期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Expert recommendation system based on analyzing expertise and networks of human resources in National Science & Technology Information Service 被引量:2
1
作者 YANG Myung-seok KANG Nam-kyu +3 位作者 KIM Yun-jeong KIM Jae-soo CHOI Kwang-nam KIM Young-kuk 《Journal of Central South University》 SCIE EI CAS 2013年第8期2212-2218,共7页
This work aims to implement expert and collaborative group recommendation services through an analysis of expertise and network relations NTIS. First of all, expertise database has been constructed by extracting keywo... This work aims to implement expert and collaborative group recommendation services through an analysis of expertise and network relations NTIS. First of all, expertise database has been constructed by extracting keywords after indexing national R&D information in Korea (human resources, project and outcome) and applying expertise calculation algorithm. In consideration of the characteristics of national R&D information, weight values have been selected. Then, expertise points were calculated by applying weighted values. In addition, joint research and collaborative relations were implemented in a knowledge map format through network analysis using national R&D information. 展开更多
关键词 human networks network analysis NTIS R&D information
在线阅读 下载PDF
A case study of customer satisfaction for information technology solutions 被引量:1
2
作者 Sung Yun YU Jinsoo PARK +2 位作者 Jin KIM Hyung Jin LEE Hee Jun YOON 《Journal of Central South University》 SCIE EI CAS 2014年第11期4279-4285,共7页
There are numerous information technology solutions including hardware and software. A company that provides the solution should have knowledge of the customer needs in the purpose of sailing strategy or upgrade polic... There are numerous information technology solutions including hardware and software. A company that provides the solution should have knowledge of the customer needs in the purpose of sailing strategy or upgrade policy. The needs are also directly connected to the user satisfaction. However, the users have respective points of view in the needs as well as they may not identify the requirements to improve the solution. SERVQUAL can be an appropriate method to define and measure the customer satisfaction for the information technology solutions. As a case study of the customer satisfaction, the modified SERVQUAL items and scoring method are applied to a cyber-infrastructure system named CyberL ab in Korea. The measurement results of user satisfaction for CyberL ab are provided to confirm that our proposed method performs as we intended. From the results, we can score the satisfaction level of users and identify their needs in the various aspects. The total user satisfaction level for CyberL ab is scored by 88.3. 展开更多
关键词 cyber-infrastructure customer satisfaction user satisfaction SERVQUAL
在线阅读 下载PDF
Comparisons of three data storage models in parametric temporal databases 被引量:5
3
作者 Seo-Young NOH Shashi K. GADIA Haengjin JANG 《Journal of Central South University》 SCIE EI CAS 2013年第7期1919-1927,共9页
The parametric temporal data model captures a real world entity in a single tuple, which reduces query language complexity. Such a data model, however, is difficult to be implemented on top of conventional databases b... The parametric temporal data model captures a real world entity in a single tuple, which reduces query language complexity. Such a data model, however, is difficult to be implemented on top of conventional databases because of its unfixed attribute sizes. XML is a matured technology and can be an elegant solution for such challenge. Representing data in XML trigger a question about storage efficiency. The goal of this work is to provide a straightforward answer to such a question. To this end, we compare three different storage models for the parametric temporal data model and show that XML is not worse than any other approaches. Furthermore, XML outperforms the other storages under certain conditions. Therefore, our simulation results provide a positive indication that the myth about XML is not true in the parametric temporal data model. 展开更多
关键词 data representation parametric data model XML-based representation
在线阅读 下载PDF
Fast distributed and parallel pre-processing on massive satellite data using grid computing
4
作者 Wongoo Lee Yunsoo Choi +1 位作者 Kangryul Shon Jaesoo Kim 《Journal of Central South University》 SCIE EI CAS 2014年第10期3850-3855,共6页
Distributed/parallel-processing system like sun grid engine(SGE) that utilizes multiple nodes/cores is proposed for the faster processing of large sized satellite image data. After verification, distributed process en... Distributed/parallel-processing system like sun grid engine(SGE) that utilizes multiple nodes/cores is proposed for the faster processing of large sized satellite image data. After verification, distributed process environment for pre-processing performance can be improved by up to 560.65% from single processing system. Through this, analysis performance in various fields can be improved, and moreover, near-real time service can be achieved in near future. 展开更多
关键词 satellite data image processing computation intensive computing
在线阅读 下载PDF
A hardware-based algorithm for virtual machine provisioning in a private cloud 被引量:1
5
作者 Amol JAIKAR Gyeong-Ryoon KIM +1 位作者 Dada HUANG Seo-Young NOH 《Journal of Central South University》 SCIE EI CAS 2014年第11期4291-4295,共5页
Cloud computing is becoming a key factor in the market day by day. Therefore, many companies are investing or going to invest in this sector for development of large data centers. These data centers not only consume m... Cloud computing is becoming a key factor in the market day by day. Therefore, many companies are investing or going to invest in this sector for development of large data centers. These data centers not only consume more energy but also produce greenhouse gases. Because of large amount of power consumption, data center providers go for different types of power generator to increase the profit margin which indirectly affects the environment. Several studies are carried out to reduce the power consumption of a data center. One of the techniques to reduce power consumption is virtualization. After several studies, it is stated that hardware plays a very important role. As the load increases, the power consumption of the CPU is also increased. Therefore, by extending the study of virtualization to reduce the power consumption, a hardware-based algorithm for virtual machine provisioning in a private cloud can significantly improve the performance by considering hardware as one of the important factors. 展开更多
关键词 virtualization virtual machine algorithm power consumption data center
在线阅读 下载PDF
PIR-based data integrity verification method in sensor network
6
作者 Yong-Ki Kim Kwangnam Choi +1 位作者 Jaesoo Kim JungHo Seok 《Journal of Central South University》 SCIE EI CAS 2014年第10期3883-3888,共6页
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ... Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation. 展开更多
关键词 data integrity VERIFICATION private information retrieval sensor network
在线阅读 下载PDF
Performance evaluations on inner vs. outer decomposition first parallel join algorithms for two nested loop joins
7
作者 Seo-Young NOH Heejun YOON +2 位作者 Il-Yeon YEO Yoon-su JEONG Hyungwoo PARK 《Journal of Central South University》 SCIE EI CAS 2014年第10期3873-3882,共10页
Two popular traditional join algorithms and their parallel versions are introduced. When designing join algorithms in serial computing environment, decomposing inner relation is considered as the right direction to sa... Two popular traditional join algorithms and their parallel versions are introduced. When designing join algorithms in serial computing environment, decomposing inner relation is considered as the right direction to save disk I/Os. However, two different decomposition algorithms are compared, such as inner vs. outer decomposition first algorithms for tuple-based and block-based nested loop joins, showing that the proposed approach is 20% better than general approach. Also lemmas are proved, when we have to use the outer decomposition first parallel join algorithms. 展开更多
关键词 parallel join performance inner decomposition outer decomposition
在线阅读 下载PDF
Enhanced biometric encryption algorithm for private key protection in BioPKI system
8
作者 Cheol-Joo Chae Kwang-Nam Choi +2 位作者 Kiseok Choi Jae-Soo Kim Yong Ju Shin 《Journal of Central South University》 SCIE EI CAS 2014年第11期4286-4290,共5页
Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in ... Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in this PKI system. Recently, studies have been conducted on Bio PKI system that uses the biometric information of users in order to replace the password type of private key protection in PKI system. However, Bio PKI system also has vulnerability in that biometric information used for protection of private key cannot be reused once it is stolen or lost. So, we propose the method to protect the private key using FIDSEQi which binds sequence to biometric information. The proposed method enhances reusability of biometric information and presents higher attack complexity than the method of authentication by cross matching single biometric information. 展开更多
关键词 BioPKI system fingerprint biometric encryption secret share
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部