• Title/Summary/Keyword: User Information Needs

Search Result 1,266, Processing Time 0.035 seconds

PIRS : Personalized Information Retrieval System using Adaptive User Profiling and Real-time Filtering for Search Results (적응형 사용자 프로파일기법과 검색 결과에 대한 실시간 필터링을 이용한 개인화 정보검색 시스템)

  • Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.21-41
    • /
    • 2010
  • This paper proposes a system that can serve users with appropriate search results through real time filtering, and implemented adaptive user profiling based personalized information retrieval system(PIRS) using users' implicit feedbacks in order to deal with the problem of existing search systems such as Google or MSN that does not satisfy various user' personal search needs. One of the reasons that existing search systems hard to satisfy various user' personal needs is that it is not easy to recognize users' search intentions because of the uncertainty of search intentions. The uncertainty of search intentions means that users may want to different search results using the same query. For example, when a user inputs "java" query, the user may want to be retrieved "java" results as a computer programming language, a coffee of java, or a island of Indonesia. In other words, this uncertainty is due to ambiguity of search queries. Moreover, if the number of the used words for a query is fewer, this uncertainty will be more increased. Real-time filtering for search results returns only those results that belong to user-selected domain for a given query. Although it looks similar to a general directory search, it is different in that the search is executed for all web documents rather than sites, and each document in the search results is classified into the given domain in real time. By applying information filtering using real time directory classifying technology for search results to personalization, the number of delivering results to users is effectively decreased, and the satisfaction for the results is improved. In this paper, a user preference profile has a hierarchical structure, and consists of domains, used queries, and selected documents. Because the hierarchy structure of user preference profile can apply the context when users perfomed search, the structure is able to deal with the uncertainty of user intentions, when search is carried out, the intention may differ according to the context such as time or place for the same query. Furthermore, this structure is able to more effectively track web documents search behaviors of a user for each domain, and timely recognize the changes of user intentions. An IP address of each device was used to identify each user, and the user preference profile is continuously updated based on the observed user behaviors for search results. Also, we measured user satisfaction for search results by observing the user behaviors for the selected search result. Our proposed system automatically recognizes user preferences by using implicit feedbacks from users such as staying time on the selected search result and the exit condition from the page, and dynamically updates their preferences. Whenever search is performed by a user, our system finds the user preference profile for the given IP address, and if the file is not exist then a new user preference profile is created in the server, otherwise the file is updated with the transmitted information. If the file is not exist in the server, the system provides Google' results to users, and the reflection value is increased/decreased whenever user search. We carried out some experiments to evaluate the performance of adaptive user preference profile technique and real time filtering, and the results are satisfactory. According to our experimental results, participants are satisfied with average 4.7 documents in the top 10 search list by using adaptive user preference profile technique with real time filtering, and this result shows that our method outperforms Google's by 23.2%.

A security method for Gatekeeper based on Digital Authentication by H.235

  • Hwang Seon Cheol;Han Seung Soo;Lee Jun Young;Choi Jun Rim
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.759-763
    • /
    • 2004
  • While the needs for VoIPs(Voice over IP) encourage the commercial trials for VoIP services, there are many problems such as user authentication, blocking of illegal user and eavesdropping. In this paper, a management algorithm of registration of VoIP terminals is explained and security methods for tolling and data encryption module is designed and built up. The module structure will have the advantages of the entire development of secured gatekeeper without whole modification of gatekeeper. In order to secure the ordinary gatekeeper based on H.323 standard, user authentication and data encryption technologies are developed based on the H.235 standard and simply located over the plain H.323 stacks. The data structures for secured communications are implemented according to ASN.1 structures by H.235.

  • PDF

User-centered multimedia design: The application of discount usability engineering (사용자 중심의 멀티미디어 설계: 할인 사용성 공학의 적용)

  • 임치환
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.41
    • /
    • pp.189-196
    • /
    • 1997
  • Multimedia systems present information by various media, for example, video, sound, music, animation, movie, etc., in addition to the text which has long been used for conveying the information. But using several media may cause users' confusion and poorly designed user interface often aggravate the situation. Hypermedia systems allow the retrieval and representation of multimedia information using navigation and browsing mechanisms. Typically, there are two major navigation problems in a hypermedia compared to the ordinary user interface: disorientation and cognitive overload. In this study, the multimedia system was studied from the viewpoint of usability. Practical usability evaluation needs cost-effective, low-skill, and low- investment methods. The 'discount usability engineering' method, one of these methods, is based on the use of the following techniques: scenarios, simplified thinking aloud, and heuristic evaluation. The discount usability engineering method was applied to the usability evaluation of multimedia CD-ROM title.

  • PDF

A Study on Satisfaction of the Academic Library User Service (대학도서관의 이용자 만족도에 관한 연구)

  • You Yang-Keun
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.3
    • /
    • pp.189-211
    • /
    • 2005
  • The purpose of this study is identify users satisfaction for an academic library in order to investigate problems in academic library management and to create library development strategies. This study, also, includes relative functions between academic education and academic libraries. Research method for this study is occupied a survey for undergraduate students in K University Results of the survey can be regarded as users needs and can used for fundamental data and an assessment measure in order to develop an academic library operation plan.

  • PDF

Using Fuzzy Rating Information for Collaborative Filtering-based Recommender Systems

  • Lee, Soojung
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.42-48
    • /
    • 2020
  • These days people are overwhelmed by information on the Internet thus searching for useful information becomes burdensome, often failing to acquire some in a reasonable time. Recommender systems are indispensable to fulfill such user needs through many practical commercial sites. This study proposes a novel similarity measure for user-based collaborative filtering which is a most popular technique for recommender systems. Compared to existing similarity measures, the main advantages of the suggested measure are that it takes all the ratings given by users into account for computing similarity, thus relieving the inherent data sparsity problem and that it reflects the uncertainty or vagueness of user ratings through fuzzy logic. Performance of the proposed measure is examined by conducting extensive experiments. It is found that it demonstrates superiority over previous relevant measures in terms of major quality metrics.

The End User Computing Strategy of Using Excel VBA in Promoting Nursing Informatics in Taiwan

  • Chang, Polun;Hsu, Chiao-Ling;Hou, I-Ching;Tu, Ming Hsiang;Liu, Che-Wei
    • Perspectives in Nursing Science
    • /
    • v.5 no.1
    • /
    • pp.45-58
    • /
    • 2008
  • The nursing informatics has been booming in Taiwan since 2003 when we started to use the end user computing strategy to promote it. We used Excel 2003, which was well known and used by our clinical nurses, as well as the embedded VBA to teach them how simple information applications could and should be built to meet their information management needs in order to support their professional responsibility. Many cost-effective projects were successfully done and the importance and potentials of nursing informatics started to be noticed. Our training strategy and materials are introduced in this paper.

  • PDF

A Study on Information Science : A Service Perspective (정보학의 서비스 영역에 대한 연구)

  • 구본영;박미영
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.1
    • /
    • pp.351-378
    • /
    • 2003
  • This study has been examined in information service in related aspect of its user. Also this subject is researching of information itself attribution and relationship with end user And, in information facilities of library and information center it has been studied how to develope satisfaction service for user, along with fur causing both theory and practical application. For this object it has been also reviewed theoretically through out 5 fields as below; 1) information need and using 2) information storage and retrieval 3) information property and value 4) bibliometrics and citation analysis 5) administration and management.

  • PDF

User Requirement Elicitation for U-City Residential Environment : Concentrated on Smart Home Service (U-City 주거 환경 서비스의 사용자 가치 분석 : 스마트 홈을 중심으로)

  • Kim, Hyang Sook;Kim, Hyo Chang;Ji, Yong Gu
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.167-182
    • /
    • 2015
  • The concept of Smart home is receiving a huge attention as a future living environment because of its advantages for elderly and disabled to maintain their quality of life. Smart home is a place equipped with integration of technology and services and closely intertwined with occupant's lifestyle. Therefore it is critical to consider the user's actual needs for ensuring satisfaction. However despite growing researches on user values for smart home, there have been few studies clearly categorizing smart home service and stating user values depending on characteristics of service. Thus, the aim of this research is to classify smart home services on user's perspective, and reveal user values for each smart home services. Through the in-depth literature review, we elicited technology-related user values and service-related user values, and state classification for smart home service. Also the relationship between user values and each smart home services were revealed. The results of this research should help to reflect user's actual needs for designing smart home services.

A Design Information Security Attributes of for Meta-Information System (메타정보체계를 위한 정보보호 속성의 설계)

  • 전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.53-62
    • /
    • 1999
  • The rapid growth of Internet supports a base that share useful information. It needs for mass of information that requires a fast processing capability. It needs a meta0information system. Meta-information system supports fast search service but occurs a problem in case of information security. In this paper we propose a information security attribute that are user access control for meta-information system to solve the problem.

Convenient User Authentication Mechanism Using only User Identification (사용자 ID만을 활용한 간편한 사용자 인증 방안)

  • Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.501-508
    • /
    • 2015
  • Most web sites, information systems use the ID/Password technique to identify and authenticate users. But ID/Password technique is vulnerable to security. The user must remember the ID/Password and, the password should include alphabets, numbers, and special characters, not to be predicted easily. User also needs to change your password periodically. In this paper, we propose the user authentication method that the user authentication information stored in the external storage to authenticate a user. If another person knows the ID/Password, he can't log in a system without the external storage. Whenever a user logs in a system, authentication information is generated, and is stored in the external storage. Therefore, the proposed user authentication method is the traditional ID/Password security technique, but it enhances security and, increases user convenience.