• Title/Summary/Keyword: Web Access Pattern

Search Result 44, Processing Time 0.03 seconds

Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform (스마트폰에서 가상 디스크 플랫폼을 사용한 프라이버시 데이터 보호 방안)

  • Shin, Suk-Jo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.560-567
    • /
    • 2013
  • The release of iPhone by Apple in 2009 has changed the life pattern of an individual tremendously. That is, with the emergence of a smart phone, various services including voice/video call, camera, receiving and sending of e-mail, and web browsing have been realized. However, the broader the scope of the use of a smart phone has become, the greater the need for companies to introduce an MDM solution for protecting important documents has become. However the MDM solution may have a problem in that all data such as contacts, pictures, and memos saved in the smart phone can be accessed unlimitedly. For this reason, there is a risk that unwanted violation of privacy may happen to smart phone users. This paper proposed a plan to protect a personal privacy file of smart phone users, which disables access by others except for related smart phone users by enabling a person in charge of security or an MDM manager in a company to have access only to the file which was allowed by smart phone users to be disclosed and by saving non-disclosed files in a virtual disk.

A Dynamic Channel Allocation Employing Smart Antenna to Resolve a Crossed Time-slot Problem in TD-SCDMA (TD-SCDMA에서 셀 간 교차 타임-슬롯 문제 해결을 위한 스마트 안테나 기반의 동적 채널 할당 방안)

  • Kim, Eun-Heon;Park, Jae-Hyun;Kim, Duk-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1276-1285
    • /
    • 2007
  • Since the TD-SCDMA (Time Division-Synchronous Code Division Multiple Access) system is based on TDD (Time Division Duplexing), the uplink and downlink can be allocated asymmetrically according to the traffic e.g. Web browsing. Although this asymmetric allocation can increase the frequency utilization, it may cause time slot opposing, which implies the time slot is assigned in opposing direction between cells. The time slot opposing can generate significant interference between cells, which results in severe performance degradation. In the paper, a novel dynamic channel allocation (DCA) is proposed in the TD-SCDMA system, to mitigate the impact of time slot opposing considering smart antenna. When the smart antenna is applied in the system, the inter-cell interference is largely affected by beam pattern and beam direction between neighboring cells. Therefore, the time slot opposing and smart antenna should be considered together in the DCA. The intensive simulations show that the proposed scheme can improve the system capacity compared to the conventional DCA schemes.

A Real-Time User Authenticating Method Using Behavior Pattern Through Web (웹 사용자의 실시간 사용 패턴 분석을 이용한 정상 사용자 판별 방법)

  • Jang, Jin-gu;Moon, Jong Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1493-1504
    • /
    • 2016
  • As cyber threats have been increased over the Internet, the invasions of personal information are constantly occurring. A malicious user can access the Web site as a normal user using leaked personal information and does illegal activities. This paper proposes an effective method which authenticates a genuine user with real-time. The method use the user's profile which is a record of user's behavior created by Membership Analysis(MA) and Markov Chain Model(MCM). In addition to, user's profile is augmented by a Time Weight(TW) which reflects the user's tendency. This method can detect a malicious user who camouflage normal user. Even if it is a genuine user, it can be determined as an abnomal user if the user acts beyond the record profile. The result of experiment showed a high accuracy, 96%, for the correct user.

Multi Parameter Design in AIML Framework for Balinese Calendar Knowledge Access

  • Sukarsa, I Made;Buana, Putu Wira;Yogantara, Urip
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.114-130
    • /
    • 2020
  • Balinese calendar is defined as a unique calendar system for combining solar-based and lunar-based system and assuming local system. It is considered as guidance of Balinese societies' activities management, starting from meeting arrangement, wedding ceremony, to religious ceremonies. Practically, it has developed in the form of printed Balinese calendar and electronic Balinese calendar, either web or mobile application. The core of the function is to find out the day with its various characteristics in the Balinese Calendar. In general, society usually asks the religious leader to find out the day in detail. The technology of NLP combined with models of pattern discoveries supports the arrangement of the interaction model in searching the good day in Balinese Calendar to equip the conventional searching system in the previous applications. This study will design a dialog model with AIML method in multi-parameter basis; therefore, the users will be dynamically able to use the searching content in various ways by chatting in similar with consulting to a religious leader. This model will be applied in a chatbot basis service in telegram machine. The addition of the context recognition section into 4 paterns has been successfully improve the ability of AIML to recognize input patterns with many criteria. Based on the testing with 50 random input patterns obtained a success rate of 92.5%.

Proxy Caching Scheme Based on the User Access Pattern Analysis for Series Video Data (시리즈 비디오 데이터의 접근 패턴에 기반한 프록시 캐슁 기법)

  • Hong, Hyeon-Ok;Park, Seong-Ho;Chung, Ki-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1066-1077
    • /
    • 2004
  • Dramatic increase in the number of Internet users want highly qualified service of continuous media contents on the web. To solve these problems, we present two network caching schemes(PPC, PPCwP) which consider the characteristics of continuous media objects and user access pattern in this paper. While there are plenty of reasons to create rich media contents, delivering this high bandwidth contents over the internet presents problems such as server overload, network congestion and client-perceived latency. PPC scheme periodically calculates the popularity of objects based on the playback quantity and determines the optimal size of the initial fraction of a continuous media object to be cached in proportion to the calculated popularity. PPCwP scheme calculates the expected popularity using the series information and prefetches the expected initial fraction of newly created continuous media objects. Under the PPCwP scheme, the initial client-perceived latency and the data transferred from a remote server can be reduced and limited cache storage space can be utilized efficiently. Trace-driven simulation have been performed to evaluate the presented caching schemes using the log-files of iMBC. Through these simulations, PPC and PPCwP outperforms LRU and LFU in terms of BHR and DSR.

  • PDF

Finding Weighted Sequential Patterns over Data Streams via a Gap-based Weighting Approach (발생 간격 기반 가중치 부여 기법을 활용한 데이터 스트림에서 가중치 순차패턴 탐색)

  • Chang, Joong-Hyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.55-75
    • /
    • 2010
  • Sequential pattern mining aims to discover interesting sequential patterns in a sequence database, and it is one of the essential data mining tasks widely used in various application fields such as Web access pattern analysis, customer purchase pattern analysis, and DNA sequence analysis. In general sequential pattern mining, only the generation order of data element in a sequence is considered, so that it can easily find simple sequential patterns, but has a limit to find more interesting sequential patterns being widely used in real world applications. One of the essential research topics to compensate the limit is a topic of weighted sequential pattern mining. In weighted sequential pattern mining, not only the generation order of data element but also its weight is considered to get more interesting sequential patterns. In recent, data has been increasingly taking the form of continuous data streams rather than finite stored data sets in various application fields, the database research community has begun focusing its attention on processing over data streams. The data stream is a massive unbounded sequence of data elements continuously generated at a rapid rate. In data stream processing, each data element should be examined at most once to analyze the data stream, and the memory usage for data stream analysis should be restricted finitely although new data elements are continuously generated in a data stream. Moreover, newly generated data elements should be processed as fast as possible to produce the up-to-date analysis result of a data stream, so that it can be instantly utilized upon request. To satisfy these requirements, data stream processing sacrifices the correctness of its analysis result by allowing some error. Considering the changes in the form of data generated in real world application fields, many researches have been actively performed to find various kinds of knowledge embedded in data streams. They mainly focus on efficient mining of frequent itemsets and sequential patterns over data streams, which have been proven to be useful in conventional data mining for a finite data set. In addition, mining algorithms have also been proposed to efficiently reflect the changes of data streams over time into their mining results. However, they have been targeting on finding naively interesting patterns such as frequent patterns and simple sequential patterns, which are found intuitively, taking no interest in mining novel interesting patterns that express the characteristics of target data streams better. Therefore, it can be a valuable research topic in the field of mining data streams to define novel interesting patterns and develop a mining method finding the novel patterns, which will be effectively used to analyze recent data streams. This paper proposes a gap-based weighting approach for a sequential pattern and amining method of weighted sequential patterns over sequence data streams via the weighting approach. A gap-based weight of a sequential pattern can be computed from the gaps of data elements in the sequential pattern without any pre-defined weight information. That is, in the approach, the gaps of data elements in each sequential pattern as well as their generation orders are used to get the weight of the sequential pattern, therefore it can help to get more interesting and useful sequential patterns. Recently most of computer application fields generate data as a form of data streams rather than a finite data set. Considering the change of data, the proposed method is mainly focus on sequence data streams.

A Study of the Pattern of Elderly's Internet Usage, Self-efficacy, and Self-esteem (노인의 인터넷 사용 실태, 자아효능감, 자아존중감에 관한 연구)

  • Hwang, Eun-Hee;Shin, Su-Jin;Jung, Duk-Yoo
    • Journal of Korean Public Health Nursing
    • /
    • v.25 no.1
    • /
    • pp.118-128
    • /
    • 2011
  • Purpose: The purpose of this study was to investigate the patterns of internet usage, selfefficacy, and self-esteem of the elderly. Method: Study participants were 139 older than 60 years of age who had used internet and could access internet anytime at home. Data were collected from March to September, 2009 by using a structured questionnaire. The data were analyzed using PASW/WIN 18.0 program. Results: The meantime of internet use was 8.74 hours per week, frequently used web-site was 'Newspaper and magazine', and subjects mainly used internet 'not to fall behind the times'. The mean score of internet use capability was 2.42, among theses the score of 'Searching necessary information' was the highest. The internet use capability of the subjects was significantly different in terms of education level, spouse, economic status, and the length of use. The mean scores of self-efficacy and self-esteem were $28.22{\pm}4.42$ and $28.51{\pm}4.25$, respectively. Conclusions: These results suggest that the elderly people use internet not to fall behind the times but they have enough capability to use internet searching or e-mailing. Also, it is true that there are many influencing factors on internet use and capability of the elderly. Therefore, it is needed to investigate the internet use of the elderly more closely.

A Study on the Internet and Smart-Phone Addiction Diagnosis's Comparison through internet usage pattern of College Students (대학생의 인터넷 이용패턴을 통한 인터넷과 스마트폰 중독진단에 관한 비교연구)

  • Kim, Hee-Jae
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2014
  • Smartphone addiction and internet addiction cause a serious negative social problem due to the spread of the new media which is combined with the ubiquitous function. To evaluate the degree of Internet addiction and smartphone addiction of college students in the nearby areas, K-scale of internet addiction self-diagnosis scale and S-scale of smartphone addiction self-diagnosis scale for Korean adults were applied. This study aims to develop the survey questions, which get the basic internet patterns and access the web site, and to find the hidden addicts that is not found by general K-scale and S-scale using computers and smartphones. The result shows that a method of addiction diagnosis using the tolerance degree which is calculated by smart phone's internet main activities and using time(anticipated and real time) apart from K-scale and S-scale. So hidden internet and smartphone addicts could be found through the SPSS statistical analysis program.

  • PDF

Small-Scale Warehouse Management System by Log-Based Context Awareness (로그기반 상황인식에 의한 소규모 창고관리시스템)

  • Kim, Young-Ho;Choi, Byoung-Yong;Jun, Byung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.507-514
    • /
    • 2006
  • Various application systems are developed using RFID as a part of ubiquitous computing, and it is expected that RFID chip will become wide-spread for the distribution industry especially. Efficient and efact intelligent-type of warehouse management system is essential for small-to-medium-sized enterprises in the situation having a trouble in the viewpoint of expense and manpower. In this paper, we implement small-scale warehouse management system using log-based context awareness technology. This system is implemented to be controlled on web, configuring clients to control RFID readers and building up DBMS system in a server. Especially, it grasps user's intention of storing or delivering based on toE data for the history of user's access to the system and it reports user's irregular pattern of warehouse use and serves predictive information of the control of goods in stock. As a result, the proposed system can contribute to enhance efficiency and correctness of small-scale warehouse management.

A Dynamic Bandwidth Tuning Mechanism for DQDB in Client-Server Traffic Environments (클라이언트-서버 트래픽 환경에서 분산-큐 이중-버스의 동적 대역폭 조절 방식)

  • Kim, Jeong-Hong;Kwon, Oh-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3479-3489
    • /
    • 2000
  • Most of the study on fairness control method for Distributed-Queue Dual-Bus(DQDB) have been performed under specific load types such as equal probability load types or symmetric load types. On Web-based internet enviroments client-server load types are more practical traffic patlerns than specrfic load types. In this paper, an effiective fairness control method to distribute DQDR network bandwidth fairly to all stations under a client-server load is proposed. In order to implement a dynamic bandwidth timing capabihty needed to distribute the bandwidth fairty at heavy loads, the proposed method uses two pararnetexs, one is an access hrnit to legulate each station's packet transmission and the other is the number of extra emply slots that are yielded to downstream stations. In point of implementation this mechanism is simpler and easier than Bandwidth Tuning Mechanism(BTM) that uses an intermediate pattern and an adptation function. Simulation results show that it outperforms othen mecharusms.

  • PDF