• Title/Summary/Keyword: information user

Search Result 18,026, Processing Time 0.049 seconds

End-user Computing and End- User Searching (최종이용자컴퓨팅과 최종이용자탐색)

  • 이상복
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.7 no.1
    • /
    • pp.171-192
    • /
    • 1994
  • End-user Computing(EUC) is one of the significant developments of the 1980s with the explosive supply of personal computers and application software related to it. EUC can be defined as the direct assumption of system development and data processing tasks by the user of the service for his own direct benefit. This is in contrast to the traditional approach to computing in which user requirement are identified and defined and then turned over to professional system designers and programmers for implementation, with the end-user a relatively passive participant in the process. The traditional approach to system development has two obvious drawbacks. First, there is the problem that something may be lost in translation of the problem as originally formulated by the requestor and as it is implemented by the computer specialists. Second, there is the problem that it can take a longtime as growth of significant workloads within system department staff. EUC is an attempt to compensate for this drawbacks associated with the traditional system department process. It permits the end-user to interact directly with an information system, utilizing user friendly software support tools. End-user Searching(EUS) can be defined as accessing online databases and performing search operations for the purpose of finding information to be used by that same person rather than another, in contract with intermediary searcher. The concept of EUS is related to the concept of EUS. That is, two concept are similarly to development background, effects and functions. Therefore, as EUC bring on a change the traditional data processing environment, EUS also bring on a change the traditional intermediary search environment.

  • PDF

Interaction-based Collaborative Recommendation: A Personalized Learning Environment (PLE) Perspective

  • Ali, Syed Mubarak;Ghani, Imran;Latiff, Muhammad Shafie Abd
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.446-465
    • /
    • 2015
  • In this modern era of technology and information, e-learning approach has become an integral part of teaching and learning using modern technologies. There are different variations or classification of e-learning approaches. One of notable approaches is Personal Learning Environment (PLE). In a PLE system, the contents are presented to the user in a personalized manner (according to the user's needs and wants). The problem arises when a new user enters the system, and due to the lack of information about the new user's needs and wants, the system fails to recommend him/her the personalized e-learning contents accurately. This phenomenon is known as cold-start problem. In order to address this issue, existing researches propose different approaches for recommendation such as preference profile, user ratings and tagging recommendations. In this research paper, the implementation of a novel interaction-based approach is presented. The interaction-based approach improves the recommendation accuracy for the new-user cold-start problem by integrating preferences profile and tagging recommendation and utilizing the interaction among users and system. This research work takes leverage of the interaction of a new user with the PLE system and generates recommendation for the new user, both implicitly and explicitly, thus solving new-user cold-start problem. The result shows the improvement of 31.57% in Precision, 18.29% in Recall and 8.8% in F1-measure.

A user behavior prediction technique using mobile-based Lifelog (모바일 기반 라이프로그를 이용한 사용자 행동 예측 기법)

  • Bang, Jae-Geun;Kim, Byeong Man
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.6
    • /
    • pp.63-76
    • /
    • 2014
  • Recently the desired information has been recommended to many people in a number of ways using the smartphone. Though there are many applications for that purpose, but most applications does not consider the user's current situation. In order to automatically recommend the information considering the user's situation, it is necessary to predict the future behavior of the user from the records of the past behavior of the user. Therefore, in this paper, we propose a method that predicts the user's future behavior through association analysis based on the user's current behavior which is identified by applying the user's current situation data collected via a smartphone to the Bayesian network built from the user's life log. From the experiments and analysis for five students and five virtual workers, the usefulness of the proposed method is confirmed.

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database (MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2482-2488
    • /
    • 2014
  • This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.

User-Customized News Service by use of Social Network Analysis on Artificial Intelligence & Bigdata

  • KANG, Jangmook;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.131-142
    • /
    • 2021
  • Recently, there has been an active service that provides customized news to news subscribers. In this study, we intend to design a customized news service system through Deep Learning-based Social Network Service (SNS) activity analysis, applying real news and avoiding fake news. In other words, the core of this study is the study of delivery methods and delivery devices to provide customized news services based on analysis of users, SNS activities. First of all, this research method consists of a total of five steps. In the first stage, social network service site access records are received from user terminals, and in the second stage, SNS sites are searched based on SNS site access records received to obtain user profile information and user SNS activity information. In step 3, the user's propensity is analyzed based on user profile information and SNS activity information, and in step 4, user-tailored news is selected through news search based on user propensity analysis results. Finally, in step 5, custom news is sent to the user terminal. This study will be of great help to news service providers to increase the number of news subscribers.

Research and Design of Functional Requirements of Shared Electric Bicycle App Based on User Experience

  • Xiangqin Zhao;Bin Wang
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.219-231
    • /
    • 2023
  • Intelligent applications are crucial for increasing the popularity of shared urban electric bicycles (EBs). Building an application platform architectural system that can satisfy independent user operations is critical for increasing the intelligent usage of shared EBs. Consequently, we collected online reviews of shared EB applications, conducted semantic processing and sentiment analysis, and refined the positive and negative review data for each function. The positive and negative review indices of each function were calculated using the formulae for positive and negative review indices of product functions, thereby determining the functions that need to be improved. Each function of the Shared EB application was improved according to its business process. The main contributions of this study are to build a user requirement architecture system for the Shared EB application with five dimensions and 22 functions using the Delphi method to design the user interface (UI) of this application based on user satisfaction evaluation results; to create a high-fidelity dynamic interaction prototype and compare user satisfaction before and after improving the Shared EB application functions. The testing results indicate that the changes in the UI significantly improve the user experience satisfaction of the urban Shared EB application, with the positive experience index increasing by 69.21% and the negative experience index decreasing by 75.85% overall. This information can be directly used by relevant companies to improve the functions of the Shared EB application.

Determinants of the intention to use information services (서비스 가치 관점에서의 e-정보서비스 사용 의도에 관한 연구)

  • Han Jung-hee;Chang Hwal-sik
    • The Journal of Information Systems
    • /
    • v.13 no.1
    • /
    • pp.97-119
    • /
    • 2004
  • Recently, many e-business companies started to charge fees to the use of information contents service. However, little is known about how users evaluate and determine to purchase information services. Past technology adoption research has focused primarily on the positive utility gains side, focusing on usefulness and ease of use. Purchase of e-service, however, involves not only the position utilities but also negative utilities. This research uses the service value model(SVM) and explains user's intention of purchasing a new information service. Based on the Perceived Value Framework, this research investigates the impacts of the service quality and the fee charge on the user's perceived service value and further on user's intention of adopting the e-service. One of the most important postulations of this research is that both service quality and the fee charge influence user's intention through affecting the user's perceived service value. This research presences a conceptual model of users' e-service evaluation process. The conceptual framework provides a basis for understanding how perceptions of quality and sacrifice influence value perceptions and purchase intentions. The results of an empirical research suggest that the both service quality and fee charge have influences on the perceived service value. However, they do not directly affect user's intention to purchase the e-service. They affect user's intention to purchase through affecting the perceived service value. In conclusion, this research provides a base to build on for other research studying use intention model of new e-service.

  • PDF

An Analysis of User Needs for User-Centered Information Retrieval System Design of University Library (대학도서관 이용자기반 정보검색시스템 설계를 위한 이용자 요구 분석)

  • Noh, Jin-Goo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.69-95
    • /
    • 2000
  • The purpose of this study is to derive system design factors and to analyze user needs of university library for design of user-centered information retrieval system. The result of this study can be summarized as follows: First, the concept of 'users-centered' in digital environment where the supporting role of intermediaries is growing bigger than before in the interaction with remote information retrieval system can be defined as the new concept of 'expansion of knowledge'. Second, 6 kinds of system design factors derived for user-centered information retrieval system design of the university libraries. Third, The user needs that examined and analyzed through the questionnaires made by user-centered approach according to the design factors should be considered for system design.

  • PDF

Character Floating Hologram using Detection of User's Height and Motion by Depth Image (깊이 영상으로 사용자 키 검출 및 동작감지를 사용한 캐릭터 플로팅 홀로그램)

  • Oh, KyooJin;Han, DaeHyun;Kwon, SoonKak
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.4
    • /
    • pp.33-40
    • /
    • 2018
  • With the development of computer and video technology, a lot of contents are being produced as digital media methods to provide are being diversified and the intrest in digital media increases. Such contents are actively researched using human motion and user's information through camera or controller. Contents using user's information can be exposed to various people in public places and used as an advertisement. This paper proposes the character floating hologram system that is implemented using detection of user's height and motion. The purposed system detects user's height and motion from depth images and creates corresponding character from the detected data. Then it is represented using a floating hologram device. This system can be used for marketing, advertising and exhibition events using user information.

A hidden anti-jamming method based on deep reinforcement learning

  • Wang, Yifan;Liu, Xin;Wang, Mei;Yu, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3444-3457
    • /
    • 2021
  • In the field of anti-jamming based on dynamic spectrum, most methods try to improve the ability to avoid jamming and seldom consider whether the jammer would perceive the user's signal. Although these existing methods work in some anti-jamming scenarios, their long-term performance may be depressed when intelligent jammers can learn user's waveform or decision information from user's historical activities. Hence, we proposed a hidden anti-jamming method to address this problem by reducing the jammer's sense probability. In the proposed method, the action correlation between the user and the jammer is used to evaluate the hiding effect of the user's actions. And a deep reinforcement learning framework, including specific action correlation calculation and iteration learning algorithm, is designed to maximize the hiding and communication performance of the user synchronously. The simulation result shows that the algorithm proposed reduces the jammer's sense probability significantly and improves the user's anti-jamming performance slightly compared to the existing algorithms based on jamming avoidance.