• Title/Summary/Keyword: information overload

Search Result 530, Processing Time 0.043 seconds

A Study on Scientific Article Recommendation System with User Profile Applying TPIPF (TPIPF로 계산된 이용자프로파일을 적용한 논문추천시스템에 대한 연구)

  • Zhang, Lingling;Chang, Woo Kwon
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.1
    • /
    • pp.317-336
    • /
    • 2016
  • Nowadays users spend more time and effort to find what they want because of information overload. To solve the problem, scientific article recommendation system analyse users' needs and recommend them proper articles. However, most of the scientific article recommendation systems neglected the core part, user profile. Therefore, in this paper, instead of mean which applied in user profile in previous studies, New TPIPF (Topic Proportion-Inverse Paper Frequency) was applied to scientific article recommendation system. Moreover, the accuracy of two scientific article recommendation systems with above different methods was compared with experiments of public dataset from online reference manager, CiteULike. As a result, the proposed scientific article recommendation system with TPIPF was proven to be better.

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.

Wireless PKI Based Certificate Verification Using Virtual Identifier (무선 PKI 기반의 가상 식별자를 이용한 인증서 검증)

  • Choi Seung-Kwon;Shin Jung-Won;Shin Dong-Hwa;Kim Sun-Chul;Lee Byong-Rok;Cho Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.804-813
    • /
    • 2006
  • In wireless Internet environment that demand of wireless Internet service increase steadily, wireless PKI(Public Key Infrastructure) service is appearing on stage as necessary essential base technology for information protection service offer, In this paper, we propose the method for verification to reduce the communication overload using VID to CSMP made with a goal of the performance guarantee for security and use in a real time and examine the existent certificate verification methods. The performance of security and the use in a real time is guaranteed by managing the note of authentification by the person who verifies and reducing the amount of the data transmission using VID.

Quality Measurement of Data Processing by a Protocol Change of Power SCADA System (전력감시제어설비의 프로토콜 변경에 따른 데이터처리 품질측정)

  • Lee Yong-Doo;Choi Seong-Man;Yoo Cheol-Jung;Chang Ok-Bae
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1031-1038
    • /
    • 2005
  • In this paper, the maximum traffic quantity and actual traffic quantify of the data which are needed to grasp the statement of a system will be measured more accurately. A concrete quality measurement will be conducted by analysing a change of traffic quantity according to a protocol change and traffic under an overload condition when there is an accident. As a result can make an opportunity to maximize safety of power SCADA. Furthermore, future traffic quantity can be prospected by knowing current traffic quantity and grasping the rate of increase by the analysis and the information can be used as data to secure the band width in advance. It can make stable operation of power SCADA by arranging the limited network resources efficiently by information analysis of a network and expects more confidence.

The Dark Side of Emotional Involvement in Software Development: A Behavioral Economics Perspective

  • Shmueli, Ofira;Pliskin, Nava;Fink, Lior
    • Asia pacific journal of information systems
    • /
    • v.26 no.2
    • /
    • pp.322-337
    • /
    • 2016
  • Research on information systems and software engineering has often neglected behavioral effects, which may play a role in decision making on software development. The current study addresses this issue by empirically investigating the behavioral roots of over-requirement in the context of a software development project via an experiment. The negative phenomenon of over-requirement refers to specifying a software system beyond the actual needs of the customer or the market, which overload the system with unneeded features. The research question addressed here is whether over-requirement is due in part to the emotional involvement of developers with the software features they developed because of behavioral effects. Previous studies have demonstrated that under the endowment, I-designed-it-myself, and IKEA effects, people become emotionally involved and overvalue physical items that they respectively possess, self-design, or self-create. The findings of our experiment show that participants over-valued features they were assigned to be responsible for, to specify, or to construct, thereby confirming that the three behavioral effects play a role in software development decisions and affect over-requirement. Thus, the study contributes to software development research and practice from the behavioral economics perspective, highlighting the roots of over-requirement.

Tourism Destination Recommender System for the Cold Start Problem

  • Zheng, Xiaoyao;Luo, Yonglong;Xu, Zhiyun;Yu, Qingying;Lu, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3192-3212
    • /
    • 2016
  • With the advent and popularity of e-commerce, an increasing number of consumers prefer to order tourism products online. A recommender system can help these users contend with information overload; however, such a system is affected by the cold start problem. Online tourism destination searching is a more difficult task than others on account of its more restrictive factors. In this paper, we therefore propose a tourism destination recommender system that employs opinion-mining technology to refine user preferences and item opinion reputations. These elements are then fused into a hybrid collaborative filtering method by combining user- and item-based collaborative filtering approaches. Meanwhile, we embed an artificial interactive module in our recommender system to alleviate the cold start problem. Compared with several well-known cold start recommendation approaches, our method provides improved recommendation accuracy and quality. A series of experimental evaluations using a publicly available dataset demonstrate that the proposed recommender system outperforms existing recommender systems in addressing the cold start problem.

Application Management System with ZeroMQ and Alarms in Distribution Management System (배전운영 시스템에서의 ZeroMQ와 알람 정보를 이용한 운영기능 관리 시스템)

  • Kim, Pil-Seok;Kang, Ho-Young;Lim, Il-Hyung;Park, Jong-Ho;Shin, Yong-Hak
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.8
    • /
    • pp.1161-1167
    • /
    • 2015
  • Distribution Management System(DMS) ienhancing distribution automation system-based operation efficiency is an optimized system by various operational applications in a distribution network. DMS employs various applications like topology reconfiguration, volt/var control, and restoration at events such as overload, voltage violation, and a fault in a distribution system. An operation efficiency to employ multi-applications as restoration with short-term load forecasting is higher than a performance by a single application; and the applications are accomplished by an operator’s control. Applications’ combination is determined by various alarm information which means critical issues in order to operate a distribution system. Thus, this paper proposes an application management system which can configure application combination, control applications depending on alarm information and check their performance condition. The proposed application management system can be customized by operator easily and have high operation efficiency and reliability because it is worked by reviewed alarm information from operator.

Design of Falling Context-aware System based on Notification Service using Location Information and Behavior Data

  • Kwon, TaeWoo;Lee, Daepyo;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.42-50
    • /
    • 2018
  • The majority of existing falling recognition techniques provide service by recognizing only that the falling occurred. However, it is important to recognize not only the occurrence of falling but also the situation before and after the falling, as well as the location of the falling. In this paper, we design and propose the falling notification service system to recognize and provide service. This system uses the acceleration sensor of the smartphone to recognize the occurrence of a falling and the situation before and after the falling. In order to check the location of falling, GPS sensor data is used in the Google Map API to map to the map. Also, a crosswalk map converted into grid-based coordinates based on the longitude and latitude of the crosswalk is stored, and the locations before and after falling are mapped. In order to reduce the connection speed and server overload for real-time data processing, fog computing and cloud computing are designed to be distributed processing.

Empirical Study on Antecedents and Consequences of Users' Fatigue on SNS and the Moderating Effect of Habit (SNS에서의 사용자 피로감의 선행 및 결과 요인과 습관의 조절효과에 관한 실증연구)

  • Kim, Sanghyun;Park, Hyunsun
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.137-157
    • /
    • 2015
  • The development of Social Network Service (SNS) has brought many positive changes to the ways people communicate, interact and share information. However, using the SNS does not always leads to in a positive results, particularly when it is addictively used. In fact, the addictive use of SNS results in many negative effects in our society. Recently, SNS users feel negative emotions such as expecially stress and fatigue while using SNS. Thus, the purpose of this study is to empirically examine antecedents of user fatigue on SNS, which can be explained by the degree of Individual, environment and SNS characteristics. This study also examines consequences of user fatigue on SNS. Lastly, we examine the moderating effects of Habit among SNS fatigue, barrier of living and task performance decline. The data for empirical analysis were collected 401 responses on SNS users in Korea. The results of this study are as follows; First, reputation perception, loneliness, unwanted relation, privacy concern, information overload, social presence and interaction are significantly related to SNS fatigue. Second, SNS fatigue, barrier of living and Task performance decline are significantly related to discontinuous usage intention. Third, the moderating effect of Habit of SNS using is found in the relationship among SNS fatigue, barrier of living and task performance decline. Based on the results of this study, Theoretical and practical suggestions were discussed.

Range Segmentation of Dynamic Offloading (RSDO) Algorithm by Correlation for Edge Computing

  • Kang, Jieun;Kim, Svetlana;Kim, Jae-Ho;Sung, Nak-Myoung;Yoon, Yong-Ik
    • Journal of Information Processing Systems
    • /
    • v.17 no.5
    • /
    • pp.905-917
    • /
    • 2021
  • In recent years, edge computing technology consists of several Internet of Things (IoT) devices with embedded sensors that have improved significantly for monitoring, detection, and management in an environment where big data is commercialized. The main focus of edge computing is data optimization or task offloading due to data and task-intensive application development. However, existing offloading approaches do not consider correlations and associations between data and tasks involving edge computing. The extent of collaborative offloading segmented without considering the interaction between data and task can lead to data loss and delays when moving from edge to edge. This article proposes a range segmentation of dynamic offloading (RSDO) algorithm that isolates the offload range and collaborative edge node around the edge node function to address the offloading issue.The RSDO algorithm groups highly correlated data and tasks according to the cause of the overload and dynamically distributes offloading ranges according to the state of cooperating nodes. The segmentation improves the overall performance of edge nodes, balances edge computing, and solves data loss and average latency.