• Title/Summary/Keyword: user profile information

Search Result 364, Processing Time 0.024 seconds

A Mobile Device Description Language (모바일 단말 정보 표현 언어)

  • Kim, Tae-Hyun;Lee, Seung-Yun;Lee, Kang-Chan;Lee, Won-Suk;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.811-814
    • /
    • 2007
  • Mobile device will be able to use the various contents from the advancement of the wireless Internet and mobile device manufacture technique. Each devices HTTP headers about under using provides terminal information to contents provider which is provided the contents which is suitable in device. But there is not a standard for a terminal information proηsion and when using the contents of service network outside, interoperability problems mobile communication it will provides terminal information in different method. International Organization for Standard OMA UAProf about under using it solved interoperability problems from outside. But about under using it provides terminal information, MMS support and Smart Card support, against an external storage space supporting information it is not seen clearly UAProf not to be, it will not be able to provide terminal information which is complete. This paper hereupon it designed UAProf in base which provides the contents which has become optimize to the mobile device of domestic environment the mobile device description language which expresses device information which is necessary.

  • PDF

The Ontology Based, the Movie Contents Recommendation Scheme, Using Relations of Movie Metadata (온톨로지 기반 영화 메타데이터간 연관성을 활용한 영화 추천 기법)

  • Kim, Jaeyoung;Lee, Seok-Won
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.25-44
    • /
    • 2013
  • Accessing movie contents has become easier and increased with the advent of smart TV, IPTV and web services that are able to be used to search and watch movies. In this situation, there are increasing search for preference movie contents of users. However, since the amount of provided movie contents is too large, the user needs more effort and time for searching the movie contents. Hence, there are a lot of researches for recommendations of personalized item through analysis and clustering of the user preferences and user profiles. In this study, we propose recommendation system which uses ontology based knowledge base. Our ontology can represent not only relations between metadata of movies but also relations between metadata and profile of user. The relation of each metadata can show similarity between movies. In order to build, the knowledge base our ontology model is considered two aspects which are the movie metadata model and the user model. On the part of build the movie metadata model based on ontology, we decide main metadata that are genre, actor/actress, keywords and synopsis. Those affect that users choose the interested movie. And there are demographic information of user and relation between user and movie metadata in user model. In our model, movie ontology model consists of seven concepts (Movie, Genre, Keywords, Synopsis Keywords, Character, and Person), eight attributes (title, rating, limit, description, character name, character description, person job, person name) and ten relations between concepts. For our knowledge base, we input individual data of 14,374 movies for each concept in contents ontology model. This movie metadata knowledge base is used to search the movie that is related to interesting metadata of user. And it can search the similar movie through relations between concepts. We also propose the architecture for movie recommendation. The proposed architecture consists of four components. The first component search candidate movies based the demographic information of the user. In this component, we decide the group of users according to demographic information to recommend the movie for each group and define the rule to decide the group of users. We generate the query that be used to search the candidate movie for recommendation in this component. The second component search candidate movies based user preference. When users choose the movie, users consider metadata such as genre, actor/actress, synopsis, keywords. Users input their preference and then in this component, system search the movie based on users preferences. The proposed system can search the similar movie through relation between concepts, unlike existing movie recommendation systems. Each metadata of recommended candidate movies have weight that will be used for deciding recommendation order. The third component the merges results of first component and second component. In this step, we calculate the weight of movies using the weight value of metadata for each movie. Then we sort movies order by the weight value. The fourth component analyzes result of third component, and then it decides level of the contribution of metadata. And we apply contribution weight to metadata. Finally, we use the result of this step as recommendation for users. We test the usability of the proposed scheme by using web application. We implement that web application for experimental process by using JSP, Java Script and prot$\acute{e}$g$\acute{e}$ API. In our experiment, we collect results of 20 men and woman, ranging in age from 20 to 29. And we use 7,418 movies with rating that is not fewer than 7.0. In order to experiment, we provide Top-5, Top-10 and Top-20 recommended movies to user, and then users choose interested movies. The result of experiment is that average number of to choose interested movie are 2.1 in Top-5, 3.35 in Top-10, 6.35 in Top-20. It is better than results that are yielded by for each metadata.

A Study on Stroke Based Rendering Using Painting Media Profile (페인팅 매체 프로파일을 이용한 스트로크 기반 렌더링에 관한 연구)

  • Seo, Sang-Hyun;Yoon, Kyung-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1640-1651
    • /
    • 2009
  • In this paper we introduce a new approach to stroke based rendering using brush stroke profile. Our proposed method, based on image retrieval method, is a simple but flexible and scalable method to create various painting styles, for which scalable database constructed with the collection of real stroke data is used. Input image is reproduced with combinations of brush stoke in the database, when a search process to determinate appropriate brush stroke and a judgment process to decide whether to draw the retrieved brush stroke on the canvas or not are presented. In addition, this paper suggests a new brush stroke model and a depiction technique in order to utilize effective height information which allows natural texture depiction, or good visual effect, without carrying out physical simulation. Our method is able to create diverse variations of painting by controling various user parameters. It also provides scalable framework that can produce various painting styles with different artistic media by changing the stroke combinations of stroke database.

  • PDF

Concept Network-based Personalized Web Search Systems (개념 네트워크 기반 사용자 인지형 웹 검색 시스템)

  • Yune, Hong-June;Noh, Joon-Ho;Kim, Han-Joon;Lee, Byung-Jeong;Kang, Soo-Yong;Chang, Jae-Young
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2011
  • In general, conventional search engines provide the same search results for the same queries of users, and however such techniques do not consider users' characteristics. To overcome this problem, we need a new way of personalized search which returns customized search results according to users' preference. In this paper, we propose a concept network profile-based personalized web search system in which the concept network is developed for accumulating users' characteristics. The concept network-based user profile is used to expand initial search queries to achieve personalized search. The concept network is a network structure of concepts where each concept is generated whenever each query is submitted, and it can be defined as a set of keywords extracted from the selected documents. Furthermore, we have improved the concept networks by augmenting intent keywords of each concept with a set of classification tags, called folksonomy, assigned to each document. For an additional personalized search technique, we propose a new re-ranking method that analayzes the degree of overlapped search results.

A Routing Algorithm based on Deep Reinforcement Learning in SDN (SDN에서 심층강화학습 기반 라우팅 알고리즘)

  • Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1153-1160
    • /
    • 2021
  • This paper proposes a routing algorithm that determines the optimal path using deep reinforcement learning in software-defined networks. The deep reinforcement learning model for learning is based on DQN, the inputs are the current network state, source, and destination nodes, and the output returns a list of routes from source to destination. The routing task is defined as a discrete control problem, and the quality of service parameters for routing consider delay, bandwidth, and loss rate. The routing agent classifies the appropriate service class according to the user's quality of service profile, and converts the service class that can be provided for each link from the current network state collected from the SDN. Based on this converted information, it learns to select a route that satisfies the required service level from the source to the destination. The simulation results indicated that if the proposed algorithm proceeds with a certain episode, the correct path is selected and the learning is successfully performed.

Design of Serendipity Service Based on Near Field Communication Technology (NFC 기반 세렌디피티 시스템 설계)

  • Lee, Kyoung-Jun;Hong, Sung-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.293-304
    • /
    • 2011
  • The world of ubiquitous computing is one in which we will be surrounded by an ever-richer set of networked devices and services. Especially, mobile phone now becomes one of the key issues in ubiquitous computing environments. Mobile phones have been infecting our normal lives more thoroughly, and are the fastest technology in human history that has been adapted to people. In Korea, the number of mobile phones registered to the telecom company, is more than the population of the country. Last year, the numbers of mobile phone sold are many times more than the number of personal computer sold. The new advanced technology of mobile phone is now becoming the most concern on every field of technologies. The mix of wireless communication technology (wifi) and mobile phone (smart phone) has made a new world of ubiquitous computing and people can always access to the network anywhere, in high speed, and easily. In such a world, people cannot expect to have available to us specific applications that allow them to accomplish every conceivable combination of information that they might wish. They are willing to have information they want at easy way, and fast way, compared to the world we had before, where we had to have a desktop, cable connection, limited application, and limited speed to achieve what they want. Instead, now people can believe that many of their interactions will be through highly generic tools that allow end-user discovery, configuration, interconnection, and control of the devices around them. Serendipity is an application of the architecture that will help people to solve a concern of achieving their information. The word 'serendipity', introduced to scientific fields in eighteenth century, is the meaning of making new discoveries by accidents and sagacity. By combining to the field of ubiquitous computing and smart phone, it will change the way of achieving the information. Serendipity may enable professional practitioners to function more effectively in the unpredictable, dynamic environment that informs the reality of information seeking. This paper designs the Serendipity Service based on NFC (Near Field Communication) technology. When users of NFC smart phone get information and services by touching the NFC tags, serendipity service will be core services which will give an unexpected but valuable finding. This paper proposes the architecture, scenario and the interface of serendipity service using tag touch data, serendipity cases, serendipity rule base and user profile.

The Product Recommender System Combining Association Rules and Classification Models: The Case of G Internet Shopping Mall (연관규칙기법과 분류모형을 결합한 상품 추천 시스템: G 인터넷 쇼핑몰의 사례)

  • Ahn, Hyun-Chul;Han, In-Goo;Kim, Kyoung-Jae
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.181-201
    • /
    • 2006
  • As the Internet spreads, many people have interests in e-CRM and product recommender systems, one of e-CRM applications. Among various approaches for recommendation, collaborative filtering and content-based approaches have been investigated and applied widely. Despite their popularity, traditional recommendation approaches have some limitations. They require at least one purchase transaction per user. In addition, they don't utilize much information such as demographic and specific personal profile information. This study suggests new hybrid recommendation model using two data mining techniques, association rule and classification, as well as intelligent agent to overcome these limitations. To validate the usefulness of the model, it was applied to the real case and the prototype web site was developed. We assessed the usefulness of the suggested recommendation model through online survey. The result of the survey showed that the information of the recommendation was generally useful to the survey participants.

An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider (내부자의 불법적 정보 유출 차단을 위한 접근통제 모델 설계)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.59-67
    • /
    • 2010
  • In the paper, we proposed an IM-ACM(Insider Misuse-Access Control Model) for preventing illegal information leakage by insider who exploits his legal rights in the ubiquitous computing environment. The IM-ACM can monitor whether insider uses data rightly using misuse monitor add to CA-TRBAC(Context Aware-Task Role Based Access Control) which permits access authorization according to user role, context role, task and entity's security attributes. It is difficult to prevent information leakage by insider because of access to legal rights, a wealth of knowledge about the system. The IM-ACM can prevent the information flow between objects which have the different security levels using context role and security attributes and prevent an insider misuse by misuse monitor which comparing an insider actual processing behavior to an insider possible work process pattern drawing on the current defined profile of insider's process.

RSSI based Proximity User Detection System using Exponential Moving Average (지수이동평균을 이용한 RSSI 기반 근거리 사용자 탐지 시스템)

  • Yun, Gi-Hun;Kim, Keon-Wook;Choi, Jae-Hun;Park, Soo-Jun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.4
    • /
    • pp.105-111
    • /
    • 2010
  • This paper proposes the recursive algorithm for passive proximity detection system based on signal strength. The system is designed to be used in the smart medicine chest in order to provide location-based service for the senior personnel. Due to the system profile, single receiver and uni-direction communication are applied over the signal attenuation model for the determination of user existence within certain proximity. The performance of conventional methods is subjective to the sight between the transmitter and receiver unless the direction of target is known. To appreciate the temporal and spatial locality of human subjects, the authors present exponential moving average (EMA) to compensate the unexpected position error from the direction and/or environment. By using optimal parameter, the experiments with EMA algorithm demonstrates 32.26% (maximum 40.80%) reduction in average of the error probability with 50% of consecutive sight in time.

wow-UCAM: Unified Context-aware Application Model for Wearable Computing) (wear-UCAM : 착용형 컴퓨팅을 위한 정형화된 맥락 인식 응용 모형)

  • Hong, Dong-Pyo;Woo, Woon-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.1
    • /
    • pp.105-113
    • /
    • 2006
  • In this paper we propose wear-UCAM, which is a toolkit for context-aware application model in wearable computing. As the rapid developments of mobile technologies and relevant technologies, the interests in wearable computer also become indispensible in both academic and industrial fields. However, there are few research activities on the application framework or toolkit for wearable computing. Hence, we suggest wear-UCAM as the development toolkit for wearable computing applications, where we focus on how to collect relevant user context, manage it, and provide services based on the recognized context. The proposed wear-UCAM includes the abstraction of context processing as well as independence among sensors and services with other components. For the sake of rapid prototyping of the proposed toolkit, we utilize PDA with wireless LAN as a wearable computer. The detail explanation of the implementation and its discussion are presented in this paper.