• Title/Summary/Keyword: end user

Search Result 1,233, Processing Time 0.024 seconds

AN EFFICIENT DENSITY BASED ANT COLONY APPROACH ON WEB DOCUMENT CLUSTERING

  • M. REKA
    • Journal of applied mathematics & informatics
    • /
    • v.41 no.6
    • /
    • pp.1327-1339
    • /
    • 2023
  • World Wide Web (WWW) use has been increasing recently due to users needing more information. Lately, there has been a growing trend in the document information available to end users through the internet. The web's document search process is essential to find relevant documents for user queries.As the number of general web pages increases, it becomes increasingly challenging for users to find records that are appropriate to their interests. However, using existing Document Information Retrieval (DIR) approaches is time-consuming for large document collections. To alleviate the problem, this novel presents Spatial Clustering Ranking Pattern (SCRP) based Density Ant Colony Information Retrieval (DACIR) for user queries based DIR. The proposed first stage is the Term Frequency Weight (TFW) technique to identify the query weightage-based frequency. Based on the weight score, they are grouped and ranked using the proposed Spatial Clustering Ranking Pattern (SCRP) technique. Finally, based on ranking, select the most relevant information retrieves the document using DACIR algorithm.The proposed method outperforms traditional information retrieval methods regarding the quality of returned objects while performing significantly better in run time.

Disputes Patterns and Resolution Approaches in the Global Trading of Digital Goods (디지털상품의 국제거래 유형과 분쟁 해결방안)

  • Shim, Sang-Ryul;Jeong, Yoon-Say
    • Journal of Arbitration Studies
    • /
    • v.17 no.3
    • /
    • pp.145-167
    • /
    • 2007
  • Digital goods are defined as intangible and non-physical goods, composed of a combination of digital signals, electronically represented as 0 and 1. They are also called as digital products, electronic transmissions, information goods, digital contents, computer information, etc. Digital goods are now traded both domestically and internationally as well as on-line and off-line. Korean government revised the Basic Law on Foreign Trade to include digital goods and services as the scope of foreign trade in 2001. Trade volume of digital goods are increasing in Korea. The supply chains of digital goods from producing the components to selling globally to consumers are different from conventional physical goods. Mostly, digital goods are traded on the license basis rather than ownership contract. End User License Agreements(EULAs), such as shrink-wrap, click- wrap, or browser-wrap licenses are very popular in online transactions. Unlike conventional physical goods. the breach of license contract is closely linked with the infringement of intellectual property rights. Digitalized intellectual property is easy to copy and transmit in the cyber space. In cases of legal disputes from the breach of license contract, commercial arbitration or on-line alternative dispute resolutions(ADRs) are regarded as better approach to solve them rather than court sues. For promoting more secure and reliable international trade of digital goods. arbitration clauses should be included in most of license contracts.

  • PDF

A spear phishing threat and the prevention method for the end user (스피어 피싱 위협과 최종 사용자 관점에서 대응방안 제안)

  • Sohn, Yu-seung;Nam, Kil-hyun;Goh, Seung-chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.284-287
    • /
    • 2013
  • Recently target oriented attacks which target an enterprise and a government agency are increasing. The starting point of APT(Advanced Persistent Threat), called as target oriented attacks, is the spear phishing email that is personalized based on the information collected via Internet of the target personnel. It is known that 94% of target oriented attacks use spear phishing emails. Therefore, in this paper, we analysed spear phishing methods in detail and the characteristics and recent trends of spear phishing threats and proposed the effective prevention method of spear phishing for the end user.

  • PDF

Optimal Load Control Method for Solar-Powered House with Energy Storage System (전력저장장치를 이용한 태양광주택의 최적부하제어기법)

  • Jeon, Jeong-Pyo;Kim, Kwang-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.5
    • /
    • pp.644-651
    • /
    • 2014
  • The renewable energy system and the real-time pricing can provide the significant economic advantage for end-user of residential house. However, according to recent studies, high initial cost of renewable energy system such as photovoltaic (PV) system and lack of suitable load control methods adjusting electric power consumption in response to time-varying price are regarded as the major obstruction for introduction of renewable energy system and real-time pricing in residental household. In this paper, we propose automated optimal load control strategy which aim to achieve not only minimizing the electricity cost but also the increase in the utilization rates of PV generation power of residential PV house in real-time pricing environment. Simulation results show that our proposed optimal load control strategy leads to significant reduction in the electricity costs and increase in the utilization rates of power generated by PV system in comparison with the conventional PV house. Therefore, the proposed optimal load control strategy can provide more economic benefit to end-user.

Stochastic Gradient Descent Optimization Model for Demand Response in a Connected Microgrid

  • Sivanantham, Geetha;Gopalakrishnan, Srivatsun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.97-115
    • /
    • 2022
  • Smart power grid is a user friendly system that transforms the traditional electric grid to the one that operates in a co-operative and reliable manner. Demand Response (DR) is one of the important components of the smart grid. The DR programs enable the end user participation by which they can communicate with the electricity service provider and shape their daily energy consumption patterns and reduce their consumption costs. The increasing demands of electricity owing to growing population stresses the need for optimal usage of electricity and also to look out alternative and cheap renewable sources of electricity. The solar and wind energy are the promising sources of alternative energy at present because of renewable nature and low cost implementation. The proposed work models a smart home with renewable energy units. The random nature of the renewable sources like wind and solar energy brings an uncertainty to the model developed. A stochastic dual descent optimization method is used to bring optimality to the developed model. The proposed work is validated using the simulation results. From the results it is concluded that proposed work brings a balanced usage of the grid power and the renewable energy units. The work also optimizes the daily consumption pattern thereby reducing the consumption cost for the end users of electricity.

Forensic Analysis of Element Instant Messenger Artifacts (포렌식 관점에서의 Element 인스턴트 메신저 아티팩트 분석)

  • Cho, Jae-min;Byun, Hyeon-su;Yun, Hui-seo;Seo, Seung-hee;Lee, Chang-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1113-1120
    • /
    • 2022
  • Recently, the investigation has been difficult due to the emergence of messengers that encrypt and store data for the purpose of protecting personal information and provide services such as end-to-end encryption with a focus on security. Accordingly, the number of crime cases using security messengers is increasing, but research on data decoding for security messengers is needed. Element security messengers provide end-to-end encryption functions so that only conversation participants can check conversation history, but research on decoding them is insufficient. Therefore, in this paper, we analyze the instant messenger Element, which provides end-to-end encryption, and propose a plaintext verification of the history of encrypted secure chat rooms using decryption keys stored in the Windows Credential Manager service without user passwords. In addition, we summarize the results of analyzing significant general and secure chat-related artifacts from a digital forensics investigation perspective.

Design of a MapReduce-Based Mobility Pattern Mining System for Next Place Prediction (다음 장소 예측을 위한 맵리듀스 기반의 이동 패턴 마이닝 시스템 설계)

  • Kim, Jongwhan;Lee, Seokjun;Kim, Incheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.8
    • /
    • pp.321-328
    • /
    • 2014
  • In this paper, we present a MapReduce-based mobility pattern mining system which can predict efficiently the next place of mobile users. It learns the mobility pattern model of each user, represented by Hidden Markov Models(HMM), from a large-scale trajectory dataset, and then predicts the next place for the user to visit by applying the learned models to the current trajectory. Our system consists of two parts: the back-end part, in which the mobility pattern models are learned for individual users, and the front-end part, where the next place for a certain user to visit is predicted based on the mobility pattern models. While the back-end part comprises of three distinct MapReduce modules for POI extraction, trajectory transformation, and mobility pattern model learning, the front-end part has two different modules for candidate route generation and next place prediction. Map and reduce functions of each module in our system were designed to utilize the underlying Hadoop infrastructure enough to maximize the parallel processing. We performed experiments to evaluate the performance of the proposed system by using a large-scale open benchmark dataset, GeoLife, and then could make sure of high performance of our system as results of the experiments.

A Study on the meaning of Database follow the application of Visual Contents (전시콘텐츠 적용 환경에 따른 데이터베이스 의미 고찰)

  • Kim, Min-Su;Yoon, Se-Kyun
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.17-26
    • /
    • 2005
  • Nowadays, display-contents are developing to an informative environment. that is under the logic of the media operating system. To perceive the media-environments and produce the cultural contents, the cultural designers seek to understand a skin structure from making up for shape. To appreciate operating system in data and database is not only systematization of form and contents of visual contents but also variety contents into multiple-platform and integrative environments. These days, the spectacle exhibition try to express for their surface design between algorithm of data and database. the information is expressing aesthetic which means presents the integrated contents through the play instinct environment to end-user. That was given web or game to participation is developing with the cellular device and ubiquitous computing system. in the linear perspective, the end-user should be immerse more and more hyper-simulation system because of the operating algorithm of database. To do this, human have need to get the information-ability from multi-platform society. In the virtual environment, database offer the experience of an unheard-of event to end-user that prepare the participants the circumstances priority of signifiers. To do that already based on a fixed sensibility endow with narrative of the freshness- experience.

  • PDF

Moderating Roles of Strategy Suitability Factors between IT Factor and User Factors on Non-financial Performance (KMS의 전략 적합성 요인이 정보기술 특성 및 이용자 특성과 비재무적 성과 간에 미치는 조절적 영향)

  • Yi, Seon-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.489-498
    • /
    • 2017
  • This study analyzed whether the suitability of strategy is playing a regulative role between IT characteristics & user characteristics and non-financial performance empirically. To this end, this study set up IT characteristics and user characteristics as independent variables, and set up non-financial performance as the performance variable of KMS, and also set up the suitability of the management strategy & informatization strategy of a business as moderating variables. This study defined the detailed factors in IT characteristics as IT maturity and IT/IS infrastructure while defining the detailed factors in user characteristics as perceived profit, organizing of learning, and user professionalism. In addition, this study defined non-financial performance as an organization member satisfaction, and KMS availability. As a result of the analysis, IT maturity & IT/IS infrastructure, which are defined as IT characteristics, and perceived profit, organizing of learning and user professionalism, etc., which were defined as user characteristics, were found to be variables playing a regulative role in non-financial performance.

A Study on the Influence of Product Attributes of Smart Device on User Acceptance: Mediating Effect of Utilitarian and Hedonic Motivation (스마트 디바이스 제품속성이 제품수용에 미치는 영향: 기능적 동기와 쾌락적 동기의 매개효과)

  • Yi, Ho-Taek;Huh, Jong-Ho;Jung, Ji-Bum;Kim, Kyung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.454-468
    • /
    • 2015
  • The purpose of this study is to investigate the relationship between product attributes of smart device and user acceptance of technology. Moreover, the authors examined mediating effect of utilitarian and hedonic motivation between product attributes and user acceptance. Previous researches focused on user attitude and behavior intention of new technology based on Technology Acceptance Model(TAM). However, differently from previous researches, which are focused on user attitude like perceived usefulness and perceived ease of use, this research emphasized the relationship product attributes such as product functionality, design, and convenience and user motivation both utilitarian(effort expectancy and performance expectancy) and hedonic motivation(perceived enjoyment) according to UTAUT model. The results shows that 3 motivation variables(effort expectancy, performance expectancy, and perceived enjoyment) have positive impacts on user acceptance intention of smart device. product design has positive relationship to perceived enjoyment and product convenience has positive relationship to both effort and performance expectancy. Furthermore, 3 motivation variables play a full mediation between product attributes and user acceptance intention of new technology. However, product functionality has no relationship to both effort and performance expectancy. Research contribution, implications, and further research directions are discussed at the end of the paper.