• Title/Summary/Keyword: web log

Search Result 295, Processing Time 0.034 seconds

Dynamic Recommendation System of Web Information Using Ensemble Support Vector Machine and Hybrid SOM (앙상블 Support Vector Machine과 하이브리드 SOM을 이용한 동적 웹 정보 추천 시스템)

  • Yoon, Kyung-Bae;Choi, Jun-Hyeog
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.433-438
    • /
    • 2003
  • Recently, some studies of a web-based information recommendation technique which provides users with the most necessary information through websites like a web-based shopping mall have been conducted vigorously. In most cases of web information recommendation techniques which rely on a user profile and a specific feedback from users, they require accurate and diverse profile information of users. However, in reality, it is quite difficult to acquire this related information. This paper is aimed to suggest an information prediction technique for a web information service without depending on the users'specific feedback and profile. To achieve this goal, this study is to design and implement a Dynamic Web Information Prediction System which can recommend the most useful and necessary information to users from a large volume of web data by designing and embodying Ensemble Support Vector Machine and hybrid SOM algorithm and eliminating the scarcity problem of web log data.

Personalizing Web Service Pages for Mobile Users (모바일 사용자를 위한 웹 서비스 페이지 개인화 기법)

  • Jeon Yeonghyo;Hwang Eejun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.69-80
    • /
    • 2005
  • Recent popularity of web-ready mobile devices such as PDA and cellphone has made mobile Internet access very popular. However, most of existing Web contents and services are optimized for desktop computing environment and not well suited for mobile devices. Considering different system features of mobile devices such as small display and limited input capability, an alternative scheme to access the Web efficiently is required. On the other hand, personalization plays an important role in the tailored access to the Web contents and services. In this paper, we propose a proxy- based personalization scheme of Web service pages for mobile users. For that purpose, in addition to log data. service related features of Web pages are considered for the correct identification of popular services. It automatically provides mobile users with the tailored list of Web services well suited for diverse mobile devices. Consequently, mobile users can utilize customized Web services with minimum navigation on the mobile devices with limited capability. In order to show its effectiveness, we have performed several experiments on the prototype system and reported some of the results.

Ecological Risk Assessment of Residual Petroleum Hydrocarbons using a Foodweb Bioaccumulation Model (먹이연쇄 생물축적 모형을 이용한 잔류유류오염물질의 생태위해성평가)

  • Hwang, Sang-Il;Kwon, Jung-Hwan
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.31 no.11
    • /
    • pp.947-956
    • /
    • 2009
  • Residual petroleum hydrocarbons after an oil spill may accumulate in the marine benthic ecosystem due to their high hydrophobicity. A lot of monitoring data are required for the estimation of ecosystem exposure to residual petrochemicals in an ecological risk assessment in the affected region. To save time and cost, the environmental exposure to them in the affected ecosystem can also be assessed using a simple food-web bioaccumulation model. In this study, we evaluated residual concentrations of four selected polycyclic aromatic hydrocarbons (phenanthrene, anthracene, pyrene, and benzo[a]pyrene) in a hypothetic benthic ecosystem composed of six species under two exposure scenarios. Body-residue concentration ranged 5~250 mg/kg body depending on trophic positions in an extreme scenario in which the aqueous concentrations of PAHs were assumed to be one-tenth of their aqueous solubility. In addition, bioconcentration factors (BCFs) and bioaccumulation factors (BAFs) were evaluated for model species. The logarithm of bioconcentration factor (log BCF) linearly increased with increasing the logarithm of 1-octanol-water partition coefficient (log $K_{OW}$) until log $K_{OW}$ of 7.0, followed by a gradual decrease with further increase in log $K_{OW}$ without metabolic degradation. Biomagnification became significant when log $K_{OW}$ of a pollutant exceeded 5.0 in the model ecosystem, indicating that investigation of food-web structure should be critical to predict biomagnifications in the affected ecosystem because log $K_{OW}$ values of many petrochemicals are higher than 5.0. Although further research is required for better site-specific evaluation of exposure, the model simulation can be used to estimate the level of the ecosystem exposure to residual oil contaminants at the screening level.

User Information Needs Analysis based on Query Log Big Data of the National Archives of Korea (국가기록원 질의로그 빅데이터 기반 이용자 정보요구 유형 분석)

  • Baek, Ji-yeon;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.4
    • /
    • pp.183-205
    • /
    • 2019
  • Among the various methods for identifying users's information needs, Log analysis methods can realistically reflect the users' actual search behavior and analyze the overall usage of most users. Based on the large quantity of query log big data obtained through the portal service of the National Archives of Korea, this study conducted an analysis by the information type and search result type in order to identify the users' information needs. The Query log used in analysis were based on 1,571,547 query data collected over a total of 141 months from 2007 to December 2018, when the National Archives of Korea provided search services via the web. Furthermore, based on the analysis results, improvement methods were proposed to improve user search satisfaction. The results of this study could actually be used to improve and upgrade the National Archives of Korea search service.

Trends of Search Behavior of Korean Web Users (국내 웹 이용자의 검색 행태 추이 분석)

  • Park Soyeon;Lee Joon Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.2
    • /
    • pp.147-160
    • /
    • 2005
  • This study examines trends of web query types and topics submitted to NAVER during one year period by analyzing query logs and click logs. There was a seasonal difference in the distribution of query types. Query type distribution was also different between weekdays and weekends, and between different days of the week. The log data show seasonal changes in terms of the topics of queries. Search topics seem to change between weekdays and weekends, and between different days of the week. However, there was little change in overall patterns of search behavior across one year. The implications for system designers and web content providers are discussed.

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

Development of a Personalized Recommendation Procedure Based on Data Mining Techniques for Internet Shopping Malls (인터넷 쇼핑몰을 위한 데이터마이닝 기반 개인별 상품추천방법론의 개발)

  • Kim, Jae-Kyeong;Ahn, Do-Hyun;Cho, Yoon-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.177-191
    • /
    • 2003
  • Recommender systems are a personalized information filtering technology to help customers find the products they would like to purchase. Collaborative filtering is the most successful recommendation technology. Web usage mining and clustering analysis are widely used in the recommendation field. In this paper, we propose several hybrid collaborative filtering-based recommender procedures to address the effect of web usage mining and cluster analysis. Through the experiment with real e-commerce data, it is found that collaborative filtering using web log data can perform recommendation tasks effectively, but using cluster analysis can perform efficiently.

  • PDF

A Log Analysis Study of an Online Catalog User Interface (온라인목록 사용자 인터페이스에 관한 연구 : 탐색실패요인을 중심으로)

  • 유재옥
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.2
    • /
    • pp.139-153
    • /
    • 2000
  • This article focuses on a transaction log analysis of the DISCOVER online catalog user interface at Duksung Women's University Library. The results show that the most preferred access point is the title field with rate of 59.2%. The least used access point is the author field with rate of 11.6%. Keyword searching covers only about 16% of all access points used. General failure rate of searching is 13.9% with the highest failure rate of 19.8% in the subject field and the lowest failure rate of 10.9% in author field.

  • PDF

Development of Macro Program Detection System using Access_log (Access_log를 활용한 매크로 프로그램 탐지 시스템 개발)

  • Kim, Jun-young;Kim, Kyu-rim;Park, Han-sol;An, Seung-hwan;Lee, Hyun-tak;Choi, Sang-Yong;Lee, Jong-Rak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.103-106
    • /
    • 2020
  • 매크로 프로그램에 의한 피해는 꾸준히 보고되어 왔다. 최근 코로나 19로 인해 마스크 품귀 현상이 발생하여 매크로 프로그램을 이용한 구매가 사회적 이슈로 떠오르면서 매크로에 대하여 법적 처벌을 하는 등 매크로에 대한 관심이 부각되고 있다. 본 논문에서는 매크로 프로그램을 효과적으로 탐지하기 위한 방법을 제안한다. 본 논문에서는 매크로 탐지를 위해 access.log의 다양한 필드를 분석하고, 이 중 매크로 식별에 효과가 있는 필드를 추출하여 매크로를 탐지한다. 제안하는 기술의 효과성 검증을 위해 매크로의 공통적인 기능이 포함된 매크로 프로그램을 직접 제작하고, 실제 구매 웹사이트와 유사한 판매 사이트를 제작하여 실험을 통해 제안하는 방법이 매크로를 효과적으로 탐지하는 것을 보인다.

  • PDF

Diagnostic Evaluation and Alternative Plans of Public Libraries in Taegu Metropolitan City (공공도서관의 진단적 평가와 대안모색 - 대구광역시를 중심으로 -)

  • Yoon, Hee-Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.34 no.2
    • /
    • pp.47-67
    • /
    • 2000
  • This study is to evaluate the performance and suggest alternative plans of the public libraries in Taegu Metropolitan City. Regression analysis is used to fit a log-log equation to the total budget-output for all the public libraries. The results of the performance evaluation confirm that there is diseconomies of scale in library operations(${\Sigma}b_n$ 3,732). Therefore, all the public libraries should be improve productivity by restructuring of library identity, rational selection of physical sites and new branch library planning, userbased budget allocation and collection development, staffing and reengineering, optimalization of web site, and enforcement of service functions, etc.

  • PDF