• Title/Summary/Keyword: 인터넷 광고기법

Search Result 90, Processing Time 0.031 seconds

A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment (씬클라이언트 환경에서 클라우드 컴퓨팅을 이용한 N-Screen 세션 관리 기반의 N-Screen 서비스 프레임워크)

  • Alsaffar, Aymen Abdullah;Song, Biao;Hassan, Mohammad Mehedi;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.21-32
    • /
    • 2012
  • We develop architecture of a virtual aggregation gateway (VAG) which enables composite application streaming based on N-Screen-as-a-Service (NaaS) using cloud computing in thin-client environment. We also discuss the problem of server computing burden in large scale multi-client case for screens sharing with composite application streaming over the internet. In particular, we propose an efficient Framework of N-Screen Session Manager which manages all media signaling that are necessary to deliver demanded contents. Furthermore, it will provides user with playback multimedia contents method (TV Drama, Ads, and Dialog etc) which is not considered in other research papers. The objectives of proposing N-Screen Session Manager are to (1) manage session status of all communication sessions (2) manage handling of received request and replies (3) allow users to playback multimedia contents anytime with variety of devices for screen sharing and (4) allow users to transfer an ongoing communication session from one device to another. Furthermore, we discuss the major security issues that occur in Session Initiation Protocol as well as minimizing delay resulted from session initiations (playback or transfer session).

A study of improve vectorising technique on the internet (인터넷에서의 개선된 벡터라이징 기법에 관한 연구)

  • 김용호;이윤배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.271-281
    • /
    • 2002
  • Currently, most web designers guarante high quality using bitmap graphics as fixed font size, but that has defects about file size and flexibility. Especially, to provide high quality of banner and advertise characters, after you should use a bitmap edit program, and then we should follow the method we add that program to HTML documents as bitmap data. In this study, as I show a couple of new tags in front of HTML documents, I show methods which can be presented diverse effects. When text information are stored, because we print out a screen with simple control points and outside information, it can be possible for us to express the same quality of Hangul characters like printed documents in a web browser. Regardless of the second class of platform, we can make it possible the character expression with exact character expressions and diverse effects.

A Method for Spam Message Filtering Based on Lifelong Machine Learning (Lifelong Machine Learning 기반 스팸 메시지 필터링 방법)

  • Ahn, Yeon-Sun;Jeong, Ok-Ran
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1393-1399
    • /
    • 2019
  • With the rapid growth of the Internet, millions of indiscriminate advertising SMS are sent every day because of the convenience of sending and receiving data. Although we still use methods to block spam words manually, we have been actively researching how to filter spam in a various ways as machine learning emerged. However, spam words and patterns are constantly changing to avoid being filtered, so existing machine learning mechanisms cannot detect or adapt to new words and patterns. Recently, the concept of Lifelong Learning emerged to overcome these limitations, using existing knowledge to keep learning new knowledge continuously. In this paper, we propose a method of spam filtering system using ensemble techniques of naive bayesian which is most commonly used in document classification and LLML(Lifelong Machine Learning). We validate the performance of lifelong learning by applying the model ELLA and the Naive Bayes most commonly used in existing spam filters.

Image Mosaic from a Video Sequence using Block Matching Method (블록매칭을 이용한 비디오 시퀀스의 이미지 모자익)

  • 이지근;정성태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1792-1801
    • /
    • 2003
  • In these days, image mosaic is getting interest in the field of advertisement, tourism, game, medical imaging, and so on with the development of internet technology and the performance of personal computers. The main problem of mage mosaic is searching corresponding points correctly in the overlapped area between images. However, previous methods requires a lot of CPU times and data processing for finding corresponding points. And they need repeated recording with a revolution of 360 degree around objects or background. This paper presents a new image mosaic method which generates a panorama image from a video sequence recorded by a general video camera. Our method finds the corresponding points between two successive images by using a new direction oriented 3­step block matching methods. Experimental results show that the suggested method is more efficient than the methods based on existing block matching algorithm, such as full search and K­step search algorithm.

The Discharge Measurement of Tancheon using LSPIV (LSPIV기법을 이용한 탄천(대곡교) 유량측정)

  • Kim, Seo-Jun;Yoon, Byung-Man;Yu, Kwon-Kyu;Joo, Yong-Woo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.911-915
    • /
    • 2007
  • 영상측정기법을 적용하여 경제적이고 효율적인 유속 측정 방법에 대하여 많은 연구들이 진행되어 왔다. 현재 이동식 LSPIV 시스템은 실험실의 수리모형실험과 현장의 국부적인 유속측정에 효율적으로 이용되고 있지만, 고정식 LSPIV 시스템의 적용에는 많은 문제점들이 있어서 현장 적용이 미루어져왔다. 고정식 LSPIV 시스템은 수문분석에 많이 의존하고 있는 현재의 홍수량 산정에 좀 더 정확한 유속과 수위를 동시에 고려할 수 있는 하천유량측정 시스템이다. 이는 과거 하천유량측정 시 많은 비용과 인력 그리고 위험성들을 대폭 줄일 수 있는 현장 모니터링 시스템의 구축을 가능하게 해줄 수 있다. 본 연구에서는 LSPIV (Large Scale Particle Image Velocimetry) 시스템을 탄천(대곡교)에 설치하여 연속적으로 유량 측정을 하였다. 탄천(대곡교)에 적용된 고정식 LSPIV 시스템은 유속측정을 위한 디지털 카메라 2대와 컴퓨터 그리고 수위 측정을 위한 DCU1104 초음파 수위계로 구성된다. 위의 현장 장비들에서 들어온 실시간 영상과 수위자료는 CDMA 무선통신을 이용하여 서버컴퓨터로 들어와서 인터넷에서 손쉽게 받아 볼 수 있다. 이와 같이 실시간으로 들어온 입력 자료는 LSPIV 프로그램을 이용하여 언제 어디에서나 비교적 정확한 유량을 산정할 수 있다. 또한 실시간으로 들어오는 하천 영상을 통해 실시간 현장 모니터링도 가능하게 되고 시간적으로 연속적인 영상을 얻을 수 있기 때문에 하천 유량 변화를 쉽게 알 수 있다. 따라서 과거 현장에서 어렵게 측정하여 얻을 수 있던 유속자료를 간단한 실시간 영상 분석만으로 구할 수 있으므로 앞으로 유량조사에 유용하게 활용될 수 있을 것이다. 입체 영상) 입체영상은 영화에서 시작되었으나, 20c후반기에 들어서면서 애니메이션 분야와 모바일, 광고 패널, 텔레비전등의 매체를 이용한 입체 영상의 개발로 인하여 특정 분야에 한정 시킬 수 없으므로 영상으로 칭한다. 입체 영상은 21c에 들어서면서 영상매체의 한 분야로 급부상하고 있다. 1900년 무렵부터 연구된 입체영화(3-Dimensional motion Picture)는 In여 년이 지난 지금 대중화를 눈앞에 두고 있다. 국내에서는 놀이 동산이나 박물관등에서 흔히 볼 수 있다. 하지만 앞으로는 HDW등의 대중화로 화질의 발전을 이룬 텔레비전 분야 등에서 실용화 될 전망이다. 국제적인 흐름과 함께 국내에서도 입체 영화에 대한 연구가 활성화 되어 영상산업의 한 주류로서 대두되고 있다. 이러한 상황에서 입체영상에 대한 이해와 콘텐츠(Contents)의 개발은 기술적인 진보에 발맞추어 준비되어야 한다. 본 논문은 이러한 기술적인 계보에 발맞춘 영상 콘텐츠 개발에 박차를 가하고자 앞으로의 발전분야에 대한 기술적인 면과 기법적인 면을 제시하여 기술만 앞서고 내용은 수입하는 수입국이기 보다는 미리 준비하여 비전문가나 타국의 기술에 선점 당하지 않는 분야로 성장할 수 있는 진보적인 영상 인들의 관심과 지속적인 연구를 독려하고자 한다.시민의 휴식 및 여가선용 공간으로 활용하기 위한 사업의 기초자료로 활용되며 이미 설계검토가 시작되었다. 본 연구결과는 유수지 및 저수지의 환경개선 사업의 선두적인 성공사례로 국내 타 지역의 유사한 사업에 있어 벤치마킹을 할 수 있는 훌륭한 사례가 될 것이다.요 생산이 증가하자 군신의 변별(辨別)과 사치를 이유로 강력하게 규제하여 백자의 확대와 발전에 걸림돌이 되었다. 둘째, 동

  • PDF

Keyword Analysis of Research on Consumption of Children and Adolescents Using Text Mining (텍스트마이닝을 활용한 아동, 청소년 대상 소비관련 연구 키워드 분석)

  • Jin, Hyun-Jeong
    • Journal of Korean Home Economics Education Association
    • /
    • v.33 no.4
    • /
    • pp.1-13
    • /
    • 2021
  • The purpose of this study is to identify trends and potential themes of research on consumption of children and adolescents for 20 years by analyzing keywords. The keywords of 869 studies on consumption of children and adolescents published in journals listed in Korean Citation Index were analyzed using text mining techniques. The most frequent keywords were found in the order of youth, youth consumers, consumer education, conspicuous consumption, consumption behavior, and character. As a result of analyzing the frequency of keywords by dividing into five-year periods, it was confirmed that the frequency of consumer education was significantly higher betwn 2006 and 2010. Research on ethical consumption has been active since 2011, and research has been conducted on various topics instead of without a prominent keyword during the most recent 5-year period. Looking at the keywords based on the TF-IDF, the keywords related to the environment and the Internet were the main keywords between 2001 and 2005. From 2006 to 2010, the TF-IDF values of media use, advertisement education, and Internet items were high. From 2011 to 2015, fair trade, green growth, green consumption, North Korean defector youths, social media, and from 2016 to 2020, text mining, sustainable development education, maker education, and the 2015 revised curriculum appeared as important themes. As a result of topic modeling, eight topics were derived: consumer education, mass media/peer culture, rational consumption, Hallyu/cultural industry, consumer competency, economic education, teaching and learning method, and eco-friendly/ethical consumption. As a result of network analysis, it was found that conspicuous consumption and consumer education are important topics in consumption research of children and adolescents.

Predicting tobacco risk factors by using social big data (소셜 빅데이터를 활용한 담배 위험 예측)

  • Song, Tae Min;Song, Juyoung;Cheon, Mi Kyung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.5
    • /
    • pp.1047-1059
    • /
    • 2015
  • This study will predict risk factors associated with cigarettes in Korea by analyzing the social big data collected from the internet such as blogs, cafes, and SNSes in Korea, using data mining techniques. The key analysis results are as follows. First, when "raising cigarette price"is mentioned online, the negative group (i.e., the proportion of people holding negative views about smoking) increased from 58.6% to 74.8%, and when "lung cancer" is mentioned, it increased to 73.1%. Second, with regard to cigarettes in general, the positive group (i.e., the proportion of people holding positive views about smoking) decreased by 5.6% after the raising of cigarette prices, while the negative group increased by 6.1%. Third, when policies related to "FCTC, raising cigarette price, non-smoking laws, smoking regulations, non-smoking ads, and nonsmoking business" are more frequently mentioned online, the positive group tended to decrease. Finally, when "non-smoking drugs, non-smoking patches, and non-smoking gums" are more frequently mentioned online, the positive group tended to decrease. However, when "electronic cigarettes and supplements" are more frequently mentioned online, the positive group increased.

A Study on Netwotk Effect by using System Dynamics Analysis: A Case of Cyworld (시스템 다이내믹스 기법을 이용한 네트워크 효과 분석: 싸이월드 사례)

  • Kim, Ga-Hye;Yang, Hee-Dong
    • Information Systems Review
    • /
    • v.11 no.1
    • /
    • pp.161-179
    • /
    • 2009
  • Nowadays an increasing number of Internet users are running individual websites as Blog or Cyworld. As this type of personal media has a great influence on communication among people, business comes to care about Network Effect, Network Software, and Social Network. For instance, Cyworld created the web service called 'Minihompy' for individual web-logs, and acquired 2.4milion users in 2007. Although many people assumed that the popularity of Minihompy, or Blog would be a passing fad, Cyworld has improved its service, and expanded its Network with various contents. This kind of expansion reflects survival efforts from infinite competitions among ISPs (Internet Service Provider) with focus on enhancing usability to users. However, Cyworld's Network Effect is gradually diminished in these days. Both of low production cost of service vendors and the low searching/conversing costs of users combine to make ISPs hard to keep their market share sustainable. To overcome this lackluster trend, Cyworld has adopted new strategies and try to lock their users in their service. Various efforts to improve the continuance and expansion of Network effect remain unclear and uncertain. If we understand beforehand how a service would improve Network effect, and which service could bring more effect, ISPs can get substantial help in launching their new business strategy. Regardless many diverse ideas to increase their user's duration online ISPs cannot guarantee 'how the new service strategies will end up in profitability. Therefore, this research studies about Network effect of Cyworld's 'Minihompy' using System-Dynamics method which could analyze dynamic relation between users and ISPs. Furthermore, the research aims to predict changes of Network Effect based on the strategy of new service. 'Page View' and 'Duration Time' can be enhanced for the short tenn because they enhance the service functionality. However, these services cannot increase the Network in the long-run. Limitations of this research include that we predict the future merely based on the limited data. We also limit the independent variables over Network Effect only to the following two issues: Increasing the number of users and increasing the Service Functionality. Despite of some limitations, this study perhaps gives some insights to the policy makers or others facing the stiff competition in the network business.

Trend Analysis of Barrier-free Academic Research using Text Mining and CONCOR (텍스트 마이닝과 CONCOR을 활용한 배리어 프리 학술연구 동향 분석)

  • Jeong-Ki Lee;Ki-Hyok Youn
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.19-31
    • /
    • 2023
  • The importance of barrier free is being highlighted worldwide. This study attempted to identify barrier-free research trends using text mining. Through this, it was intended to help with research and policies to create a barrier free environment. The analysis data is 227 papers published in domestic academic journals from 1996 when barrier free research began to 2022. The researcher converted the title, keywords, and abstract of an academic thesis into text, and then analyzed the pattern of the thesis and the meaning of the data. The summary of the research results is as follows. First, barrier-free research began to increase after 2009, with an annual average of 17.1 papers being published. This is related to the implementation guidelines for the barrier-free certification system that took effect on July 15, 2008. Second, results of barrier-free text mining i) As a result of word frequency analysis of top keywords, important keywords such as barrier free, disabled, design, universal design, access, elderly, certification, improvement, evaluation, and space, facility, and environment were searched. ii) As a result of TD-IDF analysis, the main keywords were universal design, design, certification, house, access, elderly, installation, disabled, park, evaluation, architecture, and space. iii) As a result of N-Ggam analysis, barrier free+certification, barrier free+design, barrier free+barrier free, elderly+disabled, disabled+elderly, disabled+convenience facilities, the disabled+the elderly, society+the elderly, convenience facilities+installation, certification+evaluation index, physical+environment, life+quality, etc. appeared in a related language. Third, as a result of the CONCOR analysis, cluster 1 was barrier-free issues and challenges, cluster 2 was universal design and space utilization, cluster 3 was Improving Accessibility for the Disabled, and cluster 4 was barrier free certification and evaluation. Based on the analysis results, this study presented policy implications for vitalizing barrier-free research and establishing a desirable barrier free environment.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.