• Title/Summary/Keyword: Knowledge Processing

Search Result 1,508, Processing Time 0.032 seconds

Developing a Web-Based Knowledge Product Outsourcing System at a University

  • Onte, Mark B.;Marcial, Dave E.
    • Journal of Information Processing Systems
    • /
    • v.9 no.4
    • /
    • pp.548-566
    • /
    • 2013
  • The availability of technology and the abundance of experts in universities create an ample opportunity to provide a venue that allows a knowledge seeker to easily connect with and request advice from university experts. On the other hand, outsourcing provides opportunities and remains one of the emerging trends in organizations, and can very clearly observed in the Philippines. This paper describes the development of a reliable web-based approach to Knowledge Product Outsourcing (KPO) services in the Silliman Online University Learning system. The system is called an "e-Knowledge Box."It integrates Web 2.0 technologies and mechanisms, such as instant messaging, private messaging, document forwarding, video conferencing, online payments, net meetings, and social collaboration together into one system. Among the tools used are WAMP Server 2.0, PHP, BlabIM, Wordpress 3.0, Video Whisper, Red5, Adobe Dreamweaver CS4, and Virtual Box. The proposed system is integrated with the search engine in URLs, Web feeds, email links, social bookmarking, search engine sitemaps, and Web Analytics Direct Visitor Reports. The site demonstrates great web usability and has an excellent rating in functionality, language and content, online help and user guides, system and user feedback, consistency, and architectural and visual clarity. Likewise, the site was was rated as being very good for the following items: navigation navigation, user control, and error prevention and correction.

An implementation of MongoDB based Distributed Triple Store on Jena Framework (MongoDB를 활용한 Jena 프레임워크 기반의 분산 트리플 저장소 구현)

  • Ahn, Jinhyun;Yang, Sungkwon;Lee, Munhwan;Jung, Jinuk;Kim, Eung-Hee;Im, Dong-Hyuk;Kim, Hong-Gee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1615-1617
    • /
    • 2015
  • 웹을 통한 데이터 공유에 대한 관심의 증가로 RDF 트리플 형태의 데이터가 폭발적으로 증가하고 있다. 대용량 RDF 데이터를 저장하고 빠른 SPARQL 질의 처리를 지원하는 트리플 저장소의 개발이 중요하다. 아파치 프로젝트 중 하나인 Jena-TDB는 가장 잘 알려진 오픈소스 트리플 저장소 중 하나로서 Jena 프레임워크 기반으로 구현됐다. 하지만 Jena-TDB 의 경우 단일 컴퓨터에서 작동하기 때문에 대용량 RDF 데이터를 다룰 수 없다는 문제점이 있다. 본 논문에서는 MongoDB를 활용한 Jena 프레임워크 기반의 트리플 저장소인 Jena-MongoDB를 제안한다. Jena 프레임워크를 사용했기 때문에 기존 Jena-TDB와 동일한 인터페이스로 사용할 수 있고 최신 표준 SPARQL 문법도 지원한다. 또한 MongoDB를 사용했기 때문에 분산환경에서도 작동할 수 있다. 대용량 LUBM 데이터셋에 대한 SPARQL 질의 처리 실험결과 Jena-MongoDB가 Jena-TDB 보다 빠른 질의 응답 속도를 보여줬다.

User Authentication Method with Two-Factor Authentication Technology on Smartphone (스마트폰에서 Two-Factor 인증 기술을 활용한 사용자 인증 방식)

  • Park, Junghun;Kim, Kangseok;Choi, Okkyung;Shon, Taeshik;Hong, Manpyo;Yeh, Hongjin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.726-729
    • /
    • 2011
  • 스마트폰의 보급으로 인해 이를 이용한 전자금융거래가 빠르게 확산되고 있다. 대부분의 금융회사가 스마트폰을 이용한 전자금융거래 서비스를 시행하고 있으며, 장소와 시간의 제약이 없는 스마트폰의 특성으로 인해 이용자 수는 계속 증가하고 있다. 그러나, 현재의 스마트폰은 전자금융거래에서 가장 중요하게 처리해야 할 인증 단계에서 보안 취약점을 보유하고 있으며, 이에 대한 보안 대책 기술이 강력하게 마련되지 못하고 있는 실정이다. 따라서 본 연구에서는 기존 연구가 가지고 있는 인증 방식의 취약점을 보안하기 위해 2팩터 인증기술과 인증 이미지 사진의 GPS정보를 활용하여 본인 인증 절차를 강화시키고, 전자금융거래에서 부인방지 기능을 제공한다. 또한, 단계별 시나리오 및 설계 방안을 제시하고 이를 바탕으로 보안 모듈을 설계 및 구현하여 연구의 효율성 및 타당성을 증명해 보이고자 한다.

Extracting Database Knowledge from Query Trees

  • 윤종필
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.2
    • /
    • pp.146-146
    • /
    • 1996
  • Although knowledge discovery is increasingly important in databases, the discovered knowledge sets may not be effectively used for application domains. It is partly because knowledge discovery does not take user's interests into account, and too many knowledge sets are discovered to handle efficiently. We believe that user's interests are conveyed by a query and if a nested query is concerned it may include a user's thought process. This paper describes a novel concept for discovering knowledge sets based on query processing. Knowledge discovery process is performed by: extracting features from databases, spanning features to generate range features, and constituting a knowledge set. The contributions of this paper include the following: (1) not only simple queries but also nested queries are considered to discover knowledge sets regarding user's interests and user's thought process, (2) not only positive examples (answer to a query) but also negative examples are considered to discover knowledge sets regarding database abstraction and database exceptions, and (3) finally, the discovered knowledge sets are quantified.

Extracting Database Knowledge from Query Trees

  • Yoon, Jongpil
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.2
    • /
    • pp.145-156
    • /
    • 1996
  • Although knowledge discovery is increasingly important in databases, the discovered knowledge sets may not be effectively used for application domains. It is partly because knowledge discovery does not take user's interests into account, and too many knowledge sets are discovered to handle efficiently. We believe that user's interests are conveyed by a query and if a nested query is concerned it may include a user's thought process. This paper describes a novel concept for discovering knowledge sets based on query processing. Knowledge discovery process is performed by: extracting features from databases, spanning features to generate range features, and constituting a knowledge set. The contributions of this paper include the following: (1) not only simple queries but also nested queries are considered to discover knowledge sets regarding user's interests and user's thought process, (2) not only positive examples (answer to a query) but also negative examples are considered to discover knowledge sets regarding database abstraction and database exceptions, and (3) finally, the discovered knowledge sets are quantified.

  • PDF

Enterprise Portal and the Integration of Business Information System (포털기반 기업정보시스템의 통합)

  • Kim, Se-Ihn
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.93-111
    • /
    • 2003
  • Enterprise portal(EP) is the emerging service and technologies in recent business area. We divided the three subportal of EP - IPP(Information Processing Porta), DPP(Decisino Processing Portal) and EKP(Enterprise Knowledge Portal). IPP include the information processing area that conduct the general business field. DPP is the area that can support the employee's decision processing and making according to their roles. The function of EKP assist the tacit knowledge management and the collaboration job among knowledge workers. If we efficiently integrate and aggregate their subportal, our business information system can achieve more efficient and effective business performance. Also we can anticipate this model that serve the system environment, supporting the user friendly circumstance, enforcing e-business activity, connecting between customer and supplier, positioning more competitive advantage.

  • PDF

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

A Study on a Knowledge-level Supporting Tool for Building Expert Systems (전문가시스템 구축을 위한 지식레벨 지원도구에 관한 연구)

  • Kim, Eun-Gyung;Kim, Seong-Hoon;Park, Choong-Shik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.662-670
    • /
    • 1998
  • In order to overcome the problems with first generation expert systems at the symbol level, recently various knowledge level development techniques of second generation expert systems have been proposed. But, these techniques are conceptual modelling techniques. This paper modifies and complements these conceptual modelling techniques and proposes a Task Object Modelling (TOM) technique as a practical knowledge level expert system development technique. This paper defines a Task Object(TO) as a knowledge unit consisted of a goal, execution conditions, behaviour knowledge, and so on. And, we define a Task Object Diagram(TOD) to depict structual, dynamic, and functional aspects of TO easily. We also define Inference Types as basic units to describe behaviour knowledge of TOs. In order to utilize the proposed TOM technique as not a simple conceptual modelling technique but a practical second generalion expert system development technique, we implement a TOD editor, a TO editor, and TO processing algorithm based on the state of TOs. Also we implement a Inference Types Library, in which each inference type is corresponded to an IRE(Jntelligent Rules Element) method, to transform the defined inference types into IRE methods automatically.

  • PDF

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.7 no.3
    • /
    • pp.549-560
    • /
    • 2011
  • Vote validity proof and verification is an efficiency bottleneck and privacy drawback in homomorphic e-voting. The existing vote validity proof technique is inefficient and only achieves honest-verifier zero knowledge. In this paper, an efficient proof and verification technique is proposed to guarantee vote validity in homomorphic e-voting. The new proof technique is mainly based on hash function operations that only need a very small number of costly public key cryptographic operations. It can handle untrusted verifiers and achieve stronger zero knowledge privacy. As a result, the efficiency and privacy of homomorphic e-voting applications will be significantly improved.

I/E Selective Activation based Knowledge Reconfiguration mechanism and Reasoning

  • Shim, JeongYon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.338-344
    • /
    • 2014
  • As the role of information collection becomes increasingly important in the enormous data environment, there is growing demand for more intelligent information technologies for managing complex data. On the other hand, it is difficult to find a solution because of the data complexity and big scaled amount. Accordingly, there is a need for a special intelligent knowledge base frame that can be operated by itself flexibly. In this paper, by adopting switching function for signal transmission in the synapse of the human brain, I/E selective activation based knowledge reconfiguring mechanism is proposed for building more intelligent information management system. In particular, knowledge network design, a special knowledge node structure, Type definition, I/E gauge definition and I/E matching scheme are provided. Using these concepts, the proposed system makes the functions of activation by I/E Gauge, selection and reconfiguration. In a more efficient manner, the routing and reasoning process was performed based on the knowledge reconfiguration network. In the experiments, the process of selection by I/E matching, knowledge reconfiguration and routing & reasoning results are described.