• 제목/요약/키워드: internet users

검색결과 4,159건 처리시간 0.028초

An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene

  • Li, Zhi;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권10호
    • /
    • pp.4025-4041
    • /
    • 2020
  • Mobile edge computing (MEC) is capable of providing services to smart devices nearby through radio access networks and thus improving service experience of users. In this paper, an offloading strategy for the joint optimization of computing and communication resources in multi-user and multi-MEC overlapping scene was proposed. In addition, under the condition that wireless transmission resources and MEC computing resources were limited and task completion delay was within the maximum tolerance time, the optimization problem of minimizing energy consumption of all users was created, which was then further divided into two subproblems, i.e. offloading strategy and resource allocation. These two subproblems were then solved by the game theory and Lagrangian function to obtain the optimal task offloading strategy and resource allocation plan, and the Nash equilibrium of user offloading strategy games and convex optimization of resource allocation were proved. The simulation results showed that the proposed algorithm could effectively reduce the energy consumption of users.

A Recommender System for Device Sharing Based on Context-Aware and Personalization

  • Park, Jong-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권2호
    • /
    • pp.174-190
    • /
    • 2010
  • In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service which is composed of customized devices among sharable devices in a ubiquitous smart space (which is called USS in this paper). However, the situations of each user are different and user preferences also are various. Although users request the same service in the same USS, the most suitable devices for composing the service are different for each user. For these user requirements, this paper proposes a device recommender system which infers and recommends customized devices for composing a user required service. The objective of this paper is the development of the systems for recommending devices through context-aware inference in peer-to-peer environments. For this goal, this paper considers the context and user preference. Also I implement a prototype system and test performance on the real ubiquitous mobile object (UMO).

웹 기반 정보시스템의 지속적 사용에 관한 통합적 연구 : 인터넷 쇼핑 사이트를 중심으로 (An Integrative Study on Continued Use of Web-Based Information Systems: Focusing on Online Shopping Sites)

  • 이선로;양석원
    • Journal of Information Technology Applications and Management
    • /
    • 제16권1호
    • /
    • pp.51-75
    • /
    • 2009
  • This paper develops an integrative model for IT continuance in the internet shopping environments by integrating the expectation-confirmation and the switching cost factors. Using this model, in addition, this study investigates their differential effects on the mediating variables, such as user satisfaction, commitment, and trust which have been identified as antecedents of users' IT continuance intention. Results show that the product and service-related expectation confirmation factors and the relational switching cost factor can have greater impacts on users continuance intention than the web site design factors, and the financial and procedural switching cost factors. In particular, it is interesting to note that relational switching cost can lead users to more commitment, which is revealed as the strongest antecedent of their continuance intention to use a certain shopping site.

  • PDF

Packet Scheduling Algorithm Considering a Minimum Bit Rate for Non-realtime Traffic in an OFDMA/FDD-Based Mobile Internet Access System

  • Kim, Dong-Hoi;Ryu, Byung-Han;Kang, Chung-Gu
    • ETRI Journal
    • /
    • 제26권1호
    • /
    • pp.48-52
    • /
    • 2004
  • In this letter, we consider a new packet scheduling algorithm for an orthogonal frequency division multiplexing access/frequency division duplex (OFDMA/FDD)-based system, e.g., mobile broadband wireless access or high-speed portable internet systems, in which the radio resources of both time and frequency slots are dynamically shared by all users under a proper scheduling policy. Our design objective is to increase the number of non-realtime service (e.g., WWW) users that can be supported in the system, especially when the minimum bit rate requirement is imposed on them. The simulation results show that our proposed algorithm can provide a significant improvement in the average outage probability performance for the NRT service, i.e., significantly increasing the number of NRT users without much compromising of the cell throughput.

  • PDF

차세대 통합망에서 데이터 통신의 품질을 보장하기 위한 기법 (Architecture Design for Guaranteeing Quality of Data Communication in NGcN)

  • 유상훈;백두권
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2005년도 춘계학술대회 논문집
    • /
    • pp.1-4
    • /
    • 2005
  • Information communication environment integrates communication, broadcasting and internet, and Digital Convergence service emerges in result. Thus, the effective routers are needed so that they can transmit a huge number of data to core internet through appropriate base center. Therefore, the network guaranteeing QoS in transport layer supports interoperability with different wireless networks. So as to users receive necessary information anywhere seamlessly, the network architecture focuses on packet transmission and it is efficient for the control layer switches and controls packets between different networks. Since individual users take advantage of different services and data, the effective router architecture must be designed. Hence in this paper we design monitoring technique to solve security problem and to support premium service to ultimate users. Thereafter, we run opnet simulation and show the improvement of proposed router architecture.

  • PDF

Sum-Rate Performance of A NOMA-based Two-Way Relay Approach for A Two-User Cellular Network

  • Li, Guosheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권5호
    • /
    • pp.1944-1956
    • /
    • 2021
  • This paper considers a cellular two-way relay network with one base station (BS), one relay station (RS), and two users. The two users are far from the BS and no direct links exist, and the two users exchange messages with the BS via the RS. A non-orthogonal multiple access (NOMA) and network coding (NC)-based decode-and-forward (DF) two-way relaying (TWR) scheme TWR-NOMA-NC is proposed, which is able to reduce the number of channel-uses to three from four in conventional time-division multiple access (TDMA) based TWR approaches. The achievable sum-rate performance of the proposed approach is analyzed, and a closed-form expression for the sum-rate upper bound is derived. Numerical results show that the analytical sum-rate upper bound is tight, and the proposed TWR-NOMA-NC scheme significantly outperforms the TDMA-based TWR and NOMA-based one-way relaying counterparts.

Understanding the User Preferences in the Types of Video Censorship

  • Park, Sohyeon;Kim, Kyulee;Oh, Uran
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권2호
    • /
    • pp.147-161
    • /
    • 2022
  • Video on demand (VOD) platforms provide immersive, inspiring, and commercial-free binge watching experiences. Recently, the number of these platform users increased dramatically as users can enjoy various contents without physical and time constraints during COVID-19. However, such platforms do not provide sufficient video censorship services while there is a strong need. In this study, we investigated the users' desire for video censorship when choosing and watching movies on VOD platforms, and how video censorship can be applied to different types of scenes to increase the censoring effect without diminishing the enjoyment. We first conducted an online survey with 98 respondents to identify the types of discomfort while watching sexual, violent, or drug-related scenes. We then conducted an in-depth online interview with 18 participants to identify the effective video filtering types and regions for each of the three scenes. Based on the findings, we suggest implications for designing a censor application for videos that contain uncomfortable scenes.

Advanced Energy Detector with Correlated Multiple Antennas

  • Kim, Sungtae;Lim, Sungmook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4600-4616
    • /
    • 2021
  • In cognitive radio networks where unlicensed secondary users opportunistically access to licensed spectrum unused by licensed primary users, spectrum sensing is one of the key issues in order to effectively use the frequency resource. For enhancing the sensing performance in energy detection-based spectrum sensing, spatial diversity based on multiple antennas is utilized. However, the sensing performance can be degraded when antennas are spatially correlated, resulting in inducing the harmful interference to primary users. To overcome this problem, in this paper, an advanced energy detector is proposed. In the proposed sensing method, a weight matrix based on the eigenvalues of the spatial channels without any prior information on the primary signals is defined and utilized. In numerical simulations, it is shown that the proposed detector outperforms the conventional detector with regard to false-alarm and detection probabilities when antenna are spatially correlated.

Intelligent recommendation method of intelligent tourism scenic spot route based on collaborative filtering

  • Liu Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권5호
    • /
    • pp.1260-1272
    • /
    • 2024
  • This paper tackles the prevalent challenges faced by existing tourism route recommendation methods, including data sparsity, cold start, and low accuracy. To address these issues, a novel intelligent tourism route recommendation method based on collaborative filtering is introduced. The proposed method incorporates a series of key steps. Firstly, it calculates the interest level of users by analyzing the item attribute rating values. By leveraging this information, the method can effectively capture the preferences and interests of users. Additionally, a user attribute rating matrix is constructed by extracting implicit user behavior preferences, providing a comprehensive understanding of user preferences. Recognizing that user interests can evolve over time, a weight function is introduced to account for the possibility of interest shifting during product use. This weight function enhances the accuracy of recommendations by adapting to the changing preferences of users, improving the overall quality of the suggested tourism routes. The results demonstrate the significant advantages of the approach. Specifically, the proposed method successfully alleviates the problem of data sparsity, enhances neighbor selection, and generates tourism route recommendations that exhibit higher accuracy compared to existing methods.

온라인 거래에서 프라이버시 염려의 선행요인과 프라이버시 염려, 신뢰간의 관계에 관한 연구 (Antecedents to Internet Privacy Concern and Their Effect on Perceived Trust for the Internet Transaction)

  • 최혁라;신정신
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제16권3호
    • /
    • pp.21-44
    • /
    • 2007
  • Internet privacy is named as one of the major barriers to the expansion and further development of e-commerce. This study is to identify the antecedents to Internet privacy concerns, to investigate the relationship of the antecedents and the perceived trust and to validate Internet privacy's effect on the perceived trust. A conceptual model which identifies Internet literacy and perceived vulnerability as antecedents to Internet privacy concern is proposed and tested based on the sample of 276 Internet users. Empirical findings show that Internet literacy affect Internet privacy concern negatively while perceived vulnerability affect positively. Also perceived vulnerability's effect on and privacy concern's effect on perceived trust has both directional negative support. Implications and further research agenda are provided with the limitation of the study.

  • PDF