• 제목/요약/키워드: 매체신뢰도

Search Result 84, Processing Time 0.025 seconds

Development of Paper-based Microfluidic Device for Dry Eye Test (종이-미세유체공학을 이용한 건성안 검사 용지 개발)

  • Seo, Young Tae;Noh, Hyeran
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.18 no.2
    • /
    • pp.93-99
    • /
    • 2013
  • Purpose: The aim of this study was to develop a dry eye test method using a paper based microfluidic device that improves inaccuracy caused by using one of current point-of-care dry eye tests such as Shirmer's. Methods: Wax printed hydrophilic chromatography papers were dyed with anthocyanin extracts to detect colorimetric display of liquid samples with varying pH. Fluid distribution rates were measured using artificial tears and human tears directly from 32 subjects. Results: With Shirmer's, fluid distribution rates with small amount of samples (less than $0.5{\mu}l$) were not displayed. However, with paper based microfluidic device, fluid imbibition distances over time were clearly showed. Also clinical results of dry eye from newly developed paper based microfluidic device showed correlation with the results from tear break up time tests. Conclusions: The newly developed paper based microfluidic devices were easy to use and exhibited more accurate clinical results than current dry eye point of care tests such as Shirmer's.

The Effects of Advertising Attitude and Visitor Intention of Exhibition: Focusing on Exhibition Types (전시회 광고의 정보 품질과 매체 신뢰도가 광고태도 및 전시회 참관의도에 미치는 영향에 대한 연구: 전시회 유형을 중심으로)

  • Kim, Yoonjeong;Ham, Juyeon;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.19 no.3
    • /
    • pp.89-112
    • /
    • 2018
  • Under exhibition circumstances, exhibition advertising by organizer is a mean to promote exhibition service to exhibitors and visitors while general advertising is to promote products and services to consumers. The objective of this research is to suggest advertising strategies by seeing differences in the impact of information quality and media credibility on visitor intention depending on the types of exhibition. This study adopted Elaboration Likelihood Model to measure the impact of central and peripheral cues on advertising attitude and its consequence on visitor intention. We further examined how these influence processes were moderated by exhibition types of B2B and B2C. We conducted survey from B2B and B2C exhibitions respectively, and analyzed structural equation model and moderator regression. We found that first, among factors of information quality as a central cue, argument strength has a positive impact on attitude towards advertising. Second, we also found among factors of media credibility as a peripheral cue, media trustworthiness has a positive impact on attitude towards advertising. Lastly, this study revealed that a type of exhibition moderates the central and peripheral routes towards advertising attitude, showing that B2C visitors are influenced by factors of information quality, and B2B visitors rather by media credibility. This study yields implications in that it gives marketers of organizer a background to set different marketing strategies depending on the types of exhibition.

Detecting Spam Data for Securing the Reliability of Text Analysis (텍스트 분석의 신뢰성 확보를 위한 스팸 데이터 식별 방안)

  • Hyun, Yoonjin;Kim, Namgyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.493-504
    • /
    • 2017
  • Recently, tremendous amounts of unstructured text data that is distributed through news, blogs, and social media has gained much attention from many researchers and practitioners as this data contains abundant information about various consumers' opinions. However, as the usefulness of text data is increasing, more and more attempts to gain profits by distorting text data maliciously or nonmaliciously are also increasing. This increase in spam text data not only burdens users who want to obtain useful information with a large amount of inappropriate information, but also damages the reliability of information and information providers. Therefore, efforts must be made to improve the reliability of information and the quality of analysis results by detecting and removing spam data in advance. For this purpose, many studies to detect spam have been actively conducted in areas such as opinion spam detection, spam e-mail detection, and web spam detection. In this study, we introduce core concepts and current research trends of spam detection and propose a methodology to detect the spam tag of a blog as one of the challenging attempts to improve the reliability of blog information.

A study on the digital textbook acceptance by application of Chasm Theory and Technology Acceptance Model (캐즘이론과 정보기술수용모형을 적용한 디지털 교과서 수용 연구)

  • Suh, Soon-Shik;Yun, Han-Gi
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.4
    • /
    • pp.33-41
    • /
    • 2011
  • This study was conducted to identify factors that influenced teachers' adoption of digital textbooks and causal relationships among the factors identified. Chasm theory was used in developing strategies for adoption of digital textbooks that consider teachers' innovativeness. This study also employed the information technology adoption model of Davis (1989) that illustrates decision making processes for the adoption of instructional media such as digital textbooks. Based on these two theories, a measurement instrument measuring teachers' innovativeness, perceived usefulness, perceived ease of use, and intention of use was developed and validated through a series of reliability and validity tests. Causal relationships among the factors were examined using structural equation modeling. The result indicated that: a) perceived ease of use had a directional effect on perceived usefulness and an indirect effect on intention of use; and b) perceived usefulness had a direct effect on intention of use. Implications of this finding are discussed especially for the efforts in developing strategies for teachers' adoption of digital textbook. For example, when digital textbooks are introduced into public schools, teachers' perception of the usefulness of digital textbooks, beyond just ease of use, should be considered.

  • PDF

Dynamic Channel-Time Assignments based on the link status in IEEE 802.15.3 High-rate WPAN (IEEE 802.15.3 고속 무선 PAN(Personal Area Network)에서 링크상태에 따른 동적 채널할당)

  • 곽동원;이승형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.844-851
    • /
    • 2004
  • Various types of error are caused due to many factors of various environment in air interface channel of wireless communications. In this case, the reliability of the channel is much lower than that of wired case. IEEE 802.15.3 high-rate WPAN, which operates in an ad hoc networking environment, is more susceptible to such errors. The problem has been investigated for wireless LANs, for example, as follows. If the queue size of a certain node is longer than that of other nodes, the node estimates that its channel state is bad and the resource of the node is decreased. However this method has a disadvantage that a central controller must always monitor the status. To avoid this disadvantage, in this paper, a new MAC protocol that the throughput of overall piconet is increased by LDS (Link-status Dependent Scheduling) is proposed.

Development of Evaluation Items for Self and Peer Assessment of Team Members in Cooperative Learning (협동학습에서 팀 구성원의 자기 및 동료평가를 위한 평가문항 개발)

  • Boo, Sung-Mi;Park, Chan-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.4
    • /
    • pp.1-10
    • /
    • 2003
  • There are various kinds of instructional models in the 7th national curriculum. Among them, cooperative learning is given to students in some schools. In cooperative learning, the items for assessing the team members are required in order to evaluate the individual activities for problem solving, and to know the way of objective thinking each student does. Web-based environment is good for cooperative learning. In this paper, as a previous research work of web-based cooperative learning, we propose new assessment items which are based on the outcome D belongs to the set of 11 student learning outcomes design attributed framework developed by ABET EC-2000 and the cognitive categories defined by Bloom's taxonomy. These assessment items consist of self and peer assessment. The self assessment items include the evidence of the students' thought and their own assessment. On the other hand, the peer assessment can give the students the opportunities to participate in their activities enthusiastically, to offer interactive individual feedbacks, and to develop potential through various experiences.

  • PDF

User′s Characteristics Which have Influence on the Avatar Acceptance (사용자 특성이 아바타 수용에 미치는 영향)

  • Lee, Seung Hyun;Choi, Hoon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.11a
    • /
    • pp.93-108
    • /
    • 2003
  • 최근 들어 신세대들은 온라인을 통해서 아바타를 활용하여 가상공간 속에서 자신을 표현하고 있는 추세이다. 아바타는 ‘분신’, ‘화신’을 의미하는 산스크리트어로 가상공간에서 사용자의 역할을 대신하는 애니메이션 캐릭터이다. 가상공간 속에서 오프라인 상에서 표현하지 못한 자신만의 캐릭터를 통해서 자신의 정체성을 시각적으로 표현하여 개인의 개성을 표출하고 있다. 이러한 아바타의 출현으로 인터넷에서의 자기표현 방식이 외향적인 형태로 변화하는데 이는 새로운 표현에 대한 사용자의 수용도에 따라서 여러 가지 형태로 나타나고 있다. 특히, 사용자가 새로운 개념을 수용하는데 있어서 그들이 잠재적으로 보유하고 있는 특성에 따라서 아바타의 표현이 다각적으로 연출되고 활용되어지고 있다. 이는 신세대들의 자기표현 방식이 다양하기 때문이다고 할 수 있겠다. 신세대들은 또한 새로운 정보통신 기술이 매체를 통해 보급될 경우 수용도가 다른 세대에 비해 빠르다. 이렇듯 아바타의 도입과 활용은 신세대의 자기표현의 상징적인 역할을 하고 있다. 현재, 웹과 핸드폰을 통해서 2D 기반의 아바타가 활용되고 있으며, 신기술이 지속적으로 개발되고 있다. 현재 개발되어지고 있는 3D 핸드폰 아바타의 수용도에 대한 관심도도 높아질 것으로 예상된다. 현재 아바타 개발과 활용에 대한 연구는 활발히 진행되고 있지만, 이러한 신세대들의 특성에 따른 아바타의 수용에 대한 연구는 아직 정립되지 못하고 있다. 아바타의 수용에 관한 이론은 심리적 특성 이론으로 자아 존중감, 유행 선도력, 소비가치 등이 있으며, 사용자 수용 이론으로 혁신 성향, 유흥 성향 등이 있다. 이를 기반으로, 본 연구에서는 신세대 대학생들의 특성에 따라서 아바타의 수용도에 미치는 영향을 모색하고자 한다. 이를 위해서 대학생들의 특성을 심리적 특성이론과 사용자 수용이론으로 구분하여 이 특성에 따라서 향후 개발될 3D 핸드폰 아바타의 수용도의 관계를 파악하고자 한다. 본 연구에 대한 자료 수집방법은 D대학교의 교양과목인 “사이버문화의 이해와 활용”을 수강하는 학생들을 대상으로 총 170부를 설문 조사하였으며, 수집된 설문지 중에서 불성실하게 응답한 설문지 6부를 제외한 총 164부를 유효한 설문으로 확보하였다. SPSSWIN 10.0 패키지를 이용하였으며, Cronbach's Alpha값을 통한 신뢰도 분석과 요인분석을 통한 타당성 분석을 하고, 연구변수로 선정한 각 요소들의 아바타 수용도에 미치는 영향력 정도를 파악하기 위해 회귀분석을 실시하였다. 그 결과 심리적 특성과 사용자 수용 특성은 아바타 수용도에 부분적으로 영향을 미친다는 것 결과가 나타났다.

  • PDF

A Study of Authentication Design for Youth (청소년을 위한 인증시스템의 설계에 관한 연구)

  • Hong, Ki-Cheon;Kim, Eun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.952-960
    • /
    • 2007
  • Most Websites perform login process for authentication. But simple features like ID and Password have no trust because most people worry about appropriation. So the youth can easily access illegal media sites using other's ID and Password. Therefore this paper examine features be adaptable to authentication system, and propose a design of authentication system using multiple features. A proposed authentication system has two categories, such as low-level and high-level method. Low-level method consists of grant of authentication number through mobile phone from server and certificate from authority. High-level method combines ID/Password and features of fingerprint, character, voice, face recognition systems. For this, this paper surveys six recognition systems such as fingerprint, face, iris, character, vein, voice recognition system. Among these, fingerprint, character, voice, face recognition systems can be easily implemented in personal computer with low cost accessories. Usage of multiple features can improve reliability of authentication.

  • PDF

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

Exploiting Spatial Reuse Opportunity with Power Control in loco parentis Tree Topology of Low-power and Wide-area Networks (대부모 트리 구조의 저 전력 광역 네트워크를 위한 전력 제어 기반의 공간 재사용 기회 향상 기법)

  • Byeon, Seunggyu;Kim, Jong Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.239-250
    • /
    • 2022
  • LoRa is a physical layer technology designed to secure highly reliable long-range communication with introducing loco parentis tree network and chirp spreading spectrum. Since since a leaf can send message to more than one parents simultaneously with a single transmission in a region, packet delivery ratio increases logarithmically as the number of gateways increases. The delivery ratio, however, dramatically collapses even under loco parentis tree topology due to the limitations of ALOHA-like primitive MAC, . The proposed method is intended to exploit SDMA approach to reuse frequency in an area. With the view, TxPower of each sender for each message in a concurrent transmission is elaborately controlled to survive the collision at different gateway. Thus, the gain from the capture effect improves the capacity of resource-hungry Low Power and Wide Area Networks.