• Title/Summary/Keyword: User study

Search Result 12,957, Processing Time 0.04 seconds

Study On Generating Compact Network RTK Corrections Considering Ambiguity Level Adjustment Among Reference Station Networks for Constructing Infrastructure of Land Vehicle (육상교통 인프라 구축을 위한 다중 네트워크 간 미지정수 수준 조정이 고려된 Compact Network PTK 보정정보 생성기법 연구)

  • Song, June-Sol;Park, Byung-Woon;Kee, Chang-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.404-412
    • /
    • 2013
  • Network RTK is widely used especially for static applications so far, however, the demand for high accuracy positioning for kinetic users such as land vehicles is growing for safety and convenience reasons. Kinematic users move along the roads and the network where they receive corrections can be changed. Compact Network RTK corrections should keep consistency while network change. In this paper, we introduced a method of generating Compact Network RTK corrections considering network ambiguity level adjustment by formulation of corrections. We verified the proposed method for reference station networks across whole country. We also generated Compact Network RTK corrections using simulation and real GPS data from reference stations in South Korea and evaluated performance of users. As a result, the discontinuity between corrections from two networks reduced to 0.25 cycle from several cycles. And user could achieve less than 8 cm (2DRMS) horizontal position accuracy continuously regardless of network change.

Curation Service to Improve User's Access to National R & D Information : Focusing on Issues R&D Service (사용자의 국가 R&D 정보 이용 접근성 향상을 위한 큐레이션 서비스 : 이슈로 보는 R&D 사례를 중심으로)

  • Yu, Eun-ji;Choi, Kwang-Nam;Hwang, Youna
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.1-10
    • /
    • 2020
  • National R & D data covers information in all fields from basic science research to industrialization, but it is expressed in technical terms, which make it difficult for the public to use. Accordingly, NTIS developed and launched the data curation service 'R&D issue service', which selects national R&D information on national and social issues and provides them to the public. Therefore, this study aims to analyze the effect of a data curation service on NTIS users' access to R&D data and suggest how to develop the curation service. The R&D issue service extracts issue from the news article and provide related national R&D projects, achievements and major research institute. All raw data used for the service are open to the public, organized in a report format and provided as PDF files. In addition, automative process is developed for all NTIS users to make individual issue packaging like administrator. The results show that 'R&D issue service' launching increases users' access and convenience to R&D data related to major issues, and the number of page views of users increased after the service was opened.

Development of the Ship Manoeuvring PC Simulator Based on the Network (네트워크 기반의 간이 선박조종 시뮬레이터 개발)

  • Choi, Won-jin;Kim, Hyo-Il;Jun, Seung-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.43 no.6
    • /
    • pp.403-412
    • /
    • 2019
  • The characteristics of the manoeuvring motion of a ship are dependent on the ship type, as well as draft or speed in the same ship. In recent years, the number of extra-large vessels has increased significantly, which can cause enormous material and environmental damage in the event of a marine accident. Thus, the importance of ship maneuvering is increasing. The IMO has forced the officers to be trained in simulators through the STCW 95 amendment. However, FMSS is costly and difficult to access and the PC-based simulator has the disadvantage that only one person can engage in simulation. The purpose of this study was to solve the shortcomings of the FMSS and PC-based simulators by enabling multiple people to use their PCs to simulate based on a network. The simulator is implemented through the analysis and numerical calculation of the Nomoto model, Radar function mounting, data transfer protocol design, and GUI building. To verify the simulator, the simulation results were compared and analyzed with the test results of T.S. HANBADA according to the criteria of the Korean Register of Shipping(KR) and IMO standards for ship maneuverability. As a result, It showed a relative error of 0%~ 32.1% with an average of 13.7%, and it satisfied the IMO criteria for ship maneuverability.

A Study on the Teaching of SW coding by Design-Thinking 5 Step Maker Model (Design-Thinking 5 Step 메이커 모형 적용 SW코딩 교수학습에 대한 연구)

  • Kim, Myung-sook;Chung, Jong-In;Kim, Chang-Suk;Kang, Shin-Cheon;Kim, Eui-jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.309-313
    • /
    • 2018
  • Maker Activity based Design-Thinking 5 Step is a better experience for providing the public with a better approach to design by sympathizing with human needs and exploring the public's potential desires. This paper studied the teaching method by applying the value of the Maker Training that emphasizes the importance of sharing and opening results with others after creating them based on the ideas of the learners using different tools, the basic mind of Design-Thinking with the observation and empathy about human beings and the derivation of user-centric results to the SW coding curriculum. For this purpose, we studied teaching methods by Design-thinking based on sections that require coding in the information classes of the secondary school curriculum. We demonstrated the class to a group of education experts by applying the syllabus of instruction. Then we collected evaluations and opinions of the experts and we modified the syllabus to reflect the collected assessment. Under the Design-thinking 5 step foundation, classes were demonstrated with a group of education experts, opinions collected, and suggestions collected were reflected on the assessment outcome. I think that It is an effective training opportunity to practice a widespread idea that enables infinite thinking and a convergence of thinking that brings out the best decision from a widespread idea.

  • PDF

A Model of Natural Language Information Retrieval Using Main Keywords and Sub-keywords (주 키워드와 부 키워드를 이용한 자연언어 정보 검색 모델)

  • Kang, Hyun-Kyu;Park, Se-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3052-3062
    • /
    • 1997
  • An Information Retrieval (IR) is to retrieve relevant information that satisfies user's information needs. However a major role of IR systems is not just the generation of sets of relevant documents, but to help determine which documents are most likely to be relevant to the given requirements. Various attempts have been made in the recent past to use syntactic analysis methods for the generation of complex construction that are essential for content identification in various automatic text analysis systems. Unfortunately, it is known that methods based on syntactic understanding alone are not sufficiently powerful to Produce complete analyses of arbitrary text samples. In this paper, we present a document ranking method based on two-level ranking. The first level is used to retrieve the documents, and the second level to reorder the retrieved documents. The main keywords used in the first level can be defined as nouns and/or compound nouns that possess good document discrimination powers. The sub-keywords used in the second level can be also defined as adjectives, adverbs, and/or verbs that are not main keywords, and function words. An empirical study was conducted from a Korean encyclopedia with 23,113 entries and 161 Korean natural language queries collected by end users. 850% of the natural language queries contained sub-keywords. The two-level document ranking methods provides significant improvement in retrieval effectiveness over traditional ranking methods.

  • PDF

Modeling and Analysis of Wireless Lan Traffic (무선 랜 트래픽의 분석과 모델링)

  • Yamkhin, Dashdorj;Lee, Seong-Jin;Won, You-Jip
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.667-680
    • /
    • 2008
  • In this work, we present the results of our empirical study on 802.11 wireless LAN network traffic. We collect the packet trace from existing campus wireless LAN infra-structure. We analyzed four different data sets: aggregate traffic, upstream traffic, downstream traffic, tcp only packet trace from aggregate traffic. We analyze the time series aspect of underlying traffic (byte count process and packet count process), marginal distribution of time series, and packet size distribution. We found that in all four data sets there exist long-range dependent property in byte count and packet count process. Inter-arrival distribution is well fitted with Pareto distribution. Upstream traffic, i.e. from the user to Internet, exhibits significant difference in its packet size distribution from the rests. Average packet size of upstream traffic is 151.7 byte while average packet size of the rest of the data sets are all greater than 260 bytes. Packets with full data payloads constitutes 3% and 10% in upstream traffic and the downstream traffic, respectively. Despite the significant difference in packet size distribution, all four data sets have similar Hurst values. The Hurst alone does not properly explain the stochastic characteristics of the underlying traffic. We model the underlying traffic using fractional-ARIMA (FARIMA) and fractional Gaussian Noise (FGN). While the fractional Gaussian Noise based method is computationally more efficient, FARIMA exhibits superior performance in accurately modeling the underlying traffic.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A Study on the Technology Development of User-based Home Automation Service (사용자 위치기반 홈오토메이션 서비스 기술 개발에 관한 연구)

  • Lee, Jung-Gi;Lee, Yeong-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.327-332
    • /
    • 2017
  • As Internet of Things (IoT) technology advances, there is a growing demand for location-based services (LBSs) to identify users' mobility and identity. The initial LBS system was mainly used to measure position information by measuring the phase of a signal transmitted from a global positioning system (GPS) satellite or by measuring distance to a satellite by tracking the code of a carrier signal. However, the use of GPS satellites is ineffective, because it is difficult to receive satellite signals indoors. Therefore, research on wireless communications systems like ultra-wide band (UWB), radio frequency identification (RFID), and ZigBee are being actively pursued for location recognition technology that can be utilized in an indoor environment. In this paper, we propose an LBS system that includes the 2.45GHz band for chirp spread spectrum (CSS), and the 3.1-10.6GHz band and the 250-750MHz bands for UWB using the IEEE 802.15.4a standard for low power-based location recognition. As a result, we confirmed that the 2.45GHz Industrial, Scientific and Medical (ISM) band RF transceiver and the ranging function can be realized in the hardware and has 0dBm output power.

A Research on Managing Assurance Level for Guaranteeing Quality of Web Services (웹 서비스 품질보장을 위한 보증수준 유지방안 연구)

  • Lee, Young-Kon;Kim, Eun-Ju
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.319-328
    • /
    • 2007
  • As the coverage of Web services become wider and the number of implementation cases is growing, the importance of applying the Web services quality model to real world is increased. For maintaining the level of Web services qualify, it should be required to study on assurance method of Web services qualify level. Assurance for Web services, which is newly proposed by OASIS TC, means the totality of activities for managing the quality level of them. For managing Web service quality, Web service associates could usually use SLA(Service Level Agreement) method in which a service consumer contracts for some service level with a service provider and gives for penalty or pays incentives according to the result of evaluation of services. But, there are some difficulties in applying SLA to Web services, because Web services have publicity, multiple users, and 3rd party for management. So, we need a new assurance method for Web service by considering the characteristics of Web services. This paper provides the new concept of committed assurance level for Web services. This concept can be defined as the set of maximum level of quality expected by each user, which provide the consistent view of Web service quality. This paper presents the method for duality associates to preserve some quality level of Web service by using this concept.

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.