• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.033 seconds

User Review Selection Method using Kano Model in Application Market (어플리케이션 마켓에서 카노 모델을 이용한 사용자 리뷰 선별 방법)

  • Kim, Neunghoe
    • Journal of Industrial Convergence
    • /
    • v.18 no.2
    • /
    • pp.95-100
    • /
    • 2020
  • Among the customer-oriented data used to comprehend the customer, the user review data has received much attention as it provides insights into customer opinion in a detailed and large-scale manner; many customers have come to rely upon and trust the user reviews. Many application developers are cognizant of the importance of user reviews, so they monitor and respond to these reviews. However, due to the absence of a systematic method, developers have been investing their time and money without clear correlation to the customer satisfaction. Therefore, this paper suggests a systematic method to select user reviews from the application market using the Kano Model that deals with customer satisfaction and service quality, thereby maximizing the customer satisfaction under the given time period and budget. This method is constructed in the following phases: the user review collection and requirement elicitation phase in which the developers collect user reviews from the application market and elicit requirements, the Kano Model application and selection phase in which the Kano Model is applied to the elicited requirements and selection occurs based on the quality type, and the stakeholder review and redefinition phase in which relevant personnel gather to review and redefine requirements from an internal perspective.

Implementation of Android application to judge the daily route deviation via the GPS information on smart phones (스마트폰의 GPS 정보를 이용한 일상 경로 이탈 판단 어플리케이션 구현)

  • Cha, Kyung-Ae;Hyun, Sung-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.3
    • /
    • pp.27-34
    • /
    • 2013
  • As smart phone is daily used by most people, various location-based applications have been developed. Moreover, it is increased the requirements of location-based services that utilize Google maps, GPS sensing information and etc.. In this paper, we develop a smart phone application providing notification services by detecting the daily route deviation. We develop the server system which receives GPS information gathering from user's smart phone and analyse the user's regular routes. With the results from the analyzation the GPS coordinates, the application on a smart phone detects the case of a breakaway from regular routes. And then it can inform automatically and immediately the designed person such as guardians of children or the old and the infirm of the route deviation so will be helpful to protect such person. This is one example of the effectiveness of the application. Moreover, the application is developed on the client-server framework, thus it is very useful to judge the user's daily route deviation in realtime by using the accumulated information on the corresponding DB. Finally we evaluated the proposed methods which had been implemented on smart phones and show the utilities of the application.

The Study of Implementation of Sign Board Receiving DARC for Vehicle 3. The Management of Sign Board Information (차량용 FM부가방송 수신 전광판의 구현에 관한 연구 3. 차량용 FM 부가방송 수신 전광판 시스템 정보 관리)

  • 최재석;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.8
    • /
    • pp.1181-1186
    • /
    • 2002
  • This system is controlled by PC application programs through USB interface. PC application programs make image files, user's files , sound files and option files. And these files are downloaded to external memory card of this system. The other PC application programs monitor status of DARC, GPS, LED module of this system. The PC application programs help user manage this system efficiently.

IU_AMDroid : An Integrated User Authority Manager Model for the Android Platform (안드로이드 플랫폼을 위한 통합적인 사용자 인증 관리 모델)

  • Nam, Choon-Sung;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.533-540
    • /
    • 2013
  • Currently, as the Android platform only supports single-user protection, it needs security solution for multi-users. Specially, it has to protect specific applications which have personal and financial information, and be available to support authority management for contents access. Thus, this paper proposes an integrated user authority manger model for the Android platform. It helps application authority which is capable to divide into three statuses: installation, execution, deletion with the help of information technology.

Extraction of User Preference for Hybrid Collaborative Filtering

  • Qing Li;Kim, Byeong-Man;Shin, Yoon-Sik;Lim, En-Ki
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.7-9
    • /
    • 2004
  • With the development of e-commerce and information access, recommender systems have become a popular technique to prune large information spaces so that users are directed toward those items that best meet their needs and preferences. In this paper, clustering technique is applied in the collaborative recommender framework to consider semantic contents available from the user profiles. We also suggest methods to construct user profiles from rating information and attributes of items to accommodate user preferences. Further, we show that the correct application of the semantic content information obtained from user profiles does enhance the effectiveness of collaborative recommendation.

  • PDF

Web Based Collaborative Application Form Agent System

  • Kim Seok-Soo
    • International Journal of Contents
    • /
    • v.1 no.1
    • /
    • pp.35-39
    • /
    • 2005
  • This research employs the intelligent application form agent to help people to locate the information they would want from Internet quickly. Based on Internet GUI environment, this user-friendly online application form program uses the agent concept to provide the customized, individual information to the users who registered their application form answers, to the extent of increasing the interest and participation of users. The system helps along with the decision making process, by quickening the information gathering process.

  • PDF

User proposal of web base requirement analysis process (웹 기반 요구분석 프로세스의 사용자 제안)

  • Na, Jong-Won;Chung, Chan-Ju;Lee, Sang-Beom
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.509-515
    • /
    • 2008
  • The requirement analysis which is clear essential important matter of the software development which is successful about demand of the user. Influences big in the software configuration which will be developed. With the development where existing the many softwares the Internet are sudden changed together in web base Web Application, complicated termination the demand of the user increases and many expense and manpower are becoming disturbance in development. However, So far Web Application about the justice of the development environment which is accurate is not becoming well. There is to development and stands but does not reflect the requirement of the user not to be able, the user became freely plan of the function which approaches information with difficult. This paper, Amended a software requirement analysis process, analyzed the method will be able to identify proposed a requirement.

  • PDF

User Behavior Based Web Attack Detection in the Face of Camouflage (정상 사용자로 위장한 웹 공격 탐지 목적의 사용자 행위 분석 기법)

  • Shin, MinSik;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.365-371
    • /
    • 2021
  • With the rapid growth in Internet users, web applications are becoming the main target of hackers. Most previous WAFs (Web Application Firewalls) target every single HTTP request packet rather than the overall behavior of the attacker, and are known to be difficult to detect new types of attacks. In this paper, we propose a web attack detection system based on user behavior using machine learning to detect attacks of unknown patterns. In order to define user behavior, we focus on features excluding areas where an attacker can camouflage as a normal user. The experimental results shows that by using the path and query information to define users' behaviors, best results for an accuracy of 99% with Decision forest.

Design and Implementation of a User-based Collaborative Filtering Application using Apache Mahout - based on MongoDB -

  • Lee, Junho;Joo, Kyungsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.89-95
    • /
    • 2018
  • It is not easy for the user to find the information that is appropriate for the user among the suddenly increasing information in recent years. One of the ways to help individuals make decisions in such a lot of information is the recommendation system. Although there are many recommendation methods for such recommendation systems, a representative method is collaborative filtering. In this paper, we design and implement the movie recommendation system on user-based collaborative filtering of apache mahout based on mongoDB. In addition, Pearson correlation coefficient is used as a method of measuring the similarity between users. We evaluate Precision and Recall using the MovieLens 100k dataset for performance evaluation.