• Title/Summary/Keyword: User data

Search Result 8,969, Processing Time 0.034 seconds

The measurement temperature and analysis used embedded system by internet explorer (인터넷 익스플로러를 통한 임베디드 시스템 기반의 온도 측정 및 분석)

  • 김희식;김영일;설대연;남철
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.1003-1006
    • /
    • 2004
  • In this paper have developed a system for monitoring and processing the real time sensor data in remote site through network. For realizing this system, measurement equipment and protocol are used to transmit the measurement data to remote server and to process measurement data. In server part, the received data from remote site sensor is converted to text or graphic charts for user. The measurement device in sensor part receives the sensor data form sensor and store the received data to its internal memory for transmitting data to server part through Internet. Also the measurement device can receive data form server. The temperature sensor is connected to the measurement device located in laboratory and the measurement device measures temperature of laboratory which can be confirmed by user through Internet. We have developed a server programworking on the Linux to store measurement data from measurement device to server memory. The program is use for SNMP(Simple Network Management Protocol) to exchange data with measurement device. Also the program changes the measurement data into text and graphic charts for user display. The program is use apache PHP program for user display and inquiry. The real time temperature measurement system can be apply for many parts of industry and living.

  • PDF

Design of User Data Management System for Grid Service (그리드 서비스를 위한 사용자 데이터 관리 시스템 설계)

  • Oh, Young-Ju;Kim, Beob-Kyun;An, Dong-Un;Chung, Seung-Jong
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.224-226
    • /
    • 2005
  • Grid computing enables the fundamental computing shift from a localized resource computing model to a fully-distributed virtual organization with shared resources. In the grid computing environment, grid users usually get access rights by mapping their credential to local account. The mapped total account is temporally belongs to grid user. So, data on the secondary storage, which is produced by grid operation, can increase the load of system administration or can issue grid user's privacy. In this paper, we design a data management system for grid user to cover these problems. This system implements template account mechanism and manages local grid data.

  • PDF

Discernment of Android User Interaction Data Distribution Using Deep Learning

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.143-148
    • /
    • 2022
  • In this paper, we employ deep neural network (DNN) to discern Android user interaction data distribution from artificial data distribution. We utilize real Android user interaction trace dataset collected from [1] to evaluate our DNN design. In particular, we use sequential model with 4 dense hidden layers and 1 dense output layer in TensorFlow and Keras. We also deploy sigmoid activation function for a dense output layer with 1 neuron and ReLU activation function for each dense hidden layer with 32 neurons. Our evaluation shows that our DNN design fulfills high test accuracy of at least 0.9955 and low test loss of at most 0.0116 in all cases of artificial data distributions.

Knowledge Recommendation Based on Dual Channel Hypergraph Convolution

  • Yue Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.2903-2923
    • /
    • 2023
  • Knowledge recommendation is a type of recommendation system that recommends knowledge content to users in order to satisfy their needs. Although using graph neural networks to extract data features is an effective method for solving the recommendation problem, there is information loss when modeling real-world problems because an edge in a graph structure can only be associated with two nodes. Because one super-edge in the hypergraph structure can be connected with several nodes and the effectiveness of knowledge graph for knowledge expression, a dual-channel hypergraph convolutional neural network model (DCHC) based on hypergraph structure and knowledge graph is proposed. The model divides user data and knowledge data into user subhypergraph and knowledge subhypergraph, respectively, and extracts user data features by dual-channel hypergraph convolution and knowledge data features by combining with knowledge graph technology, and finally generates recommendation results based on the obtained user embedding and knowledge embedding. The performance of DCHC model is higher than the comparative model under AUC and F1 evaluation indicators, comparative experiments with the baseline also demonstrate the validity of DCHC model.

Adaptive Recommendation System for Tourism by Personality Type Using Deep Learning

  • Jeong, Chi-Seo;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • Adaptive recommendation systems have been developed with big data processing as a system that provides services tailored to users based on user information and usage patterns. Deep learning can be used in these adaptive recommendation systems to handle big data, providing more efficient user-friendly recommendation services. In this paper, we propose a system that uses deep learning to categorize and recommend tourism types to suit the user's personality. The system was divided into three layers according to its core role to increase efficiency and facilitate maintenance. Each layer consists of the Service Provisioning Layer that real users encounter, the Recommendation Service Layer, which provides recommended services based on user information entered, and the Adaptive Definition Layer, which learns the types of tourism suitable for personality types. The proposed system is highly scalable because it provides services using deep learning, and the adaptive recommendation system connects the user's personality type and tourism type to deliver the data to the user in a flexible manner.

Learning Context Awareness Model based on User Feedback for Smart Home Service

  • Kwon, Seongcheol;Kim, Seyoung;Ryu, Kwang Ryel
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.17-29
    • /
    • 2017
  • IRecently, researches on the recognition of indoor user situations through various sensors in a smart home environment are under way. In this paper, the case study was conducted to determine the operation of the robot vacuum cleaner by inferring the user 's indoor situation through the operation of home appliances, because the indoor situation greatly affects the operation of home appliances. In order to collect learning data for indoor situation awareness model learning, we received feedbacks from user when there was a mistake about the cleaning situation. In this paper, we propose a semi-supervised learning method using user feedback data. When we receive a user feedback, we search for the labels of unlabeled data that most fit the feedbacks collected through genetic algorithm, and use this data to learn the model. In order to verify the performance of the proposed algorithm, we performed a comparison experiments with other learning algorithms in the same environment and confirmed that the performance of the proposed algorithm is better than the other algorithms.

A Study on Public Libraries' User Behaviors Based upon Circulation Data in Gangseo and Yangcheon Region (대출기록을 통해 본 공공도서관 이용자 연구 - 강서·양천지역을 중심으로 -)

  • Heo, Sun;Chung, Yeon Kyoung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.187-207
    • /
    • 2014
  • Public library user studies are required for better services and circulation records can be used as specific library data to identify common user patterns of the libraries. This study examined 754,198 of circulation data set - number of users, frequencies of circulation, volume of time of circulation and etc. The results of this study indicate the possibility of using circulation data to analyze the usage patterns in public libraries and to provide major types of users, collections, time of circulation, and common library user behaviors for better public library services.

User Authentication Based on Keystroke Dynamics of Free Text and One-Class Classifiers (자유로운 문자열의 키스트로크 다이나믹스와 일범주 분류기를 활용한 사용자 인증)

  • Seo, Dongmin;Kang, Pilsung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.4
    • /
    • pp.280-289
    • /
    • 2016
  • User authentication is an important issue on computer network systems. Most of the current computer network systems use the ID-password string match as the primary user authentication method. However, in password-based authentication, whoever acquires the password of a valid user can access the system without any restrictions. In this paper, we present a keystroke dynamics-based user authentication to resolve limitations of the password-based authentication. Since most previous studies employed a fixed-length text as an input data, we aims at enhancing the authentication performance by combining four different variable creation methods from a variable-length free text as an input data. As authentication algorithms, four one-class classifiers are employed. We verify the proposed approach through an experiment based on actual keystroke data collected from 100 participants who provided more than 17,000 keystrokes for both Korean and English. The experimental results show that our proposed method significantly improve the authentication performance compared to the existing approaches.

An Unified Spatial Index and Visualization Method for the Trajectory and Grid Queries in Internet of Things

  • Han, Jinju;Na, Chul-Won;Lee, Dahee;Lee, Do-Hoon;On, Byung-Won;Lee, Ryong;Park, Min-Woo;Lee, Sang-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.83-95
    • /
    • 2019
  • Recently, a variety of IoT data is collected by attaching geosensors to many vehicles that are on the road. IoT data basically has time and space information and is composed of various data such as temperature, humidity, fine dust, Co2, etc. Although a certain sensor data can be retrieved using time, latitude and longitude, which are keys to the IoT data, advanced search engines for IoT data to handle high-level user queries are still limited. There is also a problem with searching large amounts of IoT data without generating indexes, which wastes a great deal of time through sequential scans. In this paper, we propose a unified spatial index model that handles both grid and trajectory queries using a cell-based space-filling curve method. also it presents a visualization method that helps user grasp intuitively. The Trajectory query is to aggregate the traffic of the trajectory cells passed by taxi on the road searched by the user. The grid query is to find the cells on the road searched by the user and to aggregate the fine dust. Based on the generated spatial index, the user interface quickly summarizes the trajectory and grid queries for specific road and all roads, and proposes a Web-based prototype system that can be analyzed intuitively through road and heat map visualization.

Secure Searchable Encryption with User-Revocability in Multi-User Settings (다자간 환경에서 사용자 탈퇴가 가능한 프라이버시 보호 키워드 검색 기법)

  • Kim, Dong-Min;Chun, Ji-Young;Noh, Geon-Tae;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.3-14
    • /
    • 2011
  • In recent days, people used to store and share the data with other users through the web storage services. It is more convenient for using the data, but it raise problems such as access control of stored data and privacy exposure to untrusted server. Searchable encryption is used to share the data securely in multi-user setting. Especially in the multi-user setting, the revoked users should not be able to search the data and access the stored data. That is, it should be considered the security from revoked users. However in the existing schemes, the revoked users can decrypt the shared data by passive attack. Proposed scheme is the secure searchable encryption that resolves the problem and guarantees the security for revoked users.