• Title/Summary/Keyword: Ease-of-Use

Search Result 1,797, Processing Time 0.027 seconds

A Study on the Pattern Analysis Method using the User Log on the CMS (CMS의 사용자 로그를 이용한 패턴 분석 방법 연구)

  • Moon, Dong-Yeol;Park, Koo-Rack;Kim, Dong-Hyun;Jung, Jin-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.275-281
    • /
    • 2016
  • In modern society, which boomed it became easier to obtain the necessary information to the emergence of a variety of smart devices. Due to this, the frequency of using the content based on the Web is growing rapidly. In addition, companies are turning into a production and modify the content using the CMS under the web-based. It can be a very important part to provide users with the content. Currently web services are designing a UI to the device and provided. To improve the ease of use, they are enhancing services only by survey and analysis of the patterns of all users. Most are designed without considering the UX only in the technical aspects. In this paper, to break the limits that apply to all users of the Web service pattern analysis, we propose a visualization system via the animation based on the individual user's movement patterns and usage patterns. Through this convergence is expected to be able to transform the web from the central manager to the user UX and the planning aspects researchers.

Comparative analysis of the digital circuit designing ability of ChatGPT (ChatGPT을 활용한 디지털회로 설계 능력에 대한 비교 분석)

  • Kihun Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.967-971
    • /
    • 2023
  • Recently, a variety of AI-based platform services are available, and one of them is ChatGPT that processes a large quantity of data in the natural language and generates an answer after self-learning. ChatGPT can perform various tasks including software programming in the IT sector. Particularly, it may help generate a simple program and correct errors using C Language, which is a major programming language. Accordingly, it is expected that ChatGPT is capable of effectively using Verilog HDL, which is a hardware language created in C Language. Verilog HDL synthesis, however, is to generate imperative sentences in a logical circuit form and thus it needs to be verified whether the products are executed properly. In this paper, we aim to select small-scale logical circuits for ease of experimentation and to verify the results of circuits generated by ChatGPT and human-designed circuits. As to experimental environments, Xilinx ISE 14.7 was used for module modeling, and the xc3s1000 FPGA chip was used for module embodiment. Comparative analysis was performed on the use area and processing time of FPGA to compare the performance of ChatGPT products and Verilog HDL products.

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

Determining Uses and Gratifications for the Mobile Games (이용 충족관점에서의 모바일게임 플레이어 유형과 특성 분석에 관한 연구)

  • Han, Kwang-Hyun;Lee, Han-Chul;Kim, Tae-Ung
    • Information Systems Review
    • /
    • v.9 no.2
    • /
    • pp.15-39
    • /
    • 2007
  • Mobile games have emerged as the most innovative entertainment technology, adding new revenue streams, taking advantage of the potential of wireless applications and service offerings. Mobile games, like any other types of computer game, offer a unique value for users in providing an exciting digital experience in virtual worlds. In this paper, we attempt to investigate the demographic factors which play critical roles in determining the level of playing times; classify mobile gamers based on their motives for playing games; and empirically test differences in their demographic factors and mobile game usage. Statistical results show that significant differences in playing times exist, depending upon their age, gender, mobile device, mobile phone usage, mobile game experiences, and preferred games genres. Applying Factor analysis, we have identified Escape, Social interaction, Challenge and Competition, Fantasy, Diversion and Relaxation, Ease of Accessibility as key motivators for playing mobile games. Additional cluster analysis shows that the categorization of gamers, according to their usage habits and the key motivators for playing, can be made as follows: Multi-gamers, Communication-focused gamers and Mobile active-gamers. Further correlation of these grouping with socio-economic data shows the significant differences in gaming habits and patterns of mobile phone use.

A Study of the Factors Affecting User Acceptance of Smart TVs (스마트TV 사용자 수용에 영향을 미치는 요인 연구)

  • Kim, Su-Yeon;Lee, Sang Hoon;Hwang, Hyun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1652-1662
    • /
    • 2013
  • As smart devices like smartphones and smart pads are prevalent recently, dramatic changes so called 'smart evolution' deployed in many socioeconomic areas. These changes lead the TV industry to develop a smart TV differentiated from a conventional TV by enabling internet connectivity and applications execution. In this study the factors affecting the acceptance of a smart TV are extracted by reviewing the previous works and the structural relationships among these factors are analyzed. Adding 'Social Influence' to consider an environmental factor and 'Innovativeness' for personal characteristics, we build an extended Technology Acceptance Model and analyzed the structural relationships among the factors in the model using Structural Equation Model. In the results we can find that the environmental factors affect the perceived characteristics. The moderating effects of gender and level of experience in smart devices have also been investigated. No difference is found between gender groups. In much-experienced group, Innovativeness affects Perceived Usefulness and acceptance of a smart TV. In less-experienced group, however, Innovativeness affects Perceived Ease of Use, Expected Enjoyment and finally acceptance of a smart TV.

On the Use of SysML Models in the Conceptual Design of Unmanned Aerial Vehicles (무인항공기체계의 개념설계에서 SysML 모델의 활용에 관한 연구)

  • Kim, Young-Min;Lee, Jae-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.206-216
    • /
    • 2012
  • Today's war fields can be characterized by net-centric wars where a variety of independent weapon systems are operated in connection with each other via networks. As such, weapon systems become dramatically advanced in terms of complexity, functionality, precision and so on. It is then obvious that the defense R&D of those requires systematic and efficient development tools enabling the effective management of the complexity, budget/cost, development time, and risk all together. One viable approach is known to be the development methods based on systems engineering, which is already proved to successful in U.S. In this paper, a systems engineering approach is studied to be used in the conceptual design of advanced weapon systems. The approach is utilizing some graphical models in the design phase. As a target system, an unmanned aerial vehicle system is considered and the standard SysML is also used as a modeling language to create models. The generated models have several known merits such as ease of understanding and communication. The interrelationships between the models and the design artifacts are identified, which should be useful in the generation of some design documents that are required in the defense R&D. The result reported here could be utilized in the further study that can eventually lead to a full-scale model-based systems engineering method.

A Collecting and Record of Wide Area Cultural Resources : the Case of Asian Cotton Cultural Resources (광역 문화자원의 수집과 기록 : 아시아 목화문화자원을 중심으로)

  • Noh, Shi-Hun
    • The Korean Journal of Archival Studies
    • /
    • no.28
    • /
    • pp.123-153
    • /
    • 2011
  • In Asia, when cotton and cotton fabrics cultivated and produced in India of Southern Asia had spread to the whole Asia area by land and by sea, the Cotton Road and cotton fabric cultural area could be formed. In Korea, the traditional cotton (Gossypium arboreum) brought by Moon Ik-Jeom in 1363 was cultivated and then the Upland cotton (Gossypium hirsutum) brought via Japan could be produced from 1904. Especially, Gwangju/Jeonnam was the most active place in producing traditional cotton, and eventually became the center of cotton cultivation and fabric production after bringing in Upland cotton. In order to collect and record the cotton cultural resources in the broad area, the Cultural Resources Set, classified its component parts should be made first and then the collecting objects should be investigated. The collecting areas are selected based on the spreading paths and the regional significance of cotton. Since its difficulty of collecting the relevant resources from all of the places in Asia, it should be planned to share the resources through exchanges and cooperation among private, institution and organization. The relevant experts from the various fields should participate in the interdisciplinary researches which are necessary for collecting and recording of wide area cultural resources. Considering the collecting limitation of genuine relics, the digital archives should be established and then offered through a web site that everyone can use them freely by remote. It also needs to plan to display on and off-line for users to perceive the similarity, difference and interconnections of the resources with ease.

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

[Retracted]Case Study of Microseismic Monitoring System Installation based on Underground Mine Communication System ([논문철회]지하광산 갱내통신 기반 미소진동 모니터링 체계 구축 사례)

  • Heo, Seung;Choi, Yongkun
    • Tunnel and Underground Space
    • /
    • v.32 no.2
    • /
    • pp.120-130
    • /
    • 2022
  • In this study, the applicability of the microseismic monitoring system based on the underground mine communication system has been verified by operation test in the domestic underground mine. The microseismic data consists of wavelet data and meta-data for mine safety management, and both data should be transferred, stored, analyzed and managed with proper method according to the purpose and size of each data. In order to select the optimal communication system for the microseismic monitoring system considering the underground environment as well as properties of data, various types of communication system have been tested and compared during operation test after installing the optical cable communication system, 2.4 GHz and 900 MHz wireless communication system through the underground mine tunnel and overground area of the test site. The integrated microseismic monitoring software, which was developed to secure the stability of data management and ease of use, has been updated according to findings from operation test. Through the operation test of the microseismic monitoring system including the communication system and the monitoring software, the technical basis was established corresponding to various requirements of the domestic mine for adoption of the microseismic monitoring system.

Estimating North Korea's GNP by Physical Indicators Approach (실물지표(實物指標)에 의한 북한(北韓)의 GNP 추정(推定))

  • Chun, Hong-tack
    • KDI Journal of Economic Policy
    • /
    • v.14 no.1
    • /
    • pp.167-189
    • /
    • 1992
  • The most difficult problem one faces in estimating North Korea's GNP is the lack of basic national income data. In addition, there is no appropriate foreign exchange rate available to convert North Korea's GNP to dollar values. The physical indicators method is particularly useful in estimating North Korean GNP because it requires only a modest amount of data and obtains dollar GNP directly by applying a relationship between physical indicators and GNP, which is estimated from reference countries, to physical indicators of North Korea. The estimated result of North Korean GNP in 1990 is 27.1 billion dollars and per capita GNP 1,268 dollars. The trade participation ratio (Trade/GNP) implied by the GNP estimate was plausible and so was the ratio of fiscal expenditure to GNP. This paper examined the physical indicators method's logic, the quality of the North Korean data that was used in the estimation, and the plausibility of estimation result. Relatively simple data requirement, comparative ease of computation and plausible estimation results suggest that use of physical indicators method could enhance the reliability of North Korean GNP estimate.

  • PDF