• Title/Summary/Keyword: Design Attribute

Search Result 639, Processing Time 0.025 seconds

Factor Analytic Classification of Design Attributes of Shopping-Mall Sites under the View of Usability (인터넷 쇼핑몰 사이트 설계 속성들의 사용성 관점에서의 요인분석적 분류)

  • 고석하;김주성;경원현
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.4
    • /
    • pp.29-50
    • /
    • 2003
  • This research provide the basic information to enhance the user-orientedness of usability design guidelines for software products and an effective empirical guidance to classify design attributes of internet shopping mall sites. The results of analysis show that design attributes can be classified into the procedural attribute group, the shopping tool attribute group, the visual attribute group, linguistic attribute group, and others. The results show that shopping tool attribute group can be divided further into the search tool attribute group and purchase tool attribute group and that the visual attribute group can be divided further into the screen condition attribute group and the character legibility attribute group. The research reveals that when designers design software interfaces and features they should take the compound effect of a group of design attributes into consideration to enhance the usability of the system.

  • PDF

Risk identification, assessment and monitoring design of high cutting loess slope in heavy haul railway

  • Zhang, Qian;Gao, Yang;Zhang, Hai-xia;Xu, Fei;Li, Feng
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.1
    • /
    • pp.67-78
    • /
    • 2018
  • The stability of cutting slope influences the safety of railway operation, and how to identify the stability of the slope quickly and determine the rational monitoring plan is a pressing problem at present. In this study, the attribute recognition model of risk assessment for high cutting slope stability in the heavy haul railway is established based on attribute mathematics theory, followed by the consequent monitoring scheme design. Firstly, based on comprehensive analysis on the risk factors of heavy haul railway loess slope, collapsibility, tectonic feature, slope shape, rainfall, vegetation conditions, train speed are selected as the indexes of the risk assessment, and the grading criteria of each index is established. Meanwhile, the weights of the assessment indexes are determined by AHP judgment matrix. Secondly, The attribute measurement functions are given to compute attribute measurement of single index and synthetic attribute, and the attribute recognition model was used to assess the risk of a typical heavy haul railway loess slope, Finally, according to the risk assessment results, the monitoring content and method of this loess slope were determined to avoid geological disasters and ensure the security of the railway infrastructure. This attribute identification- risk assessment- monitoring design mode could provide an effective way for the risk assessment and control of heavy haul railway in the loess plateau.

Robust Design Methodology under Design Constraints (기술적 설계제약을 고려한 강건설계법)

  • Kim, Kyung-Mo
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.4
    • /
    • pp.52-60
    • /
    • 2007
  • A multi-attribute robust design methodology is presented. This method can be applied where there are various technical constraints in design variables, multiple potentially conflicting design attributes, and uncontrollable noise variables. Two forms of technical constraints, soft and hard constraints, are considered in robust design settings. Specifically, this work presents procedures for integrating two types of design constraints seamlessly on the multiple design attributes, which is achieved through a development of multi-attribute utility formulation. The effectiveness of the overall procedures is tested with the aid of an I-Beam design problem, and results of sensitivity analysis are discussed.

Optimal Designs for Attribute Control Charts

  • Chung, Sung-Hee;Park, Sung-Hyun;Park, Jun-Oh
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2003.10a
    • /
    • pp.97-103
    • /
    • 2003
  • Shewhart-type control charts have historically been used for attribute data, though they have ARL biased property and even are unable to detect the improvement of a process with some process parameters. So far most efforts have been made to improve the performance of attribute control charts in terms of faster detection of special causes without increasing the rates of false alarm. In this paper, control limits are proposed that yield an ARL (nearly) unbiased chart for attributes. Optimal design is also proposed for attribute control charts under a natural sense of criterion.

  • PDF

A Study on the Consumer Preferences and Choice Attributes of Purchasing Organic Instant Rice (유기농 즉석밥 구입 시 소비자 선호 및 선택 속성에 관한 연구)

  • Kim, Su-Hyeon;Baek, Seung-Woo
    • Korean Journal of Organic Agriculture
    • /
    • v.28 no.2
    • /
    • pp.189-208
    • /
    • 2020
  • The purpose of this study aims to estimate consumption selection attribute, part-worth of organic instant rice through the use of conjoint analysis method. The conjoint analysis is to trace the development of consumer preference among multi-attribute alternatives. The selection attribute was including 4 factors preferred Type of rice, Capacity, Brand and payment price. For this research, a total of 192 questionnaires was collected of which 200 were completed. The research design was a full profile method by orthogonal design then 9 main profiles, 3 holdout sets were created. The results of this research were as follows. Consumers of organic instant rice are consider their importance of selection attributes was in order to price (25.87%), Type of rice (27.231%), Brand/Purchase channel (24.013%) and Capacity (18.494%). The findings of this study have identified 3 clusters for each experience visitors. Each cluster has a different and showed the relative importance or preference values for each accessible attribute of the segmentation.

Interface design and implementation for Attribute Based $Modeling^{TM}$ surface design (Attribute Based $Modeling^{TM}$ surface 디자인을 위한 인터페이스 설계 및 구현)

  • Kim Jeong-Hwa;Park Hwa-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1315-1318
    • /
    • 2006
  • 모형 설계와 도형의 생성은 점, 곡선, 기울기과 같은 특정 속성들의 정보로 만들어 진다. 도형을 생성할 때 곡면 조각, 움직이는 곡선과 점, 일반적인 곡선, 연속 혹은 닫힌 곡선, 빠른 계산들은 중요하게 생각 되는 모델링 개념이다. 이 논문에서는 Attribute Based $Modeling^{TM}(A-B\;Modeling^{TM})$ surface을 사용하여 디자인을 디자인할 때 필요한 Multi-sided patch의 설계와 인터페이스를 구현하고자 한다.

  • PDF

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.