• Title/Summary/Keyword: user response

Search Result 971, Processing Time 0.035 seconds

Study of User Reuse Intention for Gamified Interactive Movies upon Flow Experience

  • Han, Zhe;Lee, Hyun-Seok
    • Journal of Multimedia Information System
    • /
    • v.7 no.4
    • /
    • pp.281-293
    • /
    • 2020
  • As Christine Daley suggested, "interaction-image" is considered to be typical in the age of "Cinema 3.0", which integrates the interactivity of game art and obscures the boundary between producers and customers. In this case, users are allowed to involve actively in the scene as "players" to manage the tempo of the story to some extent, it, thus, makes users pleased to watch interactive movies repeatedly for trying a diverse option to unlock more branch lines. Accordingly, this paper aims to analyze the contributory factors and effect mechanism of users' reuse intention for gamified interactive movies and offer specific concepts to improve the reuse intention from the interactive film production and operation perspectives. Upon integrating the Flow theory and Technology Acceptance Model (TAM) and separating the intrinsic and extrinsic motivations of key factors based on Stimulus-Organism-Response (S-O-R), the research builds an empirical analysis model for users' reuse intention with cognition, design, attitude emotional experience and conducts an empirical analysis on 425 pieces of valid sample data applying SPSS22 and Amos23. The results show that user satisfaction and flow experience impact users' reuse intention highly and perceived usefulness, perceived ease of use, perceived enjoyment, remote perception, interactivity, and flow experience have significant positive influence on user satisfaction experience.

A Study on Ways to Improve Safety Management through Analysis of Fire Cases in Multiple-user Buildings (다중이용업소의 화재사례 분석을 통한 안전관리 개선방안 연구)

  • Lee, Jae Wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.191-201
    • /
    • 2022
  • In this study, we are going to derive problems for fire and safety management in multiple-user Buildings and suggest improvement measures to prevent recurrence through analysis of legal operation status for safety management of multiple-user Buildings and case studies of large-scale fires in multiple-user Buildings. For this study, first, the current state of the industry and fire occurrence status were investigated through theoretical considerations of the multi-use industry, and then the previous research on the multi-use industry was analyzed. and by analyzing the legal and institutional status of multiple-user Buildings, problems were derived through cases such as the Jecheon fire in Chungcheongbuk-do, the Inhyeon-dong fire in Incheon, and the Songpa-gu fire in Seoul. As a result, first, the necessity of strengthening the initial fire response capability. Second, thorough maintenance and management of emergency exits. Third, the need for rational regulation of upholstery. Fourth, reinforcement of fire safety education and training. Fifth, strengthening of installation standards for firefighting and safety facilities. Sixth, we derive the result that it is necessary to raise awareness about safety management, compare and analyze it with legal and institutional contents, and suggest solutions accordingly. When looking at the causes of fires in multi-use buildings, building owners, business owners, and employees think that there is no possibility of a fire occurring in their business premises, so there is a lack of awareness. It is necessary to raise awareness through education and publicity of firefighters and related administrative agencies.

A Study on the User Satisfaction and Improvement Suggestions for the Beopmaru Public Service in the Supreme Court Library of Korea (법원도서관 법마루 서비스 이용자 만족도 및 개선방안에 관한 연구)

  • Jiyoung Kwak
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.3
    • /
    • pp.273-295
    • /
    • 2023
  • The Beopmaru, Supreme Court Library of Korea, the national library of the judiciary, is the only one that can help reduce the justice gap and increase access to justice by allowing the general public and legal experts to read and circulate. Accordingly, this study identified user satisfaction with the Beopmaru public service through surveys and interviews and derived ways to improve the service. User satisfaction was in the following order out of 5 points: response of librarian 4.62 points, facility management 4.48 points, and cultural programs such as events and lectures 4.33 points. Satisfaction with collection composition was the lowest at 3.97 points. This appears to be because collection composition is where legal expertise has the greatest impact on satisfaction. As satisfaction with the collection composition was the lowest, collection expansion was the highest at 44%(114 people) as a service that Beopmaru needs to strengthen in the future, and a balanced collection of books according to the user base is needed in the future. Based on this, improvement measures were proposed to include dualizing the Beopmaru reading space and services for the general public and legal experts, strengthening its identity as a legal library, improving the system, and strengthening publicity and response of librarian. If the Beopmaru public service is successfully established through continuous research in the library and information community, it will be possible to improve the service quality of the law library industry as a whole, including law libraries, and increase user satisfaction.

A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework (IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구)

  • Lee Joon;Hong Seong-pyo;Shin Myeong-sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.136-141
    • /
    • 2006
  • The IEEE 802.1x can be using various user authentication mechanisms: One-Time Password, Certificate-Based TLS, Challenge/Response and Keberos through EAP(Extended Authentication Protocol). But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a safety secure communication and a user authentications by intensified the vulnerability of spoofing and DoS attacks. The suppose system offers a safe secure communication because it offers sending message of integrity service and also it prevents DoS attack at authentication initial phase.

Structure Modeling of Machine Tools and Internet-based Implementation (공작기계 구조 모델링과 인터넷 기반 구현)

  • Hong Dong-Phyo;Seo Yoon-Ho;Kim In-Soo;Lee Gyu-Bong;Sheen Dong-Mok
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.785-791
    • /
    • 2005
  • Reconfigurability of machine tools is one of the critical factors to realize the responsive manufacturing systems to satisfy the mass-customization production. This paper presents the methods to model and simulate the machine tools on Internet in response to change in the machining requirements. Specifically, a set of module combination rules and a modeling method of the structure of machine tools using connectivity graph are developed. In response to the user requirements, kinematic relations and structures of machine tools can be derived using the module combination rules and connectivity graph relationships. Internet-based simulator of machine tools is implemented and presented. The developed machine tool simulator can be used to verify the structure of machine tools derived from the user requirements.

  • PDF

Intelligent Healthcare Service Provisioning Using Ontology with Low-Level Sensory Data

  • Khattak, Asad Masood;Pervez, Zeeshan;Lee, Sung-Young;Lee, Young-Koo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2016-2034
    • /
    • 2011
  • Ubiquitous Healthcare (u-Healthcare) is the intelligent delivery of healthcare services to users anytime and anywhere. To provide robust healthcare services, recognition of patient daily life activities is required. Context information in combination with user real-time daily life activities can help in the provision of more personalized services, service suggestions, and changes in system behavior based on user profile for better healthcare services. In this paper, we focus on the intelligent manipulation of activities using the Context-aware Activity Manipulation Engine (CAME) core of the Human Activity Recognition Engine (HARE). The activities are recognized using video-based, wearable sensor-based, and location-based activity recognition engines. An ontology-based activity fusion with subject profile information for personalized system response is achieved. CAME receives real-time low level activities and infers higher level activities, situation analysis, personalized service suggestions, and makes appropriate decisions. A two-phase filtering technique is applied for intelligent processing of information (represented in ontology) and making appropriate decisions based on rules (incorporating expert knowledge). The experimental results for intelligent processing of activity information showed relatively better accuracy. Moreover, CAME is extended with activity filters and T-Box inference that resulted in better accuracy and response time in comparison to initial results of CAME.

A Study on the Performance of Prefetching Web Cache Proxy (Prefetch하는 웹 캐쉬 프록시의 성능에 대한 연구)

  • 백윤철
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1453-1464
    • /
    • 2001
  • Explosive growth of Internet populations results performance degradations of web service. Popular web sites cannot provide proper level of services to many requests, and such poor services cannot give user a satisfaction. Web caching, the remedy of this problem, reduces the amount of network traffic and gives fast response to user. In this paper, we analyze the characteristics of web cache traffics using traces of NLANR(National Laboratory for Applied Network Research) root caches and Education network cache in Seoul National University. Based on this analysis, we suggest a method of prefetching and we discuss the gains of our prefetching. As a result, we find proposed prefetching enhances hit rate up to 3%, response time up to 5%.

  • PDF

Design of Dialogue Management System for Home Network Control (홈네트워크 제어를 위한 대화관리시스템 설계)

  • Kim, Hyun-Jeong;Eun, Ji-Hyun;Chang, Du-Seong;Choi, Joon-Ki;Koo, Myung-Wan
    • Proceedings of the KSPS conference
    • /
    • 2006.11a
    • /
    • pp.109-112
    • /
    • 2006
  • This paper presents a dialogue interface using the dialogue management system as a method for controlling home appliances in Home Network Services. In order to realize this type of dialogue interface, we first investigated the user requirements for Home Network Services by analyzing the dialogues entered by users. Based on the analysis, we were able to extract 15 user intentions and 22 semantic components. In our study, example dialogues were collected from WOZ (Wizard-of-OZ) environment to implement a reasoning model for generating meaningful responses for example-based dialogue modeling technique. An overview of the Home Network Control System using proposed dialogue interface will be presented. Lastly, we will show that the Dialogue Management System trained with our collected dialogues behaves properly to achieve its task of controlling Home Network appliances by going through the steps of natural language understanding, response reasoning, response generation.

  • PDF

The Improved-Scheme of Two Factor Authentication using SMS (SMS를 이용하는 개선된 이중 인증 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • Passwords are a common method of identifying and authenticating a user who wishes to log on to a secure system. Password-based authentication techniques, however, do not provide strong security and recognized as being an poor form of protection. It is not all the responsibility of the user to control password and to protect its confidentiality. In this paper, confirm an appropriate response time and I propose a new and improved method of implementing two factor authentication using SMS via receiving apparatus(mobile and email).

Self-adaptive sampling for sequential surrogate modeling of time-consuming finite element analysis

  • Jin, Seung-Seop;Jung, Hyung-Jo
    • Smart Structures and Systems
    • /
    • v.17 no.4
    • /
    • pp.611-629
    • /
    • 2016
  • This study presents a new approach of surrogate modeling for time-consuming finite element analysis. A surrogate model is widely used to reduce the computational cost under an iterative computational analysis. Although a variety of the methods have been widely investigated, there are still difficulties in surrogate modeling from a practical point of view: (1) How to derive optimal design of experiments (i.e., the number of training samples and their locations); and (2) diagnostics of the surrogate model. To overcome these difficulties, we propose a sequential surrogate modeling based on Gaussian process model (GPM) with self-adaptive sampling. The proposed approach not only enables further sampling to make GPM more accurate, but also evaluates the model adequacy within a sequential framework. The applicability of the proposed approach is first demonstrated by using mathematical test functions. Then, it is applied as a substitute of the iterative finite element analysis to Monte Carlo simulation for a response uncertainty analysis under correlated input uncertainties. In all numerical studies, it is successful to build GPM automatically with the minimal user intervention. The proposed approach can be customized for the various response surfaces and help a less experienced user save his/her efforts.