• Title/Summary/Keyword: User-Generated Information

Search Result 721, Processing Time 0.028 seconds

Integrated Information Retrieval with Metadata Interface for Heterogeneous Distributed XML Documents (메타정보 인터페이스를 이용한 이질 구조 분석 XML문서 통합 검색)

  • 류성준;황재문;김태훈;남영광
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.11
    • /
    • pp.1505-1518
    • /
    • 2004
  • We propose an extremely light DDXMI approach for semi-automated integration of both structurally and semantically heterogeneous distributed XML documents. In the proposed prototype, a DDXMI(Distributed Documents XML Metadata Interface) is defined and a user interface generator is developed. The prototype takes sources' DTDs as inputs and generates a friendly graphical user interface for the application users. The user can easily describe the semantic mapping between the integrated virtual database DTD and sources' DTDs through assigning index numbers and specifying associated function names so that the DDXMI based on the mappings is automatically generated. Quilt is selected as the XML query language which processes user queries according to the DDXMI. It is assumed that the application users know what they want from the different sources, that is, they have their own integrated database schema in their mind, and know the semantics of the involved XML databases. A small-size global DTD and a mid-size global DTB are generated to verify the rluery generation and retrieval results with 3 XML document databases, that is, Master/ph.D thesis, research reports, and journal databases. The system has been developed with JavaCC and Java Servelet.

The Secure Password Authentication Method based on Multiple Hash Values that can Grant Multi-Permission to a Single Account (단수 계정에 다중 권한 부여가 가능한 다중 해시값 기반의 안전한 패스워드 인증 기법 설계)

  • Hyung-Jin Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.49-56
    • /
    • 2023
  • ID is used as identifying information and password as user authentication for ID-based authentication. In order to have a secure user authentication, the password is generated as a hash value on the client and sent to the server, where it is compared with the stored information and authentication is performed. However, if even one character is incorrect, the different hash value is generated, authentication will be failed and cannot be performed and various functions cannot be applied to the password. In this study, we generate several hash value including imaginary number of entered password and transmit to server and perform authentcation. we propose a technique can grants the right differentially to give various rights to the user who have many rights by one account. This can defend shoulder surfing attack by imaginary password and provide convenience to users who have various rights by granting right based on password.

Following Path using Motion Parameters for Virtual Characters

  • Baek, Seong-Min;Jeong, Il-Kwon;Lee, In-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1621-1624
    • /
    • 2003
  • This paper presents a new method that generates a path that has no collision with the obstacles or the characters by using the three motion parameters, and automatically creates natural motions of characters that are confined to the path. Our method consists of three parameters: the joint information parameter, the behavior information parameter, and the environment information parameter. The joint information parameters are extracted from the joint angle data of the character and this information is used when creating a path following motion by finding the relation-function of the parameters on each joint. A user can set the behavior information parameter such as velocity, status, and preference and this information is used for creating different paths, motions, and collision avoidance patterns. A user can create the virtual environment such as road and obstacle, also. The environment is stored as environment information parameters to be used later in generating a path without collision. The path is generated using Hermit-curve and each control point is set at important places.

  • PDF

Tourism Experience Sharing of Long-term Living Chinese in South Korea: Case of Xiaohongshu App (RED) (한국 장기체류 중국인 관광앱 사용경험: 샤오홍슈(Xiaohongshu) 앱 사례)

  • Tian Zhang;Jialing Zhang;Chulmo Koo
    • Information Systems Review
    • /
    • v.25 no.2
    • /
    • pp.1-30
    • /
    • 2023
  • This study analyzes and examines the travel behavior of Chinese people in Korea through a questionnaire survey of Chinese people who are long-term residents in Korea using Xiaohongshu App (RED). In this study, we add some variables to the MTEs (Memorable Tourism Experiences) model to analyze the travel behavior of Chinese people who are in Korea for a long period of time. We also chose to survey the users of Xiaohongshu App (RED), a popular software in recent years, and found the following findings in 240 valid questionnaires: (1) Scenery, Entertainment, and Informativeness have positive effects on people sharing travel experiences, while interaction does not. (2) Sharing travel experiences had a positive effect on travel satisfaction and the intention to go to other destinations, and travel satisfaction had a positive effect on the intention to go to other destinations. This paper extends the literature on tourism by combining MTEs and UGC (User-Generated Content) models, and also provides relevant suggestions for further research on the travel behavior of foreigners in Korea.

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.

Sensibility Ergonomics : Needs, Concepts, Methods and Applications (감성공학의 개념과 연구 및 응용 방법)

  • Lee, Gu-Hyeong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.17 no.1
    • /
    • pp.91-102
    • /
    • 1998
  • History of the Sensibility Ergonomics is explained. Concepts, definition, and research methods on the human sensibility are proposed for systematic applications of human sensibility studies to product and environment developments. Sensibility Ergonomics was born in socio-technological environments where consumers required aesthetic and satisfactory products in addition to useful and usable ones, and manufactures were trying to develop consumer-oriented, user-friendly products. Sensibility Ergonomics is defined as "multi-disciplinary and inter-disciplinary processes for developing products and environment as usable, comfortable and satisfactory with the information on human sensibility." Human sensibility is functionally defined as "feelings generated when perceived sensory and information stimuli are reflected from memory which has been accumulated through personal experiences." Human sensibility is affected by at least three factors: personal, social, and cultural. Consumers evaluate products in three aspects : functional, sensorial, and cultural sensibilities. Human sensibility is personal, dynamic, and ambiguous. It is generated reflectively and intuitively against external stimuli. No Physiological responses are accompanied, and one cannot control his/her sensibility. However, the sensibility affects the decision making or behavior of the person. To understand the human sensibility many inter-disciplinary methods should be used instead of one-variable approach. Micro-scopic studies such as Questionnaire, interview, behavioral analysis, and psychophysiological experiments can be performed. In addition, social and cultural studies are essential to understand an individual's sensibility. Results of sensibility studies can be applied to setup new interactions between human and machine through sensible(or affective) human-machine (computer) interfaces. Human-oriented and user-friendly products can be made with the information on human sensibility.

  • PDF

Sentiment Analysis of User-Generated Content on Drug Review Websites

  • Na, Jin-Cheon;Kyaing, Wai Yan Min
    • Journal of Information Science Theory and Practice
    • /
    • v.3 no.1
    • /
    • pp.6-23
    • /
    • 2015
  • This study develops an effective method for sentiment analysis of user-generated content on drug review websites, which has not been investigated extensively compared to other general domains, such as product reviews. A clause-level sentiment analysis algorithm is developed since each sentence can contain multiple clauses discussing multiple aspects of a drug. The method adopts a pure linguistic approach of computing the sentiment orientation (positive, negative, or neutral) of a clause from the prior sentiment scores assigned to words, taking into consideration the grammatical relations and semantic annotation (such as disorder terms) of words in the clause. Experiment results with 2,700 clauses show the effectiveness of the proposed approach, and it performed significantly better than the baseline approaches using a machine learning approach. Various challenging issues were identified and discussed through error analysis. The application of the proposed sentiment analysis approach will be useful not only for patients, but also for drug makers and clinicians to obtain valuable summaries of public opinion. Since sentiment analysis is domain specific, domain knowledge in drug reviews is incorporated into the sentiment analysis algorithm to provide more accurate analysis. In particular, MetaMap is used to map various health and medical terms (such as disease and drug names) to semantic types in the Unified Medical Language System (UMLS) Semantic Network.

Context Adaptive User Interface Generation in Ubiquitous Home Using Bayesian Network and Behavior Selection Network (베이지안 네트워크와 행동 선택 네트워크를 이용한 유비쿼터스 홈에서의 상황 적응적 인터페이스 생성)

  • Park, Han-Saem;Song, In-Jee;Cho, Sung-Bea
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.573-578
    • /
    • 2008
  • Recently, we should control various devices such as TV, audio, DVD player, video player, and set-top box simultaneously to manipulate home theater system. To execute the function the user want in this situation, user should know functions and positions of the buttons in several remote controllers. Normally, people feel difficult due to these realistic problems. Besides, the number of the devices that we can control shall increase, and people will confuse more if the ubiquitous home environment is realized. Therefore, user adaptive interface that provides the summarized functions is required. Moreover there can be a lot of mobile and stationary controller devices in ubiquitous computing environment, so user interface should be adaptive in selecting the functions that user wants and in adjusting the features of UI to fit in specific controller. To implement the user and controller adaptive interface, we modeled the ubiquitous home environment and used modeled context and device information. We have used Bayesian network to get the degree of necessity in each situation. Behavior selection network uses predicted user situation and the degree of necessity, and it selects necessary functions in current situation. Selected functions are used to construct adaptive interface for each controller using presentation template. For experiments, we have implemented ubiquitous home environment and generated controller usage log in this environment. We have confirmed the BN predicted user requirements effectively as evaluating the inferred results of controller necessity based on generated scenario. Finally, comparing the adaptive home UI with the fixed one to 14 subjects, we confirmed that the generated adaptive UI was more useful for general tasks than fixed UI.

  • PDF

Automatic Generation of Information Extraction Rules Through User-interface Agents (사용자 인터페이스 에이전트를 통한 정보추출 규칙의 자동 생성)

  • 김용기;양재영;최중민
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.4
    • /
    • pp.447-456
    • /
    • 2004
  • Information extraction is a process of recognizing and fetching particular information fragments from a document. In order to extract information uniformly from many heterogeneous information sources, it is necessary to produce information extraction rules called a wrapper for each source. Previous methods of information extraction can be categorized into manual wrapper generation and automatic wrapper generation. In the manual method, since the wrapper is manually generated by a human expert who analyzes documents and writes rules, the precision of the wrapper is very high whereas it reveals problems in scalability and efficiency In the automatic method, the agent program analyzes a set of example documents and produces a wrapper through learning. Although it is very scalable, this method has difficulty in generating correct rules per se, and also the generated rules are sometimes unreliable. This paper tries to combine both manual and automatic methods by proposing a new method of learning information extraction rules. We adopt the scheme of supervised learning in which a user-interface agent is designed to get information from the user regarding what to extract from a document, and eventually XML-based information extraction rules are generated through learning according to these inputs. The interface agent is used not only to generate new extraction rules but also to modify and extend existing ones to enhance the precision and the recall measures of the extraction system. We have done a series of experiments to test the system, and the results are very promising. We hope that our system can be applied to practical systems such as information-mediator agents.

Design of New CMOS Differential Amplifier Circuit (멀티미디어 동기화를 위한 동적 SRT 알고리즘)

  • 홍명희;장덕철;김우생
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.6
    • /
    • pp.863-870
    • /
    • 1993
  • A new methodology of multimedia data composition generated SRT(Synchronization Relation Tree) dynamically after user composing multimedia date by using high level user interface, and processes message passing protocols to adjust multimedia data temporal composition. In this paperl we propose SRT generating algorithm which transfer user defined timeline diagram to SRT dynamically. SRT generating algorithm is to use divide and conquer methodology and recurvise programming. And prove that it generates and type of multimedia date compositon to SRT.

  • PDF