• Title/Summary/Keyword: 웹로그 분석

Search Result 269, Processing Time 0.022 seconds

The Study of e-Learning Status in Nursing Student (간호학생의 e-Learning 학습현황에 대한 연구)

  • Kim, Sook-Young;Ju, Se-Jin
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.12 no.1
    • /
    • pp.86-94
    • /
    • 2006
  • Purpose: The purpose of this study is to identify the nursing student's e-Learning status. Method: The 48 nursing students were subject to this study. They were introduced to use 'understanding of ABGA' site. And the web log data was analysed. Result: General learning status in nursing education, difference of learning status in each learning type, and 'quiz' area learning status were analysed to see the nursing student's e-Learning status. The result of study showed that the participants didn't get learning that site designer had in mind to give them. Conclusion: It is important to figure out students' actual learning behaviors and reactions of feedbacks. Also, web log data could provide useful data that affect student's behaviors. Based on this study result, the following is suggested. The way to give them effective learning should be considered by the instructor who knows the unsincere type students through web log data.

  • PDF

Implementation of Linux Server System Monitoring and Control Solution for Administrator (관리자를 위한 리눅스 서버 시스템 모니터링 및 제어 솔루션 구현)

  • Yoon, Hyo-Jun;Park, Byung-Ho;Choi, Yong-Seok;Kim, Chong-Soo;Seong, Hyeon-Kyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.125-128
    • /
    • 2010
  • Linux server offers various kinds of service including web, FTP, and SSH. The users of these kinds of service are trying to hack by making use of it. That’s why some countermeasures are required for the security of the server. In this thesis, each type of service log of multiple Linux server was analyzed, and a solution was developed to monitor and control the multiple Linux server system not based on Linux but based on Windows.

  • PDF

Analysis of Web Log for e-CRM on B2B of the Make-To-Order Company (수주생산기업 B2B에서 e-CRM을 위한 웹 로그 분석)

  • Go, Jae-Moon;Seo, Jun-Yong;Kim, Woon-Sik
    • IE interfaces
    • /
    • v.18 no.2
    • /
    • pp.205-220
    • /
    • 2005
  • This study presents a web log analysis model for e-CRM, which combines the on-line customer's purchasing pattern data and transaction data between companies in B2B environment of make-to-order company. With this study, the customer evaluation and the customer subdivision are available. We can forecast the estimate demands with periodical products sales records. Also, the purchasing rate per each product, the purchasing intention rate, and the purchasing rate per companies can be used as the basic data for the strategy for receiving the orders in future. These measures are used to evaluate the business strategy, the quality ability on products, the customer's demands, the benefits of customer and the customer's loyalty. And it is used to evaluate the customer's purchasing patterns, the response analysis, the customer's secession rate, the earning rate, and the customer's needs. With this, we can satisfy various customers' demands, therefore, we can multiply the company's benefits. And we presents case of the 'H' company, which has the make-to-order manufacture environment, in order to verify the effect of the proposal system.

A Study on the Data Collection Methods based Hadoop Distributed Environment (하둡 분산 환경 기반의 데이터 수집 기법 연구)

  • Jin, Go-Whan
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.1-6
    • /
    • 2016
  • Many studies have been carried out for the development of big data utilization and analysis technology recently. There is a tendency that government agencies and companies to introduce a Hadoop of a processing platform for analyzing big data is increasing gradually. Increased interest with respect to the processing and analysis of these big data collection technology of data has become a major issue in parallel to it. However, study of the collection technology as compared to the study of data analysis techniques, it is insignificant situation. Therefore, in this paper, to build on the Hadoop cluster is a big data analysis platform, through the Apache sqoop, stylized from relational databases, to collect the data. In addition, to provide a sensor through the Apache flume, a system to collect on the basis of the data file of the Web application, the non-structured data such as log files to stream. The collection of data through these convergence would be able to utilize as a basic material of big data analysis.

A Usage Pattern Analysis of the Academic Database Using Social Network Analysis in K University Library (사회 네트워크 분석에 기반한 도서관 학술DB 이용 패턴 연구: K대학도서관 학술DB 이용 사례)

  • Choi, Il-Young;Lee, Yong-Sung;Kim, Jae-Kyeong
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.1
    • /
    • pp.25-40
    • /
    • 2010
  • The purpose of this study is to analyze the usage pattern between each academic database through social network analysis, and to support the academic database for users's needs. For this purpose, we have extracted log data to construct the academic database networks in the proxy server of K university library and have analyzed the usage pattern among each research area and among each social position. Our results indicate that the specialized academic database for the research area has more cohesion than the generalized academic database in the full-time professors' network and the doctoral students' network, and the density, degree centrality and degree centralization of the full-time professors' network and the doctoral students' network are higher than those of the other social position networks.

Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns (웹사이트 구조와 사용패턴 분석을 통한 CSRF 공격 탐지)

  • Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.9-15
    • /
    • 2011
  • It is difficult to identify attack requests from normal ones when those attacks are based on CSRF which enables an attacker transmit fabricated requests of a trusted user to the website. For the protection against the CSRF, there have been a lot of research efforts including secret token, custom header, proxy, policy model, CAPTCHA, and user reauthentication. There remains, however, incapacitating means and CAPTCHA and user reauthentication incur user inconvenience. In this paper, we propose a method to detect CSRF attacks by analyzing the structure of websites and the usage patterns. Potential victim candidates are selected and website usage patterns according to the structure and usage logs are analyzed. CSRF attacks can be detected by identifying normal usage patterns. Also, the proposed method does not damage users' convenience not like CAPTCHA by requiring user intervention only in case of detecting abnormal requests.

A Study on the Development of School Library Mobile App Service Based on User Experience (사용자 경험을 기반으로 한 학교도서관 모바일 앱 서비스 개발에 관한 연구)

  • Park, Sora;Lee, Mihwa
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.2
    • /
    • pp.49-67
    • /
    • 2021
  • The school library provides a mobile web service that allows access to the library catalog system, and provides services that reflect the needs of search and consider the characteristics of mobile devices. Therefore, this study conducted a literature review, an analysis of the current status of school library mobile web services, and a survey of the mobile service user experience of students and teachers to find the contents and service plans for school library mobile app services that meet the school library mobile needs. Based on the survey, the contents and design plan of the school library DLS mobile service was prepared. First, the steps were reduced from step 4 to step 3. In the first step, solution of screen clipping errors in registering as a member and various login platforms for accessibility are needed. In the second step, integrated search and detailed search, provision of materials for use and reading education, post-booking activities, guides and announcements on the use of the affiliated school library, inter-loan, and e-books are provided as main menu. In the third step, it was proposed to provide related functions such as reservations as well as the display of the detailed screen of the search results of the collection. This study can be used not only to develop dedicated mobile app services, but also to change current web-based mobile services.

An Agent System for Efficient VOD Services on Web (효율적 웹 기반 VOD 서비스를 위한 에이전트 시스템)

  • Lee Kyung-Hee;Han Jeong-Hye;Kim Dong-Ho
    • Journal of Digital Contents Society
    • /
    • v.2 no.1
    • /
    • pp.73-79
    • /
    • 2001
  • Most of the existing algorithms try to disseminate the multimedia contents of internet service provider(ISP), without taking into account the needs and characteristics of specific websites including e-learning systems with web-based .educational contents. Sometimes the client must select the best one among the replicated repositories. However, this is a less reliable approach because clients' selections are made without prior information on server load capacity. In this paper we propose an agent system inspired by the need of improving QoS of delivering web-based educational multimedia contents without incurring long access delays. This agent system consists of three components, Analyzer, Knowledge Base, and Automaton embedded the capacity algorithm. It analyzes and investigates traffic information collected from individual replicated server by learners' requests, and selects a server which is available and is expected to provide the fastest latency time and the lowest loaded capacity, and achieves high performance by dynamic replicating web resources among multiple repositories.

  • PDF

A Study on the e-Learning Communities Interaction Under the CSCL by Using Network Mining (컴퓨터지원협동학습 환경 하에서 네트워크 마이닝을 통한 학습자 상호작용연구)

  • Chung, Nam-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.17-29
    • /
    • 2005
  • The purpose of the study was to explore the potential of the Social Network Analysis as an analytical tool for scientific investigation of learner-learner, or learner-tutor interaction within a Computer Supported Corporative Learning (CSCL) environment. Theoretical and methodological implication of the Social Network Analysis had been discussed. Following theoretical analysis, an exploratory empirical study was conducted to test statistical correlation between traditional performance measures such as achievement and team contribution index, and the centrality measure, one of the many quantitative measures the Social Network Analysis provides. Results indicate the centrality measure was correlated with the higher order teaming performance and the peer-evaluated contribution indices. An interpretation of the results and their implication to instructional design theory and practices were provided along with some suggestions for future research.

  • PDF

An Integrated Data Mining Model for Customer Relationship Management (고객관계관리를 위한 통합 데이터마이닝 모형 연구)

  • Song, In-Young;Yi, Tae-Seok;Shin, Ki-Jeong;Kim, Kyung-Chang
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.83-99
    • /
    • 2007
  • Nowadays, the advancement of digital information technology resulting in the increased interest of the management and the use of information has given stimulus to the research on the use and management of information. In this paper, we propose an integrated data mining model that can provide the necessary information and interface to users of scientific information portal service according to their respective classification groups. The integrated model classifies users from log files automatically collected by the web server based on users' behavioral patterns. By classifying the existing users of the web site, which provides information service, and analyzing their patterns, we proposed a web site utilization methodology that provides dynamic interface and user oriented site operating policy. In addition, we believe that our research can provide continuous web site user support, as well as provide information service according to user classification groups.

  • PDF