• 제목/요약/키워드: Content Information

Search Result 8,566, Processing Time 0.03 seconds

Design of Web Content Model (웹 컨텐트 저장소)

  • Abbass, Onytra;Koo, Heung-Seo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.1915-1918
    • /
    • 2002
  • Managing semistructured data needs fine granularity such as markup elements. XML has major effect in managing web content, it enables content reusability, enriches information with metadata, ensures valid document links, etc. We introduce our content model as an integrated work which handles content objects as controllable units. The paper concerns on modeling news site and how the content is classified due to the site structure, aggregated content and reusability. The model stores instance XML document into relation database using fragmentation strategy.

  • PDF

Content Modeling Based on Social Network Community Activity

  • Kim, Kyung-Rog;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.271-282
    • /
    • 2014
  • The advancement of knowledge society has enabled the social network community (SNC) to be perceived as another space for learning where individuals produce, share, and apply content in self-directed ways. The content generated within social networks provides information of value for the participants in real time. Thus, this study proposes the social network community activity-based content model (SoACo Model), which takes SNC-based activities and embodies them within learning objects. The SoACo Model consists of content objects, aggregation levels, and information models. Content objects are composed of relationship-building elements, including real-time, changeable activities such as making friends, and participation-activity elements such as "Liking" specific content. Aggregation levels apply one of three granularity levels considering the reusability of elements: activity assets, real-time, changeable learning objects, and content. The SoACo Model is meaningful because it transforms SNC-based activities into learning objects for learning and teaching activities and applies to learning management systems since they organize activities -- such as tweets from Twitter -- depending on the teacher's intention.

Main Content Extraction from Web Pages Based on Node Characteristics

  • Liu, Qingtang;Shao, Mingbo;Wu, Linjing;Zhao, Gang;Fan, Guilin;Li, Jun
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.2
    • /
    • pp.39-48
    • /
    • 2017
  • Main content extraction of web pages is widely used in search engines, web content aggregation and mobile Internet browsing. However, a mass of irrelevant information such as advertisement, irrelevant navigation and trash information is included in web pages. Such irrelevant information reduces the efficiency of web content processing in content-based applications. The purpose of this paper is to propose an automatic main content extraction method of web pages. In this method, we use two indicators to describe characteristics of web pages: text density and hyperlink density. According to continuous distribution of similar content on a page, we use an estimation algorithm to judge if a node is a content node or a noisy node based on characteristics of the node and neighboring nodes. This algorithm enables us to filter advertisement nodes and irrelevant navigation. Experimental results on 10 news websites revealed that our algorithm could achieve a 96.34% average acceptable rate.

Design of Subject-based Community Model by Linkage Heterogeneous Content: Focused on Field of Biological Science

  • Ahn, Bu-Young;Kim, Ji-Young;Oh, Chung-Shick;Lee, Myung-Sun
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.10-14
    • /
    • 2010
  • Researchers in Korea and elsewhere have carried out a wide variety of important research activities in their respective fields, producing valuable research results. For such diverse research results to be shared and exchanged among researchers working in the same discipline and research subject there needs to be a community environment based on free utilization of information. Against this backdrop, this study seeks to classify and reprocess the reference/factual content owned by the KISTI (Korea Institute of Science and Technology Information), a state-run distributor of information on science and technology, by the different research subjects. It also seeks to develop and provide a community model based on the concepts of open archiving and open access for the researchers specialized in the related fields of research. This community model is developed focusing on the research results from the field of bioscience, where the most extensive studies are currently being conducted. To develop the community model, this study: (a) surveys the current status of the content owned by KISTI; (b) analyzes the patterns and characteristics of biological scientific content among the KISTI-owned content; and (c) designs a web platform where researchers can freely upload/download research results.

Implementation of Digital Contents Safety Trade System using Encryption Technology (암호 기술을 이용한 디지털 콘텐츠 안전 거래 시스템 구현)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.119-125
    • /
    • 2013
  • The amount of digital content grows exponentially by the development of the internet and the change of computing environments and the target also is getting wider. The industry using this digital content has been growing greatly. However, the distribution of pirated digital content is increasing using internet because digital content is easy to store and transmit and the damage is growing. In this paper, we propose safety trading system which can conceal the author's information safely in digital content in order to block illegal distribution of digital content. ARIA encryption algorithm is used to protect the concealed information of author in digital content and it is a help to track the illegal traders by doing fingerprinting of buyer information to digital content and managing the transaction information. The technical support for copyright dispute is to allow by providing the capability to verify illegal edit to original digital contents.

Design of Object-based Information System Prototype

  • Yoo, Suhyeon;Shin, Sumi;Kim, Hyesun
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.1
    • /
    • pp.79-91
    • /
    • 2014
  • Researchers who use science and technology information were found to ask an information service in which they can excerpt the contents they needed, rather than using the information at article level. In this study, we micronized the contents of scholarly articles into text, image, and table and then constructed a micro-content DB to design a new information system prototype based on this micro-content. After designing the prototype, we performed usability test for this prototype so as to confirm the usefulness of the system prototype. We expect that the outcome of this study will fulfill the segmented and diversified information need of researchers.

An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction

  • Im, Hyeonseung;Kim, Dohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2904-2918
    • /
    • 2020
  • With a huge demand for replicated content on the Internet, a new networking paradigm called information-centric networking (ICN) has been introduced for efficient content dissemination. In ICN, named content is distributed over the network cache and it is accessed by name instead of a location identifier. These aspects allow users to retrieve content from any of the nodes having replicas, and consequently 1) network resources are more efficiently utilized by avoiding redundant transmission and 2) more scalable services are provided by distributing server loads. However, in-network caching in ICN brings about a new type of security issues, called content poisoning attacks, where fabricated content is located in the network cache and interferes with the normal behavior of the system. In this paper, we look into the problems of content poisoning in ICN and discuss security architectures against them. In particular, we reconsider the state-of-the-art schemes from the perspective of feasibility, and propose a practical security architecture.

Route Optimization Scheme for Mobile Content Sources in Content Centric Networking

  • Lee, Jihoon;Rhee, Eugene
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.22-27
    • /
    • 2020
  • Content centric networking (CCN) is regarded as promising internet architecture because it can provide network efficiency in terms of bandwidth consumption by separating contents from a specific network location and decrease network congestion events. However, the application of a CCN does not widely consider the side effects of mobile devices, particularly mobile content sources. For content source mobility, a full routing update is required. Therefore, in this study, a route optimization scheme is proposed for mobile content sources in a CCN environment to provide low communication overhead, short download time, and low resource consumption. The proposed scheme establishes a direct path between content requesters and a mobile content source for the exchange of interest and data packets using interest-piggybacked data packets. Based on the inherent CCN naming characteristics, the content source does not know the name prefix of the content consumer, and thus the proposed optimized CCN scheme utilizes the content router in the home domain of the content source.

Information Dimensions in Library and Information Science Doctoral Mentoring: Qualitative Findings

  • Lee, Jongwook
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.8 no.3
    • /
    • pp.5-28
    • /
    • 2018
  • Socialization of doctoral students refers to the process through which they acquire various types of information about their work, department, university, and discipline for their future careers. This study aims to investigate information behaviors, with emphasis on identifying types of information exchanged in mentoring between faculty advisors and their doctoral students in library and information science (LIS). As a first step to developing a content framework for LIS doctoral mentoring, the author interviewed ten LIS doctoral students from nine U.S. universities. Based on data from these interviews, the author identified sixteen types of information exchanged: language, history, coursework, research, skills, teaching, networking, structure, politics, goals, strategies, values, norms/tradition, rules/policies, benefits, and personal life. In comparison with a content framework used, four dimensions were newly added. In addition to the identification of content dimensions, the author observed four meaningful contextual levels to which the content types can be applied: work, department/school, university, and discipline. The qualitative data also showed that interpersonal factors of advisees/advisors and contextual factors might relate to information exchange in doctoral mentoring. In a following paper, the author will present the results of a follow-up survey that tests and generalizes the findings of this study.

The Influence of Online Information on a Consumer's Purchase at Social Commerce Websites (온라인 정보가 소셜커머스 구매에 미치는 영향)

  • Kim, Jin Baek
    • Informatization Policy
    • /
    • v.21 no.4
    • /
    • pp.40-58
    • /
    • 2014
  • This study investigated how online information affected consumers' purchases at social commerce websites. In the online purchase process, consumers use two types of online information: user generated content(UGC) and vendor generated content(VGC). These information types may influence consumers'purchase intention differently because each information builds entity trust and content trust, which play mediation roles between online information and purchase intention. According to the analysis results, general transactional information and safe transaction information of VGC and reputation information of UGC significantly affected entity trust. But content trust was affected only from general transactional information of VGC. And entity trust significantly affected content trust as well as purchase intention. These findings imply that social commerce vendors should focus mainly on entity trust for enhancing consumers' purchase intention. To achieve this objective, in the short term perspective, they should endeavor how to enhance general transaction information and safe transaction information qualities because these information types are easily controlled and improved by vendors. In the long term perspective, they should focus on reputation formation because reputation takes long time.