• Title/Summary/Keyword: 검증서버

Search Result 787, Processing Time 0.032 seconds

Generator of Dynamic User Profiles Based on Web Usage Mining (웹 사용 정보 마이닝 기반의 동적 사용자 프로파일 생성)

  • An, Kye-Sun;Go, Se-Jin;Jiong, Jun;Rhee, Phill-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.9B no.4
    • /
    • pp.389-390
    • /
    • 2002
  • It is important that acquire information about if customer has some habit in electronic commerce application of internet base that led in recommendation service for customer in dynamic web contents supply. Collaborative filtering that has been used as a standard approach to Web personalization can not get rapidly user's preference change due to static user profiles and has shortcomings such as reliance on user ratings, lack of scalability, and poor performance in the high-dimensional data. In order to overcome this drawbacks, Web usage mining has been prevalent. Web usage mining is a technique that discovers patterns from We usage data logged to server. Specially. a technique that discovers Web usage patterns and clusters patterns is used. However, the discovery of patterns using Afriori algorithm creates many useless patterns. In this paper, the enhanced method for the construction of dynamic user profiles using validated Web usage patterns is proposed. First, to discover patterns Apriori is used and in order to create clusters for user profiles, ARHP algorithm is chosen. Before creating clusters using discovered patterns, validation that removes useless patterns by Dempster-Shafer theory is performed. And user profiles are created dynamically based on current user sessions for Web personalization.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.

미용실의 서비스 품질과 소비자 만족에 관한 연구

  • 황선아;황선진
    • Proceedings of the Korea Society of Costume Conference
    • /
    • 2001.04a
    • /
    • pp.44-45
    • /
    • 2001
  • 다양해지는 소비자들의 패션에 대한 개성적 표현 욕구에 따라 우리나라 미용산업은 헤어, 메이크업과 피부미용, 네일케어 분야로 전문화.세분화되면서 토탈 패션산업의 주요영역으로 성장하고 있다. 이러 한 토탈 패션의 등장으로 미용서비스에 대한 수요증가로 양적으로는 상당히 그 규모가 증가했음에도 불구하고, 서버스 품질에 대해서는 고객들에게 확실한 신뢰를 주지 못하고 있다. 이는 국내 미용업계가 미용서비스 제공자의 관점에서 일방적인 서비스를 창출하여 왔고, 고객이 바라는 서비스의 내용과 품질을 제대로 파악하지 못하고 있다는 사실을 의미하고 있다. 따라서, 본 연구는 미용실의 서비스품질의 구성 요인을 확인하고. 미용실의 서비스품질과 소비자 만 족과의 관계를 알아보는 것을 목적으로 한다. 이를 위한 본 연구의 연구문제는 다음과 같다. 첫째, 미용실의 서비스 품질을 결정하는 요인에는 어떠한 것이 있는가\ulcorner 둘째, 미용실의 서비스 품질 중 소비자 만족과 관련하여 상대적으로 중요한 서비스 품질 결정요인은 무엇인가\ulcorner 본 연구를 위한 예비조사에서는 개방형 질문(open-ended question)을 실시하였다. 예비조사결과 프랜차이즈 미용실, 시내중심가 미용실 그리고 집.직장 근처 미용실의 3가지 유형의 미용실은 그 규모나 소비 자 인식이 상이하여 미용실의 서비스품질 차원을 연구하는데 유용한 것으로 나타났다. 본조사에서는 설문지법을 이용하였으며, 그 대상은 서울 지역의 3가지 유형의 미용실을 이용하는 고객들중 2 20-30대의 주요 고객층으로 정하였고 편의 표집하였다. 분석방법으로는 신뢰도 검증을 위해서는 Cronbach's 외 alpha값을 활용하였고, 미용실의 서비스품질 차원의 개념 타당성을 알아보기 위하여 LISREL을 이용한 확인 적 요인분석(confirmatory factor analysis)을 실시하였다. 또한 미용실의 유형에 따른 서비스 품질의 차이를 알아보기 위해서 일원변량분석(one-way ANDV A)을 실시하였으며, 서비스품질 속성들 중 소비자 만족을 결정하는 요인들을 알아보기 위해서 다중 회귀분석(multiple regression analysis)을 실시하였다. 본 연구의 결과들을 요약하면 다음과 같다. 첫째, 미용실의 서비스 품질을 결정하는 요인으로 는 물리적 서비스(유형성, 접근성, 청결성), 판매원 관련 서비스(감정배려, 능력), 정책관련 서비스(점포운영, 명성, 신용카드) , 미용기술관련 서비스로 나타났다. 둘째, 미용실의 서비스 품질을 결정하는 요인들에 있어서 점포 유형간의 차이를 분석한 결과 전체적으로 응답자들은 프랜차이즈 미용실의 서버스 품질에 가장 만족했으며, 시내중심가 미용실과 집근처 미용 실 순으로 나타났다. 셋째, 미용실의 소비자 만족을 예측하는데 유의한 서비스 품질 결정 요일을 살펴보면, 프랜차이즈 미용 실은 청결성($\beta$ =.30), 감정배려($\beta$ =.54), 명성($\beta$ =.60), 미용기술관련 서비스 차원($\beta$ =.68)이 결정 요인으로 나타났다. 시내중심가 미용실은 청결성($\beta$ =.39), 직원의 능력($\beta$ =.49), 명성($\beta$ =.59), 미용기술관련 서비스 차원($\beta$ =.68)가 서비스 결정 요인이었고, 집근처 미용실은 청결성($\beta$ =.27), 감정배려 ($\beta$ =.57), 명성($\beta$ =.73), 미용기술관련 서비스 차원 ($\beta$ =.60)으로 나타났다. 이것으로 미용실의 소비자 만족을 예측하는데 유의한 서비스 품질 결정 요인은 청결성, 감정배려, 명성, 상품관련 서비스임을 알 수 있다. 본 연구의 방법론적 의미는 그 동안 개발된 소매점이나 패션점포의 서비스 품질에 대한 평기척도를 우리나라 미용실에 적용해 봄으로써 미용실의 특성인 유행성, 청결성, 미용실의 명성, 직원과의 친분 등을 포함한 미용실의 서비스 품질 차원과 그 신뢰성 과 유용성을 입증하였다는데 그 의미가 있다. 또한 본 연구의 결과는 미용실 서비스에 대한 소비자들의 인식과 각 미용실의 유형에 따른 소비자 만족을 예측하는데 중요한 서비스 품질 결정 요인들을 통해서 좀 더 나은 미용서비스를 정착시키는데 필요한 전략 을 수립할 수 있다는데 실질적 의미를 지닌다.

  • PDF

An Implementation of Bandwidth Broker Based on COPS for Resource Management in Diffserv Network (차별화 서비스 망에서 COPS 기반 대역 브로커 설계 및 구현)

  • 한태만;김동원;정유현;이준화;김상하
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.518-531
    • /
    • 2004
  • This paper discusses a testbed architecture for implementing scalable service differentiation in the Internet. The differentiated services (DiffServ) testbed architecture is based on a model in which a bandwidth broker (BB) can control network resources, and the ALTQ can reserve resources in a router to guarantee a Quality of Service (QoS) for incoming traffic to the testbed. The reservation and releasemessage for the ALTQ is contingent upon a decision message in the BE. The BB has all the information in advance, which is required for a decision message, in the form of PIB. A signaling protocol between the BB and the routers is the COPS protocol proposed at the IETF. In terms of service differentiation, a user should make an SLA in advance, and reserve required bandwidth through an RAR procedure. The SLA and RAR message between a user and the BB has implemented with the COPS extension which was used between a router and the BB. We evaluates the service differentiation for the video streaming in that the EF class traffic shows superb performance than the BE class traffic where is a network congestion. We also present the differentiated service showing a better packet receiving rate, low packet loss, and low delay for the EF class video service.

  • PDF

Implementation of UDP-Tunneling Based Multicast Connectivity Solution for Multi-Party Collaborative Environments (다자간 협업 환경을 위한 UDP 터널링 기반의 멀티캐스트 연결성 솔루션의 구현)

  • Kim, Nam-Gon;Kim, Jong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.3
    • /
    • pp.153-164
    • /
    • 2007
  • The Access Grid (AG) provides collaboration environments over the IP multicast networks by enabling efficient exchange of multimedia contents among remote users; however, since lots of current networks are still multicast-disabled, it is not easy to deploy this multicast-based multi-party AG. For this problem, the AG provides multicast bridges as a solution by putting a relay server into the multicast networks. Multicast-disabled clients make UDP connections with this relay server and receive forwarded multicast traffics in unicast UDP packets. This solution is facing several limitations since it requires duplicate forwarding of the same packet for each unicast peer. Thus, in this paper, we propose an alternate solution for the multicast connectivity problem of the AG based on the UMTP (UDP multicast tunneling protocol). By taking advantage of flexibilities of UMTP, the proposed solution is designed to improve the efficiency of network and system utilization, to allow reuse of multicast-based AG applications without modification, and to partially address the NAT/firewall traversal issues. To verify the feasibility of proposed solution, we have implemented a prototype AG connectivity tool based on the UMTP, named as the AG Connector.

Design and Implementation of Centralized TIS-B Server for Broadcasting Air Traffic Situation (항공 교통 상황 방송 서비스를 위한 중앙 집중형 TIS-B 서버 설계 및 구현)

  • Song, Inseong;Jang, Eunmee;Choi, Sangbang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.27-39
    • /
    • 2015
  • As a radar based air surveillance hits the limit along with the growing air traffic needs, a new air surveillance technology called ADS-B has emerged. ADS-B provides more accurate position information with a shorter interval, and aircraft equipped with ADS-B transponders can check each other's location. However not all aircraft are equipped with ADS-B transponders, and aircraft with different ADS-B data links cannot check each other's location. To address these problems a TIS-B service, which broadcasts information that a radar is tracking, and an ADS-R service, which cross-broadcasts information of different ADS-B data links, have been emerged. In this paper, we design and implement a centralized TIS-B server for broadcasting air traffic situation which is capable of providing a TIS-B service and an ADS-R service at the same time. The implemented TIS-B server has been verified with a configured ADS-B ground system, by receiving ADS-B surveillance data and radar surveillance data followed by generating surveillance data for providing a TIS-B service and an ADS-R service and simulating broadcast of those generated surveillance data.

Extending a WebDAV Protocol to Efficiently Support the Management of User Properties (사용자 속성 관리의 효율적 지원을 위한 WebDAV 프로토콜의 확장)

  • Jung Hye-Young;Kim Dong-Ho;Ahn Geon-Tae;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1057-1066
    • /
    • 2005
  • WebDAV(Web-based Distributed Authoring and Versioning), a protocol which supports web-based distributed authoring and versioning, provides a standard infrastructure for asynchronous collaboration on various contents through the Internet. A WebDAV property management is a function to set and manage the main information of the resources as properties, and a user property, one kind of the WebDAV properties, has the ability to be freely defined by users. This free definition of user property makes it very useful to develop web-based applications like a collaboration system based on WebDAV However, with an existing WebDAV property management scheme, there is a limit to develop various applications. This paper describes a DavUP(WebDAV User property design Protocol) protocol which extended the original WebDAV and its uti-lization which efficiently supports management of WebDAV user properties. DavUP needs the definition of the collection structure and type definition properties for an application. To do this, we added a new header md appropriated WebDAV method functions to the WebDAV protocol. To show the usefulness of DavUP protocols, we extended our DAVinci WebDAV server to support DavUP Protocols and experimentally implemented a general Open Workspace, which provides effective functions to share and exchange open data among general users, on the DAVinci.

Development of User Music Recognition System For Online Music Management Service (온라인 음악 관리 서비스를 위한 사용자 음원 인식 시스템 개발)

  • Sung, Bo-Kyung;Ko, Il-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.91-99
    • /
    • 2010
  • Recently, recognizing user resource for personalized service has been needed in digital content service fields. Especially, to analyze user taste, recommend music and service music related information need recognition of user music file in case of online music service. Music related information service is offered through recognizing user music based on tag information. Recognition error has grown by weak points like changing and removing of tag information. Techniques of content based user music recognition with music signal itself are researched for solving upper problems. In this paper, we propose user music recognition on the internet by extracted feature from music signal. Features are extracted after suitable preprocessing for structure of content based user music recognition. Recognizing on music server consist of feature form are progressed with extracted feature. Through this, user music can be recognized independently of tag data. 600 music was collected and converted to each 5 music qualities for proving of proposed recognition. Converted 3000 experiment music on this method is used for recognition experiment on music server including 300,000 music. Average of recognition ratio was 85%. Weak points of tag based music recognition were overcome through proposed content based music recognition. Recognition performance of proposed method show a possibility that can be adapt to online music service in practice.

To Manage Use-Data of Nation-wide Transportation Card, Interoperable Traffic Information Collection System Development (전국호환 교통카드 이용정보의 유통관리를 위한 호환 교통정보집계시스템 구축)

  • Han, Ho-Hyeorn;Lee, Ki-Han;Kim, Hye-Hyeon;Kim, Tae-Hee;Maeng, Jae-Hwan;Park, Ha-Na
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.1-12
    • /
    • 2010
  • The existing survey of the actual use relevant transportation, implemented in order to reflect transportation policy, has been performed for users by researcher directly, or thereby analysing the data of particular date-oriented of transportation card business's content so that such method have many problems. To solve such problem, we developed a new system, Interoperable Traffic Information Collection System which include several functions of effective collecting of transportation use-data created from the Nation-wide Interoperable Transportation System, accurate counting and easy inquiry. This system consists of Link-server to collect and count for transportation use-data, DB-server to store for this data and Inquiry terminal to search for the information needed. To verify for developed this system, we run test-bed by connection between this system and the Nation-wide Interoperable Transportation System developed by the KOREA Financial Telecommunications & Clearings, the KORAIL NETWORKS and the HiPlusCard. And through result of test-bed, we proved that Interoperable Traffic Information Collection System practically works well. Thus we can look for systematic reflect of reliable information.

User Integrated Authentication System using EID in Blockchain Environment (블록체인 환경에서 EID를 이용한 사용자 통합 인증 시스템)

  • Kim, Jai-Yong;Jung, Yong-Hoon;Jun, Moon-Seog;Lee, Sang-Beon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.24-31
    • /
    • 2020
  • Centralized systems in computing environments have various problems, such as privacy infringement due to hacking, and the possibility of privacy violations in case of system failure. Blockchain, one of the core technologies for the next generation of converged information, is expected to be an alternative to the existing centralized system, which has had various problems. This paper proposes a blockchain-based user authentication system that can identify users using EID in an online environment. Existing identification (ID)/password (PW) authentication methods require users to store personal information in multiple sites, and receive and use their respective IDs. However, the proposed system can be used without users signing up at various sites after the issuing of an EID. The proposed system issues an EID with a minimum of information, such as an e-mail address and a telephone number. By comparing the stability and efficiency of a centralized system, the proposed integrated authentication system proved to be excellent. In order to compare stability against existing systems, we chose attack methods and encroachments on the computing environment. To verify efficiency, the total throughput between the user's app, the issuance and certification-authority's servers, and the service provider's servers was compared and analyzed based on processing time per transaction.