• Title/Summary/Keyword: web page changes

Search Result 21, Processing Time 0.025 seconds

An Effective Metric for Measuring the Degree of Web Page Changes (효과적인 웹 문서 변경도 측정 방법)

  • Kwon, Shin-Young;Kim, Sung-Jin;Lee, Sang-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.5
    • /
    • pp.437-447
    • /
    • 2007
  • A variety of similarity metrics have been used to measure the degree of web page changes. In this paper, we first define criteria for web page changes to evaluate the effectiveness of the similarity metrics in terms of six important types of web page changes. Second, we propose a new similarity metric appropriate for measuring the degree of web page changes. Using real web pages and synthesized pages, we analyze the five existing metrics (i.e., the byte-wise comparison, the TF IDF cosine distance, the word distance, the edit distance, and the shingling) and ours under the proposed criteria. The analysis result shows that our metric represents the changes more effectively than other metrics. We expect that our study can help users select an appropriate metric for particular web applications.

The Implementation of the Web Service for the Conversion of Speech-Recognition Web Page (음성인식용 웹페이지 변환을 위한 웹서비스 구현)

  • Oh, Jee-Young;Kim, Yoon-Joong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1162-1169
    • /
    • 2004
  • This paper implemented the web service that converts general web page to the web page using the speech recognition and the web service consumer that provides speech recognition service for the web page. This system has the web service consumer, the web service provider that converts the web page and the web service provider that provides speech recognition. The web service provider that converts the web page analyzes general web page by using the regular expression and converts it to the speech-recognition web page. The speech recognizer is the web service providers that implemented in the previous study. As a result of experiment, we show that this system changes web page by analyzing tags and extracts hyperlink.

  • PDF

An Empirical Study on Changes of Web Pages (웹 문서 변화에 관한 실험적 연구)

  • Kim Sung Jin;Lee Sang Ho
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.151-160
    • /
    • 2005
  • As web pages are created, destroyed, and updated frequently, web databases should be updated to keep up-to-date web pages. In order to keep web databases fresh effectively, we need to understand the change of real web pages. Previous researches on the change of the web pages have directed their efforts on the contents modification of web pages only, and have not taken into account the factors of creation and destruction of web pages In their research. This paper investigates the web page changes, which include contents modification, page creation, and page destruction. We introduce three metrics, namely DR (Download Rate), MR (Modification Rate), and CAV (Coefficient of Age Variation) to represent the change of the web pages. We have monitored three million web pages collected from the famous and random sites every other day for one hundred days. With the Download Rate and the Modification Rate, we learned that the download success and the modification depends on the past change of them, and proposes two estimation formulae that predict the download success and modification. With the Coefficient of Age Variation, we show how web pages do not change periodically.

An Implementation of System for Detecting and Filtering Malicious URLs (악성 URL 탐지 및 필터링 시스템 구현)

  • Chang, Hye-Young;Kim, Min-Jae;Kim, Dong-Jin;Lee, Jin-Young;Kim, Hong-Kun;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.405-414
    • /
    • 2010
  • According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.

Analysis of Health Counseling by the Internet - on the Home page of Korean Rheumatology Health Professions Society (인터넷을 이용한 관절염 환자의 건강상담 내용분석 -대한류마티스 건강전문학회 홈페이지를 대상으로-)

  • Lee, Eun-Ok;Lee, Young-Sook
    • Journal of muscle and joint health
    • /
    • v.7 no.1
    • /
    • pp.40-52
    • /
    • 2000
  • Recently with the development in computer technology and its communication system, many changes in medical informatics enable us to use various medical information regardless of time or place. There are many home pages on the web, which provide medical counseling and hospital information. On May 11th 1999, Korean Rheumatology Health Professions Society began its new service as a home page on the web with various rheumatologic health information, questioning/ answering, and so on. This study was undertaken to examine the content and the purpose of health counseling on the web. The data was collected from 173 questioners who visited questioning/ answering site in the KRHPS home page for May 11th, 1999 through November 10th, 1999. Most of the questioners consulted the health problems of their or their families. Over two thirds of them were already diagnosed medically. Rheumatoid arthritis was the most frequent one. Other diseases, such as, osteoarthritis, ankylosing spondylitis, Still's disease were also on the list. Most of the questioners wanted to know treatment strategies, to consult about their symptoms, and to make diagnosis. And many questioners wanted detailed explanations about their diseases or the informations regarding the hospital. These findings suggest that the health counseling on the web may be used to supplement the lack of direct medical interviews with doctors. It also is expected to guide the patients to the right direction.

  • PDF

An Empirical Study on the Measurement of Size for Web-Page (웹페이지를 위한 규모측정에 관한 연구)

  • Kim, In-Suk;Lee, Nam-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.52-54
    • /
    • 2003
  • Measurement is used to improve software process and to help calculating software quality. It makes software project to be control and help producing software. Measuring software scale becomes important target in software development. LOC is used to measure the size intentioned aspect and function point is used to measure the function intentioned aspect. This paper discusses measurement method using function point, which fullows proposed rule, and degree of GUI (Graphical User Interface) accesses achieved by applying this measurement to web page. Applying proposed rules to web pages (specially that use much GUI such as shopping mall or auction site), there is advantage that calculate site changes on numerical value by measuring GUI degree when do site administration or update.

  • PDF

A Unified App Architecture for Plug & Play of Smart Phone USB Sensor's (스마트폰 USB센서 Plug & Play를 위한 통합 App 구조)

  • Kang, Seongu;So, Sun-Sup;Kim, Byungho;Eun, Seongbae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • Performance of smart phones has increased to conduct simple PC functions that has become essential to modern people. With the development of smart phones, not only limited inner sensors but various sensors can be connected through USB. However, there is problem that app needs to downloaded when using each sensor. In this paper, a smart phone unified app structure for USB sensor Plug&Play is presented. The structure was designed to download web pages to use various sensors in one app. Unified app communicated with the platform through ADK accessory protocol and implements structure of delivering sensor ID to the web server and downloading device driver, web page. By measurement test, it was confirmed that download time of web page in unified app was 10 times faster than original download time of original app. By managing various sensors by one app, the app is searched every time the sensor changes in which there is no need for downloading several apps.

A Study on Protecting for forgery modification of User-input on Webpage (웹 페이지에서 사용자 입력 값 변조 방지에 관한 연구)

  • Yu, Chang-Hun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.635-643
    • /
    • 2014
  • Most of the web-based services are provided by a web browser. A web browser receives a text-based web page from the server and translates the received data for the user to view. There are a myriad of add-ons to web browsers that extend browser features. The browser's add-ons may access web pages and make changes to the data. This makes web-services via web browsers are vulnerable to security threats. A web browser stores web page data in memory in the DOM structure. One method that prevents modifications to web page data applies hash values to certain parts in the DOM structure. However, a certain characteristic of web-pages renders this method ineffective at times. Specifically, the user-input data is not pre-determined, and the hash value cannot be calculated prior to user input. Thus the modification to the data cannot be prevented. This paper proposes a method that both detects and inhibits any attempt to change to user-input data. The proposed method stores user-input from the keyboard and makes a comparison with the data transmitted from the web browser to detect any anomalies.

Analysis of the User's Visual Attention Frequency for UX Design of Online Markets (온라인마켓의 UX설계를 위한 사용자의 주시빈도 분석)

  • Ha, JongSoo;Ban, ChaeHoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2079-2084
    • /
    • 2016
  • When designing the interface of the web site, we must consider what users want and need in the design, because design trends are recently changing from user interface design to user experience design. In this paper, we present the method to apply the user experience design when designing the main page of the web site. We select representative online markets and analyze the information elements which compose the main page. Using the eye tracking method which measure user's visual attention frequency, we compare the main page with the wire-frame and analyze changes of the visual attention frequency over time. As a result of experiments, it is efficient to allocate the important information as the image or the moving image to the center of main page for use's visual attention at the time of designing the main page of the online market.

A Study on the Implementation of an optimized Algorithm for association rule mining system using Fuzzy Utility (Fuzzy Utility를 활용한 연관규칙 마이닝 시스템을 위한 알고리즘의 구현에 관한 연구)

  • Park, In-Kyu;Choi, Gyoo-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.19-25
    • /
    • 2020
  • In frequent pattern mining, the uncertainty of each item is accompanied by a loss of information. AAlso, in real environment, the importance of patterns changes with time, so fuzzy logic must be applied to meet these requirements and the dynamic characteristics of the importance of patterns should be considered. In this paper, we propose a fuzzy utility mining technique for extracting frequent web page sets from web log databases through fuzzy utility-based web page set mining. Here, the downward closure characteristic of the fuzzy set is applied to remove a large space by the minimum fuzzy utility threshold (MFUT)and the user-defined percentile(UDP). Extensive performance analyses show that our algorithm is very efficient and scalable for Fuzzy Utility Mining using dynamic weights.