• Title/Summary/Keyword: 사용자 유형

Search Result 1,148, Processing Time 0.024 seconds

A study on Hangul serious mobile game for Infant based on R. Caillois's theory (로제 카이와(R.Caillois)의 놀이 유형에 근거한 유아용 한글 기능성 모바일 게임 연구)

  • Lee, Sooyeon;Kim, Jaewoong
    • Cartoon and Animation Studies
    • /
    • s.35
    • /
    • pp.291-312
    • /
    • 2014
  • This study is based on the theory of R.Caillois about element of play which is motivated to infant for studying Hangul. The ultimate goal of play has to be accompanied by pleasure. And learning means permanent changes from experiences for the individual's. Play and learning, these two elements are united to the genre of serious game since the GBL (game based learning) was lead. Most importantly, in order to achieve their own Hangul learning is the fun. Coupled with fun and learning has an important issue for flow because concentration is low in infants than adults. In this case study is to know about fun factor has been applied effectively to Hangul serious mobile game. 20 Infant Hangul mobile serious games of Google Android mobile game section were selected as a case study based on more than 10,000 downloads and user's review rate by April 22, 2014. After that is currently available on the market can play a variety of cases of infant learning Hangul from previous research of R.Caillois offers four categories of play. R.Caillois of Agon, Mimicry, Alea, Ilinx have unique characteristics in comparison with its functional characteristics Hangul four are present any role in Hangul serious mobile games. As a result of the cases selected and the rules of the game will include a maximum of two of the most common types of Agon. Each attribute of the play, rather than one single factor is applied to four kinds of game play performance when properties are distributed to experience together gave the best flow. As a result of this study will be a based research for infants Hangul serious mobile game reflects the properties of the elements of a fun game that you want to combine learning.

A Study on the Intelligent Service Selection Reasoning for Enhanced User Satisfaction : Appliance to Cloud Computing Service (사용자 만족도 향상을 위한 지능형 서비스 선정 방안에 관한 연구 : 클라우드 컴퓨팅 서비스에의 적용)

  • Shin, Dong Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.35-51
    • /
    • 2012
  • Cloud computing is internet-based computing where computing resources are offered over the Internet as scalable and on-demand services. In particular, in case a number of various cloud services emerge in accordance with development of internet and mobile technology, to select and provide services with which service users satisfy is one of the important issues. Most of previous works show the limitation in the degree of user satisfaction because they are based on so called concept similarity in relation to user requirements or are lack of versatility of user preferences. This paper presents cloud service selection reasoning which can be applied to the general cloud service environments including a variety of computing resource services, not limited to web services. In relation to the service environments, there are two kinds of services: atomic service and composite service. An atomic service consists of service attributes which represent the characteristics of service such as functionality, performance, or specification. A composite service can be created by composition of atomic services and other composite services. Therefore, a composite service inherits attributes of component services. On the other hand, the main participants in providing with cloud services are service users, service suppliers, and service operators. Service suppliers can register services autonomously or in accordance with the strategic collaboration with service operators. Service users submit request queries including service name and requirements to the service management system. The service management system consists of a query processor for processing user queries, a registration manager for service registration, and a selection engine for service selection reasoning. In order to enhance the degree of user satisfaction, our reasoning stands on basis of the degree of conformance to user requirements of service attributes in terms of functionality, performance, and specification of service attributes, instead of concept similarity as in ontology-based reasoning. For this we introduce so called a service attribute graph (SAG) which is generated by considering the inclusion relationship among instances of a service attribute from several perspectives like functionality, performance, and specification. Hence, SAG is a directed graph which shows the inclusion relationships among attribute instances. Since the degree of conformance is very close to the inclusion relationship, we can say the acceptability of services depends on the closeness of inclusion relationship among corresponding attribute instances. That is, the high closeness implies the high acceptability because the degree of closeness reflects the degree of conformance among attributes instances. The degree of closeness is proportional to the path length between two vertex in SAG. The shorter path length means more close inclusion relationship than longer path length, which implies the higher degree of conformance. In addition to acceptability, in this paper, other user preferences such as priority for attributes and mandatary options are reflected for the variety of user requirements. Furthermore, to consider various types of attribute like character, number, and boolean also helps to support the variety of user requirements. Finally, according to service value to price cloud services are rated and recommended to users. One of the significances of this paper is the first try to present a graph-based selection reasoning unlike other works, while considering various user preferences in relation with service attributes.

A Survey on the 3D Printer Users' Experiences of 3D Modelling Software and Proposal of 3D Modeling Software Development for Koreans (3D프린터 사용자들의 3D모델링 소프트웨어 사용경험 탐색 및 한국인을 위한 3D모델링 소프트웨어 개발제안)

  • Lee, Guk-Hee;Cho, Jaekyung
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.2
    • /
    • pp.21-29
    • /
    • 2017
  • While the second and the third industrial revolutions made it possible a few standardized designs to be extracted and produced in large quantities, the recent development of the 3D printing technology allowed many individuals to reflect their unique personal characteristics on their creative works and produce them in large quantities-i.e., personally customized designs and mass production of various designs. However, for the customized designs and the mass production of various designs through the 3D printing technology, the individuals should use a 3D modeling software and the supporting features of the software can significantly affect the type and shape of a creative work. In this study, we surveyed the individuals who design the creative works using 3D printers about the type of software that they use and the type of creative works that they design using the software, to propose a possible direction of new software that supports their activities. To do this, we first surveyed sixty members of the OpenCreators, which is the largest 3D printing creator community in South Korea, about the 3D modelling Software that they use for their 3D printing creations, the best 3D modelling software for the 3D printing, and the type of frequently printing creation using the best 3D modelling software. We then analysed the response results. As a result, we found that most of 3D printing creators in South Korea use Rhino and 123D Design. More specifically, the Rhino was being widely used by the people in the 3D printing industry to print prototypes, samples, and mock-ups, while the 123D Design was being mainly used for general purposes such as educational tools, accessories, and home interior accessories. Therefore, we believe it is necessary to develop the software in two separated categories, i.e. for the business, like the Rhino, and for the beginners, and educational and personal purposes, like the 123D Design. Finally, we stressed and proposed the necessity to support individual creators by developing an industry-specific 3D modeling software.

Development and Evaluation of Traffic Conflict Criteria at an intersection (교차로 교통상충기준 개발 및 평가에 관한 연구)

  • 하태준;박형규;박제진;박찬모
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.2
    • /
    • pp.105-115
    • /
    • 2002
  • For many rears, traffic accident statistics are the most direct measure of safety for a signalized intersection. However it takes more than 2 or 3 yearn to collect certain accident data for adequate sample sizes. And the accident data itself is unreliable because of the difference between accident data recorded and accident that is actually occurred. Therefore, it is rather difficult to evaluate safety for a intersection by using accident data. For these reasons, traffic conflict technique(TCT) was developed as a buick and accurate counter-measure of safety for a intersection. However, the collected conflict data is not always reliable because there is absence of clear criteria for conflict. This study developed objective and accurate conflict criteria, which is shown below based on traffic engineering theory. Frist, the rear-end conflict is regarded, when the following vehicle takes evasive maneuver against the first vehicle within a certain distance, according to car-following theory. Second, lane-change conflict is regarded when the following vehicle takes evasive maneuver against first vehicle which is changing its lane within the minimum stopping distance of the following vehicle. Third, cross and opposing-left turn conflicts are regarded when the vehicle which receives green sign takes evasive maneuver against the vehicle which lost its right-of-way crossing a intersection. As a result of correlation analysis between conflict and accident, it is verified that the suggested conflict criteria in this study ave applicable. And it is proven that estimating safety evaluation for a intersection with conflict data is possible, according to the regression analysis preformed between accident and conflict, EPDO accident and conflict. Adopting the conflict criteria suggested in this study would be both quick and accurate method for diagnosing safety and operational deficiencies and for evaluation improvements at intersections. Further research is required to refine the suggested conflict criteria to extend its application. In addition, it is necessary to develope other types of conflict criteria, not included in this study, in later study.

Types of tweezers and their culture of use (족집게(鑷)의 유형과 사용 문화)

  • KIM, Jihyeon
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.3
    • /
    • pp.4-23
    • /
    • 2021
  • The purpose of this study was to classify the types of tweezers used across time and to examine the social culture of periods through the use of tweezers. Chapter II summarized the terms for tweezers and looked at the use of tweezers in two cases related to the social culture and politics of a period. The first is the use of tweezers for beauty purposes. Men used tweezers as a kind of self-management to maintain their social status and power, and thus they helped develop a wide range of tweezers cultures. People with gray hair are usually old. The perception that we should step down from politics when we are aged has become strong. Therefore, politicians pulled out gray hairs with tweezers to maintain only black hair and show youth, which indicates that their social influence is still strong. The second is the use of tweezers for first aid. Chapter III classified tweezers by type during the Goryeo and Joseon periods. The tweezers are largely divided into basic and composite types. The basic type of tweezers is a form that has been continued since the Three Kingdoms Period and consists of tongs and handles, and a fixed type of tweezers with a fixed ring appeared. Composite tweezers are made by grafting earpick or multipurpose knives. Composite tweezers are all-in-one tweezers with an earpick and an all-in-one knife. Tweezers are usually all-in-one. Among the composite tweezers, rivet separation and ring separation are characterized by separation, unlike the all-in-one tweezers. The method of connecting is divided into rivets and connection rings. The all-in-one tweezers appear only during the Goryeo Dynasty and are characterized by the lifestyle that provides a glimpse of the tastes of contemporary users. The manufacturing takes shape after making a thin metal plate. Decorative techniques are carved on soft metal tweezers, such as silver and bronze with a line, point, and a pressed angle. These tweezers are presumed to have been used by the royal family or aristocrats. However, most tweezers are made of strong bronze or iron. Therefore, the majority of simple X-shaped patterns are sampled or without patterns. The biggest reason why there are such diverse types of tweezers is that the culture of tweezers was widespread regardless of the times. In addition, the basic type of tweezers has been used since the Three Kingdoms Period and has been modified and used together as necessary because the shape of tweezers is a practical daily tool. Study of metal crafts have been limited to royal objects and Buddhist crafts. We hope that research on everyday tools such as tweezers will continue to serve as an opportunity to examine the social and cultural aspects of the times in various ways.

A Study on the Factors Affecting Use Behavior of Cloud-based Common Collaboration Platform (클라우드 기반 공통협업플랫폼의 사용행동에 영향을 미치는 요인에 관한 연구)

  • Kim, San-Hae;Lee, Hong-Jae;Han, Kyeong-Seok;Kwon, Tae-Hyun
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1151-1160
    • /
    • 2018
  • The study has been derived through the empirical analysis so as to find the usage behavior of cloud-based common collaboration platform. Independent variables of the cloud-based platform have been selected as flexibility, reliability, versatility, security and interaction, which have been selected by utilizing UTAUT theory. After selecting the use intent as a parameter, usage behavior was been finally selected as a dependent variable. The firm type was used as a control variable. We used AMOS 23.0 and SPSS 23.0 statistical programs for the hypothesis test and distributed the questionnaires to users using the cloud-based common collaboration platform. Then, a total of 180 copies from distributed questionnaires were used for the analysis. The results showed that reliability, security and interaction had a positive effect on intention to use. On the other hand, flexibility and versatility did not affect intention to use positively. Finally, it was verified that the intention to use had a positive effect on the use behavior. At last, it showed that there is a moderation effect according to the type of company.

A Technique to Recommend Appropriate Developers for Reported Bugs Based on Term Similarity and Bug Resolution History (개발자 별 버그 해결 유형을 고려한 자동적 개발자 추천 접근법)

  • Park, Seong Hun;Kim, Jung Il;Lee, Eun Joo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.12
    • /
    • pp.511-522
    • /
    • 2014
  • During the development of the software, a variety of bugs are reported. Several bug tracking systems, such as, Bugzilla, MantisBT, Trac, JIRA, are used to deal with reported bug information in many open source development projects. Bug reports in bug tracking system would be triaged to manage bugs and determine developer who is responsible for resolving the bug report. As the size of the software is increasingly growing and bug reports tend to be duplicated, bug triage becomes more and more complex and difficult. In this paper, we present an approach to assign bug reports to appropriate developers, which is a main part of bug triage task. At first, words which have been included the resolved bug reports are classified according to each developer. Second, words in newly bug reports are selected. After first and second steps, vectors whose items are the selected words are generated. At the third step, TF-IDF(Term frequency - Inverse document frequency) of the each selected words are computed, which is the weight value of each vector item. Finally, the developers are recommended based on the similarity between the developer's word vector and the vector of new bug report. We conducted an experiment on Eclipse JDT and CDT project to show the applicability of the proposed approach. We also compared the proposed approach with an existing study which is based on machine learning. The experimental results show that the proposed approach is superior to existing method.

Study on development of data base system and pattern analysis of tunnel portal slope in Korea (국내 터널 갱구사면 데이터베이스관리 시스템 개발 및 상태평가 기법에 관한 연구)

  • Baek, Yong;Kwon, O-Il;Koo, Ho-Bon;Bae, Gyu-Jin;Lee, Seoung-Ho
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.6 no.3
    • /
    • pp.213-225
    • /
    • 2004
  • The number of tunnels are in fact increasing as a part of linear improvement project of general national highway and road enlargement and pavement project. Recently, collapses of portal slope are also occurring considerably, due to local raining from severe rain storm and abnormal weather. Accordingly, it was risen a necessity to efficiently respond to tunnel portal slope damage and maintenance in Korea and oversea nations. This paper is a basic proposal to execute a survey on the current status and state of the tunnel portal slopes that were already installed and are now being operated along general national highways, and also to execute state evaluation for the purpose of managing those effectively. As a research method, domestic tunnels were analyzed in accordance with geometrical shape such as access type, portal form, and tunnel type, etc. via field survey to analyze the types of tunnel portal slopes along national highways. State evaluation classification sheet is presented to divide classes for the danger state of the surveyed portal slopes, and then the related grades are divided. It is mainly aimed at classifying the tunnel portal slope along national highways with using this state evaluation, to use it as basic data so that continuous maintenance can be executed in the future in accordance with danger classes.

  • PDF

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

The Impact of Message Characteristics on Online Viral Diffusion in Online Social Media Services : The Case of Twitter (트위터 메세지 특성에 따른 온라인 구전효과에 대한 분석)

  • Nam, Young-Woo;Son, In-Soo;Lee, Dong-Won
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.75-94
    • /
    • 2011
  • In this paper, we explore the information diffusion mechanism under social network environments by investigating the effect of message characteristics on the volume and speed of retweeting in Twitter, a popular online social media service. To this end, we select eight main keywords (i.e., '무상급식', '반값등록금', '나가수', '평창', '김연아', '박태환', '아이폰', '갤럭시') that have been popular on online social media in recent days. Each keyword represents various social aspects of Korea that recently grab people's attention such as political issues, entertainment, sports celebrities, and the latest digital products, and eventually holds distinctive message characteristics. Analyzing the frequency and velocity of retweeting for each keyword, we find that more than half of the sample messages posted on Twitter contain personal opinions for the certain keyword, but we also find that the tweets which include objective messages with hyperlink are the fastest ones when being retweeted by other followers. In overall, when being retweeted, the group of messages related to the certain keyword present distinctive diffusion patterns and speed according to message characteristics. From academic perspective, the findings in the study broaden our theoretical knowledge of information diffusion mechanism over online social media. For practitioners, the results also provide managerial implications regarding how to strategically utilize online social media for marketing communications with customers.