• Title/Summary/Keyword: the web

Search Result 18,190, Processing Time 0.038 seconds

An Educational Service Platform using Collective Intelligence and Presence of Web 2.0

  • Kim, Chang-Suk;Son, Dong-Cheul;Cho, Chung-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.115-121
    • /
    • 2009
  • Web 2.0 has become the face next generation Web among the business world and research community. Web 2.0 is instant superficial gratification of people. On the other hand, Semantic Web is deep, meaningful and lasting relationship with data. So, it is difficult to apply the Semantic Web to the real world. In this paper, a platform for educational services using the Semantic Web and Web 2.0 is proposed. The proposed platform is based mix of the Semantic Web and Web 2.0, so it is useful to apply in the real world applications. Two services are presented, one is a semantic email system and the other is a cyber study space. The cyber study space adjusted each student is presented. The study environment is called iStudySpace that has personal scheduler, study status plan table, personalized search engine and several gadgets. Finally characteristics and limitations of the Semantic Web and Web 2.0, the organization and components of the platform, evaluation of iStudySpace are shown.

Web Navigation Mining by Integrating Web Usage Data and Hyperlink Structures (웹 사용 데이타와 하이퍼링크 구조를 통합한 웹 네비게이션 마이닝)

  • Gu Heummo;Choi Joongmin
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.5
    • /
    • pp.416-427
    • /
    • 2005
  • Web navigation mining is a method of discovering Web navigation patterns by analyzing the Web access log data. However, it is admitted that the log data contains noisy information that leads to the incorrect recognition of user navigation path on the Web's hyperlink structure. As a result, previous Web navigation mining systems that exploited solely the log data have not shown good performance in discovering correct Web navigation patterns efficiently, mainly due to the complex pre-processing procedure. To resolve this problem, this paper proposes a technique of amalgamating the Web's hyperlink structure information with the Web access log data to discover navigation patterns correctly and efficiently. Our implemented Web navigation mining system called SPMiner produces a WebTree from the hyperlink structure of a Web site that is used trl eliminate the possible noises in the Web log data caused by the user's abnormal navigational activities. SPMiner remarkably reduces the pre-processing overhead by using the structure of the Web, and as a result, it could analyze the user's search patterns efficiently.

Implementation and Design of Proxy System for Web vulnerability Analysis (웹 취약점 분석을 위한 프락시 시스템의 설계 및 구현)

  • Kim, Gwang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.1011-1018
    • /
    • 2014
  • Because of the proliferation of web services through web site, web hacking attempts are increasing using vulnerabilities of the web application. In order to improve the security of web applications, we have to find vulnerabilities in web applications and then have to remove. This paper addresses a vulnerability in a web application on existing problems and analyze and propose solutions to the vulnerability. This paper have checked the stability of existing web security solutions and evaluated its suitability through analysis of vulnerability. Also, we have implemented the vulnerability analysis tools for web Proxy system and proposed methods to optimize for resolution of web vulnerabilities.

The Influence of Product-brand Web Sites on Attitudes toward Brand Image

  • Cho, Nam-Jae;Oh, Seung-Hee
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.3
    • /
    • pp.69-84
    • /
    • 2012
  • A web site focused on a specific product brand so called product-brand web site has become one major marketing tool as such product-brand web site provides chances for customers to experience the detailed information of the specific brand as well as emphatic the image of the brand. The purpose of this research is to examine the influence of the product-brand web site on the formation of attitude toward the product brand. Subjects of this study are users of two web sites of leading sanitary product brands. The result shows that not only emotion, playfulness and convenience perceived from the web site but also existing attitude toward the brand influence the attitude toward the web site. Further, the attitude toward the web site in turn affects attitude toward the image of the brand. The importance of this study is in its conceptualization and empirical verification of the relationship between the product-brand web site and the reputation of a brand.

Fuzzy Web Usage Mining for User Modeling

  • Jang, Jae-Sung;Jun, Sung-Hae;Oh, Kyung-Whan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.204-209
    • /
    • 2002
  • The interest of data mining in artificial intelligence with fuzzy logic has been increased. Data mining is a process of extracting desirable knowledge and interesting pattern ken large data set. Because of expansion of WWW, web data is more and more huge. Besides mining web contents and web structures, another important task for web mining is web usage mining which mines web log data to discover user access pattern. The goal of web usage mining in this paper is to find interesting user pattern in the web with user feedback. It is very important to find user's characteristic fer e-business environment. In Customer Relationship Management, recommending product and sending e-mail to user by extracted users characteristics are needed. Using our method, we extract user profile from the result of web usage mining. In this research, we concentrate on finding association rules and verify validity of them. The proposed procedure can integrate fuzzy set concept and association rule. Fuzzy association rule uses given server log file and performs several preprocessing tasks. Extracted transaction files are used to find rules by fuzzy web usage mining. To verify the validity of user's feedback, the web log data from our laboratory web server.

A Computational Analysis of Air Entrainment with a Nip Roller

  • Lee, Jae-Yong;Chang, Young-Bae;Shelton, John J.
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2002.11a
    • /
    • pp.81-90
    • /
    • 2002
  • Air entrainment of a winding roll with a nip roller was studied numerically. The amount of air entrainment between two rotating rollers was obtained by solving lubrication equation, Reynolds equation, which neglect the existence of a web. However, the numerical model of this study included the web existence, therefore it considered the two lubricating air films between a winding roll and a web and also between a nip roller and the web. The pressure profiles and gap profiles of the two films were obtained by solving lubrication equation for the two air films and force balance equation of the web. Ballooning phenomenon was examined in terms of nip force, wrap angle, web stiffness, web speed, and web tension. This ballooning phenomenon caused by the back flow of the air film blocked by the nip roller. Air entrainment of the two numerical models was compared.

  • PDF

Development of A Linux WebDAV Client Supporting Effective Distributed Authoring (효과적인 분산저작을 지원하는 리눅스 WebDAV 클라이언트의 개발)

  • Shin Won-Joon;Ahn Geon-Tae;Jung Hye-Young;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.511-520
    • /
    • 2006
  • WebDAV is a protocol which supports web-based distributed authoring and versioning, providing a standard infrastructure for asynchronous collaboration on various contents through the Internet. Current WebDAV-enabled authoring applications that support WebDAV, such as Microsoft office, Photoshop, or Dreamweaver, work by integrating WebDAV capabilities into the application. While this approach provides solid support for collaborative authoring, it has a drawback that each of the applications needs to support WebDAV capabilities in its own way. We developed a WebDAV client named DAView running on Linux KDE, which enables WebDAV-unaware authoring tools to have effective remote authoring capabilities. DAView provides a GUI view of a WebDAV server, similar to existing WebDAV-enabled file managers such as DAVExplorer. Unique among WebDAV file managers, it also provides the ability to launch the authoring application associated to a WebDAV server resource, automatically managing the locks on the resource.

Natural Language Query Framework on the Semantic Web

  • Kim, Jin-Sung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.04a
    • /
    • pp.189-192
    • /
    • 2007
  • This study proposes a Natural Language Query Framework (NLQF) on the semantic web to support the intelligent deduction at semantic level. A large number of former researches are focused on the knowledge representation on the semantic web. However, to revitalize the intelligent agent (IA)-based automated e-business contract with human customers, there is a need for semantic level approach to the web information. To enable accessing web information at semantic level, this paper discusses the pattern of complex natural language processing at first, and then the semantic web-based natural language inference in e-business environment. The NL-based approach could help the IAs on the web to communicate with customers and other IAs with more natural interface than traditional HTML-based web information. Therefore, our proposed NLQF will be used in semantic web-based intelligent e-business contracts between customers and IAs.

  • PDF

Mashup Application for Geo-spatial Feature Generation on Web Browser using Google Maps API

  • Park, Yong-Jae;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.5
    • /
    • pp.389-396
    • /
    • 2008
  • In these days, various kinds of web applications based on web 2.0 paradigm have been developed. In web 2.0 paradigm pursuing participation, sharing, and openness on the web-as-platform, web mapping or web GIS application are regarded as top most applications, so that web applications, handling geo-spatial contents, with user-interaction interface and search engine of high performance have been provided for both public users and expert users in the special domains. Public and industrial needs for web mapping mashup application by open API, linked with the practical web computing technologies, are gradually increasing. In this study, a user interface in mashup for geo-spatial feature generation was implemented by using mainly Google maps API. Spatial database resources in this implementation are those of Google mapping server. As the results, public users on web client can create their own geo-spatial data sets in web vector formats, without the help of any GIS tools or access to proprietary databases. It is concluded that web-based mashup application in client-side using open API can be used as an alternative for geo-browsing system or portable feature generation system.

Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data (통합 이벤트 로그 기반 웹 공격 탐지 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.73-86
    • /
    • 2010
  • In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.