• Title/Summary/Keyword: 콘텐츠 기반 추천

Search Result 292, Processing Time 0.023 seconds

A Study on the Building Self-Publishing Repository for the Personal Digital Records (개인기록 전자출판 리포지토리 구축 방안에 관한 연구)

  • Chu, Ki Sook;Nam, Young Joon
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.4
    • /
    • pp.351-374
    • /
    • 2017
  • In this study, we propose a model for constructing a producer-centered self-publishing repository for the personal digital records and three operational process for practical application of the operational model. 1) As essential requirements for constructing a DSpace-based self-publishing repository, we propose producer-centered service provision, management subject, operation and management plan, how to activate the repository of digital personal records producers, copyright issues, development and dissemination process. 2) The repository model constructs a producer-centered circular structure considering these requirements. 3) Through a repository model with multiple agencies, it provides various services such as content distribution, keyword search, usage statistics, recommendation system, and open access to portal users and electronic publishers as well as individual users.

Effects of Healthcare Service User's Compliance Intention on Continuous usage (헬스케어 서비스 사용자 순응의도가 서비스의 지속적 사용에 미치는 영향 연구)

  • Lee, Namyeon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.95-117
    • /
    • 2016
  • Entering aging society and increasing individual's interests on wellbeing lead to increasing demands of healthcare service and various healthcare related applications are providedon app market or Internet. These healthcare services could enhance user's health status if the users continuously use the service. In order to enhance effectiveness of a healthcare service, the service user should comply with recommendations or directions are provided by the service. However, previous studies of healthcare service are not considered effects of compliance intention on continuous usage. Hence, we tested how user's compliance intention effect on continuous usage intention of healthcare service based on theories of information system and medical information. Moreover, we found that compliance intention of users for healthcare service is an important factor on sustainability of healthcare service. Additionally, we investigated what factors are related with user's compliance intention.

Design and Implementation of a System for Recommending Related Content Using NoSQL (NoSQL 기반 연관 콘텐츠 추천 시스템의 설계 및 구현)

  • Ko, Eun-Jeong;Kim, Ho-Jun;Park, Hyo-Ju;Jeon, Young-Ho;Lee, Ki-Hoon;Shin, Saim
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.9
    • /
    • pp.1541-1550
    • /
    • 2017
  • The increasing number of multimedia content offered to the user demands content recommendation. In this paper, we propose a system for recommending content related to the content that user is watching. In the proposed system, relationship information between content is generated using relationship information between representative keywords of content. Relationship information between keywords is generated by analyzing keyword collocation frequencies in Internet news corpus. In order to handle big corpus data, we design an architecture that consists of a distributed search engine and a distributed data processing engine. Furthermore, we store relationship information between keywords and relationship information between keywords and content in NoSQL to handle big relationship data. Because the query optimizer of NoSQL is not as well developed as RDBMS, we propose query optimization techniques to efficiently process complex queries for recommendation. Experimental results show that the performance is improved by up to 69 times by using the proposed techniques, especially when the number of requested related keywords is small.

An Empirical Study of Personalized Thumbnail Curation of Netflix (개인화된 썸네일 큐레이션 사용성 평가 -넷플릭스 사례를 통한 UX study-)

  • Park, Siwon;Park, Jisu;Kang, Jisu;Rhee, Boa
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.265-274
    • /
    • 2021
  • This study empirically analyzed the users' experiences with the Netflix thumbnail curation based on the Technology Acceptance Model(TAM). According to the correlation analysis results, the higher the dependence on the thumbnails, the higher the satisfaction with the thumbnail curation. Both Perceived Informational Usefulness(PIU) and Perceived Ease of Use(PEOU) had correlations with the degree of satisfaction with the thumbnail curation. In particular, the factors of relevance in PEOU had the greatest impact on the degree of satisfaction and this result proved that the suitability factors of the thumbnails had significant correlations with the degree of satisfaction. The degree of satisfaction with the thumbnail curation also positively correlated with Netflix's overall degree of satisfaction and behavioral intention to use the Netflix. This study demonstrated the suitability of the TAM as a UX evaluation tool for the Netflix thumbnail curation.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

Korean Abbreviation Generation using Sequence to Sequence Learning (Sequence-to-sequence 학습을 이용한 한국어 약어 생성)

  • Choi, Su Jeong;Park, Seong-Bae;Kim, Kweon-Yang
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.3
    • /
    • pp.183-187
    • /
    • 2017
  • Smart phone users prefer fast reading and texting. Hence, users frequently use abbreviated sequences of words and phrases. Nowadays, abbreviations are widely used from chat terms to technical terms. Therefore, gathering abbreviations would be helpful to many services, including information retrieval, recommendation system, and so on. However, manually gathering abbreviations needs to much effort and cost. This is because new abbreviations are continuously generated whenever a new material such as a TV program or a phenomenon is made. Thus it is required to generate of abbreviations automatically. To generate Korean abbreviations, the existing methods use the rule-based approach. The rule-based approach has limitations, in that it is unable to generate irregular abbreviations. Another problem is to decide the correct abbreviation among candidate abbreviations generated rules. To address the limitations, we propose a method of generating Korean abbreviations automatically using sequence-to-sequence learning in this paper. The sequence-to-sequence learning can generate irregular abbreviation and does not lead to the problem of deciding correct abbreviation among candidate abbreviations. Accordingly, it is suitable for generating Korean abbreviations. To evaluate the proposed method, we use dataset of two type. As experimental results, we prove that our method is effective for irregular abbreviations.

Effects of Practical Training Using 3D Printed Structure-Based Blind Boxes on Multi-Dimensional Radiographic Image Interpretation Ability (3D 프린팅 구조물 기반 블라인드박스를 이용한 실습교육이 다차원 방사선영상해독력에 미치는 효과)

  • Youl-Hun, Seoung
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.1
    • /
    • pp.131-139
    • /
    • 2023
  • In this study, we are purposed to find the educational effect of practical training using a 3D printed structure-based blind box on multidimensional radiographic image interpretation. The subjects were 83 (male: 49, female: 34) 2nd year radiological science students who participated in the digital medical imaging practice that was conducted for 3 years from 2020 to 2022. The learning method used 3D printing technology to print out the inside structure of the blind box designed by itself. After taking X-rays 3 times (x, y, z axis), the structure images in the blind box were analyzed for each small group. We made the 3D structure that was self-made with clay based on our 2D radiographic images. After taking X-rays of the 3D structure, it was compared whether it matches the structural image of the blind box. The educational effect for the practical training surveyed class faithfulness, radiographic image interpretation ability (attenuation concept, contrast concept, windowing concept, 3-dimensional reading ability), class satisfaction (interest, external recommendation, immersion) on a 5-point Likert scale as an anonymous student self-writing method. As a result, all evaluation items had high positive effects without significant differences between males and females. Practical education using blind boxes is a meaningful example of radiology education technology using 3D printing technology, and it is expected to be used as content to improve students' problem-solving skills and increase satisfaction with major subjects.

A Study on the Relationship between Usage Characteristics of TV and Web Animation and Purchase Intent of Goods Featuring Animation Characters (아동 애니메이션 이용 특성과 캐릭터상품 구매의사의 관계 : TV와 웹 애니메이션을 중심으로)

  • Yoo, Soo-jung;Lee, Yeong-ju;Song, Gin
    • Cartoon and Animation Studies
    • /
    • s.46
    • /
    • pp.23-61
    • /
    • 2017
  • This study aims to understand the using characteristics of TV animation and web-based animation of children and investigate the effects of change in viewing process on the purchase of character goods. For this purpose, an online survey was conducted for parents who have children as animation viewers. The results show that there was no difference by age or gender in using both TV and web animation. When parents get animation information on TV, they had their children watch animation through the same TV channel, but the web has no significant relationship between information acquisition path and main service they use. In addition, it is found that parent' perception of TV animation superiority is influenced by respondents' income and children's watching time of animation has no effect on it. Finally, monthly income of households, payment amount of web animation, watching time of TV animation, and perception of quality of TV animation have a significant effect on parents' active purchase of character goods. On the other hand, the purchase intention of the recommended goods is influenced by children's age, the parent's perception about the web animation quality, and the payments of the web animation.

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

Movie Recommended System base on Analysis for the User Review utilizing Ontology Visualization (온톨로지 시각화를 활용한 사용자 리뷰 분석 기반 영화 추천 시스템)

  • Mun, Seong Min;Kim, Gi Nam;Choi, Gyeong cheol;Lee, Kyung Won
    • Design Convergence Study
    • /
    • v.15 no.2
    • /
    • pp.347-368
    • /
    • 2016
  • Recently, researches for the word of mouth(WOM) imply that consumers use WOM informations of products in their purchase process. This study suggests methods using opinion mining and visualization to understand consumers' opinion of each goods and each markets. For this study we conduct research that includes developing domain ontology based on reviews confined to "movie" category because people who want to have watching movie refer other's movie reviews recently, and it is analyzed by opinion mining and visualization. It has differences comparing other researches as conducting attribution classification of evaluation factors and comprising verbal dictionary about evaluation factors when we conduct ontology process for analyzing. We want to prove through the result if research method will be valid. Results derived from this study can be largely divided into three. First, This research explains methods of developing domain ontology using keyword extraction and topic modeling. Second, We visualize reviews of each movie to understand overall audiences' opinion about specific movies. Third, We find clusters that consist of products which evaluated similar assessments in accordance with the evaluation results for the product. Case study of this research largely shows three clusters containing 130 movies that are used according to audiences'opinion.