• Title/Summary/Keyword: Number of Users

Search Result 3,054, Processing Time 0.032 seconds

Research on the Analysis and Response of Unauthorized Personal Information Collection in Foreign Applications (해외 애플리케이션의 개인정보 무단 수집 실태 분석과 대응 방안에 대한 연구)

  • Kim, Se-Hwan;Yun, Hyung-Jun;Jung, Da-Hyun;Jang, Seung-Hoon;Han, Cheol-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.453-462
    • /
    • 2021
  • The number of foreign applications available in Korea is increasing. Among them, there are many cases where applications having a large number of domestic users collect users' personal information in an unauthorized manner, causing serious problems. Unauthorized collection of personal information conducted through such applications is highly dangerous, because sensitive personal information of users can be used in a malicious way. Further, this is violation of business ethics and may interrupt the creation of the sound information technology ecosystem. This research is purposed to analyze the current status of unauthorized collection of users' personal information by foreign applications available in Korea and to derive countermeasures thereof.

User Selection Method of Subspace Interference Alignment in Multi-cell Uplink Systems (다중 셀 상향링크에서 부분공간 간섭 정렬의 사용자 선택 방법)

  • Seo, Jong-Pil;Kim, Hyun-Soo;Ahn, Jae-Jin;Chung, Jae-Hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3A
    • /
    • pp.238-244
    • /
    • 2010
  • We propose a user selection method in multi-cell multiuser uplink system with the subspace interference alignment to maintain the high sum-rate capacity. The proposed method selects users whose interference to adjacent cells are strong and apply the subspace interference alignment to the users. The proposed method provides that the number of users performing the interference alignment reduces and the high total sum-rate is maintained. Simulation results exhibit the proposed method reduces the number of users who would decompose the channel for the subspace interference alignment by 50% when the required sum-rate is 90% of the maximal achievable sum-rate.

The Post Occupancy Evaluation of the Universal Design Project on Geonjisan Forest Trail Jeonju City, South Korea (전주시 건지산 숲길 Universal Design 사업 이용후 평가)

  • Park, Sun-A;Lee, Myung-Woo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.40 no.6
    • /
    • pp.60-69
    • /
    • 2012
  • The project on Geonjisan Universal Design Forest Trail in Jeonju City was designed and constructed by an NGO called 'Jeonbuk Forest for Life' which was a winner for the '2008 Open Competition by the 'Committee for Greening Society' established in Korea Land Corporation. The purpose of this study is to evaluate the design satisfaction of UD forest trail. Post Occupancy Evaluation (POE) method was applied to measure the user satisfaction and the total number of users. The main result of the study were as follows: the major users of the Geonjisan UD forest trail were people aged over 60 years old(37%) and the main purpose of trail usage were to 'walk and rest'(51.5%) and to 'exercise and rehabilitation' (40.6%). Furthermore, the overall user rating for the UD forest trail design was "satisfied"(3.91 point in 5-point Likert Scale). The three most influencing factors of the overall user satisfaction were facility management, user conflict, and trail width and slope. About forty-five people were found to be End-user in the UD forest trail while six people were found as End-user in non-UD trails. Most importantly, the number of End-user observed on the UD forest trail was greater than the number found in non-UD forest trail. The result implies that the UD forest trail attracts more End-users and provides opportunity for gathering and interaction with the other users. Moreover, the satisfaction rate for the UD forest trail landscape is found to be high in Likert scale, which we can assume that the well-grown existing trees and topographic features as well as appropriately designed wood-paths influence the high satisfaction rate of the users. The POE of UD forest trail revealed the importance of universal design concept due to its convenient uses of the handicapped, old, weak, pregnant woman or children.

Effects of Beam Configuration on Performances of NOMA System for Millimeter Wave Channels

  • Wonkyu Kim;Thanh Ngoc Nguyen;Taehyun Jeon
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.59-65
    • /
    • 2024
  • Non-orthogonal multiple access (NOMA) is a technique that forms a NOMA group composed of two or more users and transmits the superimposed signals of all users in the group through a single beam. In case all users in a NOMA group fall within the main lobe, a high data rate is guaranteed. However, in case not all users in the group fall within the main lobe due to the narrow beam width, the sum data rate decreases, and the data rate disparity between users inside and outside the main lobe widens significantly, leading to reduced fairness. On the other hand, an excessively wide beam might reduce the channel gain which lowers the sum data rate. This paper discusses the effects of beam configuration on the throughput and fairness performances of the NOMA system in the millimeter wave channel environments with simulation results for various channel parameters including the number of antennas and beam directions.

A Study on the Determinants of the Visitor's Use Route Patterns in Urban Parks (都市公園 利用者의 動線類型 및 그 發生要因에 關한 硏究)

  • Kim, Dong-Chan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.18 no.3 s.39
    • /
    • pp.155-169
    • /
    • 1990
  • The main purpose of this study is to suggest fundamental materials and a guideline for design through grouping of the users' use route patterns and analyzing determinants to choose those route patterns in urban parks. Study sites were Jungang, Dlseong, and Beomeo park, where located Taegu city-Key results obtained through a series of investigation were as follows : When Users come in and out urban parks, most orientations of their use routes were counterclockwise, and not in such cases, greatly affected by facilities arrangement. There were a large number of users in the main route placed the principal facilities. Users' use route patterns were grouped by their characteristics, which were circulation, semi-circulation, irregular, and piston type. And all the types except piston type can be subdivided into spoon and loope type. Factors analysis to the types produced five meaningful patterns of variables. Five factors were named as dimension of characteristics : Park composition factor, facilities use factor, users' personal factor, park use behavioral factor, routes choice factor.

  • PDF

Design and Implementation of RSS feed search engine for Effective Contents Service (효과적인 콘텐츠 서비스를 위한 RSS피드 검색 엔진의 설계 및 구현)

  • Lee, Hae sung;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • In the Web 2.0, besides more gaining information on the web, the number of web sites that take advantage of RSS increases explosively. Commonly each users search RSS channels through the web search engine before registering RSS channel's url to the RSS reader. Users judge whether the site is RSS channel or not and register an RSS channel's url through theirs interests. Because accomplished by users themselves, those processes conflict to user's convenience and quick consumption of information. Techniques of current search engines can't provide users with reliable RSS feed information as search results. In this paper, we analysis appropriateness of current search engines' techniques that offer users RSS feed search service and discuss their limitations. Also, we make up RSS feed database through classification of RSS tag being possible to search RSS feed information effectively and apply update rate of each RSS channel's feed to ranking algorithm providing more reliable search results.

Prediction Method for the Implicit Interpersonal Trust Between Facebook Users (페이스북 사용자간 내재된 신뢰수준 예측 방법)

  • Song, Hee Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.177-191
    • /
    • 2013
  • Social network has been expected to increase the value of social capital through online user interactions which remove geographical boundary. However, online users in social networks face challenges of assessing whether the anonymous user and his/her providing information are reliable or not because of limited experiences with a small number of users. Therefore. it is vital to provide a successful trust model which builds and maintains a web of trust. This study aims to propose a prediction method for the interpersonal trust which measures the level of trust about information provider in Facebook. To develop the prediction method. we first investigated behavioral research for trust in social science and extracted 5 antecedents of trust : lenience, ability, steadiness, intimacy, and similarity. Then we measured the antecedents from the history of interactive behavior and built prediction models using the two decision trees and a computational model. We also applied the proposed method to predict interpersonal trust between Facebook users and evaluated the prediction accuracy. The predicted trust metric has dynamic feature which can be adjusted over time according to the interaction between two users.

User modeling based on fuzzy category and interest for web usage mining

  • Lee, Si-Hun;Lee, Jee-Hyong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.1
    • /
    • pp.88-93
    • /
    • 2005
  • Web usage mining is a research field for searching potentially useful and valuable information from web log file. Web log file is a simple list of pages that users refer. Therefore, it is not easy to analyze user's current interest field from web log file. This paper presents web usage mining method for finding users' current interest based on fuzzy categories. We consider not only how many times a user visits pages but also when he visits. We describe a user's current interest with a fuzzy interest degree to categories. Based on fuzzy categories and fuzzy interest degrees, we also propose a method to cluster users according to their interests for user modeling. For user clustering, we define a category vector space. Experiments show that our method properly reflects the time factor of users' web visiting as well as the users' visit number.

Performance Analysis of Group Recommendation Systems in TV Domains

  • Kim, Noo-Ri;Lee, Jee-Hyong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.45-52
    • /
    • 2015
  • Although researchers have proposed various recommendation systems, most recommendation approaches are for single users and there are only a small number of recommendation approaches for groups. However, TV programs or movies are most often viewed by groups rather than by single users. Most recommendation approaches for groups assume that single users' profiles are known and that group profiles consist of the single users' profiles. However, because it is difficult to obtain group profiles, researchers have only used synthetic or limited datasets. In this paper, we report on various group recommendation approaches to a real large-scale dataset in a TV domain, and evaluate the various group recommendation approaches. In addition, we provide some guidelines for group recommendation systems, focusing on home group users in a TV domain.

Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.1
    • /
    • pp.53-60
    • /
    • 2012
  • Attribute-based encryption (ABE) is an encryption scheme in which the user is able to decrypt a ciphertext with associated attributes. However, the scheme does not offer the capability of decryption to others when the user is offline. For this reason, the attribute-based proxy re-encryption (ABPRE) scheme was proposed, which combines traditional proxy re-encryption with ABE, so a user is able to empower designated users to decrypt the re-encrypted ciphertext with the associated attributes of designated users. However, previous ABPRE schemes demands a number of pairing operations that imply huge computational overhead. To reduce the number of pairing operations, we reduce the pairing operations with exponent operations. This paper provides a novel approach to an ABPRE scheme with constant pairing operation latency.