• 제목/요약/키워드: Internet Information Collection

검색결과 456건 처리시간 0.021초

개인화된 웹 검색 순위 생성 (Customized Web Search Rank Provision)

  • 강영기;배준수
    • 대한산업공학회지
    • /
    • 제39권2호
    • /
    • pp.119-128
    • /
    • 2013
  • Most internet users utilize internet portal search engines, such as Naver, Daum and Google nowadays. But since the results of internet portal search engines are based on universal criteria (e.g. search frequency by region or country), they do not consider personal interests. Namely, current search engines do not provide exact search results for homonym or polysemy because they try to serve universal users. In order to solve this problem, this research determines keyword importance and weight value for each individual search characteristics by collecting and analyzing customized keyword at external database. The customized keyword weight values are integrated with search engine results (e.g. PageRank), and the search ranks are rearranged. Using 50 web pages of Goolge search results for experiment and 6 web pages for customized keyword collection, the new customized search results are proved to be 90% match. Our personalization approach is not the way that users enter preference directly, but the way that system automatically collects and analyzes personal information and then reflects them for customized search results.

A Study on Changes in Korean Image of Foreign Tourists Using Big Data - Post COVID-19 -

  • Yoo, Kyoung-Mi;Choi, Youn-Hee;Ryu, Gi-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권4호
    • /
    • pp.72-78
    • /
    • 2021
  • Currently, the Korean wave is not limited to popular culture, but has a significant impact not only on Korea's national image but also on the improvement of Korean companies' products and image of Korea. In this study, using Textom to confirm the change in foreign tourists' image of Korea, the data collection period was 1 year of 2020, when COVID 19 occurred, as a collection period for "Korea and foreigner" and related key words, each Hallyu content, and ranked in the top 80 keywords were derived. Centrality analysis for semantic network visualization was performed using UCINET6, and through CONCOR analysis, 7 groups 'K-Quarantine ', 'K-Drama', 'K-Movie', 'K-Beauty', 'K-Shopping', It was clustered into 'K-Tech' and 'K-Pop'. As a result of the analysis, the image of Korea abroad generally recognized the Korean Wave as cultural content, but after the outbreak of COVID 19, it is judged that it has been recognized as a country with a successful case of K-Quarantine.

Topology Preserving Tetrahedral Decomposition Applied To Trilinear Interval Volume Tetrahedrization

  • Sohn, Bong-Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권6호
    • /
    • pp.667-681
    • /
    • 2009
  • We describe a method to decompose a cube with trilinear interpolation into a collection of tetrahedra with linear interpolation, where the isosurface topology is preserved for all isovalues during decomposition. Visualization algorithms that require input scalar data to be defined on a tetrahedral grid can utilize our method to process 3D rectilinear data with topological correctness. As one of many possible examples, we apply the decomposition method to topologically accurate tetrahedral mesh extraction of an interval volume from trilinear volumetric imaging data. The topological correctness of the resulting mesh can be critical for accurate simulation and visualization.

Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption

  • Babamir, Faezeh Sadat;Eslami, Ziba
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권11호
    • /
    • pp.2940-2955
    • /
    • 2012
  • In this paper, we propose aggregate signcryption for achieving data security in UWSNs. The main challenge of these networks established in sensitive environments is offline sink visiting. Moreover, the sensors must retain collected data for long enough time to offload them onto the itinerant sink. Thus, the unattended nature of data collection intervals might offer the adversary the opportunity to apply various attacks without detection. In this paper, employing low order operations (in time and space), we propose a new secure scheme in which various security goals such as confidentiality (through encrypting), authentication and integrity (through signing) are achieved. In addition, the aggregation process of our scheme reduces the space and communication overheads both for sensors and sink, i.e. the proposed technique efficiently enables the sensors and sink to protect, verify and recover all the related data. We further compare our scheme with the best alternative work in the literature.

An Attempt to Find Potential Group of Patrons from Library's Loan Records

  • Minami, Toshiro;Baba, Kensuke
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제6권1호
    • /
    • pp.5-8
    • /
    • 2014
  • Social networking services that connect a person to other people are attracting our attention and various types of on-the-network services are provided. Library has been playing a role of social media by providing with materials such as books and magazines, and with a place for reading, studying, getting lectures, etc. In this paper, we present a method for finding candidates of groups of the library's patrons who share interest areas by utilizing the loan records, which are obtainable by every library. Such a homogeneous group can become a candidate for a study group, a community for exchange ideas, and other activity group. We apply the method to a collection of loan records of a university library, find some problem to be solved, and propose measures for more detailed solutions. Even though the potential group finding problem still remains a lot of problems to be solved, its potential importance is very high and thus to be studies even more for future applications.

Effects of Job Satisfaction on Quality of Life for 119 Paramedics

  • Choi, Sungsoo;Yun, Seongwoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권8호
    • /
    • pp.4315-4328
    • /
    • 2019
  • The present study investigated the effects of work satisfaction on quality of life for 119 paramedics, the Korean equivalent of 911 paramedics. Data collection began in July 2017 and lasted for six months. Data was collected from 410 119 paramedics of the J province and the G metropolitan area who consented to study participation. The results showed that the higher the job satisfaction of the participants, the higher the quality of life (r = 0.508, p = 0.008). The factors affecting the quality of life were leisure activity, subjective health, and job satisfaction. For 119 paramedics to improve their quality of life, they need to relieve work stress and fatigue through leisure activities, and recover and maintain their health through sufficient rest. Moreover, returning to work in a healthy state likely leads to increased job satisfaction, and the quality of life will increase accordingly. Therefore, 119 paramedics should be permitted to have plenty of leisure time outside their work hours and should be able to maintain health through periodic health checks.

DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network

  • Chen, Tieming;Mao, Qingyu;Lv, Mingqi;Cheng, Hongbing;Li, Yinglong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.2180-2197
    • /
    • 2019
  • With the proliferation of the Android malicious applications, malware becomes more capable of hiding or confusing its malicious intent through the use of code obfuscation, which has significantly weaken the effectiveness of the conventional defense mechanisms. Therefore, in order to effectively detect unknown malicious applications on the Android platform, we propose DroidVecDeep, an Android malware detection method using deep learning technique. First, we extract various features and rank them using Mean Decrease Impurity. Second, we transform the features into compact vectors based on word2vec. Finally, we train the classifier based on deep learning model. A comprehensive experimental study on a real sample collection was performed to compare various malware detection approaches. Experimental results demonstrate that the proposed method outperforms other Android malware detection techniques.

인터넷 패션 정보탐색에 따른 광고유형별 만족도와 재이용의도에 관한 연구 (The study on satisfaction and intent to reuse by type of advertisement as a result of Internet fashion information search)

  • 제은숙
    • 패션비즈니스
    • /
    • 제16권2호
    • /
    • pp.62-73
    • /
    • 2012
  • This study is intended to analyze the effect of fashion consumer's information search on satisfaction with advertisement and the intent to reuse depending on type of advertisement. The survey of the men and women in their 20s and 30s living in Seoul and metropolitan area was conducted for data collection, beginning in 17th through 24th, October 2011. Total 355 copies of questionnaire were used for final data analysis and reliability analysis, factorial analysis and multiple regression analysis were carried out using SPSS 16.0. The results were as follows. First, for banner, e-mail and search advertisement, constant information search had influence on convenience for use and satisfaction with information, and for e-mail advertisement, information search appeared to have had effect on satisfaction with information. Second, constant information search by type of advertisement had effect on intent to reuse. Third, convenience for use, information and satisfaction with the interest by Internet user had influence on the intent to reuse, while for the user of search advertisement, convenience for use and satisfaction with information had effect on the intent to reuse.

전자저널 이용통계서비스의 품질평가에 대한 연구 (Evaluation on the Quality of Electronic Journal Usage Report Service)

  • 김혜선
    • 정보관리연구
    • /
    • 제35권4호
    • /
    • pp.35-56
    • /
    • 2004
  • 인터넷을 통한 웹 콘텐츠가 증가하면서 도서관 장서구성에서 전자자원의 비중이 점차 확대되고 있다. 장서의 선정, 유지, 구독중단을 위한 평가기준은 여러 가지가 있으나, 전자저널의 경우에는 이 용량에 근거한 평가가 중요한 비중을 차지하고 있다. 이에 본고에서는 전자저널 이용통계의 역할과 문제점 등에 대해 살펴본 후 ICOLC, COUNTER의 지침을 중심으로 전자저널 이용통계 요소를 추출하여 전자저널 출판사별 통계서비스에 대해 평가해 보았다. 그 결과 COUNTER 실행코드 채택이후 전자저널 이용통계서비스가 많이 개선되었으나, 장서평가에 활용되기에는 여전히 미흡한 부분이 존재하고 있었다. 전자저널 이용통계가 도서관 장서평가에 활용되기 위해서는 도서관, 관련 단체, 출판사 등의 협력을 통해 좀더 구체적이고 표준화된 이용통계 요소가 개발되어야 하고, 전자저널 출판사, 대행사들은 이를 적극적으로 수용해야 할 것이다.

범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계 (Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose)

  • 박중오
    • 디지털산업정보학회논문지
    • /
    • 제13권4호
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.