• Title/Summary/Keyword: 웹 서버

Search Result 2,130, Processing Time 0.026 seconds

An Integrated Data Mining Model for Customer Relationship Management (고객관계관리를 위한 통합 데이터마이닝 모형 연구)

  • Song, In-Young;Yi, Tae-Seok;Shin, Ki-Jeong;Kim, Kyung-Chang
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.83-99
    • /
    • 2007
  • Nowadays, the advancement of digital information technology resulting in the increased interest of the management and the use of information has given stimulus to the research on the use and management of information. In this paper, we propose an integrated data mining model that can provide the necessary information and interface to users of scientific information portal service according to their respective classification groups. The integrated model classifies users from log files automatically collected by the web server based on users' behavioral patterns. By classifying the existing users of the web site, which provides information service, and analyzing their patterns, we proposed a web site utilization methodology that provides dynamic interface and user oriented site operating policy. In addition, we believe that our research can provide continuous web site user support, as well as provide information service according to user classification groups.

  • PDF

An Implementation of Speech DB Gathering System Using VoiceXML (VoiceXML을 이용한 음성 DB 수집 시스템 구현)

  • Kim Dong-Hyun;Roh Yong-Wan;Hong Kwang-Seok
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.39-50
    • /
    • 2005
  • Speech DB is basically required factor when we are study for phonetics, speech recognition and speech synthesis and so on. The quantity and quality of speech DB decide the efficiency of system that we develop. therefore. speech DB has an extremely important factor, Recently, development of the various telephone service technique such as voice portal. it is actual condition where the necessity of collection of telephone speech DB. The existing IVR application telephone speech DB collection system used C/C++ language or the exclusive development tool. Thus it is the actual condition where the recycle of each application service for resources is difficult and have a problem of many labors and time necessity. But. VoiceXML is a language having tag form ipredicated in XML. which has easy and simple grammar system. Therefore, if we make a few efforts we could draw up easily. it has a merit reducing labors and time, Also, VoiceXML has many advantages of various telephone speech DB gathering because of changing contents of DB. In this paper, we introduce telephone speech DB gathering system which is the mast important factor for development of speech information processing technique.

  • PDF

A study on the detection of DDoS attack using the IP Spoofing (IP 스푸핑을 통한 DDoS 공격 탐지 방안에 대한 연구)

  • Seo, Jung-Woo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.147-153
    • /
    • 2015
  • Since the DoS(Denial of Service) attack is still an important vulnerable element in many web service sites, sites including public institution should try their best in constructing defensive systems. Recently, DDoS(Distributed Denial of Service) has been raised by prompting mass network traffic that uses NTP's monlist function or DoS attack has been made related to the DNS infrastructure which is impossible for direct defense. For instance, in June 2013, there has been an outbreak of an infringement accident where Computing and Information Agency was the target. There was a DNS application DoS attack which made the public institution's Information System impossible to run its normal services. Like this, since there is a high possibility in having an extensive damage due to the characteristics of DDoS in attacking unspecific information service and not being limited to a particular information system, efforts have to be made in order to minimize cyber threats. This thesis proposes a method for using TTL (Time To Live) value in IP header to detect DDoS attack with IP spoofing, which occurs when data is transmitted under the agreed regulation between the international and domestic information system.

A Design and Implementation of Virtual Grid for Reducing Frequency of Continuous Query on LBSNS (LBSNS에서 연속 질의 빈도 감소를 위한 가상그리드 기법의 설계 및 구현)

  • Lee, Eun-Sik;Cho, Dae-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.752-758
    • /
    • 2012
  • SNS(Social Networking Services) is oneline service that enable users to construct human network through their relation on web, such as following relation, friend relation, and etc. Recently, owing to the advent of digital devices (smart phone, tablet PC) which embedded GPS some applications which provide services with spatial relevance and social relevance have been released. Such an online service is called LBSNS. It is required to use spatial filtering so as to build the LBSNS system that enable users to subscribe information of interesting area. For spatial filtering, user and tweet attaches location information which divide into static property presenting fixed area and dynamic property presenting user's area changed along the moving user. In the case of using a location information including dynamic property, Continuous query occurred from the moving user causes the problem in server. In this paper, we propose spatial filtering algorithm using Virtual Grid for reducing frequency of query, and conclude that frequency of query on using Virtual Grid is 93% decreased than frequency of query on not using Virtual Grid.

An Integrated Authentication System for Mobile Codes (이동코드를 위한 통합 인증 시스템)

  • Bae, Seong-Hun;Lee, Su-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.535-542
    • /
    • 2001
  • Mobile codes such as Java, Java-Script, ActiveX, and Script code are loaded into a client system first and then run without any notice to the client user. Executing code by this mechanism may cause various security problems such as flowing out system information, deleting or modifying files, and exhausting system resources. In this paper we propose an integrated authentication system to establish the uniform security countermeasure on various mobile codes. The system helps to solve to problems mentioned above. An integrated authentication system allows to load into an interpreter using ACL (Access Control List) which sets up an access authority to the executable contents and communicates with an interpreter using client/server model.

  • PDF

Multiple ASR for efficient defense against brute force attacks (무차별 공격에 효과적인 다중 Address Space Randomization 방어 기법)

  • Park, Soo-Hyun;Kim, Sun-Il
    • The KIPS Transactions:PartC
    • /
    • v.18C no.2
    • /
    • pp.89-96
    • /
    • 2011
  • ASR is an excellent program security technique that protects various data memory areas without run-time overhead. ASR hides the addresses of variables from attackers by reordering variables within a data memory area; however, it can be broken by brute force attacks because of a limited data memory space. In this paper, we propose Multiple ASR to overcome the limitation of previous ASR approaches. Multiple ASR separates a data memory area into original and duplicated areas, and compares variables in each memory area to detect an attack. In original and duplicated data memory areas variables are arranged in the opposite order. This makes it impossible to overwrite the same variables in the different data areas in a single attack. Although programs with Multiple ASR show a relatively high run-time overhead due to duplicated execution, programs with many I/O operations such as web servers, a favorite attack target, show 40~50% overhead. In this paper we develop and test a tool that transforms a program into one with Multiple ASR applied.

A Collaborative Recommendation Method based on Fuzzy Associative Memory (퍼지연상기억장치에 기반한 협력 추천 방법)

  • 이동섭;고일주;김계영
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.8
    • /
    • pp.1054-1061
    • /
    • 2004
  • At recent, people can easily access to information by Internet to be rapidly evolving. And also, the amount is rapidly increasing. So the techniques, to automatically extract the required information are very important to reduce the time and the effort for retrieving information. In this paper, we describe a collaborative filtering system for automatically recommending high-quality information to users with similar interests on arbitrarily narrow information domains. It asks a user to rate a gauge set of items. It then evaluates the user's rates and suggests a recommendation set of items. We interpret the process of evaluation as an inference mechanism that maps a gauge set to a recommendation set. We accomplish the mapping with FAM (Fuzzy Associative Memory). We implemented the suggested system in a Web server and tested its performance in the domain of retrieval of technical papers, especially in the field of information technologies. The experimental results show that it may provide reliable recommendations.

A Development of System for Flood Runoff Forecasting using Neural Network Model (신경망 모형을 이용한 홍수유출 예측시스템의 재발)

  • Ahn, Sang-Jin;Jun, Kye-Won
    • Journal of Korea Water Resources Association
    • /
    • v.37 no.9
    • /
    • pp.771-780
    • /
    • 2004
  • The purpose of this study is to test a development of system for flood runoff forecasting using neural network model. As the forecasting models for flood runoff the neural network model was tested with the observed flood data at Gongju and Buyeo stations. The neural network model consists of input layer, hidden layer, and output layer. For the flood events tested rainfall and runoff data were the input to the input layer and the flood runoff data were used in the output layer. To make a choice the forecasting model which would make up of runoff forecasting system properly, real-time runoff of river when flood periods were forecasted by using neural network model and state-space model. A comparison of the results obtained by the two forecasting models indicated the superiority and reliability of the neural network model over the state-space model. The neural network model was modified to work in the Web and developed to be the basic model of the forecasting system for the flood runoff. The neural network model developed to be used in the Web was loaded into the server and was applied to the main stream of Geum river. For the main stage gauging stations mentioned above the applicability of the selected forecasting model, the Neural Network Model, was verified in the Web.

Development of Mobile Context Awareness Restaurant Recommendation Services (모바일 상황인식 추천맛집 서비스 개발)

  • Ryu, Jong-Min;Hong, Chang-Pyo;Kang, Kyung-Bo;Kang, Dong-Hyun;Yang, Doo-Yeong;Jwa, Jeong-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.138-145
    • /
    • 2007
  • Mobile network evolution and development of USN technologies introduce new business model based on context awareness. Cellular operators provide friend finding service using cell based location information and telematics service using GPS location information. Recently cellular operators provide yellow page service based cell based location information. In this paper, we develop mobile tour application on WIPI platform based on location information. Mobile tour information services provide the best information based on context awareness using user location information from LBS(Location Based Service) Platform, season, weather conditions, time from Web server, and personal preference information stored in database. Mobile tour information service application is developed on WIPI platform.

A Web-based Microcontroller Remote Laboratory for Sharing Resources (자원공유를 위한 웹기반 마이크로콘트롤러 원격 실험실)

  • Moon, Il-Hyeon;Han, Sae-Ron;Cho, Kwan-Sun;Ahn, Dal;Lim, Jong-Sik;Jeon, Heung-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1184-1192
    • /
    • 2008
  • There have been a large number of trials of the experimental education in engineering using virtual laboratories implemented in virtual space, namely on the Web. Although virtual education is regarded as an effective educational means that overcomes the limit of time and space and bring high teaming effects, the problem of lack of reality must be solved. The present study proposed and implemented a real-time remote laboratory as a solution for the problem of lack of reality in virtual education. The remote laboratory provides functions with which learners can perform experiments by remote-controlling circuits and equipment related to experiments and practices on the Web and gets data and image information, so through it learners can make realistic experiments at any time and in any place. The remote laboratory module based on Internet open sources such as JAVA Web start technology, FTP technology and Telnet technology in server-client environment can be implemented at low cost, and is effectively applicable to engineering experiment education in various areas related to real-time hardware control.