• Title/Summary/Keyword: Access Log

Search Result 199, Processing Time 0.022 seconds

Web Structure Mining Using Web Access Log (웹 접근로그를 활용한 웹 구조 마이닝)

  • Park, C.H.;Lee, S.D.;Jeon, S.H.;Park, H.C.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.393-396
    • /
    • 2006
  • 웹의 급속한 성장으로 정보의 양이 많아졌지만 디자인의 비중이 커지면서 웹 문서에 대한 구조를 추출하는데 어려움이 있다. 웹은 사용자가 원하는 정보를 쉽고 정확하게 검색할 수 있도록 웹 문서의 내용을 구조화하여 지속적으로 개선하면서 사용자의 특성과 행동 패턴에 따라 개인화 하여야한다. 이러한 문제를 해결하기 위해서는 웹 문서들 간의 정확한 구조를 추출하는 것이 선행되어야 한다. 본 논문에서는 보다 웹 사이트의 정확한 구조를 추출하기 위한 방법을 제안한다. 제안 방법은 기본적으로 웹문서 태그의 하이퍼링크와 플래시 파일을 2진 형태의 문서로 불러 하이퍼링크를 추출하고 이를 깊이 우선 탐색 알고리즘을 사용하여 방향그래프로 만든다. 하지만 이러한 웹 문서 태그 탐색 시 애플릿이나 스크립트 등에 숨어 있는 하이퍼링크를 찾는 문제와 '뒤로' 버튼 사용 시 웹 접근로그에 기록되지 않는 문제점이 보완되어야 한다. 이를 위해 클릭 스트림을 스택에 저장하여 이미 만들어진 방향그래프와 비교하여 새롭게 찾은 정점과 간선을 추가 삭제함으로써 보다 신뢰성 높은 방향 그래프를 만든다.

  • PDF

APPRAISAL OF MAINTENANCE MANAGEMENT STRATEGIES USED IN PUBLIC HOSPITAL BUILDINGS IN LAGOS STATE, NIGERIA

  • Adenuga, O.A;Iyagba, R.O.;Ogunsanmi, E.O
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.837-847
    • /
    • 2007
  • The study focused on the evaluation of maintenance management strategies used in public hospital buildings in Lagos state. It also assessed the labour composition for maintenance operations. In achieving these objectives, opinions of maintenance officers of ten (10) different hospitals in different local government areas of the state were sampled through well structured questionnaires. The data collected were analyzed using descriptive and inferential statistics. From the analysis, the study revealed that majority of those public hospitals do not have specific budget for maintenance programmes, maintenance policies, maintenance log book and maintenance manual to guide the operatives. About 98% of them do not understand the type of maintenance strategy being used for their maintenance operations. 78% of the maintenance work are only executed when there is a breakdown or in response to user's request. For labour composition, the cleaning of interior and exterior of the building, inspection of building elements, repairs and replacements of building elements are mainly carried out by in-house staff, while the repair and replacement of equipment is by outsourcing. The study also revealed that using in- house staff, reduces costs and provides a higher security while outsourcing provides more flexibility in staffing reduces equipment expenditures and provide better access to special skills. The study recommended proactive measures to provide necessary training and support for maintenance staff and users of these facilities and a means of securing sufficient funds for maintenance programmes.

  • PDF

Low complexity ordered successive interference cancelation detection algorithm for uplink MIMO SC-FDMA system

  • Nalamani G. Praveena;Kandasamy Selvaraj;David Judson;Mahalingam Anandaraj
    • ETRI Journal
    • /
    • v.45 no.5
    • /
    • pp.899-909
    • /
    • 2023
  • In mobile communication, the most exploratory technology of fifth generation is massive multiple input multiple output (MIMO). The minimum mean square error and zero forcing based linear detectors are used in multiuser detection for MIMO single-carrier frequency division multiple access (SCFDMA). When the received signal is detected and regularization sequence is joined in the equalization of spectral null amplification, these schemes experience an error performance and the signal detection assesses an inversion of a matrix computation that grows into complexity. Ordered successive interference cancelation (OSIC) detection is considered for MIMO SC-FDMA, which uses a posteriori information to eradicate these problems in a realistic environment. To cancel the interference, sorting is preferred based on signal-to-noise ratio and log-likelihood ratio. The distinctiveness of the methodology is to predict the symbol with the lowest error probability. The proposed work is compared with the existing methods, and simulation results prove that the defined algorithm outperforms conventional detection methods and accomplishes better performance with lower complication.

A Study on the Usage Behavior of Public Library Website through an Analysis of Web Traffic (웹 트래픽 분석을 통한 공공도서관 웹사이트 이용행태에 관한 연구)

  • Kang, Munsil;Kim, Seonghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.4
    • /
    • pp.189-212
    • /
    • 2021
  • The purpose of this study is to analyze an usage behavior for the public library website through web traffic. For this purpose, using Google Analytics and growth hacking technique, the data of A public library website log was analyzed for three months from August 1, 2021 to October 31, 2021. As a result of the study, the young age group of 18-24 years old and 25-34 years old recorded a high rate of new member registration, & it was found that the inflow rate through SNS was high for external inflows. As a result of analysis for the access rate by time, it was found that the time with the highest inflow rate was between 10 am and 11 am both on Wednesday and Friday. As a access channel, the access rate using mobile (64.90%) was quite high, but at the same time, the bounce rate (27.20%) was higher than the average (24.93%), & the rate of duration time (4 minutes 33 seconds) was lower than thee average (5 minutes 22 seconds). Finally, it was found that the utilization rate of reading program events and online book curation service, which the library focuses on producing and promoting, is very low. These research results can be used as basic data for future improvement of public library websites.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Analysis of Users' Inflow Route and Search Terms of the Korea National Archives' Web Site (국가기록원 웹사이트 유입경로와 이용자 검색어 분석)

  • Jin, Ju Yeong;Rieh, Hae-young
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.1
    • /
    • pp.183-203
    • /
    • 2018
  • As the users' information use environment changes to the Web, the archives are providing more services on the Web than before. This study analyzes the users' recent inflow route and the highly ranked 100 search terms of each month for 10 and half years in the Web site of National Archives of Korea, and suggests suitable information services. As a result of the analysis, it was found out that the inflow route could be divided into access from portal site, by country, from related institutions, and via mobile platform. As a result of analyzing the search terms of users for the last 10 and half years, the most frequently searched term turned out to be 'Land Survey Register', which was also the search term that was searched for with steady interests for 10 and half years. Also, other government documents or official gazettes were of great interests to users. As results of identifying the most frequently searched and steadily searched terms, we were able to categorize the search terms largely in terms of land, Japanese colonial period, the Korean war and relationship of North Korea and South Korea, and records management and use. Based on the results of the analysis, we suggested strengthening connection of the National Archives Web site with portal sites and mobile, and upgrading and improving search services of the National Archives. This study confirmed that the analysis of Web log and user search terms would yield meaningful results that could enhance the user services in archives.

Efficient security solution structure design for enterprise security management system (통합 보안 관리 시스템 구축을 위한 효율적인 보안 솔루션 구조 설계)

  • Kang Min-gyun;Han Kun-Hee;Ha Kyung-Jae;Kim Seok-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.824-831
    • /
    • 2005
  • Past corporaion's network security system is single security solution, or mixed several ways, but there was inefficient system because doing not get into organic link But, constructed more strong security system by ESM enterance on. ESM uses way to integrate of each agent to manage easily various kinds security solution. That is, it is system that connect system of existent VPN, FireWall, IDS and so on configurationally depending on security policy and manage. ESM is security system that is developed more than existent security system. But, practical use of network and the development speed of technology being increasing with the mon faster speed, is heightening the level more as well as dysfunction of information crime and so on. Many improvements are required at ESM system, this research wished to make up for the weak-point in the ESM system about interior security. Studied on structure of security solution that is basis of security policy. VPN, Firewall, IDS's link that is main composition of existing security system analysis, reconstructed. And supplemented security of ESM system itself. Establish imaginary intrusion and comparative analysis access data that apply each Telnet Log analysys IDS existent ESM system and proposed ESM system comparative analysis. Confirm the importance of interior security and inspected security of proposed system.

Effects of dietary supplementation of fermented wheat bran on performance and blood profiles in weaned pigs

  • Jeong, Yong Dae;Lee, Jung Jae;Kim, Jo Eun;Kim, Doo Wan;Min, Ye Jin;Cho, Eun Seok;Yu, Dong Jo;Kim, Young Hwa
    • Korean Journal of Agricultural Science
    • /
    • v.44 no.3
    • /
    • pp.409-415
    • /
    • 2017
  • This study was conducted to investigate the effect of supplementation of fermented wheat bran (FWB) on growth and blood characteristics in weaned pig. A total of 36 weaned pigs ($Landrace{\times}Yorkshire{\times}Duroc$; BW, $7.78{\pm}0.04kg$) were randomly allocated to three dietary treatments with different FWB concentrations (0, 0.5, and 1.0%), and each treatment had 3 replicate pens with 4 pigs per pen. The FWB was obtained from a mixture of wheat bran and two microbes (Lactobacillus plantarum M10 and Saccaromyces cerevisiae) and was determined to contain $10.19{\pm}0.27log\;CFU/g$ of L. plantarum and $7.73{\pm}0.38log\;CFU/g$ of S. cerevisiae. Experimental diets were prepared by mixing 0 (control), 0.5, or 1.0% of the FWB to the basal diet, and fed to the weaned pigs for 7 weeks. During the experimental period, the pigs had access to the diet and water ad libitum. Feed intake increased significantly in the 1.0% FWB group compared to the control and 0.5% FWB groups (p < 0.05), whereas the other growth parameters were not different among the treatment groups. White blood cells and lymphocytes were significantly decreased in the FWB treatment groups compared to the control group, but other blood corpuscles were not different among the treatment groups (p < 0.05). The pigs fed 0.5% FWB showed greater serum IgG than the control and 1.0% FWB groups (p < 0.05). In conclusion, the FWB fed to weaned pigs did not negatively affect their growth performance, but rather reduced mortality by fortifying immunity.

Proxy Caching Scheme Based on the User Access Pattern Analysis for Series Video Data (시리즈 비디오 데이터의 접근 패턴에 기반한 프록시 캐슁 기법)

  • Hong, Hyeon-Ok;Park, Seong-Ho;Chung, Ki-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1066-1077
    • /
    • 2004
  • Dramatic increase in the number of Internet users want highly qualified service of continuous media contents on the web. To solve these problems, we present two network caching schemes(PPC, PPCwP) which consider the characteristics of continuous media objects and user access pattern in this paper. While there are plenty of reasons to create rich media contents, delivering this high bandwidth contents over the internet presents problems such as server overload, network congestion and client-perceived latency. PPC scheme periodically calculates the popularity of objects based on the playback quantity and determines the optimal size of the initial fraction of a continuous media object to be cached in proportion to the calculated popularity. PPCwP scheme calculates the expected popularity using the series information and prefetches the expected initial fraction of newly created continuous media objects. Under the PPCwP scheme, the initial client-perceived latency and the data transferred from a remote server can be reduced and limited cache storage space can be utilized efficiently. Trace-driven simulation have been performed to evaluate the presented caching schemes using the log-files of iMBC. Through these simulations, PPC and PPCwP outperforms LRU and LFU in terms of BHR and DSR.

  • PDF

Authing Service of Platform: Tradeoff between Information Security and Convenience (플랫폼의 소셜로그인 서비스(Authing Service): 보안과 편의 사이의 적절성)

  • Eun Sol Yoo;Byung Cho Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.137-158
    • /
    • 2018
  • Online platforms recently expanded their connectivity through an authing service. The growth of authing services enabled consumers to enjoy easy log in access without exerting extra effort. However, multiple points of access increases the security vulnerability of platform ecosystems. Despite the importance of balancing authing service and security, only a few studies examined platform connectivity. This study examines the optimal level of authing service of a platform and how authing strategies impact participants in a platform ecosystem. We used a game-theoretic approach to analyze security problems associated with authing services provided by online platforms for consumers and other linked platforms. The main findings are as follows: 1) the decreased expected loss of consumers will increase the number of players who participate in the platform; 2) linked platforms offer strong benefits from consumers involved in an authing service; 3) the main platform will increase its effort level, which includes security cost and checking of linked platform's security if the expected loss of the consumers is low. Our study contributes to the literature on the relationship between technology convenience and security risk and provides guidelines on authing strategies to platform managers.