• Title/Summary/Keyword: A potential user

Search Result 731, Processing Time 0.047 seconds

Building Information Modeling for Temporary Structure Planning and Safety Analysis (BIM을 활용한 가설물 계획 및 안전 관리)

  • Kim, Kyungki;Cho, Yong Kwon;Park, Man-Woo
    • Journal of KIBIM
    • /
    • v.6 no.2
    • /
    • pp.12-18
    • /
    • 2016
  • The entire construction safety is significantly influenced by proper uses of temporary structures. However, in current practices, temporary structures are used without sufficient planning and analysis on their impact on safety. Consequently, problems in worker safety and loss of productivity are frequently caused related to temporary structures. This paper introduces an approach that uses Building Information Modeling (BIM) to automatically create temporary structures as part of construction plans and identifies potential safety hazards related to the temporary structures. In this study, the type of temporary structure is limited to scaffolding. Automation algorithms were developed and applied to (1) analyze daily construction site conditions (2) create required scaffolding objects, and (3) identify potential safety hazards related to scaffolding. A case study using a real-world construction project demonstrated that scaffolding objects were properly created based on user-input and potential safety hazards were successfully identified without human intervention.

A Qualitative Analysis of the Purchase Process of Digital Device Accessories: Interpretation by Digital Shadow Work (휴대용 디지털기기 엑세사리 구매과정의 질적 분석: 디지털그림자노동에 의한 해석)

  • Lee, Woong Kyu;Cho, A Ra
    • The Journal of Information Systems
    • /
    • v.32 no.1
    • /
    • pp.85-108
    • /
    • 2023
  • Purpose The purpose of this study is to identify the role of digital shadow work(DSW) in the psychological mechanism that controls using and purchasing digital device accessories. More specifically, it is to reveal how the digital device user's perception of DSW is formed and how the formed DSW affects purchase and what results it will bring. Design/methodology/approach Ground theory method(GTM), one of qualitative appoaches, is adopted as research methodology. By interviewing total twenty five users, the data are analyzed by open coding amd axis coding. Two core codes are selected by selective coding and interpreted by DSW theory. Findings We find concern for potential DSW and generation of new DSW. Concern for potential DSW lead to the purchase of accessorie which would be supposed to reduce potential DSW. During purchasing accessories, quest type DSW, which provices flow experience and expertise, could be genterated. This means that there would be dynamics of DSW in the purchase process of digital device accessories.

A Warning and Forecasting System for Storm Surge in Masan Bay (마산만 국지해일 예경보 모의 시스템 구축)

  • Han, Sung-Dae;Lee, Jung-Lyul
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.5
    • /
    • pp.131-138
    • /
    • 2009
  • In this paper, a dynamic warning system to forecast inland flooding associated with typhoons and storms is described. The system is used operationally during the typhoon season to anticipate the potential impact such as inland flooding on the coastal zone of interest. The system has been developed for the use of the public and emergency management officials. Simple typhoon models for quick prediction of wind fields are implemented in a user-friendly way by using a Graphical User Interface (GUI) of MATLAB. The main program for simulating tides, depth-averaged tidal currents, wind-driven surges and currents was also vectorized for the fast performance by MATLAB. By pushing buttons and clicking the typhoon paths, the user is able to obtain real-time water level fluctuation of specific points and the flooding zone. This system would guide local officials to make systematic use of threat information possible. However, the model results are sensitive to typhoon path, and it is yet difficult to provide accurate information to local emergency managers.

Friendship Influence on Mobile Behavior of Location Based Social Network Users

  • Song, Yang;Hu, Zheng;Leng, Xiaoming;Tian, Hui;Yang, Kun;Ke, Xin
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.126-132
    • /
    • 2015
  • In mobile computing research area, it is highly desirable to understand the characteristics of user movement so that the user friendly location aware services could be rendered effectively. Location based social networks (LBSNs) have flourished recently and are of great potential for movement behavior exploration and datadriven application design. While there have been some efforts on user check-in movement behavior in LBSNs, they lack comprehensive analysis of social influence on them. To this end, the social-spatial influence and social-temporal influence are analyzed synthetically in this paper based on the related information exposed in LBSNs. The check-in movement behaviors of users are found to be affected by their social friendships both from spatial and temporal dimensions. Furthermore, a probabilistic model of user mobile behavior is proposed, incorporating the comprehensive social influence model with extent personal preference model. The experimental results validate that our proposed model can improve prediction accuracy compared to the state-of-the-art social historical model considering temporal information (SHM+T), which mainly studies the temporal cyclic patterns and uses them to model user mobility, while being with affordable complexity.

A Study on the Role of Social Robot in Aspect of User Experiences -Focus on Single-person Households- (사용자 경험 측면에서 소셜로봇의 역할에 관한 고찰 -1인 가구 생활을 중심으로-)

  • Chae, Min-Young;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.295-300
    • /
    • 2017
  • The study evaluates exploration of social robot's role which can emotionally communicate with human as an alternative to heal psychological isolation for single-person households. At first, I conduct a study on literatured to understand the definition and characteristics of social robot then analyze the current situation and future prospects. Based on this, I organized the requirements of social robot in aspect of user experience through in-depth interview of twenties single-person households living in the metropolitan area who could be potential customers. As a result every subject require social robot specialized to them through accumulated interaction. On the other hand, degree of attachment with social robot is different from subjects. Hear by I realize every subject require social robot to different and various functions according to their lifestyle and personality. Therefore I could draw conclusions and implications from this study that technical development in aspect of personalized user experience is necessary for social robot to settle in to human's life in the future.

A Knowledge Graph-based Chatbot to Prevent the Leakage of LLM User's Sensitive Information (LLM 사용자의 민감정보 유출 방지를 위한 지식그래프 기반 챗봇)

  • Keedong Yoo
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.1-18
    • /
    • 2024
  • With the increasing demand for and utilization of large language models (LLMs), the risk of user sensitive information being inputted and leaked during the use of LLMs also escalates. Typically recognized as a tool for mitigating the hallucination issues of LLMs, knowledge graphs, constructed independently from LLMs, can store and manage sensitive user information separately, thereby minimizing the potential for data breaches. This study, therefore, presents a knowledge graph-based chatbot that transforms user-inputted natural language questions into queries appropriate for the knowledge graph using LLMs, subsequently executing these queries and extracting the results. Furthermore, to evaluate the functional validity of the developed knowledge graph-based chatbot, performance tests are conducted to assess the comprehension and adaptability to existing knowledge graphs, the capability to create new entity classes, and the accessibility of LLMs to the knowledge graph content.

The Effect of Switching Costs on user Resistance in the Adoption of Open Source Software (오픈소스 소프트웨어 도입 시 전환비용이 사용자 저항에 미치는 영향)

  • Kim, Hee-Woong;Noh, Seung-Eui;Lee, Hyun-Lyung;Kwahk, Kee-Young
    • Information Systems Review
    • /
    • v.11 no.3
    • /
    • pp.125-146
    • /
    • 2009
  • The emergence of open source software(OSS) with its most prominent advantages creates a vast interest among practitioners. A study on Linux, the most well-known OSS, estimated that it would cost as 5.4 billion Euros taking over 73,000 person-years if it had been developed by conventional means. However, Linux has achieved only 0.65 percent of the operating system market for individual users while Microsoft windows family counts for nearly 90 percent of the market. Much of the effort being spent in the development of OSS is going to waste and potential value that OSS can bring to users is not being realized. Adoption of OSS is often accompanied by the discontinuance of existing software that is already in place. If users resist changing, they may not adopt OSS. Using the case of Linux, this study examines user resistance to change from the commercial operating software to the free operating system. This study identifies six sub-types of switching costs (uncertainty, emotional, setup, learning, lost benefit, and sunk costs) and tests their effects on user resistance to change based on a survey of 201 users. The results show that user resistance to change has a negative impact on the adoption of OSS. Further, this study shows that uncertainty and emotional costs have significant effects on user resistance to change. Beyond previous research on technology adoption, this research contributes towards an understanding of the switching costs leading to user resistance to change and offers suggestions to OSS practitioners for developing strategies to improve the adoption of OSS.

A method for discrete event simulation and building information modelling integration using a game engine

  • Sandoval, Carlos A. Osorio;Tizani, Walid;Koch, Christian
    • Advances in Computational Design
    • /
    • v.3 no.4
    • /
    • pp.405-418
    • /
    • 2018
  • Building Information Modelling (BIM) and Discrete Event Simulation (DES) are tools widely used in the context of the construction industry. While BIM is used to represent the physical and functional characteristics of a facility, DES models are used to represent its construction process. Integrating both is beneficial to those interested in the field of construction management since it has many potential applications. Game engines provide a human navigable 3D virtual environment in which the integrated BIM and DES models can be visualised and interacted with. This paper reports the experience obtained while developing a simulator prototype which integrates a BIM and a DES model of a single construction activity within a commercial game engine. The simulator prototype allows the user to visualise how the duration of the construction activity is affected by different input parameters interactively. It provides an environment to conduct DES studies using the user's own BIM models. This approach could increase the use of DES technologies in the context of construction management and engineering outside the research community. The presented work is the first step towards the development of a serious game for construction management education and was carried out to determine the suitable IT tools for its development.

User Interface Experiment Model Design for Touch-Screen Based on Navigation System (터치스크린 기반 항해 시스템을 위한 사용자 인터페이스 실험 모델 설계)

  • Jeon, Hyun-Min;An, Jae-Yong;Oh, Seung-Yup;Park, Peom
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.11
    • /
    • pp.503-510
    • /
    • 2014
  • With the development of electronic communication technology, the ship's navigational equipment is being digitized, and it has being studied touch-screen-based navigation user interface. However, due to the influence of environmental factors such as waves, it has a potential problem hazardous marine accident occurs due to incorrect operation, the systematic research in consideration of this be done do not. In this paper, we provide a user interface experimental model to verify the stability that takes into account the external environment of the touch-screen input on. Further, we simulated to verify that the interface of the touch screen, the effect of applying the input delay time and the size of the button is obtained through the experimental model proposed. It will be able to greatly contribute to studies of the interface robust touch screen user errors that can be analyzed by the experimental model is proposed to improve the ship, the overall system stability.

User Authentication Method Using Smartphone and Smartwatch (스마트폰과 스마트워치를 활용한 사용자 인증 기법)

  • Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2109-2114
    • /
    • 2017
  • Personal Identification Number (PIN) is the most common user-authentication method for the access control of private and commercial applications. The users need to enter PIN information to the applications whenever the users get access to the private services. However, the process imposes a burden on the users and is vulnerable to the potential shoulder-surfing attacks. In order to resolve both problems, we present a continuous authentication method for both smartphone and smartwatch, namely, synchronized authentication. First we analyze the previous smartwatch based authentication and point-out some shortcomings. In the proposed method, we verify the validity of user by analyzing the combined acceleration data of both smartphone and smartwatch. If the monitored sensor data shows the high correlations between them, the user is successfully authenticated. For the authentication test, we used the Samsung Galaxy Note5 and Sony Smartwatch2.