• Title/Summary/Keyword: User-requirement

Search Result 604, Processing Time 0.037 seconds

Document Clustering using Term reweighting based on NMF (NMF 기반의 용어 가중치 재산정을 이용한 문서군집)

  • Lee, Ju-Hong;Park, Sun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.11-18
    • /
    • 2008
  • Document clustering is an important method for document analysis and is used in many different information retrieval applications. This paper proposes a new document clustering model using the re-weighted term based NMF(non-negative matrix factorization) to cluster documents relevant to a user's requirement. The proposed model uses the re-weighted term by using user feedback to reduce the gap between the user's requirement for document classification and the document clusters by means of machine. The Proposed method can improve the quality of document clustering because the re-weighted terms. the semantic feature matrix and the semantic variable matrix, which is used in document clustering, can represent an inherent structure of document set more well. The experimental results demonstrate appling the proposed method to document clustering methods achieves better performance than documents clustering methods.

  • PDF

Opportunistic Scheduling Schemes for Elastic Services in OFDMA Systems (OFDMA 시스템에서 Elastic 서비스를 위한 Opportunistic 스케줄링 기법)

  • Kwon, Jeong-Ahn;Lee, Jang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1A
    • /
    • pp.76-83
    • /
    • 2009
  • In this paper, we provide opportunistic scheduling schemes for elastic services in OFDMA systems with fairness constraints for each user. We adopt the network utility maximization framework in which a utility function is defined for each user to represent its level of satisfaction to the service. Since we consider elastic services whose degree of satisfaction depends on its average data rate, we define the utility function of each user as a function of its average data rate. In addition, for fair resource allocation among users, we define fairness requirements of each user by using utility functions. We first formulate an optimization problem for each fairness requirement that aim at maximizing network utility, which is defined as the sum of utilities of users. We then develop an opportunistic scheduling scheme for each fairness requirement by solving the problem using a dual approach and a stochastic sub-gradient algorithm.

A Study of Product Trade Service using Mobile Agent (모바일 에이전트를 이용한 상품거래서비스에 관한 연구)

  • 안성욱;오기욱
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.3
    • /
    • pp.1-10
    • /
    • 2001
  • Recently, way of Electronic Commerce is changing with increment of Internet users. In the previous way of commerce, users used to search for information by themselves. However, for user's convience, it can be done for users from one site. Mobile in order to provide users with such service. By the mobile agent-based Electronic Commerce system, users can get information from one site, and service companies can provide various and useful information to users. This is very important for construction of reliable Electronic Commerce environment, However, in generally used mobile agent-based platforms, the user should know URL information. and it is based on search engines. And as user's requirement levels become higher, they want to be provided with integrated and summarized service. In this paper, we implement product-trading system by applying mobile agent concept in order to satisfy user's requirement of getting required information from one site with minimal mouse click. For implementing the product trading system, E-speak, which is a platform for E-Service, is used And contents are saved as XML documents and data are shared based on these documents.

  • PDF

A User Interface Prototype Generation Technique Supporting Usage-Centered Design (사용성 중심설계를 지원하기 위한 사용자 인터페이스 프로토타입의 생성기법)

  • 김정옥;유철중;장옥배
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.29-42
    • /
    • 2004
  • According to rapid growth of a web environment, usage-centered design is being highlighted. This paper suggests the development step and algorithm to generate a user interface prototype automatically on the basis of usage-centered design. For this purpose, The transition object of the user interface is modeled from requirement analysis, and an modeling rule as well as algorithms of business events are made for the creation of the user interface. Through these processes, visual cohesions of business events become strong and unskilled designers can develop the qualified user interface prototypes. A user's understanding of business tasks can also be improved and prototype iterations reduced.

Calculation of Spectral Efficiency for Estimating Spectrum Requirements of IMT-Advanced in Korean Mobile Communication Environments

  • Chung, Woo-Ghee;Lim, Eun-Taek;Yook, Jong-Gwan;Park, Han-Kyu
    • ETRI Journal
    • /
    • v.29 no.2
    • /
    • pp.153-161
    • /
    • 2007
  • In this paper, we analyze the algorithm of the methodology developed by ITU for the calculation of spectrum requirements of IMT-Advanced. We propose an approach to estimate user density using traffic statistics, and to estimate spectrum efficiencies using carrier-to-interference ratio distribution and capacity theory as well as experimental data under Korean mobile communication environments. We calculate the IMT-Advanced spectrum requirements based on the user density and spectral efficiencies acquired from the new method. In the case of spectral efficiency using higher modulation and coding schemes, the spectrum requirement of IMT-Advanced is approximately 2700 MHz. When applying a $2{\times}2$ multiple-input multiple-output (MIMO) antenna system, it is approximately 1500 MHz; when applying a $4{\times}4$ MIMO antenna system, it is approximately 1050 MHz. Considering that the development of new technology will increase spectrum efficiency in the future, the spectrum requirement of IMT-Advanced in the Korean mobile communication environment is expected to be approximately 1 GHz bandwidth.

  • PDF

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform (모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.293-302
    • /
    • 2011
  • The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.

A Identity Escrow mechanism supporting key recovery (키 복구를 지원하는 향상된 신원위탁 메커니즘)

  • 이용호;이임영;김주한;문기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.119-128
    • /
    • 2002
  • In case certification between user and service provider is achieved, problem that user's identity is revealed is occurring by social issue, so it was presented identity escrow scheme to solve these problem. In identity escrow scheme, the issuer who have correct user's identity transmits securely anonymity authentication information to user, and user achieves authentication phase with service provider keeping oneself anonymity using this. In this paper, we present requirement for security and trusty of identity escrow scheme and propose new mechanism that can security this. Also, propose method that service provider can deliver securely contents to user and propose mechanism that improve that support ky recovery at encryption communication that using secret key that it was generated by key agreement between users.

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF