• 제목/요약/키워드: non-user

검색결과 1,477건 처리시간 0.031초

An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators

  • Oommen, B. John;Yazidi, Anis;Granmo, Ole-Christoffer
    • Journal of Information Processing Systems
    • /
    • 제8권2호
    • /
    • pp.191-212
    • /
    • 2012
  • Since a social network by definition is so diverse, the problem of estimating the preferences of its users is becoming increasingly essential for personalized applications, which range from service recommender systems to the targeted advertising of services. However, unlike traditional estimation problems where the underlying target distribution is stationary; estimating a user's interests typically involves non-stationary distributions. The consequent time varying nature of the distribution to be tracked imposes stringent constraints on the "unlearning" capabilities of the estimator used. Therefore, resorting to strong estimators that converge with a probability of 1 is inefficient since they rely on the assumption that the distribution of the user's preferences is stationary. In this vein, we propose to use a family of stochastic-learning based Weak estimators for learning and tracking a user's time varying interests. Experimental results demonstrate that our proposed paradigm outperforms some of the traditional legacy approaches that represent the state-of-the-art technology.

A Trajectory Substitution Privacy Protection Scheme in location-based services

  • Song, Cheng;Zhang, Yadong;Gu, Xinan;Wang, Lei;Liu, Zhizhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4771-4787
    • /
    • 2019
  • Aimed at the disclosure risk of mobile terminal user's location privacy in location-based services, a location-privacy protection scheme based on similar trajectory substitution is proposed. On the basis of the anonymized identities of users and candidates who request LBS, this scheme adopts trajectory similarity function to select the candidate whose trajectory is the most similar to user's at certain time intervals, then the selected candidate substitutes user to send LBS request, so as to protect user's privacy like identity, query and trajectory. Security analyses prove that this scheme is able to guarantee such security features as anonymity, non-forgeability, resistance to continuous query tracing attack and wiretapping attack. And the results of simulation experiment demonstrate that this scheme remarkably improve the optimal candidate' trajectory similarity and selection efficiency.

A Study on Implementation of Safety Navigation Mobile Application Converging Marine Environment Information and Location-Based Service

  • Jeon, Joong-Sung
    • 한국항해항만학회지
    • /
    • 제43권5호
    • /
    • pp.289-295
    • /
    • 2019
  • In this paper, we implemented a safety navigation mobile application that converged AtoN information and location-based services. When application user uses the smartphone's GPS sensor to transmit the user's vessel location data to the data server, the user receives information of which its providing range is considered, such as stored AtoN data, neighboring vessels information, danger area, and weather information in the server. Providing information is sorted based on the smartphone's direction and inclination and it will be also delivered via wireless network (5G, LTE, 3G, WiFi). Additionally the application is available to implement other functions such as information provision through voice and text alarming service when the user's vessel is either approaching or entering the danger area, and an expanded information provision service that is available in shadow area linking with data-storing methods; other linkable data such as weather and other neighboring vessels will be applied based on the lasted-saved data perceived from the non-shadow area.

Are More Followers Always Better? The Non-Linear Relationship between the Number of Followers and User Engagement on Seeded Marketing Campaigns in Instagram

  • Moon, Suyoung;Yoo, Shijin
    • Asia Marketing Journal
    • /
    • 제24권2호
    • /
    • pp.62-77
    • /
    • 2022
  • Seeded marketing campaign (SMC) is a newly created type of marketing activities with the widespread use of social media. Previous research has examined to find out the optimal seeding strategy that yields the best outcome from the campaign. This research explores the relationships between the characteristics of the seeded influencer and user engagement. The data consists of information from 1062 seeded Instagram posts posted in September 2020 in Korea and 778 seeded influencers who posted those contents. Analyzed by negative binomial regression, our quadratic model suggests that the relationship between user engagement and the number of followers of the seeded influencer draws an inverted U-shape, indicating influencers with greater number of followers may not always be the best choice for the marketers. Moreover, this research shows that the negative marginal impact coming from the huge number of followers can be attenuated when the influencer is an expert of the seeded product.

전공분류표, 사용자 프로파일, LSI를 이용한 검색 모델 (Retrieval Model using Subject Classification Table, User Profile, and LSI)

  • 우선미
    • 정보처리학회논문지D
    • /
    • 제12D권5호
    • /
    • pp.789-796
    • /
    • 2005
  • 현재 대부분의 도서관 정보검색 시스템들은 키워드 정합매칭(exacting matching) 방법으로 검색 서비스를 제공하고 있으므로, 검색 결과의 양이 방대하고 비적합한 결과가 많이 포함되어 있다. 따라서 본 논문에서는 키워드기반 검색 엔진의 단점을 보완하고 현재 도서관 검색 환경을 고려하여 보다 적합한 결과를 사용자에게 신속하게 제공하기 위하여 전공분류표와 사용자 프로파일을 이용한 검색 모델 SULRM(Retrieval Model using Subject Classification Table, User Profile & LSI)을 제안한다. SULRM은 키워드 검색 결과로 얻은 자료들을 분류된 자료의 경우와 미분류된 자료의 경우로 나누어, 분류된 자료의 경우에는 전공분류표를 생성하여 자료 필터링을 수행하고, 미분류된 자료의 경우에는 사용자 프로파일과 LSI(Latent Semantic Indexing)을 이용하여 자료의 순위를 결정해서 사용자에게 제시한다. 실험평가는 우리 대학의 디지털 도서관을 실험환경으로 하여 필터링 방법, 사용자 프로파일 갱신 방법, 그리고 문서순위결정 방법의 성능을 측정한다.

Korea@Home 에이전트를 위한 사용자패턴기반의 로컬 스케줄링기법 (Local Scheduling method based on the User Pattern for Korea@Home Agent)

  • 최지현;김미경;최장원
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2007년도 추계 종합학술대회 논문집
    • /
    • pp.226-230
    • /
    • 2007
  • 우리나라의 컴퓨터 보유율과 인터넷사용률은 세계1위를 자랑한다. 2002년 이래로 운영되어 오고 있는 코리아앳홈(이하 Korea@Home)프로젝트는 우리나라가 보유한 풍부한 컴퓨팅 자원들을 모아서 대규모 응용에 활용하고자 하는 것이다. 이미 많은 회원들을 확보하고 있으며, 현재 신약개발과 기후예측 등의 응용을 수행하고 있다. 코리아앳홈 회원들이 자신의 컴퓨터 자원을 제공하는데 있어 사용자들에게 불편을 주지 않기 위해 자원제공자들의 기여 패턴을 분석하여 사용자가 컴퓨터를 사용하지 않는 시간에 따라 에이전트t의 작업을 수행하도록 하는 스케줄링 방법을 제안한다

  • PDF

통합 검색 환경에서 이용자 적합성 판단 기준에 관한 탐색적 연구 (Users' Relevance Criteria in Universal Search in Korea : An Exploratory Study)

  • 박정아
    • 정보관리학회지
    • /
    • 제29권2호
    • /
    • pp.113-133
    • /
    • 2012
  • 본 연구는 한국 통합 검색 환경에서의 이용자 적합성 판단 기준에 관한 탐색적 연구이다. 이를 위해 10명의 참가자들을 대상으로 반구조화(semi-structured) 인터뷰를 수행하여 데이터를 수집하였다. 참가자들은 네이버, 다음 등과 같은 통합 검색 환경에서 본인들이 관심 있거나 필요로 하는 다양한 검색을 수행하고, 그 과정에서 문서가 적합한지와 그 판단 기준에 대해 기술하였다. 연구 결과 8개의 적합성 판단 기준과 비적합성 판단 기준, 그리고 검색 환경이 변화하여도 이용자가 적합성을 판단하는 기준들이 크게 변화하지는 않지만 데이터 증가와 이용자 요구의 고도화로 특수성과 구체성이 중요한 적합성 판단 기준으로 부각되는 점을 발견하였다.

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • 제10권4호
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

공인인증서를 이용한 익명인증 방법 (A Method of Anonymity Authentication using the Public Certificate)

  • 이영교;안정희
    • 디지털산업정보학회논문지
    • /
    • 제6권1호
    • /
    • pp.115-129
    • /
    • 2010
  • As the fixed mobile communication tools using the internet are developed, the off-line services are serviced through on-line on the internet. our society is divided into the real world and the cyber world. In the cyber world, the authentication to the user is absolutely required. The authentication is divided into the real-name authentication and the anonymous authentication by the kind of the internet service provider. There are some ISPs needed the real-name authentication and there are others ISPs needed the anonymity authentication. The research about the anonymity authentication is steadily established to these days. In this paper, we analyze the problem about blind signature, group signature, ring signature, and traceable signature. And we propose a method of anonymity authentication using the public certificate. In the proposal, the anonymity certificate have the new structure and management. Certificate Authority issues several anonymity certificates to a user through the real-name authentication. Several anonymity certificates give non-linked and non-traceability to the attacker.

Game Transformation from Non-Augmented Reality to Augmented Reality

  • Tan, Chin-Tong;Hwang, Gi-Hyun;Kang, Dae-Ki
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.619-623
    • /
    • 2011
  • The evolution of technology has lead gaming playable in augmented reality and more games are developed only for augmented reality. There are mainly no supportive reasons for game designed in non-augmented reality and transforms to augmented reality. Genre of game played in augmented reality is always one of the defined game genres. In this paper, transformation process and effects of mobile games to augmented reality is discussed. Augmented reality game is recommended for mobile devices due to its portability. Modification for mobile games transformation including way of game rendering, game controlling, camera view controlling and game environment design are discussed. User experience is affected after the game transformed to augmented reality because of the differences in game controlling. The presence of game in real world is increased due to the usage of actual view in game playing.