• Title/Summary/Keyword: Internet Information Activities

Search Result 692, Processing Time 0.034 seconds

Measures of Abnormal User Activities in Online Comments Based on Cosine Similarity (코사인 유사도 기반의 인터넷 댓글 상 이상 행위 분석 방법)

  • Kim, Minjae;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.335-343
    • /
    • 2014
  • It is more important to ensure the credibility of internet media which influence the public opinion. However, there are vague suspicions in public from the examples of manipulation of online reviews with anonymity. In this study, we explore the possibility of manipulating public opinion in online web sites. We investigate the characteristics of comments posted by users on web sites and compare each comments by using the cosine similarity function. Our result shows followings. First, we found a correlation between the similarities of comments and the article ranks in the web sites. Second, it is possible to identify abnormal user activities indicating excessive multiple posting, double posting and astroturf activities.

Optimizing Urban Construction and Demolition Waste Management System Based on 4D-GIS and Internet Plus

  • Wang, Huiyue;Zhang, Tingning;Duan, Huabo;Zheng, Lina;Wang, Xiaohua;Wang, Jiayuan
    • International conference on construction engineering and project management
    • /
    • 2017.10a
    • /
    • pp.321-327
    • /
    • 2017
  • China is experiencing the urbanization at an unprecedented speed and scale in human history. The continuing growth of China's big cities, both in city land and population, has already led to great challenges in China's urban planning and construction activities, such as the continuous increase of construction and demolition (C&D) waste. Therefore, how to characterize cities' construction activities, particularly dynamically quantify the flows of building materials and construction debris, has become a pressing problem to alleviate the current shortage of resources and realize urban sustainable development. Accordingly, this study is designed to employ 4D-GIS (four dimensions-Geographic Information System) and Internet Plus to offer new approach for accurate but dynamic C&D waste management. The present study established a spatio-temporal pattern and material metabolism evolution model to characterize the geo-distribution of C&D waste by combing material flow analysis (MFA) and 4D-GIS. In addition, this study developed a mobile application (APP) for C&D waste trading and information management, which could be more effective for stakeholders to obtain useful information. Moreover, a cloud database was built in the APP to disclose the flows of C&D waste by the monitoring information from vehicles at regional level. To summarize, these findings could provide basic data and management methods for the supply and reverse supply of building materials. Meanwhile, the methodologies are practical to C&D waste management and beyond.

  • PDF

An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks

  • Lee, Yun-Ho;Yoo, Sang-Guun;Lee, Soo-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1874-1893
    • /
    • 2012
  • An approach to detect abnormal activities based on reputations created individually by each node is vulnerable to a false accusation since intrusion detection in ad-hoc networks is done in a distributed and cooperative manner. Detection of false accusation is considered important because the efficiency or survivability of the network can be degraded severely if normal nodes were excluded from the network by being considered as abnormal ones in the intrusion detection process. In this paper, we propose an improved reputation-based intrusion detection technique to efficiently detect and manage false accusations in ad-hoc networks. Additionally, we execute simulations of the proposed technique to analyze its performance and feasibility to be implemented in a real environment.

Adaptive Resource Management and Provisioning in the Cloud Computing: A Survey of Definitions, Standards and Research Roadmaps

  • Keshavarzi, Amin;Haghighat, Abolfazl Toroghi;Bohlouli, Mahdi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4280-4300
    • /
    • 2017
  • The fact that cloud computing services have been proposed in recent years, organizations and individuals face with various challenges and problems such as how to migrate applications and software platforms into cloud or how to ensure security of migrated applications. This study reviews the current challenges and open issues in cloud computing, with the focus on autonomic resource management especially in federated clouds. In addition, this study provides recommendations and research roadmaps for scientific activities, as well as potential improvements in federated cloud computing. This survey study covers results achieved through 190 literatures including books, journal and conference papers, industrial reports, forums, and project reports. A solution is proposed for autonomic resource management in the federated clouds, using machine learning and statistical analysis in order to provide better and efficient resource management.

Dynamic Session Key based Pairwise Key Management Scheme for Wireless Sensor Networks

  • Premamayudu, B;Rao, Koduganti Venkata;Varma, P. Suresh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5596-5615
    • /
    • 2016
  • Security is one of the major challenges in the Wireless Sensor Networks (WSNs). WSNs are more vulnerable to adversarial activities. All cryptographic security services indirectly depend on key management. Symmetric key management is the best key establishment process for WSNs due to the resource constraints of the sensors. In this paper, we proposed dynamic session key establishment scheme based on randomly generated nonce value and sensor node identity, in which each sensor node is equipped with session key on expire basis. The proposed scheme is compare with five popular existing key management systems. Our scheme is simulated in OMNET++ with MixiM and presented experimental results. The analytical study and experimental results show the superiority of the proposed scheme over the existing schemes in terms of energy, storage, resilience and communication overhead.

Environmental Implementation of the UNIX-Based School Sewer for the Internet Service (인터넷 서비스를 위한 UNIX 기반 학교서버 환경구축)

  • 문외식
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.218-226
    • /
    • 2000
  • The Purposes of this study are twofold. Firstly, the study investigated the spec of the server environment for managing the academic affairs, and overviewed the theoretical background in connection with the clients and the server as a way of implementing a comprehensive management system for school information which can be effectively utilized for cyber education, multimedia education, joint ownership of learning materials, and educational activities as well as management of the academic affairs using the UNIX-based server, which has lately installed on school thanks to the speedy development of the Internet, Secondly, this study, placing emphasis on practical aspects, attempted to find a method of implementing the web server for constructing a school website in order to provide educational information.

  • PDF

Comparison of Determinants in Internet and Mobile Commerce Adoption

  • Cho, Dai-Yon;Kwon, Hyun-Jung;Lee, Hyoung-Yong
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.479-487
    • /
    • 2007
  • Understanding user acceptance of the Internet, especially the intentions to use Internet commerce and mobile commerce, is important in explaining the fact that these commerce have been growing at an exponential rate in recent years. This paper studies factors of new technology to better understand and manage the electronic commerce activities. The theoretical model proposed in this paper is intended to clarify the factors as they are related to the Technology Acceptance Model. More specifically, the relationship among trust and other factors are hypothesized. Using the Technology Acceptance Model, this research reveals the importance of the hedonic factor. The result of this research implies that the ways of stimulating and facilitating customers' participation in mobile commerce should be differentiated from those in Internet commerce.

  • PDF

A Study on Web-Based Education (웹기반 교육에 관한 연구)

  • Ko, Seong-Gyu;Shin, Yong-Cheol
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.11 no.2
    • /
    • pp.113-120
    • /
    • 2007
  • The Internet is increasingly changing our lives and enables the ordinary person to have access to never-ending quantities of information and knowledge. Technology and the Internet empower individuals and facilitate a more active role in the educational process. The webcast is a media file distributed over the Internet using streaming media technology and is used extensively in the commercial sector for investor relations presentations, in e-learning, and for related communications activities. And relating to computers, technology, and news are particularly popular and many new shows are added regularly. Especially e-learning is a general term used to refer to computer-enhanced learning and has the ability to level the learning playing field. So that the e-learning experience will be second nature to the growing Internet population. And this study intends to develop web-based education.

  • PDF

Internet Effects on Generational, Socioeconomic, and Demographic Representativeness in Political Activity (정치 참여자의 세대적·사회경제학적·인구배경학적 대표성에 대한 인터넷의 영향)

  • Nam, Taewoo
    • Informatization Policy
    • /
    • v.22 no.3
    • /
    • pp.61-93
    • /
    • 2015
  • This article assesses and examines democratic potentials of the Internet for U.S. citizens' political participation. The empirical analysis on the data from Pew Research Center's questionnaire survey focuses on four different political activities in both online and offline modes: casual political talk, contact with a government official, petition, and political contribution. The study answers two research inquiries: 1) How does the Internet influence the established patterns of political participation?; and 2) How does the Internet influence the demographic distribution of participatory inequality? Firstly, the Internet, by providing existing participants with additional tools for participation, reinforces conventional participation, rather than mobilizing new participation in politics. Secondly, the online patterns of the participation divide with respect to demographic characteristics imitate the traditional patterns of inequality and disproportionate representativeness in political participation. The Internet is still not a predominant medium for political activities. Citizens' utilization of its transformative and mobilizing potentials remains limited.

A Study on Teaching method for architectural design based on internet virtual reality (인터넷 가상현실을 이용한 건축설계교육에 관한 연구)

  • 신유진
    • Journal of Internet Computing and Services
    • /
    • v.2 no.5
    • /
    • pp.31-39
    • /
    • 2001
  • Activities in fields based on internet virtual reality are flourishing. Education field is not an exception, and has reached the stage of establishing a cyber university after showing its activity in the developing field of distance learning. Although some of the architectural education fields have been following this trend, the education field of architectural design has not been developed as wildly because there have been a lot of difficulties in expressing three-dimensional space on a two-dimensional web. However, it has become possible to actualize the remote lecture based on internet in the education field of architectural design through the latest developments in internet technology. The purpose of this research is to be a basis for developing a teaching method for architectural design by taking advantage of the advanced in virtual reality technology on the internet.

  • PDF