• 제목/요약/키워드: User Information

검색결과 18,075건 처리시간 0.04초

최종이용자컴퓨팅과 최종이용자탐색 (End-user Computing and End- User Searching)

  • 이상복
    • 한국비블리아학회지
    • /
    • 제7권1호
    • /
    • pp.171-192
    • /
    • 1994
  • End-user Computing(EUC) is one of the significant developments of the 1980s with the explosive supply of personal computers and application software related to it. EUC can be defined as the direct assumption of system development and data processing tasks by the user of the service for his own direct benefit. This is in contrast to the traditional approach to computing in which user requirement are identified and defined and then turned over to professional system designers and programmers for implementation, with the end-user a relatively passive participant in the process. The traditional approach to system development has two obvious drawbacks. First, there is the problem that something may be lost in translation of the problem as originally formulated by the requestor and as it is implemented by the computer specialists. Second, there is the problem that it can take a longtime as growth of significant workloads within system department staff. EUC is an attempt to compensate for this drawbacks associated with the traditional system department process. It permits the end-user to interact directly with an information system, utilizing user friendly software support tools. End-user Searching(EUS) can be defined as accessing online databases and performing search operations for the purpose of finding information to be used by that same person rather than another, in contract with intermediary searcher. The concept of EUS is related to the concept of EUS. That is, two concept are similarly to development background, effects and functions. Therefore, as EUC bring on a change the traditional data processing environment, EUS also bring on a change the traditional intermediary search environment.

  • PDF

Interaction-based Collaborative Recommendation: A Personalized Learning Environment (PLE) Perspective

  • Ali, Syed Mubarak;Ghani, Imran;Latiff, Muhammad Shafie Abd
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권1호
    • /
    • pp.446-465
    • /
    • 2015
  • In this modern era of technology and information, e-learning approach has become an integral part of teaching and learning using modern technologies. There are different variations or classification of e-learning approaches. One of notable approaches is Personal Learning Environment (PLE). In a PLE system, the contents are presented to the user in a personalized manner (according to the user's needs and wants). The problem arises when a new user enters the system, and due to the lack of information about the new user's needs and wants, the system fails to recommend him/her the personalized e-learning contents accurately. This phenomenon is known as cold-start problem. In order to address this issue, existing researches propose different approaches for recommendation such as preference profile, user ratings and tagging recommendations. In this research paper, the implementation of a novel interaction-based approach is presented. The interaction-based approach improves the recommendation accuracy for the new-user cold-start problem by integrating preferences profile and tagging recommendation and utilizing the interaction among users and system. This research work takes leverage of the interaction of a new user with the PLE system and generates recommendation for the new user, both implicitly and explicitly, thus solving new-user cold-start problem. The result shows the improvement of 31.57% in Precision, 18.29% in Recall and 8.8% in F1-measure.

모바일 기반 라이프로그를 이용한 사용자 행동 예측 기법 (A user behavior prediction technique using mobile-based Lifelog)

  • 방재근;김병만
    • 한국산업정보학회논문지
    • /
    • 제19권6호
    • /
    • pp.63-76
    • /
    • 2014
  • 최근 많은 사람들이 스마트폰을 이용해 다양한 방법으로 원하는 정보를 추천 받고 있다. 그와 관련해 추천을 위한 많은 어플리케이션이 존재하지만, 현재 사용자 상황에 맞는 정보를 추천해 주는 것은 없다. 자동으로 사용자의 상황에 맞는 추천을 하기 위해서는 사용자의 과거 행위이력으로 부터 미래의 행위를 예측할 필요가 있다. 이에 본 논문에서는 스마트폰을 이용해 사용자의 현재 상황을 수집하고, 수집된 데이터를 라이프로그를 분석하여 구축한 베이지안 네트워크에 적용하여 현 행동을 판별한 후 연관분석을 통해 사용자가 미래에 하게 될 행동을 예측하는 방법을 제안한다. 5명의 실제 학생과 5명의 가상의 직장인에 대해서 실험 및 분석해 본 결과 그 유용성을 확인할 수 있었다.

MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현 (Implementation of User Account Vulnerability Checking Function System using MS-SQL Database)

  • 장승주
    • 한국정보통신학회논문지
    • /
    • 제18권10호
    • /
    • pp.2482-2488
    • /
    • 2014
  • 본 논문에서는 MS-SQL 데이터베이스의 환경과 C++ 환경을 이용하여 데이터베이스 사용자 계정 취약점을 판별한다. MS-SQL 데이터베이스에서 패스워드나 사용자 설정이 변경되었는지를 체크한다. 또한, 사용자 계정이 만료되었거나 오랫동안 패스워드를 변경하지 않았으면 보안 취약점이 존재하는 것으로 판단한다. 이것은 제 3의 악의적인 사용자가 해킹 등을 하는 것을 방지, 예방을 하기 위한 목적이다. 최근에는 정보 자산이 더욱 중요하게 되어가고 있다. 데이터베이스의 정보 손실이 일어나게 된다면 큰 피해를 입게 된다. 본 논문은 MS-SQL 데이터베이스의 사용자 계정 만료 유무와 오랫동안 패스워드 설정이 변경되지 않은 사용자 계정을 점검하는 모듈을 개발한다. 이 기능을 이용하여 보안취약점 점검을 함으로써 악의적인 사용자가 데이터베이스에 접근을 할 수 없도록 한다.

User-Customized News Service by use of Social Network Analysis on Artificial Intelligence & Bigdata

  • KANG, Jangmook;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • 제10권3호
    • /
    • pp.131-142
    • /
    • 2021
  • Recently, there has been an active service that provides customized news to news subscribers. In this study, we intend to design a customized news service system through Deep Learning-based Social Network Service (SNS) activity analysis, applying real news and avoiding fake news. In other words, the core of this study is the study of delivery methods and delivery devices to provide customized news services based on analysis of users, SNS activities. First of all, this research method consists of a total of five steps. In the first stage, social network service site access records are received from user terminals, and in the second stage, SNS sites are searched based on SNS site access records received to obtain user profile information and user SNS activity information. In step 3, the user's propensity is analyzed based on user profile information and SNS activity information, and in step 4, user-tailored news is selected through news search based on user propensity analysis results. Finally, in step 5, custom news is sent to the user terminal. This study will be of great help to news service providers to increase the number of news subscribers.

Research and Design of Functional Requirements of Shared Electric Bicycle App Based on User Experience

  • Xiangqin Zhao;Bin Wang
    • Journal of Information Processing Systems
    • /
    • 제19권2호
    • /
    • pp.219-231
    • /
    • 2023
  • Intelligent applications are crucial for increasing the popularity of shared urban electric bicycles (EBs). Building an application platform architectural system that can satisfy independent user operations is critical for increasing the intelligent usage of shared EBs. Consequently, we collected online reviews of shared EB applications, conducted semantic processing and sentiment analysis, and refined the positive and negative review data for each function. The positive and negative review indices of each function were calculated using the formulae for positive and negative review indices of product functions, thereby determining the functions that need to be improved. Each function of the Shared EB application was improved according to its business process. The main contributions of this study are to build a user requirement architecture system for the Shared EB application with five dimensions and 22 functions using the Delphi method to design the user interface (UI) of this application based on user satisfaction evaluation results; to create a high-fidelity dynamic interaction prototype and compare user satisfaction before and after improving the Shared EB application functions. The testing results indicate that the changes in the UI significantly improve the user experience satisfaction of the urban Shared EB application, with the positive experience index increasing by 69.21% and the negative experience index decreasing by 75.85% overall. This information can be directly used by relevant companies to improve the functions of the Shared EB application.

서비스 가치 관점에서의 e-정보서비스 사용 의도에 관한 연구 (Determinants of the intention to use information services)

  • 한정희;장활식
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제13권1호
    • /
    • pp.97-119
    • /
    • 2004
  • Recently, many e-business companies started to charge fees to the use of information contents service. However, little is known about how users evaluate and determine to purchase information services. Past technology adoption research has focused primarily on the positive utility gains side, focusing on usefulness and ease of use. Purchase of e-service, however, involves not only the position utilities but also negative utilities. This research uses the service value model(SVM) and explains user's intention of purchasing a new information service. Based on the Perceived Value Framework, this research investigates the impacts of the service quality and the fee charge on the user's perceived service value and further on user's intention of adopting the e-service. One of the most important postulations of this research is that both service quality and the fee charge influence user's intention through affecting the user's perceived service value. This research presences a conceptual model of users' e-service evaluation process. The conceptual framework provides a basis for understanding how perceptions of quality and sacrifice influence value perceptions and purchase intentions. The results of an empirical research suggest that the both service quality and fee charge have influences on the perceived service value. However, they do not directly affect user's intention to purchase the e-service. They affect user's intention to purchase through affecting the perceived service value. In conclusion, this research provides a base to build on for other research studying use intention model of new e-service.

  • PDF

대학도서관 이용자기반 정보검색시스템 설계를 위한 이용자 요구 분석 (An Analysis of User Needs for User-Centered Information Retrieval System Design of University Library)

  • 노진구
    • 한국문헌정보학회지
    • /
    • 제34권4호
    • /
    • pp.69-95
    • /
    • 2000
  • 본 연구는 이용자기반 정보검색시스템의 기본 개념과 디지털 환경에서의 다양한 정보서비스 모델을 통하여 '이용자기반'에 대한 개념의 변화를 살펴보고 디지털 환경에 적합한 '이용자기반' 개념을 새롭게 정립하였다. 또한 정보검색시스템 설계요소들에 관한 기존 연구를 토대로 이용자기반 정보검색시스템의 설계에 고려되어야 할 6가지의 이용자기반 정보검색시스템의 설계요소를 도출하였다. 그리고 대학도서관의 이용자기반 정보검색시스템의 설계에 있어서 고려되어야 할 이용자 요구를 420명의 대학생을 대상으로 52문항으로 구성된 설문지 조사를 통하여 시스템 설계요소별로 이용자기반 접근에 따른 인지적, 사회적 측면에서 분석하였다.

  • PDF

깊이 영상으로 사용자 키 검출 및 동작감지를 사용한 캐릭터 플로팅 홀로그램 (Character Floating Hologram using Detection of User's Height and Motion by Depth Image)

  • 오규진;한대현;권순각
    • 한국산업정보학회논문지
    • /
    • 제23권4호
    • /
    • pp.33-40
    • /
    • 2018
  • 컴퓨터와 영상기술의 발달로 디지털 미디어의 제공방법이 다양해지고 이에 관한 관심이 커짐에 따라 많은 콘텐츠가 제작되고 있다. 이 콘텐츠들은 카메라나 컨트롤러를 통해 인체의 움직임과 사용자 정보를 활용하기 위한 연구가 활발하게 이루어지고 있다. 사용자의 정보를 이용한 콘텐츠는 공공장소에서 다양한 사람들에게 노출되어 광고로 사용 될 수 있다. 본 논문에서 사용자의 키 정보와 움직임 정보를 사용하여 구현되는 캐릭터 플로팅 홀로그램 시스템을 제안한다. 시스템은 깊이 영상에서 사용자의 키와 움직임을 감지하고 이 정보를 토대로 캐릭터를 생성한다. 생성된 캐릭터는 플로팅 홀로그램 디바이스를 이용하여 표현된다. 이 시스템은 사용자 정보를 이용한 마케팅, 광고 및 전시에서 사용될 수 있다.

A hidden anti-jamming method based on deep reinforcement learning

  • Wang, Yifan;Liu, Xin;Wang, Mei;Yu, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3444-3457
    • /
    • 2021
  • In the field of anti-jamming based on dynamic spectrum, most methods try to improve the ability to avoid jamming and seldom consider whether the jammer would perceive the user's signal. Although these existing methods work in some anti-jamming scenarios, their long-term performance may be depressed when intelligent jammers can learn user's waveform or decision information from user's historical activities. Hence, we proposed a hidden anti-jamming method to address this problem by reducing the jammer's sense probability. In the proposed method, the action correlation between the user and the jammer is used to evaluate the hiding effect of the user's actions. And a deep reinforcement learning framework, including specific action correlation calculation and iteration learning algorithm, is designed to maximize the hiding and communication performance of the user synchronously. The simulation result shows that the algorithm proposed reduces the jammer's sense probability significantly and improves the user's anti-jamming performance slightly compared to the existing algorithms based on jamming avoidance.