• 제목/요약/키워드: Phone Number

검색결과 517건 처리시간 0.036초

Competing Risk Model for Mobile Phone Service (이동통신시장 서비스를 위한 경쟁위험모형)

  • Lee, Jae Kang;Sohn, So Young
    • Journal of Korean Institute of Industrial Engineers
    • /
    • 제32권2호
    • /
    • pp.120-125
    • /
    • 2006
  • Since Korean government has implemented the "Number Portability System" in the domestic mobile communications market, mobile communication companies have been striving to hold onto existing customers and at the same time to attract new customers. This paper presents a competing risk model that considers the characteristics of a customer in order to predict the customer's life under the "Number Portability System." Three competing risks considered are pricing policy, quality of communication, and usefulness of service. It was observed that the customers who pay more are less sensitive on pricing policy younger people are less sensitive than older people to the quality of communication and women are more sensitive than men to the degree of usefulness of service. We expect that the result of this study can be used as a guideline for effective management of mobile phone customers under the Number Portability System.

Literature Survey on Assessment Techniques for Korean Characters Entry Methods of Mobile Phones (이동전화 한글 입력 방식 평가 방법에 관한 문헌 조사)

  • Kee, Do-Hyung
    • Journal of the Ergonomics Society of Korea
    • /
    • 제26권2호
    • /
    • pp.15-20
    • /
    • 2007
  • The purpose of this study is to compare assessment techniques for Korean characters entry methods of mobile phones. This study was performed based on survey of relevant existing studies. The assessment techniques were classified into three: 1) predicting entry time using conceptual models such as Fitts' law, Hick-Hyman's law and KLM-GOMS model (conceptual model); 2) counting the number of pressing button(number of pressing button); and 3) measuring performance or rating subjective measures using real mobile phones(real mobile phone). The comparison revealed that the assessment results were different depending upon the techniques used. The results from the conceptual model using only Fitts' law and the number of pressing button were opposite to those from techniques of the real mobile phone and conceptual model using Fitts' and Hick-Hyman's laws. Based on this result and suggestions provided by the literature, it is recommended that for more precisely assessing interfaces of mobile phones such as Korean characters entry method, real mobile phones be used instead of the conceptual models.

Mobile Junk Message Filter Reflecting User Preference

  • Lee, Kyoung-Ju;Choi, Deok-Jai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권11호
    • /
    • pp.2849-2865
    • /
    • 2012
  • In order to block mobile junk messages automatically, many studies on spam filters have applied machine learning algorithms. Most previous research focused only on the accuracy rate of spam filters from the view point of the algorithm used, not on individual user's preferences. In terms of individual taste, the spam filters implemented on a mobile device have the advantage over spam filters on a network node, because it deals with only incoming messages on the users' phone and generates no additional traffic during the filtering process. However, a spam filter on a mobile phone has to consider the consumption of resources, because energy, memory and computing ability are limited. Moreover, as time passes an increasing number of feature words are likely to exhaust mobile resources. In this paper we propose a spam filter model distributed between a users' computer and smart phone. We expect the model to follow personal decision boundaries and use the uniform resources of smart phones. An authorized user's computer takes on the more complex and time consuming jobs, such as feature selection and training, while the smart phone performs only the minimum amount of work for filtering and utilizes the results of the information calculated on the desktop. Our experiments show that the accuracy of our method is more than 95% with Na$\ddot{i}$ve Bayes and Support Vector Machine, and our model that uses uniform memory does not affect other applications that run on the smart phone.

The Mobile Security Diagnostic System against Smart-phone Threat (스마트폰 악성코드 대응을 위한 모바일 보안 진단 시스템)

  • Cheon, Woo-Bong;Lee, Jung-Hee;Park, Won-Hyung;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권3호
    • /
    • pp.537-544
    • /
    • 2012
  • With wireless network infrastructure, the number of smart-phone users is remarkably increasing in the world and the amounts of damage due to the smart-phone malwares are also raised. Many security solutions for wireless network have come into the market but these solutions are for companies or large enterprises, therefore, the public users of smart-phone don't feel easy to select as their solutions and it is difficult to detect unknown malwares. In this paper, we propose the mobile security diagnostic system for public smart-phone users, which provides functions like smart-phone system check, comparison with blacklist of applications and collecting malwares.

A Study on the Perlormance Variations of the Mobile Phone Speaker Verification System According to the Various Background Speaker Properties (휴대폰음성을 이용한 화자인증시스템에서 배경화자에 따른 성능변화에 관한 연구)

  • Choi, Hong-Sub
    • Speech Sciences
    • /
    • 제12권3호
    • /
    • pp.105-114
    • /
    • 2005
  • It was verified that a speaker verification system improved its performances of EER by regularizing log likelihood ratio, using background speaker models. Recently the wireless mobile phones are becoming more dominant communication terminals than wired phones. So the need for building a speaker verification system on mobile phone is increasing abruptly. Therefore in this paper, we had some experiments to examine the performance of speaker verification based on mobile phone's voices. Especially we are focused on the performance variations in EER(Equal Error Rate) according to several background speaker's characteristics, such as selecting methods(MSC, MIX), number of background speakers, aging factor of speech database. For this, we constructed a speaker verification system that uses GMM(Gaussin Mixture Model) and found that the MIX method is generally superior to another method by about 1.0% EER. In aspect of number of background speakers, EER is decreasing in proportion to the background speakers populations. As the number is increasing as 6, 10 and 16, the EERs are recorded as 13.0%, 12.2%, and 11.6%. An unexpected results are happened in aging effects of the speech database on the performance. EERs are measured as 4%, 12% and 19% for each seasonally recorded databases from session 1 to session 3, respectively, where duration gap between sessions is set by 3 months. Although seasons speech database has 10 speakers and 10 sentences per each, which gives less statistical confidence to results, we confirmed that enrolled speaker models in speaker verification system should be regularly updated using the ongoing claimant's utterances.

  • PDF

A proposal of Circular Lock Pattern Method on Smart phone (원형 스마트폰 잠금 패턴 방식 제안)

  • Im, Ji-woo;Lee, Seung-jay;Jang, Won-jun;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제23권11호
    • /
    • pp.1471-1477
    • /
    • 2019
  • Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users' smart phones don't support biometric security. The most convenient security method for devices that don't support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It's expected to solve vulnerability.

A study on the correlation between sound characteristic and sasang constitution by pitch range and bandwisth (Pitch Range와 Bandwidth를 이용한 음성특성(音聲特性)과 사상체질간(四象體質間)의 상관성(相關性) 연구(硏究))

  • Yang, Sang-mook;Kim, Sun-hyung;Yoo, Jun-sang;Kim, Hyung-seok;Lee, Young-hoon;Kim, Dal-rae
    • Journal of Sasang Constitutional Medicine
    • /
    • 제13권3호
    • /
    • pp.31-39
    • /
    • 2001
  • Bandwidth and Pitch Range are very important in the area of distinguish of phone which is one of many areas of phonetics and distinguish the individual way of phone. So if each constitution has a trait in its phone, they are important to judge the constitutions. In this report we try to understand the relativity between constitutions and Formant Bandwidth, Pitch Range and the number of syllables in a minute which are important to distinguish the phone. And we try to make judging the constitutions objective. 1. We analyzed Formant Bandwidth and there are some differences between constitutions but it doesn't have any importance in the statistics. 2. We analyzed Pitch Range and there are some differences between constitutions but it doesn't have any importance in the statistics. 3. We analyzed the number of syllables in a minute and there are some differences between constitutions but it doesn't have any importance in the statistics. As mentioned above there are differences between constitutions in Formant Bandwidth, Pitch Range and the numbers of syllables in a minute, but they don't have any importance in the statistics. However if we increase the number of samples and remove noise, there will be great possibility to find some important meanings.

  • PDF

Study on the Context Awareness-based Real Estate Auction Information System under the Smart Phone Environment (스마트폰 환경에서 상황인식기반 경매매물 정보시스템에 대한 연구)

  • Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • 제12권4호
    • /
    • pp.585-592
    • /
    • 2011
  • Real Estate Auction Information System purposes on providing high quality information of auction customized to consumer's situation and preference. Especially, ever-changing real time information such as the number of hits and advanced analysis for expecting the winning bid are requiring of mobile information system based on context awareness. Therefore, this paper studies on Real Estate Auction Information System based on context awareness under a smart phone environment providing auction information such as consumer's current position, the number of hits to a specific real estate, and the number of bidder to anticipate the winning bid.

A study on the effect that customer's satisfaction comes up to Number Portability (고객의 만족도가 번호이동성제도에 미치는 영향에 대한연구)

  • Jung, Kyung-Hee;Cho, Jai-Rip
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 대한산업공학회/한국경영과학회 2004년도 춘계공동학술대회 논문집
    • /
    • pp.81-85
    • /
    • 2004
  • This study analyzes strategy and main contents between each business market by mobile phone Number Portability. And, grasps what each mobile company customer satisfaction factors is effected on mobile phone Number Portability and estimates relative importance about the factors and understand counter strategies by these factors. Concretely, this paper searched the important quality factor by frequency analysis, factor analysis, regression analysis and path analysis etc. And The sample data is subscriber using mobile communication service of the existing mobile communication company (SKT, KTF, LGT)

  • PDF

A Smart System for Customer Ordering Management at Offline Stores (오프라인 매장에서 고객 순번 관리를 위한 스마트 시스템)

  • Chung, Myoungbeom
    • Journal of Korea Multimedia Society
    • /
    • 제21권8호
    • /
    • pp.925-933
    • /
    • 2018
  • In this paper, we propose a new smart ordering application system for granting the customer numbers. The proposed system assigns sequence number of customers who visit at offline store as using speaker and microphone of smart device. This system has more advantage than the existing ordering system. Because the proposed system does not need any customer information like as phone number or SNS ID, it can protect customer privacy information. In this system, we use high frequency which is inaudible to the human ear as communication signal between speaker and microphone. To confirm performance evaluation, we perform a test with ten smart devices like as iPhone 6, 7, 8, Galaxy s8 and the result shown a success rate of 98.7 percent. Therefore, the proposed system can be useful service technology at the various offline store which need to assign a sequence number for customers, because many customers visit at the store.