• Title/Summary/Keyword: software convergence

Search Result 2,272, Processing Time 0.049 seconds

Psychological Factors Influencing Continuous Use of Mobile Healthcare Applications (모바일 헬스케어 앱의 지속사용의도에 미치는 심리적 요인의 영향 연구)

  • Lee, Lee-Sac;Lee, Sang-Hyun;Jeong, Jae-Seon;Noh, Ki-Young
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.445-456
    • /
    • 2017
  • Mobile healthcare apps should be paid more attention not just as software, but also as significant health information providers. We examine the impact of psychological factors (e,g., instrumental efficacy, informational efficacy, health information orientation, playfulness, and responsiveness) on intention to continuous use of mobile healthcare apps. Based on an expanded technology acceptance model (TAM II), this study examined the effects of psychological factors influencing the usage of mobile healthcare apps. The results showed that informational efficacy and instrumental efficacy influenced intention to use through perceived ease of use and perceived usefulness. Playfulness influenced intention to continuous use directly as well as indirectly through perceived ease of use and perceived usefulness. Health information orientation and responsiveness influenced intention to continuous use through perceived usefulness. This study suggests the need for adopting instrumental, informative perspectives and playfulness in contemporary health research and production of mobile healthcare apps.

Analysis of the Risk of Heat Generation due to Bolt Loosening in Terminal Block Connector Parts (볼트풀림에 의한 터미널 블록의 접속부 발열 위험성 분석)

  • Yeon, Yeong-Mo;Kim, Seung-Hee
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.67-75
    • /
    • 2020
  • In this study, the risk of heat generation due to normal and overload currents that vary with the abnormal loosening angle of wire-connecting bolts were identified. The risks were analyzed based on the thermal characteristics to minimize the carbonization accidents of terminal blocks inside distribution panels typically used in industrial sites. We applied a method for measuring the heating temperature and temperature variations in the terminal blocks in real-time by installing a resistance temperature detector sensor board in the terminal block. The experimental results showed that the terminal block model with a low-rated current exhibited a higher heating temperature, thus, confirming the need to select the terminal block capacity based on load currents. Additionally, the higher the rated current of the terminal block with a high-rated current and the higher the degree of loosening, the faster the carbonization point. Such heating temperature monitoring enabled real-time thermal temperature measurement and a step-by-step risk level setting through thermal analysis. The results of the measurement and analysis of carbonization risks can provide a theoretical basis for further research regarding the risk of fire due to carbonization. Furthermore, the deterioration measurement method using the temperature sensor board developed in this study is widely applicable to prevent fires caused by poor electrical contact as well as risk-level management.

Development of an Automated Design Algorithm for the Longitudinal Members of Oil Tankers based on H-CSR (H-CSR 기반 유조선 종강도 부재의 설계 자동화 알고리즘 개발)

  • Park, Chan-im;Jeong, Sol;Song, Ha-cheol;Na, Seung-soo;Park, Min-cheol;Shin, Sang-hoon;Lee, Jeong-youl
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.53 no.6
    • /
    • pp.503-513
    • /
    • 2016
  • In order to reduce the green-house gas exhaustion, International Maritime Organization (IMO) has been reinforcing carbon gas regulations. Due to the regulations, a lot of competitions for designing Eco ship in the shipbuilding industry are progressing now. It is faced with the necessity of reducing hull weight by combining automated systems for optimal compartment arrangement with hull structural design. Most researches on optimum structural design method have been consistently in progress and applied to minimize weight and cost of mid-ship section in preliminary ship design stage based on analytical structural analysis method on fixed compartment arrangement. In order to reduce design period and to improve international technical competitiveness by shortening the period of hull structural design and enhancing design accuracy, it has been felt necessity to combine optimized compartment arrangement with optimum design of ship structure based on the international regulations and rules. So in this study, the automated design algorithm for longitudinal members has been developed to combine automated algorithm of compartment arrangement with hull structural design system for oil tanker. The SeaTrust-Hullscan software developed by Korean Register is used to perform ship structural design for mother ship and selected design cases. The effect of weight reduction is verified with comparison of ship weight between mother ship and the cases suggested in this study.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

Mediating and Moderating Effects of Self-esteem, Social Participation and Discrimination Experience in the Relationship between Acceptance of Disability and Social Competence in Adults with Physical Disabilities (지체장애인의 장애수용과 사회적 유능감 간의 관계에서 자존감, 사회참여, 차별경험의 매개 및 조절효과)

  • Kim, Do-Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.377-386
    • /
    • 2019
  • The purpose of this study is to identify effective strategies for promoting psycho-social adjustment by examining the mediating effects of self-esteem (SE) and moderating effects of social participation (SP) and discrimination experience (DE) in predicting social competence (SC) with acceptance of disability (AD). The subjects of the study were 1943 adults with a physical disability (1338 males and 605 females) and 233 adults with brain lesions (160 males and 73 females) aged between 19 and 65 years. Data were analyzed using SPSS and Process macro software, and conditional process analysis (model 18) in which the degree and onset of disability were controlled was performed. The results are as follows. First, SE was found to partially mediate the relationship between AD and SC. Second, the relationship between SE and SC was found to be moderated by SP but not by DE, and the relationship between SP and SC was found to be moderated by DE. In addition, the mediating effects of SE, which was moderated by SP, were found to not be moderated by DE. The clinical implication and suggestion for future research is discussed.

A Study on the Development of Driving Simulator for Improvement of Unmanned Vehicle Remote Control (무인차량 원격주행제어 신뢰성 향상을 위한 통합 시뮬레이터 구축에 관한 연구)

  • Kang, Tae-Wan;Park, Ki-Hong;Kim, Joon-Won;Kim, Jae-Gwan;Park, Hyun-Chul;Kang, Chang-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.86-94
    • /
    • 2019
  • This paper describes the development of unmanned vehicle remote control system which is configured with steering and accelerating/braking hardware to improve the sense of reality and safety of control. Generally, in these case of the remote control system, a joystick-type device is used for steering and accelerating/braking control of unmanned vehicle in most cases. Other systems have been developing using simple steering wheel, but there is no function of that feedback the feeling of driving situation to users and it mostly doesn't include the accelerating/braking control hardware. The technology of feedback means that a reproducing the feeling of current driving situation through steering and accelerating/braking hardware when driving a vehicle in person. In addition to studying feedback technologies that reduce unfamiliarity in remote control of unmanned vehicles, it is necessary to develop the remote control system with hardware that can improve sense of reality. Therefore, in this study, the reliable remote control system is developed and required system specification is defined for applying force-feedback haptic control technology developed through previous research. The system consists of a steering-wheel module similar to a normal vehicle and an accelerating/braking pedal module with actuators to operate by feedback commands. In addition, the software environment configured by CAN communication to send feedback commands to each modules. To verify the reliability of the remote control system, the force-feedback haptic control algorithms developed through previous research were applied, to assess the behavior of the algorithms in each situation.

The Analysis on Technology Acceptance Model for the 3D Printing Industry with the Social Economic Environment Converged Unified Theory Of Acceptance and Use of Technology Model (3D 프린팅 산업에 대한 사회경제환경 융합형 통합기술수용모델을 통한 기업의 3D기술수용의도 분석)

  • Kim, Young-soo;Hong, Ah-reum
    • Journal of Korea Technology Innovation Society
    • /
    • v.22 no.1
    • /
    • pp.119-157
    • /
    • 2019
  • It is important for the people in the 3D printing industry to determine which factors influence the decision-making that determine the adoption of 3D printers and the role of the factors. Through this, we intend to find ways to contribute to the development of 3D printing industry in Korea by increasing utilization of 3D printer used in domestic companies and increasing investment in related industries. 3D printers are making rapid progress according to the development of technology, the public interest, and the activation of investment. Foreign countries have made remarkable progress in equipment, materials, software, and industrial applications, but they are lower than expected in Korea. It is necessary to introduce a smooth 3D printer in order to revitalize the 3D printer industry and enlarge the base, but it is insufficient for actual introduction and field application. The independent variables that represent economic, technological, and environmental characteristics were selected through a literature survey, and a model for accepting integrated technology for convergence of societies in the 3D printing industry was proposed. This study confirms that economic factors such as output unit price, government support, and environmental factors such as 3D contents should be developed organically for the introduction of 3D printing technology and equipment. This require systematic and effective support from the government, and it is necessary to improve the economic support, related laws, and systems that can be directly experienced by the user as a user. As the domestic 3D printing industry develops with economic, technological and time investment, 3D printing industry should be the key engine of the 4th industrial revolution.

Design and Implementation of Crime Prevention System Targeting Women by Using Public BigData (공공 빅데이터를 이용한 여성 대상 범죄 예방 시스템의 설계 및 구현)

  • Ko, Sung-Wook;Oh, Su-Bin;Baek, Se-In;Park, Hyeok-Ju;Park, Mee-Hwa;Lee, Kang-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.561-564
    • /
    • 2016
  • If using crime map which represents criminal section that violent crimes targeting women frequently happened, the police could prevent additional crimes by positioning themselves intensively in expected crime zones and each individual could avoid being damaged by referring information of criminal zones. In this paper, by analyzing crimes targeting women and offender information which is provided in public-opened datum portal, we suppose a system which prevents crimes that calculates locational danger and, by considering location and age group of users, provides user-customized information of danger. By crawling the criminals datum which is provided in public-opened datum portal, It collects them. About the areas which happened sexual crimes, calculating danger of crime based on statistical crime information including criminal information, residence of offenders, areas which happened sexual crimes, sentences and the number of crime, this system is able to visualize the areas which sexual crimes happened based on information of danger grade representing on user's location. The score of danger calculated in location unit can provide criminal information according to location and ages of users by interacting GIS.

  • PDF

Proposal and Analysis of Primality and Safe Primality test using Sieve of Euler (오일러체를 적용한 소수와 안전소수의 생성법 제안과 분석)

  • Jo, Hosung;Lee, Jiho;Park, Heejin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.438-447
    • /
    • 2019
  • As the IoT-based hyper-connected society grows, public-key cryptosystem such as RSA is frequently used for encryption, authentication, and digital signature. Public-key cryptosystem use very large (safe) prime numbers to ensure security against malicious attacks. Even though the performance of the device has greatly improved, the generation of a large (safe)prime is time-consuming or memory-intensive. In this paper, we propose ET-MR and ET-MR-MR using Euler sieve so it runs faster while using less memory. We present a running time prediction model by probabilistic analysis and compare time and memory of our method with conventional methods. Experimental results show that the difference between the expected running time and the measured running time is less than 4%. In addition, the fastest running time of ET-MR is 36% faster than that of TD-MR, 8.5% faster than that of DT-MR and the fastest running time of ET-MR-MR is 65.3% faster than that of TD-MR-MR and similar to that of DT-MR-MR. When k=12,381, the memory usage of ET-MR is 2.7 times more than that of DT-MR but 98.5% less than that of TD-MR and when k=65,536, the memory usage of ET-MR-MR is 98.48% less than that of TD-MR-MR and 92.8% less than that of DT-MR-MR.

Women's Field Hockey Pass Analysis using Social Network Theory (사회연결망 이론을 활용한 여자필드하키 패스분석)

  • Choi, Eun-Young;Kim, Ji-Eung;Lee, Seung-Hun;Park, Jong-Chul
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.471-477
    • /
    • 2019
  • The purpose of this study is to analyse the attacking pattern of the key player through plenty of passes on field hockey between the winning games and losing ones through the preliminary game and the tournament. It has shown that the Korean women national team on field hockey is analysed all the passes through the sportscode for the 6 games of the World-League Final, and is investigated the centrality through the social network analysis using the R analytic software. The result is followed : First, It has shown three tendencies on the preliminary games that it has shown a lower Degree-Centrality, a same with Closeness, and a higher Betweenness than the tournament. Second, It has also described on winning games that it has explained a lower Degree-Centrality, a same with Closeness, and a higher Betweenness than losing games. On the conclusion, it has revealed that Korean women national team on field hockey showed a tendency that prefer to use a counter-attacking. Based on these study, expect to be used as a way to analyze performance in the field.