• Title/Summary/Keyword: User Need

Search Result 2,124, Processing Time 0.027 seconds

Implementation of Multimedia Contents Stream Service Mobility by Location Tracking (위치 인식을 통한 멀티미디어 컨텐츠 스트림 서비스의 이동성 구현)

  • Kim, Ji-Young;Yong, Hwan-Seung
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.117-124
    • /
    • 2006
  • In ubiquitous computing environment, a user can access their personalized services at anytime, anywhere, through any possible mobile or fixed terminals in a secure way. If the user wants to move to a different location, they need to stop the video play at the current location and makes a new request at the new location. As well, the user needs to manually search for the last frame to be seen at the previous location. In this paper, we proposed an implementation of multimedia contents streaming service mobility by user's location tracking. User can play video seamlessly while moving from one machine to another along the user's moving trail.

  • PDF

A New Roaming Authentication Framework For Wireless Communication

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin;Zhao, Qianqian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2061-2080
    • /
    • 2013
  • Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users. However, the classical approach requires the home server's participation during the authentication between the mobile user and the foreign server. So the more the roaming requests are performed the heavier burden will be on the home server. In this paper, we propose a new roaming authentication framework for wireless communication without the home server's participation. The new roaming authentication protocol in the new framework takes advantage of the ID-based cryptography and provides user anonymity. It has good performance compared with the roaming authentication protocols whose authentication do not need the home server's participation in terms of security and computation costs. Moreover, a new User-to-User authentication protocol in the new framework is also present. All the authentications proposed in this paper can be regarded as a common construction and can be applied to various kinds of wireless networks such as Cellular Networks, Wireless Mesh Networks and Vehicle Networks.

Association Service Mining using Level Cross Tree (레벨 교차 트리를 이용한 연관 서비스 탐사)

  • Hwang, Jeong Hee
    • Journal of Digital Contents Society
    • /
    • v.15 no.5
    • /
    • pp.569-577
    • /
    • 2014
  • The various services are required to user in time and space. It is important to provide suitable service to user according to user's circumstance. Therefore it is need to provide services to user through mining by latest information of user activity and service history. In this paper we propose a mining method to search association rule using service history based on spatiotemporal information and service ontology. In this method, we find the associative service pattern using level-cross tree on service ontology. The proposed method is to be a basic research to find the service pattern to provide high quality service to user according to season, location and age under the same context.

A Study on the Intention of Continuous Usage of O2O Service: Focusing on the Moderating Effect of User Innovation (O2O 서비스의 지속이용의도에 관한 연구 : 이용자 혁신성의 조절효과를 중심으로)

  • Lee, Og;Lee, MoonBong
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.51-69
    • /
    • 2020
  • Purpose Today, the increasing of internet use and the expansion of internet range provide us with many opportunities. Therefore, this study examine relation of perceived ease of use, perceived playfulness, perceived risk, perceived usefulness based on previous studies. And we examine the effect of O2O service satisfaction on continuous use intention. Also, we studied the relationship between perceived ease of use, perceived playfulness, perceived risk, perceived usefulness according to user innovation. Design/Methodology A Structural Equation Model(SEM) method was used to test the theoretical framework based on a sample of 451 respondents who have experienced the O2O service. Factor analysis and confirmation factor analysis was conducted to check the reliability, convergency validity and discriminant validity. To test moderating effect of the user innovation, multi group analysis was conducted. Findings First, perceived ease of use, perceived playfulness, perceived risk have significant effects on perceived usefulness. Second, perceived usefulness of O2O service have a positive effect on satisfaction. Third, satisfaction of O2O service have a positive effect on continuous use intention. The relationship that perceived ease of use, perceived playfulness, perceived risk affect perceived usefulness is differ depending on user innovation. Based on these findings, this study suggested to marketing practitioners the need for different approach by a user innovation.

A Study of Working Algorithm which makes silent Hard Disk Drive (저소음 HDD 구현을 위한 동작 알고리즘에 관한 연구)

  • Byun, Sang-Don;Chung, Kee-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.274-276
    • /
    • 2010
  • Three noise sources are come from note PC system; HDD, System Cooling Fan and ODD. Except HDD, user can accept as an acceptable operating noise. System Fan needs to cooling down the CPU and Chipset and ODD only works when it need to work, therefore user thinks these two noise sources are necessary. For the HDD, some times it makes noise without user HDD access action such as re-organizing cache and defragmentation, user can hardly accept this noise. At the circumstance like as library and the room at the dawn, user can recognize the noise easily so that makes dissatisfaction. I'm studying algorithm and method to reduce HDD noise for user satisfaction.

  • PDF

An advertisement method using inaudible sound of speaker

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.7-13
    • /
    • 2015
  • Recently, there are serviced user customized advertisement of various type using smart device. Representative services are advertisement service using light of smart TV screen or audible sound of smart TV to transmit advertisement information. However, those services have to do a specific action of smart device user for advertisement information or need audible audio information of TV contents. To overcome those weakness, therefore, we propose an advertisement method using inaudible sound of speaker based on smart device. This method supports the transfer of advertising content to the smart device user with no additional action or TV audio signal required to access that content. The proposed method used two high frequencies among 18kHz ~ 22kHz of audible frequency range which smart TV can send out. And it generates those frequencies synthesized with audio of TV contents as trigger signal which can send advertisements to smart device. Next, smart device analysis the trigger signal and request advertisement contents related to the signal to server. After then, smart device can show the downloaded contents to user. Because the proposed method uses the high frequencies of sound signals via the inner speaker of the smart device, its main advantage is that it does not affect the audio signal of TV content. To evaluate the efficacy of the proposed method, we developed an application to implement it and subsequently carried out an advertisement transmission experiment. The success rate of the transmission experiment was approximately 97%. Based on this result, we believe the proposed method will be a useful technique in introducing a customized user advertising service.

User Responses Towards Information Distribution of Copyright Law No. 28 of 2014 Concerning Permits for Commercial Use of Music Performing Rights

  • MUHIDIASTU, Naufal;MANI, La;RASYID, Fariz Ubaidillah;ZHAFIRAH, Hanan;ARAS, Muhammad
    • Journal of Distribution Science
    • /
    • v.20 no.1
    • /
    • pp.55-65
    • /
    • 2022
  • Purpose: This article discusses public acceptance in the information distribution of Copyright Law no. 28 of 2014 and Government Regulation No. 56 of 2021 in Indonesia concerning the commercial use of music. Hospitality industry is one of the most affected by this regulations, which some hotelsrefused to comply. To get royalties, LMKN approaches with socialization either directly or indirectly to commercial music users. Research design, data and methodology: Quantitative survey by distributing questionnaires, then testing the validity and reliability tests using the SmartPLS application. The population studied were Hotels on Java and Bali Island in Indonesia. The research sample is 100 hotels. Result: R-Square value of 0.706 for the construct (Y) User Response which means that (X) Socialization can explain the variance (Y) User Response of 70.3%. This shows that the level of influence (X) Socialization has an effect on (Y) User Response. Conclusion: User responses regarding the distribution information of the Act indicate the need for socialization, because socialization provides literacy to the public. More frequent socialization will provide a good opportunity to increase the response of commercial music users.

Design of COS for smart card user authentication using signature (서명을 이용한 스마트카드 사용자 인증을 위한 COS 설계)

  • 송영상;신인철
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.103-112
    • /
    • 2004
  • This paper suggests the way to realize smart card security system by using handwritten signature instead of a password which is traditionally used for user authentication. Because of the familiarity of signature we don't need to try to remember the password and signature is difficult to be used by guess or illegal forced situation. The feature data of handwritten signature is large, so we designed COS which is consist of special commands for processing user's handwritten signature data, user authentication, and basic commands based on ISO 7816-3. Also protocol among user, smart card terminal and DB server is designed. In registration process, the feature data of user signature is saved in both a DB server and a smart card. User authentication is processed by comparing the user signature and the saved feature data in a smart card and in a DB server. And the authentication result and hash value of signature data in DB server are transferred to smart card. During this process the authentication between DB server and user is finished. The proposed security system has more higher level of security in user authentication of smart card and it will Provide safer and more convenient security services.

UBAF(User Behavior Analysis Framework) for u-Home Network (유비쿼터스 홈네트워크를 위한 사용자 행위 분석 프레임워크)

  • Jung, Ji Hong;Kim, Woo Yeol;Kim, R. Young Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.121-127
    • /
    • 2008
  • User needs in residential environment have very complicated and variety connection with others. u-home system for the near future is need to be combined acceptance of exist user needs as well as needs on new technology relating with u-Home. The study proposes a User Behavior Analysis Framework - UBAF for applying the user needs to the system more efficiently and developing the system by classifying patterns for the needs based on date of user behavior analysis. UBAF is a developing framework getting the basic idea of combining system modeling methods on SE and user modeling methods considering on HCI. It will be applicable to develop the system with core user behaviors by applying a standard way on u-Home. For example, the study transforms information into knowledge the system modeling and user modeling with analyzing a scenario for indoor temperature controlling on u-Home.

  • PDF

Ontology-based User Customized Search Service Considering User Intention (온톨로지 기반의 사용자 의도를 고려한 맞춤형 검색 서비스)

  • Kim, Sukyoung;Kim, Gunwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.129-143
    • /
    • 2012
  • Recently, the rapid progress of a number of standardized web technologies and the proliferation of web users in the world bring an explosive increase of producing and consuming information documents on the web. In addition, most companies have produced, shared, and managed a huge number of information documents that are needed to perform their businesses. They also have discretionally raked, stored and managed a number of web documents published on the web for their business. Along with this increase of information documents that should be managed in the companies, the need of a solution to locate information documents more accurately among a huge number of information sources have increased. In order to satisfy the need of accurate search, the market size of search engine solution market is becoming increasingly expended. The most important functionality among much functionality provided by search engine is to locate accurate information documents from a huge information sources. The major metric to evaluate the accuracy of search engine is relevance that consists of two measures, precision and recall. Precision is thought of as a measure of exactness, that is, what percentage of information considered as true answer are actually such, whereas recall is a measure of completeness, that is, what percentage of true answer are retrieved as such. These two measures can be used differently according to the applied domain. If we need to exhaustively search information such as patent documents and research papers, it is better to increase the recall. On the other hand, when the amount of information is small scale, it is better to increase precision. Most of existing web search engines typically uses a keyword search method that returns web documents including keywords which correspond to search words entered by a user. This method has a virtue of locating all web documents quickly, even though many search words are inputted. However, this method has a fundamental imitation of not considering search intention of a user, thereby retrieving irrelevant results as well as relevant ones. Thus, it takes additional time and effort to set relevant ones out from all results returned by a search engine. That is, keyword search method can increase recall, while it is difficult to locate web documents which a user actually want to find because it does not provide a means of understanding the intention of a user and reflecting it to a progress of searching information. Thus, this research suggests a new method of combining ontology-based search solution with core search functionalities provided by existing search engine solutions. The method enables a search engine to provide optimal search results by inferenceing the search intention of a user. To that end, we build an ontology which contains concepts and relationships among them in a specific domain. The ontology is used to inference synonyms of a set of search keywords inputted by a user, thereby making the search intention of the user reflected into the progress of searching information more actively compared to existing search engines. Based on the proposed method we implement a prototype search system and test the system in the patent domain where we experiment on searching relevant documents associated with a patent. The experiment shows that our system increases the both recall and precision in accuracy and augments the search productivity by using improved user interface that enables a user to interact with our search system effectively. In the future research, we will study a means of validating the better performance of our prototype system by comparing other search engine solution and will extend the applied domain into other domains for searching information such as portal.