• Title/Summary/Keyword: potential users

Search Result 910, Processing Time 0.025 seconds

A Study on the functional Charaterictics of Apparel CAD Systems (어패럴 CAD 시스템 기능적 특성에 관한 연구)

  • 조진숙
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.5
    • /
    • pp.249-264
    • /
    • 1997
  • The purpose of this study was to provide the reference information for user and potential users of apparel CAD system is Korea. Two interviews were carried out for the study. The apparel CAD system of Assyst, Gerber and Yuka was selected for technical comparative study. The results were as follows: 1. The future development of the apparel CAD system is the transfer of the developed pattern design from a 3D design system and of CIM concept. 2. The share of data is working closely in a module function. So the Assyst system provide connectivity and communication between all apparel CAD system's module and other automation programs. This system is suitable for CIM production line. 3. The Gerber system is developed the Apparel CAD system which is given by the CAM system's technical ability. This system is given high insurance of ability to the service and data transportation with other systems from users in the Korea. 4. The Yuka system is developed pattern making by the Apparel CAD system. This system's different methods which is compared with other systems are the split grading and auto pattern making. So this system is suitable for users which want to product many items and a little amount garment by using the Apparel CAD system.

  • PDF

Identifying New Technologies in Product and Processes through Patent Databanks

  • Silva, Luan Carlos Santos;Caten, Carla Schwengber ten;Gaia, Silvia;Faco, Renata Tilemann;Zocche, Lidiana;Travessini, Rosana
    • The Journal of Industrial Distribution & Business
    • /
    • v.6 no.3
    • /
    • pp.27-33
    • /
    • 2015
  • Purpose - This paper's aim is to analyze the technological information in patent databanks as a strategy in prospecting for new technologies. Research design, data, and methodology - We detail the major free electronic database sources for patent information, the patent documents, the patent document structures, INID codes (Internationally Agreed Numbers for the Identification of Data), indexation, references, and classification notions. Additionally, we review and analyze information on the activities of the Center of Dissemination Documentation and Technological Information (CEDIN) from the National Institute of Intellectual Property (INPI) of Brazil for the period 2000 to 2011. Results - The research shows that the technological information contained in the patents could provide a wide range of functionality within companies and universities. Conclusions - In recent years, (CEDIN), a specialist in intellectual property, has been serving internal and external users by providing guidance on the basis of patents and other literature, but the number of users served is still small. In order to familiarize more potential users of such technological information, task forces should be created among INPI, universities, and companies.

Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions

  • Lin, Po-Ching;Lin, Pei-Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3301-3318
    • /
    • 2016
  • Online social networks (OSNs) have changed the way people communicate with each other. An OSN usually encourages the participants to provide personal information such as real names, birthdays and educational background to look for and establish friendships among them. Some users are unwilling to reveal personal information on their personal pages due to potential privacy concerns, but their friends may inadvertently reveal that. In this work, we investigate the possibility of leaking personal information on Facebook in an unintentional and involuntary manner. The revealed information may be useful to malicious users for social engineering and spear phishing. We design the inference methods to find birthdays and educational background of Facebook users based on the interactions among friends on Facebook pages and groups, and also leverage J-measure to find the inference rules. The inference improves the finding rate of birthdays from 71.2% to 87.0% with the accuracy of 92.0%, and that of educational background from 75.2% to 91.7% with the accuracy of 86.3%. We also suggest the sanitization strategies to avoid the private information leakage.

Ambient Intelligence in Distributed Modular Systems

  • Ngo Trung Dung;Lund Henrik Hautop
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.421-426
    • /
    • 2004
  • Analyzing adaptive possibilities of agents in multi-agents system, we have discovered new aspects of ambient intelligence in distributed modular systems using intelligent building blocks (I-BLOCKS) [1]. This paper describes early scientific researches related to technical design, applicable experiments and evaluation of adaptive processing and information interaction among I-BLOCKS allowing users to easily develop ambient intelligence applications. The processing technology presented in this paper is embedded inside each DUPLO1 brick by microprocessor as well as selected sensors and actuators in addition. Behaviors of an I-BLOCKS modular structure are defined by the internal processing functionality of each I-Blocks in such structure and communication capacities between I-BLOCKS. Users of the I-BLOCKS system can do 'programming by building' and thereby create specific functionalities of a modular structure of intelligent artefacts without the need to learn and use traditional programming language. From investigating different effects of modem artificial intelligence, I-BLOCKS we have developed might possibly contain potential possibilities for developing applications in ambient intelligence (AmI) environments. To illustrate these possibilities, the paper presents a range of different experimental scenarios in which I-BLOCKS have been used to set-up reconfigurable modular systems. The paper also reports briefly about earlier experiments of I-BLOCKS in different research fields, allowing users to construct AmI applications by a just defined concept of modular artefacts [3].

  • PDF

To Use Facebook for Good: Usage, Cyberbullying Involvement, and Perceived Social Support

  • Wong, Natalie;McBride, Catherine
    • Child Studies in Asia-Pacific Contexts
    • /
    • v.6 no.2
    • /
    • pp.59-72
    • /
    • 2016
  • We examined the relationship between the extent of Facebook usage and social well-being with consideration of cyberbullying involvement using a person-oriented approach. Survey data were collected from a sample of 312 secondary students from Grades 7 and 8 in Hong Kong. Levels of cyberbullying involvement, Facebook usage and perceived social support were investigated. Participants were classified into three clusters based on the different levels of Facebook usage and cyberbullying victimization through cluster analyses (i.e., frequent Facebook user/noncyberbullied victim, frequent Facebook user/cyberbullied victim, and uninvolved). Our results showed that frequent Facebook users who are cyberbullied tend to engage in cyberbullying perpetration significantly more than the frequent Facebook users who are not cyberbullied, even when the latter reported higher Facebook usage. This result provides some support for the idea that cyberbullying victimization has additional value on top of the level of usage in explaining one's participation in cyberbullying perpetration. As expected, frequent Facebook users who were not cyberbullied reported the highest perceived social support among the three groups. What is even more interesting is the equal level of perceived social support found between the cyberbullied victims and the uninvolved. Our results suggest that, although limiting adolescents' Internet use might reduce their risks of being involved in cyberbullying, it might also take away the potential benefits they could get from interacting with the online community. Benefits of using the person-oriented approach in the study of cyberbullying are discussed.

Interaction Evaluation of Maintenance Management Organization Affecting Satisfaction of Users in Helpdesk Service of Buildings (건물의 헬프데스크 서비스에서 사용자의 만족도에 영향을 미치는 유지관리조직의 상호작용 평가)

  • Kwak, Ro-Yeul;Kwon, Suh-Hyun;Chun, Chung-Yoon
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.35 no.4
    • /
    • pp.193-200
    • /
    • 2019
  • Maintenance services provided to users in buildings are not sufficient simply to provide them, but it is necessary to provide them with a service system that can accurately identify and respond to users' needs. This study analyzed the relationship between user satisfaction with the helpdesk service corresponding to the building claim and the quality of service of the maintenance organization to identify the interaction between the user and the maintenance organization in the building. We then examined whether there were significant differences between the buildings in terms of variables in the helpdesk service that affect the user's satisfaction. It was also presented as a measure of the quality of service of the SERVQUAL tool to assess the potential for building maintenance response strategies. Research shows that each building has a helpdesk service item that is significant in user satisfaction and empathy has emerged in a typical dimension as SERVQUAL dimension.

Understanding the Risks on Saudi Arabian's Youth Being Online Without Having Strong Cyber-Security Awareness

  • Alharbi, Nawaf;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.131-146
    • /
    • 2022
  • The Internet is becoming a basic need for many individuals globally in this digital age. The youths became more active online than before, with the majority relying on different platforms to communicate and interact with peers. Saudi Arabia is one of the nations where internet usage is high, with an increasing number of active internet users. The youth in Saudi Arabia are engaged in various online platforms. However, they lack adequate knowledge about cybersecurity and the dangers of internet usage, which exposes them to the risk of falling victims to cybercriminals. The most common dangers of internet usage include viruses, malware, phishing, and hacking, compromising users' sensitive information. Increased awareness of these potential threats helps protect Internet users and secure their data. The understanding of the dangers of Internet usage among youths varies across countries. In this regard, our study explores the risks of internet usage among youth in Saudi Arabia compared to the United States, South Africa, and New Zealand.

Information Distribution of Sport Social Networking Sites: Their Use in Promoting Psychological Well-Being

  • Seung Hwan PARK;Min Soo KIM;Miok KIM;Seungmin LEE;Taeyeon OH;Sun Ju KIM;Won Jae SEO
    • Journal of Distribution Science
    • /
    • v.22 no.3
    • /
    • pp.83-92
    • /
    • 2024
  • Purpose: With the rapid information distribution of sport-related SNS, sport industry has utilized SNS as technical solution to distribute sport and health-related information. The current study examined the effect of SNS information use for running-specific content on running engagement and psychological well-being. Research design, data and methodology: Data were collected via online survey of participants in marathon events of United States. Descriptive statistics and Chi-square test were conducted to compare demographics and psycho-behavioral outcomes among SNS information users and non-users for running-specific contents. Multivariate hierarchical regression was next employed to examine research hypotheses. Results: A mass-participant running event was used to test seven hypotheses related to the potential role of SNS for running content in promoting running engagement and life satisfaction. In general, findings revealed that use of SNS for running content along with frequency of use can perhaps facilitate running intensity and influence participation in running-related outdoor activities. Furthermore, while overall life satisfaction did not appear to be influenced by use of SNS for running content, there was a demonstrated influence on the individual satisfaction domains. Conclusions: The findings of current study suggest that sport SNS is information distribution media enhancing users' engagement and their six life satisfaction domains. Further implications were discussed.

Clustering-Based Federated Learning for Enhancing Data Privacy in Internet of Vehicles

  • Zilong Jin;Jin Wang;Lejun Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1462-1477
    • /
    • 2024
  • With the evolving complexity of connected vehicle features, the volume and diversity of data generated during driving continue to escalate. Enabling data sharing among interconnected vehicles holds promise for improving users' driving experiences and alleviating traffic congestion. Yet, the unintentional disclosure of users' private information through data sharing poses a risk, potentially compromising the interests of vehicle users and, in certain cases, endangering driving safety. Federated learning (FL) is a newly emerged distributed machine learning paradigm, which is expected to play a prominent role for privacy-preserving learning in autonomous vehicles. While FL holds significant potential to enhance the architecture of the Internet of Vehicles (IoV), the dynamic mobility of vehicles poses a considerable challenge to integrating FL with vehicular networks. In this paper, a novel clustered FL framework is proposed which is efficient for reducing communication and protecting data privacy. By assessing the similarity among feature vectors, vehicles are categorized into distinct clusters. An optimal vehicle is elected as the cluster head, which enhances the efficiency of personalized data processing and model training while reducing communication overhead. Simultaneously, the Local Differential Privacy (LDP) mechanism is incorporated during local training to safeguard vehicle privacy. The simulation results obtained from the 20newsgroups dataset and the MNIST dataset validate the effectiveness of the proposed scheme, indicating that the proposed scheme can ensure data privacy effectively while reducing communication overhead.

KSRBL Data Calibration and Note for Users

  • Bong, Su-Chan;Park, Sung-Hong;Hwangbo, Jung-Eun;Park, Young-Deuk;Lee, Dae-Young
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.91.2-91.2
    • /
    • 2013
  • The Korean Solar Radio Burst Locator (KSRBL) is a solar radio spectrograph observing the frequency range between 0.245-18 GHz with the capability of locating the wideband gyrosynchrotron bursts. Its calibration process consists of antenna calibration, flux calibration, and demodulation. Antenna calibration is to determine the position, the width, and the peak value of the beam, flux calibration is to determine the conversion factor between the measured unit to the Solar Flux Unit (SFU), and demodulation is to determine the burst position and remove the modulation pattern. We introduce the current calibration software and some information that potential users may concern.

  • PDF