• Title/Summary/Keyword: Application Analysis

Search Result 20,632, Processing Time 0.039 seconds

User Experience Evaluation of Menstrual Cycle Measurement Application Using Text Mining Analysis Techniques (텍스트 마이닝 분석 기법을 활용한 월경주기측정 애플리케이션 사용자 경험 평가)

  • Wookyung Jeong;Donghee Shin
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.4
    • /
    • pp.1-31
    • /
    • 2023
  • This study conducted user experience evaluation by introducing various text mining techniques along with topic modeling techniques for mobile menstrual cycle measurement applications that are closely related to women's health and analyzed the results by combining them with a honeycomb model. To evaluate the user experience revealed in the menstrual cycle measurement application review, 47,117 Korean reviews of the menstrual cycle measurement application were collected. Topic modeling analysis was conducted to confirm the overall discourse on the user experience revealed in the review, and text network analysis was conducted to confirm the specific experience of each topic. In addition, sentimental analysis was conducted to understand the emotional experience of users. Based on this, the development strategy of the menstrual cycle measurement application was presented in terms of accuracy, design, monitoring, data management, and user management. As a result of the study, it was confirmed that the accuracy and monitoring function of the menstrual cycle measurement of the application should be improved, and it was observed that various design attempts were required. In addition, the necessity of supplementing personal information and the user's biometric data management method was also confirmed. By exploring the user experience (UX) of the menstrual cycle measurement application in-depth, this study revealed various factors experienced by users and suggested practical improvements to provide a better experience. It is also significant in that it presents a methodology by combines topic modeling and text network analysis techniques so that researchers can closely grasp vast amounts of review data in the process of evaluating user experiences.

A study of analysis about application of design value engineering in the rural apartment building (농촌지역 아파트 공사 설계VE의 공간별 적용방법 분석 연구)

  • Min, Kyung-Seok
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2006
  • The purpose of this study is to provide the systematic report and analysis about Apartment VE application in Design Phase. In this study, the method of VE application is classified into foure groups-changing materials, changing a method of construction, acceptance of new technology, and use of new device. The facts found in this study can be summarized as follows. Application rate of VE is highest in building circumference parts. The main reason would be that there are many applicable factors according to locations, types of work, etc. Parking lots also show similar results with the same reason. It means there are a lot of possibility to adapt value engineering in these steps during the work. So far application of value engineering has been so limited that just small changes of process or method have been tried. One reason is the lack of challenging and the other is some characteristics of construction work which is very difficult to fix after completion. In the future, it would be more efficient to apply new technology and new device in construction work. Though these attempts have been ignored in Korea so far, there are still lots of possibilities to be developed in value engineering.

  • PDF

Evaluating the web-application resiliency to business-layer DoS attacks

  • Alidoosti, Mitra;Nowroozi, Alireza;Nickabadi, Ahmad
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.433-445
    • /
    • 2020
  • A denial-of-service (DoS) attack is a serious attack that targets web applications. According to Imperva, DoS attacks in the application layer comprise 60% of all the DoS attacks. Nowadays, attacks have grown into application- and business-layer attacks, and vulnerability-analysis tools are unable to detect business-layer vulnerabilities (logic-related vulnerabilities). This paper presents the business-layer dynamic application security tester (BLDAST) as a dynamic, black-box vulnerability-analysis approach to identify the business-logic vulnerabilities of a web application against DoS attacks. BLDAST evaluates the resiliency of web applications by detecting vulnerable business processes. The evaluation of six widely used web applications shows that BLDAST can detect the vulnerabilities with 100% accuracy. BLDAST detected 30 vulnerabilities in the selected web applications; more than half of the detected vulnerabilities were new and unknown. Furthermore, the precision of BLDAST for detecting the business processes is shown to be 94%, while the generated user navigation graph is improved by 62.8% because of the detection of similar web pages.

Web Application Attack Prevention by Traffic Analysis (트래픽 분석에 의한 웹 어플리케이션 공격 방지)

  • Chang, Moon-Soo;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.139-146
    • /
    • 2008
  • Despite of information security installation, leakage of personal information in web services has not decreased. This is because traffics to web applications are still vulnerable by permitting external sources to access services in port HTTF 80 and HTTPS 443, even with firewall systems in place. This thesis analyzes various attack patterns resulted from web service environment and vulnerable traffic and categorizes the traffics into normal and abnormal traffics. Also this proposes ways to analyze web application attack patterns from those abnormal traffics based on weak points warned in OWASF(Open Web Application Security Project), design a system capable of detect and isolate attacks in real time, and increase efficiency of preventing attacks.

  • PDF

Digital Application of Intangible Cultural Heritage from the Perspective of Cultural Ecology

  • Jing, Xiuli;Tan, Fang;Zhang, Mu
    • Journal of Smart Tourism
    • /
    • v.1 no.1
    • /
    • pp.41-52
    • /
    • 2021
  • This paper explored the digital application of intangible cultural heritage from the perspective of cultural ecology. Through field investigations, combined with cultural ecology theory, an ontology-based semantic web technology was proposed, and Nanjing "Yunjin" brocade weaving technique was selected as the research object. The specific steps were as follows: First, based on the field surveys and cultural ecology theory, the intangible cultural ecological environment was divided into natural and social environments. Next, constructing the intangible cultural heritage ontology was constructed, including the collection and collation of Nanjing Yunjin weaving technique knowledge corpus, based on user needs analysis and corpus analysis, CIDOC CRM was used to create rules to build the ontology. Finally, based on the MediaWiki platform and Semantic MediaWiki, the semantic web model of the intangible cultural heritage was designed, and its semantic retrieval function was realized, thereby achieving the practical application of intangible cultural heritage digitization. Based on the perspective of cultural ecology, a set of intangible digital application models was proposed, which expanded the digital application of the cultural ecology theory, verified the application of this model in the sustainable development of cultural tourism, and provided reference for the sustainable development of cultural tourism.

Pseudo plastic zone analysis of steel frame structures comprising non-compact sections

  • Avery, P.;Mahendran, M.
    • Structural Engineering and Mechanics
    • /
    • v.10 no.4
    • /
    • pp.371-392
    • /
    • 2000
  • Application of "advanced analysis" methods suitable for non-linear analysis and design of steel frame structures permits direct and accurate determination of ultimate system strengths, without resort to simplified elastic methods of analysis and semi-empirical specification equations. However, the application of advanced analysis methods has previously been restricted to steel frames comprising only compact sections that are not influenced by the effects of local buckling. A concentrated plasticity method suitable for practical advanced analysis of steel frame structures comprising non-compact sections is presented in this paper. The pseudo plastic zone method implicitly accounts for the effects of gradual cross-sectional yielding, longitudinal spread of plasticity, initial geometric imperfections, residual stresses, and local buckling. The accuracy and precision of the method for the analysis of steel frames comprising non-compact sections is established by comparison with a comprehensive range of analytical benchmark frame solutions. The pseudo plastic zone method is shown to be more accurate and precise than the conventional individual member design methods based on elastic analysis and specification equations.

A Study on the Application of the Digital Landuse Map for Land Use State Analysis (국토이용 현황 분석을 위한 토지이용현황도 활용 방안 연구 - 전북지역 대상 -)

  • Woo, Je-Yoon;Koo, Jee-Hee;Lee, Jung-Hun;Hong, Chang-Hee
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.2 s.6
    • /
    • pp.63-70
    • /
    • 2001
  • In this study, land use state analysis for northern part of Cheon-ra province where is relatively vast area is accomplished using the application system of land use map. The system is developed for promoting application of the latest land use map and is possible to GIS spatial analysis. Through this study, an analysis method of land use state and decision making support for effective land use plan is presented. It is expected for land use map to be variously applied to land planning by analysis of wide-range land use state and base data for fields such as environment effect, disaster analysis.

  • PDF

A framework for distributed analytical and hybrid simulations

  • Kwon, Oh-Sung;Elnashai, Amr S.;Spencer, Billie F.
    • Structural Engineering and Mechanics
    • /
    • v.30 no.3
    • /
    • pp.331-350
    • /
    • 2008
  • A framework for multi-platform analytical and multi-component hybrid (testing-analysis) simulations is described in this paper and illustrated with several application examples. The framework allows the integration of various analytical platforms and geographically distributed experimental facilities into a comprehensive pseudo-dynamic hybrid simulation. The object-oriented architecture of the framework enables easy inclusion of new analysis platforms or experimental models, and the addition of a multitude of auxiliary components, such as data acquisition and camera control. Four application examples are given, namely; (i) multi-platform analysis of a bridge with soil and structural models, (ii) multiplatform, multi-resolution analysis of a high-rise building, (iii) three-site small scale frame hybrid simulation, and (iv) three-site large scale bridge hybrid simulation. These simulations serve as illustrative examples of collaborative research among geographically distributed researchers employing different analysis platforms and testing equipment. The versatility of the framework, ease of including additional modules and the wide application potential demonstrated in the paper provide a rich research environment for structural and geotechnical engineering.

Fault Tree Analysis and Failure Mode Effects Analysis for Software Security Improvements in Mobile Banking Information Systems (모바일 뱅킹 정보시스템의 소프트웨어 보안성 개선을 위한 고장 트리 분석과 고장 유형 영향 분석)

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1342-1350
    • /
    • 2015
  • Due to rapid development of mobile device technologies, the mobile banking through Internet has become a major service of banking information systems as a security-critical information systems. Recently, lots of mobile banking information systems which handle personal and transaction information have been exposed to security threats in vulnerable security control and management processes, mainly software systems. Therefore, in this paper, we propose a process model for software security improvements in mobile banking information system by application of fault tree analysis(FTA) and failure modes and effects analysis(FMEA) on the most important activities such as 'user authentication' and 'access control' and 'virus detection and control' processes which security control and management of mobile banking information systems are very weak.

GoBean: a Java GUI application for visual exploration of GO term enrichments

  • Lee, Sang-Hyuk;Cha, Ji-Young;Kim, Hyeon-Jin;Yu, Ung-Sik
    • BMB Reports
    • /
    • v.45 no.2
    • /
    • pp.120-125
    • /
    • 2012
  • We have developed a biologist-friendly, Java GUI application (GoBean) for GO term enrichment analysis. It was designed to be a comprehensive and flexible GUI tool for GO term enrichment analysis, combining the merits of other programs and incorporating extensive graphic exploration of enrichment results. An intuitive user interface with multiple panels allows for extensive visual scrutiny of analysis results. The program includes many essential and useful features, such as enrichment analysis algorithms, multiple test correction methods, and versatile filtering of enriched GO terms for more focused analyses. A unique graphic interface reflecting the GO tree structure was devised to facilitate comparisons of multiple GO analysis results, which can provide valuable insights for biological interpretation. Additional features to enhance user convenience include built in ID conversion, evidence code-based gene-GO association filtering, set operations of gene lists and enriched GO terms, and user -provided data files. It is available at http://neon.gachon.ac.kr/GoBean/.