• Title/Summary/Keyword: web-application

Search Result 2,638, Processing Time 0.028 seconds

Optimal dwelling time prediction for package tour using K-nearest neighbor classification algorithm

  • Aria Bisma Wahyutama;Mintae Hwang
    • ETRI Journal
    • /
    • v.46 no.3
    • /
    • pp.473-484
    • /
    • 2024
  • We introduce a machine learning-based web application to help travel agents plan a package tour schedule. K-nearest neighbor (KNN) classification predicts the optimal tourists' dwelling time based on a variety of information to automatically generate a convenient tour schedule. A database collected in collaboration with an established travel agency is fed into the KNN algorithm implemented in the Python language, and the predicted dwelling times are sent to the web application via a RESTful application programming interface provided by the Flask framework. The web application displays a page in which the agents can configure the initial data and predict the optimal dwelling time and automatically update the tour schedule. After conducting a performance evaluation by simulating a scenario on a computer running the Windows operating system, the average response time was 1.762 s, and the prediction consistency was 100% over 100 iterations.

A Clustering Algorithm Considering Structural Relationships of Web Contents

  • Kang Hyuncheol;Han Sang-Tae;Sun Young-Su
    • Communications for Statistical Applications and Methods
    • /
    • v.12 no.1
    • /
    • pp.191-197
    • /
    • 2005
  • Application of data mining techniques to the world wide web, referred to as web mining, has been the focus of several recent researches. With the explosive growth of information sources available on the world wide web, it has become increasingly necessary to track and analyze their usage patterns. In this study, we introduce a process of pre-processing and cluster analysis on web log data and suggest a distance measure considering the structural relationships between web contents. Also, we illustrate some real examples of cluster analysis for web log data and look into practical application of web usage mining for eCRM.

Automatic Generation of Voice Web Pages Based on SALT (SALT 기반 음성 웹 페이지의 자동 생성)

  • Ko, You-Jung;Kim, Yoon-Joong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.3
    • /
    • pp.177-184
    • /
    • 2010
  • As a voice browser is introduced, voice dialog application becomes available on the Web environment. The voice dialog application consists of voice Web pages that need to translate the dialog scripts into SALT(Speech Application Language Tags). The current Web pages have been designed for visual. They, however, are potentially capable of using voice dialog. This paper, therefore, proposes an automated voice Web generation method that finds the elements for voice dialog from Web pages based HTML and converts them into SALT. The automatic generation system of a voice Web page consists of a lexical analyzer and a syntactic analyzer that converts a Web page which is described in HTML to voice Web page which is described in HTML+SALT. The converted voice Web page is designed to be able to handle not only the current mouse and keyboard input but also voice dialog.

A Study on Real-Time Web-Server Intrusion Detection using Web-Server Agent (웹 서버 전용 에이전트를 이용한 실시간 웹 서버 침입탐지에 관한 연구)

  • 진홍태;박종서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.17-25
    • /
    • 2004
  • As Internet and Internet users are rapidly increasing and getting popularized in the world the existing firewall has limitations to detect attacks which exploit vulnerability of web server. And these attacks are increasing. Most of all, intrusions using web application's programming error are occupying for the most part. In this paper, we introduced real-time web-server agent which analyze web-server based log and detect web-based attacks after the analysis of the web-application's vulnerability. We propose the method using real-time agent which remove Process ID(pid) and block out attacker's If if it detects the intrusion through the decision stage after judging attack types and patterns.

  • PDF

Web application firewall technology trends and testing methodology (웹방화벽 기술동향 파악 및 시험방법론)

  • Jo, In-june;Kim, Sun-young;Kim, Chan-joong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.132-138
    • /
    • 2012
  • Existing network layer firewall security support is one that does not support the higher layer, the application layer of a vulnerable web application security. Under these circumstances, the vulnerability of web applications to be able to defend a Web Application Firewall is positioned as a solver to solve the important security issues of businesses spotlighted in the next generation of security systems, and a very active market in the market other than domestic is expected to be formed. However, Firewall Web has not yet proposed a standard which can be used to test the performance of the Web Application Firewall Web Application Firewall and select the products of trust hardly Companies in BMT conduct their own individual problems and the cost of performance testing technologies, there is a limit. In this study, practically usable BMT model was developed to evaluate the firewall vendor. Product ratings ISO / IEC 9126, eight product characteristics meet the performance and characteristics of a web application firewall entries are derived. This can relieve the burden on the need to be evaluated in its performance testing of Web firewall, and can enhance the competitiveness of domestic-related sectors, by restoring confidence in the product can reduce the dependence on foreign products.

  • PDF

The Web Application of Integrated Sasang Constitutional Diagnosis β-version (통합 체질진단 툴 β-version의 웹기반 응용프로그램)

  • Jin, Hee-Jeong;Kim, Jang-Woong;Kim, Young-Su;Lee, Si-Woo;Jang, Eun-Su
    • Journal of Sasang Constitutional Medicine
    • /
    • v.24 no.1
    • /
    • pp.13-20
    • /
    • 2012
  • 1. Objectives : It is very important to classify people into Sasang constitution correctly in SCM. There have been many researches for this and several tools have been developed for diagnosis of Sasang constitution. In our study, we introduce a new web application for Integrated Sasang Constitutional Diagnosis (ISCD) ${\beta}$-version and algorithm on the base of face, body shape, voice and questionnaire. 2. Development : The web application of ISCD ${\beta}$-version was designed to be used easily for subject, staffs, and oriental medical doctors. For this purpose, we developed a web-application of Integrated Sasang Constitutional Diagnosis ${\beta}$-version using mysql database, tomcat web system, JSP, JAVA, and C++ languages. 3. Current State : The ISCD ${\beta}$-version could be accessed at http://210.218.196.115/SDT/login.jsp. The ISCD ${\beta}$-version consisted of 3 parts, for staffs, subject and oriental medical doctors. The system has been managed since February 2011. Currently 7 oriental hospitals have used the system and 1,439 subjects have been diagnosed by the system. 4. Conclusion and future work : Although many researchers have tried to develop a system or an algorithm for diagnosis of subject's constitution, we could have not used the system based on objective information of human body type, characters, symptoms. In this study, we describe a web application of objective diagnosis algorithm as ISCD ${\beta}$-version. This system may help an oriental medical doctors to make a decision of Sasang constitutional diagnosis easily and correctly.

Implementation of Accessibility and Usability Enhancement Scheme for a WebRTC VC Application (WebRTC VC응용의 접근성 및 편의성 향상기술 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1478-1486
    • /
    • 2016
  • This paper introduces technical methods to improve the accessibility and usability of a WebRTC video conference (VC) application. Simplified login is essential, by applying such as single sign-on (SSO) to improve the accessibility of VC applications. High usability and manageability are also necessary to attract more users, enhance user experiences, and save service management cost. The proposed VC application leverages SAML-based federated identity management (FIM) to enable higher service accessibility. Users can access the application with their organizational ID and SSO authentication. The FIM eases user ID management and indirectly strengthens privacy information protection. Proposed web application has high usability and manageability because users and/or administrators can easily create, join, monitor, or tear down VC sessions through RESTful web service (REST API). We verify the feasibility of the VC application after illustrating the SAML-based identity federation and the designed REST API.

A Study of Web Application Security Quality Architecture Management Process referenced ISO/IEC9000 Model (ISO/IEC9000모델을 참조한 웹 애플리케이션 보안품질 관리체계 설계)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.11-17
    • /
    • 2012
  • According to ISO/IEC 9000, quality to satisfy users' requirements when using the product or service is defined as the characteristics of the synthesized concept. Secure web application coding information systems with the reliability and quality of service is one of the determining factor. Secure coding in order to achieve the quality based on the model is necessary. The reason is that the security is in quality properties in the range of non-functional requirements that necessitates. Secure coding for the design of quality systems based on the quality of the definition of quality attributes, quality requirements, quality attribute scenarios are defined, and must be set. To this end, referring to IEEE 1061 quality model for web application, quality model structure is developed. Secure web application architecture design is composed of coding quality of the model systems, web applications draw interest to stakeholders, decision drivers secure coding architecture, quality attributes, eliciting quality requirements of the security settings, creating web application architecture descriptions and security framework.

A Construction of Web Application Platform for Detection and Identification of Various Diseases in Tomato Plants Using a Deep Learning Algorithm (딥러닝 알고리즘을 이용한 토마토에서 발생하는 여러가지 병해충의 탐지와 식별에 대한 웹응용 플렛폼의 구축)

  • Na, Myung Hwan;Cho, Wanhyun;Kim, SangKyoon
    • Journal of Korean Society for Quality Management
    • /
    • v.48 no.4
    • /
    • pp.581-596
    • /
    • 2020
  • Purpose: purpose of this study was to propose the web application platform which can be to detect and discriminate various diseases and pest of tomato plant based on the large amount of disease image data observed in the facility or the open field. Methods: The deep learning algorithms uesed at the web applivation platform are consisted as the combining form of Faster R-CNN with the pre-trained convolution neural network (CNN) models such as SSD_mobilenet v1, Inception v2, Resnet50 and Resnet101 models. To evaluate the superiority of the newly proposed web application platform, we collected 850 images of four diseases such as Bacterial cankers, Late blight, Leaf miners, and Powdery mildew that occur the most frequent in tomato plants. Of these, 750 were used to learn the algorithm, and the remaining 100 images were used to evaluate the algorithm. Results: From the experiments, the deep learning algorithm combining Faster R-CNN with SSD_mobilnet v1, Inception v2, Resnet50, and Restnet101 showed detection accuracy of 31.0%, 87.7%, 84.4%, and 90.8% respectively. Finally, we constructed a web application platform that can detect and discriminate various tomato deseases using best deep learning algorithm. If farmers uploaded image captured by their digital cameras such as smart phone camera or DSLR (Digital Single Lens Reflex) camera, then they can receive an information for detection, identification and disease control about captured tomato disease through the proposed web application platform. Conclusion: Incheon Port needs to act actively paying.

Mobile Web-toon Application Service Usability Study -Focus on Naver Web-toon and Lezin Comics- (모바일 웹툰 애플리케이션 서비스 사용성 연구 -네이버 웹툰과 레진 코믹스를 중심으로-)

  • Ha, Joohyung;Kim, Seung-in
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.431-436
    • /
    • 2016
  • Web-toon is provided to users in the form of Web-toon and The users are steadily rising and increasing amount of using time until today. Web-toon has become a popular pastime among smartphone users. Therefore, when providing services, Web-toon application should be made with an appropriate system so that it can be easily used, and considering problems that users may have while using the application, it should help users have better experiences. With Naver Web-toon and Lezin Comics as subjects, user experiences of teenagers were analyzed with questionnaires based on Honeycomb model of Peter Morville. The score of Naver Web-toon was higher than Lezin Comics after user experience assesment, and usability and accessibility as important factors turned out to be influential to teen-aged users who use Web-toon services.