• Title/Summary/Keyword: number of users

Search Result 3,014, Processing Time 0.031 seconds

Improvement of Computational Complexity of Device-to-Device (D2D) Resource Allocation Algorithm in LTE-Advanced Networks (LTE-Advanced 환경에서 D2D 자원 할당 알고리즘의 계산 복잡도 개선)

  • Lee, Han Na;Kim, Hyang-Mi;Kim, SangKyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.762-768
    • /
    • 2015
  • D2D communication as an underlaying LTE-Advanced network has proven to be efficient in improving the network performance and decreasing the traffic load of eNodeB(enhanced NodeB). However large amount of interference can be caused by sharing the resources between the cellular users and D2D pairs. So, a resource allocation for D2D communication to coordinate the interference is necessary. Related works for resource allocation that D2D can reuse the resources of more than one cellular user with best CQI(Channel Quality Indicator) have been proposed. D2D communications may still cause interference to the primary cellular network when radio resource are shared between them. To avoid this problem, we propose a radio resource allocation algorithm with low computational complexity for D2D communication in OFDM-based wireless cellular networks. Unlike the previous works, the proposed algorithm utilizes unused ones of the whole resource. The unused resource allocate to on D2D pair can be shared only with other D2D pairs. In other words, if the distance between the D2D pairs is sufficient, we allowed more than two D2D pairs to share the same resources. The simulation results have proven that the proposed algorithm has up to 11 times lower computational complexity than the compared one according to the number of D2D.

A Personal Digital Library on a Distributed Mobile Multiagents Platform (분산 모바일 멀티에이전트 플랫폼을 이용한 사용자 기반 디지털 라이브러리 구축)

  • Cho Young Im
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.12
    • /
    • pp.1637-1648
    • /
    • 2004
  • When digital libraries are developed by the traditional client/sever system using a single agent on the distributed environment, several problems occur. First, as the search method is one dimensional, the search results have little relationship to each other. Second, the results do not reflect the user's preference. Third, whenever a client connects to the server, users have to receive the certification. Therefore, the retrieval of documents is less efficient causing dissatisfaction with the system. I propose a new platform of mobile multiagents for a personal digital library to overcome these problems. To develop this new platform I combine the existing DECAF multiagents platform with the Voyager mobile ORB and propose a new negotiation algorithm and scheduling algorithm. Although there has been some research for a personal digital library, I believe there have been few studies on their integration and systemization. For searches of related information, the proposed platform could increase the relationship of search results by subdividing the related documents, which are classified by a supervised neural network. For the user's preference, as some modular clients are applied to a neural network, the search results are optimized. By combining a mobile and multiagents platform a new mobile, multiagents platform is developed in order to decrease a network burden. Furthermore, a new negotiation algorithm and a scheduling algorithm are activated for the effectiveness of PDS. The results of the simulation demonstrate that as the number of servers and agents are increased, the search time for PDS decreases while the degree of the user's satisfaction is four times greater than with the C/S model.

Relationship Analysis between Malware and Sybil for Android Apps Recommender System (안드로이드 앱 추천 시스템을 위한 Sybil공격과 Malware의 관계 분석)

  • Oh, Hayoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1235-1241
    • /
    • 2016
  • Personalized App recommendation system is recently famous since the number of various apps that can be used in smart phones that increases exponentially. However, the site users using google play site with malwares have experienced severe damages of privacy exposure and extortion as well as a simple damage of satisfaction descent at the same time. In addition, Sybil attack (Sybil) manipulating the score (rating) of each app with falmay also present because of the social networks development. Up until now, the sybil detection studies and malicious apps studies have been conducted independently. But it is important to determine finally the existence of intelligent attack with Sybil and malware simultaneously when we consider the intelligent attack types in real-time. Therefore, in this paper we experimentally evaluate the relationship between malware and sybils based on real cralwed dataset of goodlplay. Through the extensive evaluations, the correlation between malware and sybils is low for malware providers to hide themselves from Anti-Virus (AV).

Empirical Analysis of the Effect of Avatars on Learner's e-Learning Performance : Emphasis on Trust Transference between Avatars and Contents (아바타가 학습자 이러닝 성과에 미치는 영향에 관한 실증연구:아바타와 학습내용간 신뢰전이를 중심으로)

  • Chae, Seong-Wook;Lee, Kun-Chang;Lee, Keun-Young
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.149-176
    • /
    • 2009
  • In the recent e-learning environment, avatars are often used to help learners get familiar with the contents, which is ultimately to motivate them to study more. Therefore, it is important to investigate whether avatars have actually the desirable effect on users of e-learning materials. Surprisingly, however, no extensive study has been conducted on this crucial issue Accordingly, main objectives this study are summarized as follows. First, we need to gain better understanding of how much learners' trust towards avatars (termed as "avatar trust") is transferred to learners' trust towards e-learning contents (termed as "contents trust"). Second, we need to investigate how much learners' personal relationships with avatars as well as learning behaviors change depending on avatar types (attractive vs. professional) and contents complexity (easy vs. difficult). As described in the study objectives, in order for us to analyze empirical data more systematically, we classified avatar types into two: "attractive" and "professional;" the contents are categorized as either "easy" or "difficult." Therefore, it is essential for this study to build a prototype e-learning website on which our research purpose can be realized and tested effectively with proper avatar types and e-learning contents. For this purpose, we built a prototype e-learning website, in which avatars are invited from currently working avatar instructors used in real-world e-learning websites, and e-learning contents are adapted from real-world contents about Java programming topic, which have been proved to have shown high quality and reliability. Our research method includes questionnaire survey by inviting a number of valid respondents comprised of office workers who are believed to have high demands for the e-learning contents as well as those who have previous experience with avatar instructors. Respondents were given one of the four e-learning experiment conditions (2 avatar types x 2 contents types) on a random basis. Each experimental e-learning condition is framed to have the same quality but different avatar type and content complexity. Then the respondents are asked to fill out the survey form which has questions about avatar trust, contents trust, personal relationships with avatar, and learning behavior, among others. Regarding the constructs used in research model, we based them rigorously on previous studies. For example, we used six constructs such as behavior to give information (BGI), behavior to obtain information (BOI), need for inclusion wanted, need for control wanted, contents trust, and avatar trust. To measure them, 7-Likert scales were used in the questionnaire. E-learning performance was measured indirectly through two constructs such as BGI and BOI. Six constructs used in the research model were adopted and revised from the FIRO-B model suggested by Schutz. Empirical results are as follows: First, professional avatars are more effective for difficult contents, while attractive avatars were not as effective for easy contents. Second, our study results ascertained that avatar trust transfers to contents trust regardless of avatar types and contents complexity.

Web Prefetching Scheme for Efficient Internet Bandwidth Usage (효율적인 인터넷 대역폭 사용을 위한 웹 프리페칭 기법)

  • Kim, Suk-Hyang;Hong, Won-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.3
    • /
    • pp.301-314
    • /
    • 2000
  • As the number of World Wide Web (Web) users grows, Web traffic continues to increase at an exponential rate. Currently, Web traffic is one of the major components of Internet traffic. Also, high bandwodth usage due to Web traffic is observed during peak periods while leaving bandwidth usage idle during off-peak periods. One of the solutions to reduce Web traffic and speed up Web access is through the use of Web caching. Unfortunately, Web caching has limitations for reducing network bandwidth usage during peak periods. In this paper, we focus our attention on the use of a prefetching algorithm for reducing bandwidth during peak periods by using off-peak period bandwidth. We propose a statistical, batch, proxy-side prefetching scheme that improves cache hit rate while only requiring a small amount of storage. Web objects that were accessed many times in previous 24 hours but would be expired in the next 24 hours, are selected and prefetched in our scheme. We present simulation results based on Web proxy and show that this prefetching algorithm can reduce peak time bandwidth using off-peak bandwidth.

  • PDF

Current Status and User Experiences of the Science-Related YouTube Services by Government-Funded Research Institutes (정부출연연구기관의 과학 유튜브 서비스 현황과 이용자 경험 연구)

  • Byun, Kwanjoo;Oh, Sanghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.4
    • /
    • pp.277-307
    • /
    • 2021
  • This study aims to understand the current status of science-related channels on YouTube provided by government-funded research institutes and investigate user experiences and behaviors of using the services. We examined the number of subscribers, view counts, and video contents of 26 YouTube channels from the government-funded research institutes. We also designed a user study with the uses and gratifications theory and conducted a semi-structured interview. By grouping videos into five categories: Public Relations, Lectures, Entertainment, Vlogs, and Q&A, most videos were about research projects or institutional promotions. User motivation for using the YouTube channel was to acquire scientific knowledge and information. Users thought that YouTube channels could provide reliable information and satisfy their intellectual curiosity. But they criticized that most videos were uninteresting, and the lack of promotions of the channels made others hesitant to sign up and watch. Findings from this study could help fully understand the current status of the government-funded research institute's YouTube channel and be used as resources for the government's planning and development of various YouTube services.

Fusion Strategy on Heterogeneous Information Sources for Improving the Accuracy of Real-Time Traffic Information (실시간 교통정보 정확도 향상을 위한 이질적 교통정보 융합 연구)

  • Kim, Jong-Jin;Chung, Younshik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.1
    • /
    • pp.67-74
    • /
    • 2022
  • In recent, the number of real-time traffic information sources and providers has increased as increasing smartphone users and intelligent transportation system facilities installed at roadways including vehicle detection system (VDS), dedicated short-ranged communications (DSRC), and global positioning system (GPS) probe vehicle. The accuracy of such traffic information would vary with these heterogeneous information sources or spatiotemporal traffic conditions. Therefore, the purpose of this study is to propose an empirical strategy of heterogeneous information fusion to improve the accuracy of real-time traffic information. To carry out this purpose, travel speed data collection based on the floating car technique was conducted on 227 freeway links (or 892.2 km long) and 2,074 national highway links (or 937.0 km long). The average travel speed for 5 probe vehicles on a specific time period and a link was used as a ground truth measure to evaluate the accuracy of real-time heterogeneous traffic information for that time period and that link. From the statistical tests, it was found that the proposed fusion strategy improves the accuracy of real-time traffic information.

Application of Responsive Identity Design in Sejong City: Focusing on Minimalism (세종특별자치시 반응형 아이덴티티 디자인 적용: 미니멀리즘을 중심으로)

  • Cha, Hyun-Ji
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.656-668
    • /
    • 2020
  • The Sejong City was launched in July 2012 and was initially focused on the relocation of central administrative agencies, but it has been changing from an administrative city to a fourth industrial city since 2019 to a smart city and the implementation of Korea's New Deal in 2020. Identity design needs to be reevaluated accordingly. In particular, the web environment is also calling for an optimized identity design due to rapid changes in information technology such as various wearables and the Internet of Things. As the number of responsive web sites where information and communication technologies can be developed and optimized screens can be viewed increased, identity was intuitively communicated to users and designs were applied to make them more distinct and empathetic to other cities. Prior to the study, we looked at prior studies on the changing times in the web environment and the reactive web, and analyzed the identity design of the reactive web and applied minimalism characteristics step by step. Based on this, we surveyed experts and non-experts on the proposed survey by applying minimalist characteristics (simple, repeatability, and spatiality) of reactive identity and found that it was easily and intuitively recognizable in a small web environment such as mobile. Therefore, we hope that Sejong City's identity will continue to be studied in various ways and efficient management so that identity can be established in accordance with the changes of the times.

Decoupled Parametric Motion Synthesis Based on Blending (상.하체 분리 매개화를 통한 블렌딩 기반의 모션 합성)

  • Ha, Dong-Wook;Han, Jung-Hyun
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.439-444
    • /
    • 2008
  • The techniques, which locate example motions in abstract parameter space and interpolate them to generate new motion with given parameters, are widely used in real-time animation system for its controllability and efficiency However, as the dimension of parameter space increases for more complex control, the number of example motions for parameterization increases exponentially. This paper proposes a method that uses two different parameter spaces to obtain decoupled control over upper-body and lower-body motion. At each frame time, each parameterized motion space produces a source frame, which satisfies the constraints involving the corresponding body part. Then, the target frame is synthesized by splicing the upper body of one source frame onto the lower body of the other. To generate corresponding source frames to each other, we present a novel scheme for time-warping. This decoupled parameterization alleviates the problems caused by dimensional complexity of the parameter space and provides users with layered control over the character. However, when the examples are parameterized based on their upper body's spatial properties, the parameters of the examples are varied individually with every change of its lower body. To handle this, we provide an approximation technique to change the positions of the examples rapidly in the parameter space.

  • PDF

A Study on the Development of Library Anxiety Scales (도서관불안척도의 개발에 관한 연구)

  • Park Hyun-Young;Nam Tae-Woo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.3
    • /
    • pp.99-120
    • /
    • 2006
  • This study is conformed to having library anxiety of our domestic university library users. and. to developing the Korean Library Anxiety Scales(K-LAS). The research methods is literature research. library use Postscript report analysis. and questionnaire survey. The research subjects were selected to be 4 universities in consideration of their student number and library scale. The research period was from September 3, 2005 to March 23. 2006. The questionnaire survey was administered in the liberal arts courses which all the students could take. The development method of the Library Anxiety Scale are the content validity test by expert group. reliability test and validity test of SPSS Program. Also. the correlation between library variables and library anxiety was tested by using K-LAS. The results of this study developed the K-LAS. which was composed of 6 factors and 40 items. 6 factors were set up as physical environmental factor, library use and knowledge factor, task and research factor. digital information factor, and the factor on library staff. and Psychological ? emotional factor. According to the Post-test results of the correlation between library anxiety and variables. 5 factors except the factor on library staff were correlated with more than 2 variables respectively.