• Title/Summary/Keyword: Cognitive Demand

Search Result 161, Processing Time 0.025 seconds

A Study on the Influence of Family Affection Interaction Behavior on Experience Value in Family Tourism (가족여행에서 가족 간의 상호작용 행동이 체험 가치에 미치는 영향에 관한연구)

  • Wang, Yue;Sim, Jae-yeon;Kim, Hyung-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.101-108
    • /
    • 2019
  • Family tourism has become the mainstream demand of the tourism market, and it is also an effective way to obtain happiness. This paper takes family tourists as the research object, takes the family tourism family affection interaction behavior and the experience value relationship as the link, Empirically tests the family tourism "interaction behavior-social support-experience value" conceptual model and the relationship hypothesis. The results showed that interaction of family affection had a positive and significant effect on the functional, cognitive and emotional experience value of family tourists. Family interaction in family tourism has a significant positive impact on social support. Social support has significant positive effects on functional, cognitive, emotional and overall experiential values. This conclusion expands the theoretical and empirical research on the relationship between interaction behavior and experience value, and provides a basis for understanding the interaction behavior and experience value of family love from the perspective of tourism experience essence.

Mobile Eye Tracker and for Use of the Same for Revitalizing Studies on Eye Tracking (아이트래킹 연구 활성화를 위한 모바일 아이트래커의 활용)

  • Seo, Eun-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.10-18
    • /
    • 2016
  • The cognitive ability of humans depends much on the vision. 'Vision' refers to the sense that receives stimulus of light through eyes. 'Gaze' refers to a function of a straight line that connects the central point of the pupil and a viewpoint in the external world, and, in general, it means a straight line that connects an object that is viewed and the eyes. There are active studies on the gaze in various academic circles including 'psychology' and 'cognitive linguistics.' As a method to objectively analyze the gaze, studies on 'eye tracking' are revitalized. A device for studies on eye tracking is an 'eye tracker.' As the fields of the study expand from development and analysis of Web pages to analysis of stores, methods of traffic signal processing, transport equipment, analysis of user experiences on image contents, and marketing analysis, there occurs a greater demand for a glasses eye-tracking than that for a fixed eye tracker. This study identifies the overview and characteristics of eye tracking and presents a way for spreading studies on eye tracking.

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

  • Wu, Jun;Chen, Ze;Bao, Jianrong;Gan, Jipeng;Chen, Zehao;Zhang, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3738-3760
    • /
    • 2022
  • Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

Factors Influencing Adult Dementia Knowledge, Fear of Dementia, and Intention of Dementia Prevention Behavior on the Demand for Dementia Prevention Education (성인의 치매 지식, 치매 두려움 및 치매 예방행위 의도가 치매 예방교육 요구에 미치는 영향요인)

  • Eun-Hee Shin;Hyea-Kyung Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.67-75
    • /
    • 2023
  • The object of this study was to analyze factors influencing adult dementia knowledge, fear of dementia, and intention of dementia prevention behavior on the demand for dementia prevention education. The subjects of the study were 265 adults aged 19 to 64 living in Chungnam and Chungbuk, who understood the purpose of the study and agreed to participate in the study. The collected research data were analyzed using frequency, percentage, mean, standard deviation, t-test, ANOVA, and multiple regression analysis. As a result of the study, adult dementia knowledge (p=.055) and dementia fear (p=.302) were found that they did not significantly affect the demand for dementia prevention education, and the intention of dementia prevention behavior (β=.329, p<.001) was found to have a significant effect on the demand for dementia prevention education. Based on these research results, understanding of dementia and dementia management projects, early screening for dementia and health guidelines for dementia prevention, chronic disease management for dementia prevention, exercise for dementia prevention, healthy eating for dementia prevention, and cognitive enhancement for dementia prevention In addition to the national dementia prevention publicity and national response efforts such as programs, it is necessary to actively participate in the dementia prevention program centered on the community to practice the correct dementia prevention behavior and provide sufficient opportunities to prevent it.

Improvement of OLSR Through MIMC's Decreased Overhead in MANET (모바일 애드 혹 네트워크 환경 하에서 멀티인터페이스 멀티채널의 오버헤드 감소를 통한 OLSR의 성능 개선)

  • Jang, Jae-young;Kim, Jung-ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.3
    • /
    • pp.55-70
    • /
    • 2016
  • The most critical research issue in MANET environment is on supporting reliable communication between various devices. Various Multi-Hop Routing Protocol studies have proceeded. However, some problems you might have found when you use the existing link state routing technique are that it increases Control Message Overhead and it is unstable when node moves in CR circumstance which has transformation of using channel and MIMC circumstance which uses a number of interfaces. This essay offers a technique which is based on On-Demand Hello and the other technique which used Broadcast Interface of optimization as a solution to decrease Control Message Overhead. Also it proposes Quick Route Restoration technique which is utilized by GPS and MPR Selection technique which consider mobility as a solution of stable communication when node moves. Those offered Routing Protocol and OPNET based simulator result will be expected to be an excellent comparison in related research fields.

An Efficient Routing Protocol Considering Path Reliability in Cognitive Radio Ad-hoc Networks (인지 무선 애드혹 네트워크에서 경로 신뢰성을 고려한 효율적인 라우팅 기법)

  • Choi, Jun-Ho;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.730-742
    • /
    • 2014
  • In the case of On-demand routing protocol in cognitive radio ad-hoc networks, broadcasting of control packets may occur common control channel overload and packet collisions during the routing procedure. This situation is to increase the overhead of path finding and also limited to find the accurate and reliable path. Since reliable channel and path finding is restricted, path life time is shorten and path reliability is reduced. In this paper, we propose a new routing algorithm that reduces control channel overhead and increases path life time by considering the probability of appearance of primary user and channel status of neighbor nodes. Each node performs periodic local sensing to detect primary user signal and to derive primary user activity patterns. The probability of primary appearance on the current channel and the channel status can be obtained based on the periodic sensing. In addition, each node identifies the quality of the channel by message exchange through a common channel with neighbor nodes, then determines Link_Levels with neighbor nodes. In the proposed method, the Link Level condition reduces the number of control messages that are generated during the route discovery process. The proposed method can improve path life time by choosing a path through Path_Reliability in which stability and quality are weighted depending on the location. Through simulation, we show that our proposed algorithm reduces packet collisions and increases path life time in comparison with the traditional algorithm.

Enhanced Reputation-based Fusion Mechanism for Secure Distributed Spectrum Sensing in Cognitive Radio Networks (인지 라디오 네트워크에서 안전한 분산 스펙트럼 센싱을 위한 향상된 평판기반 퓨전 메커니즘)

  • Kim, Mi-Hui;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.61-72
    • /
    • 2010
  • Spectrum scarcity problem and increasing spectrum demand for new wireless applications have embossed the importance of cognitive radio technology; the technology enables the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis after sensing the vacant channel. To enhance the accuracy of sensing, distributed spectrum sensing is proposed. However, it is necessary to provide the robustness against the compromised sensing nodes in the distributed spectrum sensing. RDSS, a fusion mechanism based on the reputation of sensing nodes and WSPRT (weighted sequential probability ratio test), was proposed. However, in RDSS, the execution number of WSPRT could increase according to the order of inputted sensing values, and the fast defense against the forged values is difficult. In this paper, we propose an enhanced fusion mechanism to input the sensing values in reputation order and exclude the sensing values with the high possibility to be compromised, using the trend of reputation variation. We evaluate our mechanism through simulation. The results show that our mechanism improves the robustness against attack with the smaller number of sensing values and more accurate detection ratio than RDSS.

On-demand Allocation of Multiple Mutual-compensating Resources in Wireless Downlinks: a Multi-server Case

  • Han, Han;Xu, Yuhua;Huang, Qinfei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.921-940
    • /
    • 2015
  • In this paper, we investigate the multi-resource allocation problem, a unique feature of which is that the multiple resources can compensate each other while achieving the desired system performance. In particular, power and time allocations are jointly optimized with the target of energy efficiency under the resource-limited constraints. Different from previous studies on the power-time tradeoff, we consider a multi-server case where the concurrent serving users are quantitatively restricted. Therefore user selection is investigated accompanying the resource allocation, making the power-time tradeoff occur not only between the users in the same server but also in different servers. The complex multivariate optimization problem can be modeled as a variant of 2-Dimension Bin Packing Problem (V2D-BPP), which is a joint non-linear and integer programming problem. Though we use state decomposition model to transform it into a convex optimization problem, the variables are still coupled. Therefore, we propose an Iterative Dual Optimization (IDO) algorithm to obtain its optimal solution. Simulations show that the joint multi-resource allocation algorithm outperforms two existing non-joint algorithms from the perspective of energy efficiency.

Health Needs of the Elderly in Long-term Care Facilities: Using RAI-MDS-FC (노인요양시설 입소자의 요양등급별 건강 요구: RAI-MDS-FC를 적용하여)

  • Bang, Eun-Joo;Yun, Soon-Young
    • Research in Community and Public Health Nursing
    • /
    • v.21 no.2
    • /
    • pp.263-272
    • /
    • 2010
  • Purpose: This study was to identify health needs of the elderly at nursing homes by long-term care grade. Methods: The health needs of 116 elders at two nursing homes in Seoul were measured with resident assessment protocols (RAPs), activities of daily living (ADL), and cognitive performance scale (CPS), and pain and depression were measured by resident assessment instrument (RAI). Results: With regard to RAPs, 11 out of 18 items had different distribution in the 3 groups significantly. The 1st-grade elders had a higher percentage of 9 items than the 2nd- and 3rd-grade ones but the 3rd-grade ones had the highest health needs related with activity. The 2nd-grade elders had similar health needs to the 1st-grade ones. In terms of functional level, the 1st-grade elders had the highest percentage of CPS and ADL but the 3rd-grade ones had the highest score of pain and depression out of the 3 groups. The standardized assessment instrument to identify specific health needs by the 3 groups should be developed. Therefore, care plans to meet health needs of the 3 groups will be made. Conclusion: It is suggested that nursing care is required to the elderly of the 1st- and 2nd-grade and safe activity and environment to the 3rd-graded ones.

Designing Intuitive Spatial Game using Brain Computer Interface (뇌-컴퓨터 인터페이스를 사용한 공간 기반 게임 설계)

  • Kim, Na-Young;Yoo, Won-Dae;Lee, Yong-Il;Chung, Seung-Eun;Han, Moo-Kyoung;Yeo, Woon-Seung
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1160-1165
    • /
    • 2009
  • User interface design environment has been known to be part of important elements in user experience and play, and its significance of functionalities are growing bigger each year. In present day, use of intuitive user interface design are on demand. Player can expect to get a new experience that they can not get from other exiting or similar form of games. For the better user experience, essential use of intuitive game play is necessary along with its perceptive user interface. This paper describes intuitive game environment design which will enhance user experience with use of brainwave signal for Brain Computer Interface.

  • PDF