• Title/Summary/Keyword: target problem

Search Result 1,788, Processing Time 0.029 seconds

Retail-Store Type Digital Signage Solution Development And Usability Test Using Android Mini PC (안드로이드 미니PC를 이용한 Retail-Store형 디지털사이니지 솔루션 개발 및 사용성 테스트)

  • Lim, Jungtaek;Shin, Dong-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.29-44
    • /
    • 2015
  • Digital Signage, a way of advertising or delivering information to viewers through digital displays, has expanded from being just an advertising channel in public places. Recently, it has become widely prevalent in restaurants and retail stores. Despite its wide expansion, digital signage is limited to specific usages and services and the devices it uses are also quite expensive. This study introduces a stick-type digital signage product that operates on Android OS, which addresses all the weaknesses of digital signage with much more reasonable pricing and stable operation. For stability, performance tests were executed on the hardware and applications. The results for hardware performance were extremely promising, as each scenario's maximum performance results, measured by Load Runner programs, reached target indexes. Also, as a result of the usability test, all participants, including non-digital signage system users (novices), were able to easily learn all the tasks. As a result of user satisfaction survey, positive responses were exhibited for ease of learning and usability (LEU), helpfulness and problem solving capabilities (HPSC), affective aspect and multimedia properties (AAMP), commands and minimal memory load (CMML), and control and efficiency (CE).

Methods to Apply GoF Design Patterns in Service-Oriented Computing (서비스 지향 컴퓨팅을 위한 GoF 디자인 패턴 적용 기법)

  • Kim, Moon-Kwon;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.19D no.2
    • /
    • pp.187-202
    • /
    • 2012
  • As a representative reuse paradigm, the theme of service-oriented Paradigm (SOC) is largely centered on publishing and subscribing reusable services. Here, SOC is the term including service oriented architecture and cloud computing. Service providers can produce high profits with reusable services, and service consumers can develop their applications with less time and effort by reusing the services. Design Patterns (DP) is a set of reusable methods to resolve commonly occurring design problems and to provide design structures to deal with the problems by following open/close princples. However, since DPs are mainly proposed for building object-oriented systems and there are distinguishable differences between object-oriented paradigm and SOC, it is challenging to apply the DPs to SOC design problems. Hence, DPs need to be customized by considering the two aspects; for service providers to design services which are highly reusable and reflect their unique characteristics and for service consumers to develop their target applications by reusing and customizing services as soon as possible. Therefore, we propose a set of DPs that are customized to SOC. With the proposed DPs, we believe that service provider can effectively develop highly reusable services, and service consumers can efficiently adapt services for their applications.

A Study on Improvement of the DDHV Estimating Method (설계시간교통량 산정방법 개선)

  • 문미경;장명순;강재수
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.5
    • /
    • pp.61-71
    • /
    • 2003
  • Existent DDHV draws and is calculating K coefficient. D coefficient from sum of traffic volume two-directions time. There is difference of design order and actuality order, error of DDHV estimation value, problem of irregular change etc. of DDHV thereby. In this study, among traffic volume of each other independent two direction(going up, going down), decide design target order in the directional traffic volume, presented way(way) applying without separating K coefficient and D coefficient at the same time. The result were analysis about national highway permanent count point 360 points 30 orders by existing DDHV estimation value method(separation plan) analysis wave and following variation appear. - design order and actuality order are collision at 357 agencies(99.2%) - actuality order special quality : Measuring efficiency of average 80 orders, maximum 1,027 order, minimum 2 orders - error distribution of design order and actuality order : inside 10 hours is(30$\pm$10hour) 106 points(29.4%), 254 points(70.6%) more than 30 orders and $\pm$10 orders error occurrence be - DDHV estimation value : Average 8.4%, maximum 46.7% The other side, average 50 orders. error improvement effect of DDHV 8.4% was analysed that is at design hourly volume computation by inseparability method in case of AADT premises correct thing because inseparability plan agrees actuality order at whole agency with design order and measuring efficiency of DDHV estimation value is "0".t;0".uot;.

Development and application of GLS OD matrix estimation with genetic algorithm for Seoul inner-ringroad (유전알고리즘을 이용한 OD 추정모형의 개발과 적용에 관한 연구 (서울시 내부순환도로를 대상으로))

  • 임용택;김현명;백승걸
    • Journal of Korean Society of Transportation
    • /
    • v.18 no.4
    • /
    • pp.117-126
    • /
    • 2000
  • Conventional methods for collecting origin-destination trips have been mainly relied on the surveys of home or roadside interview. However, the methods tend to be costly, labor intensive and time disruptive to the trip makers, thus the methods are not considered suitable for Planning applications such as routing guidance, arterial management and information Provision, as the parts of deployments in Intelligent Transport Systems Motivated by the problems, more economic ways to estimate origin-destination trip tables have been studied since the late 1970s. Some of them, which have been estimating O-D table from link traffic counts are generally Entropy maximizing, Maximum likelihood, Generalized least squares(GLS), and Bayesian inference estimation etc. In the Paper, with user equilibrium constraint we formulate GLS problem for estimating O-D trips and develop a solution a1gorithm by using Genetic Algorithm, which has been known as a g1oba1 searching technique. For the purpose of evaluating the method, we apply it to Seoul inner ringroad and compare it with gradient method proposed by Spiess(1990). From the resu1ts we fond that the method developed in the Paper is superior to other.

  • PDF

Seawater Desalination Pretreatments and Future Challenges (해수담수화 전처리 기술과 향후 도전)

  • Jang, Hoseok;Kwon, Deaeun;Kim, Jeonghwan
    • Membrane Journal
    • /
    • v.25 no.4
    • /
    • pp.301-309
    • /
    • 2015
  • Importance of pretreatment for seawater desalination is growing rapidly. Proper selection of pretreatment is critical for the successful, long-term operation in the seawater desalination plant such as seawater reverse osmosis (SWRO). The purposes of seawater pretreatment are to remove particulate, colloidal materials, organic, inorganic materials, microorganisms and their by-products present in the seawater, and thus to improve the performance of seawater desalination systems. However, pretreatment is most challenging for designing and operating seawater desalination plants because of fluctuations of water qualities, site specifications and wide ranges of target materials present in the seawater to be treated. In addition, it is also becoming evident increasingly that microscopic algae are a major cause of operational problems, for example, membrane fouling which is long-standing problem in SWRO process. Pretreatment strategies prior to the operation of seawater desalination technologies should be even more complicated by algae blooms and release of their harmful by-products in marine environment. This paper reviews the roles of various pretreatment methods in seawater desalination process. Benefits and drawbacks are described, which should be taken into account in future studies on selecting pretreatment for seawater desalination process.

Multiple Layer File Format for Safe Collaborative Design (안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷)

  • Kim, Kichang;Yoo, Sang Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.45-65
    • /
    • 2013
  • A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.

Review on Artificial Intelligence Education for K-12 Students and Teachers (K-12 학생 및 교사를 위한 인공지능 교육에 대한 고찰)

  • Kim, Soohwan;Kim, Seonghun;Lee, Minjeong;Kim, Hyeoncheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.4
    • /
    • pp.1-11
    • /
    • 2020
  • The purpose of this study is to propose the direction of AI education in K-12 education through investigating and analyzing aspects of the purpose, content, and methods of AI education as the curriculum and teacher training factors. We collected and analyzed 9 papers as the primary literature and 11 domestic and foreign policy reports as the secondary literature. The collected literatures were analyzed by applying a descriptive reviews, and the implications were derived by analyzing the curriculum components and TPACK elements for multi-dimensional analysis. As a result of this study, AI education targets were divided into three steps: AI users, utilizer, and developers. In K-12 education, the user and utilizer stages are appropriate, and artificial intelligence literacy must be included for user education. Based on the current computing thinking ability and coding ability for utilizer education, the implication was derived that it is necessary to target the ability to create creative output by applying the functions of artificial intelligence. In addition to the pedagogical knowledge and the ability to use the platform, The teacher training is necessary because teachers need content knowledge such as problem-solving, reasoning, learning, perception, and some applied mathematics, cognitive / psychological / ethical of AI.

A Study on Prevalence and its Relating Factors of Urinary Incontinence in Women (여성의 요실금빈도와 관련요인에 관한 조사연구)

  • Kim Keum-Soon;Suh Moon-Ja
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.4 no.1
    • /
    • pp.73-85
    • /
    • 1997
  • The purpose of this study was to find out the prevalence of the urinary incontinence and it's relating factors in women. The target population is 327 community dwelling women in the age of 30-70 years old at 6 cities in Korea. The data were collected from August, 1996 to December. 1996 with interview using structured questionaire composing of items of general characteristics, obstetric characteristics, disease characteristics, situation of experiencing urinary incontinence, discomfort due to urinary incontinence, and depression. The data were analysed with $SPSS/PC^+$ program, T-test, $x^2$ test, and ANOVA test. The results obtained from this study were as follows : 1) The prevalence of urinary incontinence in women is 37.7%(130/327). 2) The mean duration of experiencing the urinary incontinence was 75.9 months and the 60% of the respondents experienced a few frequency of urinary incontinence and the most common amount of urinary incontinence(91.5%) was somewhat small expressed as 'wetting their clothes'. 3) The common factors related to the urinary incontinence were coughing, sneezing, laughing aloudly, and the activities of need for hurry. 4) The most common situations of discomforts associated with urinary incontinence were having long journey, exercise, playing, and social meeting. 5) The incidence of urinary incontinence was significantly higher in woman who had more children, older age of last delivery, more vaginal delivaries, and less c-section. 6) The incidence of urinary incontinence was not affected with the disease characteristics of the respondents, however it was higher when the women had the physical problems of constipation, abdominal laparatomy and episode of urinary catheterization than who had not. 7) The most common symptom of urinary incontinence was the frequent urine(43.1%), and the next was the urgent urine(12.3), delayed urine(9.2%). 8) 90.7% of the epsodic urinary incontinence were not treated at al, however, they wanted to try the herb medicine(41.5%), Kegel exercise(27.7%), and biofeedback(10.0%). 9) The level of Depression in the group of urinary incontinence was higher than that of non incontinence group significantly. In conclusion, as urinary incontinence in women proved severe health problem, health care providers need to develop and provide nursing intervention of urinary incontinence such as pelvic muscle exercise with bio-feedback and psychological care.

  • PDF

Mapping Technique for Flood Vulnerable Area Using Surface Runoff Mechanism (지표유출메커니즘을 활용한 홍수취약지구 표출 기법)

  • LEE, Jae-Yeong;HAN, Kun-Yeun;KIM, Hyun-Il
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.181-196
    • /
    • 2019
  • Floods can be caused by a variety of factors, and the main cause of floods is the exceeding of urban drainage system or river capacity. In addition, rainfall frequently occurs that causes large watershed runoff. Since the existing methodology of preparing for flood risk map is based on hydraulic and hydrological modeling, it is difficult to analyse for a large area because it takes a long time due to the extensive data collection and complex analysis process. In order to overcome this problem, this study proposes a methodology of mapping for flood vulnerable area that considered the surface runoff mechanism. This makes it possible to reduce the time and effort required to estimate flood vulnerabilities and enable detailed analysis of large areas. The target area is Seoul, and it was confirmed that flood damage is likely to occur near selected vulnerable areas by verifying using 2×2 confusion matrix and ROC curve. By selecting and prioritizing flood vulnerable areas through the surface runoff mechanism proposed in this study, the establishment of systematic disaster prevention measures and efficient budget allocation will be possible.

A Study on the Application of the Technology Tree for Water Hazard Information Platform (수재해 정보 플랫폼을 위한 기술트리 활용 방안 연구)

  • Kim, Dong-Young;Lee, Jeong-Ju;Chae, Hyo-Sok;Hwang, Eui-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.17 no.4
    • /
    • pp.200-214
    • /
    • 2014
  • Technology planning is becoming increasingly important with the rapid development and decline of technology. Technology roadmapping is a tool used to select whether the specific technique of technology planning should pursue which technology and in which time. This technology is important to secure the uncertain future since it will provide a method that is able to share the goals and strategies between organizations. Therefore, technology tree in the planning stage of the problem would be a very useful tool. In this study, both domestic and international technology tree application cases were analyzed to be able to derive a plan for ensuring that the research performed and the requirements are met for the future development and implementation of a convergence portal system. The six major systems that aim at water hazard information platform are basic information providing system, analysis information providing system, water disaster theme providing system, national disaster information system, water disaster augmented reality system and open information platform system. General standardized core technologies corresponding to the needed functions in each target system are derived through brainstorming, and classified according to the technology field to derive the technology tree.