• Title/Summary/Keyword: Remote User

Search Result 994, Processing Time 0.027 seconds

An Effective User-Profile Generation Method based on Identification of Informative Blocks in Web Document (웹 문서의 정보블럭 식별을 통한 효과적인 사용자 프로파일 생성방법)

  • Ryu, Sang-Hyun;Lee, Seung-Hwa;Jung, Min-Chul;Lee, Eun-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.253-257
    • /
    • 2007
  • 최근 웹 상에 정보가 폭발적으로 증가함에 따라, 사용자의 취향에 맞는 정보를 선별하여 제공하는 추천 시스템에 대한 연구가 활발히 진행되고 있다. 추천시스템은 사용자의 관심정보를 기술한 사용자 프로파일을 기반으로 동작하기 때문에 정확한 사용자 프로파일의 생성은 매우 중요하다. 사용자의 암시적인 행동정보를 기반으로 취향을 분석하는 대표적인 연구로 사용자가 이용한 웹 문서를 분석하는 방법이 있다. 이는 사용자가 이용하는 웹 문서에 빈번하게 등장하는 단어를 기반으로 사용자의 프로파일을 생성하는 것이다. 그러나 최근 웹 문서는 사용자 취향과 관련 없는 많은 구성요소들(로고, 저작권정보 등)을 포함하고 있다. 따라서 이러한 내용들을 모두 포함하여 웹 문서를 분석한다면 생성되는 프로파일의 정확도는 낮아질 것이다. 따라서 본 논문에서는 사용자 기기에서 사용자의 웹 문서 이용내역을 분석하고, 동일한 사이트로부터 얻어진 문서들에서 반복적으로 등장하는 블록을 제거한 후, 정보블럭을 식별하여 사용자의 관심단어를 추출하는 새로운 프로파일 생성방법을 제안한다. 이를 통해 보다 정확하고 빠른 프로파일 생성이 가능해진다. 본 논문에서는 제안방법의 평가를 위해, 최근 구매활동이 있었던 사용자들이 이용한 웹 문서 데이터를 수집하였으며, TF-IDF 방법과 제안방법을 이용하여 사용자 프로파일을 각각 추출하였다. 그리고 생성된 사용자 프로파일과 구매데이터와의 연관성을 비교하였으며, 보다 정확한 프로파일이 추출되는 결과와 프로파일 분석시간이 단축되는 결과를 통해 제안방법의 유효성을 입증하였다.)으로 높은 점수를 보였으며 내장첨가량에 따른 관능특성에서는 온쌀죽은 내장 $2{\sim}5%$ 첨가, 반쌀죽은 내장 $3{\sim}5%$ 첨가구에서 유의적(p<0.05)으로 높은 점수를 보였으나 쌀가루죽은 내장 $1{\sim}2%$ 첨가구에서 유의적(p<0.05)으로 낮은 점수를 보였다. 이상의 연구 결과를 통해 온쌀은 2%, 반쌀은 3%, 쌀가루는 4%의 내장을 첨가하여 제조한 전복죽이 이화학적, 물성적 및 관능적으로 우수한 것으로 나타났다.n)방법의 결과와 비교하였다.다. 유비스크립트에서는 모바일 코드의 개념을 통해서 앞서 언급한 유비쿼터스 컴퓨팅 환경에서의 문제점을 해결하고자 하였다. 모바일 코드에서는 프로그램 코드가 네트워크를 통해서 컴퓨터를 이동하면서 수행되는 개념인데, 이는 물리적으로 떨어져있으면서 네트워크로 연결되어 있는 다양한 컴퓨팅 장치가 서로 연동하기 위한 모델에 가장 적합하다. 이는 기본적으로 배포(deploy)라는 단계가 필요 없게 되고, 새로운 버전의 프로그램이 작성될지라도 런타임에 코드가 직접 이동하게 되므로 버전 관리의 문제도 해결된다. 게다가 원격 함수를 매번 호출하지 않고 한번 이동된 코드가 원격지에서 모두 수행을 하게 되므로 성능향상에도 도움이 된다. 장소 객체(Place Object)와 원격 스코프(Remote Scope)는 앞서 설명한 특징을 직접적으로 지원하는 언어 요소이다. 장소 객체는 모바일 코드가 이동해서 수행될 계산 환경(computational environment

  • PDF

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

ICT based Wireless Power Transmission System Development (ICT 기반의 무선전력전송 시스템 개발)

  • Lee, Jong-Hee;Bang, Junho;Chun, Hyun-Jun;Seo, Beom-Geun;Ryu, In-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.67-73
    • /
    • 2016
  • Recently, wireless power transmission has attracted much interest and is the subject of much research in industry and academia. As its name implies, it is a technology which involves transferring power without wires. This paper presents the design of an ICT-based wireless power transmission system. The proposed system consists of a wireless transceiver unit and high-efficiency coil unit, which can increase both the transmission efficiency and the effective power distance. In particular, the wireless transceiver unit was designed to work with the ICT technique to enable real-time remote monitoring. Also, studies were done relating to the effect of reducing the standby power. The optimal frequency of IGBT devices used in industrial wireless power systems of 20[KHz] was utilized. The values of $23.9[{\mu}H]$ and $2.64[{\mu}F]$ were selected for L and C, respectively, through many field experiments designed to optimize the system design. In addition, an output current controlling algorithm was developed for the purpose of reducing the standby power. The results presented in this paper represent a 75[%] to 85[%] higher power transmission efficiency with a 10[%] increase in the effective power transmission distance compared with the existing systems. As a result, the proposed system exhibits a lower standby power and maintenance costs. Also, the designed wireless transceiver unit facilitates fault detection by means of user acquired data with the development of the ICT applied program.

Efficient Multi-spot Monitoring System Using PTZ Camera and Wireless Sensor Network (PTZ 카메라와 무선 센서 네트워크를 이용한 효율적인 다중 지역 절전형 모니터링 시스템)

  • Seo, Dong-kyu;Son, Cheol-su;Yang, Su-yeong;Cho, Byung-lok;Kim, Won-jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.581-584
    • /
    • 2009
  • Recently, the cameras which used for observation are installed in children protection area and local crime prevention area in order to protect life and property and by its work being recognized and are installed more. Normal cameras have cost problem to observe multiple area and detail, because they can observe only one place. PTZ camera can observe multiple area by moving focus by schedule or remote control, but it can't automatically move the focus of it to the place where event occurred, because it can't recognize the place. In this study, we can monitor multiple area effectively, by installing a wireless sensor node equipped with temperature, lighting, gas and human detection sensor to each area, to monitor many place low-price and actively and to move the focus of PTZ camera to preset position, and send recorded video to the user, when the various sensor data received from wireless sensors in observation area are to be determined abnormal by analyzing. In addition, at night we can record a scene using infrared, but to reduce power consumption of lighting system which are installed to improve resolution, it supplies power to the lighting system when event occurred. So we were able to implement low power green monitoring system.

  • PDF

Protecting Fingerprint Data for Remote Applications (원격응용에 적합한 지문 정보 보호)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.63-71
    • /
    • 2006
  • In this paper, we propose a secure solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. To protect possible attacks launched at the untrusted client, our solution makes the fingerprint sensor validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation to check the result, performs the minutiae extraction with the received binary image from the client, and then sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely and in real-time with the aid of an untrusted client.

Deep Learning Based Group Synchronization for Networked Immersive Interactions (네트워크 환경에서의 몰입형 상호작용을 위한 딥러닝 기반 그룹 동기화 기법)

  • Lee, Joong-Jae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.373-380
    • /
    • 2022
  • This paper presents a deep learning based group synchronization that supports networked immersive interactions between remote users. The goal of group synchronization is to enable all participants to synchronously interact with others for increasing user presence Most previous methods focus on NTP-based clock synchronization to enhance time accuracy. Moving average filters are used to control media playout time on the synchronization server. As an example, the exponentially weighted moving average(EWMA) would be able to track and estimate accurate playout time if the changes in input data are not significant. However it needs more time to be stable for any given change over time due to codec and system loads or fluctuations in network status. To tackle this problem, this work proposes the Deep Group Synchronization(DeepGroupSync), a group synchronization based on deep learning that models important features from the data. This model consists of two Gated Recurrent Unit(GRU) layers and one fully-connected layer, which predicts an optimal playout time by utilizing the sequential playout delays. The experiments are conducted with an existing method that uses the EWMA and the proposed method that uses the DeepGroupSync. The results show that the proposed method are more robust against unpredictable or rapid network condition changes than the existing method.

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.

A Study on Factors Affecting Usage Intention of Metaverse Services in the Work Environment (업무환경에서의 메타버스 사용의도에 대한 영향요인 연구)

  • Wonsang Cho;Hyunchul Ahn
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.251-273
    • /
    • 2022
  • Metaverse is one of the most frequently used words recently, with digitalization accelerated by the COVID-19 pandemic that started in 2019 and the development of information and communication technology. It is expected to bring a new revolution in our life as a whole in user experience. In particular, as telecommuting was adopted in the business area, interest in virtual office services such as digital video conferencing and remote offices, which are similar to the metaverse, has also increased. In this study, a study on the intention to use the metaverse service used in the work environment was applied to the Unified Theory of Acceptance and Use of Technology 2(UTAUT2). External variables for metaverse characteristics, such as self-presentation, telepresence, and technostress, were analyzed and discussed. In this study, PC-based Gather.town and VR-based Facebook Horizon, currently the most well-known and considered usable in work environments, were introduced to potential users and conducted a survey. This study has academic implications in that the research has examined the factors that affect the technology acceptance intention of users who want to apply the metaverse as a work environment based on the UTAUT2 model, unlike previous studies that have been mainly researched on the general metaverse. In practice, it may be helpful to suggest factors that should be considered when firms adopt the metaverse for business purposes.

Protecting Multi Ranked Searchable Encryption in Cloud Computing from Honest-but-Curious Trapdoor Generating Center (트랩도어 센터로부터 보호받는 순위 검색 가능한 암호화 다중 지원 클라우드 컴퓨팅 보안 모델)

  • YeEun Kim;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1077-1086
    • /
    • 2023
  • The searchable encryption model allows to selectively search for encrypted data stored on a remote server. In a real-world scenarios, the model must be able to support multiple search keywords, multiple data owners/users. In this paper, these models are referred to as Multi Ranked Searchable Encryption model. However, at the time this paper was written, the proposed models use fully-trusted trapdoor centers, some of which assume that the connection between the user and the trapdoor center is secure, which is unlikely that such assumptions will be kept in real life. In order to improve the practicality and security of these searchable encryption models, this paper proposes a new Multi Ranked Searchable Encryption model which uses random keywords to protect search words requested by the data downloader from an honest-but-curious trapdoor center with an external attacker without the assumptions. The attacker cannot distinguish whether two different search requests contain the same search keywords. In addition, experiments demonstrate that the proposed model achieves reasonable performance, even considering the overhead caused by adding this protection process.

A Study on Metaverse Framework Design for Education and Training of Hydrogen Fuel Cell Engineers (수소 연료전지 엔지니어 양성을 위한 메타버스 교육훈련 플랫폼에 관한 연구)

  • Yang Zhen;Kyung Min Gwak;Young J. Rho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.207-212
    • /
    • 2024
  • The importance of hydrogen fuel cells continues to be emphasized, and there is a growing demand for education and training in this field. Among various educational environments, metaverse education is opening a new era of change in the global education industry, especially to adapt to remote learning. The most significant change that the metaverse has brought to education is the shift from one-way, instructor-centered, and static teaching approaches to multi-directional and dynamic ones. It is expected that the metaverse can be effectively utilized in hydrogen fuel cell engineer education, not only enhancing the effectiveness of education by enabling learning and training anytime, anywhere but also reducing costs associated with engineering education.In this research, inspired by these ideas, we are designing a fuel cell education platform. We have created a platform that combines theoretical and practical training using the metaverse. Key aspects of this research include the development of educational training content to increase learner engagement, the configuration of user interfaces for improved usability, the creation of environments for interacting with objects in the virtual world, and support for convergence services in the form of digital twins.