• Title/Summary/Keyword: User Centric

Search Result 226, Processing Time 0.025 seconds

An Analysis on Data Throughput of PicoCast Affected by Piconet Mutual Interference (피코넷 상호 간섭이 PicoCast 데이터 전송량에 미치는 영향 분석)

  • Chung, Jae-Kyong;Jeon, Sang-Yeop;Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.40-49
    • /
    • 2015
  • PicoCast is a recently proposed short-range wireless communications technology that supports both low rate sensor/control data and high speed data such as voice and video traffic in the personal space, defined by the user-centric space of radius tens of meters, with one unified protocol. When the users are in the same area, personal spaces defined by each user may overlap. Since these PicoCast piconets may simultaneously operate, mutual interference is unavoidable. It is necessary to investigate the effect of mutual interference on data transmission and to conduct research on minimizing the interference among PicoCast devices. In this paper we analyze the effect of mutual interference between PicoCast piconets based on data throughput using OPNET network simulator. We have implemented the PicoCast protocol and measured the average throughput and packet loss rate.

Evaluating Existing Usability Heuristics to Create a New Set of Heuristics for the Current State of Korean Technologies (한국 기술 현황에 적합한 신규 Heuristics 생성을 위한 기존 Usability Heuristics 평가)

  • Jeong, Young-Joo;Jeong, Goo-Cheol
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.1
    • /
    • pp.62-68
    • /
    • 2011
  • Usability heuristics("heuristics") are general principles for usability evaluation during user interface design. This method is commonly used by Human Computer Interaction(HCI) professionals; however, the most widely used set of heuristics which were originally created by Nielsen has not yet been found practical in the current state of Korean technologies. In our prior research, we found that some of Nielsen's heuristics are difficult for some evaluators to understand and insufficient to fully evaluate Korean applications, due to the broad-applicability of these heuristics and differences in cultural context. Therefore, in this study, professionals in computer science and related fields evaluated Nielsen's ten usability heuristics in order to gather logical bases for finding areas for improvement. The results of this study will help creating a new set of heuristics that will better valuate more recently developed applications.

  • PDF

Design and Implementation of LED Lighting Control System Using Arduino Yun and Cloud in IoT (사물인터넷에 아두이노 윤과 클라우드를 이용한 LED 조명 제어 시스템 설계)

  • Xu, Hao;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.983-988
    • /
    • 2016
  • Internet of Things Iranian people and things, things and things are connected through the Cloud. It can significantly save energy through a combination of LED lighting as a new ICT technologies and industry-to provide a human-centric, eco-friendly, and the content is embedded multifunction solutions that meet your needs, environment, implementation time according to user requirements, technology It can be systematized as converged next-generation lighting. In this paper, we have developed regarding whether the building in relation to the LED lighting control system using smart devices and Cloud-based user as a human connection through the board to the Arduino Yun lit LED lighting, wireless smart device or to the Cloud or off. After the Arduino Yun is connected to the Internet, taking the current date and time information from the Linux shell command used the way coming across the bridge (BRIDGE) its value.

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.

Design of the Autogenous Context Service and Middleware for Ubiquitous Environments (유비쿼터스 환경을 위한 자생적 컨텍스트 서비스와 미들웨어의 설계)

  • Oh Hae-Seok;Oh Dong-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1088-1098
    • /
    • 2005
  • Context-Aware is a one of the important researches in ubiquitous computing for providing optimal service to users by acquiring user's intentions and environmental information. Diverse researches are focused on the users and its environment facts for Context-Aware base and introduce a sensing based middleware which engages sever/sensor that operates identifier information to provide services. Context-Aware service which is limited by users and environment facts has the problem of overlapping sensing, unnecessary searching and anonymity of users. Also Server-Centric Context-Aware system requires very high cost to manage and operate the services. On this paper, We introduce Autogenous Context service model to simplify the Context-Aware process and design the middleware which performs decentralize management for Context-Aware information of user's portable devices to minimize problems which is occurred during the management and operation of existing Context-Aware system.

  • PDF

The Push Framework for UMPC Tactical Data Link(TDL) Based on The Legacy Radio (레거시 라디오 기반의 UMPC 전술 데이터 링크 Push 프레임워크)

  • Sim, Dong-Sub;Shin, Ung-Hee;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.397-404
    • /
    • 2010
  • Recently, there is on-going research about tactical data link system based on the legacy radio. Tactical data link based on legacy radio is operated mostly in narrow bandwidth under 25khz. Communicating traffics in nodes participated at network need to be minimized for distributing tactical data in narrow bandwidth. In addition, the data distributing structure is necessary for distributing tactical informations such as a situation awareness and so on to war fighters. However, conventional server-client system wastes a lot of time to obtain information for war fighters as user uses pull system to gather necessary information by seeking it one by one. Especially, the fighter pilot is supposed to dedicate into a situation awareness and fight mission in every seconds but seeking information of a user terminal while aircraft maneuvering affects as obstacle to concentrate engaging hostiles. therefore, push technology, the tactical data distributing system, is necessary for war fighters to receive fixed tactical data automatically without putting attention to it. This paper propose the UMPC tactical data link push framework. the UMPC tactical data link is a tactical data link system based on the legacy radio. Proposed push framework is verified by composing experiment environment and testing.

Evaluating the Current State of ChatGPT and Its Disruptive Potential: An Empirical Study of Korean Users

  • Jiwoong Choi;Jinsoo Park;Jihae Suh
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.1058-1092
    • /
    • 2023
  • This study investigates the perception and adoption of ChatGPT (a large language model (LLM)-based chatbot created by OpenAI) among Korean users and assesses its potential as the next disruptive innovation. Drawing on previous literature, the study proposes perceived intelligence and perceived anthropomorphism as key differentiating factors of ChatGPT from earlier AI-based chatbots. Four individual motives (i.e., perceived usefulness, ease of use, enjoyment, and trust) and two societal motives (social influence and AI anxiety) were identified as antecedents of ChatGPT acceptance. A survey was conducted within two Korean online communities related to artificial intelligence, the findings of which confirm that ChatGPT is being used for both utilitarian and hedonic purposes, and that perceived usefulness and enjoyment positively impact the behavioral intention to adopt the chatbot. However, unlike prior expectations, perceived ease-of-use was not shown to exert significant influence on behavioral intention. Moreover, trust was not found to be a significant influencer to behavioral intention, and while social influence played a substantial role in adoption intention and perceived usefulness, AI anxiety did not show a significant effect. The study confirmed that perceived intelligence and perceived anthropomorphism are constructs that influence the individual factors that influence behavioral intention to adopt and highlights the need for future research to deconstruct and explore the factors that make ChatGPT "enjoyable" and "easy to use" and to better understand its potential as a disruptive technology. Service developers and LLM providers are advised to design user-centric applications, focus on user-friendliness, acknowledge that building trust takes time, and recognize the role of social influence in adoption.

A Study of Network Forensic for IDS (IDS 관제를 위한 네트워크 포렌식 연구)

  • Lee, Gi-Sung;No, Si-Young;Park, Sang-Joon;Lee, Jong-Chan;Lee, Seong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.467-473
    • /
    • 2011
  • The Network-packet in this Paper to ensure the integrity of the legal evidence is effect that can have is to offer an Network-forensics system. The Paper proposed Network-forensics system in the company through legal disputes accident Networking and state agency (with investigative authority) for criminal investigations in networking for the effective and correct way to present a report of user-centric services through effective awareness can be improved.

Analysis of Author Image Based on Book Recommendation from Readers (독자 추천도서 정보를 이용한 작가 이미지 분석 연구)

  • Choi, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.4
    • /
    • pp.153-171
    • /
    • 2017
  • Many readers tend to read books of a specific author and to expand their reading areas according to the author. This study chose Edgar Allan Poe and analyzed the image of the author using co-recommended authors and books by other readers. The frequencies of co-occurred authors and books were investigated and the relations of authors and books were analyzed with network analysis methods. As a result, genre images of Poe, related authors, and related books are discovered. This study also suggested the methods to identify the image of a author, related author groups, and related books for libraries' reading programs and book curation.

Inter-Cell Interference Management for Next-Generation Wireless Communication Systems

  • Kwon, Ho-Joong;Ko, Soo-Min;Seo, Han-Byul;Lee, Byeong-Gi
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.258-267
    • /
    • 2008
  • In this paper, we examine what changes the next-generation wireless communication systems will experience in terms of the technologies, services, and networks and, based on that, we investigate how the inter-cell interference management should evolve in various aspects. We identify that the main driving forces of the future changes involve the data-centric services, new dynamic service scenarios, all-IP core access networks, new physical-layer technologies, and heavy upload traffic. We establish that in order to cope with the changes, the next-generation inter-cell interference management should evolve to 1) set the objective of providing a maximal data rate, 2) take the form of joint management of power allocation and user scheduling, 3) operate in a fully distributed manner, 4) handle the time-varying channel conditions in mobile environment, 5) deal with the changes in interference mechanism triggered by the new physical-layer technologies, and 6) increase the spectral efficiency while avoiding centralized coordination of resource allocation of the users in the uplink channel.