• Title/Summary/Keyword: User-requirement

Search Result 604, Processing Time 0.024 seconds

A Comparative Study for User Interface Design between TV and Mobile Phone (TV와 휴대폰의 사용자 인터페이스 디자인 비교 연구)

  • Pan, Young-Hwan
    • Journal of the Ergonomics Society of Korea
    • /
    • v.27 no.1
    • /
    • pp.29-35
    • /
    • 2008
  • An estimated 1 billion mobile phone were sold globally in the year 2006. In Korea, people watch television 3.17 hours in a day. Television isn't what it used to be. Digital TV provides both interactivity and high definition. Mobile phone also transferred from 2G to 3G or 3.5G. This means the complexity of TV and mobile phone is increased, design of user interface is more difficult. Unlike the personal computer industry, TV and mobile phone industries have no standard user interface. A comparative study for user interface between TV and mobile phone is studied. User, task, system are analyzed in requirement analysis. User interface model and interaction are also analyzed between TV and mobile phone. This study provides some insights for user interface design. First, the UI designer have to consider another products because one user using one product at the same time using another products. Experience for one product affects that for another product. Second, TV and mobile phone show very similar pattern, especially interaction task and input interaction. Third, there are not sometimes optimized experience between service operator and device manufacturer. Cooperative design between them is required.

Object Extraction and Modeling Method from the User Requirements with Fillmore's Case Grammar (Fillmore의 Case Grammar를 통한 사용자 요구사항으로부터 객체 추출 및 모델링 방법)

  • Ahn, Sung-Bin;Kim, Dong-Ho;Seo, Chae-Yun;Kim, R.Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.985-989
    • /
    • 2010
  • The near future smart ubiquitous computing oriented system will have to provide the optimal (right) service through interactions between users and the system. To provide the right services what the user needs, we should choose the user-centered development for reflecting the user needs, but not the developer-centered development. To do this, we proposed User Behavior Analysis Based Needs Extraction Method [1]. In this paper, we propose Object Extraction and Modeling Method from the user requirements with Fillmore's Case Grammar.

A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud

  • Liu, Shukun;Jia, Weijia;Pan, Xianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5234-5251
    • /
    • 2018
  • It is well-known that virtualization technology can bring many benefits not only to users but also to service providers. From the view of system security and resource utility, higher resource sharing degree and higher system reliability can be obtained by the introduction of virtualization technology in distributed cloud. The small size time-sharing multiplexing technology which is based on virtual machine in distributed cloud platform can enhance the resource utilization effectively by server consolidation. In this paper, the concept of memory block and user satisfaction is redefined combined with user requirements. According to the unbalanced memory resource states and user preference requirements in multi-virtual machine environments, a model of proper memory resource allocation is proposed combined with memory block and user satisfaction, and at the same time a memory optimization allocation algorithm is proposed which is based on virtual memory block, makespan and user satisfaction under the premise of an orderly physical nodes states also. In the algorithm, a memory optimal problem can be transformed into a resource workload balance problem. All the virtual machine tasks are simulated in Cloudsim platform. And the experimental results show that the problem of virtual machine memory resource allocation can be solved flexibly and efficiently.

A Study On User-centric Identity Information Management Model In Internet Environment (인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구)

  • Rhy, Hae-Gyu;Shin, Hyeon-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.37-50
    • /
    • 2009
  • With the increase of number of internet services due to development of internet, it becomes a critical issue to appropriately manage the personal information about user's identity, that is ID information that service providers collect in terms of user's convenience improvement and privacy protection. But the existing ID information management models are service provider-centric or they insufficiently provide ID information management functions, so that they have not been satisfying user's requirement. In this paper, by establishing user-centric concept in we information management, we propose the new user-centric ID information management model in which user can make use of the internet service more conveniently and eventually enhance user's privacy.

Integration of multi-functional system using relational database and graphical user interface (관계형데이타베이스와 그래픽사용자 인터페이스를 이용한 설계시스템의 통합화)

  • 이종갑;서승완;김준호
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1994.04a
    • /
    • pp.519-526
    • /
    • 1994
  • In the large and multifunctional engineering system, the heterogeneous computer system situation is inevitable. Accordingly a lot of integration efforts are being made to comply with the industrial requirement of productivity. In this paper, a practical concept of integration is introduced through the development of a prototype system for ship outfitting design which is a typical example of large/multi-functional application system. On the development of the prototype system, three points are considered as a practical concept-which are integration of database, integration of application programs, and system-user interface. The relation model based commercial database management system(RDBMS) is used to build the project integrated database, and the graphical user interface tool(OSF/Motif) on X-window system is used for the integration of application programs and the user interface.

Development of PC-based Radiation Therapy Planning System

  • Suh, Tae-Suk;P task group, R-T
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2002.09a
    • /
    • pp.121-122
    • /
    • 2002
  • The main principle of radiation therapy is to deliver optimum dose to tumor to increase tumor cure probability while minimizing dose to critical normal structure to reduce complications. RTP system is required for proper dose plan in radiation therapy treatment. The main goal of this research is to develop dose model for photon, electron, and brachytherapy, and to display dose distribution on patient images with optimum process. The main items developed in this research includes: (l) user requirements and quality control; analysis of user requirement in RTP, networking between RTP and relevant equipment, quality control using phantom for clinical application (2) dose model in RTP; photon, electron, brachytherapy, modifying dose model (3) image processing and 3D visualization; 2D image processing, auto contouring, image reconstruction, 3D visualization (4) object modeling and graphic user interface; development of total software structure, step-by-step planning procedure, window design and user-interface. Our final product show strong capability for routine and advance RTP planning.

  • PDF

A Multi Upper Bound Access Control Model with Inheritance Attributes

  • Kim, Seok-Woo
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.6
    • /
    • pp.162-166
    • /
    • 1997
  • A message server have two basic functionalities, a server role for processing the processing the user environment as well as an entity role for transferring message to other entity in message system environment. The user who is going to send and receive his important information really wants to keep his own security requests. To satisfy this requirement, message server must be enforced by two seperated security policies- one for message processing security policy under department's computer working environment, the other for send/receive security policy under message system's communication path environment. Proposed access control model gurantees the user's security request by combining constrained server access control and message system access control with multi upper bound properties which come from inheritance attributes of originating user security contexts.

  • PDF

Improving water use efficiency in the Upper Central Irrigation Area in Thailand via soil moisture system and local water user training

  • Koontankulvong, Sucharit;Visessri, Supatra
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.8-12
    • /
    • 2022
  • Water loss is one of the typical but challenging problems in water management. To reduced water loss or increase water efficiency, the pilot projects were implemented in the TTD's irrigation area. Modern soil moisture technology and local level water user training were conducted together as a mean to achieve improved water efficiency. In terms of technology, soil moisture sensors and monitoring system were used to estimate crop water requirement to reduce unnecessary irrigation. This was found to save 16.47% of irrigated water and 25.20% of irrigation supply. Further improvement of water efficiency was gained by means of local level water user training in which stakeholders were engaged in the network of communications and co-planning. The lessons learnt from the TTD pilot project was translated into good water management practices at local level.

  • PDF

Opportunistic Packet Scheduling Method Considering QoS Requirement in MMR (MMR에서 QoS를 고려한 기회적 패킷 스케줄링 방법)

  • Lee, Kang-Won;Kook, Kwang-Ho;Oh, Dong-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.244-257
    • /
    • 2009
  • We analysed the opportunistic scheduling method in MMR proposed by Samsung Electronic Cooperation and confirmed the efficiency by simulation. We also investigated the relationship between the throughput and fairness under the proposed method. The main objective of this study is to propose an opportunistic packet scheduling method in MMR, which considers the QoS requirement of user. Using the simulation the performance of the proposed method is compared with those of i) pure opportunistic packet scheduling method which doesn't consider QoS requirement and ii) packet scheduling method which only consider the QoS requirement, but does not utilize opportunistic packet scheduling.

On a Hierarchical Model for Effectively Managing ILS Requirements of Electronic Warfare Equipments (전자전장비 개발에서 종합군수지원 요구사항의 효과적 관리를 위한 계층적 모델)

  • Kim, Ghi-Back;Lee, Jae-Chon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.801-807
    • /
    • 2010
  • Requirements management is one of the most essential activities of systems engineering in developing successful weapon systems. Particularly it is very important to consistently manage the traceability among the user requirements, the system requirements, the development specifications and the testing plans throughout the entire life cycle of the weapon system. However, the most part of requirements-related activities has centered around the functional and performance requirements but the integrated logistics support(ILS) requirement has not properly been managed. In this regard, a special attention is needed to develop and manage the ILS requirements. To do so, the ANSI/EIA-632 standard can be referred as a starting point since the ILS requirements of the weapon system under development are specified by the enabling products whereas the functional and performance requirements are covered by the end product requirements. Specifically, we first review and model several cases of previous weapon systems development, which reveals the problem of interest. Then, under the framework of ANSI/EIA-632, we study a hierarchical model for effectively managing ILS requirements by analyzing the features of ILS requirements. Finally, the value of the proposed model is discussed through the case study of electronic warfare equipment.