• Title/Summary/Keyword: Login pattern

Search Result 9, Processing Time 0.02 seconds

Analysis of Login and Learning Hour in Cyber Classes of Undergraduate Students (학부 사이버강의 수강생들의 로그인과 학습 시간 분석)

  • Moon, Bong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.171-177
    • /
    • 2007
  • The cyber classes of an e-Learning system have been considered as one of the important form of education. However, there is no or little study of effectiveness and function for the students' position. In this study, I analyzed log files in the e-learning system, and classified login and teaming hour patterns of students, who were enrolled in the undergraduate courses of the university, into hourly pattern in a daily pattern in a week, weekly pattern in a semester. I proposed general ideas to improve effectiveness and function of current e-learning. Over 50% of logins were for less than 30minutes learning and there is wasteful use of e-learning system resources.

  • PDF

Analysis of Learning Hour in Cyber Classes of Major and Non-Major Subjects (사이버강의 수강생들의 교과목별 학습시간 분석)

  • Moon, Bong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.243-251
    • /
    • 2008
  • The cyber classes of an e-Learning system have been considered as one of the important form of education. Especially. some of non-major(liberal arts and science) and major subjects are held in cyber classes. However, there is no or little study of effectiveness and function for the students' position. In this study, we analyzed log files in the e-learning system. and classified login and learning hour patterns of students. who were enrolled in the cyber classes. into hourly pattern in a day, daily pattern in a week, and weekly pattern in a semester. We proposed general ideas to improve effectiveness and function of current e-learning. Over 50% of logins were for less than 30 minutes learning and there is wasteful use of e-learning system resources.

  • PDF

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Acceleration Techniques for Cycle-Based Login Simulation (사이클 기반 논리시뮬레이션 가속화 기법 연구)

  • Park, Young-Ho;Park, Eun-Sei
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.50 no.1
    • /
    • pp.45-50
    • /
    • 2001
  • With increasing complexity of digital logic circuits, fast and accurate verification of functional behaviour becomes most critical bottleneck in meeting time-to-market requirement. This paper presents several techniques for accelerating a cycle-based logic simulation. The acceleration techniques include parallel pattern logic evaluation, circuit size reduction, and the partition of feedback loops in sequential circuits. Among all, the circuit size reduction plays a critical role in maximizing logic simulation speedup by reducing 50% of entire circuit nodes on the average. These techniques are incorporated into a levelized table-driven logic simulation system rather than a compiled-code simulation algorithm. Finally, experimental results are given to demonstrate the effectiveness of the proposed acceleration techniques. Experimental results show more than 27 times performance improvement over single pattern levelized logic simulation.

  • PDF

A study on Prevention of Large Scale Identity Theft through the Analysis of Login Pattern(Focusing on IP/Account Blocking System in Online Games) (로그인 패턴 분석을 통한 대규모 계정도용 차단 방안에 관한 연구(온라인 게임 IP/계정 차단시스템을 중심으로))

  • Yeon, Soo-Kwon;Yoo, Jin-Ho
    • Journal of Korea Game Society
    • /
    • v.16 no.2
    • /
    • pp.51-60
    • /
    • 2016
  • The incidents of massive personal information being leaked are occurring continuously over recent years. Personal information leaked outside is used for an illegal use of other's name and account theft. Especially it is happening on online games whose virtual goods, online game money and game items can be exchanged with real cash. When we research the real identity theft cases that happened in an online game, we can see that they happen massively in a short time. In this study, we define the characteristics of the mass attacks of the automated identity theft cases that occur in online games. Also we suggest a system to detect and prevent identity theft attacks in real time.

Real-time Identification of Skype Application Traffic using Behavior Analysis (동작형태 분석을 통한 Skype 응용 트래픽의 실시간 탐지 방법)

  • Lee, Sang-Woo;Lee, Hyun-Shin;Choi, Mi-Jung;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.131-140
    • /
    • 2011
  • As the number of Internet users and applications is increasing, the importance of application traffic classification is growing more and more for efficient network management. While a number of methods for traffic classification have been introduced, such as signature-based and machine learning-based methods, Skype application, which uses encrypted communication on its own P2P network, is known as one of the most difficult traffic to identify. In this paper we propose a novel method to identify Skype application traffic on the fly. The main idea is to setup a list of Skype host information {IP, port} by examining the packets generated in the Skype login process and utilizes the list to identify other Skype traffic. By implementing the identification system and deploying it on our campus network, we proved the performance and feasibility of the proposed method.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

Comparison Analysis for Using the Habitat Pattern Between the Korean Endangered Species, Mauremys reevesii, and the Exotic Species, Trachemys scripta elegans (한국산 남생이와 외래종 붉은귀거북의 서식지 이용 패턴 비교 분석)

  • Jo, Shin-il;Na, Sumi;An, Chi-Kyung;Kim, Hyun-jung;Jeong, Yu-Jeong;Lim, Yang-Mook;Kim, Seon Du;Song, Jae Yong;Yi, Hoonbok
    • Korean Journal of Environment and Ecology
    • /
    • v.31 no.4
    • /
    • pp.397-408
    • /
    • 2017
  • The purpose of this study is to identify the home range and habitat using pattern of the native species, Mauremys reevesii, and the exotic species, Trachemys scripta elegans, and to analyze the mutual competition relationship of the two species. This study was conducted at the Goldfish square pond, which is located in the upper part of the valley of Cheonggye mountain from August 2, 2010 to January 30, 2011. We used the three artificially proliferating M. reevesii and three T. scripta elegans which were inhabited in the ponds and reservoirs for monitoring study after attaching the transmitter to each of them. We measured the home range and the habitat utilization radius of three individuals of each species and the environmental factors such as temperature, humidity and soil and water temperature around the Goldfish square pond. As our results, it was analyzed that the M. reevesii and T. scripta elegans have a redundant ecological positions in various aspects such as limited sunbathing places, food resource utilization, hibernation place, etc. We also found that the relatively small M. reevesii was being pushed out of the competition by the relatively big. Further investigation of food competition and habitat utilization should be necessary for these two species for the natural habitats, their home range, food competition, and habitat utilization. The result of this study will be the basic data M. reevesii's restoration project.

A Study on the Usage Pattern Based on Genres and Socio-demographic Characteristics in Online Games (사회통계학적, 장르적 분류에 따른 온라인 게임의 이용 특성에 관한 연구)

  • Ryu, Sung-Il;Park, Sun-Ju
    • Journal of Korea Game Society
    • /
    • v.10 no.3
    • /
    • pp.61-71
    • /
    • 2010
  • This study looks into the usage pattern in online games based on genres and socio-demographic characteristics. Compared to the prior studies that adopted survey as their main research method, this study has analyzed the actual data of game login records and adopted parametric modeling and mathematical approach. In terms of the socio-demographic characteristics, the following facts were confirmed: men > women by gender, students > white-collars > housewives > blue-collars > self-employed > jobless(etc.) by occupation, college graduates > K-12 students > high-school graduates > undergrads & grads by academic background, 3∼5 million > 1∼3 million > over 5 million > less than 1 million by income levels, and not married > married by marital status. In terms of genres, the population of the players is in the order of web board games, RPG, action/racing/shooting, and sports. The RPG game is confirmed to have a higher level of MCR (Max Concurrent User Ratio) than any other genres. On the other hand, the hypothesis on the difference in Repeated Use Ratio according to genres is rejected. This study has also confirmed that interactions exist between gender and age; genre and gender; genre and age among online game users, and conducted post-hoc analysis about those interactions.