• Title/Summary/Keyword: Data Provider

Search Result 751, Processing Time 0.029 seconds

UNDERSTANDING SERVICE QUALITY: A MULTIDIMENSIONAL SCALING APPROACH

  • Lee Dongwon;Kim Youn Sung
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2004.04a
    • /
    • pp.639-645
    • /
    • 2004
  • This paper purports to uncover the underlying attributes used by customers to gauge service quality. Data was collected by administering questionnaires to 50 respondents and then analyzed by using Multidimensional Scaling methodology. The findings indicate that there are two primary dimensions to service quality. A considerable analysis helped determine two alternatives to naming the dimensions: Experience properties of service and Price value of the service, or Responsiveness of service provider employees and Reliability of service providers.

  • PDF

POI Recommender System based on Folksonomy Using Mashup (매쉬업을 이용한 폭소노미 기반 POI 추천 시스템)

  • Lee, Dong Kyun;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.13-20
    • /
    • 2009
  • The most of navigation services these days, are designed in order to just provide a shortest path from current position to destination for a user. Several navigation services provides not only the path but some fragmentary information about its point, but, the data tends to be highly restricted because it's quality and quantity totally depends on service provider's providing policy. In this paper, we describe the folksonomy POI(Point of interest) recommender system using mashup in order to provide the information that is more useful to the user. The POI recommender system mashes-up the user's folksonomy data that stacked by user with using external folksonomy service(like Flickr) with others' in order to provide more useful information for the user. POI recommender system recommends others' tag data that is evaluated with the user folksonomy similarity. Using folksonomy mahup makes the services can provide more information that is applied the users' karma. By this, we show how to deal with the data's restrictions of quality and quantity.

An Indexing Method to Prevent Attacks based on Frequency in Database as a Service (서비스로의 데이터베이스에서 빈도수 기반의 추론공격 방지를 위한 인덱싱 기법)

  • Jung, Kang-Soo;Park, Seog
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.878-882
    • /
    • 2010
  • DaaS model that surrogates their data has a problem of privacy leakage by service provider. In this paper, we analyze inference attack that can occur on encrypted data that consist of multiple column through index, and we suggest b-anonymity to protect data against inference attack. We use R+-tree technique to minimize false-positive that can happen when we use an index for efficiency of data processing.

Web Hydrographic Service Based on Electronic Navigational Chart (ENC)

  • Lee Eunkyu;Kim Mi-Jeong;Kim Minsoo
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.229-232
    • /
    • 2004
  • This paper developed a web service system providing hydrographic information encoded by GML rules. In order to achieve the goal, every data included in an ENC, which is following the rules of the S-57 and S-52 from the IHO, is transformed into a data structure form of OLE/COM from the OOC. In the system, hydrographic information can be provided through a data provider, and then it can be encoded into GML format for web services. This paper also implemented a web client that requests hydrographic information to the server and renders result data which is a GML format following the rules of S-57.

  • PDF

Instant Messenger System Design for Effective Collaboration of Statistical Data Collection

  • Park, Hee-Chang;Cho, Kwang-Hyun
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2004.04a
    • /
    • pp.211-224
    • /
    • 2004
  • Distributing information on the internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information, but instant messengers are gaining popularity abroad and domestically because of their immediate responses. Instant messaging has become the fastest growing communication technology in recent years. Instant messaging is effectively a chat room for two people. Users that have accounts with the same provider are able to send messages via computer in real time. Instant messaging has exploded into the business world as companies now utilize the technology for everything from interoffice communication to client/customer communication. In this paper, we propose a method of instant messenger system design for effective collaboration of statistical data collection.

  • PDF

An efficient matching mechanism for real-time sensor data dissemination (실시간 센서 데이터 배포를 위한 효율적 매칭)

  • Seok, Bo-Hyun;Lee, Pill-Woo;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.79-90
    • /
    • 2008
  • In the ubiquitous environment sensor network technologies have advanced for collecting information of the environment. With the rapid growth of sensor network technology, it is necessary and important to share the collected sensor data with a large base of diverse users. In order to provide dissemination of sensor data, we design an information dissemination system using an independent disseminator between provider and consumer. This paper describes how we designed the information dissemination system using one of the possible dissemination patterns for sensor networks, and an efficient matching algorithm called CGIM (Classed Grouping Index Matching) which employs a dynamic re-grouping scheme.

  • PDF

The Effect of Dating on the Psychological Well-Being of Elderly Koreans: Focusing on the Single Elderly (노인의 이성교제가 심리적 복지감에 미치는 영향 -이성교제를 하는 홀로된 노인을 대상으로 -)

  • 이예종;장진경
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.7
    • /
    • pp.141-156
    • /
    • 2002
  • The purpose of this study was to examine the dating of the elderly, focusing on the necessity of dating, intimacies with a data, and difficulties on the process of dating, and to explore the effect of those variables on the psychological well- being of the elderly. The data were collected from 162 elderly who were more than 60 year ages, currently data with oppoaite sex, lived in Seoul. The major findings from this study were as follows; (1) The necessity of dating showed a significant difference in their age, religion, health, family closeness. (2)The intimacies with a data showed a significant difference in their econmic provider. (3) The difficulties on the process of dating showed a significant difference in their gender, age, health, the eldest son who live together. (4) The psychological well-being of the elderly showed a significant difference in the intimacies with opposite-sex friend, family closeness, residing with the couple of the eldest son, health, use of social education /welfare service, and erligon.

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

A Study of Integrating ASP Databases with Customer Databases (ASP 용의 데이터베이스와 고객 데이터베이스 연동에 관한 연구)

  • Kim, Ho-Yoon;Lee, Jae-Won
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1063-1072
    • /
    • 2004
  • In the ASP(Application Service Provider) business, applications using database sometimes require some data from clients' databases. These days such data are extracted from client database using manual database operations as an EXCEL file and the ASP, once receiving this file, transfers it into the application's database using manual database operations. This paper describes how to deal with data transmitting between the client database and ASP database on the web without using database manual operations for data extraction and insertion. We propose a framework which enables to transmit client data in a systematical way, to match different attribute names of each database for sharing same attribute values, and to avoid exposing information about the network path of client database to the ASP. This approach consists of two steps of data processing. The first is extracting data from client database as XML format by using a downloaded client program from ASP site, the second is uploading and storing the XML file into the ASP database. The implemented prototype system shows the suggested data integration paradigm is valid and ASP business needing integration of client database can be activated using it.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.