• Title/Summary/Keyword: internet users

Search Result 4,159, Processing Time 0.03 seconds

Big Data Analysis and Prediction of Traffic in Los Angeles

  • Dauletbak, Dalyapraz;Woo, Jongwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.841-854
    • /
    • 2020
  • The paper explains the method to process, analyze and predict traffic patterns in Los Angeles county using Big Data and Machine Learning. The dataset is used from a popular navigating platform in the USA, which tracks information on the road using connected users' devices and also collects reports shared by the users through the app. The dataset mainly consists of information about traffic jams and traffic incidents reported by users, such as road closure, hazards, accidents. The major contribution of this paper is to give a clear view of how the large-scale road traffic data can be stored and processed using the Big Data system - Hadoop and its ecosystem (Hive). In addition, analysis is explained with the help of visuals using Business Intelligence and prediction with classification machine learning model on the sampled traffic data is presented using Azure ML. The process of modeling, as well as results, are interpreted using metrics: accuracy, precision and recall.

Information Retrieval: A Communication Process in the 21st Century Library

  • Umeozor, Susan Nnadozie
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.2
    • /
    • pp.7-18
    • /
    • 2020
  • Communication is a process involving a group of interrelated elements working together for the purpose of information transfer. This paper discusses information retrieval as a communication process in the 21st century library. The difficulties associated with access to recorded knowledge through bibliographic control devices have been exacerbated by the interposition of additional encoding processes in the library and further decoding by the users. In addition, the innovation of internet/web has revolutionized the means and mode of communication process in the library by flooding information seekers with information and creating an illusion of self-sufficiency in many users. With these changes in information seeking behaviour and pattern, a cybernetic approach to information retrieval has emerged emphasizing adaptive control mechanisms and feedback processes. This paper argues that libraries should strive to continuously remain relevant by keeping abreast with changes in the behavior of information users. To this end, this paper proposes apomediatic-cybernetic model of communication, which illustrates information retrieval processes for the 21st-century library.

Applying Consistency-Based Trust Definition to Collaborative Filtering

  • Kim, Hyoung-Do
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.4
    • /
    • pp.366-375
    • /
    • 2009
  • In collaborative filtering, many neighbors are needed to improve the quality and stability of the recommendation. The quality may not be good mainly due to the high similarity between two users not guaranteeing the same preference for products considered for recommendation. This paper proposes a consistency definition, rather than similarity, based on information entropy between two users to improve the recommendation. This kind of consistency between two users is then employed as a trust metric in collaborative filtering methods that select neighbors based on the metric. Empirical studies show that such collaborative filtering reduces the number of neighbors required to make the recommendation quality stable. Recommendation quality is also significantly improved.

An Optimal Incentive-Compatible Pricing for Congestible Networks (혼잡이 있는 네트워크를 위한 동기 유발 가격)

  • Kim, Yong-Jae
    • Asia pacific journal of information systems
    • /
    • v.7 no.3
    • /
    • pp.109-124
    • /
    • 1997
  • Pricing information services, where congestion can threaten the efficient operation of information systems, has been studied in economics and information systems literature, Recent explosion of the Internet ana proliferation of multimedia content over the Internet have rekindled the research interest in designing pricing schedules for differentiated information services, In order for the information system to effectively serve users having heterogeneous needs, pricing rules for discriminated services should be considered. At the same time, when individual users' interest does not align with that of the organization that individual users belong to, organization-wide pricing policy should be devised to improve the value of the services rendered by the system. This paper, using a priority queuing model, addresses the need for such on incentive-compatible pricing for different information services.

  • PDF

Recommendation Method considering New User in Internet of Things Environment (사물인터넷 환경에서 새로운 사용자를 고려한 정보 추천 기법)

  • Kwon, Joonhee;Kim, Sungrim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.23-35
    • /
    • 2017
  • With the popularization of mobile devices, the number of social network service users is increasing, thereby the amount of data is also increasing accordingly. As Internet of Things environment is expanding to connect things and people, there is information much more than before. In such an environment, it becomes very important to recommend the necessary information to the user. In this paper, we propose a recommendation method that considers new users in IoT environment. In the proposed method, we recommend the information by applying the centrality-based social network analysis method to the recommendation method using the social relationships in the social IoT. We describe the seven-step recommendation method and apply them to the music circle scenario of the IoT environment. Through the music circle scenario, we show that we can recommend more suitable information to new users in the IoT environment than the existing recommendation method.

The Design for the Web Based Cluster System Accounting applying SEED (SEED를 이용한 Web기반 클러스터시스템 어카운팅 설계)

  • 오충식
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.113-119
    • /
    • 2003
  • Both the highly developed computing environment and the rapid increase of the internet users enable the present web based cluster system accounting service to help many users access to numerous data at high speed. However, the information security of users and data is also as important as the convenience of the systematic environment. Especially, the significance of damage to the individuals and organizations resulted from the data outflow, hacking and malicious coding has risen up to one of the most essential problems in the internet service business. In this study, I suggest a more safe web based cluster system accounting service solution applying SEED, the Korean Telecommunications Technology Association (TTA) standard encryption algorithm.

  • PDF

Verifying Active Network Applications (액티브 네트워크 응용의 검증)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

The effect on Aesthetics of Mobile Edu-games Contents (모바일 에듀게임 콘텐츠의 심미성에 대한 효과 연구)

  • An, Kyung-Whan;Hwang, Myeong-Cheol;Kim, Jai-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.169-173
    • /
    • 2009
  • We analyzed in this study on aesthetic areas of Mobile Edu-games Contents developers and users respectively in Mobile Platform. As a result, it indicates that through the aesthetics of Edu-games and the effectiveness of animation layout, women developers and users take more interest in storytelling and animation layout than men developers and users. We can estimate that Edu-games Contents in portable mobile platform is popular as it often contains easy learning materials and fun activities can enhance effective learning.

  • PDF

A Distributed Medium Access Control Protocol for Cognitive Radio Ad Hoc Networks

  • Joshi, Gyanendra Prasad;Kim, Sung Won;Kim, Changsu;Nam, Seung Yeob
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.331-343
    • /
    • 2015
  • We propose a distributed medium access control protocol for cognitive radio networks to opportunistically utilize multiple channels. Under the proposed protocol, cognitive radio nodes forecast and rank channel availability observing primary users' activities on the channels for a period of time by time series analyzing using smoothing models for seasonal data by Winters' method. The proposed approach protects primary users, mitigates channel access delay, and increases network performance. We analyze the optimal time to sense channels to avoid conflict with the primary users. We simulate and compare the proposed protocol with the existing protocol. The results show that the proposed approach utilizes channels more efficiently.

Stability of Slotted Aloha with Selfish Users under Delay Constraint

  • Chin, Chang-Ho;Kim, Jeong-Geun;Lee, Deok-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.3
    • /
    • pp.542-559
    • /
    • 2011
  • Most game-theoretic works of Aloha have emphasized investigating Nash equilibria according to the system state represented by the number of network users and their decisions. In contrast, we focus on the possible change of nodes' utility state represented by delay constraint and decreasing utility over time. These foregone changes of nodes' state are more likely to instigate selfish behaviors in networking environments. For such environment, in this paper, we propose a repeated Bayesian slotted Aloha game model to analyze the selfish behavior of impatient users. We prove the existence of Nash equilibrium mathematically and empirically. The proposed model enables any type of transmission probability sequence to achieve Nash equilibrium without degrading its optimal throughput. Those Nash equilibria can be used as a solution concept to thwart the selfish behaviors of nodes and ensure the system stability.