• Title/Summary/Keyword: User behavior

Search Result 1,754, Processing Time 0.028 seconds

ANALYSIS OF TMI-2 BENCHMARK PROBLEM USING MAAP4.03 CODE

  • Yoo, Jae-Sik;Suh, Kune-Yull
    • Nuclear Engineering and Technology
    • /
    • v.41 no.7
    • /
    • pp.945-952
    • /
    • 2009
  • The Three Mile Island Unit 2 (TMI-2) accident provides unique full scale data, thus providing opportunities to check the capability of codes to model overall plant behavior and to perform a spectrum of sensitivity and uncertainty calculations. As part of the TMI-2 analysis benchmark exercise sponsored by the Organization for Economic Cooperation and Development Nuclear Energy Agency (OECD NEA), several member countries are continuing to improve their system analysis codes using the TMI-2 data. The Republic of Korea joined this benchmark exercise in November 2005. Seoul National University has analyzed the TMI-2 accident as well as the currently proposed alternative scenario along with a sensitivity study using the Modular Accident Analysis Program Version 4.03 (MAAP4.03) code in collaboration with the Korea Hydro and Nuclear Power Company. Two input files are required to simulate the TMI-2 accident with MAAP4: the parameter file and an input deck. The user inputs various parameters, such as volumes or masses, for each component. The parameter file contains the information on TMI-2 relevant to the plant geometry, system performance, controls, and initial conditions used to perform these benchmark calculations. The input deck defines the operator actions and boundary conditions during the course of the accident. The TMI-2 accident analysis provided good estimates of the accident output data compared with the OECD TMI-2 standard reference. The alternative scenario has proposed the initial event as a loss of main feed water and a small break on the hot leg. Analysis is in progress along with a sensitivity study concerning the break size and elevation.

Development of Personalized Media Contents Curation System based on Emotional Information (감성 정보 기반 맞춤형 미디어콘텐츠 큐레이션 시스템 개발)

  • Im, Ji-Hui;Chang, Du-Seong;Choe, Ho-Seop;Ock, Cheol-Young
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.181-191
    • /
    • 2016
  • We analyzed the search word of the media content in the IPTV service, and as a result we found that an important factor is general meta information as well as content(material, plot, etc.) and emotion information in the media content selection criteria of customers. Therefore, in this research, in order to efficiently provide various media contents of IPTV to users, we designed the emotion classification system for utilizing the emotion information of the media content. Next, we proposed 'personalized media contents curation system based on emotion information' for organizing the media contents, through the various processing steps. Finally, to demonstrate the effectiveness of this system, we conducted a user satisfaction survey(72.0 points). In addition, the results of comparing the results based on popularity and the results of the proposed system showed that the ratio leading to the actual users' viewing behavior was 10 times higher.

An Empirical Study on the Influential Factors to User's Continuos Usage and Recommendation of SmartPhone-Games (구조방정식을 이용한 스마트폰 게임의 지속적 사용의도와 추천에 미치는 영향에 관한 실증적 연구)

  • Kwon, Hyeog-In;Kim, Ho-Il;Choi, Yong-Seok
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.115-125
    • /
    • 2011
  • Recently, a sharp increases of users of smartphone is not only cause an rapid growth smartphone-games market, but also secured it's position as a high value market. thus have to begets a multilateral study to the smartphone of newly-rising. however the earlier studies were researched previous smartphone, despite extended research is needed for smartphone-games. therefore the study's purpose is to draw a main factors it has a decisive effect for recommendation and sustainable-usage through recognizing the cause-and-effect relationship with purchase intention, purchase action, satisfaction, recommendation, and sustainable usage that based purchase-effect-factors of smartphone-games. for this study the questionnaire of 293 was taken. and structural equation model was adopted to analyze this study.

Detecting malicious behaviors in MMORPG by applying motivation theory (모티베이션 이론을 이용한 온라인 게임 내 부정행위 탐지)

  • Lee, Jae-hyuk;Kang, Sung Wook;Kim, Huy Kang
    • Journal of Korea Game Society
    • /
    • v.15 no.4
    • /
    • pp.69-78
    • /
    • 2015
  • As the online game industry has been growing rapidly, more and more malicious activities to gain economic benefits have been reported as well. Game bot is one of the biggest problems in the online game industry. So we proposed a bot detection method based on the ERG theory of motivation for the first time. Most of the previous studies focused on behavior-based detection by monitoring patterns of the specific actions. In this paper, we applied the motivation theory to analyze user behaviors on a real game dataset. The result shows that normal users in the game followed the ERG theory of motivation in the same way as it works in real world. But in the case of game bots, the theory could not be applied because the game bot has specific reasons, unlike normal game users. We applied the ERG theory to users to distinguish game bot users from normal users. We detected the game bot with high accuracy of 99.78% by applying the theory.

Punching Fracture Simulations of Circular Unstiffened Steel Plates using Three-dimensional Fracture Surface (3차원 파단 변형률 평면을 이용한 비보강 원판의 펀칭 파단 시뮬레이션)

  • Park, Sung-Ju;Lee, Kangsu;Choung, Joonmo
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.6
    • /
    • pp.474-483
    • /
    • 2016
  • Accidental events such as collisions, groundings, and hydrocarbon explosions in marine structures can cause catastrophic damage. Thus, it is extremely important to predict the extent of such damage, which determines the total amount of oil spills and the residual hull girder strength. Punching fracture tests were conducted by Choung (2009b), where various sizes of indenters and circular unstiffened steel plates with different thicknesses were used to quasi-statically realize damage extents. A three-dimensional fracture strain surface was developed based on a reference (Choung et al., 2015b), where the average stress triaxiality and average normalized Lode angle were used as the parameters governing the fracture of ductile steels. In this study, new numerical analyses were performed using very fine axisymmetric elements in combination with an Abaqus user-subroutine to implement the three-dimensional fracture strain surface. Conventional numerical analyses were also conducted for the tests to identify the best fit fracture strain values by changing the fracture strains. Based on the phenomenon of the average normalized Lode angle starting out positive and then becoming slightly negative, it was inferred that the shear stress primarily dominates in determining the fractures locations, with a partial contribution from the compressive stress. It should be stated that the three-dimensional fracture surface effectively predicted at least the shear stress-dominant fracture behavior of a mild steel.

Extension and Evaluation of Cooperation Protocol for Agent-based Videoconference System (에이전트 기반 화상회의 시스템에서 협조 프로토콜의 확장 및 평가)

  • Lee, Sung-Doke;Jeong, Sang-Bae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.78-85
    • /
    • 2008
  • In this paper, we propose the extension of cooperation protocol which realizes the autonomous control of QoS and show its effectiveness with implementation and experiments of our agent-based videoconference system. The autonomous QoS control in the agent-based videoconference system means the framework of adjusting its functions/abilities by itself to cope with the changes of user requirements and system resource situations. But, the original cooperation protocol used by the agent-based videoconference system is not enough to perform cooperation closely to use the limited resources effectively. In our proposal, the cooperation protocol is offended in the following points: (1) introducing a cooperation states, (2) extension of performatives, (3) introducing compromise levels. We embedded the proposed protocol to the agent-based videoconference system and experimented the behavior of the system. According to the experiments on this prototype system, we confirmed that the flexibility of the system is improved.

Method of estimating the deleted time of applications using Amcache.hve (앰캐시(Amcache.hve) 파일을 활용한 응용 프로그램 삭제시간 추정방법)

  • Kim, Moon-Ho;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.573-583
    • /
    • 2015
  • Amcache.hve file is a registry hive file regarding Program Compatibility Assistant, which stores the executed information of applications. With Amcache.hve file, We can know execution path, first executed time as well as deleted time. Since it checks both the first install time and deleted time, Amcache.hve file can be used to draw up the overall timeline of applications when used with the Prefetch files and Iconcache.db files. Amcache.hve file is also an important artifact to record the traces of anti-forensic programs, portable programs and external storage devices. This paper illustrates the features of Amcache.hve file and methods for utilization in digital forensics such as estimation of deleted time of applications.

Selective encryption technique according to class classification in LoRa environment (LoRa 환경에서의 Class 분류에 따른 선택적 암호화 기술)

  • Lee, Nam-gon;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.285-287
    • /
    • 2017
  • Currently, the world of data communication is not simply communication between server and user in a wired way, but using wireless environment, various devices communicate with each other in a wider and diverse environment to generate a large amount of data. In this environment, IoT is now located deep in our lives, and IoT technologies are used in many tasks, but the data used in IoT is exposed without sufficient protection from malicious behavior. Most of these devices do not have enough computing power to cope with malicious attacks. In this paper, we aim to make all devices that have sufficient computing power and safety from simple sensors to be able to have security according to the situation. The proposed technology is based on the importance of the device and computing power, and it is possible to select the encryption technology selectively and to improve security.

  • PDF

Development Paradigm of Repression and Desire Embodied by Body and Clothing (몸·복식에서 억압과 욕망의 패러다임 개발)

  • Jeong, Ki-Sung;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.6
    • /
    • pp.97-112
    • /
    • 2013
  • In this study, physical, social and psychological repression embodied by the body and clothing are referred to instinctual, power and creative desires, respectively, from the point of biological, social and aesthetic views. Desire refers to a behavior to overcome men's imperfections with individual security, sense of belonging and the pursuit of an ideal, which are obtained by living as a social creature. Repression through the body is sub-categorized depending on whether it is temporary or permanent. Repression expressed through clothing is seen through revealing/concealing, contraction/expansion, and deconstruction/ reconstruction. What enables human beings to embrace changes in fashion without fierce resistance or backlash is the changes of formativeness demonstrated by repression through the body and clothing. The aesthetic values drawn from the exhibition of repression and on the body and clothing are categorized into narcissism, fetishism and aestheticism. While narcissism is an instinctive desire grounded on the originality and confidence of the self that results in refusing repression, fetishism is a desire for power that expedites repression in the pursuit of materialistic value or sexual fantasy. Aestheticism is a desire for creativity that symbolizes the body-and-clothing repression in the pursuit of aesthetic idealism. Repression evokes desire, and the pursuit of desire leads to another repression. The aesthetic values of desire for instinct, power and creativity can be substituted with each other for interpretation according to the attitudes of an initiator, a user and a spectator.

Affordance design for the Management of Patients' Experience in Small Scale Hospitals

  • Shin, Hyun-kyung;Kim, Yong-tae;Youm, Dong-cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.131-138
    • /
    • 2018
  • In the recent years, with a purpose to provide visual and psychological stability to patients and hospital users, Affordance design theory based on perceptual psychological thought has been applied as hospital design. In the past, hospital service design was focused on but Affordance design theory focuses on the patients' experience and methodological research on . The characteristics of the application of Affordance design in the case of patients' experience and service point is as follows:- Firstly, Affordance design is applied when the objective of the patient's experience and the functionality of the object are combined. In other words, affordance design is a condition that arises when encounter between service contact point and patients' experience takes place. Secondly, In the field of Hospital service design, Affordance concepts in and its application can be divided on the functions of experience, cognition and sense following the application of Affordance concepts in Hospital service design. Thirdly, Affordance design method sets meaning of the action received through information provided by morphological features. The condition and surrounding has to be designed in a way that it can induce active behavior of the patient. This study has significance as it has been studied from the perspectives of Affordance theory of design psychology in addition to the physical environment of the hospital, the point of interaction between the hospital and patient, along with the elements of experience design. This study proposes the necessity of analytical study in the field of service design implementation considering various stakeholders in the service contact points of small and medium hospitals in Korea. Furthermore, study of the application of Affordance design can be complemented by reflecting the size of hospitals, the characteristics of specialties, and the specific service environment of each hospital can also be conducted.