• Title/Summary/Keyword: Social ID

Search Result 76, Processing Time 0.033 seconds

A Dynamic Management Method for FOAF Using RSS and OLAP cube (RSS와 OLAP 큐브를 이용한 FOAF의 동적 관리 기법)

  • Sohn, Jong-Soo;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.39-60
    • /
    • 2011
  • Since the introduction of web 2.0 technology, social network service has been recognized as the foundation of an important future information technology. The advent of web 2.0 has led to the change of content creators. In the existing web, content creators are service providers, whereas they have changed into service users in the recent web. Users share experiences with other users improving contents quality, thereby it has increased the importance of social network. As a result, diverse forms of social network service have been emerged from relations and experiences of users. Social network is a network to construct and express social relations among people who share interests and activities. Today's social network service has not merely confined itself to showing user interactions, but it has also developed into a level in which content generation and evaluation are interacting with each other. As the volume of contents generated from social network service and the number of connections between users have drastically increased, the social network extraction method becomes more complicated. Consequently the following problems for the social network extraction arise. First problem lies in insufficiency of representational power of object in the social network. Second problem is incapability of expressional power in the diverse connections among users. Third problem is the difficulty of creating dynamic change in the social network due to change in user interests. And lastly, lack of method capable of integrating and processing data efficiently in the heterogeneous distributed computing environment. The first and last problems can be solved by using FOAF, a tool for describing ontology-based user profiles for construction of social network. However, solving second and third problems require a novel technology to reflect dynamic change of user interests and relations. In this paper, we propose a novel method to overcome the above problems of existing social network extraction method by applying FOAF (a tool for describing user profiles) and RSS (a literary web work publishing mechanism) to OLAP system in order to dynamically innovate and manage FOAF. We employed data interoperability which is an important characteristic of FOAF in this paper. Next we used RSS to reflect such changes as time flow and user interests. RSS, a tool for literary web work, provides standard vocabulary for distribution at web sites and contents in the form of RDF/XML. In this paper, we collect personal information and relations of users by utilizing FOAF. We also collect user contents by utilizing RSS. Finally, collected data is inserted into the database by star schema. The system we proposed in this paper generates OLAP cube using data in the database. 'Dynamic FOAF Management Algorithm' processes generated OLAP cube. Dynamic FOAF Management Algorithm consists of two functions: one is find_id_interest() and the other is find_relation (). Find_id_interest() is used to extract user interests during the input period, and find-relation() extracts users matching user interests. Finally, the proposed system reconstructs FOAF by reflecting extracted relationships and interests of users. For the justification of the suggested idea, we showed the implemented result together with its analysis. We used C# language and MS-SQL database, and input FOAF and RSS as data collected from livejournal.com. The implemented result shows that foaf : interest of users has reached an average of 19 percent increase for four weeks. In proportion to the increased foaf : interest change, the number of foaf : knows of users has grown an average of 9 percent for four weeks. As we use FOAF and RSS as basic data which have a wide support in web 2.0 and social network service, we have a definite advantage in utilizing user data distributed in the diverse web sites and services regardless of language and types of computer. By using suggested method in this paper, we can provide better services coping with the rapid change of user interests with the automatic application of FOAF.

Modeling of the Failure Rates and Estimation of the Economical Replacement Time of Water Mains Based on an Individual Pipe Identification Method (개별관로 정의 방법을 이용한 상수관로 파손율 모형화 및 경제적 교체시기의 산정)

  • Park, Su-Wan;Lee, Hyeong-Seok;Bae, Cheol-Ho;Kim, Kyu-Lee
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.7
    • /
    • pp.525-535
    • /
    • 2009
  • In this paper a heuristic method for identifying individual pipes in water pipe networks to determine specific sections of the pipes that need to be replaced due to deterioration. An appropriate minimum pipe length is determined by selecting the pipe length that has the greatest variance of the average cumulative break number slopes among the various pipe lengths used. As a result, the minimum pipe length for the case study water network is determined as 4 m and a total of 39 individual pipe IDs are obtained. The economically optimal replacement times of the individual pipe IDs are estimated by using the threshold break rate of an individual pipe ID and the pipe break trends models for which the General Pipe Break Prediction Model(Park and Loganathan, 2002) that can incorporate the linear, exponential, and in-between of the linear and exponetial failure trends and the ROCOFs based on the modified time scale(Park et al., 2007) are used. The maximum log-likelihoods of the log-linear ROCOF and Weibull ROCOF estimated for the break data of a pipe are compared and the ROCOF that has a greater likelihood is selected for the pipe of interest. The effects of the social costs of a pipe break on the optimal replacement time are also discussed.

An OpenAPI based Security Framework for Privacy Protection in Social Network Service Environment (소셜 네트워크 서비스 환경에서 개인정보보호를 위한 OpenAPI기반 보안 프레임워크)

  • Yoon, Yongseok;Kim, Kangseok;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1293-1300
    • /
    • 2012
  • With the rapid evolution of mobile devices and the development of wireless networks, users of mobile social network service on smartphone have been increasing. Also the security of personal information as a result of real-time communication and information-sharing are becoming a serious social issue. In this paper, a framework that can be linked with a social network services platform is designed using OpenAPI. In addition, we propose an authentication and detection mechanism to enhance the level of personal information security. The authentication scheme is based on an user ID and password, while the detection scheme analyzes user-designated input patterns to verify in advance whether personal information protection guidelines are met, enhancing the level of personal information security in a social network service environment. The effectiveness and validity of this study were confirmed through performance evaluations at the end.

Relationship of Family Strengths, Family Function, Ego-Identity and Depression in Adolescence (청소년이 지각한 가족 건강성, 가족 기능, 자아정체감과 우울과의 관계)

  • Bae, Kyung-Eui;Kim, Eun-Ha
    • Child Health Nursing Research
    • /
    • v.13 no.3
    • /
    • pp.357-366
    • /
    • 2007
  • Purpose: This study was conducted to survey and examine the relationship of family strengths, family function, ego-identity and depression in adolescence in Busan, and to provide basic data for a health promoting intervention to improve their family health. Method: Data were collected from four colleges in Busan and, 680 students were enrolled in the study. Descriptive statistics, t-test or ANOVA with Scheffe's test and Pearson's correlation coefficients were used to analyze the data. Results: The mean score for family strengths was 3.58, family function 4.31, ego-identity 55.4 and depression 17.9. The scores for family strengths differed significantly according to subjective social economic state and father's job, parent's religion, parent's marital status and family composition. The scores for family function differed significantly according to parent's religion, parent's marital status and subjective social economic state. The scores for ego-identity differed according to mother's education level, parent's religion, parent's marital status and family composition. There were a positive correlations between family strengths and family function, between family strengths and ego-identity, between family function and ego-identity. There were negative correlations between family strengths and depression, between family function and depression, between ego-identity and depression. Conclusion: In order to promote ego-identity and to decrease depression in adolescence, it is necessary to develop supporting interventions to develop family strengths.

  • PDF

Study on the Security Threat Factors of Social Network Services (소셜 네트워크 서비스의 보안 위협요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.115-121
    • /
    • 2019
  • Recently, as the use of smart devices is becoming more common, various and convenient services are being developed. Among these services, the Social Network Service(SNS) is easily accessible anywhere, anytime. In particular, as well as sharing information, it forms a social relationship in cyberspace to expand new connections, and the SNS account is used as an authentication means of other services to provide users with speed and convenience at all times. However, despite the many advantages of SNS, due to security vulnerabilities occurring in the interworking process with various services, accidents of personal information are constantly occurring, and it is urgent to prepare countermeasures against potential risk factors. It is a necessary situation. Therefore, in this paper, the use of SNS is expected to increase rapidly in the future, and it is expected that it will be used as the basic data for developing the countermeasures by learning the countermeasures according to the security threats of the SNS.

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure

  • Jung, Yong-Hoon;Roh, Jeong-Serk;Rhee, Sang-Burm
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1788-1793
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

The Novel Configuration for Building Energy System Including Build ins Microgrid (빌딩 마이크로그리드가 포함된 새로운 빌딩에너지 시스템 구축방향에 관한 연구)

  • Hong, Won-Pyo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.10a
    • /
    • pp.235-240
    • /
    • 2008
  • The recent development of efficient thermal prime movers for distributed generation id changing the focus of the production of electricity from large centralized power plants to local generation units scattered over the territory. The scientific communality is addressing the analysis and planning of the distributed energy resources(der) with wide spread approaches, taking into account technical, environmental, economical and social issues. The coupling of cogeneration system to absorption/electric chillers or heat pumps as well as the interactions with renewable sources, allow for setting up multi-generation systems for building cooling heating and power(BCHP) systems of different energy vectors such as electricity, heat(at different enthalpy levels), cooling power, hydrogen, various chemical substances and so forth. Adoption of the composite multi-generation systems may lead to significant benefits in term of higher efficiency, reduced $CO_2$ emissions and enhanced economy. This paper outlines the main aspects of the BCHP system framework, illistrating its characteristics and summarizing the relevant distributed multi-generation structures.

  • PDF

Linux Based Real Time Network Intrusion Detection, Protection, Management and Fault Tolerance Security System (리눅스 기반 실시간 네트워크 칩입탐지대응관리 및 감내시스템)

  • Lee, Mike Myung-Ok;Lee, Eun-Mi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2113-2116
    • /
    • 2003
  • 이 논문에서는 리눅스 기반VDPM(Virus Detection Protection Management)시스템을 제안하고 개발한 응용SW로 감지, 차단 및 관리 방법을 제시한다. 제안된 LVPM시스템은 첫째특정탐색 및 전체탐색 알고리듬에 의하여 개발된 VDPM시스템은 신종 바이러스까지 탐지하는 모든 종류의 바이러스 탐지(VDPM_hawkeye) 모듈, Virus첵크하는 감시 및 Virus첵크후 친정, 제거하는 방지(VDPM_medic)모듈, DB를 update하는 기능을 가지는 관리(VDPM_manager)모듈과 원격 DB관리 및 Virus결과 보고 기능 (VDPM_reporter) 모듈로 되어 있으며 지능적인 Virus방지 시스템, 둘째 네트워크 패킷을 분석하여 네트워크를 통한 침 바이러스 탐지 및 대응 시스템과 셋째 네트워크 패킷을 분석하여 네트워치를 통한 네트워크형 악성 소프트웨어 대응 시스템을 포함한 바이러스 보호 통합 시스템을 구현하였다. 더불어 호스트와 네트웍기반의 통합적인 IDS가 방화벽(Firewall)시스템과 연동하여 IDS 단독 차단이 불가능한 공격을 차단하는 소프트웨어 시스템을 개발하는 것이며 관리자가 사용하기 쉬운 GUI환경으로 구현하였고 대규모 분산 네트워크 환경에서 효율적인 리눅스기반 침입탐지방지관리 솔루션을 제시한다.

  • PDF

A Method of User Mapping across Multiple Social Network Service (다중 소셜 네트워크 서비스 간에 사용자 연결 방법)

  • Kim, Seok-Hyun;Park, Jun-Bum;Cho, Jin-Man;Choi, Dae-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.427-430
    • /
    • 2014
  • 최근 온라인상에 공개된 정보에서 개인정보 노출 여부를 분석하고 노출된 개인정보에 대한 위험도를 평가하는 기술이 연구되고 있다. 이와 같은 연구를 위해서는 다양한 경로에서 수집되는 개인정보들에 대한 사용자 ID 연결이 먼저 이루어져야 한다. 그래서 본 논문에서는 페이스북과 트위터 사용자를 연결할 수 있는 방안을 제시하고, 그 성능을 분석했다. 총 5가지 정보에 대한 유사도 측정 실험을 진행하여 각각에 정보가 페이스북과 트위터 사용자를 연결하는데 미치는 영향력을 확인했다. 정보의 영향력은 지역(72.2%), 링크(52%), 이름(51.3%), 이미지(11%), 관계(1%) 순으로 확인되었다.

Open-Source-Based Distributed Social Network Service Using the Open ID (오픈 아이디를 이용한 오픈 소스 기반 분산형 소셜 네트워크 서비스)

  • Nam, Yoonho;Cho, SeungHyun;Mun, Jongho;Jung, Jaewook;Jeon, Woongryul;Won, Dongho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.538-540
    • /
    • 2013
  • 소셜 네트워크 서비스를 이용하는 사람들이 증가하면서, 프라이버시와 관련된 보안 문제들 또한 이슈가 되고 있다. 기존의 소셜 네트워크 서비스들은 일반적으로 중앙 집중형 구조를 가지고 있다. 서비스 사용자들의 기본적인 프로필 정보들은 서비스 제공자에게 수집되어 빅데이터를 이룬다. 이러한 빅데이터가 서비스 제공자 측면에서는 상업적인 용도로 사용되지만, 사용자 개인의 입장에서는 자신의 개인정보가 악의적인 목적으로 사용되는지 전혀 알 수가 없다. 따라서 서비스 제공자의 무분별한 정보 수집 문제를 해결하기 위해 원천적으로 중앙 집중형 구조를 제거하고, 기존의 포털사이트와의 연동을 통해 오픈 아이디로 이용 가능한 오픈 소스 기반 분산형 소셜 네트워크 서비스를 제안한다.