• Title/Summary/Keyword: User Pattern Analysis

Search Result 349, Processing Time 0.026 seconds

Innovation Patterns of Advanced Materials Technology Considering the Demand Factors (수요 요인을 고려한 첨단재료기술의 혁신유형 분류에 관한 연구)

  • Chae Jae-Woo;Cho Kyu-Kab;Kim Jeong-Hum;Lee Yong-Tai
    • Journal of Korea Technology Innovation Society
    • /
    • v.9 no.1
    • /
    • pp.103-130
    • /
    • 2006
  • This paper is to categorize the innovation patterns of advanced materials technologies Many existing taxonomies of innovation pattern consider the whole of industries and the system sector rather than a specific sector. On the basis of the interactions between materials sector and user sectors, this paper suggests four innovation patterns, push-type material innovation, needs-type materials innovation, push-type process innovation and needs-type process innovation. This categorization of innovation pattern not only provides a new approach to the analysis of materials technology innovation processes but also has many useful implications for policymaking. Suggestions for policymakers of the materials technology are presented.

  • PDF

Analysis of the Usage patterns of Social Network Service Users (소셜 네트워크 서비스 사용 시기에 따른 사용자 이용패턴 연구: 페이스북을 중심으로)

  • Park, Sang Hyeok;Oh, Seung Hee;Sung, Haeng Nam
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.251-265
    • /
    • 2013
  • The emergence of social network services, is changing the foundation of human relationship formation and method of communication of individuals through sharing of free information. Social network service is a service to support or facilitate an on-line extension of off-line network among people by helping them to share personal profile. History of social network services very short. But users of the various layers is increasing rapidly and ripple effect social as a result is very large. The focus of existing research was mainly devoted to motivation of use and acceptance of social network services. Currently the use of SNS was maturing. Thus, in-depth research on the use pattern of SNS users is needed. The purpose of this study is that, for Facebook in social network services, to analyze the changes in the initial stage of use, medium-term, usage patterns at the current time. Results of the study by analyzing the characteristics of the change in the pattern of usage of user of Facebook, it can be used as basic materials for SNS researchers and service provider.

A Novel Technique for Detection of Repacked Android Application Using Constant Key Point Selection Based Hashing and Limited Binary Pattern Texture Feature Extraction

  • MA Rahim Khan;Manoj Kumar Jain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.141-149
    • /
    • 2023
  • Repacked mobile apps constitute about 78% of all malware of Android, and it greatly affects the technical ecosystem of Android. Although many methods exist for repacked app detection, most of them suffer from performance issues. In this manuscript, a novel method using the Constant Key Point Selection and Limited Binary Pattern (CKPS: LBP) Feature extraction-based Hashing is proposed for the identification of repacked android applications through the visual similarity, which is a notable feature of repacked applications. The results from the experiment prove that the proposed method can effectively detect the apps that are similar visually even that are even under the double fold content manipulations. From the experimental analysis, it proved that the proposed CKPS: LBP method has a better efficiency of detecting 1354 similar applications from a repository of 95124 applications and also the computational time was 0.91 seconds within which a user could get the decision of whether the app repacked. The overall efficiency of the proposed algorithm is 41% greater than the average of other methods, and the time complexity is found to have been reduced by 31%. The collision probability of the Hashes was 41% better than the average value of the other state of the art methods.

An Empirical Study on the Acceptance-Resistance Motivation to Use A Mobile Payment Service : Applying Multivariate Discriminant Analysis (모바일 결제 서비스의 수용-저항 동기에 대한 실증연구: 다변인 판별분석을 중심으로)

  • Jung, Jee-Young;Jeong, Ha-Yeong;Jo, Hyeon
    • The Journal of Information Systems
    • /
    • v.27 no.2
    • /
    • pp.115-134
    • /
    • 2018
  • Purpose In recent years, mobile payment service users have been rapidly increasing. Previous researchers focused on the mobile usage situation such as the elements of mobile payment service, usage pattern, and user behaviors, and the research that is approached from the viewpoint of the user is still insufficient. The aim of this study is to suggest a acceptance-resistance motivation model of choosing a mobile payment service based on the Herzbergs Two-Factor Theory by investigating users' motivation and hygiene factors. Design/methodology/approach For the purpose, literature reviews on factors of choosing a mobile payment service were conducted and classified motivation and hygiene factors. Two hypotheses were set as follows: Hypothesis I is that motivation factors have a positive impact on the choice of mobile payment service, and Hypothesis II is that hygiene factors have a negative impact on the choice of mobile payment service. To test two hypotheses, this study conducted an online questionnaire survey and a multivariate discriminant analysis. Findings The result found that mobile payment service is more likely to be replaced with mobile by improving convenience, simplicity, and ease of use that affect the acceptance motivation of mobile payment service. This result supported the Hypothesis I but not Hypothesis II and contributed to provide implications for future mobile payment service development and marketing utilization.

Location Inference of Twitter Users using Timeline Data (타임라인데이터를 이용한 트위터 사용자의 거주 지역 유추방법)

  • Kang, Ae Tti;Kang, Young Ok
    • Spatial Information Research
    • /
    • v.23 no.2
    • /
    • pp.69-81
    • /
    • 2015
  • If one can infer the residential area of SNS users by analyzing the SNS big data, it can be an alternative by replacing the spatial big data researches which result from the location sparsity and ecological error. In this study, we developed the way of utilizing the daily life activity pattern, which can be found from timeline data of tweet users, to infer the residential areas of tweet users. We recognized the daily life activity pattern of tweet users from user's movement pattern and the regional cognition words that users text in tweet. The models based on user's movement and text are named as the daily movement pattern model and the daily activity field model, respectively. And then we selected the variables which are going to be utilized in each model. We defined the dependent variables as 0, if the residential areas that users tweet mainly are their home location(HL) and as 1, vice versa. According to our results, performed by the discriminant analysis, the hit ratio of the two models was 67.5%, 57.5% respectively. We tested both models by using the timeline data of the stress-related tweets. As a result, we inferred the residential areas of 5,301 users out of 48,235 users and could obtain 9,606 stress-related tweets with residential area. The results shows about 44 times increase by comparing to the geo-tagged tweets counts. We think that the methodology we have used in this study can be used not only to secure more location data in the study of SNS big data, but also to link the SNS big data with regional statistics in order to analyze the regional phenomenon.

Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns (웹사이트 구조와 사용패턴 분석을 통한 CSRF 공격 탐지)

  • Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.9-15
    • /
    • 2011
  • It is difficult to identify attack requests from normal ones when those attacks are based on CSRF which enables an attacker transmit fabricated requests of a trusted user to the website. For the protection against the CSRF, there have been a lot of research efforts including secret token, custom header, proxy, policy model, CAPTCHA, and user reauthentication. There remains, however, incapacitating means and CAPTCHA and user reauthentication incur user inconvenience. In this paper, we propose a method to detect CSRF attacks by analyzing the structure of websites and the usage patterns. Potential victim candidates are selected and website usage patterns according to the structure and usage logs are analyzed. CSRF attacks can be detected by identifying normal usage patterns. Also, the proposed method does not damage users' convenience not like CAPTCHA by requiring user intervention only in case of detecting abnormal requests.

Pattern Analysis-Based Query Expansion for Enhancing Search Convenience (검색 편의성 향상을 위한 패턴 분석 기반 질의어 확장)

  • Jeon, Seo-In;Park, Gun-Woo;Nam, Kwang-Woo;Ryu, Keun-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.2
    • /
    • pp.65-72
    • /
    • 2012
  • In the 21st century of information systems, the amount of information resources are ever increasing and the role of information searching system is becoming criticalto easily acquire required information from the web. Generally, it requires the user to have enough pre-knowledge and superior capabilities to identify keywords of information to effectively search the web. However, most of the users undertake searching of the information without holding enough pre-knowledge and spend a lot of time associating key words which are related to their required information. Furthermore, many search engines support the keywords searching system but this only provides collection of similar words, and do not provide the user with exact relational search information with the keywords. Therefore this research report proposes a method of offering expanded user relationship search keywords by analyzing user query patterns to provide the user a system, which conveniently support their searching of the information.

A Study of User Perception on Features Used in Behavior-Based Authentication (행위 기반 인증을 위한 사용자 중심의 인증 요소 분석 연구)

  • Lee, Youngjoo;Ku, Yeeun;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • The growth in smartphone service has given rise to an increase in frequency and importance of authentication. Existing smartphone authentication mechanisms such as passwords, pattern lock and fingerprint recognition require a high level of awareness and authenticate users temporarily with a point-of-entry techniques. To overcome these disadvantages, there have been active researches in behavior-based authentication. However, previous studies focused on enhancing the accuracy of the authentication. Since authentication is directly used by people, it is necessary to reflect actual users' perception. This paper proposes user perception on behavior-based authentication with feature analysis. We conduct user survey to empirically understand user perception regarding behavioral authentication with selected authentication features. Then, we analyze acceptance of the behavioral authentication to provide continuous authentication with minimal awareness while using the device.

Cursor Control by the Finger Moton Using Circular Pattern Vector Algorithm (원형 패턴 벡터 알고리즘을 이용한 손가락 이동에 의한 커서제어)

  • 정향영;신일식;손영선
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.6
    • /
    • pp.487-490
    • /
    • 2001
  • In this paper, we realize a system that moves a cursor with a finger using the circular pattern vector algorithm that in one of the image analysis algorithms. To apply this algorithm, we use central point of the biggest circle among the various circles that recognize the image of the hand , and find out the pointing finger by looking for the distance of the outline of the hand from the central point. The horizontal direction of the cursor on the display is controlled by converting the direction of the pointing finger to the analysis of the plane corrdinate. Because of setting up only one camera of the upper, the middle and the lower discretely. On account of the discrete movement of the cursor of the vertical direction, we move th cursor to the objective, which the user wants. by expanding the local are to the whole area.

  • PDF

Analysis of Tactile Effects on the Different Body Parts by the Various Vibration Patterns (다양한 진동 패턴에 따른 신체 부위의 촉감 효과 분석)

  • Lee, Hwan-Mun;You, Yong-Hee;Song, Chan-Ho;Jeong, Jin-Eon;Sung, Mee-Young;Jun, Kyung-Koo;Lee, Sang-Rak
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.163-167
    • /
    • 2008
  • This paper presents the analysis of tactile effects on different body parts according to the various vibration patterns. The experiments use a vibration pad made of 16 vibration elements in the form of $4{\times}4$ array. The vibration elements are controlled by a 8-bit microprocessor. The sound of gunshot initiates a vibration pattern on different body parts and its sensitivity is measured. The analysis of the experiments lead us to conclude that the vibration pad is the most realistic interface for shooting games and the shoulder part is the most sensitive part in the body. In addition, the most effective vibration pattern is the for the pattern which gives the sensation of spreading out from the center to the outside. This study analyzes the relationship between the human body parts and the tactile sensations by the various vibration patterns. The result of this study will be a good reference for user studies in the field of haptics based on the vibration.

  • PDF