• Title/Summary/Keyword: Internet Services Classification

Search Result 213, Processing Time 0.022 seconds

A Study on Formulating the Classification Model for Smartphone's Satisfaction Factors (스마트폰 만족요인 분류 모델 수립에 관한 연구)

  • Zhu, Bo;Kim, Tae-Won;Kim, Sang-Wook
    • Information Systems Review
    • /
    • v.13 no.3
    • /
    • pp.47-63
    • /
    • 2011
  • The rapid spread of the Smartphone usage among the public has brought great changes to the overall society. Aiming to gain their competitiveness with better Smartphone service quality, manufacturers are endeavoring to keep the pace with the popularization of mobile internet and social changes. Researches on the Smartphone service quality are actively undergoing in the academic circles as well. A great many of studies ranging from the past mobile services to the recent Smartphone services have thus far focused on proposing the systematic arrangement and the typology in terms of service quality, which in turn have provided the theoretical foundation and broaden the scope of comprehension. Besides technical aspects of the mobile and Smartphone services, the earlier studies in the behavioral domain, however, only took into considerations the positive aspect of users' satisfaction with the quality of services via new media devices like Smartphone. The rationale behind this mainly comes from the assumption that as the opposite definition of satisfaction is dissatisfaction, the services are not adopted if dissatisfied. However, it is not always true to conclude that service users are satisfied when the service is functionally fulfilled and dissatisfied otherwise. That is because there exist some cases that quality attributes provide satisfaction when achieved fully, but do not cause dissatisfaction when not fulfilled. And there also exist other cases that quality attributes are taken for granted when fulfilled but result in dissatisfaction when not fulfilled. To account this multi-dimensional feature of service quality attributes in relation with user satisfaction, this study took advantage of Kano model following the identification of a set of the Smartphone service quality attributes by investigating the previous studies. Categorizing of the service quality elements reflecting the customers' needs would perhaps help manage Smartphone service quality, enabling business managers to identify which quality attributes more emphasis to put on and what strategy to establish for the future.

Analysis on the Ripple and Investment Effect of Digital Bio-Healthcare Industry : Using Input-Output Tables 2019 (디지털바이오헬스케어(Digital Bio-Healthcare)산업의 파급효과 및 투자효과 분석 : 2019년 산업연관표를 중심으로)

  • Jang, Pilho;Kim, Yonghwan;Lee, Changwoon;Jun, Sungkyu;Jung, Myungjin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.71-81
    • /
    • 2020
  • The digital bio-healthcare industry is one of the three major fostering industries of the Korean Moon Jae-In government. The purpose of this study is to compare and analyze the ripple effect and investment effect in digital bio-healthcare industry. Analyzing the ripple effects of the digital bio-healthcare industry is very important to induce policies on industry and technology development. First, the research methods were reclassified into 33 industries in the standard industry classification and rewritten into 35 industry classification tables. Second, various trigger coefficients and ripple effects coefficients were rewritten by the analysis framework of the industrial association table. Third, we compared the ripple effects of related industries in the production, investment, value-added and jobs sectors of the digital bio-healthcare industry. Finally, in terms of investment effects, the effects of in-house and related industries were compared. The result of this study would be helpful in the establishment of industrial policy and technology development policy.

Distinction of Color Similarity for Clothes based on the LBG Algorithm (LBG 알고리즘 기반의 의상 색상 유사성 판별)

  • Ju, Hyung-Don;Hong, Min;Cho, We-Duke;Moon, Nam-Mee;Choi, Yoo-Joo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.117-130
    • /
    • 2008
  • This paper proposes a stable and robust method to distinct the color similarity for clothes using the LBG algorithm under various light sources, Since the conventional methods, such as the histogram intersection and the accumulated histogram, are profoundly sensitive to the changing of light environments, the distinction of color similarity for the same cloth can be different due to the complicated light sources. To reduce the effects of the light sources, the properties of hue and saturation which consistently sustain the characteristic of the color under the various changes of light sources are analyzed to define the characteristic of the color distribution. In a two-dimensional space determined by the properties of hue and saturation, the LBG algorithm, a non-parametric clustering approach, is applied to examine the color distribution of images for each clothes. The color similarity of images is defined by the average of Euclidean distance between the mapping clusters which are calculated from the result of clustering of both images. To prove the stability of the proposed method, the results of the color similarity between our method and the traditional histogram analysis based methods are compared using a dozen of cloth examples that obtained under different light environments. Our method successively provides the classification between the same cloth image pair and the different cloth image pair and this classification of color similarity for clothe images obtains the 91.6% of success rate.

  • PDF

Adaptive VM Allocation and Migration Approach using Fuzzy Classification and Dynamic Threshold (퍼지 분류 및 동적 임계 값을 사용한 적응형 VM 할당 및 마이그레이션 방식)

  • Mateo, John Cristopher A.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.51-59
    • /
    • 2017
  • With the growth of Cloud computing, it is important to consider resource management techniques to minimize the overall costs of management. In cloud environments, each host's utilization and virtual machine's request based on user preferences are dynamic in nature. To solve this problem, efficient allocation method of virtual machines to hosts where the classification of virtual machines and hosts is undetermined should be studied. In reducing the number of active hosts to reduce energy consumption, thresholds can be implemented to migrate VMs to other hosts. By using Fuzzy logic in classifying resource requests of virtual machines and resource utilization of hosts, we proposed an adaptive VM allocation and migration approach. The allocation strategy classifies the VMs according to their resource request, then assigns it to the host with the lowest resource utilization. In migrating VMs from overutilized hosts, the resource utilization of each host was used to create an upper threshold. In selecting candidate VMs for migration, virtual machines that contributed to the high resource utilization in the host were chosen to be migrated. We evaluated our work through simulations and results show that our approach was significantly better compared to other VM allocation and Migration strategies.

The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification (공격자 그룹 특징 추출 프레임워크 : 악성코드 저자 그룹 식별을 위한 유전 알고리즘 기반 저자 클러스터링)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • Recently, the number of APT(Advanced Persistent Threats) attack using malware has been increasing, and research is underway to prevent and detect them. While it is important to detect and block attacks before they occur, it is also important to make an effective response through an accurate analysis for attack case and attack type, these respond which can be determined by analyzing the attack group of such attacks. Therefore, this paper propose a framework based on genetic algorithm for analyzing malware and understanding attacker group's features. The framework uses decompiler and disassembler to extract related code in collected malware, and analyzes information related to author through code analysis. Malware has unique characteristics that only it has, which can be said to be features that can identify the author or attacker groups of that malware. So, we select specific features only having attack group among the various features extracted from binary and source code through the authorship clustering method, and apply genetic algorithm to accurate clustering to infer specific features. Also, we find features which based on characteristics each group of malware authors has that can express each group, and create profiles to verify that the group of authors is correctly clustered. In this paper, we do experiment about author classification using genetic algorithm and finding specific features to express author characteristic. In experiment result, we identified an author classification accuracy of 86% and selected features to be used for authorship analysis among the information extracted through genetic algorithm.

A Classification Model for Attack Mail Detection based on the Authorship Analysis (작성자 분석 기반의 공격 메일 탐지를 위한 분류 모델)

  • Hong, Sung-Sam;Shin, Gun-Yoon;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.35-46
    • /
    • 2017
  • Recently, attackers using malicious code in cyber security have been increased by attaching malicious code to a mail and inducing the user to execute it. Especially, it is dangerous because it is easy to execute by attaching a document type file. The author analysis is a research area that is being studied in NLP (Neutral Language Process) and text mining, and it studies methods of analyzing authors by analyzing text sentences, texts, and documents in a specific language. In case of attack mail, it is created by the attacker. Therefore, by analyzing the contents of the mail and the attached document file and identifying the corresponding author, it is possible to discover more distinctive features from the normal mail and improve the detection accuracy. In this pager, we proposed IADA2(Intelligent Attack mail Detection based on Authorship Analysis) model for attack mail detection. The feature vector that can classify and detect attack mail from the features used in the existing machine learning based spam detection model and the features used in the author analysis of the document and the IADA2 detection model. We have improved the detection models of attack mails by simply detecting term features and extracted features that reflect the sequence characteristics of words by applying n-grams. Result of experiment show that the proposed method improves performance according to feature combinations, feature selection techniques, and appropriate models.

Comparative Analysis of CNN Deep Learning Model Performance Based on Quantification Application for High-Speed Marine Object Classification (고속 해상 객체 분류를 위한 양자화 적용 기반 CNN 딥러닝 모델 성능 비교 분석)

  • Lee, Seong-Ju;Lee, Hyo-Chan;Song, Hyun-Hak;Jeon, Ho-Seok;Im, Tae-ho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.59-68
    • /
    • 2021
  • As artificial intelligence(AI) technologies, which have made rapid growth recently, began to be applied to the marine environment such as ships, there have been active researches on the application of CNN-based models specialized for digital videos. In E-Navigation service, which is combined with various technologies to detect floating objects of clash risk to reduce human errors and prevent fires inside ships, real-time processing is of huge importance. More functions added, however, mean a need for high-performance processes, which raises prices and poses a cost burden on shipowners. This study thus set out to propose a method capable of processing information at a high rate while maintaining the accuracy by applying Quantization techniques of a deep learning model. First, videos were pre-processed fit for the detection of floating matters in the sea to ensure the efficient transmission of video data to the deep learning entry. Secondly, the quantization technique, one of lightweight techniques for a deep learning model, was applied to reduce the usage rate of memory and increase the processing speed. Finally, the proposed deep learning model to which video pre-processing and quantization were applied was applied to various embedded boards to measure its accuracy and processing speed and test its performance. The proposed method was able to reduce the usage of memory capacity four times and improve the processing speed about four to five times while maintaining the old accuracy of recognition.

Pedestrian Classification using CNN's Deep Features and Transfer Learning (CNN의 깊은 특징과 전이학습을 사용한 보행자 분류)

  • Chung, Soyoung;Chung, Min Gyo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.91-102
    • /
    • 2019
  • In autonomous driving systems, the ability to classify pedestrians in images captured by cameras is very important for pedestrian safety. In the past, after extracting features of pedestrians with HOG(Histogram of Oriented Gradients) or SIFT(Scale-Invariant Feature Transform), people classified them using SVM(Support Vector Machine). However, extracting pedestrian characteristics in such a handcrafted manner has many limitations. Therefore, this paper proposes a method to classify pedestrians reliably and effectively using CNN's(Convolutional Neural Network) deep features and transfer learning. We have experimented with both the fixed feature extractor and the fine-tuning methods, which are two representative transfer learning techniques. Particularly, in the fine-tuning method, we have added a new scheme, called M-Fine(Modified Fine-tuning), which divideslayers into transferred parts and non-transferred parts in three different sizes, and adjusts weights only for layers belonging to non-transferred parts. Experiments on INRIA Person data set with five CNN models(VGGNet, DenseNet, Inception V3, Xception, and MobileNet) showed that CNN's deep features perform better than handcrafted features such as HOG and SIFT, and that the accuracy of Xception (threshold = 0.5) isthe highest at 99.61%. MobileNet, which achieved similar performance to Xception and learned 80% fewer parameters, was the best in terms of efficiency. Among the three transfer learning schemes tested above, the performance of the fine-tuning method was the best. The performance of the M-Fine method was comparable to or slightly lower than that of the fine-tuningmethod, but higher than that of the fixed feature extractor method.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A Study on Cyber Operational Elements Classification and COA Evaluation Method for Cyber Command & Control Decision Making Support (사이버 지휘통제 의사결정 지원을 위한 사이버 작전요소 분류 및 방책 평가 방안 연구)

  • Lee, Dong-hwan;Yoon, Suk-joon;Kim, Kook-jin;Oh, Haeng-rok;Han, In-sung;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.99-113
    • /
    • 2021
  • In these days, as cyberspace has been recognized as the fifth battlefield area following the land, sea, air, and space, attention has been focused on activities that view cyberspace as an operational and mission domain in earnest. Also, in the 21st century, cyber operations based on cyberspace are being developed as a 4th generation warfare method. In such an environment, the success of the operation is determined by the commander's decision. Therefore, in order to increase the rationality and objectivity of such decision-making, it is necessary to systematically establish and select a course of action (COA). In this study, COA is established by using the method of classifying operational elements necessary for cyber operation, and it is intended to suggest a direction for quantitative evaluation of COA. To this end, we propose a method of composing the COES (Cyber Operational Elements Set), which becomes the COA of operation, and classifying the cyber operational elements identified in the target development process based on the 5W1H Method. In addition, by applying the proposed classification method to the cyber operation elements used in the STUXNET attack case, the COES is formed to establish the attack COAs. Finally, after prioritizing the established COA, quantitative evaluation of the policy was performed to select the optimal COA.