• Title/Summary/Keyword: Access Patterns

Search Result 416, Processing Time 0.019 seconds

Information Seeking Behavior of Researchers in the Knowledge-based Information Society (지식정보사회에서의 학술정보의 활용)

  • 김용근
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.2
    • /
    • pp.11-30
    • /
    • 2004
  • The purpose of this study is to review current issues in practices of acquisition, organization and access to the web resources operating at libraries. Literature reviews were conducted to analyze patterns of access to the web resources, such as electronic journals, bibliographic databases and web sites used at libraries. Also analyzed was information seeking behaviors of researchers how they access to web resources.

  • PDF

Efficient Repair Algorithms using Disk Mirroring (디스크 미러링을 이용한 효율적인 복구 알고리즘)

  • Kim, Sung-Soo;Cho, Young-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1615-1624
    • /
    • 1997
  • In this paper, we propose and analyze various repair methods for a disk subsystem using mirroring. We also study the effects of the repair process that is invoked on disk faults on the mean response time of user disk requests. Finally, we analyze the effects of two different access patterns (uniform and non-uniform) on the repair process and performance. According to the results, average response times for non-uniform access pattern compared with uniform access pattern become shorter as the system load increases. Our simulation results show that the proposed repair algorithm with a short delay gives a better performance than the previous algorithms.

  • PDF

Web Server Log Visualization

  • Kim, Jungkee
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.101-107
    • /
    • 2018
  • Visitors to a Web site leave access logs documenting their activity in the site. These access logs provide a valuable source of information about the visitors' access patterns in the Web site. In addition to the pages that the user visited, it is generally possible to discover the geographical locations of the visitors. Web servers also records other information such as the entry into the site, the URL, the used operating system and the browser, etc. There are several Web mining techniques to extract useful information from such information and visualization of a Web log is one of those techniques. This paper presents a technique as well as a case a study of visualizing a Web log.

Big Data Key Challenges

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.340-350
    • /
    • 2022
  • The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.

Dr. Evelin McCune 소장 한국복식에 관한 연구

  • 유혜영;금기숙
    • Journal of the Korean Society of Costume
    • /
    • v.26
    • /
    • pp.251-264
    • /
    • 1995
  • The purpose of this study is to introduce and research the traditional Korean costume collections of Dr. McCune who was born in Pyung-Yang in 1907 and resided until her marriage to George S. McCune in about 1930. Her collections consist of three categories : children's costumes, adults' costumes, access-ories. The characteristics of collections are summorized as follows : 1. Deep wrappings are found at the front part of the top clothing when worn. The front gusset (SUB) has been dramaticaly tilted due to the difference in lengths of the top and bottom parts of the front gusset. 2. Assymetry was one of the principles of decorating Korean costumes. The assymetry were repeated at the GIT and SUB of CHOGORE with patchwork patterns. 3. Primary colors were favored in Korean costume. Hue contrast in color combinations was prefered as well, such as : yellow CHOGORE and purple blue CUFFS, a red SUN pattern matched with green embroidery. 4. Surface patterns were not so popular in Korean costumes, while the most colorful and fabulous patterns were shown through the various embroidery artifacts. Patterns were used as a way of expressing of their desires or longings in Korean costumes. The main themes of the patterns were longevity and happiness. The patterns such as peony, lotus, chrysanthemum, bamboo and bat were implying symbolism at that time. 5. Natural materials were prefered for the garments, Silk and cotton were used as the main materials of the costume collections. Studies of Korean Costume collections owned by international collectors are meaningful to boost the arena of Korean Costumes as well as fill up the vacancy left by lost costume artifacts.

  • PDF

The Effects of Private Education Patterns and Study Habits on Academic Achievement (사교육 패턴과 학습습관이 학업성취도에 미치는 영향)

  • Park, Eun Jung;Ko, Jung Won
    • Human Ecology Research
    • /
    • v.52 no.5
    • /
    • pp.443-456
    • /
    • 2014
  • The purpose of this study was to explore the patterns of private education, investigate the characteristics of private education patterns, and analyze the differences in study habits and academic achievement of youth on the basis of private education patterns. In this study, we used the data from the 2012 Panel of the Korea Children and Youth Panel Study by the National Youth Policy Institute. The subjects of this study were ninth-grade students and their parents. The statistical methods used for the analysis were two-step clustering, Chi-squared test, analysis of variance, and multiple regression. The major findings were as follows: first, private education was classified into three patterns, namely financial investment, time investment, and reduction of investment; and four categories, namely; private education methodology, private education time, private education expenses, and number of youth with access to private education. Second, the statistically significant socio-demographic characteristics of private education patterns were parents' education, parents' job type, father's working hours, sex of children, housing form, and income. Third, the study found that financial investment and a reduce of investment led to better study habits and academic achievement than time investment and no investment. Fourth, private education and study habits showed statistically meaningful effects on academic achievement; in particular, study habits had strong effects on academic achievement. Based on the results, a variety of educational programs for the improvement of the study habits of the youth were suggested.

A study onthe modeling of broadband access network for national information infrastructure and numerical analysis of its economics (초고속 액세스 망의 모델화 및 경제성에 대한 검토)

  • 정해원;박기식;노장래;조성준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2806-2818
    • /
    • 1997
  • It is generallyaccepted that broadband access technologies will play an important role in the National Information Infrastructure. However, the provision of direct fibers to residential and small business customers has always been considered a challenge. To accelerage the provision of Broadband Access Facilities, alternatibe paths could be identified and actaivated in parallel. In this paepr, we present an overview of the alternative access technologies focusing on xDSL, FTTx, HFC, HFR, and suggest the modeling of the access netetwork systems which is using of the technologies. Also to investigate the economics of each access systems, we derve the numerical equations which is summed up the al parameter including the labor cost of the model system. The proposed equation has a variable which is the cell size (or subsciber clusters) and calculate the real cost values which is normalized by the copper cable unit cost. From the numerical resutls, we conclude that the economic access method to provide these broadband capabilities is depended on the subscriber penetration, the patterns of subscriber distribution density and existing communication infrastructures. It can be expected that our analytical model and equations provides an elegant solution to choose the optimal broadband access technologies to residential and small business customers.

  • PDF

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

Prefetching based on the Type-Level Access Pattern in Object-Relational DBMSs (객체관계형 DBMS에서 타입수준 액세스 패턴을 이용한 선인출 전략)

  • Han, Wook-Shin;Moon, Yang-Sae;Whang, Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.529-544
    • /
    • 2001
  • Prefetching is an effective method to minimize the number of roundtrips between the client and the server in database management systems. In this paper we propose new notions of the type-level access pattern and the type-level access locality and developed an efficient prefetchin policy based on the notions. The type-level access patterns is a sequence of attributes that are referenced in accessing the objects: the type-level access locality a phenomenon that regular and repetitive type-level access patterns exist. Existing prefetching methods are based on object-level or page-level access patterns, which consist of object0ids of page-ids of the objects accessed. However, the drawback of these methods is that they work only when exactly the same objects or pages are accessed repeatedly. In contrast, even though the same objects are not accessed repeatedly, our technique effectively prefetches objects if the same attributes are referenced repeatedly, i,e of there is type-level access locality. Many navigational applications in Object-Relational Database Management System(ORDBMs) have type-level access locality. Therefore our technique can be employed in ORDBMs to effectively reduce the number of roundtrips thereby significantly enhancing the performance. We have conducted extensive experiments in a prototype ORDBMS to show the effectiveness of our algorithm. Experimental results using the 007 benchmark and a real GIS application show that our technique provides orders of magnitude improvements in the roundtrips and several factors of improvements in overall performance over on-demand fetching and context-based prefetching, which a state-of the art prefetching method. These results indicate that our approach significantly and is a practical method that can be implemented in commercial ORDMSs.

  • PDF

An Efficient Approach for Single-Pass Mining of Web Traversal Sequences (단일 스캔을 통한 웹 방문 패턴의 탐색 기법)

  • Kim, Nak-Min;Jeong, Byeong-Soo;Ahmed, Chowdhury Farhan
    • Journal of KIISE:Databases
    • /
    • v.37 no.5
    • /
    • pp.221-227
    • /
    • 2010
  • Web access sequence mining can discover the frequently accessed web pages pursued by users. Utility-based web access sequence mining handles non-binary occurrences of web pages and extracts more useful knowledge from web logs. However, the existing utility-based web access sequence mining approach considers web access sequences from the very beginning of web logs and therefore it is not suitable for mining data streams where the volume of data is huge and unbounded. At the same time, it cannot find the recent change of knowledge in data streams adaptively. The existing approach has many other limitations such as considering only forward references of web access sequences, suffers in the level-wise candidate generation-and-test methodology, needs several database scans, etc. In this paper, we propose a new approach for high utility web access sequence mining over data streams with a sliding window method. Our approach can not only handle large-scale data but also efficiently discover the recently generated information from data streams. Moreover, it can solve the other limitations of the existing algorithm over data streams. Extensive performance analyses show that our approach is very efficient and outperforms the existing algorithm.