• Title/Summary/Keyword: priority mechanism

Search Result 235, Processing Time 0.02 seconds

Fuzzy AHP and FCM-driven Hybrid Group Decision Support Mechanism (퍼지 AHP와 퍼지인식도 기반의 하이브리드 그룹 의사결정지원 메커니즘)

  • Kim, Jin-Sung;Lee, Kun-Chang
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.11a
    • /
    • pp.239-250
    • /
    • 2003
  • In this research, we propose a hybrid group decision support mechanism (H-GDSM) based on Fuzzy AHP (Analytic Hierarchy Process) and FCM (Fuzzy Cognitive Map). The AHP elicits a corresponding priority vector interpreting the preferred information among the decision makers. Corresponding vector was composed of the pairwise comparison values of a set of objects. Since pairwise comparison values are the judgments obtained from an appropriate semantic scale. However, AHP couldn't represent the causal relationship among information, which were used by decision makers. In contrast to AHP, FCM could represent the causal relationship among variables or information. Therefore, FCMs were successfully developed and used in several ill-structured domains, such as strategic decision-making, policy making, and simulations. Nonetheless, many researchers used subjective and voluntary inputs to simulate the FCM. As a result of subjective inputs, it couldn't avoid the rebukes of businessman. To overcome these limitations, we incorporated the Fuzzy membership functions, AHP and FCM into a H-GDSM. In contrast to current AHP methods and FCMs, the H-GDSM method developed herein could concurrently tackle the pairwise comparison involving causal relationships under a group decision-making environment. The strengths and contributions of our mechanism were 1) handling of qualitative knowledge and causal relationships, 2) extraction of objective input value to simulate the FCM, 3) multi-phase group decision support based on H-GDSM. To validate our proposed mechanism we developed a simple prototype system to support negotiation-based decisions in electronic commerce (EC).

  • PDF

The Effect of Representativeness in News Recommendation Mechanisms on Audience Reactions in Online News Portals (대표성 기반 뉴스 추천 메커니즘이 온라인 뉴스 포탈의 독자 반응에 미치는 영향)

  • Lee, Un-Kon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.1-22
    • /
    • 2016
  • News contents has been collected, selected, edited and sometimes distorted by the news recommendation mechanisms of online portals in nowadays. Prior studies had not confirmed the consensus of newsworthiness, and they had not tried to empirically validate the impacts of newsworthiness on audience reactions. This study challenged to summarize the concepts of newsworthiness and validate the impact of representativeness of both editor's and audience's perspective on audience reactions as perceived news quality, trust on news portal, perceived usefulness, service satisfaction, loyalty, continuous usage intention, and word-of-mouth intention by adopting the representativeness heuristics method and information adoption model. 357 valid data had been collected using a scenario survey method. Subjects in each groups are exposed by 3 news recommendation mechanisms: 1) the time-priority news exposure mechanism (control group), 2) the reference-score-based news recommendation mechanism (a single treatment group), and 3) the major-news-priority exposure mechanism sorting by the reference scores made by peer audiences (the mixed treatment group). Data had been analyzed by the MANOVA and PLS method. MANOVA results indicate that only mixed method of both editor and audience recommendation mechanisms impacts on perceived news quality and trust. PLS results indicate that perceived news quality and trust could significantly affect on the perceived usefulness, service satisfaction, loyalty, continuance usage, and word-of-mouth intention. This study would contributions to empathize the role of information technology in media industry, to conceptualize the news value in the balanced views of both editors and audiences, and to empirically validate the benefits of news recommendation mechanisms in academy. For practice, the results of this study suggest that online news portals would be better to make mixed news recommendation mechanisms to attract audiences.

Network-adaptive H.264 Video Streaming over IEEE 802.11e (IEEE 802.11e에서 네트워크 적응적인 H.264 비디오 스트리밍)

  • Lee, Sun-Hun;Chung, Kwang-Sue
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.6-16
    • /
    • 2008
  • An instable wireless channel condition causes more packet losses and retransmissions due to interference, fading, station mobility, and so on. Therefore video streaming service over a wireless networks is a challenging task because of the changes in the wireless channel conditions and time-constraints characteristics of the video streaming services. To provide efficient video streaming over a wireless networks, QoS-enhanced MAC protocol, IEEE 802.11e, is standardized recently. Tn this paper, we propose a new network-adaptive H.264 video streaming mechanism in the IEEE 802.11e wireless networks. To improve the quality of video streaming services, video stream has to adapt to the changes in the wireless channel conditions. The wireless channel conditions are estimated by the packet loss probability and informed to the application layer by the cross-layering. According to the wireless channel information, the video streaming application filters out the low-priority data. This adaptation mechanism efficiently uses system resources because it drops the low-priority data in advance. Therefore, our cross-layer design can provide improved video streaming services to the end-user. Through the implementation and performance evaluation, we prove that the proposed mechanism improves the QoS of the video streaming by providing the smoothed playback.

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer

  • Hoang, Thang;Nguyen, Thuc;Luong, Chuyen;Do, Son;Choi, Deokjai
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.333-348
    • /
    • 2013
  • Mobile authentication/identification has grown into a priority issue nowadays because of its existing outdated mechanisms, such as PINs or passwords. In this paper, we introduce gait recognition by using a mobile accelerometer as not only effective but also as an implicit identification model. Unlike previous works, the gait recognition only performs well with a particular mobile specification (e.g., a fixed sampling rate). Our work focuses on constructing a unique adaptive mechanism that could be independently deployed with the specification of mobile devices. To do this, the impact of the sampling rate on the preprocessing steps, such as noise elimination, data segmentation, and feature extraction, is examined in depth. Moreover, the degrees of agreement between the gait features that were extracted from two different mobiles, including both the Average Error Rate (AER) and Intra-class Correlation Coefficients (ICC), are assessed to evaluate the possibility of constructing a device-independent mechanism. We achieved the classification accuracy approximately $91.33{\pm}0.67%$ for both devices, which showed that it is feasible and reliable to construct adaptive cross-device gait recognition on a mobile phone.

Elliptic Curve Signcryption Based Security Protocol for RFID

  • Singh, Anuj Kumar;Patro, B.D.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.344-365
    • /
    • 2020
  • Providing security has been always on priority in all areas of computing and communication, and for the systems that are low on computing power, implementing appropriate and efficient security mechanism has been a continuous challenge for the researchers. Radio Frequency Identification (RFID) system is such an environment, which requires the design and implementation of efficient security mechanism. Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. But, due to high strength and requirement of less key size in elliptic curve cryptography, the focus of researchers has been on designing efficient security protocol for RFID based on elliptic curves. In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability, forward security, anonymity, and scalability. Moreover, the proposed protocol successfully provides resistance from replay attack, impersonation attack, location tracking attack, de-synchronization attack, denial of service attack, man-in-the-middle attack, cloning attack, and key-compromise attack. Results have revealed that the proposed protocol is efficient than the other related protocols as it takes less computational time and storage cost, especially for the tag, making it ideal to be used for RFID systems.

Challenges in Application of Remote Sensing Techniques for Estimating Forest Carbon Stock (원격탐사 기술의 산림탄소 축적량 추정적용에 있어서의 도전)

  • Park, Joowon
    • Current Research on Agriculture and Life Sciences
    • /
    • v.31 no.2
    • /
    • pp.113-123
    • /
    • 2013
  • The carbon-offset mechanism based on forest management has been recognized as a meaningful tool to sequestrate carbons already existing in the atmosphere. Thus, with an emphasis on the forest-originated carbon-offset mechanism, the accurate measurement of the carbon stock in forests has become important, as carbon credits should be issued proportionally with forest carbon stocks. Various remote sensing techniques have already been developed for measuring forest carbon stocks. Yet, despite the efficiency of remote sensing techniques, the final accuracy of their carbon stock estimations is disputable. Therefore, minimizing the uncertainty embedded in the application of remote sensing techniques is important to prevent questions over the carbon stock evaluation for issuing carbon credits. Accordingly, this study reviews the overall procedures of carbon stock evaluation-related remote sensing techniques and identifies the problematic technical issues when measuring the carbon stock. The procedures are sub-divided into four stages: the characteristics of the remote sensing sensor, data preparation, data analysis, and evaluation. Depending on the choice of technique, there are many disputable issues in each stage, resulting in quite different results for the final carbon stock evaluation. Thus, the establishment of detailed standards for each stageis urgently needed. From a policy-making perspective, the top priority should be given to establishinga standard sampling technique and enhancing the statistical analysis tools.

  • PDF

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree (이진트리 기반의 속성기반 암호전송 알고리즘)

  • Lee, Moon Sik;Kim, HongTae;Hong, Jeoung Dae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.

Opportunistic Scheduling and Power Control for Cross-Layer Design of Ad Hoc Networks (Ad Hoc네트워크의 Cross-Layer설계를 위한 Opportunistic Scheduling과 Power Control기법)

  • Casaquite Reizel;Ham Byung-Woon;Hwang Won-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9A
    • /
    • pp.856-867
    • /
    • 2006
  • This paper proposes a new algorithm for opportunistic scheduling that take advantage of both multiuser diversity and power control. Motivated by the multicast RTS and priority-based CTS mechanism of OSMA protocol, we propose an opportunistic packet scheduling with power control scheme based on IEEE 802.11 MAC protocol. The scheduling scheme chooses the best candidate receiver for transmission by considering the SINR at the nodes. This mechanism ensures that the transmission would be successful. The power control algorithm on the other hand, helps reduce interference between links and could maximize spatial reuse of the bandwidth. We then formulate a convex optimization problem for minimizing power consumption and maximizing net utility of the system. We showed that if a transmission power vector satisfying the maximum transmission power and SINR constraints of all nodes exist, then there exists an optimal solution that minimizes overall transmission power and maximizes utility of the system.

A Web Server Load Balancing Mechanism for Supporting Service Level Agreement (SLA를 지원하는 웹 서버 부하 분산 기법)

  • Go Hyeon-Joo;Park Kie-Jin;Park Mi-Sun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.505-513
    • /
    • 2006
  • To satisfy SLA(Service Level Agreement) contract between a client and a service provider, the client requests are classified and processed by priorities. In providing differentiated service, a request from a client who has low priority can be dealt with less important. In this paper, we study static and dynamic partitioning mechanism of web servers and also admission control policy for multiclass request distribution. Through simulation experiments, we analyze web server throughput and response time considering SLA.

QoS-Aware Call Admission Control for Multimedia over CDMA Network (CDMA 무선망상의 멀티미디어 서비스를 위한 QoS 제공 호 제어 기법)

  • 정용찬;정세정;신지태
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.106-115
    • /
    • 2003
  • Diverse multimedia services will be deployed at hand on 3G-and-beyond multi-service CDMA systems in order to satisfy different quality of service (QoS) according to traffic types. In order to use appropriate resources efficiently the call admission control (CAC) as a major resource control mechanism needs to be used to take care of efficient utilization of limited resources. In this paper, we propose a QoS-aware CAC (QCAC) that is enabled to provide service fairness and service differentiation in accordance with priority order and that applies the different thresholds in received power considering different QoS requirements such as different bit error rates (BER) when adopting total received power as the ceil load estimation. The proposed QCAC calculates the different thresholds of the different traffic types based on different required BER applies it for admission policy, and can get service fairness and differentiation in terms of call dropping probability as a main performance metric. The QCAC is aware of the QoS requirement per traffic type and allows admission discrimination according to traffic types in order to minimize the probability of QoS violation. Also the CAC needs to consider the resource allocation schemes such as complete sharing (CS), complete partitioning (CP), and priority sharing(PS) in order to provide fairness and service differentiation among traffic types. Among them, PS is closely related with the proposed QCAC having differently calculated threshold per each traffic type according to traffic priority orders.