2016 (467)
2015 (448)
2014 (181)
2013 (81)
2012 (22)
2011 (22)
2010 (20)
2009 (22)
2008 (10)
A Dynamic Pricing Method for Goods in Competitive Ecommerce Market
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Dynamic pricing becomes one of the most attractive research topics in the field of ecommerce. In this paper, a novel dynamic pricing model composed retailer’s current profit and its further development is presented. The core of the model is online customer perceived value, and based on which the optimal price equilibrium is provided. To make goods competitive, we adjust function weight by customer lifetime profit forecast and define goods price upper limit by contrasting goods utilities. An example analysis is done to prove that the pricing model is feasible. The paper gives a pricing method workflow to the online enterprises as a pricing practice direction.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.11-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper discusses the motivations and principles of Deep Boltzmann Machines regarding learning algorithms for deep architectures. Policy-based systems management (PBM) and Deep Boltzmann Machines (DBM) are two of the many techniques available for artificial intelligence (AI), each having specific benefits and limitations, and thus different applicability; choosing the most appropriate technique is the first of many challenges faced by the developer. The discussion forms a backdrop for a detailed evaluation of the two techniques, in which the concepts underpinning each of PBM and EBM are reviewed and placed into context with each other as well as with the other popular techniques for AI. After considering the operation and suitability of the techniques in isolation, the focus shifts to look at how PBM and DBM could be combined in complementary ways to achieve more sophisticated and versatile AI systems for E-commerce..
Sorting and Retrieval Robotic System Controlled via Programmable Logic Controller for Library Usage
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.19-30
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents the conceptual idea for the sorting and retrieval robotic system controlled via Programmable Logic Controller (PLC). The purpose of presenting this idea is to ease the library users and librarians to sort and retrieve the books from the library’s shelf. The robotic system consists of movable platform using four wheel mobile systems. At the mobile platform there are a robotic arm and gripper that can move vertically and horizontally to pick and place the books on the shelf. The system is equipped with the colour recognition sensor and Radio Frequency Identification Detector (RFID) to ensure the robot can recognize the books located on the shelf. The system starts its operation by utilizing the sensor to detect the book on the shelf and then, the system actuator will be activated, causing the mechanism arm to extend and retract to reach to the book and the gripper will grip the book. The book that is required then can be brought down and the mobile platform will move to the counter. If the books are required to be sorted out, the motor at the robotic hand will moves the arm mechanism until the sensor detect an absence of books on the book shelf. Then, the arm will extend, sorting the book at its place by release the gripper.
Study on Efficiencies of Skidding Stems and Loading Logs Based on Multifunctional Skidding Loader
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.31-42
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The efficiency of skidding stems and loading logs was investigated in Daxin forest farm, Linjiang Forest Bureau, Jilin Forest Industry Group by using a loader together with a winch and retaining plate. During skidding operations, the average of skidding distance and time are 86.15 m and 9.68 minute, respectively, the average of skidding quantity and number of stems per skidding circle is 1.12m3 and 3. The productivity of skidding is 29.62 m3 per machine team. During loading operations, the average of loading time is 2.93 minute, respectively, the average of loading quantity and number of logs per loading circle is 0.78m3 and 5.1, the productivity of loading is 52.6 m3 per machine team. The regression results show that the skidding efficiencies reduced with increasing skidding time and skidding distance. However, the relationships between skidding efficiencies and skidding quantity per skidding circle were not evident. The correlation results show that skidding efficiency is significantly different among skidding distance, skidding time, skidding quantity per skidding circle, interaction between skidding distance and time, interaction between skidding quantity and numbers of stem or log. The production rate of tracked tractor is higher than wheeled tractor no matter stem or log skidding operations.
MuBike : Cloud Communication Service Composition Platform for Automatic Renting Bikes
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.43-52
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, bicycle culture is more and more active due to the environment consciousness and healthful life concept. This paper proposes an event-driven based cloud communication service composition technology to provide automatic renting bike system with smart phones which is tested and verified at ITRI MuBike Platform. With a unique interface on smart end-point devices and collecting lots of user’s location-based information, the user requests and the huge location-based information are processed by Complex Event Processing (CEP) which is used to trigger suitable SIP-based Telecom services and Internet/Cloud services at smart mobile devices. Therefore, our platform provides richer and dynamic information and location-based services combined with Telecom services and Internet/Cloud services architecture. With the more usage of smart end-point devices, the more plentiful users’ present status will be retrieved and recorded, this platform can provide more convenient and helpful Telecom services and Internet/Cloud service environment for users.
Study on A Recommendation Algorithm of Crossing Ranking in E-commerce
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.53-62
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The analysis of the existing recommendation system and the main task in the electronic commerce application and the existing problems of the basis, according to the new user "cold start" problem, to adopt a user in a number of different categories of electronic commerce website access multi-B2C behavior information recommendation. This paper presents a crossing ranking recommendation algorithm. Its accuracy can be far more than the random recommendation, at the same time keeping and diversity were recommended. All these ensure the algorithm has a good user experience. Experiments show that the algorithm is accurate and the algorithm is further enhanced.
Study on Forest Pests and Diseases Forecast based on the Rough Set Theory
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.63-72
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper applies the rough set theory and artificial intelligence technology into the field of forestry diseases and pests. It proposed the model of forestry diseases and pests forecasting in the demonstration. Through the model validation and accuracy analysis, the accuracy of the result is high, and forecast results with the actual situation are match.. In addition, it proposed an improvement attribute reduction algorithm based on discernibility matrix. Reduced conditional attribute set of forestry diseases and pests forecasting based on the algorithm. Through the extraction and reduction of generation rules, obtained a new f forestry diseases and pests forecasting model based on rough set theory. By verifying, the model has achieved a good result.
Enhance Patient Medication Safety With A RFID-based Authentication Scheme
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.85-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Medication Safety is an important issue for patients. Automated patient medication system using RFID technology is used to reduce the medication errors and improve the patient safety. In this paper, we show the weaknesses of Sonam Devgan Kaul et al’s authentication scheme. In order to enhance medication safety for patients, we propose a new lightweight RFID authentication scheme based on dynamic ID. This scheme only requires O(1) work to identify and authenticate a tag in the backend server and is particularly suitable for the low-cost RFID systems because only one-way hash function, XOR operation and concatenation operation are needed in tag part, so it is practical, secure and efficient for health care domain.
Analysis of Marketing Innovation Risk Based on Network Model
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.95-102
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper puts forward the network model to analyze the marketing innovation risk, according to the characteristics of modern enterprises’ marketing innovation, importing the concept of project network figure from the theory of project management. In order to provide an effective marketing innovation risk analysis method for modern enterprises. This paper also uses the network model to analyze two new marketing innovation policy of an automobile company.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.103-112
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The renewable energy resources from organic solid waste have increased day by day in Dhaka city as well as the whole country with the increasing of populations. This research evaluates and estimates the biogas productions from the municipal solid waste (MSW) through anaerobic digestion processes. Both the Biogas productions and power generation from MSW can play and important roles in this study. By using of the biogas has estimated the potentiality to generate electricity as 207.288, 873.034 and 2878.134 MW/day, in years 2020, 2025 and 2050 respectively, which is the most important component to our city Dhaka and good utilization for different business prospect
The Pricing Strategy of the Manufacturer with Dual Channel under Multiple Competitions
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.113-124
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In real life, the manufacturers typically conduct differential pricing for the same product in different regions. The dual-channel strategy not only generates the conflict between network sale channel and traditional channel, but also conflict the competition between traditional channels in different regions. We suppose that the traditional retail channels, manufacturers implementing the difference pricing strategy can make more profits. The literature mainly studies the impact of the network channels on manufacturers pricing strategy, and discusses the four kinds of pricing strategy in dual channel under the background of the manufacturers. Finally, through the analyses of numerical simulation of the parameters on the different pricing strategies, the related conclusions are given.
The Construction and Verification of the Dynamic Repeated Game Model Based on Tax of “Net Goods”
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.125-138
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the E-commerce as representative, the new commercial civilization is calling for the civilization of tax, and that tax-paying is the cost of civilized society. At present, the marketing on-line is highly covert which has been the difficulty of tax collection. From the game perspective, the author analyzed and verified theoretically that the tax-payer may choose to conceal the revenue in the E-commerce and it exist “optimal probability of concealing incomes”. Though the tax authority checks and manages according to "optimal probability", some tax-payers still choose to evade a tax. It can clearly be seen in the “lacking of honest tax-paying” environment, we should constantly perfect current self-reporting system, make a further refined management, optimize tax services and necessary tax inspection as a supplement.
Survey on Vision Based On-Road Vehicle Detection
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.139-146
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To alert drivers about driving environments on-board automotive driver assistance systems are developed. This paper presents a review on the various techniques of On-Road Vehicle detection systems. When vehicles are fully stopped for epoch of time, this condition is known as a traffic jam. For this, we must need an efficient traffic control system. In this paper a Survey of previous and recent works is presented on vision-based vehicle detection using sensors and also gives a detailed discussion on two steps of vehicle detection which are hypothesis generation and hypothesis verification. In the first step, all vehicles are hypothesized and in the second step, all hypotheses are verified and classified into vehicle and non-vehicle classes. The Both stages are important and challenging.
Valuating Goodwill of Cultural Enterprises Using Wavelet Neural Network
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.147-158
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Parameters Analysis for Basic Ant Colony Optimization Algorithm in TSP
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.159-170
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to effectively address the lack of basic ant colony algorithm in terms of parameters, we use four-step method instead of the popular three-step, based on a large number of experiments of the parameters setting, this paper summed up an effective selection method for m, α, β, ρ and Q parameters to select the best combination of parameters. Applying the improved ant colony algorithms including optimal retention policy ant system, max-min ant system, ant-based sorting systems and best-worst ant system, performance comparison analysis was conducted with the same TSP problems, and experiments proved that the proposed method of parameter combinations greatly improves the speed of convergence.
Collaborative Filtering Methods for Identifying Relevant Adverts to a Real Estate Mobile Agents
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.171-186
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Critical surveys show that mobile agents are unable to delegate properly the user’s requests resulting into having a semi-automated system requiring the intervention of the clients. This paper describes a new brokering architecture called “Meta Broker”. It interacts with relevant online real estate websites, based on the user’s desires to recommend possible matching advertisements. The proposed architecture includes multiple agents: Shopping Bots; Product Brokering; Recommender System and Data Mining. The objective is to present an intelligent gateway that can elicit the client desires and finds highest possible matches for advertisements on the real estate market. The Meta Broker utilizes collaborative filtering techniques on previously achieved data as well as upon previous client feedbacks to categorize the new client behavior. The extracted knowledge directly affects the ranking of the adverts that are compatible with the user’s characteristics and the client queries.
Analysis of Science and Engineering Graduates Employment Ability Factors based on FAHP
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.187-200
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
While employment ability is part of the core factors affecting the employment of College students, science and engineering graduates` employment has its own specialty, social demands, and it has many differences between other subjects. In hope of playing a promoting role on the using of employment ability theory, this paper use FAHP method to data mining the data of science and engineering employment, and obtained the employment ability factors model of students of science and engineering. Compares to other subjects, this article pays greater attention to use computer software to reduce the mathematical method complexity, and then get the science and engineering graduates’ employment ability model.
An Analysis Model of R&D Project’s Similarity
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.201-214
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
For the government, it is very important to analyze the similarity between various R&D projects, as it can contribute to reducing waste in government budgets and enhancing the investment efficacy of R&D investment. Thus far, there have been studies that attempted to analyze the similarity between two different documents by focusing on the keywords that represent the content of the document, or by using the similarities between sentences, with a view to identifying overlapping R&D projects. However, for various reasons these studies failed to achieve a desirable level of accuracy. In this regard, our purpose in this study is to suggest a means to analyze the similarity between R&D projects using the patent analysis DB from the government’s patent technology trend survey program, which examines and collects information on patents related to past R&D projects. To realize this goal, we suggested a similarity assessment model based on set theory and probability theory.
2014 College Students’ Employment Expectation Prediction Based on ANP
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.215-226
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In our country, higher education is changing from "elite education” to "popular education”, and the number of college graduates is in a sharp increase [1]. The basic supply and demand situation of university students' employment market has changed, resulting a series of social problems such as "college students increasingly serious employment problem", "recruitment problem and employment problem coexist". In this context, according to employment environment to predict the college students' employment expectation has become more and more important to the coordination of the social resources. Based on the employment situation factors on the former research, this article classifies college students' employment expectation attributed to education, government departments, enterprises three categories, and then uses the ANP method to predict the 2014 college students' expectation of employment. So not only can draw various expectation of employment ratio, but also can tell how the factors affecting on the choice of the expectation, and find out the key factors, to provide the reference for the adjustment of national employment policy.
Impact of Disability on Quality of Life of Urban Disabled People in Bangladesh
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.227-238
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study examined the impact of disability on the quality of life of disabled people in urban Bangladesh. A group of students of Department of Statistics, University of Dhaka conducted a survey in Dhaka city to collect socio-economic information for identification of disabled people. Information on disability and how it affected their life was also obtained either from the disabled people or from their caregivers by interviewing them. The study revealed that disability had a devastating effect on the quality of life of the disabled people with a particularly negative effect on their marriage, educational attainment, employment, and emotional state. Disability also jeopardized their personal, family and social life. More than half of the disabled people were looked at negatively by society. Disabled women and girl children suffered more from negative attitudes than their male counterparts, resulting in critical adverse effects on their psychological and social health. A combination of educational, economic and intensive rehabilitative measures should be implemented urgently to make them self-reliant. Collaborative communication between professionals and parents, behavioral counseling and comprehensive support to families will reduce their suffering.
An Instant Interest Oriented Recommendation Agent Based on SVDD and Schedule
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.239-250
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to detect the instant interest in mobile commerce environments, an interactive recommender agent was proposed based on schedules and the algorithm of support vector data description. The agent residing in smart phones obtained the user’s instant interest by comparing the current latitude, longitude and speed of the user’s geographic positions with the preset schedule using support vector data description algorithm. If the current position was in the hypersphere or the tolerant hypersphere, the user were taken as be adherent to the schedule, otherwise, the user would be prompt to confirm whether he or she is adherent or deviated to the schedule. Based on the result of SVDD comparison, a process of determining the behavior states of the user was proposed. And some techniques of interaction between phones and the users were discussed based on vibrations, ringtones, and graphical interfaces. At last, an experiment was conducted to verify the proposed agent, and the result proved that the agent was effective.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.251-262
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The high strength aluminium alloys exhibits low weldability due to poor solidification microstructure, porosity in the fusion zone and lose their mechanical properties when they are welded by fusion welding techniques. Friction stir welding (FSW) is a promising technique to retain the properties of the alloy as the joining take place in the solid state. Even though mechanical properties of the welds are better, corrosion resistance of welds gets affected by the microstructural changes that occur during welding. In the present work the effect of post weld treatments viz. peak ageing (T6), overaging (T73), retrogression and retrogression & reaging (RRA) on the mechanical properties and stress corrosion resistance is studied. It was observed that Retrogression and RRA treatments improved the resistance to stress corrosion cracking and maintained the mechanical properties. The resistance to stress corrosion is improved in RRA and Retrogression condition with the minimum loss of weld strength. This is attributed to the dissolution, re-precipitation and re-distribution of precipitates.
Query Suggestion Based on Theme and Context
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.263-276
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Query suggestion has become one of the most fundamental features of search engines. It attempts to suggest a series of similar queries for improving the search effectiveness. The paper proposed a new query suggestion method which is based on themes and context. Different from previous work, it measure similar queries from the level of semantic level and a new similar queries metric is presented. Furthermore, how to choose similar queries for suggestion is discussed and a new method is proposed. In the new query suggestion method, not only theme, but also query context has been taken into considerate. Experiments show that the new query suggestion method significantly outperformed than related works.
Solving UTP Containing Combining Classes using GA
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.277-286
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
House Rent Estimation in Dhaka City by Multi Layer Perceptions Neural Network
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.287-300
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper attempts to build an artificial neural network that can estimate the median price of a home in a neighborhood described by forty demographic attributes in areas of Dhaka City namely Dhanmondi, Baridhara, Gulshan, Mirpur, Uttara and Old Dhaka. A structured questionnaire was used to collect the relevant data and the housing data sets was used to develop constant quality price indices using traditional econometric techniques and using neural networks incorporating genetic algorithms. Factors including house size, house age, house type, number of bedrooms, number of bathrooms, number of garages, amenities around the house and geographical location are considered. The analysis indicates that neural networks act as real alternative to the econometric methods. In this paper thirteen conditional attributes have been considered to estimate the house rent. This paper provides some indicative policy guidelines to handle the house rent problem in the Dhaka City and suggests that a rent controller should be appointed for each ward and maximum rents for particular areas should be gazette and the rents should be paid through banks.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.301-310
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Internal resistance of the battery can really reflect its own characteristics, which including health status of the battery, inconsistency, state of charge, thermal runaway. On-line measurement of internal resistance can real-time monitor the running state of each battery and accurately, can report fault state of the battery and handle fault in time. This paper implements the practical engineering module of on-line measurement of internal resistance of lithium ion battery for EV (Electric Vehicle) using AC analysis. The detection precision and stability of the module are less than 0.3%. Based on experiments, the paper studies the stability and temperature characteristic of internal resistance of lithium battery. It also studies the relationship between the internal resistance and SOC, charging current with experiments. This paper analyzes the relationship between the internal resistance and default of the battery, such as inconsistency of batteries, excessive charging current, changing of work state, overcharging.
An Enhanced Negotiation-Style Framework for Requirements Change
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.311-322
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
There are many uncontrolled requirements changes existed in the software requirements engineering. Currently, under the premise of managing the software requirements changes using the logic-based technique, there is a framework that be proposed by Ke-Dian Mu etc based on Booth Negotiation-Style which managed the requirements changes conveniently and effectively. On the basis of the Mu's framework, this paper presents a selection strategy for selecting the negotiation scheme, which perfected the part that can be improved and managed the software requirements changes flexibly and effectively.
Some Parametric studies on Vivaldi Antenna
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.323-328
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Purpose of this paper is to study parametrically the impedance and radiation characteristics of a Vivaldi Antenna [1]. Usually, the performance of Vivaldi is sensitive to the parameters, the effects of major geometry parameters of the radiators and feeding transition on antenna performance are investigated across the frequency range of 3.1 to 10.6 GHz. The Vivaldi elements are fed by broadband microstrip-to-slotline baluns. A 2:1 bandwidth (3.4 to 7 GHz) was achieved for VSWR, gain and cross-polarization isolation. The design iteration, simulations results are presented. The information derived from this study provides guidelines for the design and optimization of the Vivaldi antenna which are widely used for UWB applications.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.329-338
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
C2C e-commerce is more special in several e-commerce modes, both trade sides are retail customers, the credit problems depend on the management coming from the third party trading platform entirely, lacks of initiative in this management, and the one-way real-name certification leads to the problem of asymmetric credit in C2C transactions, credit asymmetry is the root of a lot of credit problems in C2C transactions. To this end, in this paper the dynamic weighted trust evaluation model based on bidirectional authentication mechanism is established, and in order to solve the inconvenience comes from buyer real-name authentication, this model put forward a unified platform for buyer's, the problem of asymmetric credit is solved well, at the same time to ensure the convenience of authentication and the confidentiality of information, unified authentication management is good for integrating various trading platform, makes certification more reliable. In this model all the factors affecting credit will be considered synthetically, including the transaction amount, transaction time, evaluation user types etc, effective to identify the type of evaluation users, it is well to reduce all the behaviors such as credit hype and fraudulent trading etc, the calculation results of credit finally will be reflected by dynamic graph, makes the evaluation results more intuitive and easy to understand credit trend of evaluated user.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.7 No.4 2014.08 pp.339-348
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In Video coding, Motion Estimation(ME) is the major step to remove the temporal redundancy between adjacent frames. Several algorithms have been developed for acceleration of ME by reducing the number of computations. In this paper, we propose, two- step motion estimation technique to minimize the computational overhead of general full search block matching motion estimation algorithm. In our proposed methodology, we first find the matching block using the trace and upon match, the Sum of Absolute Difference (SAD) is calculated for the entire block in order to ensure the best match motion prediction. In trace matching, the number of computations observed are O(n) rather than O(n2)in case of full search. Hence, the two- step methodology reduces the computational overhead and also ensures compression quality comparable with the existing fast motion search techniques.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.