• Title/Summary/Keyword: Web-Log

Search Result 295, Processing Time 0.027 seconds

Method of extracting context from media data by using video sharing site

  • Kondoh, Satoshi;Ogawa, Takeshi
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.709-713
    • /
    • 2009
  • Recently, a lot of research that applies data acquired from devices such as cameras and RFIDs to context aware services is being performed in the field on Life-Log and the sensor network. A variety of analytical techniques has been proposed to recognize various information from the raw data because video and audio data include a larger volume of information than other sensor data. However, manually watching a huge amount of media data again has been necessary to create supervised data for the update of a class or the addition of a new class because these techniques generally use supervised learning. Therefore, the problem was that applications were able to use only recognition function based on fixed supervised data in most cases. Then, we proposed a method of acquiring supervised data from a video sharing site where users give comments on any video scene because those sites are remarkably popular and, therefore, many comments are generated. In the first step of this method, words with a high utility value are extracted by filtering the comment about the video. Second, the set of feature data in the time series is calculated by applying functions, which extract various feature data, to media data. Finally, our learning system calculates the correlation coefficient by using the above-mentioned two kinds of data, and the correlation coefficient is stored in the DB of the system. Various other applications contain a recognition function that is used to generate collective intelligence based on Web comments, by applying this correlation coefficient to new media data. In addition, flexible recognition that adjusts to a new object becomes possible by regularly acquiring and learning both media data and comments from a video sharing site while reducing work by manual operation. As a result, recognition of not only the name of the seen object but also indirect information, e.g. the impression or the action toward the object, was enabled.

  • PDF

A Control Path Analysis Mechanism for Workflow Mining (워크플로우 마이닝을 위한 제어 경로 분석 메커니즘)

  • Min Jun-Ki;Kim Kwang-Hoon;Chung Jung-Su
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.91-99
    • /
    • 2006
  • This paper proposes a control path analysis mechanism to be used in the workflow mining framework maximizing the workflow traceability and re discoverability by analyzing the total sequences of the control path perspective of a workflow model and by rediscovering their runtime enactment history from the workflow log information. The mechanism has two components One is to generate the total sequences of the control paths from a workflow mode by transforming it to a control path decision tree, and the other is to rediscover the runtime enactment history of each control path out of the total sequences from the corresponding workflow's execution logs. Eventually, these rediscovered knowledge and execution history of a workflow model make up a control path oriented intelligence of the workflow model. which ought to be an essential ingredient for maintaining and reengineering the qualify of the workflow model. Based upon the workflow intelligence, it is possible for the workflow model to be gradually refined and finally maximize its qualify by repeatedly redesigning and reengineering during its whole life long time period.

  • PDF

Design and Implementation of the Extended DNS Security Mechanism (확장된 DNS 보안 메커니즘의 설계 및 구현)

  • Sim, Hui-Won;Kim, Jin-Seong;Sim, Yeong-Cheol;Im, Chan-Sun;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.134-147
    • /
    • 1999
  • The DNS provides naming services which are the basis for the application of the Internet and the security of the DNS should be provided for the security of the Internet. Recently IETF proposed a method which guarantees the integrity of DNS database contents and DNS queries/replies and distributes host public keys. In this paper we describe the design and implementation of the secure DNS which is built based on the IETF proposal and extended to facilitate its sue and management. In the extended secure DNS, DNS servers are used ad the directory system in a public key infrastructure and stores/distributes user public key certificates. The Web-based management interface and security log functions are added and the extended secure DNS is being built so that new cryptographic algorithms can be easily added.

  • PDF

A New Latent Class Model for Analysis of Purchasing and Browsing Histories on EC Sites

  • Goto, Masayuki;Mikawa, Kenta;Hirasawa, Shigeichi;Kobayashi, Manabu;Suko, Tota;Horii, Shunsuke
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.4
    • /
    • pp.335-346
    • /
    • 2015
  • The electronic commerce site (EC site) has become an important marketing channel where consumers can purchase many kinds of products; their access logs, including purchase records and browsing histories, are saved in the EC sites' databases. These log data can be utilized for the purpose of web marketing. The customers who purchase many product items are good customers, whereas the other customers, who do not purchase many items, must not be good customers even if they browse many items. If the attributes of good customers and those of other customers are clarified, such information is valuable as input for making a new marketing strategy. Regarding the product items, the characteristics of good items that are bought by many users are valuable information. It is necessary to construct a method to efficiently analyze such characteristics. This paper proposes a new latent class model to analyze both purchasing and browsing histories to make latent item and user clusters. By applying the proposal, an example of data analysis on an EC site is demonstrated. Through the clusters obtained by the proposed latent class model and the classification rule by the decision tree model, new findings are extracted from the data of purchasing and browsing histories.

Examining Categorical Transition and Query Reformulation Patterns in Image Search Process (이미지 검색 과정에 나타난 질의 전환 및 재구성 패턴에 관한 연구)

  • Chung, Eun-Kyung;Yoon, Jung-Won
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.2
    • /
    • pp.37-60
    • /
    • 2010
  • The purpose of this study is to investigate image search query reformulation patterns in relation to image attribute categories. A total of 592 sessions and 2,445 queries from the Excite Web search engine log data were analyzed by utilizing Batley's visual information types and two facets and seven sub-facets of query reformulation patterns. The results of this study are organized with two folds: query reformulation and categorical transition. As the most dominant categories of queries are specific and general/nameable, this tendency stays over various search stages. From the perspective of reformulation patterns, while the Parallel movement is the most dominant, there are slight differences depending on initial or preceding query categories. In examining categorical transitions, it was found that 60-80% of search queries were reformulated within the same categories of image attributes. These findings may be applied to practice and implementation of image retrieval systems in terms of assisting users' query term selection and effective thesauri development.

A Study of the Intelligent Researcher Connection Network Build-up that Merges the Recommendation System and Social Network (추천시스템과 소셜 네트워크를 융합한 지능형 연구자연결망 구축)

  • Lee, Choong-Moo;Lee, Sang-Gi;Lee, Byeong-Seop
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.199-215
    • /
    • 2009
  • The web 2.0 concept rapidly spreads to the various field which is based on an opening, the participation, and a share. And the research about the recommendation system, that is the personalize feature, and social network is very active. In the case of the recommendation system and social network, it had been developing in the respectively different area and the new research toward the service model of a form that it fuses these is insignificant. In this paper, I'm going to introduce efficient social network which is called the researcher connection network. It is possible to recommend the researcher intellectually who studies the similar field by analyzing the usage log and user profile. Through this study, we could solved the network expandability problem which is due to the user passive participation and the difficulty of the initial network construction that is the conventional social network problem.

Weblog Analysis of University Admissions Website using Google Analytics (구글 애널리틱스를 활용한 대학 입시 홈페이지 웹로그 분석)

  • Su-Hyun Ahn;Sang-Jun Lee
    • Journal of Practical Engineering Education
    • /
    • v.16 no.1_spc
    • /
    • pp.95-103
    • /
    • 2024
  • With the rapid decline of the school-age population, the competition for admissions has increased and marketing through digital channels has become more important, so universities are investing more resources in online promotion and communication to recruit new students. This study uses Google Analytics, a web log analysis tool, to track the visitor behavior of a university admissions website and establish a digital marketing strategy based on it. The analysis period was set from July 1, 2023, when Google Analytics 4(GA4) was integrated, to January 10, 2024, when the college admissions process was completed. The analysis revealed interesting patterns such as geographical information based on visitors' access location, devices(operating systems) and browsers used by visitors, acquisition channels through visitors traffic, conversions on pages and screens that visitors engaged with and visitor flow. Based on this study, we expect universities to find ways to strengthen their admission promotion through digital marketing and effectively communicate with applicants to gain a competitive edge.

Automatic Merging of Distributed Topic Maps based on T-MERGE Operator (T-MERGE 연산자에 기반한 분산 토픽맵의 자동 통합)

  • Kim Jung-Min;Shin Hyo-Pil;Kim Hyoung-Joo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.787-801
    • /
    • 2006
  • Ontology merging describes the process of integrating two ontologies into a new ontology. How this is done best is a subject of ongoing research in the Semantic Web, Data Integration, Knowledge Management System, and other ontology-related application systems. Earlier research on ontology merging, however, has studied for developing effective ontology matching approaches but missed analyzing and solving methods of problems of merging two ontologies given correspondences between them. In this paper, we propose a specific ontology merging process and a generic operator, T-MERGE, for integrating two source ontologies into a new ontology. Also, we define a taxonomy of merging conflicts which is derived from differing representations between input ontologies and a method for detecting and resolving them. Our T-MERGE operator encapsulates the process of detection and resolution of conflicts and merging two entities based on given correspondences between them. We define a data structure, MergeLog, for logging the execution of T-MERGE operator. MergeLog is used to inform detailed results of execution of merging to users or recover errors. For our experiments, we used oriental philosophy ontologies, western philosophy ontologies, Yahoo western philosophy dictionary, and Naver philosophy dictionary as input ontologies. Our experiments show that the automatic merging module compared with manual merging by a expert has advantages in terms of time and effort.

Intelligent Brand Positioning Visualization System Based on Web Search Traffic Information : Focusing on Tablet PC (웹검색 트래픽 정보를 활용한 지능형 브랜드 포지셔닝 시스템 : 태블릿 PC 사례를 중심으로)

  • Jun, Seung-Pyo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.93-111
    • /
    • 2013
  • As Internet and information technology (IT) continues to develop and evolve, the issue of big data has emerged at the foreground of scholarly and industrial attention. Big data is generally defined as data that exceed the range that can be collected, stored, managed and analyzed by existing conventional information systems and it also refers to the new technologies designed to effectively extract values from such data. With the widespread dissemination of IT systems, continual efforts have been made in various fields of industry such as R&D, manufacturing, and finance to collect and analyze immense quantities of data in order to extract meaningful information and to use this information to solve various problems. Since IT has converged with various industries in many aspects, digital data are now being generated at a remarkably accelerating rate while developments in state-of-the-art technology have led to continual enhancements in system performance. The types of big data that are currently receiving the most attention include information available within companies, such as information on consumer characteristics, information on purchase records, logistics information and log information indicating the usage of products and services by consumers, as well as information accumulated outside companies, such as information on the web search traffic of online users, social network information, and patent information. Among these various types of big data, web searches performed by online users constitute one of the most effective and important sources of information for marketing purposes because consumers search for information on the internet in order to make efficient and rational choices. Recently, Google has provided public access to its information on the web search traffic of online users through a service named Google Trends. Research that uses this web search traffic information to analyze the information search behavior of online users is now receiving much attention in academia and in fields of industry. Studies using web search traffic information can be broadly classified into two fields. The first field consists of empirical demonstrations that show how web search information can be used to forecast social phenomena, the purchasing power of consumers, the outcomes of political elections, etc. The other field focuses on using web search traffic information to observe consumer behavior, identifying the attributes of a product that consumers regard as important or tracking changes on consumers' expectations, for example, but relatively less research has been completed in this field. In particular, to the extent of our knowledge, hardly any studies related to brands have yet attempted to use web search traffic information to analyze the factors that influence consumers' purchasing activities. This study aims to demonstrate that consumers' web search traffic information can be used to derive the relations among brands and the relations between an individual brand and product attributes. When consumers input their search words on the web, they may use a single keyword for the search, but they also often input multiple keywords to seek related information (this is referred to as simultaneous searching). A consumer performs a simultaneous search either to simultaneously compare two product brands to obtain information on their similarities and differences, or to acquire more in-depth information about a specific attribute in a specific brand. Web search traffic information shows that the quantity of simultaneous searches using certain keywords increases when the relation is closer in the consumer's mind and it will be possible to derive the relations between each of the keywords by collecting this relational data and subjecting it to network analysis. Accordingly, this study proposes a method of analyzing how brands are positioned by consumers and what relationships exist between product attributes and an individual brand, using simultaneous search traffic information. It also presents case studies demonstrating the actual application of this method, with a focus on tablets, belonging to innovative product groups.

Development of the Computer-assisted Nutrition Education Program of Eating-out Guidance for Teenagers (올바른 외식지도를 위한 청소년용 영양교육 사이트(Health14.net) 개발)

  • Bae, Eun-Young;Lee, Kyung-Hea;Lyu, Eun-Soon;Her, Eun-Sil
    • Korean Journal of Community Nutrition
    • /
    • v.12 no.4
    • /
    • pp.462-476
    • /
    • 2007
  • This study aimed to develop a nutrition education internet program for correcting the eating-out behaviorial problems of youth. A survey was performed to investigate the eating-out behavior patterns of youth by questionnaires. A nutrition education program was developed on the basis of the survey results, and evaluated by teenagers. The results of the developed homepage are summarized as follows: The contents of this program (www.health14.net) consist of '${\times}$ Health (Teenager, My Health, Healthy life, Beautiful life)', '+ Nutrition (To find slow foods, Fast foods campaign, Selecting fast foods, The best menu for eating-out, Recipes for health, Golden bell nutrition quiz)', '${\div}$ Information (Diet mini-homepage, Q & A, My knowhow, Game, Community)' and 'Basic Menu (home, Log in, Information and news, Mini-homepage, Site map, Free bulletin board)'. It can be used as educational material for dietary behaviorial changes in school. Also teachers and parents could get information on eating-out menus. Through this site, we anticipate contributing to nutritional health promotion by correcting the eating-out habits of youth.