• Title/Summary/Keyword: Personal-usage

Search Result 473, Processing Time 0.029 seconds

A Computer Program, MAPP, for the Estimation of the Macroalgal Annual Production from Photosynthetic Rates and Biomass Changes (광합성율과 생물량에 기초한 해조류의 년 생산량 계산 프로그람)

  • JOH, SUNG-OK;KOH, CHUL-HWAN
    • 한국해양학회지
    • /
    • v.26 no.3
    • /
    • pp.291-294
    • /
    • 1991
  • MAPP a computer program provides an estimate of the annual production of macroalgae. The calculation of the annual production is based on the Photosynthesis-Irradiance relationship under different temperature conditions and annual changes of algal biomass. The production in a given time was obtained from the multiplication of biomass by the production rate measured by in situ experiments. The annual production, $P_{yr}$, is calculated from $P_{yr}{\;}={\;}{\int}B_t{\cdot}P_r{\;}dt$, where, $P_t$ = f(T,L)and T, L = f(t). The program is written in Pascal language to facilitate the usage with personal computers. The data of the photosynthetic rates and biomass of Sargassum confusum measured at Ohori, on the east coast of Korea, was used for an example.

  • PDF

A Design of a TV Advertisement Effectiveness Analysis System Using SNS Big-data (SNS Big-data를 활용한 TV 광고 효과 분석 시스템 설계)

  • Lee, Areum;Bang, Jiseon;Kim, Yoonhee
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.9
    • /
    • pp.579-586
    • /
    • 2015
  • As smart-phone usage increases, the number of Social Networking Service (SNS) users has also exponentially increased. SNS allows people to efficiently exchange their personal opinion, and for this reason, it is possible to collect the reaction of each individual to a given event in real-time. Nevertheless, new methods need to be developed to collect and analyze people's opinion in real-time in order to effectively evaluate the impact of a TV advertisement. Hence, we designed and constructed a system that analyzes the effect of an advertisement in real-time by using data related to the advertisement collected from SNS, specifically, Twitter. In detail, Hadoop is used in the system to enable big-data analysis in parallel, and various analyses can be conducted by conducting separate numerical analyses of the degrees of mentioning, preference and reliability. The analysis can be accurate if the reliability is assessed using opinion mining technology. The proposed system is therefore proven to effectively handle and analyze data responses to divers TV advertisement.

Ultra-Wide Band Sensor Tuning for Localization and its Application to Context-Aware Services (위치추적을 위한 UWB 센서 튜닝 및 상황인지형 서비스에의 응용)

  • Jung, Da-Un;Choo, Young-Yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1120-1127
    • /
    • 2008
  • This paper presents implementation of localization system using UWB (Ultra-Wide Band) sensors and its experimental results along with development of context-aware services. In order for precise measurement of position, we experimented various conditions of pitch angles, yaw angles, number of sensors, height of tags along with measuring errors at each installation. As an application examples of the location tracking system, we developed an intelligent health training management system based on context-aware technology. The system provides appropriate training schedule to a trainee by recognizing position of the trainee and current status of gymnastic equipments and note the usage of the equipment through a personal digital assistant (PDA). Error compensation on position data and moving direction of the trainee was necessary for context-aware service. Hence, we proposed an error compensation algorithm using velocity of the trainee. Experimental results showed that proposed algorithm had made error data reduce by 30% comparing with the data without applying the algorithm.

The Effect of Motivation for Emoticon Use on Behavior of Purchasing Paid Emoticon: Focused on Theory of Planned Behavior (이모티콘 사용동기가 유료 이모티콘 구매 행동에 미치는 영향: 계획행동이론을 중심으로)

  • Yoo, Seunghun;Park, YounJung;Kang, Hyunmin;Kim, Sungtae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.395-404
    • /
    • 2021
  • Emoticons used in personal messengers have already become a one of industry. In this study, we want to explore what motivations people use emoticons and how they affect to purchasing behavior. We first looked into which emoticon usage motivation influenced the attitude of emoticon purchase, and then analyzed the research model through PLS-based structural equation modeling. The result found that fashion and fun/habit factors significantly explain attitudes to emoticon purchase, and attitude, subjective norms, and perceived self-control affect to purchase intention and purchase intention predict purchase behavior. This study showed the factors affecting the purchase of emoticons through a validated model, and the results suggest what motivation factors should be included in the marketing phase and advertising.

A Study on the Actual Conditions and Usage of Korean Design Right (한국 주얼리 디자인권 실태 및 이용에 관한 연구)

  • Chang, Chin-hee;Ko, Seung-Geun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.227-233
    • /
    • 2019
  • In order to suggest the utilization measures suitable of the 4th industry and design right in the management of jewelry company and also applying it to Korean jewelry industry, Also, the current status of Korean jewelry industry and design right was researched. Based on the theoretical background, the hypotheses were set up. After conducting a survey on the 4th industry, design right, management mind, and management intention targeting jewelry industry workers focusing on the set-up hypotheses. In the results The job currently working for in the jewelry industry and the job desired in the future were the design with the highest ratio, so that the importance of design was high in Korean jewelry industry. Also, design was the first priority of management mind, important elements of jewelry industry management, and successful management strategy while technology showed a bit less importance than factors of marketing, capital, and personal connections.

A Study on the Development of ICT Curriculum for Private Security Workers (민간경비 종사자의 ICT직무교육과정 개발에 관한 연구)

  • Sim, Hyun;Kwon, Gyeong-Ae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.397-404
    • /
    • 2019
  • This study developed the ICT curriculum focusing on apartment security guards and analyzed the actual application results. We developed the educational contents and it designed ICT job courseware for elder education by considering and that designed in consideration of the computer attitudes and physical and cognitive characteristics of the elderly. The educational program was applied to the experimental group and the satisfaction and the educational effect were analyzed through the pre and post test results. As a result of the analysis, the satisfaction level of the education program was higher than the average of 4.00 points. The elderly informal education program was examined by using the qualitative assessment test tool before and after the application of the education program. Internet self-efficacy of experiment group, improvement of internet utilization ability, usage of internet use, personal information willingness, life correction, elimination of conflict among generations, self-confidence, and internet stress increased statistically significantly. These results suggest that the "Private Expense ICT Job Training" program developed in this study can be effective for elderly informatization and can be applied to other elderly education programs and contribute to promotion.

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

A Survey on Understanding of Location Information for Providing Location Based Service-Centered on University Students (위치기반서비스 제공을 위한 위치정보에 관한 이해도 조사 -대학생들 중심으로)

  • Park, Hee-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.786-792
    • /
    • 2019
  • Currently, various kinds of contents using smart phone's location information are developed and provided to users. The market size of the location-based service industry utilizing location information is also increasing every year and the majority of smart phone users occupy university students and most of the university students are using their owns smart phones, and they are the biggest users of location-based services and the main target of location information collection. In this paper, we conduct to a survey how university students understand about location information. Based on the results of the survey, we will deeply examine which one is needed to improve understanding of university students' location information collection and usage and what should be considered for the development of the location-based service industry and education of location information and then we propose some helpful suggestion.

Alarm and Memo Application for Group (그룹 사용자를 위한 알람 및 메모 애플리케이션)

  • Lim, Yong-Min;Kwon, Doo-Wy;Park, Suhyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.1111-1112
    • /
    • 2013
  • The number of users topped 30 million smartphones in Korea, has become a necessity of modern people. There are many applications to provide alarm and memo, but most of them are for personal usage not groups. In this study, we present an application providing alarms and memos to all users in a group. The group alarm function provides an alarm to all members in a group when a group member set an alarm. When a memo is written by one member, the memo is shared to all members in the group. Our application will be useful to groups that should notice important information and meeting time among group members.

Decision Support System to Detect Unauthorized Access in Smart Work Environment (스마트워크 환경에서 이상접속탐지를 위한 의사결정지원 시스템 연구)

  • Lee, Jae-Ho;Lee, Dong-Hoon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.797-808
    • /
    • 2012
  • In smart work environment, a company provides employees a flexible work environment for tele-working using mobile phone or portable devices. On the other hand, such environment are exposed to the risks which the attacker can intrude into computer systems or leak personal information of smart-workers' and gain a company's sensitive information. To reduce these risks, the security administrator needs to analyze the usage patterns of employees and detect abnormal behaviors by monitoring VPN(Virtual Private Network) access log. This paper proposes a decision support system that can notify the status by using visualization and similarity measure through clustering analysis. On average, 88.7% of abnormal event can be detected by this proposed method. With this proposed system, the security administrator can detect abnormal behaviors of the employees and prevent account theft.