• Title/Summary/Keyword: Web Party

Search Result 63, Processing Time 0.03 seconds

A Study of Users' Ideological Propensity in the Comments of Online News: Focusing upon the Stories of the Web Portal Sites and the Press Website News Related to the 20th presidential Election (온라인 뉴스 댓글에 나타난 뉴스 이용자들의 이념적 성향에 관한 연구: 포털과 언론사닷컴의 20대 대선 관련 뉴스기사를 중심으로)

  • Kwang Soon Park;Jong Mook Ahn
    • Journal of Industrial Convergence
    • /
    • v.20 no.12
    • /
    • pp.135-143
    • /
    • 2022
  • This paper aims to grasp what propensity users have in their ideology from the comments in the Web Portal News and the Press Website News. Through these analytical results, the political propensities of not only the Web Portal News and the Press Website News but also the voters who use these news media could be grasped. The collection of data necessary for this study has been made from the comments of 174 news stories for about 90 days before the election day. For the analysis, T-test has been used in order to compare Naver News with Daum News, the Minjoo Party of Korea with the People Power Party, and the Press Web Site News with Naver News. As a result of the analysis, the comments of Naver News took the higher percentage in the positive writings about the candidates of the conservative party. but, in contrast, those of Daum News in that percentage were higher about the ones of the progressive party. Accordingly, it can be found that Naver News is mainly used by users with the politically conservative propensity, while Daum News is mostly used by those with progressive one.

Improving spaCy dependency annotation and PoS tagging web service using independent NER services

  • Colic, Nico;Rinaldi, Fabio
    • Genomics & Informatics
    • /
    • v.17 no.2
    • /
    • pp.21.1-21.6
    • /
    • 2019
  • Dependency parsing is often used as a component in many text analysis pipelines. However, performance, especially in specialized domains, suffers from the presence of complex terminology. Our hypothesis is that including named entity annotations can improve the speed and quality of dependency parses. As part of BLAH5, we built a web service delivering improved dependency parses by taking into account named entity annotations obtained by third party services. Our evaluation shows improved results and better speed.

A Study on the internet Marketing of the Hotel food & beverage goods (관광호텔 식음료 상품의 인터넷 마케팅에 관한 연구)

  • 김승희
    • Culinary science and hospitality research
    • /
    • v.6 no.1
    • /
    • pp.197-224
    • /
    • 2000
  • The ballyhoo surrounding internet continues to intensify. This study was made to determine how the hotel food & beverage goods is using this potentially revolutionary marketing and management tool by taking an exploratory look at the internet and at worldwide-web hotel sites. The type of hotel-related sites that exist on the web was examined. To have a successful web site and realize the potential of that tool, one must make some plans carefully Also, being on the internet requires a full marketing strategy, and one must know his own personal goals. The goals are to increase worldwide visibility, upgrade public relations and publicity, develop sales, and include new technology in internal communication. The internet also has a communication function for internal management takes. hotel companies have established themselves on the Web with their own web sites or via a link from a third party. Using the evidence from many of these sites this study reveals the current strengths and weaknesses of the use of the internet as a business and marketing tool by hotel food & beverage goods.

  • PDF

A Reliable Web Service Support Mechanism based on Asynchronous Architecture in BcN (광대역통합망에서의 비동기 구조를 이용한 신뢰성 있는 웹 서비스 제공방안)

  • Kim Hyoung-min;Jung Yeu-hun;Kim Hwa-sung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.773-780
    • /
    • 2005
  • Recently, the telecommunication network is in a transition toward the BcN (Broadband convergence Networks) that integrates the Internet, the telecommunication and the broadcasting. The BcN makes it possible to provide of 4he third-party application by using the Open API The Parlay X API is an example of the Open API and the Parlay X API is grafted in the Web Service and is abstracted from the Parlay API. So, the Parlay X API does not only have advantages of a Web Service, but also disadvantages of the Web Service. The main disadvantage of the Web Service is that it does not support the any QoS mechanism. In this paper, we propose the architecture that solves the reliability among the QoS issues for the Web Service. The proposed mechanism adopts the Asynchronous architecture for the reliable Web Service and improves the performance of the retransmission between the client and the server using the expected response time. We perform the performance evaluation through the simulation in older to compare with the existing mechanism. Consequently, we can confirm that the performance of the proposed mechanism performs better than the existing mechanism.

Study on Development of u-4PL System based RFID (RFID 기반 u-4PL 시스템 개발에 관한 연구)

  • Li, Zhong-Shi;Na, Hyeong-Seok;Lee, Chang-Ho
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.11a
    • /
    • pp.181-191
    • /
    • 2007
  • Logistics creates a boom in accordance with the recent new technique's development along with the recent RFID/USN of ubiquitous computing technique. The wave of 4PL(Fourth Party Logistics) that added the strategic consulting based on new IT techniques to logistics outsourcing through existing 3PL service with is a great issue. Moreover, the customer enterprises which contained manufacturers and distributors need the one stop service, therefore a method for effectively dealing with global logistics' environment changes is needed. Above all, a development of the 4PL system with RFID is very urgent. We developed the RFID u-4PL system progressed more than the present system, in which we applied many international standards. Finally, we constructed the web service based on Web 2.0 because of important condition of 4PL.

  • PDF

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

Research of Distributed Computing with REST Open API Web Services (REST 웹서비스 Open API를 사용한 분산처리 기법 연구)

  • Choi, Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2473-2481
    • /
    • 2014
  • The majority of next generation information systems will be working on portable mobile devices such as smartphones. REST Open API web services have quickly become popular among mobile application development. The use of REST web services are not only growing in popularity but totally changing the way of mobile applications development. This is because REST web services could be used in application development as a form of building blocks, which is completely independent, compatible, to any platforms. With this strength, REST web services encourage third party application to build add-on functionality. This research proposes the use of REST web service to replace the use of socket APIs into major internet communication APIs. To this end, this paper also provide performance evaluation of the REST web services compared to the conventional socket APIs, focusing on scalability by analytical and experimental evaluations. Finally, we summarize the possibility whether REST Open API web services have enough performance as future major internet communication primitive APIs.

XSS Attack and Countermeasure: Survey (XSS 공격과 대응방안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.327-332
    • /
    • 2013
  • XSS is an attacker on the other party of the browser that is allowed to run the script. It is seized session of the users, or web site modulation, malicious content insertion, and phishing attack which is available. XSS attacks are stored XSS and reflected XSS. In that, two branch attacks. The form of XSS attacks are cookie sniffing, script encryption, bypass, the malignant cord diffusion, Key Logger, Mouse Sniffer, and addition of lie information addition. XSS attacks are target of attack by script language. Therefore, the countermeasure of XSS is presented and proposed to improve web security.

An Economic Model for Initial Qualities and Service Prices of Intermediarie's Web Sites (중간상 웹사이트의 초기 품질 및 서비스 가격 결정을 위한 경제 모형)

  • 이강배
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.27 no.4
    • /
    • pp.139-147
    • /
    • 2002
  • In this paper, a mathematical model was introduced to analyze pricing and quality strategies for the web sites of electronic intermediaries. Especially, I focused on the intermediary sites that initiate their businesses by providing free services such as free e-mail, search, and directory services. intermediaries may gather third party providers looking for new markets for their services, based on customers who want to use the free services. And intermediaries provide charged intermediary services to both of customers and providers. By analyzing the mathematical model, I can find optimal quality and prices to maximize the profit of intermediaries. And I can found also that intermediaries should make efforts to improve their productivity of developing their services to make profits.

Secure User Authority Authentication Method in the Open Authorization (Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구)

  • Chae, Cheol-Joo;Lee, June-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.289-294
    • /
    • 2014
  • Recently, the various web service and applications are provided to the user. As to these service, because of providing the service to the authenticated user, the user undergoes the inconvenience of performing the authentication with the service especially every time. The OAuth(Open Authorization) protocol which acquires the access privilege in which 3rd Party application is limited on the web service in order to resolve this inconvenience appeared. This OAuth protocol provides the service which is convenient and flexible to the user but has the security vulnerability about the authorization acquisition. Therefore, we propose the method that analyze the security vulnerability which it can be generated in the OAuth 2.0 protocol and secure user authority authentication method.