• Title/Summary/Keyword: U-Messaging

Search Result 17, Processing Time 0.02 seconds

A New Communication Network Model for Chat Agents in Virtual Space

  • Kim, Jong-Woo;Ji, Seong-Hyun;Kim, Seon-Yeong;Cho, Hwan-Gue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.287-312
    • /
    • 2011
  • Internet chat programs and instant messaging services are becoming increasingly popular among Internet users. One of the crucial issues with Internet chat is how to manage the corresponding pairs of questions and answers in a sequence of conversations. Although many novel methodologies have been introduced to cope with this problem, most are poor in managing interruptions, organizing turn-taking, and conveying comprehension. The Internet environment is recently evolving into a 3D environment, but the problems with managing chat dialogues with the standard 2D text-based chat have remained. Therefore, we propose a more realistic communication model for chat agents in 3D virtual space in this paper. First, we propose a new method to measure the capacity of communication between chat agents and a novel visualization method to depict the hierarchical structure of chat dialogues. In addition, we are concerned with communication networks for virtual people (avatars) living in virtual worlds. In this paper we consider a microscopic aspect of a social network in a relatively short period of time. Our experiments show that our model is highly effective in a virtual chat environment, and the communication network based on our model greatly facilitates investigation of a very large and complicated communication network.

Cancer Perceptions Among Smokeless Tobacco Users: A Qualitative Study of US Firefighters

  • Jitnarin, Nattinee;Poston, Walker S.C.;Jahnke, Sara A.;Haddock, Christopher K.;Kelley, Hannah N.
    • Safety and Health at Work
    • /
    • v.11 no.3
    • /
    • pp.284-290
    • /
    • 2020
  • Background: Prevalence rates of smokeless tobacco (SLT) use among firefighters are remarkably high and substantially higher than similar occupational groups and the general U.S. population. The purpose of this study was to explore the perspectives of fire service personnel regarding cancer and its associations with tobacco and SLT use. Methods: This descriptive study used a qualitative approach. Key informant interviews were conducted in 39 career firefighters and fire service administration from across the U.S. Discussion were recorded, transcribed verbatim and transferred to NVivo software for narrative analysis. Topics explored included cancer perceptions, attitudes and beliefs, and cultural factors related to SLT use behaviors. Results: Major themes that emerged among fire service personnel included concerns about cancer and its risk factors including firefighting tasks, such as fire overhaul operations, and from their lifestyle behaviors, such as alcohol and tobacco use. Firefighters also suggested a number of reasons for their increased SLT use, such as fire department tobacco-free policy and fire service culture. Conclusion: The current study provides a rich foundation for future research, prevention, and intervention efforts for the fire service and research communities regarding tobacco and SLT use and cancer risk. Additional research on firefighters' cancer beliefs deserves future research in order to improve messaging about the risks of cancer due to firefighting.

Workflow-based Usability Evaluation of Mobile Phone Messaging Functions (작업흐름도 기반 휴대전화 메시지 기능 사용성 평가)

  • Choi, Jae-Hyun;Kong, Yong-Ku;Jung, Myung-Chul
    • Journal of the Ergonomics Society of Korea
    • /
    • v.26 no.4
    • /
    • pp.65-73
    • /
    • 2007
  • This study evaluated the short message service (SMS) and multimedia message service (MMS) usability of mobile phones and wireless internet services by performance failure rates and flowcharts that adopted the concept of state diagrams. Forty-eight participants who had an experience of using mobile phones were recruited by posting an advertisement on websites for the experiment. They carried out both SMS and MMS tasks with the mobile phones of LG Cyon and Samsung Anycall as well as the wireless internet services of LGT ez-i, KTF magicN, and SKT NATE. In general, Cyon had the lower performance failure rate than Anycall for SMS, and ez-i had the lowest performance failure rate than the other services for MMS. More specifically through the workflow analysis, most participants used hot keys to take 7-8 steps to send a SMS including a symbol and had a difficulty in typing the symbol. They also took 10-11 steps to send a MMS after taking and attaching two pictures. Anycall, magicN, and NATE had significantly large error and failure rates due to the limited option of the menu paths that users could take and poor compatibilities of menu names and between menu and navigation keys. This study showed the possibility of use of flowcharts for systematic and specific usability evaluation methods and found the causes of performance errors and failures with mobile phones and wireless internet services to provide insight into their design.

An Analysis of Big Video Data with Cloud Computing in Ubiquitous City (클라우드 컴퓨팅을 이용한 유시티 비디오 빅데이터 분석)

  • Lee, Hak Geon;Yun, Chang Ho;Park, Jong Won;Lee, Yong Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.45-52
    • /
    • 2014
  • The Ubiquitous-City (U-City) is a smart or intelligent city to satisfy human beings' desire to enjoy IT services with any device, anytime, anywhere. It is a future city model based on Internet of everything or things (IoE or IoT). It includes a lot of video cameras which are networked together. The networked video cameras support a lot of U-City services as one of the main input data together with sensors. They generate huge amount of video information, real big data for the U-City all the time. It is usually required that the U-City manipulates the big data in real-time. And it is not easy at all. Also, many times, it is required that the accumulated video data are analyzed to detect an event or find a figure among them. It requires a lot of computational power and usually takes a lot of time. Currently we can find researches which try to reduce the processing time of the big video data. Cloud computing can be a good solution to address this matter. There are many cloud computing methodologies which can be used to address the matter. MapReduce is an interesting and attractive methodology for it. It has many advantages and is getting popularity in many areas. Video cameras evolve day by day so that the resolution improves sharply. It leads to the exponential growth of the produced data by the networked video cameras. We are coping with real big data when we have to deal with video image data which are produced by the good quality video cameras. A video surveillance system was not useful until we find the cloud computing. But it is now being widely spread in U-Cities since we find some useful methodologies. Video data are unstructured data thus it is not easy to find a good research result of analyzing the data with MapReduce. This paper presents an analyzing system for the video surveillance system, which is a cloud-computing based video data management system. It is easy to deploy, flexible and reliable. It consists of the video manager, the video monitors, the storage for the video images, the storage client and streaming IN component. The "video monitor" for the video images consists of "video translater" and "protocol manager". The "storage" contains MapReduce analyzer. All components were designed according to the functional requirement of video surveillance system. The "streaming IN" component receives the video data from the networked video cameras and delivers them to the "storage client". It also manages the bottleneck of the network to smooth the data stream. The "storage client" receives the video data from the "streaming IN" component and stores them to the storage. It also helps other components to access the storage. The "video monitor" component transfers the video data by smoothly streaming and manages the protocol. The "video translator" sub-component enables users to manage the resolution, the codec and the frame rate of the video image. The "protocol" sub-component manages the Real Time Streaming Protocol (RTSP) and Real Time Messaging Protocol (RTMP). We use Hadoop Distributed File System(HDFS) for the storage of cloud computing. Hadoop stores the data in HDFS and provides the platform that can process data with simple MapReduce programming model. We suggest our own methodology to analyze the video images using MapReduce in this paper. That is, the workflow of video analysis is presented and detailed explanation is given in this paper. The performance evaluation was experiment and we found that our proposed system worked well. The performance evaluation results are presented in this paper with analysis. With our cluster system, we used compressed $1920{\times}1080(FHD)$ resolution video data, H.264 codec and HDFS as video storage. We measured the processing time according to the number of frame per mapper. Tracing the optimal splitting size of input data and the processing time according to the number of node, we found the linearity of the system performance.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

Cross-National Comparison of Public Awareness Campaigns for Suicide Prevention: Analysis of Campaign Strsategies and Contents of New Zealand, USA, Ireland, Scotland, Australia, and Korea (자살예방을 위한 인식개선 캠페인의 국가 간 비교: 뉴질랜드·미국·아일랜드·스코틀랜드·호주 및 대한민국의 캠페인 전략 및 내용 분석)

  • Song, In Han;Kwon, Se Won;Kim, Jung-Soo;You, Jung-Won;Park, Jang Ho;Kim, Lija;Kim, Woosik;Kim, Hyunjee;Kim, Jeniffer Hyunjin;Kim, Ji Eun;An, Sangmin
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.7
    • /
    • pp.253-270
    • /
    • 2014
  • Public awareness campaign is the core factor of the national suicide prevention strategies. Korea's current campaign needs to be more systematically developed. This study analyzed the national-level campaigns for suicide prevention of New Zealand, USA, Ireland, Scotland, and Australia whose campaigns were known to be successful, and compared them with those of Korea. With the analysis framework based on the 'Guideline for Effective Health Communication Campaigns' by the U.S. Department of Health and Human Services, we examined the campaigns from the dimensions of (1) clarity of goals, (2) appropriacy of targeting strategies, (3) suitability of messaging strategies, and (4) efficiency of performance. The results show that effective campaigns for suicide prevention have the following common factors: (1) campaign appellations which include clear goals, (2) targeting at risk groups considering social contexts, (3) slogans which contains specific action guidelines, and (4) close relationships between public and private sectors. On this basis, future directions for more effective suicide prevention media campaigns in Korea are discussed.

Eurasian Naval Power on Display: Sino-Russian Naval Exercises under Presidents Xi and Putin (유라시아 지역의 해군 전력 과시: 시진핑 주석과 푸틴 대통령 체제 하에 펼쳐지는 중러 해상합동훈련)

  • Richard Weitz
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.1-53
    • /
    • 2022
  • One manifestation of the contemporary era of renewed great power competition has been the deepening relationship between China and Russia. Their strengthening military ties, notwithstanding their lack of a formal defense alliance, have been especially striking. Since China and Russia deploy two of the world's most powerful navies, their growing maritime cooperation has been one of the most significant international security developments of recent years. The Sino-Russian naval exercises, involving varying platforms and locations, have built on years of high-level personnel exchanges, large Russian weapons sales to China, the Sino-Russia Treaty of Friendship, and other forms of cooperation. Though the joint Sino-Russian naval drills began soon after Beijing and Moscow ended their Cold War confrontation, these exercises have become much more important during the last decade, essentially becoming a core pillar of their expanding defense partnership. China and Russia now conduct more naval exercises in more places and with more types of weapons systems than ever before. In the future, Chinese and Russian maritime drills will likely encompass new locations, capabilities, and partners-including possibly the Arctic, hypersonic delivery systems, and novel African, Asian, and Middle East partners-as well as continue such recent innovations as conducting joint naval patrols and combined arms maritime drills. China and Russia pursue several objectives through their bilateral naval cooperation. The Treaty of Good-Neighborliness and Friendly Cooperation Between the People's Republic of China and the Russian Federation lacks a mutual defense clause, but does provide for consultations about common threats. The naval exercises, which rehearse non-traditional along with traditional missions (e.g., counter-piracy and humanitarian relief as well as with high-end warfighting), provide a means to enhance their response to such mutual challenges through coordinated military activities. Though the exercises may not realize substantial interoperability gains regarding combat capabilities, the drills do highlight to foreign audiences the Sino-Russian capacity to project coordinated naval power globally. This messaging is important given the reliance of China and Russia on the world's oceans for trade and the two countries' maritime territorial disputes with other countries. The exercises can also improve their national military capabilities as well as help them learn more about the tactics, techniques, and procedures of each other. The rising Chinese Navy especially benefits from working with the Russian armed forces, which have more experience conducting maritime missions, particularly in combat operations involving multiple combat arms, than the People's Liberation Army (PLA). On the negative side, these exercises, by enhancing their combat capabilities, may make Chinese and Russian policymakers more willing to employ military force or run escalatory risks in confrontations with other states. All these impacts are amplified in Northeast Asia, where the Chinese and Russian navies conduct most of their joint exercises. Northeast Asia has become an area of intensifying maritime confrontations involving China and Russia against the United States and Japan, with South Korea situated uneasily between them. The growing ties between the Chinese and Russian navies have complicated South Korean-U.S. military planning, diverted resources from concentrating against North Korea, and worsened the regional security environment. Naval planners in the United States, South Korea, and Japan will increasingly need to consider scenarios involving both the Chinese and Russian navies. For example, South Korean and U.S. policymakers need to prepare for situations in which coordinated Chinese and Russian military aggression overtaxes the Pentagon, obligating the South Korean Navy to rapidly backfill for any U.S.-allied security gaps that arise on the Korean Peninsula. Potentially reinforcing Chinese and Russian naval support to North Korea in a maritime confrontation with South Korea and its allies would present another serious challenge. Building on the commitment of Japan and South Korea to strengthen security ties, future exercises involving Japan, South Korea, and the United States should expand to consider these potential contingencies.

  • PDF