• Title/Summary/Keyword: multi-user and multi-service

Search Result 436, Processing Time 0.03 seconds

An Experimental Examination of Customer Preferences on Mobile Interfaces (모바일 서비스 고객선호도에 관한 실증연구)

  • Baek, Seung-Ik;Cho, Min;Kim, Bong-Jun
    • Korean Management Science Review
    • /
    • v.23 no.3
    • /
    • pp.27-39
    • /
    • 2006
  • Designing mobile Interfaces is fundamentally different from designing online interfaces. Not only are there differences in underlying technologies, but also in the way people use mobile Interfaces. If these differences are not taken into account in designing mobile interfaces, mobile services are likely to fail. If mobile services do not deliver what people want, these services will fail no matter how excellent the underlying technology is. The user interface design commonly used in mobile services is based on multi-layered approach, which is not very user-friendly. A well designed single layered user Interface will be more user friendly than the conventional one and it will be having edge over others. However, it is quite difficult to Provide a single layered user Interface in a small screen. This study aims at examining how design attributes of mobile interfaces affect customer preferences. In order to explore customer preferences to each design attribute of mobile interfaces, we measure and analyze customer's WTP (Willingness To Pay) toward their different interface designs. Ultimately, throughout the study, we try to answer how to design mobile interfaces in small screen of mobile devices. In addition, we propose an optimal design solution that customers likely prefer.

An OFDMA-Based Next-Generation Wireless Downlink System Design with Hybrid Multiple Access and Frequency Grouping Techniques

  • Lee Won-Ick;Lee Byeong Gi;Lee Kwang Bok;Bahk Saewoong
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.115-125
    • /
    • 2005
  • This paper discusses how to effectively design a next-generation wireless communication system that can possibly provide very high data-rate transmissions and versatile quality services. In order to accommodate the sophisticated user requirements and diversified user environments of the next-generation systems, it should be designed to take an efficient and flexible structure for multiple access and resource allocation. In addition, the design should be optimized for cost-effective usage of resources and for efficient operation in a multi-cell environment. As orthogonal frequency division multiple access (OFDMA) has turned out in recent researches to be one of the most promising multiple access techniques that can possibly meet all those requirements through efficient radio spectrum utilization, we take OFDMA as the basic framework in the next-generation wireless communications system design. So, in this paper, we focus on introducing an OFDMA-based downlink system design that employs the techniques of hybrid multiple access (HMA) and frequency group (FG) in conjunction with intra-frequency group averaging (IFGA). The HMA technique combines various multiple access schemes on the basis of OFDMA system, adopting the multiple access scheme that best fits to the given user condition in terms of mobility, service, and environment. The FG concept and IFGA technique help to reduce the feedback overhead of OFDMA system and the other-cell interference (OCI) problem by grouping the sub-carriers based on coherence band-widths and by harmonizing the channel condition and OCI of the grouped sub-carriers.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

TV Watching Pattern Analysis System based on Multi-Attribute LSTM Model (다중속성 LSTM 모델 기반 TV 시청 패턴 분석 시스템)

  • Lee, Jongwon;Sung, Mikyung;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.4
    • /
    • pp.537-542
    • /
    • 2021
  • Smart TVs provide a variety of services and information compared to existing TVs based on the Internet. In order to provide more personalized services or information, it is necessary to analyze users' viewing patterns and provide customized services or information based on them. The proposed system receives the user's TV viewing pattern, analyzes it, and recommends a TV program or movie as customized information to the user. For this, the system was constructed with a preprocessor and a deep learning model. The preprocessor refines the name of the TV program watched by the user, the date the TV program was watched, and the watched time. Then, the multi-attribute LSTM model trains the refined data and performs prediction.The proposed system is a system that provides customized information to users, and is believed to be a leading technology in digital convergence that combines existing IoT technology and deep learning technology.

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

Subcarrier Allocation Algorithm with Simple CSI for Multiuser OFDM System (다중 사용자 OFDM 시스템에서 간략화된 채널 정보를 이용한 부반송파 할당 알고리즘)

  • Yang, Jun-Seok;Park, Sang-Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.3
    • /
    • pp.229-235
    • /
    • 2010
  • The Orthogonal Frequency Division Multiplexing(OFDM) has been strongly recommended as a transmission technique in order to satisfy requests of high speed and high quality multimedia information. This paper considers resource allocation algorithm which supports the user Quality of Service(QoS) for multi-user OFDM system with simple CSI (Channel State Information) structure. After users eligible for services and the number of subcarrier are determined by minimum request data rate and average channel gain, subcarriers are allocated to increase total transmission rates. Although ideal CSI is not reported to base station, compared to conventional algorithm, we have obtained better result with simple CSI structure.

A Study on the Effective Method of Generating the Dynamic Web Documents in the Multi-user System (다중-사용자 시스템에서의 효과적인 동적 웹 문서 발생 방법에 관한 연구)

  • Lee Hyun-Chang;Lee Jong-Eon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.478-485
    • /
    • 2006
  • In this paper, we analyze the conditions of generating the dynamic Web documents in multi-user server and propose effective method for it. PSSI technique leads to replace the complex process of modifying a CGI source program by simply correcting the HTML Web document in the external file form. This technique has the strong points of CGI, flexibility and security of programming as well as those of SSI, easiness of modifying Web documents. Due to the characteristics of PSSI that Web source documents are in the form of external file, we show that with a single CGI program an individual user can design and modify his own Web documents in his directory. This means that PSSI technique has more advantage in managing the server than the CGI method which requires CGI program to be set up whenever that service is needed.

Implementation of outgoing packet processor for ATM based MPLS LER System

  • Park, Wan-Ki;Kwak, Dong-Yong;Kim, Dae-Yong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1851-1854
    • /
    • 2002
  • The Internet with conventional routing scheme cannot meet user demands driven from drastic growth in the Internet user and various service and traffic type. MPLS(Multi Protocol Label Switching) was introduced to the Internet fur solution to resolve this problem. MPLS is a paradigm to integrate higher layer’s software routing functions including layer-3 routing with layer-2 switching. But, the exponential growth of Internet traffic brings out of label space. One scalable solution to cope with this problem is to introduce flow merge technique, i. e. a group of flows is forwarded using the same label. Specially, IETF(Internet Engineering Task Force) recommends that ATM based MPLS system may include VC merge function, so it is scalable to increase of internet traffic. We implemented the MPLS LER system that includes the look-up and forwarding function in incoming path and VC merging function and limited traffic management function in outgoing path. This paper describes the implementation of the LER’s outgoing parts.

  • PDF

A Study on the Ubiquitous Interface Technologies (유비쿼터스 인터페이스 기술에 대한 고찰)

  • Lee, Hyeon-Jae;Oh, Chang-Heon
    • Journal of Digital Convergence
    • /
    • v.4 no.1
    • /
    • pp.31-41
    • /
    • 2006
  • This article introduces developing trends of an 'Ubiquitous Interface' as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. 'Ubiquitous Interface' is a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These 'Ubiquitous Interface' able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended current technologies are RFID, NFC, Multi-mode mobile terminal, UMA mobile terminal and Wearable computer as a future ubiquitous interface. These technologies are have to have flexibility and multiple physical communication channels for seamless service hand over and serve easy connection at huge USN to user. Also, they have to must have flexible software structure. Finally, through the 'Ubiquitous Interface', we will be experience of seamless communication and realize a real liberty of communication.

  • PDF

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.