• Title/Summary/Keyword: User Log

Search Result 367, Processing Time 0.037 seconds

Log Analysis System Design using RTMA

  • Park, Hee-Chang;Myung, Ho-Min
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2004.04a
    • /
    • pp.225-236
    • /
    • 2004
  • Every web server comprises a repository of all actions and events that occur on the server. Server logs can be used to quantify user traffic. Intelligent analysis of this data provides a statistical baseline that can be used to determine server load, failed requests and other events that throw light on site usage patterns. This information provides valuable leads on marketing and site management activities. In this paper, we propose a method of design for log analysis system using RTMA(realtime monitoring and analysis) technique.

  • PDF

User search intention analysis based User Click Log (User Click Log를 이용한 사용자 검색 의도 분석)

  • Jee, Hye-Sung;Lim, Hee-Seok
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.793-797
    • /
    • 2009
  • 최근 정보검색분야에서는 사용자의 검색 의도를 이해하거나 효과적으로 결과를 전달하고자 하는 시도가 많이 이루어지고 있다. 그러나 현재 제공되고 있는 시스템은 현재 검색 사용자의 의도가 아닌 타인의 의도가 반영된 결과로 실제 사용자의 의도와 상이할 수 있으며, 사용자가 의도하는 바를 유효하게 반영하는 검색 결과를 제시하는 데는 아직 미흡한 실정이다. 따라서 사용자가 원하는 정보를 쉽게 발견할 수 있도록 검색어와 관련된 의도 정보를 제공하거나 검색 결과를 효율적으로 클러스터링 하여 전달하는 기능이 검색의 유용성을 증대시킬 수 있다. 본 논문에서는 검색어에서 사용자의 검색 의도를 자동으로 파악하여 그 의도에 맞는 검색 결과를 제공하기 위하여 사용자 클릭 로그를 사용하여 의도에 맞는 검색결과를 제공하는 방법에 대하여 제안한다.

  • PDF

Personalized Travel Path Recommendations with Social Life Log (소셜 라이프 로그를 이용한 개인화된 여행 경로 추천)

  • Paul, Aniruddha;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jasesoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2017.05a
    • /
    • pp.453-454
    • /
    • 2017
  • The travellers using social media leave their location history in the form of trajectories. These trajectories can be bridged for acquiring information, required for future recommendation for the future travelers, who are new to that location, providing all sort of information. In this paper, we propose a personalized travel path recommendation scheme based on social life log. By taking advantage of two kinds of social media such as travelogue and community contributed photos, the proposed scheme can not only be personalized to user's travel interest but also be able to recommend a travel path rather than individual Points of Interest (POIs). It also maps both user's and routes' textual descriptions to the topical package space to get user topical package model and route topical package model (i.e., topical interest, cost, time and season).

  • PDF

Navigational Structure and User Behavior Modeling for Restructuring of Web-based Information Systems (웹기반 정보시스템의 재구성을 위한 항해구조 및 사용자행동 모델링)

  • 박학수;황성하;이강수
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.730-744
    • /
    • 2002
  • A Web-Based Information System(WBIS), a typical structure of recently information systems, should be dynamically restructured in order to satisfy user's need and make a profit. Thus, we should analyze and modelize the navigational structure of WBIS and utilize it by modeling the navigational structure of behavior of user through log-file as system restructuring. In this paper, we propose the modeling method for navigational structure and user behavior to restructure WBIS including shopping mall. Also, we suggest the structural model, state transition model, Petri net model and analysis method and analyze and implement modeling algorithm for user behavior to analyze log-file of it. Then, we propose some restructuring heuristic and apply the methods to the example of WBIS.

  • PDF

온라인 목록 검색 행태에 관한 연구-LINNET 시스템의 Transaction log 분석을 중심으로-

  • 윤구호;심병규
    • Journal of Korean Library and Information Science Society
    • /
    • v.21
    • /
    • pp.253-289
    • /
    • 1994
  • The purpose of this study is about the search pattern of LINNET (Library Information Network System) OPAC users by transaction log, maintained by POSTECH(Pohang University of Science and Technology) Central Library, to provide feedback information of OPAC system design. The results of this study are as follows. First, for the period of this analysis, there were totally 11, 218 log-ins, 40, 627 transaction logs and 3.62 retrievals per a log-in. Title keyword was the most frequently used, but accession number, bibliographic control number or call number was very infrequently used. Second, 47.02% of OPAC, searches resulted in zero retrievals. Bibliographic control number was the least successful search. User displayed 2.01% full information and 64.27% local information per full information. Third, special or advanced retrieval features are very infrequently used. Only 22.67% of the searches used right truncation and 0.71% used the qualifier. Only 1 boolean operator was used in every 22 retrievals. The most frequently used operator is 'and (&)' with title keywords. But 'bibliographical control number (N) and accessionnumber (R) are not used at all with any operators. The causes of search failure are as follows. 1. The item was not used in the database. (15, 764 times : 79.42%). 2. The wrong search key was used. (3, 761 times : 18.95%) 3. The senseless string (garbage) was entered. (324 times : 1.63%) On the basis of these results, some recommendations are suggested to improve the search success rate as follows. First, a n.0, ppropriate user education and online help function let users retrieve LINNET OPAC more efficiently. Second, several corrections of retrieval software will decrease the search failure rate. Third, system offers right truncation by default to every search term. This methods will increase success rate but should considered carefully. By a n.0, pplying this method, the number of hit can be overnumbered, and system overhead can be occurred. Fourth, system offers special boolean operator by default to every keyword retrieval when user enters more than two words at a time. Fifth, system assists searchers to overcome the wrong typing of selecting key by automatic korean/english mode change.

  • PDF

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

A Call Recommendation Algorithm Design and Verification with ESM (통화 상대 추천 알고리즘 디자인 및 ESM을 통한 평가)

  • Lee, Seung-Hwan;Seo, Jung-Suk;Lee, Gee-Hyuk
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.357-362
    • /
    • 2009
  • We propose a method to recommend most likely people to call based on call log of mobile phone user. Call logs of an user can reflect calling pattern of the user include regular calling behavior. When user got a list of people to call with a click of 'send' button on the phone, the time and effort to search a person with several typing or to select a person from the list can be definitely reduced. This paper presents the design process of an algorithm to find most likely people to call at a certain moment and the verification process with recorded call log and Experience Sampling Method(ESM) on mobile phone.

  • PDF

User Interface Design Platform based on Usage Log Analysis (사용성 로그 분석 기반의 사용자 인터페이스 설계 플랫폼)

  • Kim, Ahyoung;Lee, Junwoo;Kim, Mucheol
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.151-159
    • /
    • 2016
  • The user interface is an important factor in providing efficient services to application users. In particular, mobile applications that can be executed anytime and anywhere have a higher priority of usability than applications in other domains.Previous studies have used prototype and storyboard methods to improve the usability of applications. However, this approach has limitations in continuously identifying and improving the usability problems of a particular application. Therefore, in this paper, we propose a usability analysis method using touch gesture data. It could identify and improve the UI / UX problem of the application continuously by grasping the intention of the user after the application is distributed.

Real-Time Physical Activity Recognition Using Tri-axis Accelerometer of Smart Phone (스마트 폰의 3축 가속도 센서를 이용한 실시간 물리적 동작 인식 기법)

  • Yang, Hye Kyung;Yong, H.S.
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.506-513
    • /
    • 2014
  • In recent years, research on user's activity recognition using a smart phone has attracted a lot of attentions. A smart phone has various sensors, such as camera, GPS, accelerometer, audio, etc. In addition, smart phones are carried by many people throughout the day. Therefore, we can collect log data from smart phone sensors. The log data can be used to analyze user activities. This paper proposes an approach to inferring a user's physical activities based on the tri-axis accelerometer of smart phone. We propose recognition method for four activity which is physical activity; sitting, standing, walking, running. We have to convert accelerometer raw data so that we can extract features to categorize activities. This paper introduces a recognition method that is able to high detection accuracy for physical activity modes. Using the method, we developed an application system to recognize the user's physical activity mode in real-time. As a result, we obtained accuracy of over 80%.