• Title/Summary/Keyword: External User

Search Result 528, Processing Time 0.027 seconds

Extension of legacy gear design systems using XML and XSLT (XML과 XSLT를 이용한 레거시 기어 설계 시스템의 확장에 관한 연구)

  • 정태형;박승현
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.10a
    • /
    • pp.257-262
    • /
    • 2001
  • As computer-related technologies have been developed, legacy design systems have not been appropriate for new computing environment. Therefore, it is necessary that most of them are either modified or newly developed. However, this requires quite much amount of cost and time. This paper presents a method of extending legacy design system without modification using XML and XSLT. In order to apply the developed method, a good example of legacy design systems, AGMA gear rating system has been extended so as to be suitable for the distributed computing environment. An XML document for AGMA gear rating process is defined. It is transformed to the form of the input document of AGMA gear rating system by XSLT processor according to the transformation rules defined in the AGMA gear rating XSLT document. After that, AGMA gear rating system reads this input document and generates an output document in the server. These operations are automatically executed by the external legacy system controller without user interactions. Using these operations, AGMA gear rating web service has been developed based on SOAP and WSDL to provide the functions of legacy AGMA gear rating system through the distributed network. Any system or user can implement AGMA gear rating process independently to the platform type, without making it for oneself, by simply referring the AGMA gear rating web service via Internet.

  • PDF

A Study on the Customer Attitudes toward the Airport IT Service: Focusing on Handling Process and Acceptance Intention

  • PARK, Hye-Yoon
    • Journal of Distribution Science
    • /
    • v.18 no.1
    • /
    • pp.27-34
    • /
    • 2020
  • Purpose : In the aviation industry, we will investigate the impact of users' acceptance of technology on their usage behavior and find out the factors that affect their acceptance of technology. We will expand the prior study to find out the impact of the self-service technology of Incheon Airport. Research design, data and methodology : Within the last six months, the survey was conducted on people using self-service technology at Incheon International Airport from July to August 2019. Part 307 of the valid questionnaires were used for this final analysis. The collected data were used to perform frequency, factor, reliability, and multiple regression analyses using the SPSS statistical package. Results : Individual aspects of external variables, service aspects and system aspects have been shown to affect usefulness and perceived ease of use. Also, perceived ease-of-use and usefulness have effects on users' intention to accept technology. Conclusions : The perceived easement and perceived usefulness of Incheon International Airport has been shown to affect self-service users. Increasing the user's self-efficiency and increasing the user's expectations for benefits, convenience, rapid processing, and minimal effort will have a positive meaningful effect on the intention of accepting the technology.

Sensibility Ergonomics : Needs, Concepts, Methods and Applications (감성공학의 개념과 연구 및 응용 방법)

  • Lee, Gu-Hyeong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.17 no.1
    • /
    • pp.91-102
    • /
    • 1998
  • History of the Sensibility Ergonomics is explained. Concepts, definition, and research methods on the human sensibility are proposed for systematic applications of human sensibility studies to product and environment developments. Sensibility Ergonomics was born in socio-technological environments where consumers required aesthetic and satisfactory products in addition to useful and usable ones, and manufactures were trying to develop consumer-oriented, user-friendly products. Sensibility Ergonomics is defined as "multi-disciplinary and inter-disciplinary processes for developing products and environment as usable, comfortable and satisfactory with the information on human sensibility." Human sensibility is functionally defined as "feelings generated when perceived sensory and information stimuli are reflected from memory which has been accumulated through personal experiences." Human sensibility is affected by at least three factors: personal, social, and cultural. Consumers evaluate products in three aspects : functional, sensorial, and cultural sensibilities. Human sensibility is personal, dynamic, and ambiguous. It is generated reflectively and intuitively against external stimuli. No Physiological responses are accompanied, and one cannot control his/her sensibility. However, the sensibility affects the decision making or behavior of the person. To understand the human sensibility many inter-disciplinary methods should be used instead of one-variable approach. Micro-scopic studies such as Questionnaire, interview, behavioral analysis, and psychophysiological experiments can be performed. In addition, social and cultural studies are essential to understand an individual's sensibility. Results of sensibility studies can be applied to setup new interactions between human and machine through sensible(or affective) human-machine (computer) interfaces. Human-oriented and user-friendly products can be made with the information on human sensibility.

  • PDF

Design and Implementation of Finger Keyboard with Video Camera (비디오 카메라를 이용한 핑거 키보드의 설계 및 구현)

  • Hwang, Kitae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.157-163
    • /
    • 2016
  • This paper presents Finger Keyboard which detects the user's key types on a keyboard drawn on the paper using a video camera. The Finger Keyboard software was written in standard C/C++ language and thus easy to port to other computing environments. We installed a popular USB-type web camera on a Windows PC and implemented the Finger Keyboard as a Windows application which detects key typing and then injects the key code into the message queue of the Windows operating system. Also we implemented the Finger Keyboard on the Raspberry Pi 2 embedded computer with a dedicated camera and connected it to the Android device as an external keyboard through the Bluetooth. The result of experiments showed that the average ratio of recognition success is around 80% at the typing speed of 120 characters per minute.

Development of a Pneumatic Actuation System Real-Time Simulator Using a DSP Board and PC (DSP 카드 및 PC에 의한 공압구동장치의 실시간 모의시험기 개발)

  • Lee, Seong-Rae;Shin, Hyo-Pil
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.4
    • /
    • pp.320-326
    • /
    • 2000
  • The real-time simulator of a pneumatic actuation system that is composed of differential PWM signal generator, charge solenoid valve, discharge solenoid valve, actuator, load, and rotational potentiometer is developed using a DSP board and a PC. The simulator receives the control signals from the external controller through the A/D converter, updates the state and output variables of the Pneumatic actuation system responding to the input signals every sampling time, and sends out the output signals through the D/A converter in real time. The user can observe the displacements, velocities, pressures, and mass flows representing the operation of pneumatic actuation system through the PC monitor in real time. Also the user can see the moving images between the pistons and rotating arm realistically in real time. The accuracy of the real-time simulator is verified by the good agreement of the real-time simulation results and the experimental results of the pneumatic actuation system.

  • PDF

The Impacts of Technological Development upon the Locational Change in Manufacturing Industries: A Conceptual Framework. (기술변화가 산업입지에 미치는 영향연구 : '개념적 틀'을 중심으로)

  • 소수진
    • Journal of the Korean Regional Science Association
    • /
    • v.10 no.1
    • /
    • pp.19-37
    • /
    • 1994
  • The past studies on the change of industrial location can be reinterpreted as spatial determinism, decision making process determinism and industrial sturcure determinism according to the view of the mutual operation between the economic activity and spatial structure. From the point of the industrial structure determinism which focuses on the fact that the locational type of production activity can be differenciated by the structural change of industry itself, it is proper to explain the change of industrial location not only by spatial condition but also by containing the fundamental changing causes for the reorganization of the spatial condition. One of the most important changing causes for reorganizing economic space is industrial technology. This study aims to explain the spatialization process of industrial technology and consists of the process of suggesting the hypothesis that the spatialization process is differentiated according to the production organization as the user of industrial technology and the user of industrial technology and the production system as using method. In other words, this study attempts to internalize the technology variable, which has been treated as external in the past studies on the industrial location, as an independent one and consider the production organization and production system as a paramenter, so that it can represent 'conceptual framework' for explaining the change of industrial location.

  • PDF

Information Protection against The Hacker's Attack of Ubiquitous Home Networks (해커의 유비쿼터스 홈 네트워크 공격에 대한 정보보호 기술)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.145-154
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at this paper, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS. DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding against the Hacker's attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

Web-based XML Tree Builder for XML Service Program Development (XML 웹 서비스 프로그램 개발을 위한 웹 기반의 XML Tree 생성)

  • Park Young-Soo;Chang Duk-Chul
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.765-772
    • /
    • 2005
  • For the excellent U web services, the program developers should create both user's client program and the sewer program Recently, the structural alteration of programs are often caused by infernal and external environment concerned with social trends and preferences as well as user's requirements expectations. So, for reducing the development time and workload of XML web service programs, it is necessary to develop the web program generation tools. This paper suggest how to design and implement the web-based XML Tree builder, which was able to provide the information for promptly and easily generating the XML Schema, XML Stylesheet and XML Document through the XML Development Supporting Server System.

A Study on the Strategy of Resolving Impediments to Use of Digital Resources : The Case of Korean Public Libraries

  • Noh, Younghee;Wang, Dongho
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.3
    • /
    • pp.81-112
    • /
    • 2021
  • In this study, users' perceptions and concerns about digital information resources were investigated, focusing on impediments to the use of digital resources, to devise measures for improvement by identifying factors that hinder the use of digital information resources. To achieve the purpose of the study, the research identifies the inconvenien ce factors and establishes the user inconvenience list based on prior research and the current status survey. Based on the derived list, a survey was conducted on users of public libraries. Through this study, it was found that the use of digital information resources can be enhanced by improving the internal library system. Specifically, it refers to improving search performance and accessibility of digital data, providing one-stop services for digital information resources through the operation of an integrated data management system, conducting customized user education, and establishing a digital information resource preservation system, e.g. web archiving. Also, improving the external environment and system, such as contracting with more libraries for digitized data use agreements, strengthening support, unifying the names and classifications of digital information resources, and simplifying the procedure for using digital information resources, is of great importance.