• Title/Summary/Keyword: URL information

Search Result 329, Processing Time 0.021 seconds

Constructing a Metadata Database to Enhance Internet Retrieval of Educational Materials

  • Oh Sam-Gyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.143-156
    • /
    • 1998
  • This paper reports the GEM (Gateway to Educational Materials) project whose goal is to develop an operational framework to provide the K-12 teachers in the world with 'one-stop/any-stop' access to thousands of lesson plans, curriculum units and other Internet-based educational resources. To the IS-element Dublin Core base package, the GEM project added an 8-element, domain-specific GEM package. The GEM project employed the conceptual data modeling approach to designing the GEM database, used the Sybase relational database management system (RDBMS) to construct the backend database for storing the metadata of educational resources, and also employed the active server page (ASP) technology to provide Web interfaces to that database. The consortium members catalog lesson plans and other Internet-based educational resources using a cataloging module program that produces HTML meta tags. A harvest program collects these meta tags across the Internet and outputs an ASCII file that conforms to the standard agreed by the consortium members. A parser program processes this file to enter meta tags automatically into appropriate relational tables in the Sybase database. The conceptual/logical schemas of Dublin Core and GEM profile are presented. The advantages of conceptual modeling approach to manage metadata are discussed. A prototype system that provides access to the GEM metadata is available at http://lis.skku.ac.kr/gem/.

  • PDF

Reproduction based Multi-Contents Distribution Platform

  • Lee, Byung-Duck;Lee, Keun-Ho;Han, Seong-Soo;Jeong, Chang-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.695-712
    • /
    • 2021
  • As the use of smart devices is being increased rapidly by the development of internet and IT technology, the contents production and utilization rate are showing higher increase, too. In addition, the type of contents also shows very diverse forms such as education, game, video, UCC, etc. In the meantime, the contents are reproduced in diverse forms by reprocessing the original contents, and they are being serviced through the contents service platform. Therefore, the platform to make the contents reprocessing easy and fast is needed. As the diverse contents distribution channels such as YouTube, SNS, App Service, etc, easier contents distribution platform is needed, and the development of the relevant area is expected. In addition, as the selective consumption of the contents having easy accessibility through diverse smart devices is distinguished, the demand for the platform and service that can identify the contents consumption propensity by individual is being increased. Therefore, in this study, to vitalize the online contents distribution, the contents reproduction and publishing platform, was designed and materialized, which can reproduce and distribute the contents based on the real-time contents editing technology in URL unit and the consumer propensity analysis technology using the data management-based broadcasting contents distribution metadata technology and the edited image contents streaming technology. In addition, in the results of comparing with other platforms through the experiment, the performance superiority of the suggested platform was verified. If the suggested platform is applied to the areas of education, broadcasting, press, etc, the multi-media contents can be reproduced and distributed easily, through which the vitalization of contents-related industry is expected.

Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap (이메일 스팸트랩을 이용한 좀비 PC 및 봇넷 추적 방안연구)

  • Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Oh, Joo-Hyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.101-115
    • /
    • 2011
  • A botnet is a huge network of hacked zombie PCs. Recognizing the fact that the majority of email spam is sent out by botnets, a system that is capable of detecting botnets and zombie PCS will be designed in this study by analyzing email spam. In this study, spam data collected in "an email spam trail system", Korea's national spam collection system, were used for analysis. In this study, we classified the spam groups by the URLs or attached files, and we measured how much the group has the characteristics of botnet and how much the IPs have the characteristics of zombie PC. Through the simulation result in this study, we could extract 16,030 zombie suspected PCs for one hours and it was verified that email spam can provide considerably useful information in tracing zombie PCs.

Information types and characteristics within the Wireless Emergency Alert in COVID-19: Focusing on Wireless Emergency Alerts in Seoul (코로나 19 하에서 재난문자 내의 정보유형 및 특성: 서울특별시 재난문자를 중심으로)

  • Yoon, Sungwook;Nam, Kihwan
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.45-68
    • /
    • 2022
  • The central and local governments of the Republic of Korea provided information necessary for disaster response through wireless emergency alerts (WEAs) in order to overcome the pandemic situation in which COVID-19 rapidly spreads. Among all channels for delivering disaster information, wireless emergency alert is the most efficient, and since it adopts the CBS(Cell Broadcast Service) method that broadcasts directly to the mobile phone, it has the advantage of being able to easily access disaster information through the mobile phone without the effort of searching. In this study, the characteristics of wireless emergency alerts sent to Seoul during the past year and one month (January 2020 to January 2021) were derived through various text mining methodologies, and various types of information contained in wireless emergency alerts were analyzed. In addition, it was confirmed through the population mobility by age in the districts of Seoul that what kind of influence it had on the movement behavior of people. After going through the process of classifying key words and information included in each character, text analysis was performed so that individual sent characters can be used as an analysis unit by applying a document cluster analysis technique based on the included words. The number of WEAs sent to the Seoul has grown dramatically since the spread of Covid-19. In January 2020, only 10 WEAs were sent to the Seoul, but the number of the WEAs increased 5 times in March, and 7.7 times over the previous months. Since the basic, regional local government were authorized to send wireless emergency alerts independently, the sending behavior of related to wireless emergency alerts are different for each local government. Although most of the basic local governments increased the transmission of WEAs as the number of confirmed cases of Covid-19 increases, the trend of the increase in WEAs according to the increase in the number of confirmed cases of Covid-19 was different by region. By using structured econometric model, the effect of disaster information included in wireless emergency alerts on population mobility was measured by dividing it into baseline effect and accumulating effect. Six types of disaster information, including date, order, online URL, symptom, location, normative guidance, were identified in WEAs and analyzed through econometric modelling. It was confirmed that the types of information that significantly change population mobility by age are different. Population mobility of people in their 60s and 70s decreased when wireless emergency alerts included information related to date and order. As date and order information is appeared in WEAs when they intend to give information about Covid-19 confirmed cases, these results show that the population mobility of higher ages decreased as they reacted to the messages reporting of confirmed cases of Covid-19. Online information (URL) decreased the population mobility of in their 20s, and information related to symptoms reduced the population mobility of people in their 30s. On the other hand, it was confirmed that normative words that including the meaning of encouraging compliance with quarantine policies did not cause significant changes in the population mobility of all ages. This means that only meaningful information which is useful for disaster response should be included in the wireless emergency alerts. Repeated sending of wireless emergency alerts reduces the magnitude of the impact of disaster information on population mobility. It proves indirectly that under the prolonged pandemic, people started to feel tired of getting repetitive WEAs with similar content and started to react less. In order to effectively use WEAs for quarantine and overcoming disaster situations, it is necessary to reduce the fatigue of the people who receive WEA by sending them only in necessary situations, and to raise awareness of WEAs.

An Analysis on the Operational state of Distance Universities' Electronic Libraries through the Life-long Education Law (평생교육법령하의 원격대학 전자도서관의 운영 실태 분석)

  • Lee Jong-Moon
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.99-113
    • /
    • 2005
  • The purpose of this research is to analyze the operational state of Distance universities' electronic libraries through the Lifelong Education Law, and to find out the related problems. The main investigational focus was on the operational methodologies of the libraries and the usage levels of the full-text service. The data were collected through accessing the URLs of 17 Distance universities authorized till 2005. The result is that every university is operating their libraries either on their own $(17.7\%)$ or by using the links to the external libraries $(82.4\%)$. However, only $(35.3\%)$ of the surveyed universities provide the full-text service available on the Internet. Thus, in order to establish the fourth generation Distance university based on the Internet and Web, it is urgently needed to improve the construction and operation standards of electronic libraries in the Lifelong Education Law.

  • PDF

An Effective Detection of Print Image Forgeries Based on Modeling of Color Matrix : An Application to QR Code (컬러 매트릭스 모델링에 의한 영상 인쇄물 위변조 검출 기법 : QR코드에의 적용)

  • Choi, Do-young;Kim, Jin-soo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.431-442
    • /
    • 2018
  • 2-dimensional barcode, QR code has been used for containing various information such as image, video, map, and business cards. Currently, a smartphone is used as a QR code scanner, displaying the code and converting it to a standard URL for a website. However, QR codes are not very common in encrypted application and so have a few applications. This paper proposes a new color-code, which integrates the conventional QR code and color design, and can be effectively used in some product certification system. The proposed method exploits the fact that genuine code is produced by CMYK color model, but the counterfeit is captured by RGB color model and during this process, color information of the code is changed. This paper introduces the color matrix model to measure the distortion between genuine code and counterfeit code. By investigating the statistical characteristics of color matrix, an effective detection of print image forgeries are designed. Various experiments with color codes show that the proposed system can be effectively used in product certification systems.

Exploring Sweepstakes Marketing Strategies in Facebook Brand Fan Pages (페이스북 브랜드 팬 페이지의 경품 이벤트 마케팅 전략에 관한 탐색적 연구)

  • Choi, Yoon-Jin;Jeon, Byeong-Jin;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.1-23
    • /
    • 2017
  • Purpose Facebook is a social network service that has the highest number of Monthly Active Users around the world. Hence, marketers have selected Facebook as the most important platform to get customer engagement. With respect to the customer engagement enhancement, the most popular and engaging post type in the Facebook brand fan pages related to what was usually classified as 'sweepstakes'. Sweepstakes refer to a form of gambling where the entire prize may be awarded to the winner. Which makes customers more engaged with the brand. This study aims to explore sweepstakes-oriented social media marketing approaches based on the application of big data analytics. Design/methodology/approach we collect sweepstakes data from each company based on the data crawling from the Facebook brand fan pages. The output of this study explains how companies in each category of FCB grid can design and apply sweepstakes for their social media marketing. Findings The results show that they have one thing in common across the four quadrants of FCB grid. Regardless of the quadrants, most frequently observed type is 'Simple/Quiz or Comments/Quatrains [event type of sweepstakes] + Gifticon [type of reward prize] + Image [type of message display] + No URL [Link toother website] +Single-Gift-Offer [type of reward prize payment]'. So, if the position of the brand is hard to be defined by the FCB grid model, then this general rule can be applied to all types of brands. Also some differences between the quadrants of the FCB grid were observed. This study offers several research implications by analyzing Sweepstakes-oriented social media marketing approaches in Facebook brand fan pages. By using the FCB grid model, this study provides guidance on how companies can design their sweepstakes-oriented social media marketing approaches in the context of Facebook brand fan pages by considering their context.

The Effectiveness of High-level Text Features in SOM-based Web Image Clustering (SOM 기반 웹 이미지 분류에서 고수준 텍스트 특징들의 효과)

  • Cho Soo-Sun
    • The KIPS Transactions:PartB
    • /
    • v.13B no.2 s.105
    • /
    • pp.121-126
    • /
    • 2006
  • In this paper, we propose an approach to increase the power of clustering Web images by using high-level semantic features from text information relevant to Web images as well as low-level visual features of image itself. These high-level text features can be obtained from image URLs and file names, page titles, hyperlinks, and surrounding text. As a clustering engine, self-organizing map (SOM) proposed by Kohonen is used. In the SOM-based clustering using high-level text features and low-level visual features, the 200 images from 10 categories are divided in some suitable clusters effectively. For the evaluation of clustering powers, we propose simple but novel measures indicating the degrees of scattering images from the same category, and degrees of accumulation of the same category images. From the experiment results, we find that the high-level text features are more useful in SOM-based Web image clustering.

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF

A method for automatic EPC code conversion based on ontology methodology (온톨로지 기반 EPC 코드 자동 변환 방법)

  • Noh, Young-Sik;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.452-460
    • /
    • 2008
  • ALE-complient RFID middleware system receives EPC code data from reader devices and converts the data into URN format data internally. After filtering and grouping, the system sends the resulting URN code to application and(or) users. Meanwhile, not only the types of EPC code are very diverse, but also another new kinds of EPC code can be emerged in the future. Therefore, a method to process all kinds of EPC code effectively is required by RFID middleware. In this paper, a method to process various kinds of EPC code acquired from RFID reader devices in ALE-complient RFID middleware is proposed. Especially, we propose an approach using ontology technology to process not only existing EPC code but also newly defined code in the future. That is, we build an ontology of conversion rules for each EPC data type to effectively convert EPC data into URL format data. In this case, we can easily extend RFID middleware to process a new EPC code data by adding a conversion rule ontology for the code.