• Title/Summary/Keyword: User Experience Framework

Search Result 107, Processing Time 0.025 seconds

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

Satisfaction of Naturopathy Experience and Intention of Reuse (자연치유 체험자의 만족도와 재이용의도)

  • Kim, Choon-Gyum;Kim, Jong-Du
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.254-259
    • /
    • 2019
  • In this paper, we tried to present the basic framework so that we can conduct more systematic research on natural healing through fusion research, which combines the service marketing of natural healing field with the service marketing. This study investigated the user's satisfaction and intention to reuse natural and aesthetic experiences. People aged 20 to 50 across the country were given a range commonly known as "naturopathy," and the survey was conducted on those who experienced it. Analysis of data was performed using the SPSS 21.0 and AMOS 21.0 programs. Studies have shown that naturopathy experiences have a positive effect on customer satisfaction. After verifying the effect of the quality of naturopathy experience on customer satisfaction and reuse, it was found that customer satisfaction greatly affected customer satisfaction and customer satisfaction had a very high impact on the intention of reuse.

Applying the Theory of Affordance to the Design of Water Purification Facilities : Focusing on the Case of Binh Dinh in Vietnam (정수시설 설계에 대한 어포던스 이론 적용 연구: 베트남 빈딘 사례를 중심으로)

  • Park, Hye-Rin;Hwang, Yeo-Kyeong;Kim, Seul-Gi;Lee, Jun-Min;Hwang, Jun-Seok
    • Journal of Appropriate Technology
    • /
    • v.6 no.1
    • /
    • pp.28-36
    • /
    • 2020
  • Sustainable appropriate technology requires user-centered design with consideration of the political, cultural and environmental aspects of the area. However, in the preparation of appropriate technology, there is a limit to the prior grasp of the user's intention and experience leading to the actual behavior of the user after the dissemination. As a result, appropriate technologies are often inconvenient for practical use or used for other purposes, contrary to the designer's intention. This study analyzes the case of appropriate technology with an analysis framework that reflects Maier's affordance theory, and proposes a design solution that can overcome the limitations of existing design. Affordance theory is the theory of factors that cause the user to identify and use features through interpretation based on prior knowledge and experience about things. The analysis cases in this study are the interviews with the designers, management education materials, and manager interviews for water purification systems at three of six schools in Binh Dinh Province, Vietnam, from August 2015 to January 2018. The case was attempted to be improved by periodic installation, maintenance, and inspection, but similar problems continued to occur. First, the facility inspections and manager interviews are compared with manager training materials distributed at the time of installation to find inconsistencies. Next, we analyze the designer's intended affordance and the affordances that actually influenced the management behavior. And then, we propose design solutions based on commonly found problems and affordances. This study suggests that it is necessary to apply the design considering the user's behavior before distributing the appropriate technology, and this study will be precedent in the process of finding the improvement through the analysis framework based on the affordance.

Case of Service Design Process for Medical Space Focused on Users (사용자중심 의료공간을 위한 서비스디자인 프로세스의 적용사례)

  • Noh, Meekyung
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.21 no.4
    • /
    • pp.27-36
    • /
    • 2015
  • Purpose: Of late, the focus of service design is moving toward emphasizing customer satisfaction and taking users' experience more seriously. In addition to the change in perspective in service design, scholars in this area are paying more attention to service design methodology and process, as well as its theory and real-world case studies. In the case of medical space, there have been few studies in attempting to apply service design methods useful for deriving user-focused results. The author of this paper believes, however, case study-oriented approaches are more needed in this area rather than ones focusing on theoretical aspects. The author hopes thereby to expand the horizon to practical application of spatial design beyond service design methodology. Methods: In order to incorporate the strengths of service design methodology that can reflect a variety of user opinions, this study will introduce diverse tools in the framework of double diamond process. In addition, it will present field cases that successfully brought about best results in medical space design. It will end with summarizing the ideal process of medical space design which is reasonable and comprehensive. Results: Medical service encompasses preventive medicine as well as treatment of existing medical conditions. A study in establishing the platform of medical service design consists of a wide range of trend research, followed by the summary of two-matrix design classification based on results of the trend research. The draft of design process is divided into five stages composed of basic tools for establishing spatial flow lines created by matching service design tools with each stage of space design processes. In all this, most important elements to consider are communication and empathy. When service design is actually applied to space design, one can see that output has reflected the users' needs very well. The service design process for user-oriented medical space can thus be established by interactions on the final outcome and feedback on the results. Implications: One can see that the service design with the hospital at its center produces the result that encompasses the user's needs best. If the user-focused service design process for medical space can be extended to other space designs, the author believes that it would enhance the level of satisfaction for users and minimize trials and errors.

Educational Framework for Interactive Product Prototyping

  • Nam Tek-Jin
    • Archives of design research
    • /
    • v.19 no.3 s.65
    • /
    • pp.93-104
    • /
    • 2006
  • When the design profession started, design targets were mainly static hardware centered products. Due to the development of network and digital technologies, new products with dynamic and software-hardware hybrid interactive characteristics have become one of the main design targets. To accomplish the new projects, designers are required to learn new methods, tools and theories in addition to the traditional design expertise of visual language. One of the most important tools for the change is effective and rapid prototyping. There have been few researches on educational framework for interactive product or system prototyping to date. This paper presents a new model of educational contents and methods for interactive digital product prototyping, and it's application in a design curricula. The new course contents, integrated with related topics such as physical computing and tangible user interface, include microprocessor programming, digital analogue input and output, multimedia authoring and programming language, sensors, communication with other external devices, computer vision, and movement control using motors. The final project of the course was accomplished by integrating all the exercises. Our educational experience showed that design students with little engineering background could learn various interactive digital technologies and its' implementation method in one semester course. At the end of the course, most of the students were able to construct prototypes that illustrate interactive digital product concepts. It was found that training for logical and analytical thinking is necessary in design education. The paper highlights the emerging contents in design education to cope with the new design paradigm. It also suggests an alterative to reflect the new requirements focused on interactive product or system design projects. The tools and methods suggested can also be beneficial to students, educators, and designers working in digital industries.

  • PDF

Constructing Negative Links from Multi-facet of Social Media

  • Li, Lin;Yan, YunYi;Jia, LiBin;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2484-2498
    • /
    • 2017
  • Various types of social media make the people share their personal experience in different ways. In some social networking sites. Some users post their reviews, some users can support these reviews with comments, and some users just rate the reviews as kind of support or not. Unfortunately, there is rare explicit negative comments towards other reviews. This means if there is a link between two users, it must be positive link. Apparently, the negative link is invisible in these social network. Or in other word, the negative links are redundant to positive links. In this work, we first discuss the feature extraction from social media data and propose new method to compute the distance between each pair of comments or reviews on social media. Then we investigate whether we can predict negative links via regression analysis when only positive links are manifested from social media data. In particular, we provide a principled way to mathematically incorporate multi-facet data in a novel framework, Constructing Negative Links, CsNL to predict negative links for discovering the hidden information. Additionally, we investigate the ways of solution to general negative link predication problems with CsNL and its extension. Experiments are performed on real-world data and results show that negative links is predictable with multi-facet of social media data by the proposed framework CsNL. Essentially, high prediction accuracy suggests that negative links are redundant to positive links. Further experiments are performed to evaluate coefficients on different kernels. The results show that user generated content dominates the prediction performance of CsNL.

A Study on the Factors Affecting the Success of Intelligent Public Service: Information System Success Model Perspective (판별시스템 중심의 지능형공공서비스 성공에 영향을 미치는 요인 연구: 정보시스템성공모형을 중심으로)

  • Kim, Jung Yeon;Lee, Kyoung Su;Kwon, Oh Byung
    • The Journal of Information Systems
    • /
    • v.32 no.1
    • /
    • pp.109-146
    • /
    • 2023
  • Purpose With Intelligent public service (IPS), it is possible to automate the quality of civil affairs, provide customized services for citizens, and provide timely public services. However, empirical studies on factors for the successful use of IPS are still insufficient. Hence, the purpose of this study is to empirically analyze the factors that affect the success of IPS with classification function. ISSM (Information System Success Model) is considered as the underlying research model, and how the algorithm quality, data quality, and environmental quality of the discrimination system affect the relationship between utilization intentions is analyzed. Design/methodology/approach In this study, a survey was conducted targeting users using IPS. After giving them a preliminary explanation of the intelligent public service centered on the discrimination system, they briefly experienced two types of IPS currently being used in the public sector. Structural model analysis was conducted using Smart-PLS 4.0 with a total of 415 valid samples. Findings First, it was confirmed that algorithm quality and data quality had a significant positive (+) effect on information quality and system quality. Second, it was confirmed that information quality, system quality, and environmental quality had a positive (+) effect on the use of IPS. Thirdly, it was confirmed that the use of IPS had a positive (+) effect on the net profit for the use of IPS. In addition, the moderating effect of the degree of knowledge on AI, the perceived accuracy of discriminative experience and IPS, and the user was analyzed. The results suggest that ISSM and TOE framework can expand the understanding of the success of IPS.

Time-dependent and inelastic behaviors of fiber- and particle hybrid composites

  • Kim, Jeong-Sik;Muliana, Anastasia
    • Structural Engineering and Mechanics
    • /
    • v.34 no.4
    • /
    • pp.525-539
    • /
    • 2010
  • Polymer matrix composites are widely used in many engineering applications as they can be customized to meet a desired performance while not only maintaining low cost but also reducing weight. Polymers can experience viscoelastic-viscoplastic response when subjected to external loadings. Various reinforcements and fillers are added to polymers which bring out more complexity in analyzing the timedependent response. This study formulates an integrated micromechanical model and finite element (FE) analysis for predicting effective viscoelastic-viscoplastic response of polymer based hybrid composites. The studied hybrid system consists of unidirectional short-fiber reinforcements and a matrix system which is composed of solid spherical particle fillers dispersed in a homogeneous polymer constituent. The goal is to predict effective performance of hybrid systems having different compositions and properties of the fiber, particle, and matrix constituents. A combined Schapery's viscoelastic integral model and Valanis's endochronic viscoplastic model is used for the polymer constituent. The particle and fiber constituents are assumed linear elastic. A previously developed micromechanical model of particle reinforced composite is first used to obtain effective mechanical properties of the matrix systems. The effective properties of the matrix are then integrated to a unit-cell model of short-fiber reinforced composites, which is generated using the FE. The effective properties of the matrix are implemented using a user material subroutine in the FE framework. Limited experimental data and analytical solutions available in the literatures are used for comparisons.

Study on Tag, Trust and Probability Matrix Factorization Based Social Network Recommendation

  • Liu, Zhigang;Zhong, Haidong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2082-2102
    • /
    • 2018
  • In recent years, social network related applications such as WeChat, Facebook, Twitter and so on, have attracted hundreds of millions of people to share their experience, plan or organize, and attend social events with friends. In these operations, plenty of valuable information is accumulated, which makes an innovative approach to explore users' preference and overcome challenges in traditional recommender systems. Based on the study of the existing social network recommendation methods, we find there is an abundant information that can be incorporated into probability matrix factorization (PMF) model to handle challenges such as data sparsity in many recommender systems. Therefore, the research put forward a unified social network recommendation framework that combine tags, trust between users, ratings with PMF. The uniformed method is based on three existing recommendation models (SoRecUser, SoRecItem and SoRec), and the complexity analysis indicates that our approach has good effectiveness and can be applied to large-scale datasets. Furthermore, experimental results on publicly available Last.fm dataset show that our method outperforms the existing state-of-art social network recommendation approaches, measured by MAE and MRSE in different data sparse conditions.

Google Play Malware Detection based on Search Rank Fraud Approach

  • Fareena, N;Yogesh, C;Selvakumar, K;Sai Ramesh, L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3723-3737
    • /
    • 2022
  • Google Play is one of the largest Android phone app markets and it contains both free and paid apps. It provides a variety of categories for every target user who has different needs and purposes. The customer's rate every product based on their experience of apps and based on the average rating the position of an app in these arch varies. Fraudulent behaviors emerge in those apps which incorporate search rank maltreatment and malware proliferation. To distinguish the fraudulent behavior, a novel framework is structured that finds and uses follows left behind by fraudsters, to identify both malware and applications exposed to the search rank fraud method. This strategy correlates survey exercises and remarkably joins identified review relations with semantic and behavioral signals produced from Google Play application information, to distinguish dubious applications. The proposed model accomplishes 90% precision in grouping gathered informational indexes of malware, fakes, and authentic apps. It finds many fraudulent applications that right now avoid Google Bouncers recognition technology. It also helped the discovery of fake reviews using the reviewer relationship amount of reviews which are forced as positive reviews for each reviewed Google play the android app.