• 제목/요약/키워드: pattern of computer and Internet use

검색결과 52건 처리시간 0.022초

요보호아동의 정보화 실태 분석: 부산지역을 중심으로 (Information Analyses of Child Who Needs Protection in Busan)

  • 김옥희
    • 가정과삶의질연구
    • /
    • 제20권5호
    • /
    • pp.149-166
    • /
    • 2002
  • In this study, 1 have analyzed the state of the use of information technology by the at-risk children who are residing in Husan metropolitan area. The ultimate goal of this study is to help ensure the healthy development of the children and improve the quality of their lives in this information-oriented society. For this research, 1 surveyed 183 children living in an institution or a low-income family in Busan metropolitan area. The survey questionnaire was designed to obtain information on the respondents, socio-demographic characteristics, computer-related conditions of the immediate and social environments, patterns of computer and Internet use, their experience and degree of so called, Net-generation syndrome, Internet addiction disorder, changes in social and familial life caused by Internet use, and exposure to pornographic materials. The results show that 95.9 % of at-risk children in Husan own a computer, 60.9 % of those computers being Pentium Ⅲ. A majority of the children (74.9 %) are connected to Internet at a high-speed, using such devices as LAN, ADSL or cables. About seventy-six percent of the children have used a PC and Internet less than two years. In other words, a majority of them have not used those for a long period of time. The main results of the research are summarized in the following: There is a significant difference among at-risk children in terms of experiences in computer and Internet use according to their grade levels. There is a gender difference in the amount of time spent on computer and Internet. Boys spend more time every week on computer and Internet than girls do. There is a significant difference in the pattern of computer and Internet use, according to the type of their risk, and grade level. The so-called 'Net Generation Syndrome' is not serious in this group. A majority of the at-risk children think that Internet is more interesting than TV. They hardly shop on Internet, and they don think the advertisements on Internet are a serious problem. Also, unlike many people assumptions, their desire to communicate through on-line chatting was very low. They do not tend to buy computer game programs, and Internet Addiction Disorder was not pronounced among them. The at-risk children rarely had an exposure to pornographic materials in the cyber space. However, the exposure was more frequent for institutionalized children than children in low-income families. These results point to a need for a policy to improve the welfare of at-risk children and guarantee their right to information.

Design and Implementation of Intelligent Agent System for Pattern Classification

  • Kim, Dae-su;Park, Ji-hoon;Chang, Jae-khun;Na, Guen-sik
    • 한국지능시스템학회논문지
    • /
    • 제11권7호
    • /
    • pp.598-602
    • /
    • 2001
  • Recently, due to the widely use of personal computers and internet, many computer users requested intelligent system that can cope with various types of requirements and user-friendly interfaces. Based on this background, researches on the intelligent agent are now activating in various fields. In this paper, we modeled, designed and implemented an intelligent agent system for pattern classification by adopting intelligent agent concepts. We also investigated the pattern classification method by utilizing some pattern classification algorithms for the common data. As a result, we identified that 300 3-dimensional data are applied to three pattern classification algorithms and returned correct results. Our system showed a distinguished user-friendly interface feature by adopting various agents including graphic agent.

  • PDF

An Effective XML Schema Conversion Technique for Improving XML Document Reusability using Pattern List

  • Ko, Hye-Kyeong;Yang, Minho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권2호
    • /
    • pp.11-19
    • /
    • 2017
  • The growing use of XML markup language has made amount of heterogeneous. XML documents are widely available in the Web. As the number of applications that utilize heterogeneous XML documents grow, the importance of XML document extraction increases greatly. In this paper, we propose a XML schema conversion technique that converts reusable XML schema from XML documents. We convert the schema graph and we use the reusability pattern list. The converted XML schema is evaluated in terms of cohesion, coupling, and reusability. The converted XML schema could be used to construct databases for various fields where XML is used as an intermediation of data exchange.

Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data

  • Fidalcastro, A;Baburaj, E
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권10호
    • /
    • pp.5023-5038
    • /
    • 2017
  • Big data is an emerging technology which deals with wide range of data sets with sizes beyond the ability to work with software tools which is commonly used for processing of data. When we consider a huge network, we have to process a large amount of network information generated, which consists of both normal and abnormal activity logs in large volume of multi-dimensional data. Intrusion Detection System (IDS) is required to monitor the network and to detect the malicious nodes and activities in the network. Massive amount of data makes it difficult to detect threats and attacks. Sequential Pattern mining may be used to identify the patterns of malicious activities which have been an emerging popular trend due to the consideration of quantities, profits and time orders of item. Here we propose a sequential pattern mining algorithm with fuzzy logic feature selection and fuzzy weighted support for huge volumes of network logs to be implemented in Apache Hadoop YARN, which solves the problem of speed and time constraints. Fuzzy logic feature selection selects important features from the feature set. Fuzzy weighted supports provide weights to the inputs and avoid multiple scans. In our simulation we use the attack log from NS-2 MANET environment and compare the proposed algorithm with the state-of-the-art sequential Pattern Mining algorithm, SPADE and Support Vector Machine with Hadoop environment.

Design and Implementation of an Interestingness Analysis System for Web Personalizatoion & Customization

  • Jung, Youn-Hong;Kim, I-I;Park, Kyoo-seok
    • 한국멀티미디어학회논문지
    • /
    • 제6권4호
    • /
    • pp.707-713
    • /
    • 2003
  • Convenience and promptness of the internet have been not only making the electronic commerce grow rapidly in case of website, analyzing a navigation pattern of the users has been also making personalization and customization techniques develop rapidly for providing service accordant to individual interestingness. Web personalization and customization skill has been utilizing various methods, such as web log mining to use web log data and web mining to use the transaction of users etc, especially e-CRM analyzing a navigation pattern of the users. In this paper, We measure exact duration time of the users in web page and web site, compute weight about duration time each page, and propose a way to comprehend e-loyalty through the computed weight.

  • PDF

Demosaicing based Image Compression with Channel-wise Decoder

  • Indra Imanuel;Suk-Ho Lee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.74-83
    • /
    • 2023
  • In this paper, we propose an image compression scheme which uses a demosaicking network and a channel-wise decoder in the decoding network. For the demosaicing network, we use as the input a colored mosaiced pattern rather than the well-known Bayer pattern. The use of a colored mosaiced pattern results in the mosaiced image containing a greater amount of information pertaining to the original image. Therefore, it contributes to result in a better color reconstruction. The channel-wise decoder is composed of multiple decoders where each decoder is responsible for each channel in the color image, i.e., the R, G, and B channels. The encoder and decoder are both implemented by wavelet based auto-encoders for better performance. Experimental results verify that the separated channel-wise decoders and the colored mosaic pattern produce a better reconstructed color image than a single decoder. When combining the colored CFA with the multi-decoder, the PSNR metric exhibits an increase of over 2dB for three-times compression and approximately 0.6dB for twelve-times compression compared to the Bayer CFA with a single decoder. Therefore, the compression rate is also increased with the proposed method than with the method using a single decoder on the Bayer patterned mosaic image.

Artificial Intelligence Inspired Intelligent Trust Based Routing Algorithm for IoT

  • Kajol Rana;Ajay Vikram Singh;P. Vijaya
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.149-161
    • /
    • 2023
  • Internet of Things (IoT) is a relatively new concept that has gained immense popularity in a short period of time due to its wide applicability in making human life more convenient and automated. As an illustration: the development of smart homes, smart cities, etc. However, it is also accompanied by a substantial number of risks and flaws. IoT makes use of low-powered devices, so secure, less time-consuming and energy-intensive transmission (routing) of messages due to the limited availability of energy is one of the many and most significant concerns for IoT developers. The following paper presents a trust-based routing scenario for the Internet of Things (IoT) that exploits the past transmission record from the cupcarbon simulator's log files. Artificial Neural Network is used to quantify knowledge of trust, calculate the value of trust, and share this information with other network devices. As a human behavioural pattern, trust provides a superior method for making routing decisions. If there is a tie in the trust values and no other path is available, the remaining battery power is used to break the tie and make a forwarding decision; this is also seen as a more efficient use of the available resources. The proposed algorithm is observed to have superior energy consumption and routing decisions compared to conventional routing algorithms, and it improves the communication pattern.

의사결정규칙을 이용한 아동의 교육용 인터넷 게임 활용실태 분석 (Analysis on the Usage of Internet Games for Children with Decision Tree Rules)

  • 김용대;정희석;최은정;박병선;한정혜
    • 정보교육학회논문지
    • /
    • 제5권3호
    • /
    • pp.389-400
    • /
    • 2001
  • 인터넷 게임은 인터넷의 등장과 함께 급속하게 보급된 형태로 사용자가 이용하기 쉽고 게임의 종류가 다양하고 재미있다는 점에서 현재 학교현장에서 실시되고 있는 ICT 교육에 효과적인 교육방법으로 응용될 수 있다. 따라서, 본 연구에서는 ICT 교육에 활용될 수 있는 여러 자원 중 인터넷 게임에 대하여 아동들의 인터넷 게임 사용실태를 분석하고, 데이터 마이닝의 의사결정나무를 통하여 아동의 컴퓨터 사용에 따른 인터넷 게임에 대한 패턴을 도출하며, 또한 교사들의 활용실태를 조사함으로써 인터넷 게임 개발 필요성과 이를 초등 ICT 교육에 보다 효과적으로 적용할 수 있는 실증적 방향을 제시하였다.

  • PDF

An Incremental Statistical Method for Daily Activity Pattern Extraction and User Intention Inference

  • Choi, Eu-Ri;Nam, Yun-Young;Kim, Bo-Ra;Cho, We-Duke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권3호
    • /
    • pp.219-234
    • /
    • 2009
  • This paper presents a novel approach for extracting simultaneously human daily activity patterns and discovering the temporal relations of these activity patterns. It is necessary to resolve the services conflict and to satisfy a user who wants to use multiple services. To extract the simultaneous activity patterns, context has been collected from physical sensors and electronic devices. In addition, a context model is organized by the proposed incremental statistical method to determine conflicts and to infer user intentions through analyzing the daily human activity patterns. The context model is represented by the sets of the simultaneous activity patterns and the temporal relations between the sets. To evaluate the method, experiments are carried out on a test-bed called the Ubiquitous Smart Space. Furthermore, the user-intention simulator based on the simultaneous activity patterns and the temporal relations from the results of the inferred intention is demonstrated.

Finger Vein Recognition Using Generalized Local Line Binary Pattern

  • Lu, Yu;Yoon, Sook;Xie, Shan Juan;Yang, Jucheng;Wang, Zhihui;Park, Dong Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1766-1784
    • /
    • 2014
  • Finger vein images contain rich oriented features. Local line binary pattern (LLBP) is a good oriented feature representation method extended from local binary pattern (LBP), but it is limited in that it can only extract horizontal and vertical line patterns, so effective information in an image may not be exploited and fully utilized. In this paper, an orientation-selectable LLBP method, called generalized local line binary pattern (GLLBP), is proposed for finger vein recognition. GLLBP extends LLBP for line pattern extraction into any orientation. To effectually improve the matching accuracy, the soft power metric is employed to calculate the matching score. Furthermore, to fully utilize the oriented features in an image, the matching scores from the line patterns with the best discriminative ability are fused using the Hamacher rule to achieve the final matching score for the last recognition. Experimental results on our database, MMCBNU_6000, show that the proposed method performs much better than state-of-the-art algorithms that use the oriented features and local features, such as LBP, LLBP, Gabor filter, steerable filter and local direction code (LDC).