• Title/Summary/Keyword: Access Patterns

Search Result 419, Processing Time 0.03 seconds

The Influence of Information Commons on User Traffic Patterns and Perceptions of the Library (정보공유공간이 이용자 유동패턴과 도서관인식에 미치는 영향)

  • Park, Ji-Hong;Park, Jinhee;Nam, Eunkyung;Lee, Seoha
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.4
    • /
    • pp.93-110
    • /
    • 2013
  • During the last decade, increasing use of technology that facilitates information access has changed academic library services. The emergence of information commons is one of the key changes. Most previous studies on information commons have focused on its conception and role. Whereas, considering information commons as a spatial service, this study aims to examine the influence of information commons on user traffic patterns within the library and perception of the library. As the information commons grew into main library service space and facility, it is necessary to explore what influences information commons have on the behavior and recognition of users. Two methods were used. First, observation method was used to record traffic pattern and user behavior. Second, twenty undergraduates and twelve graduates were interviewed regarding the use and recognition of the information commons and the library. The results of the study show that the traffic patterns were different between undergraduate students and graduate students; the location and structure of facilities influences their movement and behaviors; and the recognition of information commons tends to affect the perception of the entire library. The findings may help librarians improve and plan for library spaces to meet user demands.

A Framework and Patterns for Efficient Service Monitoring (효율적인 서비스 모니터링 프레임워크 및 전송패턴)

  • Lee, Hyun-Min;Cheun, Du-Wan;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.11
    • /
    • pp.812-825
    • /
    • 2010
  • Service-Oriented Computing (SOC) is a reuse paradigm for developing business processes by dynamic service composition. Service consumers subscribe services deployed by service providers only through service interfaces. Therefore, services on server-side are perceived as black box to service consumers. Due to this nature of services, service consumers have limited knowledge on the quality of services. This limits utilizing of services in critical domains hard. Therefore, there is an increasing demand for effective methods for monitoring services. Current monitoring techniques generally depend on specific vendor's middleware without direct access to services due to the technical hardship of monitoring. However, these approaches have limitations including low data comprehensibility and data accuracy. And, this results in a demand for effective service monitoring framework. In this paper, we propose a framework for efficiently monitoring services. We first define requirements for designing monitoring framework. Based on the requirements, we propose architecture for monitoring framework and define generic patterns for efficiently acquiring monitored data from services. We present the detailed design of monitoring framework and its implementation. We finally implement a prototype of the monitor, and present the functionality of the framework as well as the results of experiments to verify efficiency of patterns for transmitting monitoring data.

Patterns of the Change and the Predictors of the Social Exclusion of the Older People: Analysis of English Longitudinal Study of Ageing(ELSA) (노인의 사회적 배제 수준의 변화유형과 예측요인: 영국고령화패널(ELSA)분석)

  • Park, Hyunju;Chung, Soondool
    • 한국노년학
    • /
    • v.32 no.4
    • /
    • pp.1063-1086
    • /
    • 2012
  • The purpose of this study is to understand the current state of the older people's social exclusion by identifying patterns of the change in social exclusion level through a longitudinal analysis with an aim of exploring the predictors of changes. To this end, this study has adopted the panel data, the English longitudinal Study of Ageing(ELSA). The data of 7631 respondents who aged over 50 were used for the final analysis. The social exclusion of the older people was analyzed into five different sub-dimensions: social relationship; cultural activities; access to health services; financial security; and sense of loneliness. The person-centered approach that focuses on the various patterns of the trajectories of change has used semi-parametric group based model in order to estimate different trajectories among individuals. The data was analyzed using Spss 18.0 and SAS 9.2 proc traj. In results, First, semi-parametric group-based model analysis has shown that the older people are not 'homogeneous' group with similar exclusion level in every individual with same trajectories of change, but can be divided into various categories with diverse intercept and slope. Second, different trajectories in change of exclusion level help to confirm that the older people's social exclusion level increases gradually over time or remains unchanged. Third, this analysis has provided the useful guidelines to identify the high-risk groups of social exclusion. Forth, the variables that make difference in more than three dimensions include gender, age, self-perceived health, physical activity, weekly income, marital status, family relation, and beneficiary status. Implications and further suggestion were discussed.

Merchandise Management Using Web Mining in Business To Customer Electronic Commerce (기업과 소비자간 전자상거래에서의 웹 마이닝을 이용한 상품관리)

  • 임광혁;홍한국;박상찬
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.1
    • /
    • pp.97-121
    • /
    • 2001
  • Until now, we have believed that one of advantages of cyber market is that it can virtually display and sell goods because it does not necessary maintain expensive physical shops and inventories. But, in a highly competitive environment, business model that does away with goods in stock must be modified. As we know in the case of AMAZON, leading companies already consider merchandise management as a critical success factor in their business model. That is, a solution to compete against one's competitors in a highly competitive environment is merchandise management as in the traditional retail market. Cyber market has not only past sales data but also web log data before sales data that contains information of path that customer search and purchase on cyber market as compared with traditional retail market. So if we can correctly analyze the characteristics of before sales patterns using web log data, we can better prepare for the potential customers and effectively manage inventories and merchandises. We introduce a systematic analysis method to extract useful data for merchandise management - demand forecasting, evaluating & selecting - using web mining that is the application of data mining techniques to the World Wide Web. We use various techniques of web mining such as clustering, mining association rules, mining sequential patterns.

  • PDF

A sutdy on the District Unit Design for CO2 Reduction of Transportation (교통부문 CO2 저감을 위한 지구단위설계 방법에 관한 연구)

  • Jin, Jang-Won;Park, Min-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.3
    • /
    • pp.1370-1376
    • /
    • 2012
  • This study tried to analyze $CO_2$ emission volume as green-house gases by application of land use patterns and transport policies in District Unit Design. It is postulated a Toy network and various scenarios which are combined land use patterns and transport policies for analyzing $CO_2$ gas reduction. As results, this study shows best District Unit Design technique is the policy that develop mid block and introduction of car free zone to inner 2 way streets. Worst design technique is the policy that make hierarchical network and introduction of access control to outer roads that have been known as a best road policy till nowadays. Therefore, we need more carefully introduce design technique for reduction of $CO_2$ in District Unit.

Seaport Concentration and Competition Development in the Arctic Region of Russia along the North Sea Route (러시아 북극지역 항만의 집중 및 경쟁현상에 관한 연구-북극해 항로를 중심으로)

  • Krivoshchekov, Peter;Pham, Thi Yen;Yeo, Gi-Tae
    • Journal of Digital Convergence
    • /
    • v.16 no.4
    • /
    • pp.49-54
    • /
    • 2018
  • Russia has access to unique port locations and routes, one of them is North Sea route, which have been a major debate topic for last several decades. In order to handle any shipments along the route, an adequate and capable port system must be present. This study aims to identify development and competition patterns from 2007 to 2016 of Russian ports in the Arctic basin, concentration trends in particular. The objectives achieved through utilizing the Herfindahl-Hirschman Index (HHI), concentration ratio (CR), the Gini coefficient and Lorenz curve, and shift-share analysis. Results demonstrate concentration trend, positive overall growth and lack of real competition. Originality of this study lies in the fact that certain analysis had not been done in previous studies, but importance of it may be found in several papers. Findings of this paper may assist policy-makers, port authorities and other researchers in understanding and further study on the region.

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

A Study on the Internet and Smart-Phone Addiction Diagnosis's Comparison through internet usage pattern of College Students (대학생의 인터넷 이용패턴을 통한 인터넷과 스마트폰 중독진단에 관한 비교연구)

  • Kim, Hee-Jae
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2014
  • Smartphone addiction and internet addiction cause a serious negative social problem due to the spread of the new media which is combined with the ubiquitous function. To evaluate the degree of Internet addiction and smartphone addiction of college students in the nearby areas, K-scale of internet addiction self-diagnosis scale and S-scale of smartphone addiction self-diagnosis scale for Korean adults were applied. This study aims to develop the survey questions, which get the basic internet patterns and access the web site, and to find the hidden addicts that is not found by general K-scale and S-scale using computers and smartphones. The result shows that a method of addiction diagnosis using the tolerance degree which is calculated by smart phone's internet main activities and using time(anticipated and real time) apart from K-scale and S-scale. So hidden internet and smartphone addicts could be found through the SPSS statistical analysis program.

  • PDF

Buying vs. Using: User Segmentation & UI Optimization through Mobile Phone Log Analysis (구매 vs. 사용 휴대폰 Log 분석을 통한 사용자 재분류 및 UI 최적화)

  • Jeon, Myoung-Hoon;Na, Dae-Yol;Ahn, Jung-Hee
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.460-464
    • /
    • 2008
  • To improve and optimize user interfaces of the system, the accurate understanding of users' behavior is an essential prerequisite. Direct questions depend on user' s ambiguous memory and usability tests depend on the researchers' intention instead of users'. Furthermore, they do not provide with natural context of use. In this paper we described the work which examined users' behavior through log analysis in their own environment. 50 users were recruited by consumer segmentation and they were downloaded logging-software in their mobile phone. After two weeks, logged data were gathered and analyzed. The complementary methods such as a user diary and an interview were conducted. The result of the analysis showed the frequency of menu and key access, used time, data storage and several usage patterns. Also, it was found that users could be segmented into new groups by their usage patterns. The improvement of the mobile phone user interface was proposed based on the result of this study.

  • PDF

An Incremental Multi Partition Averaging Algorithm Based on Memory Based Reasoning (메모리 기반 추론 기법에 기반한 점진적 다분할평균 알고리즘)

  • Yih, Hyeong-Il
    • Journal of IKEEE
    • /
    • v.12 no.1
    • /
    • pp.65-74
    • /
    • 2008
  • One of the popular methods used for pattern classification is the MBR (Memory-Based Reasoning) algorithm. Since it simply computes distances between a test pattern and training patterns or hyperplanes stored in memory, and then assigns the class of the nearest training pattern, it is notorious for memory usage and can't learn additional information from new data. In order to overcome this problem, we propose an incremental learning algorithm (iMPA). iMPA divides the entire pattern space into fixed number partitions, and generates representatives from each partition. Also, due to the fact that it can not learn additional information from new data, we present iMPA which can learn additional information from new data and not require access to the original data, used to train. Proposed methods have been successfully shown to exhibit comparable performance to k-NN with a lot less number of patterns and better result than EACH system which implements the NGE theory using benchmark data sets from UCI Machine Learning Repository.

  • PDF