• Title/Summary/Keyword: Users' behaviors

Search Result 658, Processing Time 0.027 seconds

Multiuser Resource Allocation Scheme Considering Link Layer Effective Capacity in OFDMA Systems (직교 주파수 분할 다원 접속 시스템에서 실효 링크 계층 용량을 고려한 다중 사용자 자원 할당 기법)

  • Sung Si-Hwan;Yoo Myung-Sik;Shin Yo-An;Lee Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.508-516
    • /
    • 2006
  • The explosive growth of wireless network users and the existence of various wireless services have demanded high rate throughput as well as user's QoS guarantees. Towards this, this paper proposes QoS-oriented subcarrier allocation scheme considering the QoS provisioning of multiple users, which is major requirement for wireless network design point of view. This paper introduces joint RR/K&H combined with M-LWDF(Modified Largest Weighted Delay First) scheme throughout observing statistical channel behavior and real time queuing analysis for appropriate resource allocation tightly connected to multiuser scheduling. Accordingly, the system throughput can be enhanced, and the QoS demanded for delay sensitive services can be satisfied. Furthermore, the proposed scheme is applied for OFDMA(Orthogonal Frequency Division Multiple Access) systems to allocate sub-carriers in optimal way. The simulation results verify plausible performances of proposed resource allocation scheme via showing superior effective capacity under time-varying physical-layer channel behaviors.

A Customized Tourism System Using Log Data on Hadoop (로그 데이터를 이용한 하둡기반 맞춤형 관광시스템)

  • Ya, Ding;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.397-404
    • /
    • 2018
  • As the usage of internet is increasing, a lot of user behavior are written in a log file and the researches and industries using the log files are getting activated recently. This paper uses the Hadoop based on open source distributed computing platform and proposes a customized tourism system by analyzing user behaviors in the log files. The proposed system uses Google Analytics to get user's log files from the website that users visit, and stores search terms extracted by MapReduce to HDFS. Also it gathers features about the sight-seeing places or cities which travelers want to tour from travel guide websites by Octopus application. It suggests the customized cities by matching the search terms and city features. NBP(next bit permutation) algorithm to rearrange the search terms and city features is used to increase the probability of matching. Some customized cities are suggested by analyzing log files for 39 users to show the performance of the proposed system.

Information Seeking, Evaluation, and Use on the Internet: A Case Study of Science and Engineering Scholars (인터넷의 정보의 탐색, 평가 및 활용:대학 이공계 연구자의 사례를 중심으로)

  • 이해영;이수영
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.163-181
    • /
    • 2001
  • The Internet offers a challenging information seeking environment for users due to a great amount of information, heterogeneous objects, and diverse information quality. The purpose of this study was to identify the ways of information seeking, evaluating, and using in the Internet by looking at search behaviors of science and engineering scholars in Korean university. The research problems addressed in the study include the utility of web information, information searching strategies, the extent of search engines usage, and scholarly value of information in the Internet. The data were collected through individual interviews with 28 scholars recruited from science and engineering fields at the Myongji University. It was found that the scholars in this study less likely turn to search engines for finding research information than types of information while they use search engines primarily for searching personal information such as travel and hobbies. This is partly because the scholars believe that the information, especially research-related information, in the Internet lacks the value as scholarly information. They also tend to believe that foreign literature available in the Internet is more credible, professional, and recent than domestic literature. In conclusion, the implications for search engine developers, librarians, and researchers as users and producers in the Internet are discussed.

  • PDF

Suggestion on Chinese Clothing Market Launching : Focused on Foreign Students's Clothing Buying Behavior in Korea

  • Koo, In-Sook;Liu, Dashuang
    • Journal of Fashion Business
    • /
    • v.15 no.6
    • /
    • pp.1-22
    • /
    • 2011
  • This paper is a study on the information required for developing Korean clothing products intended for Chinese students in Korea and for opening markets of Korean clothing and brands in China. It analyses the buying behaviors, purchasing ability, the favourite apparel type for clothing, and satisfaction with Korean clothing and brands of Chinese students in Korea, with which it seeks a program for South Korea branding to enter into the Chinese clothing market. Three hundred fifty seven students of Hannam University and PaiChai University Chung nam National University in Daejeon-city took part in this study. This paper adopts Descriptive Analysis, Crossing Analysis, Bivariate Correlations, and One-way ANOVA in SPSS 17.0 with Post Hoc Multiple Comparisons to know about the impact of demographic variables of Chinese students in Korea on buying information sources, the criteria for store selection, buying capacity, praise degree on various properties of Korean clothes products and their satisfaction with Korean clothes products. The first proposal of expanding China market for Korean merchants is to achieve maximum sales based on sales promotion strategies, such as the credit card corporations, the store display and sales person service development, SPA, design size development, and to upgrade consumption values. The second proposal is Korean clothes corporations should open the Internet shopping corresponding to the physical stores, the most frequently used information source of Chinese students is the network, from the age distribution of Internet users in 2008 in China, population above 10 and below 30 accounts for 66.7% of all users, In recommending clothes made in Korea to Chinese young people, on-line advertising will get better effects than other strategies, specially during advertisement, they should take good use of Korean television shows and variety shows or help Chinese poor areas to do the social contribution hereby to improve the public image of Korean clothes corporations, which can bring good sale promotion effects as well.

Friendship Influence on Mobile Behavior of Location Based Social Network Users

  • Song, Yang;Hu, Zheng;Leng, Xiaoming;Tian, Hui;Yang, Kun;Ke, Xin
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.126-132
    • /
    • 2015
  • In mobile computing research area, it is highly desirable to understand the characteristics of user movement so that the user friendly location aware services could be rendered effectively. Location based social networks (LBSNs) have flourished recently and are of great potential for movement behavior exploration and datadriven application design. While there have been some efforts on user check-in movement behavior in LBSNs, they lack comprehensive analysis of social influence on them. To this end, the social-spatial influence and social-temporal influence are analyzed synthetically in this paper based on the related information exposed in LBSNs. The check-in movement behaviors of users are found to be affected by their social friendships both from spatial and temporal dimensions. Furthermore, a probabilistic model of user mobile behavior is proposed, incorporating the comprehensive social influence model with extent personal preference model. The experimental results validate that our proposed model can improve prediction accuracy compared to the state-of-the-art social historical model considering temporal information (SHM+T), which mainly studies the temporal cyclic patterns and uses them to model user mobility, while being with affordable complexity.

Requirements Redundancy and Inconsistency Analysis for Use Case Modeling (유스케이스 모델링을 위한 요구사항 중복 및 불일치 분석)

  • 최진재;황선영
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.869-882
    • /
    • 2004
  • This paper proposes an effective method to create logically consistent and structured requirement model by applying consistency control approach of the formal method to the use-case modeling. This method integrates the multi-perspective scattered requirement segments that may overlap and conflict each other into a structured requirement model. The model structure can be analyzed based on context goal and concerned area overlap analysis. The model consistency can be achieved by using specification overlap-based consistency checking method as an integration vehicle. An experimental application to case study shows that the Proposed method can successfully identify requirement overlaps and inconsistency. It can also transfer multi-viewpoint requirement segments into a consistently integrated use-case model to clarify software behaviors and functionality This method helps users to enhance capability to identify specification inconsistency in the use-case modeling at the early stage of software engineering development. The proposed approach can also facilitate communication between users and developers to ensure customer satisfaction.

Relationship between Drug Abuse and the Problem Behavior Patterns among Adolescents (청소년의 약물남용과 문제행동 유형간의 관계 분석 -제주지역 고등학생을 중심으로-)

  • Kim, Hyeon Suk
    • Journal of the Korean Society of School Health
    • /
    • v.4 no.1
    • /
    • pp.88-99
    • /
    • 1991
  • The purpose of this study was attempted to analyze the relationship between drug abuse and the other problem behavior Patterns among high school students in Cheju. In order to achieve these set-goals, questionaires were finally supplied to the total 379 case of 9 high school from October to December, 1990. The collected data were processed using the SPSS-X computer program and statistically analyzed by the Chi-square method and. percentage. Results of the study were as follows: Among the 370 adolescents, 32.4% of students experienced cigarette smoking in their life, adolescents who experienced alcohol drinking were 46.8%, 0.5% of the students ever used marihuana; cocaine 0.3%, stimulant 3.2%, hallucinogen and inhalants 0.5%, tranquilizer 1.4%, analgesics 31:6%, antitussives 6.5%, antihistamines 1.9%. And all students never experienced the amphetamines and narcotics. The rates of drug use except stimulant and antitussive were higher in the male than in the female students. For the analysis of personal identifying datum, the rates of experienced smokers increased among groups of buddhist and the rates of experienced alconoi drinking increased among groups of no religion. Drug abuser increased among the group lower socio-economic status student, the adolescents whose parents have traditional education point of view. And it was also higher in those who were living only one than in those who were living together. Most students tended to use drugs after 17 or 18 years old. Drug users were more inclined to commit other problem behaviors when compared non-drug users. In the conclusion of the above results, it will be necessary to investigate the drug problem of adolescent. Drug abuse of students must be seen in an environmental context including family, school, peer group and society and not solely as the characteristics of an individual adolescent. And their parents and teachers must be on the alert for the behavior changes of their children such as changes of school performance, neglecting homework, tardiness or truancy from school, runaway from home, and mingled with bad companions, etc. We must recognize that drug abuse is frequently symptomatic of problems in the adolescent's environment.

  • PDF

A Conceptual Framework for an Information Behavior Model Based on the Collaboration Perspective between User and System for Information Retrieval

  • Yangyuen, Wachira;Phetkaew, Thimaporn;Nuntapichai, Siwanath
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.3
    • /
    • pp.30-46
    • /
    • 2020
  • This research aimed (1) to study and analyze the ability of current information retrieval (IR) systems based on views of information behavior (IB), and (2) to propose a conceptual framework for an IB model based on the collaboration between the system and user, with the intent of developing an IR system that can apply intelligent techniques to enhance system efficiency. The methods in this study consisted of (1) document analysis which included studying the characteristics and efficiencies of the current IR systems and studying the IB models in the digital environment, and (2) implementation of the Delphi technique through an indepth interview method with experts. The research results were presented in three main parts. First, the IB model was categorized into eight stages, different from traditional IB, in the digital environment, which can correspond to all behaviors and be applied to with an IR system. Second, insufficient functions and log file storage hinder the system from effectively understanding and accommodating user behavior in the digital environment. Last, the proposed conceptual framework illustrated that there are stages that can add intelligent techniques to the IR system based on the collaboration perspective between the user and system to boost the users' cognitive ability and make the IR system more user-friendly. Importantly, the conceptual framework for the IB model based on the collaboration perspective between the user and system for IR assisted the ability of information systems to learn, recognize, and comprehend human IB according to individual characteristics, leading to enhancement of interaction between the system and users.

An Anti-Trojan Horse Mechanism with Attached Data from Developers (개발자 첨부 자료에 의한 트로이 목마 대응 기법)

  • Cho, Eun-Sun;Yeh, Hong-Jin;Oh, Se-Chang;Hong, Sun-Ho;Hong, Man-Pyo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.4
    • /
    • pp.220-231
    • /
    • 2002
  • Trojan-horse programs are the programs that disguise normal and useful programs but do malicious thing to the hosts. This paper proposes an anti-Trojan horse mechanism using the information attached to the code by the developers. In this mechanism, each code is accompanied with the information on their possible accesses to resources, and based on this information users determine whether the code is malicious or not. Even in the case a code is accepted by users due to its non-malicious appearance, its runtime behaviors are monitored and halted whenever any attempts to malicious operations are detected. By hiring such runtime monitoring system, this mechanism enables detecting unknown Trojan horses and reduces the decision-making overhead being compared to the previous monitoring-based approaches. We describe the mechanism in a formal way to show the advantages and the limitations of the security this mechanism provides.

Development of a Standardized Framework for Domestic Information Security Education; Focusing on a Two-Track Curriculum Customized by Age and Job (국내 정보보호 교육 표준 프레임워크 개발; 연령 및 직무 맞춤의 이원화(Two-track) 교육과정을 중심으로)

  • Park, Minjung;Lee, GI Hyouk;Chai, Sangmi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1083-1095
    • /
    • 2021
  • With the recent increase in users' dependence on the Internet and the spread of various IT devices, the influence of information security on the users' has expanded compared to the past. Therefore, it is expected to have an increased influence on information security in personal life. In addition, as the intrusion factors that threaten security continue to become more advanced and diversified (eg., fake news, cyberbullying, identity theft), the need for nurturing information security experts is increasing. Furthermore, not only corporate information security workers, but also all individuals, cannot be free from the threat of information security. Therefore, it is necessary to prepare various information security education to improve information security awareness and induce proactive information security behaviors. In this study, characteristics of domestic and foreign information security education courses are analyzed and provide a standardized framework for information security education applicable to the domestic environment.