• Title/Summary/Keyword: pattern of computer and Internet use

Search Result 52, Processing Time 0.025 seconds

AN EFFICIENT DENSITY BASED ANT COLONY APPROACH ON WEB DOCUMENT CLUSTERING

  • M. REKA
    • Journal of applied mathematics & informatics
    • /
    • v.41 no.6
    • /
    • pp.1327-1339
    • /
    • 2023
  • World Wide Web (WWW) use has been increasing recently due to users needing more information. Lately, there has been a growing trend in the document information available to end users through the internet. The web's document search process is essential to find relevant documents for user queries.As the number of general web pages increases, it becomes increasingly challenging for users to find records that are appropriate to their interests. However, using existing Document Information Retrieval (DIR) approaches is time-consuming for large document collections. To alleviate the problem, this novel presents Spatial Clustering Ranking Pattern (SCRP) based Density Ant Colony Information Retrieval (DACIR) for user queries based DIR. The proposed first stage is the Term Frequency Weight (TFW) technique to identify the query weightage-based frequency. Based on the weight score, they are grouped and ranked using the proposed Spatial Clustering Ranking Pattern (SCRP) technique. Finally, based on ranking, select the most relevant information retrieves the document using DACIR algorithm.The proposed method outperforms traditional information retrieval methods regarding the quality of returned objects while performing significantly better in run time.

A Comparative Study of Internet Addiction among Middle and High School Students in Seoul, Cheonan, and Rural Area (서울, 천안, 농촌지역 중 고교 학생들의 인터넷 중독에 대한 비교 연구)

  • Lee, Seok-Bum;Lee, Kyung-Kyu;Paik, Ki-Chung;Kim, Hyun-Woo
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.12 no.2
    • /
    • pp.145-156
    • /
    • 2004
  • Objectives : Internet addiction is a newly appeared addictive phenomenon that is defined as 'difficulty in real life due to internet over-use', 'excessive time spent on the internet or replacement of genuine real relationships with superficial virtual ones' or 'weakness in self-control about internet use and if discontinued, fallen in psychological confusion and anergic state'. This study was aimed to compare the internet addiction rate, demographic factors, computer using patterns, anxiety, depression, and internet self-efficacy and outcome expectancy between Korean middle and high school students in three areas - Seoul, Cheonan, and Rural areas - that were different in economic, cultural, and geographic state. Methods : Subjects are consisted of middle and high school students in Seoul, Chunan, and Rural areas(N=1718). Self-rating questionnaire included demographic data, Korean Spielberger State-Trait Anxiety Inventory, Korean Self-Rating Depression Scale(SDS), questions for internet-using pattern, Korean version of Internet Addiction Scale invented by K. S. Young, Internet Self-efficacy and Out-come Expectancy Scale. Results: In this study, prevalence of internet addiction was 2.9%. There was no significant difference found in prevalence of internet addiction among three areas. In all subjects, there were significant differences in anxiety, depression, internet self-efficacy and outcome expectancy, leisure style, places of internet use, internet connecting method, and insight on internee addiction. But, in addicted group, there was no significant difference among three areas. Conclusion: This study suggested that the difference in economic, cultural, and geographic state was not related to prevalence of internet addiction. Although there were significant differences in anxiety, depression, self-efficacy associated with internee use, leisure style, places of internet use, internet connecting method, insight on internet addiction among three areas, there were no significant difference in addicted group among three areas. So, we concluded that the difference in economic, cultural, and geographic state did not influence the prevalence of internet addiction, and despite the difference in economic, cultural, and geographic state, people in three areas were equally influenced by internet addiction.

  • PDF

A Fuzzy-based Network Intrusion Detection System Through sessionization (세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템)

  • Park, Ju-Gi;Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.127-135
    • /
    • 2007
  • As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security

  • PDF

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model

  • Luo, Yubo;Huang, Yongfeng;Li, Fufang;Chang, Chinchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4568-4584
    • /
    • 2016
  • Steganography based on text generation has become a hot research topic in recent years. However, current text-generation methods which generate texts of normal style have either semantic or syntactic flaws. Note that texts of special genre, such as poem, have much simpler language model, less grammar rules, and lower demand for naturalness. Motivated by this observation, in this paper, we propose a text steganography that utilizes Markov chain model to generate Ci-poetry, a classic Chinese poem style. Since all Ci poems have fixed tone patterns, the generation process is to select proper words based on a chosen tone pattern. Markov chain model can obtain a state transfer matrix which simulates the language model of Ci-poetry by learning from a given corpus. To begin with an initial word, we can hide secret message when we use the state transfer matrix to choose a next word, and iterating until the end of the whole Ci poem. Extensive experiments are conducted and both machine and human evaluation results show that our method can generate Ci-poetry with higher naturalness than former researches and achieve competitive embedding rate.

Recognition Model of Road Signs Using Image Segmentation Algorithm (세그멘테이션 알고리즘을 사용한 도로 Sign 인식 모델)

  • Huang, Ying;Song, Jeong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.233-237
    • /
    • 2013
  • Image recognition is an important research area of pattern recognition. This paper studies that the image segmentation algorithm theory and its application in road signs recognition system. In this paper We studied a systematic study for road signs and we have made the recognition algorithm. This paper is divided in image segmentation part and image recognition part for the road signs recognition. The experimental results show that the road signs recognition model can make effective use in smart phone system, and the model can be used in many other fields.

A Novel Architecture for Real-time Automated Intrusion Detection Fingerprinting using Honeypot

  • Siddiqui, Muhammad Shoaib;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1093-1095
    • /
    • 2007
  • As the networking and data communication technology is making progress, there has been an augmented concern about the security. Intrusion Detection and Prevention Systems have long being providing a reliable layer in the field of Network Security. Intrusion Detection System works on analyzing the traffic and finding a known intrusion or attack pattern in that traffic. But as the new technology provides betterment for the world of the Internet; it also provides new and efficient ways for hacker to intrude in the system. Hence, these patterns on which IDS & IPS work need to be updated. For detecting the power and knowledge of attackers we sometimes make use of Honey-pots. In this paper, we propose a Honey-pot architecture that automatically updates the Intrusion's Signature Knowledge Base of the IDS in a Network.

  • PDF

Real-Time Eye Tracking Using IR Stereo Camera for Indoor and Outdoor Environments

  • Lim, Sungsoo;Lee, Daeho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3965-3983
    • /
    • 2017
  • We propose a novel eye tracking method that can estimate 3D world coordinates using an infrared (IR) stereo camera for indoor and outdoor environments. This method first detects dark evidences such as eyes, eyebrows and mouths by fast multi-level thresholding. Among these evidences, eye pair evidences are detected by evidential reasoning and geometrical rules. For robust accuracy, two classifiers based on multiple layer perceptron (MLP) using gradient local binary patterns (GLBPs) verify whether the detected evidences are real eye pairs or not. Finally, the 3D world coordinates of detected eyes are calculated by region-based stereo matching. Compared with other eye detection methods, the proposed method can detect the eyes of people wearing sunglasses due to the use of the IR spectrum. Especially, when people are in dark environments such as driving at nighttime, driving in an indoor carpark, or passing through a tunnel, human eyes can be robustly detected because we use active IR illuminators. In the experimental results, it is shown that the proposed method can detect eye pairs with high performance in real-time under variable illumination conditions. Therefore, the proposed method can contribute to human-computer interactions (HCIs) and intelligent transportation systems (ITSs) applications such as gaze tracking, windshield head-up display and drowsiness detection.

Defining and Discovering Cardinalities of the Temporal Workcases from XES-based Workflow Logs

  • Yun, Jaeyoung;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.77-84
    • /
    • 2019
  • Workflow management system is a system that manages the workflow model which defines the process of work in reality. We can define the workflow process by sequencing jobs which is performed by the performers. Using the workflow management system, we can also analyze the flow of the process and revise it more efficiently. Many researches are focused on how to make the workflow process model more efficiently and manage it more easily. Recently, many researches use the workflow log files which are the execution history of the workflow process model performed by the workflow management system. Ourresearch group has many interests in making useful knowledge from the workflow event logs. In this paper we use XES log files because there are many data using this format. This papersuggests what are the cardinalities of the temporal workcases and how to get them from the workflow event logs. Cardinalities of the temporal workcases are the occurrence pattern of critical elements in the workflow process. We discover instance cardinalities, activity cardinalities and organizational resource cardinalities from several XES-based workflow event logs and visualize them. The instance cardinality defines the occurrence of the workflow process instances, the activity cardinality defines the occurrence of the activities and the organizational cardinality defines the occurrence of the organizational resources. From them, we expect to get many useful knowledge such as a patterns of the control flow of the process, frequently executed events, frequently working performer and etc. In further, we even expect to predict the original process model by only using the workflow event logs.

Content Protective Multi-Agent Platform for MsMu Service and Pattern-Based Content Management

  • Uhm, Yoon-Sik;Hwang, Zi-On;Lee, Min-Soo;Nah, Jae-Hoon;Song, Hwang-Jun;Park, Se-Hyun
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.665-675
    • /
    • 2010
  • Recent research on mobile Internet protocol television and digital right management (DRM) interconnections has focused on multimedia technologies designed to enhance content scalability and adaptive content distribution. However, due to the architectural and scalable limitations, recent systems are not flexible and securable with respect to their adaptive content distribution and protective policy management. Therefore, we propose a content protective multi-agent platform that provides secure multimedia services, correlation management, pattern-based management, and multi-source multi-use (MsMu)-based services. Our architecture, supported by DRM, lets us create a rich set of MsMu-based content protection and seamless multimedia services through the extension of one source multi-use (OsMu)-based content services. We have verified our platform, which provides scalable and securable services with a 17% lower service response time by using a testbed.

A Comparison of Internet Practices between U.S. and South Korean Firms from Value Chain Perspective (한.미 기업의 인터넷 활용 비교 연구: 가치사슬을 중심으로)

  • Lee, Seog-Jun;Nam, Kyung-Doo;Koh, Chang-E.
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.79-94
    • /
    • 2004
  • The Internet is now an ubiquitous technology in business and possesses the potential to make the concept of value chain into an attainable reality. We posit that the way the Internet is utilized, the extent of the Internet's impact on business performance, and the extent the firms are prepared to take advantage of the Internet varies from country to country and from industry to industry. Based on data collected from 54 firms in the U.S. and 135 in South Korea, we compared the two countries (U.S. and South Korea) and two major industry groups (manufacturing and service) regarding the pattern of Internet utilization on the Internet from a value chain perspective. The findings show that U.S. companies utilize the Internet more extensively in such areas as human resources management, automation, sales, and advertising than the South Korean counterparts. However, we did not find a statistically significant difference in the way the two countries use the Internet within a value chain model. We also compared Internet practices by industry sector (i.e., service vs. manufacturing) within each country. The results show that firms in the service sector tend to use the Internet more extensively than the manufacturing counterparts in both countries. Particularly in Korea the difference between the sectors was significant in the extent to which they utilized the Internet to support such business activities as inter-organizational alliance, communication, and marketing.