• Title/Summary/Keyword: Survey Data 저장 기록시스템

Search Result 4, Processing Time 0.015 seconds

A Study on Development of Indoor Object Tracking System Using N-to-N Broadcasting System (N-to-N 브로드캐스팅 시스템을 활용한 실내 객체 위치추적 시스템 개발에 관한 연구)

  • Song, In seo;Choi, Min seok;Han, Hyun jeong;Jeong, Hyeon gi;Park, Tae hyeon;Joeng, Sang won;Kwon, Jang woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.192-207
    • /
    • 2020
  • In industrial fields like big factories, efficient management of resources is critical in terms of time and expense. So, inefficient management of resources leads to additional costs. Nevertheless, in many cases, there is no proper system to manage resources. This study proposes a system to manage and track large-scale resources efficiently. We attached Bluetooth 5.0-based beacons to our target resources to track them in real time, and by saving their transportation data we can understand flows of resources. Also, we applied a diagonal survey method to estimate the location of beacons so we are able to build an efficient and accurate system. As a result, We achieve 47% more accurate results than traditional trilateration method.

Exploring Usability of Mobile Text Messaging Interfaces (휴대폰 문자메시지 기능의 인터페이스 이용성에 관한 연구)

  • Lee, Jee-Yeon
    • Journal of Information Management
    • /
    • v.35 no.4
    • /
    • pp.1-16
    • /
    • 2004
  • In this paper, we outline the user interface problems that the text messaging users face to provide empirical basis for developing better improved mobile text messaging system. Our initial hypothesis was that the majority of the problems that the text messaging users face, namely, 1) difficulty in correctly understanding the intent of the incoming messages and 2) problem with frequently mis-addressing the recipient of the outgoing messages, can be accounted for by the poor usability of the text messaging user interface. Our analysis is based on the text message-based communication diaries, which were recorded for one week by each and every one of 75 college students, and survey taken from the same subjects. The data was collected in 2004. The students listed various difficulties including the limited message length, obscure input method, lack of mean to express emotional content, lack of receipt confirmation, lack of auto save feature when preparing messages to send, and lack of means to permanently save messages. Some of these problems were also identified in the previous studies. However, we were able to gather additional problems that the users face and also elicit potential solutions to remedy the problems. From these findings and analysis, we attempted to provide ways to improve the text messaging user interface.

Job Analysis for IT Security Workers in Defense Industry through DACUM Process (DACUM 기법을 이용한 방위산업체 정보통신보안실무자 직무분석)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.73-84
    • /
    • 2014
  • As the society turns into more of an information an technology centric society, the importance of information security is being increased these days. Recently, as the number of leaking accidents of personal information and valuable industrial technology is on the rise, every field of industry endeavors to come up with a security solution. In particular, since defense industry is a field where it establishes national defense power that is essential of national security, it requires higher standards of security solutions than any other ordinary fields of industry. According to Defense Industry Security Work Instructions, defense industry firms from security organizations and employ a security worker corresponding to the firm's scale and conditions. In an environment where essential information and technology are stored and managed in information and communication system or storing media, the duty and role of IT security workers are crucial. However, there is a shortage of systematic analysis on the work of IT security workers and development of curriculum to enhance their professionalism. Thus DACUM process, a job analysis technique, was used to identify IT Security workers' duties and responsibilities and verify the validity and credibility of the deducted results from the survey. The findings of this study will help in development of IT security duty in defense industry and can be used as baseline data for the development of curriculum and amendments of related regulations.