we recommend the information by applying the centrality-based social network analysis method to the recommendation method using the social relationships in the social IoT. We describe the seven-step recommendation method and apply them to the music circle scenario of the IoT environment. Through the music circle scenario, we show that we can recommend more suitable information to new users in the IoT environment than the existing recommendation method.