• Title/Summary/Keyword: User Response Time

Search Result 415, Processing Time 0.026 seconds

The Effect of Field-Based Participation Design on Agricultural Direct Sales Facilities: Process Change of Awareness on Participant (농특산물 직거래판매시설에 관한 현장중심의 참여디자인 효과: 참여자의 의식변화를 중심으로)

  • Seo, Aeeun;Hong, Jungpyo;Ha, Eunyoung;Chae, Hyesung
    • Science of Emotion and Sensibility
    • /
    • v.21 no.1
    • /
    • pp.165-176
    • /
    • 2018
  • A demand for user's participation in the designing process, which is called the participation design, is increasing with social change. Practically, however, there is lack of researches on the improvement of the problem in actual design development and participation design effect. In order to understand the field-based participation design effect in view of user's change of awareness on participation design, this study carried out a survey on the change of awareness through a design workshop in which all stakeholders have participated on the subject of agricultural direct sales facilities as a part of participation design programs. Many references were reviewed first to understand the participation design principles and their current research trend. Next, the questionnaire was developed using an effectiveness verification model for an effective analysis. A design workshop as one of the participation design programs was organized and applied for the field response. In order to analyze the effect, the survey on participants' change of awareness was carried out before and after the program. The survey questionnaires were about motivation, knowledge, recognition, function, and participation and asked the design study graduates. The participation design effect was supplemented by additional open questions. As a consequence, the participants in the participation design program showed the noticeable effect in knowledge and function about the agricultural direct sales facilities. It was found that they were also highly satisfied with the participation design result and they recognized an importance of collaboration. This study also showed that a sufficient time schedule considering agricultural village life should be given for a smooth operation of the program and also a working environment is necessary for designing work.

Augmented Reality (AR)-Based Sensor Location Recognition and Data Visualization Technique for Structural Health Monitoring (구조물 건전성 모니터링을 위한 증강현실 기반 센서 위치인식 및 데이터시각화 기술)

  • Park, Woong Ki;Lee, Chang Gil;Park, Seung Hee;You, Young Jun;Park, Ki Tae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.2
    • /
    • pp.1-9
    • /
    • 2013
  • In recent years, numerous mega-size and complex civil infrastructures have been constructed worldwide. For the more precise construction and maintenance process management of these civil infrastructures, the application of a variety of smart sensor-based structural health monitoring (SHM) systems is required. The efficient management of both sensors and collected databases is also very important. Recently, several kinds of database access technologies using Quick Response (QR) code and Augmented Reality (AR) applications have been developed. These technologies provide software tools incorporated with mobile devices, such as smart phone, tablet PC and smart pad systems, so that databases can be accessed very quickly and easily. In this paper, an AR-based structural health monitoring technique is suggested for sensor management and the efficient access of databases collected from sensor networks that are distributed at target structures. The global positioning system (GPS) in mobile devices simultaneously recognizes the user location and sensor location, and calculates the distance between the two locations. In addition, the processed health monitoring results are sent from a main server to the user's mobile device, via the RSS (really simple syndication) feed format. It can be confirmed that the AR-based structural health monitoring technique is very useful for the real-time construction process management of numerous mega-size and complex civil infrastructures.

Establishment Model of Entrance and Exit User of Urban Railway Station (도시철도역 출입구 유출입 이용자 추정 모형 수립)

  • Kim, Hwang Bae;Lee, Sang Hwa;Bae, Choon Bong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.1
    • /
    • pp.81-91
    • /
    • 2019
  • Although the number of users of urban railways is greatly influenced by the land use plan around the railway station, Korea has been studying this problem in a small scale, so that the entrance width is uniformly calculated irrespective of the land use plan, And there is little deviation. Therefore, this study aims to establish a demand estimation model for the entrance and exit of urban railway stations. For this purpose, the demand, land use area, and socioeconomic indicators for each of the 20 urban railway stations were surveyed at 200m and 500m Regression model. The model is based on the assumption that the dependent variable (response variable) of the model is set to 1 day, peak 1 hour, peak time 5 minutes, Education, and park) and socioeconomic indicators (population, employer, employee, and student) as independent variables (explanatory variables). As a result, it was analyzed that the fit of the model is more statistically significant when the use area of the land use by 500 meters of the center radius of the city rail is used as an independent variable and the demand for the daily use of the railway station is used as a dependent variable. The purpose of this study is to estimate the optimal size of urban railway entrance in order to improve the mobility of the user and the transportation weak in urban railway station.

Urban Runoff Network Flow Velocity Monitoring System Using Ubiquitous Technique and GIS (Ubiquitous 기술과 GIS를 이용한 도시배수관망 유속측정 시스템 개발)

  • Choi, Changwon;Yi, Jaeeung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.5B
    • /
    • pp.479-486
    • /
    • 2010
  • Reliable hydrologic data acquisition is the basic and essential requirement for efficient water management. Especially the acquisition of various stream data in a certain location is very important to construct on alarm system to response an urban flood which occurs frequently due to the effect of climate change. Although the frequency of stream inundation flood occurrence becomes low owing to the consistent stream improvement, the urban flood due to the drainage system problems such as deterioration and bad management occurs continuously. The consistent management and current status understanding of the urban drainage system is essential to reduce the urban flood. The purpose of this study is to develop the urban runoff network flow velocity monitoring system which has the capability of collecting stream data whenever, wherever and to whomever without expert knowledge using Code Division Multiple Access technique and Bluetooth near-distance wireless communication technique. The urban runoff network flow velocity monitoring system consists of three stages. In the first stage, the stream information obtained by using ubiquitous floater is transferred to the server computer. In the second stage, the current state of the urban drainage system is assessed through the server computer. In the last stage, the information is provided to the user through a GUI. As a result of applying, the developed urban runoff network flow velocity monitoring system to Woncheon-Stream in Suwon, the information necessary for urban drainage management can be managed in real time.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

The Effect of Users' Personality on Emotional and Cognitive Evaluation in UCC Web Site Usage (UCC(user-created-contents) 웹 사이트에서 사용자의 인성이 감정적, 인지적 평가와 UCC 활용에 미치는 영향)

  • Moon, Yun-Ji;Kang, So-Ra;Kim, Woo-Gon
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.167-190
    • /
    • 2010
  • The research conducted here focuses on the effect of factors that affect the behavior of UCC (User Created Content) website users, other than user's rational recognition of how useful a UCC website can be. Most discussions in the existing literature on information systems have focused on users' evaluation how a UCC website can help to attain the users' own goals. However, there are other factors and this research pays attention to an individual's 'personality,' which is stable and biological in nature. Specifically, I have noted here that 'extroversion' and 'neuroticism,' the two common personality factors presented in Eysenck's most representative 'EPQ Model' and 'Big Five Model,' are the two personality factors that affect a site's 'usefulness,' by this I mean how useful does the user consider the website and its content. How useful a site is considered by the user is the other factor that has been regarded as the antecedent factor that influences the adoption of information systems in the existing MIS (Management Information System) research. Secondly, as using or creating a UCC website does not guarantee the user's or the creator's extrinsic motivation, unlike when using the information system within an organization, there is a greater likelihood that the increase in user's activities in relation to a UCC website is motivated by emotional factors rather than rational factors. Thus, I have decided to include the relationship between an individual's personality and what they find pleasurable in the research model. Thirdly, when based on the S-O-R Paradigm of Mehrabian and Russell, the two cognitive factors and emotional factors are finally affected by stimulus, and thus these factors ultimately have an effect on an individual's respondent behavior. Therefore, this research has presented an assumption that the recognition of how useful the site and content is and what emotional pleasure it provides will finally affect the behavior of the UCC website users. Finally, the relationship between the recognition of how useful a site is and how pleasurable it is to useand UCC usage may differ depending on certain situational conditions. In other words, the relationship between the three factors may vary according to how much users are involved in the creation of the website content. Creation thus emerges as the keyword of UCC. I analyzed the above relationships through the moderating variable of the user's involvement in the creation of the site. The research result shows the following: When it comes to the relationship between an individual's personality and what they find pleasurable it is extroverted users who have a greater likelihood to feel pleasure when using a UCC website, as was expected in this research. This in turn leads to a more active usage of the UCC web site because a person who is an extrovert likes to spend time on activities with other people, is sensitive to new experiences and stimuli and thus actively responds to these. An extroverted person accepts new UCC activities as part of his/her social life, rather than getting away from this new UCC environment. This is represented by the term 'Foxonomy' where the users meet a variety of users from all over the world and contact new types of content created by these users. However, neuroticism creates the opposite situation to that created by extroversion. The representative symptoms of neuroticism are instability, stress, and tension. These dispositions are more closely related to stress caused by a new environment rather than this creatingcuriosity or pleasure. Thus, neurotic persons have an uneasy feeling and will eventually avoid the situation where their own or others' daily lives are frequently exposed to the open web environment, this eventually makes them have a negative attitude towards the web environment. When it comes to an individual's personality and how useful site is, the two personality factors of extroversion and neuroticism both have a positive relationship with the recognition of how useful the site and its content is. The positive, curious, and social dispositions of extroverted persons tend to make them consider the future usefulness and possibilities of a new type of information system, or website, based on their positive attitude, which has a significant influence on the recognition of how useful these UCC sites are. Neuroticism also favorably affects how useful a UCC website can be through a different mechanism from that of extroversion. As the neurotic persons tend to feel uneasy and have much doubt about a new type of information system, they actively explore its usefulness in order to relieve their uncomfortable feelings. In other words, neurotic persons seek out how useful a site can be in order to secure their own stable feelings. Meanwhile, extroverted persons explore how useful a site can be because of their positive attitude and curiosity. As a lot of MIS research has revealed that the recognition of how useful a site can be and how pleasurable it can be to use have been proven to have a significant effect on UCC activity. However, the relationship between these factors reveals different aspects based on the user's involvement in creation. This factor of creationgauges the interest of users in the creation of UCC contents. Involvement is a variable that shows the level of an individual's mental effort in creating UCC contents. When a user is highly involved in the creation process and makes an enormous effort to create UCC content (classed a part of a high-involvement group), their own pleasure and recognition of how useful the site is have a significantly higher effect on the future usage of the UCC contents, more significantly than the users who sit back and just retrieve the UCC content created by others. The cognitive and emotional response of those in the low-involvement group is unlikely to last long,even if they recognize the contents of a UCC website is pleasurable and useful to them. However, the high-involvement group tends to participate in the creation and the usage of UCC more favorably, connecting the experience with their own goals. In this respect, this research presents an answer to the question; why so many people are participating in the usage of UCC, the representative form of the Web 2.0 that has drastically involved more and more people in the creation of UCC, even if they cannot gain any monetary or social compensation. Neither information system nor a website can succeed unless it secures a certain level of user base. Moreover, it cannot be further developed when the reasons, or problems, for people's participation are not suitably explored, even if it has a certain user base. Thus, what is significant in this research is that it has studied users' respondent behavior based on an individual's innate personality, emotion, and cognitive interaction, unlike the existing research that has focused on 'compensation' to explain users' participation with the UCC website. There are also limitations in this research. Firstly, I divided an individual's personality into extroversion and neuroticism; however, there are many other personal factors such as neuro-psychiatricism, which also needs to be analyzed for its influence on UCC activities. Secondly, as a UCC website comes in many types such as multimedia, Wikis, and podcasting, these types need to be included as a sub-category of the UCC websites and their relationship with personality, emotion, cognition, and behavior also needs to be analyzed.

A Hashing Scheme using Round Robin in a Wireless Internet Proxy Server Cluster System (무선 인터넷 프록시 서버 클러스터 시스템에서 라운드 로빈을 이용한 해싱 기법)

  • Kwak, Huk-Eun;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.615-622
    • /
    • 2006
  • Caching in a Wireless Internet Proxy Server Cluster Environment has an effect that minimizes the time on the request and response of Internet traffic and Web user As a way to increase the hit ratio of cache, we can use a hash function to make the same request URLs to be assigned to the same cache server. The disadvantage of the hashing scheme is that client requests cannot be well-distributed to all cache servers so that the performance of the whole system can depend on only a few busy servers. In this paper, we propose an improved load balancing scheme using hashing and Round Robin scheme that distributes client requests evenly to cache servers. In the existing hashing scheme, if a hashing value for a request URL is calculated, the server number is statically fixed at compile time while in the proposed scheme it is dynamically fixed at run time using round robin method. We implemented the proposed scheme in a Wireless Internet Proxy Server Cluster Environment and performed experiments using 16 PCs. Experimental results show the even distribution of client requests and the 52% to 112% performance improvement compared to the existing hashing method.

Development of the video-based smart utterance deep analyser (SUDA) application (동영상 기반 자동 발화 심층 분석(SUDA) 어플리케이션 개발)

  • Lee, Soo-Bok;Kwak, Hyo-Jung;Yun, Jae-Min;Shin, Dong-Chun;Sim, Hyun-Sub
    • Phonetics and Speech Sciences
    • /
    • v.12 no.2
    • /
    • pp.63-72
    • /
    • 2020
  • This study aims to develop a video-based smart utterance deep analyser (SUDA) application that analyzes semiautomatically the utterances that child and mother produce during interactions over time. SUDA runs on the platform of Android, iPhones, and tablet PCs, and allows video recording and uploading to server. In this device, user modes are divided into three modes: expert mode, general mode and manager mode. In the expert mode which is useful for speech and language evaluation, the subject's utterances are analyzed semi-automatically by measuring speech and language factors such as disfluency, morpheme, syllable, word, articulation rate and response time, etc. In the general mode, the outcome of utterance analysis is provided in a graph form, and the manger mode is accessed only to the administrator controlling the entire system, such as utterance analysis and video deletion. SUDA helps to reduce clinicians' and researchers' work burden by saving time for utterance analysis. It also helps parents to receive detailed information about speech and language development of their child easily. Further, this device will contribute to building a big longitudinal data enough to explore predictors of stuttering recovery and persistence.

Relational Database SQL Test Auto-scoring System

  • Hur, Tai-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.127-133
    • /
    • 2019
  • SQL is the most common language in data processing. Therefore, most of the colleges offer SQL in their curriculum. In this research, an auto scoring SQL test is proposed for the efficient results of SQL education. The system was treated with algorithms instead of using expensive DBMS(Data Base Management System) for automatic scoring, and satisfactory results were produced. For this system, the test question bank was established out of 'personnel management' and 'academic management'. It provides users with different sets of test each time. Scoring was done by dividing tables into two sections. The one that does not change the table(select) and the other that actually changes the table(update, insert, delete). In the case of a search, the answer and response were executed at first and then the results were compared and processed, the user's answers are evaluated by comparing the table with the correct answer. Modification, insertion, and deletion of table actually changes the data table, so data was restored by using ROLLBACK command. This system was implemented and tested 772 times on the 88 students in Computer Information Division of our college. The results of the implementation show that the average scoring time for a test consisting of 10 questions is 0.052 seconds, and the performance of this system is distinguished considering that multiple responses cannot be processed at the same time by a human grader, we want to develop a problem system that takes into account the difficulty of the problem into account near future.

A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS (D-OCSP-KIS에서 OCSP Responder의 세션 개인키의 노출을 검출하는 방법)

  • Lee, Young-Gyo;Nam, Jung-Hyun;Kim, Jee-Yeon;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.83-92
    • /
    • 2005
  • D-OCSP-KIS proposed by Koga and Sakurai not only reduces the number or OCSP Responder's certificate but also criers the certificate status validation about OCSP Responder to the client. Therefore, D-OCSP-KIS is an effective method that can reduce the communication cost, computational time and storage consumption in client, but it has some problems. In case an attacker accidentally acquires an OCSP Responder's session private key in a time period (e.g., one day), she can disguise as the OCSP Responder in the time period unless the OCSP Responder recognizes. She can offer the wrong response to the client using the hash value intercepted. And the server and user on I-commerce can have a serious confusion and damage. And the computation and releasing of hash chain can be a load to CA. Thus, we propose a method detecting immediately the exposure of an OCSP Responder's session private key and the abuse of hash value in D-OCSP-KIS.