• Title/Summary/Keyword: Computer Usage

Search Result 1,234, Processing Time 0.025 seconds

A Study on the Effect of Delivery App Usage Properties of Food service Franchisee on the Satisfaction, Business Performance and Intention of Reusing

  • Song, Ji-Hyun;Jo, Gye-Beom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.305-313
    • /
    • 2020
  • In this paper, We Propose a ways how franchise service of delivery app should be made by analyzing the effect of delivery app usage properties of food service franchisee on satisfaction, business performance and intention of reusing, and suggest support plan of delivery app for franchise by food service franchisee. This study conducted survey on 212 franchises that have experience using delivery app among food service franchisees. To verify the hypothesis of the study, single regression and multiple regression analysis were conducted for verifying the relationship between variables. Key results of the study are as follows. First, it was found that the delivery app usage properties of food service franchisee had a positive relationship with satisfaction. Second, it was found that the delivery app usage properties of food service franchisee had positive relationship with business performance. Third, the satisfaction was found to affect business performance. Fourth, it was found that the satisfaction didn't affect the intention of reusing, and business performance was found to have a positive effect on the intention of reusing. It is necessary to increase the satisfaction of using of franchises through continuous management and reasonable pricing policies, and the headquarter of franchisee should be able to contribute to energetic sales of franchises through effective cooperation with delivery app companies.

A Research on Addictive Use of Smartphone by University Students (대학생의 스마트폰 중독적 사용 경험 연구)

  • Ko, Ki-Sook;Lee, Myoun-Jae;Kim, Young-Eun
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.501-516
    • /
    • 2012
  • The purpose of this study is to explore the fundamental nature and meanings of the experiences of university students with regard to their smartphone usage in order to prevent smartphone addiction and provide guidelines to develop effective interventions. Nine university students who were currently enrolled in an university located in a Korean province participated in this study. In-depth interviews were conducted from June of 2012 to July of 2012, and data were analyzed using Colaizzi's phenomenological qualitative method. As a results, five theme and 40 subthemes of experiences of problematic smartphone usage were identified. Those themes include 1) a desperate try to connect with others(exposing oneself without appropriate self-protection, seeking emotional comfort, hurt and mistrust); 2) excessive use of smartphone and loss of self-control(more smartphone usage over computer/over-immersion/excessive usage/habituation, loss of self-control); 3) psychological difficulties(excessive attachment and dependence, separation anxiety, clingingness, reduced patience) ; 4) threats to daily functioning (changes in priorities, regressed independent daily functioning, irregular daily patterns, health problems, interruptions from free messenger, academic difficulties); 5) potential for recovery(conflictual feelings and doubts over smartphone usage, importance of interpersonal(face-to-face) communications, willingness to cut down the use, hope for recovery). This study provided suggestions for the prevention effort against smartphone addiction.

CPU Usage Analysis According to the Task Group in Android Mobile (안드로이드 단말의 태스크 그룹에 따른 CPU 점유율 분석)

  • Kim, Myungsun;Lim, Jintaek;Park, Daedong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.9-12
    • /
    • 2013
  • 리눅스 기반 안드로이드 단말에서는 CFS(Completely Fair scheduler)가 사용되고 있다. 그리고 CFS는 태스크의 nice값 조절을 통해서 응용프로그램의 CPU 점유율을 제어할 수 있다. 하지만 안드로이드를 업그레이드할 때마다 수많은 태스크의 nice값을 적절하게 맞추는 일은 매우 어려운 일이다. 이러한 문제를 해결하기 위하여 안드로이드 단말은 리눅스의 cgroup(control group)을 사용하여 태스크들을 그룹으로 나눈다. 고성능과 빠른 응답 특성이 필요한 태스크들을 apps 그룹에 할당하여 높은 CPU 점유율을 보장하고, 그렇지 않은 태스크들을 background 그룹에 할당한다. 하지만 안드로이드의 버전이 업그레이드 되면서 각 그룹에 속한 태스크들에도 변화가 생긴다. 그 결과 동일하게 제작된 태스크들의 CPU 점유율이 달라지게 되고 예기치 못한 성능 저하가 발생할 수 있다. 본 연구에서는 안드로이드 버전 향상에 따라 동종 태스크들이 이전 버전에서보다 성능이 하락하는 현상의 원인을 파악하였다. 아울러 분석과 실험을 통하여 태스크의 nice 값보다 그룹 스케줄링 메커니즘이 어떻게 태스크의 CPU 점유율을 결정 짓는지 규명하였다.

  • PDF

Design and Implementation of a Framework for Automatically Generating Control and Monitoring Software

  • Yoo, Dae-Sung;Sim, Min-Suck;Park, Sung-Ghue;Kim, Jong-Hwan;Yi, Myeong-Jae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.932-935
    • /
    • 2004
  • In this paper, we present a framework that is easy to develop, modify, maintain and extend a control and monitoring software for any kinds of instruments. The presented framework is composed of three XML documents (IID, MAP, and CMIML) and two tools (Virtual Instrument Wizard, Generator). Interface information about behaviors and states of instruments is written on IID. Mapping information between the interface information in IID and API of a real instrument driver is written on MAP. Finally information about control and monitoring software is written on CMIML. IID, MAP and CMIML are written with XML format to provide common usage and platform independence of the suggested framework. VI Wizard generates CMIML (platform independent intermediate document) using IID and existing CMIML, and Generator generates source code of a control and monitoring software (platform dependent code) automatically using CMIML and MAP. The suggested framework that automatically generates control and monitoring software based on GUI provides easy development and maintenance. Also, reusability can be increased by reusing platform independent software description documents.

  • PDF

A Scheme of Access Network Management in Convergence Networks (융합망에서 액세스 네트워크 관리 방안)

  • Park, Sang-Joon;Lee, Jong-Chan;Shin, Sung-Yun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.93-99
    • /
    • 2012
  • The B3G networks that provide the internetworking techniques of heterogeneous network systems and services are constructed to support various service requirements of mobile users. In this paper, we represent the internetworking scheme of heterogeneous networks systems such like UMTS and WLAN which can be used as access networks, and illustrate the service providing of each network system and the internetworking service based on heterogeneous access networks. UMTS and WLAN can provide each proper service to mobile users, and is included to B3G networks to increase the service usage effectiveness by using complementary service for mobile users.

40nm InGaAs HEMT's with 65% Strained Channel Fabricated with Damage-Free $SiO_2/SiN_x$ Side-wall Gate Process

  • Kim, Dae-Hyun;Kim, Suk-Jin;Kim, Young-Ho;Kim, Sung-Wong;Seo, Kwang-Seok
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.3 no.1
    • /
    • pp.27-32
    • /
    • 2003
  • Highly reproducible side-wall process for the fabrication of the fine gate length as small as 40nm was developed. This process was utilized to fabricate 40nm InGaAs HEMTs with the 65% strained channel. With the usage of the dual $SiO_2$ and $SiN_x$ dielectric layers and the proper selection of the etching gas, the final gate length (Lg) was insensitive to the process conditions such as the dielectric over-etching time. From the microwave measurement up to 40GHz, extrapolated fT and fmax as high as 371 and 345 GHz were obtained, respectively. We believe that the developed side-wall process would be directly applicable to finer gate fabrication, if the initial line length is lessened below the l00nm range.

NEW RESULTS TO BDD TRUNCATION METHOD FOR EFFICIENT TOP EVENT PROBABILITY CALCULATION

  • Mo, Yuchang;Zhong, Farong;Zhao, Xiangfu;Yang, Quansheng;Cui, Gang
    • Nuclear Engineering and Technology
    • /
    • v.44 no.7
    • /
    • pp.755-766
    • /
    • 2012
  • A Binary Decision Diagram (BDD) is a graph-based data structure that calculates an exact top event probability (TEP). It has been a very difficult task to develop an efficient BDD algorithm that can solve a large problem since its memory consumption is very high. Recently, in order to solve a large reliability problem within limited computational resources, Jung presented an efficient method to maintain a small BDD size by a BDD truncation during a BDD calculation. In this paper, it is first identified that Jung's BDD truncation algorithm can be improved for a more practical use. Then, a more efficient truncation algorithm is proposed in this paper, which can generate truncated BDD with smaller size and approximate TEP with smaller truncation error. Empirical results showed this new algorithm uses slightly less running time and slightly more storage usage than Jung's algorithm. It was also found, that designing a truncation algorithm with ideal features for every possible fault tree is very difficult, if not impossible. The so-called ideal features of this paper would be that with the decrease of truncation limits, the size of truncated BDD converges to the size of exact BDD, but should never be larger than exact BDD.

Vulnerability Analysis Model for IoT Smart Home Camera

  • Aljahdali, Asia Othman;Alsaidi, Nawal;Alsafri, Maram
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.229-239
    • /
    • 2022
  • Today's Internet of Things (IoT) has had a dramatic increase in the use of various daily aspects. As a consequence, many homes adopt IoT technology to move towards the smart home. So, the home can be called smart when it has a range of smart devices that are united into one network, such as cameras, sensors, etc. While IoT smart home devices bring numerous benefits to human life, there are many security concerns associated with these devices. These security concerns, such as user privacy, can result in an insecure application. In this research, we focused on analyzing the vulnerabilities of IoT smart home cameras. This will be done by designing a new model that follows the STRIDE approach to identify these threats in order to afford an efficient and secure IoT device. Then, apply a number of test cases on a smart home camera in order to verify the usage of the proposed model. Lastly, we present a scheme for mitigation techniques to prevent any vulnerabilities that might occur in IoT devices.

Dynamism Competent LEACH Replication Deliberate for Wireless Sensor Network

  • KONDA HARI KRISHNA;TAPSI NAGPAL;Y. SURESH BABU
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.7-12
    • /
    • 2023
  • Remote sensor systems are utilized in a few applications, including military, restorative, ecological and family unit. In every one of these applications, vitality use is the deciding component in the execution of wireless sensor systems. Thusly, strategies for information steering and exchanging to the base station are critical in light of the fact that the sensor hubs keep running on battery control and the vitality accessible for sensors is constrained. There are two explanations for the various leveled directing Low Energy Adaptive Clustering Hierarchy convention be in investigated. One, the sensor systems are thick and a considerable measure of excess is engaged with correspondence. Second, with a specific end goal to build the versatility of the sensor arrange remembering the security parts of correspondence. In this exploration paper usage of LEACH steering convention utilizing NS2 test system lastly upgraded vitality productive EE-LEACH directing convention guarantees that the chose cluster heads will be consistently conveyed over the system with a specific end goal to enhance the execution of the LEACH convention. EE-LEACH enhances vitality utilization by around 43%.

Smartphone Usage Data Collection Application and Management Program for Big Data Analysis (빅데이터 분석을 위한 스마트폰 사용 데이터 수집 앱 및 관리 프로그램)

  • Jo, Seong-Min;Oh, Seung-Hyeon;Ahn, Ji-Woo;Lee, Myung-Suk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.225-228
    • /
    • 2021
  • 본 연구는 스마트폰 중독과 관련된 다양한 분석을 위한 스마트폰 사용 앱과 관리자 웹을 개발하고자 한다. 연구방법으로 이전 연구에서 중요한 변수로 작용되었던 '화면 켠 횟수', '실사용시간-인지사용시간' 변수를 분석할 있도록 적용하여 스마트폰 사용시간, 사용량, 사용 앱, 화면 잠금을 해제한 횟수 등 다양한 데이터 수집이 가능한 앱을 개발한다. 관리자 웹은 수집된 데이터를 저장, 분석할 수 있는 공간으로 사용할 것이다. 앱에서 수집된 데이터는 서버에 전송한 후, 시각화 분석 기능을 제공하는 관리 프로그램으로 개발하여 스마트폰 중독 연구에 사용한다. 향후 데이터 수집과 사용 목적에 동의한 사용자를 모집하여 데이터를 수집하고 스마트폰 사용 패턴, 데이터마이닝, 중독 등과 관련된 다양한 분석을 할 것이다. 이를 통해 보다 정확하고 효과적인 스마트폰 중독 진단이 가능해질 것과 나아가 스마트폰 중독 치료방안 연구에 기여할 것으로 기대한다.

  • PDF