• Title/Summary/Keyword: User evaluation

Search Result 2,584, Processing Time 0.03 seconds

Exploring the feasibility of developing an education tool for pattern identification using a large language model: focusing on the case of a simulated patient with fatigue symptom and dual deficiency of the heart-spleen pattern (거대언어모델을 활용한 변증 교육도구 개발 가능성 탐색: 피로주증의 심비양허형 모의환자에 대한 사례구축을 중심으로)

  • Won-Yung Lee;Sang Yun Han;Seungho Lee
    • Herbal Formula Science
    • /
    • v.32 no.1
    • /
    • pp.1-9
    • /
    • 2024
  • Objective : This study aims to assess the potential of utilizing large language models in pattern identification education by developing a simulated patient with fatigue and dual deficiency of the heart-spleen pattern. Methods : A simulated patient dataset was constructed using the clinical practice examination module provided by the National Institute for Korean Medicine Development. The dataset was divided into patient characteristics, sample questions, and responses, and utilized to design the system, assistant, and user prompts, respectively. A web-based interface was developed using the Django framework and WebSocket. Results : We developed a simulated fatigue patient representing dual deficiency of the heart-spleen pattern through prompt engineering. To make practical tools, we further implemented web-based interfaces for the examinee's and evaluator's roles. The interface for examinees allows one to examine the simulated patient and provides access to a personalized number for future access. In addition, the interface for evaluators included a page that provided an overview of each examinees' chat history and evaluation criteria in real-time. Conclusion : This study is the first development of an educational tool integrated with a large language model for pattern identification education, which is expected to be widely applied to Korean medicine education.

A Study on Security Vulnerability and Enhancement for IP Camera (IP 카메라의 보안 취약점과 보안성 강화에 관한 연구)

  • Ryang Rae Kim;Seoung Hyeon Jo;Jiyoon Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.143-151
    • /
    • 2024
  • IP cameras allow users to view live video regardless of their location. Due to this advantage, they are used in homes to monitor infants, pets, and the elderly, and they are widely utilized in companies for physical security control and monitoring of secure areas, such as data centers and warehouses. However, IP cameras that lack appropriate security measures can be eavesdropped on by malicious attackers. This study demonstrates that hacking attacks can be executed by exploiting various security vulnerabilities in IP cameras, including brute force attacks. Accordingly, we propose an architecture that addresses these vulnerabilities, suggesting measures to enhance the security of IP cameras. Also, we shows that the proposed method can safely and effectively provide video information encryption and user authentication for IP cameras through security verification and availability evaluation.

Research on Multi-facted News Article Classification Models Classifying Subjects, Geographies and Genres (심층 주제, 지역, 장르를 모두 분류할 수 있는 다면적 뉴스 기사 자동 분류 모델 연구)

  • Hyojin Lee;SungPil Choi
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.3
    • /
    • pp.65-89
    • /
    • 2024
  • This study developed a model to classify news articles into categories of topic, genre, and region using a Korean Pre-trained Language model. To achieve this, a new news article classification system was designed by referring to the classification systems of domestic media outlets. The topic and genre classification models were implemented as hierarchical classification models that link the main categories and subcategories, and their performance was compared with that of an integrated category model. The evaluation results showed that the hierarchical structure classification model had the advantage of providing more precise categorization in ambiguous or overlapping categories compared to the integrated category model. For regional classification of news articles, a model was built to classify into 18 categories, and for regional news articles, the regional characteristics were clearly reflected in the text, resulting in high performance. This study demonstrated the effectiveness of classifying news articles from multiple perspectives-topic, genre, and region-and emphasized the significance of suggesting the potential for a multi-dimensional news article classification service that meets user needs.

A Study on Experiences with the Data-Embeded Exhibition

  • So-Jeong Park;Bo-A Rhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.9
    • /
    • pp.89-98
    • /
    • 2024
  • This study empirically examines the visitors' experience and acceptance of 《Hito Steyerl-A Sea of Data》, which explores power structures and social inequalities of contemporary society through data, via a survey. The aesthetic value received the highest evaluation among the perceived values. The high enthusiasm in the artist, the works of art and the exhibition theme were identified as key factors for perceived experience quality. The degree of satisfaction(71.4%) and the degree of immersion(70.8%) for the exhibition are rated highly. Summarizing the hypothesis testing, the interest level of digital media and contemporary art, and the high enthusiasm in the works of art and the exhibition theme positively influenced the degree of satisfaction, with the degree of immersion significantly correlating to the degree of satisfaction. Furthermore, the attitudes towards the exhibition demonstrated a positive correlation with intention to recommend the exhibition and to revisit the exhibition.

Designing Gamification and Analyzing Performance Indicators to Enhance Academic Library Services (대학도서관 서비스 효과 증진을 위한 게이미피케이션 설계 및 성과 지표 분석)

  • Hyeyoung Kim;Hanseul Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.3
    • /
    • pp.167-192
    • /
    • 2024
  • Gamification is an effective strategy to enhance the quality of academic library services by encouraging student engagement and participation. This study developed a design framework for the effective implementation of gamification in academic libraries. To this end, a framework based on the information literacy model was developed through a literature review, content analysis of Korean and international case studies, and in-depth interviews with five librarians of academic libraries. The framework outlines the design elements and game mechanisms to be considered at each stage of the process, including task definition, information search, collection, utilization, and integration. Additionally, performance indicators were established to measure the cognitive, emotional, and social impacts of gamification. This study is expected to serve as a foundation for the systematic implementation and evaluation of gamification in academic libraries, ultimately contributing to increased user participation and enhanced learning motivation.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Importance-Satisfaction Analysis of Meditation Forest in Schools - Focusing on Middle Schools in Gwang-Ju City - (명상숲의 중요도-만족도 평가 - 광주광역시 중학교를 대상으로 -)

  • Kang, Taesun;Jeong, Moonsun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.4
    • /
    • pp.68-80
    • /
    • 2019
  • This study is to provide basic data for the user-oriented design for a middle school meditation forest in the future by analyzing the physical environment characteristics of existing middle school meditation forests, the users' utilization behavior, and the degree of the importance satisfaction. For this purpose, 24 evaluation indices based on site characteristics, naturalness, functionality, and the effectiveness of meditation forest sites were selected for analysis of importance satisfaction. We surveyed and analyzed the students and teachers of two middle schools 'A' and 'B' in Gwangju Metropolitan City. The results of this study are as follows. First, the perception and utilization rates of the meditation forests by students was significantly lower than teachers at both schools. 'A' school has a better use and recognition rate than the 'B' school. Second, the purposes of using meditation forests were rest (49.6%), weekday lunchtime (63.6%), with friends (65.0%) or colleagues (60%), and short (less than 10 minutes) rests (68.6%). They preferred flowers (30.0%) and shading plants (28.9%), mainly using shelters (57.9%) and walking trails (37.1%). Third, as a result of the importance of satisfaction analysis, the average score of the 24 items importance (3.81), higher than the satisfaction (3.62). The 24 items positioned in 4 quadrants are as follows: Nine items are in the I quadrant for 'persistent maintenance'. Three items are in the II quadrant for 'priority correction'. Seven items are in the quadrant III for 'low priority in the management and operation'. Five items are in the quadrant IV for 'avoid over effort'. For the comparison of two middle schools' satisfaction, 'A' school satisfaction was higher than 'B' school for 16 items, which showed a statistically significant difference. It is believed that the users in 'A' school are more satisfied than 'B' school because it has more forests and trails, better accessibility, and a variety of plant types and planting areas in the A school meditation forest. The results of the overall satisfaction analysis showed a significant difference between 'A' school (68.0%) and 'B' school (47.2%) as 'A' school has better shelters and trails. The rankings of the most satisfying space are walking trails (1st place) and shelters (2nd place). The reason for the highest satisfaction was for rest (stress relief and emotional support) in both 'A' and 'B' schools.

A Study of Life Safety Index Model based on AHP and Utilization of Service (AHP 기반의 생활안전지수 모델 및 서비스 활용방안 연구)

  • Oh, Hye-Su;Lee, Dong-Hoon;Jeong, Jong-Woon;Jang, Jae-Min;Yang, Sang-Woon
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.864-881
    • /
    • 2021
  • Purpose: This study aims is to provide a total care solution preventing disaster based on Big Data and AI technology and to service safety considered by individual situations and various risk characteristics. The purpose is to suggest a method that customized comprehensive index services to prevent and respond to safety accidents for calculating the living safety index that quantitatively represent individual safety levels in relation to daily life safety. Method: In this study, we use method of mixing AHP(Analysis Hierarchy Process) and Likert Scale that extracted from consensus formation model of the expert group. We organize evaluation items that can evaluate life safety prevention services into risk indicators, vulnerability indicators, and prevention indicators. And We made up AHP hierarchical structure according to the AHP decision methodology and proposed a method to calculate relative weights between evaluation criteria through pairwise comparison of each level item. In addition, in consideration of the expansion of life safety prevention services in the future, the Likert scale is used instead of the AHP pair comparison and the weights between individual services are calculated. Result: We obtain result that is weights for life safety prevention services and reflected them in the individual risk index calculated through the artificial intelligence prediction model of life safety prevention services, so the comprehensive index was calculated. Conclusion: In order to apply the implemented model, a test environment consisting of a life safety prevention service app and platform was built, and the efficacy of the function was evaluated based on the user scenario. Through this, the life safety index presented in this study was confirmed to support the golden time for diagnosis, response and prevention of safety risks by comprehensively indication the user's current safety level.

The Distribution and Characteristics of Protected Areas and Natural Resources in the Metropolitan Area in Blog Posts (블로그 게시물에 나타난 수도권 보전지역 및 자연자원의 분포 및 특성)

  • Lee, Sung-Hee;Son, Yong-Hoon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.50 no.5
    • /
    • pp.30-39
    • /
    • 2022
  • This study aimed to evaluate the awareness of conservation areas and green resources and analyze their characteristics by utilizing accumulated blog data created for specific places and objects. Among all the conservation areas and resources located in the Seoul metropolitan area, places that can be evaluated were classified, and sites were evaluated by dividing them into ten categories based on the number of blog posts written. As a result of the study, the users' awareness of forests was the highest, and the awareness of conservation areas and green resources was higher in urban areas than suburban areas. The result shows that the conservation areas and green resources located around the metropolitan area serve as natural tourist destinations while being the object of conservation for users. In addition, these results are in the same vein as the research results in domestic and foreign studies on the importance of ecosystem services in urban areas. Unlike existing research methods, this study is meaningful in that it identified the level of user awareness through social media analysis and applied it to evaluating conservation areas and green resources. It can be used as basic data to prepare a management plan considering public interest and awareness or to establish a development plan to increase awareness. In addition, the cumulative amount of blog content used in the study is meaningful in that it can identify and monitor users' interest in the space. However, it was not possible to examine the contents of each blog in detail because it was evaluated based on the amount of social media content. In addition, in the case of conservation areas and green resources, it is necessary to review and supplement the evaluation contents by adding keyword analysis and content analysis for the site to be evaluated as content other than the pure viewpoint of users may be mixed with development issues.

Improved Social Network Analysis Method in SNS (SNS에서의 개선된 소셜 네트워크 분석 방법)

  • Sohn, Jong-Soo;Cho, Soo-Whan;Kwon, Kyung-Lag;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.117-127
    • /
    • 2012
  • Due to the recent expansion of the Web 2.0 -based services, along with the widespread of smartphones, online social network services are being popularized among users. Online social network services are the online community services which enable users to communicate each other, share information and expand human relationships. In the social network services, each relation between users is represented by a graph consisting of nodes and links. As the users of online social network services are increasing rapidly, the SNS are actively utilized in enterprise marketing, analysis of social phenomenon and so on. Social Network Analysis (SNA) is the systematic way to analyze social relationships among the members of the social network using the network theory. In general social network theory consists of nodes and arcs, and it is often depicted in a social network diagram. In a social network diagram, nodes represent individual actors within the network and arcs represent relationships between the nodes. With SNA, we can measure relationships among the people such as degree of intimacy, intensity of connection and classification of the groups. Ever since Social Networking Services (SNS) have drawn increasing attention from millions of users, numerous researches have made to analyze their user relationships and messages. There are typical representative SNA methods: degree centrality, betweenness centrality and closeness centrality. In the degree of centrality analysis, the shortest path between nodes is not considered. However, it is used as a crucial factor in betweenness centrality, closeness centrality and other SNA methods. In previous researches in SNA, the computation time was not too expensive since the size of social network was small. Unfortunately, most SNA methods require significant time to process relevant data, and it makes difficult to apply the ever increasing SNS data in social network studies. For instance, if the number of nodes in online social network is n, the maximum number of link in social network is n(n-1)/2. It means that it is too expensive to analyze the social network, for example, if the number of nodes is 10,000 the number of links is 49,995,000. Therefore, we propose a heuristic-based method for finding the shortest path among users in the SNS user graph. Through the shortest path finding method, we will show how efficient our proposed approach may be by conducting betweenness centrality analysis and closeness centrality analysis, both of which are widely used in social network studies. Moreover, we devised an enhanced method with addition of best-first-search method and preprocessing step for the reduction of computation time and rapid search of the shortest paths in a huge size of online social network. Best-first-search method finds the shortest path heuristically, which generalizes human experiences. As large number of links is shared by only a few nodes in online social networks, most nods have relatively few connections. As a result, a node with multiple connections functions as a hub node. When searching for a particular node, looking for users with numerous links instead of searching all users indiscriminately has a better chance of finding the desired node more quickly. In this paper, we employ the degree of user node vn as heuristic evaluation function in a graph G = (N, E), where N is a set of vertices, and E is a set of links between two different nodes. As the heuristic evaluation function is used, the worst case could happen when the target node is situated in the bottom of skewed tree. In order to remove such a target node, the preprocessing step is conducted. Next, we find the shortest path between two nodes in social network efficiently and then analyze the social network. For the verification of the proposed method, we crawled 160,000 people from online and then constructed social network. Then we compared with previous methods, which are best-first-search and breath-first-search, in time for searching and analyzing. The suggested method takes 240 seconds to search nodes where breath-first-search based method takes 1,781 seconds (7.4 times faster). Moreover, for social network analysis, the suggested method is 6.8 times and 1.8 times faster than betweenness centrality analysis and closeness centrality analysis, respectively. The proposed method in this paper shows the possibility to analyze a large size of social network with the better performance in time. As a result, our method would improve the efficiency of social network analysis, making it particularly useful in studying social trends or phenomena.