• Title/Summary/Keyword: users' IT capability

Search Result 162, Processing Time 0.025 seconds

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

Learning Material Bookmarking Service based on Collective Intelligence (집단지성 기반 학습자료 북마킹 서비스 시스템)

  • Jang, Jincheul;Jung, Sukhwan;Lee, Seulki;Jung, Chihoon;Yoon, Wan Chul;Yi, Mun Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.179-192
    • /
    • 2014
  • Keeping in line with the recent changes in the information technology environment, the online learning environment that supports multiple users' participation such as MOOC (Massive Open Online Courses) has become important. One of the largest professional associations in Information Technology, IEEE Computer Society, announced that "Supporting New Learning Styles" is a crucial trend in 2014. Popular MOOC services, CourseRa and edX, have continued to build active learning environment with a large number of lectures accessible anywhere using smart devices, and have been used by an increasing number of users. In addition, collaborative web services (e.g., blogs and Wikipedia) also support the creation of various user-uploaded learning materials, resulting in a vast amount of new lectures and learning materials being created every day in the online space. However, it is difficult for an online educational system to keep a learner' motivation as learning occurs remotely, with limited capability to share knowledge among the learners. Thus, it is essential to understand which materials are needed for each learner and how to motivate learners to actively participate in online learning system. To overcome these issues, leveraging the constructivism theory and collective intelligence, we have developed a social bookmarking system called WeStudy, which supports learning material sharing among the users and provides personalized learning material recommendations. Constructivism theory argues that knowledge is being constructed while learners interact with the world. Collective intelligence can be separated into two types: (1) collaborative collective intelligence, which can be built on the basis of direct collaboration among the participants (e.g., Wikipedia), and (2) integrative collective intelligence, which produces new forms of knowledge by combining independent and distributed information through highly advanced technologies and algorithms (e.g., Google PageRank, Recommender systems). Recommender system, one of the examples of integrative collective intelligence, is to utilize online activities of the users and recommend what users may be interested in. Our system included both collaborative collective intelligence functions and integrative collective intelligence functions. We analyzed well-known Web services based on collective intelligence such as Wikipedia, Slideshare, and Videolectures to identify main design factors that support collective intelligence. Based on this analysis, in addition to sharing online resources through social bookmarking, we selected three essential functions for our system: 1) multimodal visualization of learning materials through two forms (e.g., list and graph), 2) personalized recommendation of learning materials, and 3) explicit designation of learners of their interest. After developing web-based WeStudy system, we conducted usability testing through the heuristic evaluation method that included seven heuristic indices: features and functionality, cognitive page, navigation, search and filtering, control and feedback, forms, context and text. We recruited 10 experts who majored in Human Computer Interaction and worked in the same field, and requested both quantitative and qualitative evaluation of the system. The evaluation results show that, relative to the other functions evaluated, the list/graph page produced higher scores on all indices except for contexts & text. In case of contexts & text, learning material page produced the best score, compared with the other functions. In general, the explicit designation of learners of their interests, one of the distinctive functions, received lower scores on all usability indices because of its unfamiliar functionality to the users. In summary, the evaluation results show that our system has achieved high usability with good performance with some minor issues, which need to be fully addressed before the public release of the system to large-scale users. The study findings provide practical guidelines for the design and development of various systems that utilize collective intelligence.

A Study on Measurements of IT Security Service Quality : Feasibility of Quantitative Measures (IT 보안 서비스 품질의 측정 방법에 관한 연구 : 정량 지표의 사용 가능성)

  • Kyung, Ji Hoon;Kim, Chong Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.30-38
    • /
    • 2015
  • IT security service provides customers with the capability of protecting the networked information asset and infrastructures, and the scope of security service is expanding from a technology-intensive task to a comprehensive protection system for IT environment. To improve the quality of this service, a research model which help assess the quality is required. Several research models have been proposed and used in various service areas, but few cases are found for IT security service. In this work, a research model for the IT security quality has been proposed, based on research models such as SERVQUAL and E-S-QUAL. With the proposed model, factors which affect the service quality and the best quality measure have been identified. And the feasibility of using quantitative measures for quality has been examined. For analysis, structural equation modeling and various statistical methods such as principal component analysis were used. The result shows that satisfaction is the most significant measure affected by the proposed quality factors. Two quality factors, fulfillment and empathy, are the main determinants of the service quality. This leads to a strategy of quality improvement based on factors of emotion and perception, not of technology. The quantitative measures are considered as promising alternative measures, when combined with other measures. In order to design reliable quantitative measures, more work should be done on target processing time and users' expectation. It is hoped that work of this research will provide efficient tools and methods to improve the quality of IT security service and help future research works for other IT service areas.

Quality Evaluation of the Scientific and Technical Information Services and Its User Study (과학기술전문정보서비스 품질평가 및 이용자 정보요구 분석)

  • Moon, Sung-Been;Choe, In-Sook;Choi, Sang-Hee;Lee, Sung-Sook;Chang, Hye-Young
    • Journal of Information Management
    • /
    • v.33 no.1
    • /
    • pp.31-47
    • /
    • 2002
  • The main purpose of this research is to look into not only how users evaluate two major databases(BIST and SATURN) of the scientific and technical literature in Korea, but also what users expect from scientific and technical information services in general. The result of the user evaluation shows that there is a very little difference between two databases in database quality. It was found that BIST is better than SATURN in terms of accuracy, customer support, searching capability, and currency, whereas SATURN is preferred to BIST for completeness and the average number of retrieved items. User expectation for scientific and technical information is also investigated by surveying its user community. Among three user groups, there is notable disagreement in language uses to search non-korean literature. Each group also shows different demands for translation of original literature. This study attempted to evaluate the quality of the scientific and technical information (BIST and SATURN) and simultaneously to investigate users demands in general. By doing so, the specificity implied in quality evaluation of specific information services as well as the generalization of the users behaviors in scientific and technical community were accommodated in this study.

Medical prescription design using QR Codes (QR코드를 적용한 진료 처방전 설계)

  • Lim, Myung-Jae;Jung, Dong-Keun;Kim, Myung-Gwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.161-166
    • /
    • 2013
  • With recent development in information technology, IT convergence has been achieved ubiquitously in all areas of industry. In particular, there have been a lot of changes in medical IT conversion sector in terms of user service. In this regard, this paper attempts to propose an environment in which the existing paper prescription can be transferred in the form of QR codes using mobile handsets as one of practices from the perspective of user service. QR codes can minimize the burden resulting from the process of the output, delivery and storage of paper prescriptions. In addition, they can utilize the representation of the information in a wide variety of ways, and they are considered to be media that can minimize the risk of personal information exposure and falsification due to the restoration and encryption of the information. Accordingly, the application of QR codes to the medical field is expected to improve confidentiality ad storage capability of the information, along with users' convenience.

IT Service Strategy on Development of Online Floral Distribution Service : A Typhoon Positioning Strategy (화훼소매점의 온라인 유통서비스 진화에 따른 정보기술서비스 전략 - A Typhoon Positioning Strategy를 중심으로 -)

  • Lee, Seung-chang;Ahn, Sung-hyuck;Lee, Soong
    • Journal of Distribution Science
    • /
    • v.7 no.4
    • /
    • pp.15-26
    • /
    • 2009
  • The internet has dramatically changed a way of business management and competition in the business environment. Especially, it stimulated not only to evolve online floral distribution service but also to change a phase of competition among floral retail stores in industry. And that also led to keen competition among IT service providers as well. This study is to examine how floral retail stores have been evolved and competed with the radical situation of the floral distribution industry through IT service in the aspect of business and information technology. In addition, the Typhoon Positioning Strategy(TPS), a strategy for the IT service positioning, is introduced from IT service provider's perspective. For IT service providers to create high business value and continuous service providing, IT service should be positioned on the customers' "core business" and developed to the level of "solution." The Typhoon Positioning Strategy(TPS) is a strategy for the IT service positioning, indicating that IT service should be positioned according to a Business Process-Service model with the consideration of business development direction, IT service trend, and user's IT capability. That is, IT service providers should find out customers' "core business" area first to provide a right IT service to the company, and the IT service provided should meet to the level of business solution. The capability of the IT solution users is also an important factor to be considered for the advanced IT service. There are four principles of the Typhoon Positioning Strategy(TPS). Principle 1) IT service provided should be an IT solution Map suitable for customer business processes. Principle 2) IT service provided should be able to support customer core business. Principle 3) IT service provided should be a business solution. Principle. 4) IT service provided should be applied differently according to the level of customer's IT capability.

  • PDF

BEPAT: A platform for building energy assessment in energy smart homes and design optimization

  • Kamel, Ehsan;Memari, Ali M.
    • Advances in Energy Research
    • /
    • v.5 no.4
    • /
    • pp.321-339
    • /
    • 2017
  • Energy simulation tools can provide information on the amount of heat transfer through building envelope components, which are considered the main sources of heat loss in buildings. Therefore, it is important to improve the quality of outputs from energy simulation tools and also the process of obtaining them. In this paper, a new Building Energy Performance Assessment Tool (BEPAT) is introduced, which provides users with granular data related to heat transfer through every single wall, window, door, roof, and floor in a building and automatically saves all the related data in text files. This information can be used to identify the envelope components for thermal improvement through energy retrofit or during the design phase. The generated data can also be adopted in the design of energy smart homes, building design tools, and energy retrofit tools as a supplementary dataset. BEPAT is developed by modifying EnergyPlus source code as the energy simulation engine using C++, which only requires Input Data File (IDF) and weather file to perform the energy simulation and automatically provide detailed output. To validate the BEPAT results, a computer model is developed in Revit for use in BEPAT. Validating BEPAT's output with EnergyPlus "advanced output" shows a difference of less than 2% and thus establishing the capability of this tool to facilitate the provision of detailed output on the quantity of heat transfer through walls, fenestrations, roofs, and floors.

셀 손실률에 따른 차별화를 고려한 DSSAM 에서의 셀 스케쥴링 기법

  • Kim, Chang-Hun;Kim, Dong-Gyun;Park, Seung-Cheol;Choe, Yang-Hui
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1401-1413
    • /
    • 1999
  • ATM over xDSL으로 구성된 광대역 가입자 망을 통하여, ATM 망에 접속하려 할 때에는 DSL 접근 다중화기(Access Multiplexer)가 필수적으로 요구된다. 이 때 광대역 통합 서비스라는 가입자 망의 기본적인 목적을 달성하기 위하여, DSL 접근 다중화기는 ATM 계층에서의 트래픽 제어를 수행할 수 있어야 한다. 이에 본 논문에서는 DSL 접근 다중화기에서의 트래픽 제어에 필요한 효율적이고 간단한 셀 스케쥴링 기법을 제안한다. 성능평가를 위한 모의실험에 의하면, 제안된 기법은 각 연결들에게 그들의 트래픽 기술자에 부합하는 서비스를 제공할 수 있으며, 아울러 연결들이 명세한 셀 손실률에 근거하여 차별화 된 서비스 품질(QoS)을 제공할 수 있다.Abstract When residential users access core network via ATM over xDSL, DSL Access Multiplexer(DSLAM) which processes ATM cells transmitted from customer premises, is indispensable. In order to fulfill original goal of residential broadband integrated service, DSLAM should be able to perform ATM layer traffic management, mainly QoS(Quality of Service) provision. In this paper, we propose an efficient and simple cell scheduling scheme applicable to access multiplexer such as DSLAM. According to simulations for performance evaluation, the proposed cell scheduling scheme is able to supply bandwidths conforming to traffic descriptors of the connections. Moreover it is verified that the proposed scheme has a CLR based connection discrimination capability.

A Reactive Planner-Based Mobile Agent System

  • Seok, Whang-Hee;Kim, In-Cheol
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.179-185
    • /
    • 2001
  • Mobile agents have the unique ability to transport themselves from one system in a network to another. The ability to travel allows mobile agents to move to a system that contains services with which they want to interact and then to take advantage of being in the same host or network as the service. But most of conventional mobile agent systems require that the users or the programmer should give the mobile agent its detail behavioral script for accomplishing the given task. And during its runtime, such mobile agents just behave according to the fixed script given by its user. Therefore it is impossible that conventional mobile agents autonomously build their own plants and execute them in considering their ultimate goals and the dynamic world states. One way to overcome such limitations of conventional mobile agent systems is to develop an intelligent mobile agent system embedding a reactive planner. In this paper, we design both a model of agent mobility and a model of inter-agent communication based upon the representative reactive planning agent architecture called JAM. An then we develop an intelligent mobile agent system with reactive planning capability, IMAS, by implementing additional basic actions for agent moves and inter-agent communication within JAM according to the predefined models. Unlike conventional mobile agents. IMAS agents can be able to adapt their behaviors to the dynamic changes of their environments as well as build their own plans autonomously. Thus IMAS agents can show higher flexibility and robustness than the conventional ones.

  • PDF

STUDY ON 3-D VIRTUAL REALITY FOR STEREOSCOPIC VISUALIZATION ON THE WEB (웹 환경에서의 입체적 가시화를 위한 3-D 가상현실 기법의 적용)

  • Lee, J.H.;Park, Y.C.;Kim, J.H.;Kim, B.S.
    • Journal of computational fluids engineering
    • /
    • v.16 no.1
    • /
    • pp.30-35
    • /
    • 2011
  • In this paper, our effort to apply 3-D Virtual Reality system for stereoscopic visualization of mesh data on the web is briefly described. This study is an extension of our previous and on-going research efforts to develop an automatic grid generation program specialized for wing mesh, named as eGWing. The program is developed by using JAVA programming language, and it can be used either as an application program on a local computer or as an applet in the network environment. In this research advancing layer method(ALM) augmented by elliptic smoothing method is used for the structured grid generation. And to achieve a stereoscopic viewing capability, two graphic windows are used to render its own viewing image for the left and right eye respectively. These two windows are merged into one image using 3D monitor and the viewers can see the mesh data visualization results with stereoscopic depth effects by using polarizing glasses. In this paper three dimensional mesh data visualization with stereoscopic technique combined with 3D monitor is demonstrated, and the current achievement would be a good start-up for further development of low-cost high-quality stereoscopic mesh data visualization system which can be shared by many users through the web.