• Title/Summary/Keyword: User data

Search Result 8,969, Processing Time 0.034 seconds

Metaverse Platform Customer Review Analysis Using Text Mining Techniques (텍스트 마이닝 기법을 활용한 메타버스 플랫폼 고객 리뷰 분석)

  • Hye Jin Kim;Jung Seung Lee;Soo Kyung Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.1
    • /
    • pp.113-122
    • /
    • 2024
  • This comprehensive study delves into the analysis of user review data across various metaverse platforms, employing advanced text mining techniques such as TF-IDF and Word2Vec to gain insights into user perceptions. The primary objective is to uncover the factors that contribute to user satisfaction and dissatisfaction, thereby providing a nuanced understanding of user experiences in the metaverse. Through TF-IDF analysis, the research identifies key words and phrases frequently mentioned in user reviews, highlighting aspects that resonate positively with users, such as the ability to engage in creative activities and social interactions within these virtual environments. Word2Vec analysis further enriches this understanding by revealing the contextual relationships between words, offering a deeper insight into user sentiments and the specific features that enhance their engagement with the platforms. A significant finding of this study is the identification of common grievances among users, particularly related to the processes of refunds and login, which point to broader issues within payment systems and user interface designs across platforms. These insights are critical for developers and operators of metaverse platforms, suggesting a focused approach towards enhancing user experiences by amplifying positive aspects. The research underscores the importance of continuous improvement in user interface design and the transparency of payment systems to foster a loyal user base. By providing a comprehensive analysis of user reviews, this study offers valuable guidance for the strategic development and optimization of metaverse platforms, ensuring they remain responsive to user needs and continue to evolve as vibrant, engaging virtual environments.

Implementation of Wireless Network simulator considering a User's Call Characteristics (사용자 통화 특성을 고려한 무선 네트워크 시뮬레이터 구현)

  • Yoon, Young Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.107-115
    • /
    • 2009
  • Traditionally, simulation method is used to test and evaluate the performance of communication protocol or functional elements for mobile communication service. In this paper, wireless network simulator is implemented using the C++ object-oriented programming language. This simulator can simulate wireless data services, like as ad-hoc networks, by considering the user's mobility. In this paper, the simulator includes network traffic model to reflect wireless data service and traffic source model to represent a user's mobility similar to real service environment and traffic characteristics can be reflected on the simulation, and also more accurate simulation results can be got through that. In addition, by using object-oriented techniques, new service feature or environment can be easily added or changed so that the developed mobile communication simulator can reflect the real service environment all the time. This simulator can be used in adjusting the characteristics of wireless data hosts following the mobility of the user, and also can be used in building new wireless ad-hoc network routing protocols.

Development of Real-Time Forecasting and Management System for the Youngsan Estuary Dam (영산강 하구둑 실시간 홍수예보 및 관리시스템 개발)

  • Kang, Min-Goo;Park, Seung-Woo;Her, Young-Gu;Park, Chang-Eun;Kang, Moon-Sung
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2002.10a
    • /
    • pp.285-288
    • /
    • 2002
  • For real-time flood forecasting and effective control flood at the Youngsan estuary dam, the Flood Forecasting and Control User Interface System II (FFCUS II) has been developed. This paper describes the features and application of FFCUS II. FFCUS II is composed of the database management subsystem, the model subsystem, and the graphic user interface. The database management subsyem collects rainfall data and stream flow data, updates, processes, and searches the data. The model subsystem predicts the inflow hydrograph, the tide, forecasts flood hydrograph, and simulates the release rate from the sluice gates. The graphic user interface subsystem aids the user's decision-making process by displaying the operation results of the database management subsystem and model subsystem.

  • PDF

Analyses of Enhancement of Authentication Mechanism for Security and Privacy Under Healthcare System With RFID Application (RFID를 이용한 헬스시스템에서의 정보보안 향상을 인증 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.154-156
    • /
    • 2012
  • This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks, where wireless medical sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals (e.g., doctors, nurses, and surgeons). Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we have proposed a user1 authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor professionals authentication (user authentication), where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF

Throughput of Coded DS CDMA/Unslotted ALOHA Networks with Variable Length Data Traffic and Two User Classes in Rayleigh Fading FSMC Model

  • Tseng, Shu-Ming;Chiang, Li-Hsin;Wang, Yung-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4324-4342
    • /
    • 2014
  • Previous papers analyzed the throughput performance of the CDMA ALOHA system in Rayleigh fading channel, but they assume that the channel coefficient of Rayleigh fading was the same in the whole packet, which is not realistic. We recently proposed the finite-state Markov channel (FSMC) model to the throughput analysis of DS uncoded CDMA/unslotted ALOHA networks for fixed length data traffic in the mobile environment. We now propose the FSMC model to the throughput analysis of coded DS CDMA/unslotted ALOHA networks with variable length data traffic and one or two user classes in the mobile environment. The proposed DS CDMA/unslotted ALOHA wireless networks for two user classes with access control can maintain maximum throughput for the high priority user class under high message arrival per packet duration.

Data mining approach to predicting user's past location

  • Lee, Eun Min;Lee, Kun Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.97-104
    • /
    • 2017
  • Location prediction has been successfully utilized to provide high quality of location-based services to customers in many applications. In its usual form, the conventional type of location prediction is to predict future locations based on user's past movement history. However, as location prediction needs are expanded into much complicated cases, it becomes necessary quite frequently to make inference on the locations that target user visited in the past. Typical cases include the identification of locations that infectious disease carriers may have visited before, and crime suspects may have dropped by on a certain day at a specific time-band. Therefore, primary goal of this study is to predict locations that users visited in the past. Information used for this purpose include user's demographic information and movement histories. Data mining classifiers such as Bayesian network, neural network, support vector machine, decision tree were adopted to analyze 6868 contextual dataset and compare classifiers' performance. Results show that general Bayesian network is the most robust classifier.

Predicting User Attitude Based On Smartphone Usage (스마트 폰 사용에 따른 사용자의 태도 예측)

  • Sokasane, Rajashree S.;Kim, Kyungbaek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.1136-1138
    • /
    • 2014
  • Recently, predicting personality with the help of smartphone usage is become very interesting and attention grabbing topic in the field of research. At present there are some approaches towards detecting a user's personality which uses the smartphones usage data, such as call detail records (CDRs), the usage of short message services (SMSs) and the usage of social networking services application. In this paper, we focus on the predicting user attitude based on MBTI theory by using their smartphone usage data. We used Naïve Bayes and SVM classifier for classifying user personalities by extracting some features from smartphone usage data. From analysis it is observed that, SVM classifier works well as compared to Naïve Bayes.

Efficient Channel Selection Using User Meta Data (사용자 메타데이터를 이용한 효율적인 채널 선택 기법)

  • 오상욱;최만석;조소연;문영식;설상훈
    • Journal of Broadcast Engineering
    • /
    • v.7 no.2
    • /
    • pp.88-95
    • /
    • 2002
  • According to an evolution of digital broadcasting, it is possible that terrestrial and satellite broadcasting media provide multi-channel services. CATV and satellite media have been also extended to hundreds of channels. As the result of channel expanding, viewers came to select lots of channels. But it is difficult that they select the favorite channel among hundreds of channels. In this paper, we propose an efficient automatic method to recommend channels and programs on a viewer's preference in a multi-channel broadcasting receiver like a Set ToP Box(STB). The proposed algorithm selects channels based on the following method. It makes and saves user history data by using MPEG-7 MDS based on the program information a viewer had watched. It recommends programs similar to a viewer's preference based on user history data. It selects the channel in the recommended genre based on the viewer's channel preference. The experimental result shows that the proposed scheme is efficient to select the user preference channel.

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

System and method for detecting gas using smart-phone (스마트폰을 이용한 가스검출시스템 및 검출 방법연구)

  • Bang, Yong-Ki;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.2
    • /
    • pp.129-137
    • /
    • 2015
  • This study is in regard to the gas detection system and gas detection method utilizing smart phone. This study includes; 1) the sensor module attached to the smart phone to detect and measure flammable gas or toxic gas; and 2) gas detection APP which is installed inside the smart phone and recognizes the user information and location information automatically by reading RFID tag indicating the user or the location to detect gas through the contact area where RFID and blue tooth reader is installed inside of the above mentioned smart phone, and then measures the combustible gas or toxic gas by operating above mentioned sensor module and obtains the data thus measured, and above mentioned smart phone is characterized by its transmission of the above mentioned user information, location information and measured data which are obtained by above mentioned gas detecting APP to operation server via communication network. With this, reliability for the location detecting gas by the user, the result of the measurement, etc. can be secured. Furthermore, this provides the effect of preventing artificial manipulation at the time of input which is associated with the identification of the user to be measured by utilizing removable sensor module and application or the mistake resulted from wrong input by the user. In addition, by transmitting the measured data from the sensor module carrying out gas detection to operation server, this provides the effect of making it possible to process the data thus collected to a specialized data for combustible gas or toxic gas.