• Title/Summary/Keyword: Behavior Information Modeling

Search Result 525, Processing Time 0.029 seconds

Object Modeling of Campus Intranet Structure using Design Pattern (설계패턴을 이용한 캠퍼스 인트라넷 구조의 객체모델링)

  • Lim, Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.113-119
    • /
    • 1999
  • Recently, design patterns have been known to be highly effective and practical. Design pattern is a collection of collaborating classes that captures the application independent behavior of system in a particular domain. By using design pattern, the development time and software quality can be greatly increased. However, systematic development process and detailed instructions of building design patterns have not been studied enough. In this paper. we propose practical intranet structure modeling technique that are based on design pattern. The proposed process consists of the four typical software development phases; analysis, navigation, interface, behavior domain design, and each phase is defined as a logical sequence of development tasks. Since the proposed process is based on design pattern foundation, and can be efficiently produced by applying this process.

  • PDF

Winkler spring behavior in FE analyses of dowel action in statically loaded RC cracks

  • Figueira, Diogo;Sousa, Carlos;Neves, Afonso Serra
    • Computers and Concrete
    • /
    • v.21 no.5
    • /
    • pp.593-605
    • /
    • 2018
  • A nonlinear finite element modeling approach is developed to assess the behavior of a dowel bar embedded on a single concrete block substrate, subjected to monotonic loading. In this approach, a discrete representation of the steel reinforcing bar is considered, using beam finite elements with nonlinear material behavior. The bar is connected to the concrete embedment through nonlinear Winkler spring elements. This modeling approach can only be used if a new constitutive model is developed for the spring elements, to simulate the deformability and strength of the concrete substrate. To define this constitutive model, an extensive literature review was conducted, as well as 3 experimental tests, in order to select the experimental data which can be used in the calibration of the model. Based on this data, an empirical model was established to predict the global dowel response, for a wide range of bar diameters and concrete strengths. This empirical model provided the information needed for calibration of the nonlinear Winkler spring model, valid for dowel displacements up to 4 mm. This new constitutive model is composed by 5 stages, in order to reproduce the concrete substrate response.

Object Extraction and Modeling Method from the User Requirements with Fillmore's Case Grammar (Fillmore의 Case Grammar를 통한 사용자 요구사항으로부터 객체 추출 및 모델링 방법)

  • Ahn, Sung-Bin;Kim, Dong-Ho;Seo, Chae-Yun;Kim, R.Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.985-989
    • /
    • 2010
  • The near future smart ubiquitous computing oriented system will have to provide the optimal (right) service through interactions between users and the system. To provide the right services what the user needs, we should choose the user-centered development for reflecting the user needs, but not the developer-centered development. To do this, we proposed User Behavior Analysis Based Needs Extraction Method [1]. In this paper, we propose Object Extraction and Modeling Method from the user requirements with Fillmore's Case Grammar.

Graph Database Design and Implementation for Ransomware Detection (랜섬웨어 탐지를 위한 그래프 데이터베이스 설계 및 구현)

  • Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.24-32
    • /
    • 2021
  • Recently, ransomware attacks have been infected through various channels such as e-mail, phishing, and device hacking, and the extent of the damage is increasing rapidly. However, existing known malware (static/dynamic) analysis engines are very difficult to detect/block against novel ransomware that has evolved like Advanced Persistent Threat (APT) attacks. This work proposes a method for modeling ransomware malicious behavior based on graph databases and detecting novel multi-complex malicious behavior for ransomware. Studies confirm that pattern detection of ransomware is possible in novel graph database environments that differ from existing relational databases. Furthermore, we prove that the associative analysis technique of graph theory is significantly efficient for ransomware analysis performance.

Markov Chain Model-Based Trainee Behavior Pattern Analysis for Assessment of Information Security Exercise Courses (정보보안 훈련 시스템의 성취도 평가를 위한 마코브 체인 모델 기반의 학습자 행위 패턴 분석)

  • Lee, Taek;Kim, Do-Hoon;Lee, Myong-Rak;In, Hoh Peter
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1264-1268
    • /
    • 2010
  • In this paper, we propose a behavior pattern analysis method for users tasking on hands-on security exercise missions. By analysing and evaluating the observed user behavior data, the proposed method discovers some significant patterns able to contribute mission successes or fails. A Markov chain modeling approach and algorithm is used to automate the whole analysis process. How to apply and understand our proposed method is briefly shown through a case study, "network service configurations for secure web service operation".

A Study on the Effects of a Virtual-Users Model Computing the Semantics of Spaces for the Operation and Understanding of Human Behavior Simulation of Architecture-Major Students (공간의 의미를 연산하는 가상 사용자 모델이 건축설계 전공학생들의 인간행동 시뮬레이션 운용과 이해도에 미치는 효과에 관한 연구)

  • Hong, Seung-Wan
    • Journal of KIBIM
    • /
    • v.6 no.3
    • /
    • pp.34-41
    • /
    • 2016
  • The previous studies argue that using the semantic properties of BIM objects is efficient for simulating the behaviors of autonomous, computer agents, called virtual-users, but such assumption is not proven via evidence-based research approaches. Hence, this present study aims to investigate the empirical effects of a human behavior simulation model equipped the semantics of spaces on the architecture-major students' operation and understanding of the simulation system, compared to a typical path-finding model. To achieve the aim, this study analyzed the survey and interview data, collected in the authentic design projects. The analysis indicates that (1) using a simulation model equipped the semantics of spaces helps the students' operation of the simulation, and (2) it also aids understanding the relationship between the variables of spaces and virtual-users (${\alpha}=0.74$). In addition, the qualitative data inform that the advantages of the simulation model that computes the semantics of spaces stem in the automatic behavioral changes of massive numbers of virtual-users, and efficient detection and activation on the what-if situations. The analysis also reveals that the simulation model has shortcomings in orchestrating the complex data structure between the semantics properties of spaces and virtual-users under multi-sequential scenarios. The results of this study contribute to develop a future design system combining BIM with human behavior simulation.

Effectiveness of BIM-based Human Behavior Simulation on Architectural Design Education -Focused on Exploration and Evaluation of Barrier-Free and Fire Evacuation Performances- (BIM 기반의 인간행동 시뮬레이션이 건축설계교육에 미치는 효과에 관한 연구 -무장애와 안전 및 피난설계의 성능탐구와 평가를 중심으로-)

  • Hong, Seung-Wan;Park, Ji-Young
    • Journal of KIBIM
    • /
    • v.10 no.4
    • /
    • pp.1-10
    • /
    • 2020
  • While the importance of barrier-free and fire evacuation design is highlighted in architectural design education, systemic analysis, and examination on such performances are still challenging due to methodological lacks. The present study investigates the effectiveness of BIM-based human behavior simulation for architecture major students' analytical examinations to promote barrier-free and fire evacuation performances. To achieve such an aim, quasi-experiments were conducted, which compare 50 students' analysis and examination scores according to the use and non-use of the simulation, and the data were collected via participants' survey and interview. As a result, T-Test and MANOVA analyses indicate that, compared with its non-use counterpart, the use of human behavior simulation better facilitates the students' (1) examination of the physical properties and dimensions for the disabled's accessibility and evacuation, (2) understanding of the bodily capacity and handicap of the disabled, (3) examination on the spatial layouts and locations of exits, (4) understanding on evacuees' urgent behaviors, and (5) responsibility as an architect. Based on previous studies, the reasons of statistical results are interpreted as the explicit observation and analytical measures of multiple numbers of virtual-evacuees and direct-experience from body range of the disabled responding to the populated occupants as what they face in authentic reality.

Comparative Analysis of Job Satisfaction Factors, Using LDA Topic Modeling by Industries : The Case Study of Job Planet Reviews (토픽모델링 기법을 활용한 산업별 직무만족요인 비교 조사 : 잡플래닛 리뷰를 중심으로)

  • Kim, Dongwook;Kang, Juyoung;Lim, Jay Ick
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.157-171
    • /
    • 2016
  • As unemployment rates and concerns about turnover keep growing, the need for information is also increasing. In these situations, the job reviews which share information about the company catch people's attention because they are usually created by people who worked at the company. The development of SNS and mobile environments has led to an increase in the web services that provide job reviews. For example, Jobplanet is a job review service in Korea, and Glassdoor.com offers a similar service in the US. Despite this attention, however, research utilizing job reviews is insufficient. This paper asks whether there are differences in ratios of job satisfaction factors by industry, using LDA topic modeling and co-occurrence analysis to explore the differences. Through the results of LDA, we find that the ratios of job satisfaction factors are similar by industry. At the same time, the results of co-occurrence analysis show that the co-occurrence frequency of some job satisfaction factors appears high: pay and welfare, balance of work and life, company culture. We expect that the result of this research will be helpful in comparative analysis of job satisfaction factors by industry. Furthermore, in this paper we suggest how to use the job review data in organizational behavior research.

Understanding the Use of Community Informatics: A Structural Equation Modeling Approach (지역정보 시스템 이용모형 개발을 위한 이론적 고찰 및 실증적 연구)

  • 권나현
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.2
    • /
    • pp.23-44
    • /
    • 2004
  • This study proposed a theoretical framework that could explain the service use of a community informatics. The proposed community informatics use model was developed based on three theoretical models: (1) Ajzen's Theory of Planned Behavior (TPB) from social psychology: (2) Uses and gratifications approaches from media use research; and (3) Technology Acceptance Model(TAM) from information technology use research. The proposed model consists of three basic components: expectations of the outcomes from use, approvals from important others, and perceivied controllability over using the service. The initially proposed model was assessed using structural equation modeling, and then re-sepcified in order to propose a better fitting model. The initially proposed and revised community informatics use models were discussed with their theoretical and practical implications.

A Study on the Mitigation of Information Security Avoid Behavior: From Goal Setting, Justice, Trust perspective (정보보안 회피행동 완화에 대한 연구: 정보보안 관련 목표설정, 공정성, 신뢰의 관점을 중심으로)

  • Hwang, In-Ho
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.217-229
    • /
    • 2020
  • Globally, information protection of organization has become an essential management factor, and organizations continue to invest high-level resources for information security. Security threats from insiders are not decreasing. The purpose of this study is to present the antecedence factors to mitigate the role conflict that is the cause of the security avoid behavior. For the study, a survey was conducted for employees of organizations with information security policies, and structural equation modeling was conducted using a total of 383 samples for hypothesis verification. As a result of the analysis, role conflict increased avoid behavior, and goal difficulty, goal specificity, justice, and trust mitigated role conflict. In particular, justice influenced the reduction of role conflict and avoid behavior through trust. The implications were to present the causes and mitigation factors for avoid behavior of employee, and it is judged that it will help the organization to establish a security strategy.