• Title/Summary/Keyword: user profiling

Search Result 56, Processing Time 0.034 seconds

An Analysis on High School Teacher's Stages of Concern on 'Creative-Experience Activity' in 2009 Revised National Curriculum (2009 개정 창의적 체험활동에 관한 고등학교 교사들의 관심도 분석)

  • Park, Han-Sook
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.4
    • /
    • pp.958-972
    • /
    • 2013
  • The purpose of this study is to analyze on high school teachers' stage of concern(SoC) on 'Creative-Experience Activity' in 2009 revised national curriculum and investigate the improvements of their levels. The subjects for this study were 234 high school teachers through out all part of the Korea country. The instrument for this study was developed according to the Hall & Hord(2006)'s stage of concerns questionnaire of Stage of Concern. The Data were analyzed by Profiling of teachers' concern and one-way ANOVA. The major findings of this study were as follows: First, 85.25% of the high school teachers were in stage of Awareness. 6.34% of teachers were in stage of Information. Most of high school teachers' concern about 'Creative-Experience Activity' was generally 'non-user' stage that unconcerned. Second, there were not significant differences in teachers' stage of concern according to their sex and teaching career except for region. In region, the teacher in metropolis tent to interest getting new information than small and midium size city. We need to make an effort to transfer from 'non-user' stage to 'early-user' stage of and 'impact' stage. To do so, we may sublate too much curriculum revise and start teacher training for 2009 revised 'creativity-experience activity' curriculum. The result of the study provide that there are not curriculum implementation success without teachers' concern about revised curriculum.

Optimized Multi Agent Personalized Search Engine

  • DishaVerma;Barjesh Kochar;Y. S. Shishodia
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.150-156
    • /
    • 2024
  • With the advent of personalized search engines, a myriad of approaches came into practice. With social media emergence the personalization was extended to different level. The main reason for this preference of personalized engine over traditional search was need of accurate and precise results. Due to paucity of time and patience users didn't want to surf several pages to find the result that suits them most. Personalized search engines could solve this problem effectively by understanding user through profiles and histories and thus diminishing uncertainty and ambiguity. But since several layers of personalization were added to basic search, the response time and resource requirement (for profile storage) increased manifold. So it's time to focus on optimizing the layered architectures of personalization. The paper presents a layout of the multi agent based personalized search engine that works on histories and profiles. Further to store the huge amount of data, distributed database is used at its core, so high availability, scaling, and geographic distribution are built in and easy to use. Initially results are retrieved using traditional search engine, after applying layer of personalization the results are provided to user. MongoDB is used to store profiles in flexible form thus improving the performance of the engine. Further Weighted Sum model is used to rank the pages in personalization layer.

Clustering Normal User Behavior for Anomaly Intrusion Detection (비정상행위 탐지를 위한 사용자 정상행위 클러스터링 기법)

  • Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.857-866
    • /
    • 2003
  • For detecting an intrusion based on the anomaly of a user's activities, previous works are concentrated on statistical techniques in order to analyze an audit data set. However. since they mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In this paper, a new clustering algorithm for modeling the normal pattern of a user's activities is proposed. Since clustering can identify an arbitrary number of dense ranges in an analysis domain, it can eliminate the inaccuracy caused by statistical analysis. Also, clustering can be used to model common knowledge occurring frequently in a set of transactions. Consequently, the common activities of a user can be found more accurately. The common knowledge is represented by the occurrence frequency of similar data objects by the unit of a transaction as veil as the common repetitive ratio of similar data objects in each transaction. Furthermore, the proposed method also addresses how to maintain identified common knowledge as a concise profile. As a result, the profile can be used to detect any anomalous behavior In an online transaction.

Who are Tweeting Research Articles and Why?

  • Htoo, Tint Hla Hla;Na, Jin-Cheon
    • Journal of Information Science Theory and Practice
    • /
    • v.5 no.3
    • /
    • pp.48-60
    • /
    • 2017
  • The purpose of this paper is to understand the profiles of users and their motivations in sharing research articles on Twitter. The goal is to contribute to the understanding of Twitter as a new altmetric measure for assessing impact of research articles. In this paper, we extended the previous study of tweet motivations by finding out the profiles of twitter users. In particular, we examined six characteristics of users: gender, geographic distribution, academic, non-academic, individual, and organization. Out of several, we would like to highlight here three key findings. First, a great majority of users (86%) were from North America and Europe indicating the possibility that, if in general, tweets for research articles are mainly in English, Twitter as an alternative metric has a Western bias. Second, several previous altmetrics studies suggested that tweets, and altmetrics in general, do not indicate scholarly impact due to their low correlation with citation counts. This study provides further details in this aspect by revealing that most tweets (77%) were by individual users, 67% of whom were nonacademic. Therefore, tweets mostly reflect impact of research articles on the general public, rather than on academia. Finally, analysis from profiles and motivations showed that the majority of tweets (from 42% to 57%) in all user types highlighted the summary or findings of the article indicating that tweets are a new way of communicating research findings.

An Efficient Secure Dissemination of XML data in Peer-to-Peer Networks (Peer-to-Peer 네트워크 상에서 XML 데이터의 효율적이고 안전한 배포 방식에 관한 연구)

  • Ko, Hyuk-Jin;Kang, Woo-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.3
    • /
    • pp.528-534
    • /
    • 2007
  • As XML is becoming a standard for representation and exchange of abundant information on the Web, solutions for a secure and selective dissemination of XML data, known as SDI, are strongly demanded. Such trends are more outstanding especially in distributed heterogeneous environment such as Peer-to-Peer. Although many approaches have been proposed to provide secure and efficient SDI mechanisms, almost previous approaches have focused only on filtering with user profile and they adopt center-oriented administration approaches. It is therefore difficult to adapt them directly to the distributed Peer-to-Peer environments characterized by dynamic participation. In this paper, we develop a novel dissemination method, which makesuse of authorization policy and secret sharing scheme. It provides more secure, scalable means for XML dissemination on Peer-to-Peer networks.

  • PDF

User Behavior Profiling based on Continuous Data Mining (TV-Anytime 메타데이터 연속 데이터 마이닝을 이용한 시청 선호도 프로파일 생성 기법)

  • Shin Se-Jung;Lee Won-Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.403-406
    • /
    • 2006
  • 최근 시작된 국내 디지털 지상파 방송으로 이제 본격적인 디지털 방송 시대가 열리게 되었다. 디지털 방송 서비스는 다매체, 다채널을 통한 방송 프로그램의 증가와 양방향 TV 방송 서비스로 인해 사용자에게 다양한 방송 프로그램의 선택과 개인별 맞춤형 시청 기회를 제공함으로써 새로운 방송 서비스 환경을 필요로 하게 되었다. 이에 본 논문에서는 맞춤형 DTV(Digital TV) 방송 서비스를 제공하기 위하여 TV-Anytime 영상 메타데이터에 대한 연속 데이터 마이닝 기법을 이용하여 시청 선호도 프로파일을 생성하는 효율적인 기법을 제안한다. 또한, 내장형 운영체제 기반의 사용자 디스플레이 모듈을 제공하며, 실험을 통하여 본 논문에서 제안하는 방법의 효율성을 고증한다.

  • PDF

An Agent System for Automatic Generation of Personalizing E-mail using User Profiling (평가 이벤트를 이용한 취약 단원 학습 스케쥴링 시스템)

  • 이종희;김태석;이근왕
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.802-806
    • /
    • 2002
  • 최근에 웹 기반 교육 시스템으로서 다양한 온라인 학습에 대한 새로운 교수 모형이 제시되고 있다. 또한, 학습자의 요구에 맞는 코스웨어의 주문이 증가되고 있는 추세이며 그에 따라 웹 기반 교육 시스템에 효율적이고 자동화된 교육 에이전트의 필요성이 인식되고 있다. 그러나 현재 연구되고 있는 많은 교육 시스템들은 학습자 성향에 맞는 코스를 적절히 서비스해 주지 못할 뿐 아니라 지속적인 피드백과 학습자가 코스를 학습함에 있어서 취약한 부분을 재학습 할 수 있도록 도와주는 서비스를 원활히 제공하지 못하고 있다. 본 논문에서는 취약성 분석 알고리즘을 이용한 학습자 중심의 코스 스케쥴링 멀티 에이전트 시스템을 제안한다. 제안한 시스템은 먼저 학습자의 학습을 지속적으로 모니터링하고 평가하여 개인 학습자의 학습 성취도를 계산하며, 이 성취도를 에이전트의 스케쥴에 적용하여 학습자에게 적합한 코스를 제공하고, 학습자는 이러한 코스에 따라 능력에 맞는 반복된 학습을 통하여 적극적인 완전학습을 수행하게 된다.

  • PDF

An Agent System for Automatic Generation of Personalizing E-mail using User Profiling (사용자 프로파일링을 이용한 개인화 이메일 자동 생성 에이전트 시스템)

  • 이광형;김정재;이종희;이기성;오해석
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.1099-1103
    • /
    • 2002
  • 인터넷의 급속한 발전으로 매우 많은 정보와 다양한 컨텐츠가 개인 사용자들에게 제공되고 있다. 또한, 개인을 고객으로 하는 각종 포탈 사이트들이 많이 생성됨에 따라 고객 개인을 위한 고객화된 정보가 매우 중요한 하나의 컨텐츠로 작용하고 있다. 하지만, 현재 국내외 전자상거래를 주목적으로 하는 포탈 사이트의 시스템들은 고객에 관한 정보를 단순한 개인 프로파일로 활용하고 있을 뿐 고객 정보를 이용하여 더 많은 개인화된 새로운 정보를 창출하지 못하고 있다. 본 논문은 고객에 대한 정보를 세분화하고 분석하여 제3의 개인화 정보를 생성하여 자동으로 각 개별 고객에게 개인화된 정보를 제공해 줄 수 있는 시스템을 설계 및 구현하고자 한다. 고객의 이메일 오픈율과 마우스 이벤트 정보를 분석 및 계산하여 개별 고객에게 고객의 관심정보 및 관심 컴포넌트를 생성한 후 관심정보와 관심 컴포넌트를 이용하여 개별 고객의 관심 정보를 고객이 선호하는 이메일 규격 및 양식에 맞게 에이전트를 통해 자동으로 재구성하여 푸쉬해 주는 개인화 메일 자동 생성 에이전트 시스템을 개발하고자 함이 본 논문의 목적이다.

  • PDF

Design and Implementation of Security Integration Framework for Secure Mobile RFID Service Network (안전한 모바일 RFID 서비스 네트워크를 위한 보안 통합 프레임워크의 설계 및 구현)

  • Park, Nam-Je;Chung, Kyo-Il
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.63-64
    • /
    • 2008
  • The mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID services which complies with the Korea's mobile RFID forum standard.

  • PDF

Real-time Tracking and Identification for Multi-Camera Surveillance System

  • Hong, Yo-Hoon;Song, Seung June;Rho, Jungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.16-22
    • /
    • 2018
  • This paper presents a solution for personal profiling system based on user-oriented tracking. Here, we introduce a new way to identify and track humans by using two types of cameras: dome and face camera. Dome camera has a wide view angle so that it is suitable for tracking human movement in large area. However, it is difficult to identify a person only by using dome camera because it only sees the target from above. Thus, face camera is employed to obtain facial information for identifying a person. In addition, we also propose a new mechanism to locate human on targeted location by using grid-cell system. These result in a system which has the capability of maintaining human identity and tracking human activity (movement) effectively.