• Title/Summary/Keyword: web log

Search Result 294, Processing Time 0.028 seconds

A XML/EDI System for Maritime Export Customs Clearance

  • Kim, Hyun S.;Park, Nam K.;Hyung R. Chol
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.45-49
    • /
    • 2001
  • Korean government and companies have given a lot of their efforts to exchange electronic documents between themselves and their partners. As the results of them. Korean EDI standards were made by Korean EDIFACT Committee and the standards have been used by companies and governmental organization in Korea. However, Korean export customs clearance EDI system is based on VAN(Value Added Network) and one VAN company ha monopolistic right to relay EDI documents to Korean Customs Service. Therefor is leads to a lot of problems such as inconvenient software, expensive transmission fee and the difficulty of connection with the in-house systems of user companies. To solve these problems, a few good solutions and systems have been suggested and one of them is the Internet EDI. we will suggest a new export customs clearance EDI system running on the Web. This system is basically an Internet EDI system, but we have developed this system using XML instead of HTML, XML is a new markup language with merit such as isolating data from style of documents. This system consists of 7 modules, schema/style/template management, XML/EDI document management, XML/EDI transformation, EDI transmission, certification management and log management. Also this system can be used with other traditional EDI systems that have UN/EDIFACT standards. We will discuss the advantages and disadvantages of XML/EDI system for customs clearance. The development of this system will be a leading study for XML/EDI standards in export clearance EDI system.

  • PDF

Exploring Online Learning Profiles of In-service Teachers in a Professional Development Course

  • PARK, Yujin;SUNG, Jihyun;CHO, Young Hoan
    • Educational Technology International
    • /
    • v.18 no.2
    • /
    • pp.193-213
    • /
    • 2017
  • This study aimed to explore online learning profiles of in-service teachers in South Korea, focusing on video lecture and discussion activities. A total of 269 teachers took an online professional development course for 14 days, using an online learning platform from which web log data were collected. The data showed the frequency of participation and the initial participation time, which was closely related to procrastinating behaviors. A cluster analysis revealed three online learning profiles of in-service teachers: procrastinating (n=42), passive interaction (n=136), and active learning (n=91) clusters. The active learning cluster showed high-level participation in both video lecture and discussion activities from the beginning of the online course, whereas the procrastinating cluster was seldom engaged in learning activities for the first half of the learning period. The passive interaction cluster was actively engaged in watching video lectures from the beginning of the online course but passively participated in discussion activities. As a result, the active learning cluster outperformed the passive interaction cluster in learning achievements. The findings were discussed in regard to how to improve online learning environments through considering online learning profiles of in-service teachers.

Study on Recognizing User Intention Using User Behavior State Transition Model (사용자 행동 상태 전이 모델을 이용한 사용자 의도 파악 방법 연구)

  • Jung, Hanmin;Lee, Hyejin;Lee, Seok-Hyoung;Choi, Heeseok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.123-125
    • /
    • 2020
  • 정보 서비스를 포함한 웹 서비스에서 사용자 의도를 파악하는 것은 해당 사용자에게 맞춤형 서비스를 제공하기 위한 중요한 단서가 된다. 본 연구는 과학기술 대표 정보 서비스인 ScienceON에 맞춤형 서비스를 도입하기 위해 사용자가 해당 서비스를 사용하는 과정에서 발생시키는 사용자-서비스 간 상호작용인 사용자 행동을 분석하고 사용자 의도를 파악하여 동적으로 맞춤형 서비스를 제공하는 방식을 제안한다. 특히, 사용자 행동 상태 전이 모델을 도입하여 사용자가 반복적으로 행하는 검색 행동과 내비게이션 행동을 추적하고 의도를 파악할 수 있도록 한다. 288,200 건의 웹 로그 분석을 통해 만들어진 상태 전이 모델과 특정 사용자 로그를 분석하여 본 연구가 어떻게 사용자 의도를 파악할 수 있는 지를 보여준다.

  • PDF

A Study on the Usage Behavior of Public Library Website through an Analysis of Web Traffic (웹 트래픽 분석을 통한 공공도서관 웹사이트 이용행태에 관한 연구)

  • Kang, Munsil;Kim, Seonghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.4
    • /
    • pp.189-212
    • /
    • 2021
  • The purpose of this study is to analyze an usage behavior for the public library website through web traffic. For this purpose, using Google Analytics and growth hacking technique, the data of A public library website log was analyzed for three months from August 1, 2021 to October 31, 2021. As a result of the study, the young age group of 18-24 years old and 25-34 years old recorded a high rate of new member registration, & it was found that the inflow rate through SNS was high for external inflows. As a result of analysis for the access rate by time, it was found that the time with the highest inflow rate was between 10 am and 11 am both on Wednesday and Friday. As a access channel, the access rate using mobile (64.90%) was quite high, but at the same time, the bounce rate (27.20%) was higher than the average (24.93%), & the rate of duration time (4 minutes 33 seconds) was lower than thee average (5 minutes 22 seconds). Finally, it was found that the utilization rate of reading program events and online book curation service, which the library focuses on producing and promoting, is very low. These research results can be used as basic data for future improvement of public library websites.

A Study on the Interface between DAS and SCADA by using Direct Method (직접연계방법에 의한 DAS-SCADA 연계 연구)

  • Park, So-Young;Shin, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1154-1163
    • /
    • 2008
  • DAS and SCADA system are main systems, which operate and manage the power system by using computer and communication technology. But DAS and SCADA have been operated independently in Korea, so there was some time delay in the fault handling and live-line work. To improve that problems, studies on the interface between DAS and SCADA have been needed. From November 2005 to December 2007, the pilot project has been performed in KEPCO's branch offices, as a result, direct method will be applied widely all over the country until 2010 because the operation information of substation users want can be transmitted fast and it is possible to control 43RC directly although the expense for direct method is about 1.3 times larger than that for web method. To improve problems revealed during the pilot project, substation object to object communication method is proposed and interface database automatic generation and interface system diagnosis and logging functions are developed. Interface data point and communication data type are defined, substation single line diagram automatic generation or manual editing function, SCADA monitoring and controlling function, log data managing function are developed in SCADA HMI program. It is expecting to reduce the average time for each outage about 33% and to improve the reliability, efficiency of operation, execution of DAS from automatic load transfer under a fault, and to contribute to export project.

Demand Estimation of Car-sharing Service Using Web-site Reservation Requesting Log Data (웹사이트 조회이력자료를 활용한 카셰어링 수요 추정 및 분석)

  • Kwon, Ohyeon;Choi, Yoon-Young;Byun, Wan-Hee;Lee, Chungwon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.4
    • /
    • pp.10-17
    • /
    • 2015
  • Currently, there are increasing demand for researches on the development of car-sharing operating strategy. In order to carry out the research, demand for car-sharing is required. However, since previous researches only adopted performance data or demand derived from several assumptions, spilled demand has been spotted due to lack of available cars. For this reason, we plan to suggest the way to estimate the value including spilled demand which has been spotted previously based on the record of utilization on the website of operating company, actual company providing car-sharing service. In the case of 'LH Happycar Service', difference between estimated demand and record of utilization is about twice the difference between estimated demand and record of inquiry. Especially, it is found that service rate does not go above once it reaches to its maximum rate because it cannot satisfy additional demands. In short, when we evaluate the demand for individual station based on the record of utilization only, it would be possible to underestimate the demand especially for the station at full capacity.

Test-Driven Development Adoption influence to User Satisfaction on OpenSource Project development (오픈소스 프로젝트의 테스트 주도 개발 채택여부가 사용자만족도에 미치는 영향에 관한 연구)

  • Sohn, Hyo-jung;Lee, Min-gyu;Seong, Baek-min;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1075-1078
    • /
    • 2015
  • Three kinds of typical practices to reflect the values of Agile Development Methodology were selected from a previous study. Those were Communicate using Web 2.0 collaboration tools, test-driven development (TDD, Test-Driven Development) method is adopted, and refactoring. In this study, we set up a hypothesis that the adoption of TDD project will make user satisfaction is higher. Select 100 sample projects from SourceForge(sourceforge.net), the most popular open source hosting site, the criteria is we can be determined whether operate in the project (developer least 7 people, bugs can occur more than 100, created the project since 2000). To determine whether the use of automated development tools xUnit of TDD through the CVS and SVN log analysis. Using data from the FLOSSmole and to evaluate the user experience of the project. User satisfaction of each project Rating, bug fix cycle, downloads and pageviews. Through this study, correlates of whether TDD adoption and user satisfaction, we will suggest a reflected the Agile practices new open source development methodology. As a result, it contributes to increase the maturity of the open source community.

  • PDF

The Technique of Reference-based Journal Recommendation Using Information of Digital Journal Subscriptions and Usage Logs (전자 저널 구독 정보 및 웹 이용 로그를 활용한 참고문헌 기반 저널 추천 기법)

  • Lee, Hae-sung;Kim, Soon-young;Kim, Jay-hoon;Kim, Jeong-hwan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.75-87
    • /
    • 2016
  • With the exploration of digital academic information, it is certainly required to develop more effective academic contents recommender system in order to accommodate increasing needs for accessing more personalized academic contents. Considering historical usage data, the academic content recommender system recommends personalized academic contents which corresponds with each user's preference. So, the academic content recommender system effectively increases not only the accessibility but also usability of digital academic contents. In this paper, we propose the new journal recommendation technique based on information of journal subscription and web usage logs in order to properly recommend more personalized academic contents. Our proposed recommendation method predicts user's preference with the institution similarity, the journal similarity and journal importance based on citation relationship data of references and finally compose institute-oriented recommendations. Also, we develop a recommender system prototype. Our developed recommender system efficiently collects usage logs from distributed web sites and processes collected data which are proper to be used in proposed recommender technique. We conduct compare performance analysis between existing recommender techniques. Through the performance analysis, we know that our proposed technique is superior to existing recommender methods.

Development of Sorption Database (KAERI-SDB) for the Safety Assessment of Radioactive Waste Disposal (방사성폐기물 처분안전성 평가 자료 제공을 위한 핵종 수착 데이터베이스(KAERI-SDB) 개발)

  • Lee, Jae-Kwang;Baik, Min-Hoon;Jeong, Jongtae
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.11 no.1
    • /
    • pp.41-54
    • /
    • 2013
  • Radionuclide sorption data is necessary for the safety assessment of radioactive waste disposal. However the use of sorption database is often limited due to the accessability. A web-based sorption database program named KAERI-SDB has been developed to provide information on the sorption of radionuclides onto geological media as a function of geochemical conditions. The development of KAERI-SDB was achieved by improving the performance of pre-existing sorption database program (SDB-21C) developed in 1998 and considering user's requirements. KAERI-SDB is designed that users can access it by using a web browser. Main functions of KAERI-SDB include (1) log-in/member join, (2) search and store of sorption data, and (3) chart expression of search results. It is expected that KAERI-SDB could be widely utilized in the safety assessment of radioactive waste disposal by enhancing the accessibility to users who wants to use sorption data. Moreover, KAERI-SDB opened to public would also improve the reliability and public acceptance on the radioactive waste disposal programs.

Counter Measures by using Execution Plan Analysis against SQL Injection Attacks (실행계획 분석을 이용한 SQL Injection 공격 대응방안)

  • Ha, Man-Seok;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.76-86
    • /
    • 2016
  • SQL Injection attacks are the most widely used and also they are considered one of the oldest traditional hacking techniques. SQL Injection attacks are getting quite complicated and they perform a high portion among web hacking. The big data environments in the future will be widely used resulting in many devices and sensors will be connected to the internet and the amount of data that flows among devices will be highly increased. The scale of damage caused by SQL Injection attacks would be even greater in the future. Besides, creating security solutions against SQL Injection attacks are high costs and time-consuming. In order to prevent SQL Injection attacks, we have to operate quickly and accurately according to this data analysis techniques. We utilized data analytics and machine learning techniques to defend against SQL Injection attacks and analyzed the execution plan of the SQL command input if there are abnormal patterns through checking the web log files. Herein, we propose a way to distinguish between normal and abnormal SQL commands. We have analyzed the value entered by the user in real time using the automated SQL Injection attacks tools. We have proved that it is possible to ensure an effective defense through analyzing the execution plan of the SQL command.