• Title/Summary/Keyword: User evaluation

Search Result 2,584, Processing Time 0.036 seconds

A Study on the Universal Design Application of Elementary Schools in Seoul - Focused on the Analysis of the Application Status of Universal Design 7 Principles - (서울시내 초등학교의 유니버설 디자인 적용 실태에 관한 연구 - 유니버설 디자인 7원칙의 적용 현황 분석을 중심으로 -)

  • Lee, Kyoo-Il
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • Elementary schools in Korea need to create an environment for integrated education and transform into school facilities that are central to the local community. This study assessed the level of universal design application in the physical environment of elementary schools based on the seven principles of universal design in order to create an environment in which all users, including elementary school students, can access and use school facilities equally. For this aim, field research was conducted on 243 elementary schools, and facilities with low application level were analyzed. As a result of the analysis, in order to apply the principle of 'flexibility in use', the rotating handle on the side of the toilet, which is used by the wheelchair user in the way the toilet is accessed, must be installed in a top-to-bottom rotational manner. In order to improve the applicability of the 'low physical effort' principle, it is necessary to select land and apply the plan from the beginning of the design.

A Study on the Application of Zero Copy Technology to Improve the Transmission Efficiency and Recording Performance of Massive Data (대용량 데이터의 전송 효율 및 기록 성능 향상을 위한 Zero Copy 기술 적용에 관한 연구)

  • Song, Min-Gyu;Kim, Hyo-Ryoung;Kang, Yong-Woo;Je, Do-Heung;Wi, Seog-Oh;Lee, Sung-Mo;Kim, Seung-Rae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1133-1144
    • /
    • 2021
  • Zero-copy is a technology that is also called no-memory copy, and through its use, context switching between the user space and the kernel space can be reduced to minimize the load on the CPU. However, this technology is only used to transmit small random files, and has not yet been widely used for large file transfers. This paper intends to discuss the practical application of zero-copy in processing large files via a network. To this end, we first developed a small test bed and program that can transmit and store data based on zero-copy. Afterwards, we intend to verify the usefulness of the applied technology in detail through detailed performance evaluation

Affordance Elements According to the Usability of the Interface of Immersive Virtual Reality Clinical Skill Content (몰입형 가상현실 의료 술기 콘텐츠의 인터페이스 사용성에 따른 어포던스 하위 평가 요소에 관한 연구)

  • Hwang, Hyo-Hyon;Choi, Yoo-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.307-318
    • /
    • 2022
  • Virtual reality is actively used in the medical field as a learning effectiveness that induces immersion, but research on the factors that induce learning immersion is insufficient. Therefore, this study extracted the usability and cognitive affordance evaluation elements of the interface through literature research and selected four types of virtual reality medical contents to conduct a Useability-Test for experts. Based on this, an interface design method according to virtual reality medical technology content was proposed. In summary, it can be seen that the information-providing interface affects immersion due to visibility, distance from the experience's gaze, color harmony, uniform visualization, feedback, reaction speed, and expected changes resulting from manipulation, and does not impair immersion. This study has limitations in generalization using limited content, so it is expected that continuous research will discuss the development of standardized guides in interface design and the precision of interface design research from a user perspective.

Object Detection Algorithm for Explaining Products to the Visually Impaired (시각장애인에게 상품을 안내하기 위한 객체 식별 알고리즘)

  • Park, Dong-Yeon;Lim, Soon-Bum
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.1-10
    • /
    • 2022
  • Visually impaired people have very difficulty using retail stores due to the absence of braille information on products and any other support system. In this paper, we propose a basic algorithm for a system that recognizes products in retail stores and explains them as a voice. First, the deep learning model detects hand objects and product objects in the input image. Then, it finds a product object that most overlapping hand object by comparing the coordinate information of each detected object. We determine that this is a product selected by the user, and the system read the nutritional information of the product as Text-To-Speech. As a result of the evaluation, we confirmed a high performance of the learning model. The proposed algorithm can be actively used to build a system that supports the use of retail stores for the visually impaired.

A Study on the Evaluation of Classification Performance by Capacity of Explosive Components using Convolution Neural Network (CNN) (컨볼루션 신경망(CNN)을 이용한 폭발물 성분 용량별 분류 성능 평가에 관한 연구)

  • Lee, Chang-Hyeon;Cho, Sung-Yoon;Kwon, Ki-Won;Im, Tae-Ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.11-19
    • /
    • 2022
  • This paper is a study to evaluate the performance when classifying explosive components by capacity using a convolutional neural network (CNN). Among the existing explosive classification methods, the IMS steam detector method determines the presence or absence of an explosive only when the explosive concentration exceeds the threshold set by the user. The IMS steam detector has a problem of determining that even if an explosive exists, the explosive does not exist in an amount that does not exceed the threshold. Therefore, it is necessary to detect the explosive component even when the concentration of the explosive component does not exceed the threshold. Accordingly, in this paper, after imaging explosive time series data with the Gramian Angular Field (GAF) algorithm, it is possible to determine whether there are explosive components and the amount of explosive components even when the concentration of explosive components does not exceed a threshold.

Korean Traditional Music Melody Generator using Artificial Intelligence (인공지능을 이용한 국악 멜로디 생성기에 관한 연구)

  • Bae, Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.869-876
    • /
    • 2021
  • In the field of music, various AI composition methods using machine learning have recently been attempted. However, most of this research has been centered on Western music, and little research has been done on Korean traditional music. Therefore, in this paper, we will create a data set of Korean traditional music, create a melody using three algorithms based on the data set, and compare the results. Three models were selected based on the similarity between language and music, LSTM, Music Transformer and Self Attention. Using each of the three models, a melody generator was modeled and trained to generate melodies. As a result of user evaluation, the Self Attention method showed higher preference than the other methods. Data set is very important in AI composition. For this, a Korean traditional music data set was created, and AI composition was attempted with various algorithms, and this is expected to be helpful in future research on AI composition for Korean traditional music.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

A Study on Mobile Robot for Posture Control of Flexible Structures Using PI Algorithm

  • Kang, Jin-Gu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.9-14
    • /
    • 2022
  • In this study, we propose a method for moving a device such as a flexible air sculpture while stably maintaining the user's desired posture. To accomplish this, a robot system with a structure of a mobile robot capable of running according to a given trajectory was studied by applying the PI algorithm and horizontal maintenance posture control using IMU. The air sculptures used in this study often use thin strings in a fixed posture. Another method is to put a load on the center of gravity to maintain the posture, and it is a system with flexibility because it uses air pressure. It is expected that these structures can achieve various results by combining flexible structures and mobile robots through the convergence process of digital sensor technology. In this study, posture control was performed by fusion of the driving technology of AGV(Automatic Guided Vehicle),, a field of robot, and technologies applying various sensors. For verification, the given performance evaluation was performed through an accredited certification test, and its validity was verified through an experiment.

A Study on the Core Metadata Elements for YouTube Video Archiving in Public Institutions (공공기관 유튜브 동영상 아카이빙을 위한 메타데이터 핵심 요소 연구)

  • Rack Keun, Kim;Jin Ho, Park
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.4
    • /
    • pp.45-65
    • /
    • 2022
  • YouTube videos of public institutions are digital public records that need to be managed and preserved. As such, the video and the metadata describing the video should also be preserved. This study aims to select the key metadata elements necessary for archiving videos published on YouTube by public institutions. To this end, five high-level areas, namely the description, structure, management, preservation, and user participation, and the metadata elements of 10 subareas, were designed by referring to NAK 8, PREMIS, ISAD(G), and YouTube metadata. Afterward, the metadata elements designed by 14 experts were verified. Lastly, the validity and reliability of the evaluation results were verified. Of the 63 elements, 33 satisfied the validity and reliability criteria. Thus, these elements were selected as the core metadata for archiving YouTube videos in public institutions.

A Tombstone Filtered LSM-Tree for Stable Performance of KVS (키밸류 저장소 성능 제어를 위한 삭제 키 분리 LSM-Tree)

  • Lee, Eunji
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.17-22
    • /
    • 2022
  • With the spread of web services, data types are becoming more diversified. In addition to the form of storing data such as images, videos, and texts, the number and form of properties and metadata expressing the data are different for each data. In order to efficiently process such unstructured data, a key-value store is widely used for state-of-the-art applications. LSM-Tree (Log Structured Merge Tree) is the core data structure of various commercial key-value stores. LSM-Tree is optimized to provide high performance for small writes by recording all write and delete operations in a log manner. However, there is a problem in that the delay time and processing speed of user requests are lowered as batches of deletion operations for expired data are inserted into the LSM-Tree as special key-value data. This paper presents a Filtered LSM-Tree (FLSM-Tree) that solves the above problem by separating the deleted key from the main tree structure while maintaining all the advantages of the existing LSM-Tree. The proposed method is implemented in LevelDB, a commercial key-value store and it shows that the read performance is improved by up to 47% in performance evaluation.