• Title/Summary/Keyword: By Attribute

Search Result 2,097, Processing Time 0.033 seconds

A Study on the Preference Analysis of Stmartphone's Functional Attribute (스마트폰의 기능적 속성의 선호도 분석에 관한 연구)

  • Jeong, Sun-Seok
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2011.11a
    • /
    • pp.695-716
    • /
    • 2011
  • In the future, smartphone convergences are not only based on the on/offline integration, but also with the integration between mobile communications and broadcasts. Therefore, there is a need to search for new direction of mobile device that enables variety user applications that are different from the existing size and application issue. The aim of this reserch is to improve user interface of smartphone's functional attribute. The survey results in this paper showed that the most preferable attribute of smartphone among the 8 was the wireless internet 25.3%, followed by messaging 20% and application 19.8%, which totaled to 62.5%. But the samples used were mostly limited to those aged 20 through 30. So the results are not considered as a representative preference of all smartphone users, and should be considered otherwise before materializing them to a product. Therefore, for the more liable results the further research should be conducted to gather data from a variety of users of all ages, and the functional attribute should be analysed through QFD.

  • PDF

Concept and Attribute based Answer Retrieval (개념 속성 기반 정보 검색)

  • Yun Bo-Hyun;Seo Chang-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.1-10
    • /
    • 2005
  • This paper presents the information retrieval system which can retrieve the most appropriate answer sentence for user queries by using the concept and the attribute for the knowledge retrieval. The system analyzes the user query into the Boolean queries with the concept and the attribute and then retrieve the relevant documents in the indexing set of answer documents. Users can retrieve the relevant answer sentences from the relevant documents. For this, the answer documents indexed by the concept and the attribute are segmented by each sentence respectively. Thus, the segmented sentences are analyzed into the concept and the attribute of which the relevance degree with indexing units of documents is evaluated. Then, the system indexes the location of answer sentences. In the experiment, we evaluate the performance of our answer retrieval system against 100 user queries and show the experimental results.

  • PDF

Calculating Attribute Values using Interval-valued Fuzzy Sets in Fuzzy Object-oriented Data Models (퍼지객체지향자료모형에서 구간값 퍼지집합을 이용한 속성값 계산)

  • Cho Sang-Yeop;Lee Jong-Chan
    • Journal of Internet Computing and Services
    • /
    • v.4 no.4
    • /
    • pp.45-51
    • /
    • 2003
  • In general, the values for attribute appearing in fuzzy object-oriented data models are represented by the fuzzy sets. If it can allow the attribute values in the fuzzy object-oriented data models to be represented by the interval-valued fuzzy sets, then it can allow the fuzzy object-oriented data models to represent the attribute values in more flexible manner. The attribute values of frames appearing in the inheritance structure of the fuzzy object-oriented data models are calculated by a prloritized conjunction operation using interval-valued fuzzy sets. This approach can be applied to knowledge and information processing in which degree of membership is represented as not the conventional fuzzy sets but the interval-valued fuzzy sets.

  • PDF

An Analysis of Consumer Preferences for Internet Medical Information Service in China Using the Multi-Attribute Utility Theory (다속성 효용이론을 활용한 중국시장에서의 인터넷 의료정보 서비스 선호속성 분석)

  • Kim, Kyoung-Hwan;Chang, Young-Il
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.93-107
    • /
    • 2009
  • This study investigated consumer preferences for Internet medical information service in China using the multi-attribute utility theory. The multi-attribute utility theory is a compositional approach for modeling consumer preferences wherein researchers calculate the overall service utility by summing up the evaluation results for each attribute. We found that Chinese Internet medical information users consider the availability of information and quick response to be the most important attributes. Further, they think that the comment feature is less important as compared to other attributes such as costs and updates. In addition, we found that the Internet users having more Internet experience consider these attributes to be more important as compared to the people who are just beginning to surf the Internet. For any successful Internet business, Internet marketers should assess individual-level preference and accordingly organize a fresh campaign. As of now, Internet marketers need estimation methods to predict the market performance of new services in many different business environments. We believe that the multi-attribute utility theory is a useful approach in this regard.

  • PDF

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Does Price Promotion Hurt Products' Perceived Quality? The Role of Attribute Alignability

  • CHAE, Myoung-Jin
    • The Journal of Economics, Marketing and Management
    • /
    • v.8 no.3
    • /
    • pp.9-21
    • /
    • 2020
  • Purpose: Previous literature shows that a price promotion serves as a negative cue of product quality especially when consumers have no additional information about the product's other attributes. In this research, we explore how the effect of price promotions on consumers' perceptions of product quality changes depending on their ability to compare promoted product attributes with competitive products' attributes. Research design, data and methodology: Specifically, we use a series of scenario-based lab experiments using different types of products and explore if attribute alignability among competing products in a consumer's choice set influences consumers' ability to compare the product attributes and perceived quality. Results: Our study findings show that high attribute alignability among products makes consumers easier to compare the product attributes and thereby focus more on non-price information than price information. We also show that attribute alignability serves as a moderator and decreases perceived quality when the promotion level is higher. Therefore, the attribute alignability weakens the negative impact of a price promotion on consumers' perceived product quality. Conclusions: Our study findings provide new insights on how to implement price promotion strategies while keeping products' perceived quality, by considering the product's relationships with competing products in a choice set.

Integrated Method for Knowledge Discovery in Databases

  • Hong Chung;Park, Kyoung-Oak;Chung, Hwan-Mook
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.122-127
    • /
    • 1998
  • This paper suggests an integrated method for discovering knowledge from a large database. Our approach applies an attribute-oriented concept hierarchy ascension technique to extract generalized data from actural data in databases, induction of decision trees to measure the value of information, and knowledge reduction of rough set theory to remove dispensable attributes and attribute values. The integrated algorithm first reduce the size of database for the concept generalization, reduces the number of attributes by way of elimination condition attributes which have little influence on decision attribute, and finally induces simplified decision rules removing the dispensable attribute values by analyzing the dependency relationships among the attributes.

  • PDF

Effects of Dining-out Motives and Attribute Evaluation of Restaurants on the Intention of Word of Mouth and Reusing (외식 동기와 레스토랑 속성 평가가 구전 및 재이용 의도에 미치는 영향)

  • Kim, Seog-Jun;Cho, Yong-Bum
    • Culinary science and hospitality research
    • /
    • v.12 no.3 s.30
    • /
    • pp.61-74
    • /
    • 2006
  • The objective of this study are to examine how the factors influence each other by determining the appropriate measurement standard based on the Dining-out Motives, restaurant attribute evaluation, intention of word of mouth and reusing, an effective restaurant marketing strategy on the basis of the analytical results by patrons and market segmentations. The study surveyed 321 subjects and processed the result using SPSS for Win. V. 12.1. For statistical analysis, Frequency, Factor Analysis, and Regression were put into operation. The results showed that dining-out motives and restaurant attribute evaluation had positive effects on the intention of word of mouth and reusing. Furthermore, the restaurant owners or managers will need to understand the existing market and target markets more objectively, and, through this market segmentation, formulate a marketing strategy that is appropriate for diverse desires of customers and different characteristics of restaurants.

  • PDF

A Method Enforcing Dependencies between ID Certificates and Attribute Certificates in Inter-domain (속성인증서와 신분인증서 사이의 바인딩 메카니즘에 관한 연구)

  • Park Chong-Hwa
    • The Journal of Information Technology
    • /
    • v.5 no.4
    • /
    • pp.81-88
    • /
    • 2002
  • An ID certificate is digitally signed by a certificate authority for authentication and a attribute certificate is digitally signed by an attribute certificate authority for authorization. In many applications in web, there should be a mechanism to bind attributes to proper identities. So we analyzed some known binding methods, selective revocation methods and cryptographic binding methods and we proposed the new mechanism in order to solve their problems.

  • PDF