• Title/Summary/Keyword: Web application analysis

Search Result 604, Processing Time 0.027 seconds

Finding high utility old itemsets in web-click streams (웹 클릭 스트림에서 고유용 과거 정보 탐색)

  • Chang, Joong-Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.521-528
    • /
    • 2016
  • Web-based services are used widely in many computer application fields due to the increasing use of PCs and mobile devices. Accordingly, topics on the analysis of access logs generated in the application fields have been researched actively to support personalized services in the field, and analyzing techniques based on the weight differentiation of information in access logs have been proposed. This paper outlines an analysis technique for web-click streams, which is useful for finding high utility old item sets in web-click streams, whose data elements are generated at a rapid rate. Using the technique, interesting information can be found, which is difficult to find in conventional techniques for analyzing web-click streams and is used effectively in target marketing. The proposed technique can be adapted widely to analyzing the data generated in a range of computing application fields, such as IoT environments, bio-informatics, etc., which generated data as a form of data streams.

A Study of Development of Diagnostic System for Web Application Vulnerabilities focused on Injection Flaws (Injection Flaws를 중심으로 한 웹 애플리케이션 취약점 진단시스템 개발)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.99-106
    • /
    • 2012
  • Today, the typical web hacking attacks are cross-site scripting(XSS) attacks, injection vulnerabilities, malicious file execution and insecure direct object reference included. Web hacking security systems, access control solutions, access only to the web service and flow inside but do not control the packet. So you have been illegally modified to pass the packet even if the packet is considered as a unnormal packet. The defense system is to fail to appropriate controls. Therefore, in order to ensure a successful web services diagnostic system development is necessary. Web application diagnostic system is real and urgent need and alternative. The diagnostic system development process mu st be carried out step of established diagnostic systems, diagnostic scoping web system vulnerabilities, web application, analysis, security vulnerability assessment and selecting items. And diagnostic system as required by the web system environment using tools, programming languages, interfaces, parameters must be set.

A Study on Application of Web-based System for Street Fashion Design Analysis II - focused on applying fashion image data from Gyeong-Nam Area in 2004 F/W - (스트리트 패션디자인분석(分析)을 위한 웹 기반(基盤)시스템(Web-SFAS) 활용 연구(活用 硏究) II - 2004 F/W 경남지역(慶南地域) 스트리트 패션 이미지데이터 적용(適用)을 중심(中心)으로 -)

  • Park, Hye-Won;Lee, Hyun-Young
    • Journal of Fashion Business
    • /
    • v.10 no.2
    • /
    • pp.60-82
    • /
    • 2006
  • The purpose of this study was to confirm and practical use the street fashion design analysis system(Web-SFAS) which was designed in preceding research. Web-SFAS was developed to analyze data fast, accurately, conveniently, and to provide them to related fields by using Information Technology (IT) in fashion design industry. By inputting, sorting and analyzing actual image data into this system, it purposes to check if it needs to be corrected and to verify its operation and application. For this study, 191 street fashion image and paper questionaries were collected on Oct. 16th from 4pm to 7pm in Gyeong-Nam area(4 markets), 2004. This study was processed basically cross research(real time research). The collected data and paper questionaries were analysed by 4 experts who had over Master Degrees, and the results were input to the Web-SFAS system. This system analyzed the results as follow ; First, Top is usually wear T-shirts, cardigan item of soft material, Bottom is usually wear Skirt, jean item of hard material. Second, As for shoes, pumps were the most popular, and as for accessories, diverse items such as shoulder bag, jewelry, and totebag were preferred. Third, fashion image, most people wear a sportive casual style with semi-casual in a close second. Therefore, We also expect that this data can be used a prediction for the next seasons design trends and needs, especially if we make an online database through this development system, then it will be easier to access faster and more accurate fashion information.

Case Study to Setup Web-Service Strategy of National Wind Atlas (해외사례 분석을 통한 국가바람지도 웹서비스 전략수립)

  • Kim, Hyun-Goo;Hwang, Hyo-Jung
    • New & Renewable Energy
    • /
    • v.5 no.4
    • /
    • pp.3-8
    • /
    • 2009
  • This global case study pursues diversification and intensification for an application system of the national wind atlas which has been developed to support national strategy building and promotion of wind energy dissemination. We chose nine counties' national wind atlas and compared their map area, extraction height, temporal and spatial resolutions, download services, etc. to derive a best practice for the Korea wind atlas application system. Therefore, the web service content is designed to offer high-resolution height information of which covers wind turbine rotor sweeping area and time-series dataset which can be downloaded for further analysis by users. It is anticipated that the system and web service would contribute greatly to wind energy policy making, business and research sectors.

  • PDF

Research on AI Painting Generation Technology Based on the [Stable Diffusion]

  • Chenghao Wang;Jeanhun Chung
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.90-95
    • /
    • 2023
  • With the rapid development of deep learning and artificial intelligence, generative models have achieved remarkable success in the field of image generation. By combining the stable diffusion method with Web UI technology, a novel solution is provided for the application of AI painting generation. The application prospects of this technology are very broad and can be applied to multiple fields, such as digital art, concept design, game development, and more. Furthermore, the platform based on Web UI facilitates user operations, making the technology more easily applicable to practical scenarios. This paper introduces the basic principles of Stable Diffusion Web UI technology. This technique utilizes the stability of diffusion processes to improve the output quality of generative models. By gradually introducing noise during the generation process, the model can generate smoother and more coherent images. Additionally, the analysis of different model types and applications within Stable Diffusion Web UI provides creators with a more comprehensive understanding, offering valuable insights for fields such as artistic creation and design.

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

Comparative Analysis of Internet-based Business Strategy of Leading Companies in Korea, U.S., and Japan (한.미.일 3국 기업들의 인터넷 활용전략 비교분석)

  • 강현석;서영호;채영일
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.3
    • /
    • pp.7-20
    • /
    • 2000
  • Many organizations have developed their own information systems not only for internal efficiency but also for effectiveness of external customer services. The infusion of powerful information networks into business environments is beginning to have a profound impact on the nature of governance between buyers and sellers in the market place. One of the most effective service tools for their customers is the use of information technology. The web technology is rapidly becoming one of the most effective online customer service tools toward strategic competitive advantage. In order to gain competitive edge, organizations must have effective web sites for customer services. A study on web service development phase has been conducted and present states of web usages by Korean, US., Japanese companies are surveyed. Cases of business web sites are empirically analyzed in order to compare the different levels of web site application in three countries. Conclusively, countries with longer experience with internet has more advanced level of web application such as business transaction and internet process innovation. In order to support effective web site planning, organizations have to understand their current position in Internet application and form strategies for e-business.

  • PDF

Text Extraction In WWW Images (웹 영상에 포함된 문자 영역의 추출)

  • 김상현;심재창;김중수
    • Proceedings of the IEEK Conference
    • /
    • 2000.06d
    • /
    • pp.15-18
    • /
    • 2000
  • In this paper, we propose a method for text extraction in the Web images. Our approach is based on contrast detecting and pixel component ratio analysis in mouse position. Extracted data with OCR can be used for real time dictionary call or language translation application in Web browser.

  • PDF

Implementation of WebGIS for Integration of GIS Spatial Analysis and Social Network Analysis (GIS 공간분석과 소셜 네트워크 분석의 통합을 위한 WebGIS 구현)

  • Choi, Hyo-Seok;Yom, Jae-Hong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.2
    • /
    • pp.95-107
    • /
    • 2014
  • In general, topographical phenomena are represented graphically by data in the spatial domain, while attributes of the non-spatial domain are expressed by alpha-numeric texts. GIS functions for analysis of attributes in the non-spatial domain remain quite simple, such as search methods and simple statistical analysis. Recently, graph modeling and network analysis of social phenomena are commonly used for understanding various social events and phenomena. In this study, we applied the network analysis functions to the non-spatial domain data of GIS to enhance the overall spatial analysis. For this purpose, a novel design was presented to integrate the spatial database and the graph database, and this design was then implemented into a WebGIS system for better decision makings. The developed WebGIS with underlying synchronized databases, was tested in a simulated application about the selection of water supply households during an epidemic of the foot-and-mouse disease. The results of this test indicate that the developed WebGIS can contribute to improved decisions by taking into account the social proximity factors as well as geospatial factors.

Link-E-Param : A URL Parameter Encryption Technique for Improving Web Application Security (Link-E-Param : 웹 애플리케이션 보안 강화를 위한 URL 파라미터 암호화 기법)

  • Lim, Deok-Byung;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1073-1081
    • /
    • 2011
  • An URL parameter can hold some information that is confidential or vulnerable to illegitimate tampering. We propose Link-E-Param(Link with Encrypted Parameters) to protect the whole URL parameter names as well as their values. Unlike other techniques concealing only some of the URL parameters, it will successfully discourage attacks based on URL analysis to steal secret information on the Web sites. We implement Link-E-Param in the form of a servlet filter to be deployed on any Java Web server by simply copying a jar file and setting a few configuration values. Thus it can be used for any existing Web application without modifying the application. It also supports numerous encryption algorithms to choose from. Experiments show that our implementation induces only 2~3% increase in user response time due to encryption and decryption, which is deemed acceptable.