• Title/Summary/Keyword: 사용자 유형

Search Result 1,151, Processing Time 0.026 seconds

A Study on Chatbot Profile Images Depending on the Purpose of Use (사용 목적에 따른 챗봇의 프로필 이미지 연구)

  • Kang, Minjeong
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.12
    • /
    • pp.118-129
    • /
    • 2018
  • In AI chatbot service via a messenger, a profile image of the chatbot is the first thing that users see to communicate with the chatbot. This profile image not only manages an impression about the profile owner in SNS on followers, but also makes an important impression about chatbot services on users. Thus motivated, this study investigates proper profile images tailored for the types of chatbot services and users. Specifically, I reviewed the preferred images and expressions of chatbots for each purpose of chatbot service. Then, in a case study, I collected and analyzed the representative chatbot profile images for the purpose of fun and counseling. The profile images are categorized as robot, human, animal, and abstract images. Based on these categories, I surveyed the preferred profile image of the chatbot service in either the text type or image type alternatives. For the purpose of fun, in the text version, I found that both men and women preferred a human image to others. However, in the image version, men preferred woman and robot images while women preferred cute animation character and robot images. For counseling services, both men and women preferred woman and animal images most, which is similar to the results of the text version of questionnaires as well. While both genders consistently preferred real photo images, women tend to like abstract images more than men do. I expect that the results of this study would be useful to develop the proper profile images of AI chatbot for each service purpose.

A Study on the Gaze Flow of Internet Portal Sites Utilizing Eye Tracking (아이트래킹을 활용한 인터넷 포털사이트의 시선 흐름에 관한 연구)

  • Hwang, Mi-Kyung;Kwon, Mahn-Woo;Lee, Sang-Ho;Kim, Chee-Yong
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2022
  • This study investigated through eye tracking what gaze path the audience searches through portal sites (Naver, Daum, Zoom, and Nate). As a result of the layout analysis according to the gaze path of the search engine, the four main pages, which can be called to be the gateway to information search, appeared in the form of a Z-shaped layout. The news and search pages of each site use an F-shape, which means that when people's eyes move from top to right in an F-shape, they read while moving their eyes from left to right(LTR), which sequentially moves to the bottom. As a result of analyzing through the heat map, gaze plot, and cluster, which are the visual analysis indicators of eye tracking, the concentration of eyes on the photo and head copy was found the most in the heat map, and it can be said to be of high interest in the information. The flow of gaze flows downward from the top left to the right, and it can be seen that the cluster is most concentrated at the top of the portal site. The website designer should focus on improving the accessibility and readability of the information desired by the user in the layout design, and periodic interface changes are required by investigating and analyzing the tendencies and behavioral patterns of the main users.

A Study on Increasing the Efficiency of Image Search Using Image Attribute in the area of content-Based Image Retrieval (내용기반 이미지 검색에 있어 이미지 속성정보를 활용한 검색 효율성 향상)

  • Mo, Yeong-Il;Lee, Cheol-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.39-48
    • /
    • 2009
  • This study reviews the limit of image search by considering on the image search methods related to content-based image retrieval and suggests a user interface for more efficient content-based image retrieval and the ways to utilize image properties. For now, most studies on image search are being performed focusing on content-based image retrieval; they try to search based on the image's colors, texture, shapes, and the overall form of the image. However, the results are not satisfactory because there are various technological limits. Accordingly, this study suggests a new retrieval system which adapts content-based image retrieval and the conventional keyword search method. This is about a way to attribute properties to images using texts and a fast way to search images by expressing the attribute of images as keywords and utilizing them to search images. Also, the study focuses on a simulation for a user interface to make query language on the Internet and a search for clothes in an online shopping mall as an application of the retrieval system based on image attribute. This study will contribute to adding a new purchase pattern in online shopping malls and to the development of the area of similar image search.

A Study on the Classification of Role-playing as a Design Method and Its Utilization (디자인 방법으로서의 롤플레잉의 분류와 그 활용 기법에 관한 연구)

  • Hwang, Ga Young;Yeoun, Myeong Heum
    • Design Convergence Study
    • /
    • v.16 no.3
    • /
    • pp.51-68
    • /
    • 2017
  • User-centered design and Experience Design are emerging in the design area. Therefore, the Role-Playing Method has been actively utilized in the process of design development. But the terms of Role-Playing Method which follow these trends. has not been integrated. Further, it is hard to utilize the process of design development because the process method is not settled yet. Therefore, this study is into two parts of the research: Defining the concept of Role-Playing and the experiment of Role-Playing. Firstly, defining concept part is to research the design method corresponds to a wide range of Role-Playing that has a similar definition. After then, analyzed the examples of Role-Playing Methods which was derived matrix from Role-Playing classification. With this process, two axes of the matrix have been produced such as role·scenario and puppet. Through the analysis of the utility and vulnerability of the Role-Playing classification matrix, this study was able to propose the using step of the Role-Playing in the double diamond model. Secondly, two experiments were conducted in the experiment part. Through the pilot experiment explored the possibility of a study of the Role-Playing Method. In the second experiment, the process was conducted with Role-Playing classification matrix. As a result, each Role-Playing has different insights. In terms of design, different aspects of composing elements were found. Plus, in the position of the user, Role-Playing are can observe different parts of user's cognition between acting and puppet. Thus, the role-playing was proven to be useful to find out the point of improvement and insight in service from different perspectives and it resulted in the role playing which can be utilized selectively according to the type of service.

Performance Evaluation and Analysis on Single and Multi-Network Virtualization Systems with Virtio and SR-IOV (가상화 시스템에서 Virtio와 SR-IOV 적용에 대한 단일 및 다중 네트워크 성능 평가 및 분석)

  • Jaehak Lee;Jongbeom Lim;Heonchang Yu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.48-59
    • /
    • 2024
  • As functions that support virtualization on their own in hardware are developed, user applications having various workloads are operating efficiently in the virtualization system. SR-IOV is a virtualization support function that takes direct access to PCI devices, thus giving a high I/O performance by minimizing the need for hypervisor or operating system interventions. With SR-IOV, network I/O acceleration can be realized in virtualization systems that have relatively long I/O paths compared to bare-metal systems and frequent context switches between the user area and kernel area. To take performance advantages of SR-IOV, network resource management policies that can derive optimal network performance when SR-IOV is applied to an instance such as a virtual machine(VM) or container are being actively studied.This paper evaluates and analyzes the network performance of SR-IOV implementing I/O acceleration is compared with Virtio in terms of 1) network delay, 2) network throughput, 3) network fairness, 4) performance interference, and 5) multi-network. The contributions of this paper are as follows. First, the network I/O process of Virtio and SR-IOV was clearly explained in the virtualization system, and second, the evaluation results of the network performance of Virtio and SR-IOV were analyzed based on various performance metrics. Third, the system overhead and the possibility of optimization for the SR-IOV network in a virtualization system with high VM density were experimentally confirmed. The experimental results and analysis of the paper are expected to be referenced in the network resource management policy for virtualization systems that operate network-intensive services such as smart factories, connected cars, deep learning inference models, and crowdsourcing.

A Study on the Influential Factor of the Formation of Psychological Ownership on Personal Information (개인정보 소유감을 형성하는 영향 요인에 관한 연구)

  • Minjung Park;Sangmi Chai
    • Information Systems Review
    • /
    • v.20 no.3
    • /
    • pp.33-49
    • /
    • 2018
  • Since there are growing concerns regarding personal information, users have perceived the importance of it. It makes users try to manage and control personal information by their own intentions. Therefore, we assume users now have begun to perceive psychological ownership on personal information. A main objective of this study is to identitythe relationship between accountability, self-identity, self-efficacy and sense of belongingness and psychological ownership on personal information. We conduct an online-basedsurvey and establish a structural equation model for testing hypothesis. The results show that users' accountability, self-identity and sense of belongingness positively influence to psychological ownership on personal information. Additionally, users' perceived psychological ownership on personal information increase their concern for information privacy. This study suggests a new concept as 'perceived psychological ownership on personal information' to explain for intentions of their psychological possessions toward personal information. The findings of this study can provide a way for how firms have to require clients' personal information with increasing their satisfactions.

Design and Implementation of Internet Telephony Services (인터넷 텔레포니(VoIP) 서비스의 설계 및 구현)

  • 이종화;강신각
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.9C
    • /
    • pp.842-852
    • /
    • 2002
  • The fast advance in the VoIP technologies gives a rich opportunity to create different kind of VoIP applications such as IP telephony services. The application level call signaling protocols such as ITU-T H.323 and IETF SIP provide the communication functions of end-to-end call setup and release. Currently, there is a lot of H.323 based VoIP products in the market, however SIP is considered as a suitable protocol for supporting applications in IP environments, so SIP based VoIP products and services begin to appear. In this paper, firstly we present the characteristics of some possible SIP based applications and describe the design and implementation of a VoIP example service named PC-to-PC Internet telephony service using the developed SIP network components. The PC-to-PC Internet telephony service and User Agent are developed in MS window 98/2000 using visual C/C++, and Proxy server and Registrar in Linux 7.0 using C, respectively.

Development and Implementation of Functions for Mobile Robot Navigation (이동 로봇의 자율 주행용 함수 개발 및 구현)

  • Jeong, Seok-Ki;Ko, Nak-Yong;Kim, Tae-Gyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.3
    • /
    • pp.421-432
    • /
    • 2013
  • This paper describes implementation of functions for mobile robot localization, which is one of the vital technologies for autonomous navigation of a mobile robot. There are several function libraries for mobile robot navigation. Some of them have limited applicability for practical use since they can be used only for simulation. Our research focuses on development of functions which can be used for localization of indoor robots. The functions implement deadreckoning and motion model of mobile robots, measurement model of range sensors, and frequently used calculations on angular directions. The functions encompass various types of robots and sensors. Also, various types of uncertainties in robot motion and sensor measurements are implemented so that the user can select proper ones for their use. The functions are tested and verified through simulation and experiments.

An Analysis on SNS Management and Visitors' response of Nuclear Regulatory Organizations : Focus on the Comparison about facebook page between NSSC and NRC (원자력 규제기관의 SNS 활용 및 수용자 반응 분석 : 원자력안전위원회와 NRC 페이스북 비교를 중심으로)

  • Choi, Hyun-Joo;Shim, Eun-Jung
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.11-19
    • /
    • 2016
  • SNS users are continuously increasing and SNS is emerging as a major PR channel of government. In particular, SNS can be a useful tool, but also the challenges for risk communication. This study is examined how nuclear regulatory organizations' SNS management and visitors' responses to the facebook pages in Korea and U.S.. Results indicated that both organizations frequently used information-oriented posting. Concerning the types of PR, NSSC tended to mainly use 'Relationship-Management PR', NRC mainly use 'Image PR.' In addition, our analyses on visitors' responses showed that visitors usually in response to participational and visual(ex. video, card news) typed contents. Based on its' results, this study provides practical suggestions for government's future SNS management strategies.

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.