• Title/Summary/Keyword: multi-user and multi-service

Search Result 436, Processing Time 0.031 seconds

Customized Coupon Recommendation Model based on Fuzzy AHP Reflecting User Preference (사용자 선호도를 반영한 FUZZY-AHP 기반 맞춤형 쿠폰 추천 모델)

  • Sim, Weon-Ik;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.395-401
    • /
    • 2014
  • As social network service becomes common, the consumers use many discount coupons with which they can purchase goods via social commerce. Although, the quantities of coupons offered from social commerce are currently on the sharp increase, customized coupon service that reflects user preference is not offered. This paper proposes a coupon service method reflecting user's subjective inclination targeting food coupons to offer customized coupon service for social commerce. Towards this end, this paper conducts hierarchization of the factors that become standard in selecting coupons including food types, food prices, discount rates and the number of buyers. And then, this study classifies, extracts and offers the coupons using Fuzzy-AHP, a decision making support method that reflects subjective inclination. From the user satisfaction results on the extracted coupons, the users are generally satisfied: very satisfactory with 45%, satisfactory with 33% and fair with 22%, and there was no experiment participant, who was dissatisfied.

A Study on Single Sign-On Authentication Model using Multi Agent (멀티 에이전트를 이용한 Single Sign-On 인증 모델에 관한 연구)

  • 서대희;이임영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.997-1006
    • /
    • 2004
  • The rapid expansion of the Internet has provided users with a diverse range of services. Most Internet users create many different IDs and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and users manage a number of ms. The SSO system can provide heightened efficiency and security to users and administrators. Recently commercialized SSO systems integrate a single agent with the broker authentication model. However, this hybrid authentication system cannot resolve problems such as those involving user pre-registration and anonymous users. It likewise cannot provide non-repudiation service between joining objects. Consequently, the hybrid system causes considerable security vulnerability. Since it cannot provide security service for the agent itself, the user's private information and SSO system may have significant security vulnerability. This paper proposed an authentication model that integrates a broker authentication model, out of various authentication models of the SSO system, with a multi-agent system. The proposed method adopts a secure multi-agent system that supplements the security vulnerability of an agent applied to the existing hybrid authentication system. The method proposes an SSO authentication model that satisfies various security requirements not provided by existing broker authentication models and hybrid authentication systems.

The Effect of Service Quality of Social Welfare Facilities on Facility Reuse: Focusing of Multi-Parallel Triple Mediation Effect of Facility Image, User Loyalty, and Facility Satisfaction (사회복지 이용시설의 서비스 질이 시설 재이용에 미치는 영향: 시설 이미지, 이용자 충성도, 시설만족도 병렬 삼중매개 효과분석)

  • Yun, Il-Hyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.127-133
    • /
    • 2021
  • This study studies the effect of social welfare service quality on facility reuse for users of social welfare facilities. The purpose of this study is to study the effect of the parallel triple mediation effect of facility image user loyalty and facility satisfaction. To this end 219 users of social welfare facilities were analyzed using SPSS 23.0 for Windows and Process macro. As a result, first the variables of service quality facility image user loyalty facility satisfaction and facility reuse all formed significant positive relationships. Second facility image user loyalty and facility satisfaction had multiple mediating effects. This study presented a new model using multivariate in response to social welfare facilities in pandemic situations.

Semantic Multi-agents Framework for Ubiquitous Systems (유비쿼터스 시스템을 위한 시맨틱 다중 에이전트)

  • Choi Jung-Hwa;Park Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.3
    • /
    • pp.192-201
    • /
    • 2005
  • For the past ten years, the goal of ubiquitous computing research has been the establishment of a new technology system with the aim 'Anytime, Anywhere, and Any form'. The needs for agent technology innovations such as ontology-based structure, ontology-based agent communication language, and multi-agents frameworks have been identified. This paper proposes a noble multi-agents architecture for ubiquitous systems. We suggest four major steps in the interaction between human and agents which enable ubiquitous agents to process by themselves to provide adaptive service to meet human's needs. First, we propose a semantic web technology to represent the association between information resources more explicitly Second, we construct a semantic ontology so that agents can recognize web contents.'Third, we propose a method to communicate between agents using OWL ontologies. Finally, we suggest a multi-agents structure based on the JADE of FIPA to analyze messages and get information. The semantic multi-agents framework proposed in this paper infers semantic situations using semantic web technology based on ontologies. A service provided is inferred differently according to user state because the multi-agents communicate by using OWL ontology language. Therefore, our system better infers context information than other without ontologies.

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

The Design and Implementation of a Vehicle Location Tracing System using RM Multi-Session Processing (RM 다중세션 처리를 이용한 차량 추적 시스템의 설계 및 구현)

  • Lee, Yong Kwon;Jang, Chung Ryong;Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.61-73
    • /
    • 2014
  • An automatic vehicle location tracing system is to build GIS server and on transmission for providing service in various ways by collecting a GPS location information from each vehicle. It is to save GPS data from OBU built-in on the vehicle and transmit the GPS data using the RSU on the roadside and WAVE communication technology. The collected data from the RSU is transmitted to the GIS server and stored in DB(database) and based on the GPS data that was collected from the each vehicle the system is to provide user service to suit the applications so it is to provide various services between RSU and OBU. In this paper, by implementing a multi-session process between the RM and the RMA a variety of services between RSU and OBU are provided. In addition, the system is designed and implemented using GPS to provide a variety of services, for the services provided from each RMA by configuring them as an independent session so it enables a variety of services implemented from one of RSU. With the result of the comparative analysis on the multi-session processing and single-session processing it shows that the differenes of them are minor in repect of the data loss rate and the data transfer rate but various services can be provided.

A Multi-Attribute Intuitionistic Fuzzy Group Decision Method For Network Selection In Heterogeneous Wireless Networks Using TOPSIS

  • Prakash, Sanjeev;Patel, R.B.;Jain, V.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5229-5252
    • /
    • 2016
  • With proliferation of diverse network access technologies, users demands are also increasing and service providers are offering a Quality of Service (QoS) to satisfy their customers. In roaming, a mobile node (MN) traverses number of available networks in the heterogeneous wireless networks environment and a single operator is not capable to fulfill the demands of user. It is crucial task for MN for selecting a best network from the list of networks at any time anywhere. A MN undergoes a network selection situation frequently when it is becoming away from the home network. Multiple Attribute Group Decision (MAGD) method will be one of the best ways for selecting target network in heterogeneous wireless networks (4G). MAGD network selection process is predominantly dependent on two steps, i.e., attribute weight, decision maker's (DM's) weight and aggregation of opinion of DMs. This paper proposes Multi-Attribute Intuitionistic Fuzzy Group Decision Method (MAIFGDM) using TOPSIS for the selection of the suitable candidate network. It is scalable and is able to handle any number of networks with large set of attributes. This is a method of lower complexity and is useful for real time applications. It gives more accurate result because it uses Intuitionistic Fuzzy Sets (IFS) with an additional parameter intuitionistic fuzzy index or hesitant degree. MAIFGDM is simulated in MATLAB for its evaluation. A comparative study of MAIFDGM is also made with TOPSIS and Fuzzy-TOPSIS in respect to decision delay. It is observed that MAIFDGM have low values of decision time in comparison to TOPSIS and Fuzzy-TOPSIS methods.

A Survey on Deep Learning based Face Recognition for User Authentication (사용자 인증을 위한 딥러닝 기반 얼굴인식 기술 동향)

  • Mun, Hyung-Jin;Kim, Gea-Hee
    • Journal of Industrial Convergence
    • /
    • v.17 no.3
    • /
    • pp.23-29
    • /
    • 2019
  • Object recognition distinguish objects which are different from each other. But Face recognition distinguishes Identity of Faces with Similar Patterns. Feature extraction algorithm such as LBP, HOG, Gabor is being replaced with Deep Learning. As the technology that identify individual face with machine learning using Deep Learning Technology is developing, The Face Recognition Technology is being used in various field. In particular, the technology can provide individual and detailed service by being used in various offline environments requiring user identification, such as Smart Mirror. Face Recognition Technology can be developed as the technology that authenticate user easily by device like Smart Mirror and provide service authenticated user. In this paper, we present investigation about Face Recognition among various techniques for user authentication and analysis of Python source case of Face recognition and possibility of various service using Face Recognition Technology.

Joint Packet and Sub-carrier Allocation Scheme to Ensure Reliable Multimedia Service in OFDMA Multicast System (OFDMA 멀티캐스트 시스템에서 신뢰성 있는 멀티미디어 서비스를 보장하기 위한 패킷 및 서브 캐리어 할당 기법)

  • Gwak, Yong-Su;Kim, Yong-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.4
    • /
    • pp.8-12
    • /
    • 2009
  • We propose BMPA(balanced multimedia packet allocation) scheme. This scheme considers the issue of optimal sub-carrier allocation in OFDMA multicast system. When RT(real time) packets and NRT(non-real time) packets arrive at the same time, BMPA scheme gives higher weight to RT packets than NRT packets and then, it allocates sub-carriers according to the total weight sum of packets in each user. This process acts as both packet scheduler and sub-carrier allocation. Therefore, each user receives multimedia packets with reliability. With simulation results, it shows that BMPA scheme ensures long-term system throughput and, in average RT packet delay, BMPA scheme greatly outperforms multi-user water-filling algorithm.