• Title/Summary/Keyword: 사용자 행위 인식

Search Result 120, Processing Time 0.026 seconds

Application of TAM and QFD for analyzing the user requirement in u-Healthcare System - Focused on fitness service (u-헬스케어 시스템에서 사용자 요구사항을 분석하기 위한 TAM과 QFD의 적용 - u-휘트니스 서비스 중심)

  • Kim, Min-Cheol
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.191-196
    • /
    • 2012
  • The importance of hi-tech communications technology including mobile or ubiquitous system and the related business field is currently expanding. In terms of wellness for enhancing quality of individual life, ICT technology became a requirement, not an option. The first purpose of this study is to identify factors that influence user's perceived usefulness & perceived ease of use related to the acceptance of TAM focused on ubiquitous fitness service through multiple regression analysis, thereby discovering important factors influencing consumer behavior. In conjunction with the result, the second purpose of this study has also its implication on the u-Healthcare system development using QFD. That is, this research is to propose the possibility of combining the external variables of TAM to u-Healthcare system service characteristics with user requirement reflected by using QFD method. Based on these results, the suitable system may be constructed and developed.

Examination of a Voice Interaction Model for Smart TV through Conversation Patterns (대화 패턴 연구를 통한 스마트TV 음성 상호작용 모델의 탐구)

  • Choi, Jinhae
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.96-104
    • /
    • 2017
  • As new smart devices are evolved into the intelligent agent who can reflect user intention and use context, user experience design for easy and convenient usability becomes a core competitive edge. Under the assumption that human centered natural interaction is necessary for the optimal smart TV experience, this study explores the types of voice interaction which are peculiar to TV watching context. In order to build a model for the users to naturally interact with Smart TV, conversation patterns were collected by requesting key features of Smart TV to intelligent agent. Collected sentences were applied to CfA model and classified by responses to activate features. The classified conversation patterns were divided into feature activation and information search. This study has identified that CfC1 occurred when voice interaction between Smart TV and users was vague and CfC2 occurred when the requests were complex or conditional. In conclusion, Simple Request Type is the most efficient model and voice interaction is more appropriate to use to clarify users' vague requests.

Location Based Concierge Service with Spatially Extended Topology for Moving Objects

  • Lee, Byoung-Jae
    • Spatial Information Research
    • /
    • v.17 no.4
    • /
    • pp.445-454
    • /
    • 2009
  • Beyond simple transfer of information through sensor network, this study will provide the insights about the way to embody the real context aware location based service in an ubiquitous computing environment. In this paper, a new formal approach is introduced to derive knowledge about the scope of influence for a point object. A scope of influence is defined as the conceptual area where there is a possibility of the phenomenon or event occurring because of this point object. A point object can be spatially extended by considering this scope of influence in conjunction with the point. These point objects are called Spatially Extended Point (SEP) objects. Compositions of gradual changes of topological relations between a SEP and the environment near the SEP show how to represent the qualitative spatial behaviors of a SEP objects. These qualitative spatial behaviors will be good standards for Location Based Service (LBS) to provide more subdivided and suitable information to the users.

  • PDF

Study on the Enviroment for Java Component Interaction (자바컴포넌트 상호작용을 위한 환경에 관한 연구)

  • 방영환;정천복;김혜미;황선명
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.424-426
    • /
    • 2000
  • 소프트웨어를 개발하는 방법으로 기존의 구조적 방법론에서 객체지향 방법론으로 발전하였고 최근 들어 소프트웨어 재사용의 핵심 기술로 인식되고 있는 것이 컴포넌트 소프트웨어기반 개발 방법론이다. 본 논문에서는 컴포넌트 소프트웨어, 컴포넌트 기반개발의 이점, 컴포넌트의 요건과 자바 컴포넌트(자바 클래스 또는 자바 컴포넌트)들 간의 기능, 속성, 연결 등을 동적으로 상호 작용(Interaction)할 수 있는 환경(Environment)을 제안하려 한다. 이오 같은 환경은 이미 만들어진 자바컴포넌트의 컴포넌트를 재사용 및 조립 전에 아키텍쳐의 모델링 도구로서 행위분석(Behavioral analysis)과 인터페이스의 기반설계(Interface Based Design)의 기반을 제공하고 자바 컴포넌트의 인터페이스와 기능을 이해하고 결합형태를 미리 짐작할 수 있는 환경을 제공함으로써 소프트웨어 개발에 소요되는 개발비용을 최소화하고 사용자의 요구를 충족시킬 수 있는 장점을 지니고 있다.

  • PDF

Effective Recommendation Method Adaptive to Multiple Contexts in Ubiquitous Environments (유비쿼터스 환경에서 다중 상황 적응적인 효과적인 권유 기법)

  • Kwon Joon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.5
    • /
    • pp.1-8
    • /
    • 2006
  • In ubiquitous environments, recommendation service based on multiple contexts is required. The total amount of information is larger due to the greater number of contexts in multiple context environments. This paper proposes a new effective recommendation method adaptive to multiple contexts in ubiquitous environments. A new method of recommendations in multiple context environments is suggested that uses user's preferences and behavior as a weighting factor. This paper describes the recommendation method, scenario and the experimental results. The results verify that the proposed method's recommendation performance is better than other existing method.

  • PDF

A Study of the Authentication of On-line Test Participants under e-Learning (e-Learning상에서 온라인 시험 응시자 인증에 관한 연구)

  • 조길익;곽덕훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.499-501
    • /
    • 2004
  • 교육의 새로운 방향은 가상 학교나 WBI와 같은 교육적 활용분야로 확대되고 있으나, e-Learning 상에서 이뤄지는 평가의 응시자에 대한 신뢰 확보는 어려운 상황이다. 기존의 인증이란 사용자가 E와 Password를 타인에게 공개하지 않는 한 본인임을 인증하였다. 하지만 온라인상에서 시험 응시자는 본인의 ID와 Password를 타인에게 알려주어 대리시험이 가능하게 함은 물론 시험문제의 공유 또는 다수의 응시자가 한 곳에 모여 문제를 풀어 감으로서 평가에 대한 신뢰도에 의문을 갖지 않을 수 없게 되었다. 이에 인터넷으로 원격조정이 가능한 PC카메라와 얼굴인식 프로그램 그리고 원격제어프로그램을 이용하여 응시자를 인증함으로써 부정행위를 원천적으로 봉쇄하고, 감독자가 언제 어디서나 웹을 통하여 쉽게 감독할 수 있도록 LMS 기능의 보완이 요구된다. 본 논문을 통해서는 채팅기능을 통한 상호 대화가 가능하고 응시 장면을 동영상으로 압축 저장하여 사후 감독이 가능토록 함으로서 e-Learning상에서의 평가 및 학사관리의 공정성 및 신뢰도를 높일 수 있는 방안을 제시하였다.

  • PDF

An Analysis on the Effect of the Korean Moral Values on Fondness for Game Users: Focusing on the Mediating Effect of Generation (한국의 도덕 가치관이 게이머 호감에 미치는 영향에 대한 분석: 세대의 매개효과를 중심으로)

  • Park, Hyun-Ah;Ryu, Seoung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.294-302
    • /
    • 2018
  • The regulation of the game industry by the Korean government is closely related to the specific regulatory behavior from their parents' generation regarding gaming behavior of their children. This is because there exists a gap in terms of digital culture experience between parents and children. This study examined the differences in how moral values affect the awareness or perceptions of the game users. In the results, the norm conformity was found to have a negative influence on the fondness for game users. Age was also shown to have a negative influence on the fondness for the game users. Based on these findings, we also found the mediating effect of age existed specifically with regard to the relation of norm conformity and the fondness for the game users. The results suggest that the game industry promotion policies of Korea should change their existing targets from focusing on everyone to just the elderly.

A Medical Staff Identification System by Using of Beacon, Iris Recognition and Blockchain (비콘과 홍채인식, 블록체인 기반의 의료진 신분확인 시스템 제안)

  • Lim, Se Jin;Kwon, Hyeok Dong;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • Recently, incidents such as proxy surgery (unlicensed medical practice) have been reported in the media that threaten the safety of patients. Alternatives such as the introduction of operating room surveillance camera devices to prevent proxy surgery are emerging, but there are practical difficulties in implementing them due to strong opposition from the medical community. However, the social credibility of doctors is falling as incidents such as proxy surgery occur frequently. In this paper, we propose a medical staff identification system combining Beacon and iris recognition. The system adds reliability by operating on the blockchain network. The system performs primary identification by performing user authentication through iris recognition and proves that the medical staff is in the operating room through beacons. It also ensures patient trust in the surgeon by receiving beacon signals in the background and performing iris authentication at random intervals to prevent medical staff from leaving the operating room after only performing initial certification.

An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication (실용적 뇌파 기반 사용자 인증을 위한 단일 채널 EEG 측정 장비를 통해 수집된 EEG 샘플의 점진적 제거 방법)

  • Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.383-395
    • /
    • 2017
  • Brainwave-based user authentication technology has advantages such as changeability, shoulder-surfing resistance, and etc. comparing with conventional biometric authentications, fingerprint recognition for instance which are widely used for smart phone and finance user authentication. Despite these advantages, brainwave-based authentication technology has not been used in practice because of the price for EEG (electroencephalography) collecting devices and inconvenience to use those devices. However, according to the development of simple and convenient EEG collecting devices which are portable and communicative by the recent advances in hardware technology, relevant researches have been actively performed. However, according to the experiment based on EEG samples collected by using a single-channel EEG measurement device which is the most simplified one, the authentication accuracy decreases as the number of channels to measure and collect EEG decreases. Therefore, in this paper, we analyze technical problems that need to be solved for practical use of brainwave-based use authentication and propose an incremental elimination method of collected EEG samples for each user to consist a set of EEG samples which are effective to authentication users.

Anti-Spam for VoIP based on Turing Test (튜링 테스트 기반으로 한 VoIP 스팸방지)

  • Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.261-265
    • /
    • 2008
  • As increasing the user of VoIP service using ITSP(Internet Telephony Service Provider), the VoIP spam becomes a big problem. The spam used in the existing public telephone is detected by using the pattern inspection of call behavior because it is difficult to filter contents for the characteristic of real-time voice communication. However there is a false-positive problem. The threat on spam remains where spam with low threshold can't be detected or users share one number. In this paper, we propose anti-spam for VoIP based on luring test. The proposed method gives a user luring test and he/she can connect to a receiver if passing turing test. A ticket is given to a user that pass luring test and it reduces overhead of luring test in re-dial. The proposed method is implemented on ASUS WL-500G wireless router and Asterisk IP-PBX. Experimental results show the effectiveness of the proposed method.