• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.033 seconds

The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve

  • Tan, Delin;Wang, Huajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3087-3103
    • /
    • 2022
  • Nearest neighbor query in location-based services has become a popular application. Aiming at the shortcomings of the privacy protection algorithms of traditional ciphertext nearest neighbor query having the high system overhead because of the usage of the double Hilbert curves and having the inaccurate query results in some special circumstances, a privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve has been proposed. This algorithm uses a single Hilbert curve to transform the two-dimensional coordinates of the points of interest into Hilbert values, and then encrypts them by the order preserving encryption scheme to obtain the one-dimensional ciphertext data which can be compared in numerical size. Then stores the points of interest as elements composed of index value and the ciphertext of the other information about the points of interest on the server-side database. When the user needs to use the nearest neighbor query, firstly calls the approximate nearest neighbor query algorithm proposed in this paper to query on the server-side database, and then obtains the approximate nearest neighbor query results. After that, the accurate nearest neighbor query result can be obtained by calling the precision processing algorithm proposed in this paper. The experimental results show that this privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve is not only feasible, but also optimizes the system overhead and the accuracy of ciphertext nearest neighbor query result.

Google Play Malware Detection based on Search Rank Fraud Approach

  • Fareena, N;Yogesh, C;Selvakumar, K;Sai Ramesh, L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3723-3737
    • /
    • 2022
  • Google Play is one of the largest Android phone app markets and it contains both free and paid apps. It provides a variety of categories for every target user who has different needs and purposes. The customer's rate every product based on their experience of apps and based on the average rating the position of an app in these arch varies. Fraudulent behaviors emerge in those apps which incorporate search rank maltreatment and malware proliferation. To distinguish the fraudulent behavior, a novel framework is structured that finds and uses follows left behind by fraudsters, to identify both malware and applications exposed to the search rank fraud method. This strategy correlates survey exercises and remarkably joins identified review relations with semantic and behavioral signals produced from Google Play application information, to distinguish dubious applications. The proposed model accomplishes 90% precision in grouping gathered informational indexes of malware, fakes, and authentic apps. It finds many fraudulent applications that right now avoid Google Bouncers recognition technology. It also helped the discovery of fake reviews using the reviewer relationship amount of reviews which are forced as positive reviews for each reviewed Google play the android app.

A Study of Query Processing Model to applied Meta Rule in 4-Level Layer based on Hybrid Databases (하이브리드 데이터베이스 기반의 4단계 레이어 계층구조에서 메타규칙을 적용한 질의어 수행 모델에 관한 연구)

  • Oh, Ryum-Duck
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.125-134
    • /
    • 2009
  • A biological data acquisition based on web has emerged as a powerful tool for allowing scientists to interactively view entries form different databases, and to navigate from one database to another molecular-biology database links. In this paper, the biological conceptual model is constructed hybrid biological data model to represent interesting entities in the data sources to applying navigation rule property for each biological data source based on four biological data integrating layers to control biological data. When some user's requests for application service are occurred, we can get the data from database and data source via web service. In this paper, we propose a query processing model and execution structure based on integrating data layers that can search information on biological data sources.

Over the Rainbow: How to Fly over with ChatGPT in Tourism

  • Taekyung Kim
    • Journal of Smart Tourism
    • /
    • v.3 no.1
    • /
    • pp.41-47
    • /
    • 2023
  • Tourism and hospitality have encountered significant changes in recent years as a result of the rapid development of information technology (IT). Customers now expect more expedient services and customized travel experiences, which has intensified competition among service providers. To meet these demands, businesses have adopted sophisticated IT applications such as ChatGPT, which enables real-time interaction with consumers and provides recommendations based on their preferences. This paper focuses on the AI support-prompt middleware system, which functions as a mediator between generative AI and human users, and discusses two operational rules associated with it. The first rule is the Information Processing Rule, which requires the middleware system to determine appropriate responses based on the context of the conversation using techniques for natural language processing. The second rule is the Information Presentation Rule, which requires the middleware system to choose an appropriate language style and conversational attitude based on the gravity of the topic or the conversational context. These rules are essential for guaranteeing that the middleware system can fathom user intent and respond appropriately in various conversational contexts. This study contributes to the planning and analysis of service design by deriving design rules for middleware systems to incorporate artificial intelligence into tourism services. By comprehending the operation of AI support-prompt middleware systems, service providers can design more effective and efficient AI-driven tourism services, thereby improving the customer experience and obtaining a market advantage.

What Affects Consumers' Attitude and Usage Intention of O2O Apps?: Integration of TAM, TPB, and Transaction Cost Theory

  • Won In Lee
    • Asia pacific journal of information systems
    • /
    • v.33 no.2
    • /
    • pp.298-317
    • /
    • 2023
  • This study is about the attitudes and intentions of consumers considering the usage of O2O application (app) under the COVID-19 situation. By integrating TAM and TPB as a theoretical background, we selected VPC (various product choice) and PII (product information intensity) as new functional external variables that have a positive effect on new system called O2O commerce. We also applied the transaction cost theory to investigate the obstacle of O2O business. We conducted a survey of consumers in large cities in the Korean market. As a result of this study, it was found that the more O2O app users recognized the influence of SN (subject norms), the more useful O2O app was, the more it led to a change in attitude and usage intention was positively significant. In addition, as the O2O app was easy to use and useful, and the SN was recognized, the user's attitude was positive. On the other hand, it was also found that the transaction cost that consumers have to pay had a negative effect on usage intention. Additionally, VPC and PII have been shown to positively influence on usefulness of O2O apps.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.

Agricultural Application of GIS: Establishment and Utilization of Horticultural Field Database (GIS의 농업적 활용: 원예단지의 DB구축 및 활용)

  • Shin, Young Chul;An, Sang Hyun;Park, Young Dal;Kim, Sun Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.2 no.2
    • /
    • pp.15-26
    • /
    • 1999
  • A horticultural field database system is constructed for the intelligent farm management using GIS. The database system include both spatial and attribute data of the GIS that can be used as useful information for the farmers every year. The result of the research is summarized as follow; First, the system provides the position, attributes and spatial data of the horticultural farm through AML. Second, the user interface that composed of a basic function menu and application menu is easy to use. Third, the method which applicated overlay and analysis would be need to manage farming data in this horticultural farm and to develop a dynamic decision support system interfaced with GIS.

  • PDF

A Study on the Library Services by 'Podcast' Information Communication Technology Based on Web 2.0 in USA (웹 2.0기반의 '팟캐스트' 정보통신기술을 이용한 미국의 도서관서비스에 관한 연구)

  • Jung, Jong-Kee
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.1
    • /
    • pp.99-120
    • /
    • 2010
  • The purpose of this study is to introduce the Podcast's concept, to perform the theoretical research of Podcast services based on Web 2.0, to analyze the application cases of Podcast for academic and public library services in USA, and to propose the proper application programs of Podcast in Korean academic & public libraries. As the results of this study, through the Podcast, the public libraries have served these : library & events introduction, user instruction, community news, special lecture, storytelling, library tour, etc, and the academic libraries have served these : special topic librarian introduction, special lectures, seminar, forum, addition to library tour. The results of this study will give the good examples for planning Podcast programs in Korean academic & public libraries.

  • PDF

A Study on the Design and Implementation of an Digital Evidence Collection Application on Windows based computer (윈도우 환경에서의 증거 수집 시스템 설계 및 구현에 관한 연구)

  • Lee, SeungWon;Roh, YoungSup;Han, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.57-67
    • /
    • 2013
  • Lately, intrusive incidents (including system hacking, viruses, worms, homepage alterations, and data leaks) have not involved the distribution of an virus or worm, but have been designed to acquire private information or trade secrets. Because an attacker uses advanced intelligence and attack techniques that conceal and alter data in a computer, the collector cannot trace the digital evidence of the attack. In an initial incident response first responser deals with the suspect or crime scene data that needs investigative leads quickly, in accordance with forensic process methodology that provides the identification of digital evidence in a systematic approach. In order to an effective initial response to first responders, this paper analyzes the collection data such as user usage profiles, chronology timeline, and internet data according to CFFPM(computer forensics field triage process model), proceeds to design, and implements a collection application to deploy the client/server architecture on the Windows based computer.

An Exploratory Study on the Measurement of ASP Service Quality in Small Firm (ASP 서비스 품질 측정에 관한 탐색적 연구: 소기업을 중심으로)

  • Kim, Sung-Hong
    • Information Systems Review
    • /
    • v.8 no.3
    • /
    • pp.175-200
    • /
    • 2006
  • Application service provider(ASP) model is emerging as a new form of application outsourcing. ASP model may be attractive for small companies and even some medium-sized companies because these companies lack appropriate resources and technical expertise to develop and operate their information system. However, studies of ASP model have so far been neglected. Service quality is argued to be a crucial success factor for ASP, but yet there is not an empirically validated instrument for measuring ASP service quality. Therefore, this paper aims to develop and test a model for measuring ASP service quality. In order to accomplish these, SERVQUAL that has developed in marketing area were adapted to the context of this study. The research sample was designed by randomly selecting 300 different companies from the database that listed up the small companies participating in "ASP based e-business project for small enterprises". 240 usable responses were received by interview. The results are that reliability and tangibility impact user performances and satisfaction more than any of the service quality dimensions.