• Title/Summary/Keyword: User-Context

Search Result 1,182, Processing Time 0.028 seconds

A Study in the Efficient Collection and Integration of a Sensed Data in a Cloud Computing Environment (클라우드 컴퓨팅 환경에서 센싱된 데이터의 효율적 수집 및 통합에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.324-325
    • /
    • 2016
  • The sensor network-based service collects data by using the sensor, the data is aware of the situation via the analysis, and the service provider provides a service suitable for the user via the context-awareness. However, this data is generated, it is difficult to match the metadata and standard units. The data integration is required to use the data generated by the different specifications of the sensor efficiently. Accordingly, in this paper we propose a method using an ontology as a method to integrate the data generated by the existing sensors and the new sensor. The ontology is mapping to the standard item and sensors, also include a type and structural difference. The mapping is comprised of two:data mapping, and metadata mapping. There are standard items that are created in this way, type of data exchange between services. This can solve the heterogeneous problem generated by sensors.

  • PDF

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.

An Assessment of the Multiple Challenges Associated with Student's Access to Electronic Resources at a Public University Library in Ghana

  • Armah, Nesba Yaa Anima Adzobu;Cobblah, Mac-Anthony
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.1
    • /
    • pp.65-84
    • /
    • 2021
  • Our understanding of how barriers to access systematically varies with the compositional and contextual characteristics of users is incomplete. Using a public university library in Ghana, this study assessed the heterogeneous barriers or constraints students encounter in accessing electronic resources based on their demographic and contextual attributes. A descriptive survey design was adopted and structured questionnaires were administered randomly to 558 students in the four constituent colleges of the University of Cape Coast, Ghana. Data were collected and analysed using SPSS and descriptive statistics were generated. The results revealed that students faced six key challenges in accessing electronic information resources in the library namely delays in download of information, poor internet connectivity, and limited accessibility of university portal, inadequate computers in the library, poor lighting and limited ancillary services (on the spot printing facilities), with differences based on gender, academic level, and college affiliation. Only 24% males and 26% females had no challenges or problems with delays in download of electronic information. About three-fourth of all users had poor internet connectivity and complained about inadequate computers associated with accessing electronic resources. 40% percent of undergraduate students in the Colleges of Education Studies, Agriculture and Natural Sciences, and Humanities and Legal Studies each encountered four to six simultaneous challenges. Irrespective of gender, first year undergraduate students in all the four colleges were the least likely to report multiple challenges. This suggests the need for targeted and context-specific interventions to address the identified challenges.

Effects of Personalization and Types of Interface in Task-oriented Chatbot (과업형 챗봇에서 개인화와 담화 종류에 따른 인터페이스의 차이가 수용의도, 만족도에 미치는 영향)

  • Park, Sohyun;Jung, Yoonhyun;Kang, Hyunmin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.595-607
    • /
    • 2021
  • In response to increasing demand of contactless services, the overall usage of "task-oriented chatbots" in the industry is on the rise. The purpose of a task-oriented chatbot is to raise the efficiency of data sharing and workflow; in order to establish a guideline, there must be a discussion on "what" and "how" to share information. We investigate the effects of personalization and different types of the interface on 'performance expectancy', 'effort expectancy', 'intention to use', and 'satisfaction' in the context of a task-oriented chatbot. Results show that 'intention to use' and 'satisfaction' were higher when the level of personalization was higher. Within the closed-discourse interface, 'intention to use' and 'satisfaction' were higher when personalization was lower. We highlight the practical insights in the use of personalization and types of chatbot interface based on 'perceived personalization', 'expectation disconfirmation theory', 'privacy concern' and 'privacy paradox'.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

A Study on the Application of Zero Copy Technology to Improve the Transmission Efficiency and Recording Performance of Massive Data (대용량 데이터의 전송 효율 및 기록 성능 향상을 위한 Zero Copy 기술 적용에 관한 연구)

  • Song, Min-Gyu;Kim, Hyo-Ryoung;Kang, Yong-Woo;Je, Do-Heung;Wi, Seog-Oh;Lee, Sung-Mo;Kim, Seung-Rae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1133-1144
    • /
    • 2021
  • Zero-copy is a technology that is also called no-memory copy, and through its use, context switching between the user space and the kernel space can be reduced to minimize the load on the CPU. However, this technology is only used to transmit small random files, and has not yet been widely used for large file transfers. This paper intends to discuss the practical application of zero-copy in processing large files via a network. To this end, we first developed a small test bed and program that can transmit and store data based on zero-copy. Afterwards, we intend to verify the usefulness of the applied technology in detail through detailed performance evaluation

Question Similarity Measurement of Chinese Crop Diseases and Insect Pests Based on Mixed Information Extraction

  • Zhou, Han;Guo, Xuchao;Liu, Chengqi;Tang, Zhan;Lu, Shuhan;Li, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3991-4010
    • /
    • 2021
  • The Question Similarity Measurement of Chinese Crop Diseases and Insect Pests (QSM-CCD&IP) aims to judge the user's tendency to ask questions regarding input problems. The measurement is the basis of the Agricultural Knowledge Question and Answering (Q & A) system, information retrieval, and other tasks. However, the corpus and measurement methods available in this field have some deficiencies. In addition, error propagation may occur when the word boundary features and local context information are ignored when the general method embeds sentences. Hence, these factors make the task challenging. To solve the above problems and tackle the Question Similarity Measurement task in this work, a corpus on Chinese crop diseases and insect pests(CCDIP), which contains 13 categories, was established. Then, taking the CCDIP as the research object, this study proposes a Chinese agricultural text similarity matching model, namely, the AgrCQS. This model is based on mixed information extraction. Specifically, the hybrid embedding layer can enrich character information and improve the recognition ability of the model on the word boundary. The multi-scale local information can be extracted by multi-core convolutional neural network based on multi-weight (MM-CNN). The self-attention mechanism can enhance the fusion ability of the model on global information. In this research, the performance of the AgrCQS on the CCDIP is verified, and three benchmark datasets, namely, AFQMC, LCQMC, and BQ, are used. The accuracy rates are 93.92%, 74.42%, 86.35%, and 83.05%, respectively, which are higher than that of baseline systems without using any external knowledge. Additionally, the proposed method module can be extracted separately and applied to other models, thus providing reference for related research.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Sharing Activities in an Online Fashion Community - Focusing on Erving Goffman's Impression Management Theory - (온라인 패션 커뮤니티의 나눔 활동 - 어빙 고프만의 인상관리 이론을 중심으로 -)

  • Hyunjoo Hur;Jaehoon Chun
    • Fashion & Textile Research Journal
    • /
    • v.25 no.4
    • /
    • pp.449-459
    • /
    • 2023
  • This study focuses on online communities and the ritual conversations of users when participating in sharing activities. The study aims to understand the social and psychological phenomena that occur between users within the context of Erving Goffman's impression management theory. Case studies and a content analysis were conducted by collecting posts and comments related to fashion products in the sharing activities category on Naver Cafe "Family Sale." On the one hand, the study identified various disposition motives among givers, including a desire for recognition, self-expression, activation of the community, emotional sympathy, goodwill, play, and simple disposition. On the other hand, receivers' purchase motives included the need for a product, reciprocation based on a sense of belonging, play, gift-giving, and simple response. Analyzing the posts of givers and the comments of receivers of fashion products using impression management strategies and dramaturgical analysis, the study interpreted users' impression management and revealed propensities in fashion consumption: fashionability, conspicuousness, value orientation, and economic feasibility. Through ritual conversations, users managed to attain emotional stability on an individual level, while they reinforced collective bonds on a social level. They fulfilled their roles with their own narratives to achieve personal and collective goals in a non-face-to-face situations and non-monetary transactions. This study is significant in that it examines normative communication in an online community and user relationships to understand a recent phenomenon in the fashion industry.

A Study on the Social Implications of Data Literacy for the Post-pandemic Era and the Direction of Library Services (포스트 팬데믹 시대 데이터 리터러시의 사회적 함의와 도서관 서비스 방향에 대한 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.1
    • /
    • pp.365-386
    • /
    • 2022
  • The purpose of this study is to understand the changes in human information behavior brought about by the pandemic situation. This study also examines the social context of data literacy as lifelong education. In addition, it was attempted to understand the changed environment and propose library services in the post-pandemic era based on predicted trends. In order to do this, two phenomena that are currently striking our society, datafication and the pandemic, were reviewed in general, and studies related to library information services in response to the pandemic were examined. Based on this, the social meaning of data literacy in the pandemic era was reconfirmed and the environmental changes faced by libraries were examined based on 20 trends suggested by IFLA. Through this process, the study was concluded by suggesting the implementation of data literacy and the direction of library services.