• Title/Summary/Keyword: Information Use Environments

Search Result 1,194, Processing Time 0.024 seconds

A study on re-use intention through external stimuli and infection control of dental office perceived by medical consumer (의료소비자가 인식하는 치과의원의 감염관리와 외부자극을 통한 재이용의사에 관한 연구)

  • Cho, Min-Jeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.4
    • /
    • pp.571-580
    • /
    • 2011
  • Objectives : This study focused on examine the relevance between behavioral changes of customers and re-use intention on medical institution after experiencing infection control through external stimuli. Methods : This research was based on self-standing survey conducted from August to November 2010, 214 people who randomly selected from five dental clinics located in Busan were analyzed as the final group. Collected data were performed using SPSS 12.0 for Window. Results : 1. 82.8% of those surveyed who experienced external stimulation have changed their behavior on hospital environments and facilities, and 80.5% of them answered the stimuli influenced their re-use intention on medical institution. 2. There were no significant differences between participants by general characteristics on 'The reason why medical team wear sanitary appliances'. In age group 30~39, 85.4% of participants chose the answer so the difference were statistically significant(p<.001). Result by household income showed significant difference in group over $1,000 to $2,000 as 82.7% response(p<.05). 3. 94.4% of participants chose 'Required' for both surgical suits and gloves in research of 'The necessity level of personal sanitary appliances' which medical teams wear for treatment and 79.4% agreed that medical teams need to change their medical gloves whenever treating each patients. 4. The survey revealed that the most important appliance in patient's awareness were surgical gloves and protective goggles has chosen as the least important one. Conclusions : Patients as medical consumer were highly noticed of importance of the infection control in dental clinic and necessity of personal sanitary appliances. The patients who has accessed dental infection control information by external stimuli in advance showed objectival changes of their visit and behavioral changes with bringing medical environments together. This aspects influenced those patient's re-use intention in conclusion.

Efficient Service Discovery Scheme based on Clustering for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 클러스터링 기반 효율적인 서비스 디스커버리 기법)

  • Kang, Eun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.123-128
    • /
    • 2009
  • In ubiquitous computing environments, service discovery to search for an available service is an important issue. In this paper, we propose an efficient service discovery scheme that is combined a node id-based clustering service discovery scheme and a P2P caching-based information spreading scheme. To search quickly a service, proposed scheme store key information in neighbor's local cache and search services using it's information. We do not use a central look up server and do not rely on flooding. Through simulation, we show that the proposed scheme improves the performance of response time and network load compared to other methods.

  • PDF

Noise-Robust Speaker Recognition Using Subband Likelihoods and Reliable-Feature Selection

  • Kim, Sung-Tak;Ji, Mi-Kyong;Kim, Hoi-Rin
    • ETRI Journal
    • /
    • v.30 no.1
    • /
    • pp.89-100
    • /
    • 2008
  • We consider the feature recombination technique in a multiband approach to speaker identification and verification. To overcome the ineffectiveness of conventional feature recombination in broadband noisy environments, we propose a new subband feature recombination which uses subband likelihoods and a subband reliable-feature selection technique with an adaptive noise model. In the decision step of speaker recognition, a few very low unreliable feature likelihood scores can cause a speaker recognition system to make an incorrect decision. To overcome this problem, reliable-feature selection adjusts the likelihood scores of an unreliable feature by comparison with those of an adaptive noise model, which is estimated by the maximum a posteriori adaptation technique using noise features directly obtained from noisy test speech. To evaluate the effectiveness of the proposed methods in noisy environments, we use the TIMIT database and the NTIMIT database, which is the corresponding telephone version of TIMIT database. The proposed subband feature recombination with subband reliable-feature selection achieves better performance than the conventional feature recombination system with reliable-feature selection.

  • PDF

Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD (BOZ-PAD 방법을 사용하는 블록암호 기반 CBC|CBC 이중 모드에 대한 패딩 오라클 공격)

  • Hwang, Seongjin;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.89-97
    • /
    • 2015
  • In the various application environments on the internet, we use verified cipher algorithm to protect personal information of electronic commerce or application environments. Even so, if an application method isn't proper, the information you want to keep can be intercepted. This thesis studied about result of Padding Oracle Attack, an application environment which apply CBC|CBC operational mode based on block cipher and BOZ padding method.

Evaluating Service Description to Guarantee Quality of U-service Ontology

  • Lee, Mee-Yeon;Lee, Jung-Won;Kim, Kyung-Ah;Park, Seung-Soo
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.287-298
    • /
    • 2011
  • Efficient service description and modeling methodologies are essential for dynamic service composition to provide autonomous services for users in ubiquitous computing environments. In our previous research, we proposed a 'u-service' ontology which is an abstract and structured concept for device operations in ubiquitous environments. One of the problems that we faced during the design process was that there are not enough standards to analyze the effectiveness of a u-service ontology. In this paper, we propose a quality evaluation model to facilitate the design process of a uservice ontology. We extract modeling goals and evaluation indicators based on the uservice description specification. We also present quality metrics to quantify each of the design properties. The experiment result of the proposed quality model shows that we can use it to analyze the design of u-service ontology from various angles. Also, it shows that the model can provide a guideline, and offer appropriate recommendations for improvements.

Multi-Object Tracking Based on Keypoints Using Homography in Mobile Environments (모바일 환경 Homography를 이용한 특징점 기반 다중 객체 추적)

  • Han, Woo ri;Kim, Young-Seop;Lee, Yong-Hwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.14 no.3
    • /
    • pp.67-72
    • /
    • 2015
  • This paper proposes an object tracking system based on keypoints using homography in mobile environments. The proposed system is based on markerless tracking, and there are four modules which are recognition, tracking, detecting and learning module. Recognition module detects and identifies an object to be matched on current frame correspond to the database using LSH through SURF, and then this module generates a standard object information. Tracking module tracks an object using homography information that generate by being matched on the learned object keypoints to the current object keypoints. Then update the window included the object for defining object's pose. Detecting module finds out the object based on having the best possible knowledge available among the learned objects information, when the system fails to track. The experimental results show that the proposed system is able to recognize and track objects with updating object's pose for the use of mobile platform.

Design of Evaluation Index System for Information Experience based on B2C e-Commerce Bigdata and Artificial Intelligence

  • KANG, Jangmook;HU, Haibo;CHEN, Yinghui;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • The online retail market continues to grow, especially in China, as e-commerce has developed rapidly in recent years in many countries. Meanwhile, the development and use of new network information technology provides consumers with various contact and experience environments for online shopping. Based on the theory of media weakness, the study began to focus consumer experience on the nature of commercial transactions. The study proposed and designed an initial measure of the consumer information evaluation index, which combines previous findings with implications. Finally, the five-dimensional B2C system was established to evaluate consumers' information experience providing information display, information interaction, information support and information personalization. We researched on evaluation index system for information experience of B2C e-commerce consumers based on samples of Chinese consumers.

User Perceptions of Uncertainty in the Selection of Information Retrieval System: Implications for System and Service Improvement

  • Kim, Yang-Woo
    • International Journal of Contents
    • /
    • v.5 no.3
    • /
    • pp.40-49
    • /
    • 2009
  • While numerous studies have suggested the significance of uncertainty during the process of information-seeking, less research has investigated user uncertainty in the actual search process using a real system. This study investigated user perceptions of uncertainty in the process of the selection of information retrieval system in the real information-seeking process. Considering the role of commercial Web search engines as supplementary tools for traditional bibliographic databases in academic research environments, this study analyzed the selection behavior of scholarly researchers, who use such search tools for their academic study. The researchers were limited to the discipline of science in order to understand user perceptions in this field. The findings revealed various dimensions, types, and incidents of uncertainty. Variations appeared in different incidents of uncertainty relating to the unique characteristics of the subjects' information-seeking context. The identification of three principal origins of uncertainty based on the different types of uncertainty generated implications to improve information systems and services.

Data Abstraction in Battlefield Smart Maps Based on QR Tags (QR 태그 기반 전장 스마트 지도에서의 자료 추상화)

  • Kwak, Noh Sup;Yun, Young-Sun;Jung, Jinman;So, Sun Sup;Eun, Seongbae
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.3
    • /
    • pp.440-446
    • /
    • 2020
  • The application field of smart terminals is increasing and its application is also spreading in the defense field. The use of smart terminal based map application is very important in battle fields. The problem is that the communication infrastructure is easy to collapse and the use of GPS is usually disturbed. In this paper, we studied the maps stored in the QR tag at the battle field. The problem is to abstract the map information so that it can be stored in the small QR tag. We have abstracted path information on a vector basis and require only a small amount of data compared to imaged path information. We analyzed the amount of data generated by the abstraction and mathematically analyzed the boundary where the amount does not exceed the capacity limit of the QR tag. Our research can be applied not only to battlefields, but also to disaster / disaster scenes, or in environments with difficult Internet communications, such as mountainous areas.

A License Audit Model for Secure DRM Systems in IP-based Environments

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.253-260
    • /
    • 2010
  • Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.