• Title/Summary/Keyword: user groups

Search Result 865, Processing Time 0.029 seconds

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

A Study on Time in Architecture of Cedric Price (세드릭 프라이스 건축에 나타나는 시간 개념에 대한 연구)

  • Kim, Jung Soo
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.10
    • /
    • pp.107-118
    • /
    • 2018
  • Cedric price is an architect and educator who have had an influence on architectural thinking through teaching and projects, rather than completed buildings. The purpose of this study was to analyze the architecture of Cedric Price in terms of time. Time was an important factor to understand his architecture along with his interest in technology, so most of his architectural thinking and methodology - anti-architecture, programmatic indeterminacy, a philosophy of enabling and so on, could be explained under the consideration of time. Depending on how he considered and used the concept of time, his projects could be categorized into two groups; The first group was related to the change over time, and this group again divided into three sub categories; change of user's preference, change of external environment, and change over building lifetime. The second group was related to planning of time, which could be divided again into two categories; programmatic planning and the usage planning during the period. This categorization could provide a frame to look into his architecture, through which his projects showed the limitation in modern architecture and the possibility for contemporary architecture.

A Group Key Management Architecture in Mobile Network Environments (이동네트워크 환경에서의 그룹키 관리구조)

  • 박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.89-100
    • /
    • 2002
  • In this paper, we propose a group key management architecture for the secure group communications in mobile netwowrks and authenticated key agreement protocol for this system. Most of existing group key management schemes un certificates based on the public key for the purpose of user authentication and key agreement in secure fashion however, we use the ICPK(Implicitly Certified Public key) to reduce the bandwidth for a certificate exchanging and to improve a computational efficiency. In this architecture, we use two-tier approach to deal with key management where the whole group is divided into two parts; the first is a cell groups consisted of mobile hosts and another is a control group consisted of cell group managers. This approach can provide flexibility of key management such that the affection for a membership change is locally restricted to the cell group which is an autonomous area of the CGM(Cell Group Manager).

Study on Real-Time Monitoring Platform for Countermeasures for Heatwave (폭염재난 대응 실시간 관제 플랫폼에 관한 연구)

  • Jung, Kang Hee;Kwak, Chang Hyeok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.113-118
    • /
    • 2022
  • Global warming has also increased the number of casualties caused by heat-related diseases caused by heat waves along with an increase in global temperature. The vulnerable groups from heat wave damage are outdoor workers and the elderly in particular, and it is necessary to respond the increasing heat wave damage. We propose a real-time control platform in order to reduce casualties of the vulnerable group from heatwaves, this research collects and analyzes user's vital signs data from wearable devices that generates alarms out of the suspected victims who are expected to be affected by heat-related illness and to respond quickly.

The Role of Wearable Devices for the Success of the Healthcare Business: Verification from PRISMA Approach

  • KIM, Ji-Hye;KANG, Eungoo
    • The Journal of Economics, Marketing and Management
    • /
    • v.10 no.4
    • /
    • pp.13-24
    • /
    • 2022
  • Purpose: Although numerous research has covered content on trends in the adoption and use of wearable devices, their uses across several sectors such as healthcare, gaming, and fashion, there seems to be a considerable paucity with regard to empirical research focusing on the solutions for factors that undermine the effectiveness of wearable devices in healthcare. The present research aims to highlight what has been covered on wearable devices in healthcare while highlighting the limitations for future research. Research design, data, and methodology -The present authors conducted one of the most famous qualitative literature approach which has been called as PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analysis) statement. The selecting criteria for eligible prior studies was estimated by whether studies are suitable for the current research, identifying they are peer-reviewed and issued by notable publishers between 2017 and 2022. Result - Our results indicated that (1) Increasing the Affordability and User Education on Wearable Devices in Healthcare (2) Tackling the Technological Issues in Wearable Devices to Promote Healthcare Delivery (3) Solving Security and Privacy Issues Associated with Wearable Devices (4) Promoting Standards and Appropriate Regulations for Wearable Devices. Conclusion - To add, resolving the technological issues associated with wearable devices in healthcare will ensure that the new devices in the market will have longer battery life, multiple functions, and enhanced accuracy, thus ensuring that patients receive better care. Necessary interventions are taken on time to avoid any deleterious consequences such as proliferating mortality rates among the different patient groups.

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.212-222
    • /
    • 2022
  • There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.

An Application of TAM and TRI on the Factors Affecting Internet Banking Adoption in Bangladesh

  • AMIN, Md. Iftekharul;ERFAN, Nafis;NAVID, Mashrur;KHAN, Mohammed Shafiul Alam;ISLAM, Md. Shariful
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.9
    • /
    • pp.75-91
    • /
    • 2022
  • This study assesses the Internet banking adoption tendency by existing bank customers of Bangladesh. Currently, almost all the leading banks in the country have implemented Internet banking platforms. However, the active user count remains relatively low and there hasn't been any conclusive research on the drivers and inhibitors of Internet banking. This study evaluates the reasons and quantitatively establishes the factors leading to the adoption and usage continuance of internet banking by existing bank customers. Responses from 460 bank account holders were collected via online questionnaires using a purposive sampling approach, and a core conceptual framework based on Technology Acceptance Model (TAM) and Technology Readiness Index (TRI) was used. The study concluded that internet banking adoption is significantly impacted by the ease of use, customer service, and technology familiarity. Similarly, customer satisfaction is affected by the perceived value and the perceived risk. Through regression analysis, it was found that usage continuance is 89% explained by adoption and customer satisfaction. Multi-group moderation showed significant impact by groups divided based on usage frequency, income level, and age. Perceived risk weakened the impact of perceived value and technology familiarity on usage adoption. Additionally, perceived risk reduced the impact of consumer satisfaction and usage continuance.

Analyzing Adult Male Hand Shape for the Development of Work Gloves (작업용 장갑 개발을 위한 성인 남성 손 형태 분석)

  • Sujoung Cha
    • Journal of Fashion Business
    • /
    • v.27 no.4
    • /
    • pp.21-37
    • /
    • 2023
  • This study aimed to classify the hand types of adult males aged 20 to 69 years using three-dimensional measurement data from the 2020 8th Korean Anthropometric Survey, the latest measurement data from the National Institute of Standards and Technology Size Korea, and explore the characteristics of each type. Through this, I aimed to draw implications for the development of work gloves. The factors that make up an adult male's hand were categorized into hand and finger thickness factors, palm length factors, and finger length factors. Adult male hands were categorized into four types: small, thin hands and long fingers; thick, long fingers; medium, short hands and fingers; and large, thin, short fingers. The analysis showed that the younger the age, the more slender and long the hands and fingers, and as age increased, hands and fingers became shorter and thicker. Implications for the development of work gloves included the need for size segmentation based on the age of the work glove user, changes in the way glove dimensions are set based on hand length and hand circumference, and the need to segment gloves by the type of work. Hand typing in future research should be done according to occupational groups, and glove patterns should be developed for each type of work based on the results of this study.

TECHNICAL PROPOSAL BASED COST REDUCTION BIDDING SYSTEM FOR SUPPLYING AFFODABLE HOUSING

  • Seunghee Kang;Jeongseok Lee;Gunhee Cho;Jeongrak Sohn;Jongdae Bang
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1433-1439
    • /
    • 2009
  • Best value is the ultimate goal of the owner and can thus have diverse meanings according to the project characteristic, owner's purpose, user groups' payment capability, etc.. Recently, resettlement problems of the marginalized members in the urban regeneration area have been issued in Korea because they have no capability to purchase (or lease) redeveloped housing (or apartment). It means that a minimized production cost for reducing supply price of housing is a key factor in establishing the best value of the marginalized members. The lowest-price bidding system serves the purpose of ensuring a minimized production cost, but due to the low-cost investments, it creates various problems, such as sloppy construction, lowered quality, an increased LCC, and worsening profitability for builders. Thus, to help them resettle, it is necessary to supply affordable housing geared towards a certain appropriate quality and minimum construction costs. Towards this end, this study aimed to propose a cost reduction bidding system based on a technical proposal. The proposed technical-proposal-based cost reduction bidding system consists of the following components: work-unit-based, project-unit-based, and construction-period-reducing technical proposals. These components are evaluated to select the best bidder for a given project. The technical proposal based cost reduction bidding system proposed herein is expected to provide facilities with appropriate supply prices and appropriate quality levels, to bolster the technological competitiveness of builders.

  • PDF

A Study on Farmers' Acceptance Intention of Agrophotovoltaics - Focusing on the Extended Unified Theory of Acceptance and Use of Technology 2 - (농업인의 영농형 태양광 수용의도에 관한 연구 - 확장된 통합기술수용이론(UTAUT2)을 중심으로 -)

  • Won-Bin Kim;Ju-Young An;Geun-Ho Shim;Ji-Bum Um
    • Journal of Agricultural Extension & Community Development
    • /
    • v.30 no.1
    • /
    • pp.15-29
    • /
    • 2023
  • Recently, there has been increasing interest in renewable energy in the agricultural sector. Agrophotovoltaics, producing electricity while farming, has attracted much attention. This study aims to identify the factors influencing the acceptance intention of Agrophotovoltaics. Using the UTAUT2 model, we designed a research model to examine the impact of performance expectancy, effort expectancy, facilitating conditions, social influence, and investment utility on the intention to adopt Agrophotovoltaics through the mediation effect of the user's innovativeness. We conducted a survey on farmers and obtained 212 responses for the final analysis. The results showed that effort expectancy and innovativeness significantly positively affected the intention to adopt Agrophotovoltaics. Furthermore, innovativeness was found to fully mediate the relationship among performance expectancy, facilitating conditions, investment utility, and acceptance intention. This suggests that focusing supportive measures on innovative groups could promote the adoption of Agrophotovoltaics.