• 제목/요약/키워드: Model following control systems

검색결과 217건 처리시간 0.025초

부산시(釜山市) 청소년(責少年)의 반주행위(飯酒行爲)에 관한 연구(硏究) - 사회심리적(社會心理的) Model에 의한 분석(分析) - (Adolescent Drinking Behaviors in Pusan City : An Analysis on the Sociopsychological Model)

  • 고정자
    • 아동학회지
    • /
    • 제7권2호
    • /
    • pp.55-73
    • /
    • 1986
  • This study analyzed the socio-psychological process of adolescent drinking behaviors. A total 1,732 high school students in Pusan city were studied by the questionnaire from May to July, 1985. A structural model based on review of the literature was examined in order to test the following three hypotheses: (1) sociocultural and environmental impact on the adolescent belief system for drinking, on drinking situations, and on experiences of deviation, (2) relationships among adolescent belief system, drinking situations, and experiences of deviation, and (3) impact of antecedent variables on adolescent drinking levels. All hypotheses were supported by the data. The important outcomes were discussed as follows: 1. Because interpersonal factors were influential for the adolescent belief system concerning drinking, public drinking education through mass communication or drinking education in the curriculum were recommended. In addition to sex variables, friends' drinking and sibling's drinking were shown to have a positive impacts on drinking situations. Also, adolescent self-reported parents' views on drinking had significant effects. Because adolescent deviant experiences were generally affected by environmental factors, it is recommended that positive extra-curricular activities at both home and school should be investigated. 2. There were significant relationships among adolescent belief systems, drinking situations, and deviant experiences. However, adolescent drinking behaviors in supervised situations had weak correlations with their belif systems and deviant behaviors. 3. Adolescent drinking levels were remarkably influenced by drinking behaviors in unsupervised situations. Because it is difficult to control actual adolescent drinking behaviors in unsupervised situations, it is important to fortify their belief system with continuous education programs.

  • PDF

C4I 시스템 사용의 영향 요인에 관한 연구: 구조모형의 매개변수의 관점에서 (A Study of Influencing Factors Upon Using C4I Systems: The Perspective of Mediating Variables in a Structured Model)

  • 김종만;김인재
    • Asia pacific journal of information systems
    • /
    • 제19권2호
    • /
    • pp.73-94
    • /
    • 2009
  • The general aspects for the future warfare shows that the concept of firepower and maneuver centric warfare has been replacing with that of information and knowledge centric warfare. Thus, some developed countries are now trying to establish the information systems to perform intelligent warfare and innovate defense operations. The C4I(Command, Control, Communication, Computers and Intelligence for the Warrior) systems make it possible to do modern and systematic war operations. The basic idea of this study is to investigate how TAM(Technology Acceptance Model) can explain the acceptance behavior in military organizations. Because TAM is inadequate in explaining the acceptance processes forcomplex technologies and strict organizations, a revised research model based upon TAM was developed in order to assess the usage of the C4I system. The purpose of this study is to investigate factors affecting the usage of C4I in the Korean Army. The research model, based upon TAM, was extended through a belief construct such as self-efficacy as one of mediating variables. The self-efficacy has been used as a mediating variable for technology acceptance, and the variable was included in the research model. The external variables were selected on the basis of previous research. The external variables can be classified into following: 1) technological, 2) organizational, and 3) environmental factors on the basis of TOE(Technology-Organization-Environment) framework. The technological factor includes the information quality and the task-technology fitness. The organizational factor includes the influence of senior colleagues. The environmental factor includes the education/train data. The external variables are considered very important for explaining the behavior patterns of information technology or systems. A structured questionnaire was developed and administrated to those who were using the C4I system. Total 329 data were used for statistical data analyses. A confirmatory factor analysis and structured equation model were used as main statistical methods. Model fitness Indexes for measurement and structured models were verified before all 18 hypotheses were tested. This study shows that the perceived usefulness and the self-efficacy played their roles more than the perceived ease of use did in TAM. In military organizations, the perceived usefulness showed its mediating effects between external variables and dependent variable, but the perceived ease of use did not. These results imply that the perceived usefulness can explain the acceptance processes better than the perceived ease of use in the army. The self-efficacy was also used as one of the three mediating variables, and showed its mediating effects in explaining the acceptance processes. Such results also show that the self-efficacy can be selected as one possible belief construct in TAM. The perceived usefulness was influenced by such factors as senior colleagues, the information quality, and the task-technology fitness. The self-efficacy was affected by education/train and task-technology fitness. The actual usage of C4I was influenced not by the perceived ease of use but by the perceived usefulness and selfefficacy. This study suggests the followings: (1) An extended TAM can be applied to such strict organizations as the army; (2) Three mediation variables are included in the research model and tested at real situations; and (3) Several other implications are discussed.

인터넷에서의 디지털 음악 저작권 침해 행동에 관한 연구 (The Behavioral Model of Digital Music Piracy on the Web)

  • 한정희;장활식
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제16권1호
    • /
    • pp.135-158
    • /
    • 2007
  • The purpose of this research is to identify multidimensional motivation factors that determine the piracy of copyrighted digital music. The model is based on TPB(theory of planned behavior) as well as other models in consumer behavior. An empirical study resulted in the following findings. first Both individual's attitude toward music piracy and individual's perceived behavior control have positive impacts on the individual's behavioral intention of piracy. It turned out that perceived behavior control has a stronger impact on behavioral intention than attitude does. Second, the level of individual's moral judgment has negative impacts on both the attitude and behavioral intention toward music piracy. Third, individual's experience in music piracy positively affects the attitude, but does not directly or indirectly affect the behavior intention. Fourth, an economic gain from music piracy is not a significant factor in determining both attitude and behavioral intention. Fifth, the risk of being prosecuted for music piracy is a major factor in determining one's attitude, although the risk is not significant enough to change one's behavioral intention. This research found that individuals' intention to pirate digital music is mainly affected by the moral and ethical standards of the individuals and by the extra resources and abilities they possess. Such factors as economic gain and law enforcement were not significant enough to alter one's behavioral intention. This research is significant in that it established a behavioral model to understand the piracy of copyrighted digital music and that it empirically tested the model with Internet users in Korea. This is one of the first empirical studies in Korea to touch such ethically and perhaps politically sensitive issues as online music piracy.

  • PDF

정교화 가능성 모형에 의한 IT 피교육자 신용 믿음 변화의 종단분석 (An Longitudinal Analysis of Changing Beliefs on the Use in IT Educatee by Elaboration Likelihood Model)

  • 이웅규
    • Asia pacific journal of information systems
    • /
    • 제18권3호
    • /
    • pp.147-165
    • /
    • 2008
  • IT education can be summarized as persuading the educatee to accept IT. The persuasion is made by delivering the messages for how-to-use and where-to-use to the educatee, which leads formulation of a belief structure for using IT. Therefore, message based persuasion theory, as well as IT acceptance theories such as technology acceptance model(TAM), would play a very important role for explaining IT education. According to elaboration likelihood model(ELM) that has been considered as one of the most influential persuasion theories, people change attitude or perception by two routes, central route and peripheral route. In central route, people would think critically about issue-related arguments in an informational message. In peripheral route, subjects rely on cues regarding the target behavior with less cognitive efforts. Moreover, such persuasion process is not a one-shot program but continuous repetition with feedbacks, which leads to changing a belief structure for using IT. An educatee would get more knowledge and experiences of using IT as following an education program, and be more dependent on a central route than a peripheral route. Such change would reformulate a belief structure which is different from the intial one. The objectives of this study are the following two: First, an identification of the relationship between ELM and belief structures for using IT. Especially, we analyze the effects of message interpretation through both of central and peripheral routes on perceived usefulness which is an important explaining variable in TAM and perceived use control which have perceived ease of use and perceived controllability as sub-dimensions. Second, a longitudinal analysis of the above effects. In other words, change of the relationship between interpretation of message delivered by IT education and beliefs of IT using is analyzed longitudinally. For achievement of our objectives, we suggest a research model, which is constructed as three-layered. While first layer has a dependent variable, use intention, second one has perceived usefulness and perceived use control that has two sub-concepts, perceived ease of use and perceived controllability. Finally, third one is related with two routes in ELM, source credibility and argument quality which are operationalization of peripheral route and central route respectively. By these variables, we suggest five hypotheses. In addition to relationship among variables, we suggest two additional hypotheses, moderation effects of time in the relationships between perceived usefulness and two routes. That is, source credibility's influence on perceived usefulness is decreased as time flows, and argument quality's influence is increased. For validation of it, our research model is tested empirically. With measurements which have been validated in the other studies, we survey students in an Excel class two times for longitudinal analysis. Data Analysis is done by partial least square(PLS), which is known as an appropriate approach for multi-group comparison analysis with a small sized sample as like this study. In result. all hypotheses are statistically supported. One of theoretical contributions in this study is an analysis of IT education based on ELM and TAM which are considered as important theories in psychology and IS theories respectively. A longitudinal analysis by comparison between two surveys based on PLS is also considered as a methodological contribution. In practice, finding the importance of peripheral route in early stage of IT education should be notable.

이산형 적응관측자 및 제어기의 새로운 구성 (A new scheme for discrete implicit adaptive observer and controller)

  • 고명삼;허욱열
    • 전기의세계
    • /
    • 제30권12호
    • /
    • pp.822-831
    • /
    • 1981
  • Many different schemes of the adaptive observer and controller have been developed for both continuous and discrete systems. In this paper we have presented a new scheme of the reduced order adaptive observer for the single input discrete linear time invariant plant. The output equation of the plant, is transformed into the bilinear form in terms of system parameters and the states of the state variable filters. Using the plant output equation the discrete implicit adaptive observer based on the similar philosophy to Nuyan and Carroll is derived and the parameter adaptation algorithm is derived based on the exponentially weighted least square method. The adaptive model following control system is also constructed according to the proposed observer scheme. The proposed observer and controller are rather than simple structure and have a fast adaptive algorithm, so it may be expected that the scheme is suitable to the practical application of control system design. The effectiveness of the algorithm and structure is illustrated by the computer simulation of a third order system. The simulation results show that the convergence speed is proportinal to the increasing of weighting factor alpha, and that the full order and reduced order observer have similar convergence characteristics.

  • PDF

PC를 이용한 NC제어장치의 개발 (Development of NC controller using personal computer)

  • 김일환;강용근;정광조
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1989년도 한국자동제어학술회의논문집; Seoul, Korea; 27-28 Oct. 1989
    • /
    • pp.308-312
    • /
    • 1989
  • We developed a model of NC controller with IBM-PC as a host cpu and integlligent NC servo controller for 2 axes that can be expaned to 4 axes. Basic conceptions, including hardware structure design, servo controller design, communication protocol, and interpolation hardware design was already publicated on '87 KIEE conference. Following this, we focussed on the emulation of tyhe controller with X-Y table as complete NC machine experimenting some drawings made by NC code program that can be edited and executed in automatic on single step mode. In addition we designed the M.S.T functions with PLC and tested for M-function timing. Finally, we designed NC interface to fit with M-function output and we contructed total system of NC controller with IBM PC host with the result of successful development of new NC model.

  • PDF

Simulation on Hydraulic Control Characteristics of Regulator System in Bent-Axis Type Piston Pump

  • Kim, Jong Ki;Oh, Seok Hyung;Jung, Jae Youn
    • KSTLE International Journal
    • /
    • 제1권2호
    • /
    • pp.101-106
    • /
    • 2000
  • Variable displacement axial piston pumps are widely used for raising the energy level of the fluid in hydraulic systems. And the regulator is the device which regulates the discharge flow of the piston pump by controlling the swivel angle. The regulator receives the hydraulic pilot pressure and controls the pump output flow depending on the machine load and engine speed. This work deals with constant power control (horsepower control) in the design of a regulator by using a bent-axis type piston pump. In order to effectively use engine power, we must keep the horsepower from the engine to the pump constant. Therefore the regulator operates the constant power control. As a result, optimum power usage is obtained by accurately following the power hyperbola. This study focused on developing a simulation model of a regulator. First, the governing equations of the regulator are derived, and analysis is performed by computer simulation, which can identify significant parameters of regulator. As a result, the variation of the swivel angle, flow rate, hyperbolic curve, inner leakage and responsibility are simulated, and significant parameters of a regulator are identified.

  • PDF

CDMA 및 OFDM 기반 무선측위의 다중경로오차 특성 비교분석 (A Comparison of the Multipath Error Property In Wireless Location of CDMA and OFDM)

  • 방혜정;이장규;지규인;김진원;정희;현문필
    • 제어로봇시스템학회논문지
    • /
    • 제12권10호
    • /
    • pp.989-995
    • /
    • 2006
  • This paper shows that the OFDM(Orthogonal Frequency Division Multiplex) system is robust to multipath than CDMA (Code Division Multiple Access) system and it has a strong possibility to be utilized as a supplementing wireless location system for the forthcoming portable internet network. The OFDM system based on IEEE 802.16e is a wireless TDD (Time Division Duplex) OFDMA (Orthogonal Frequency Division Multiple Access) system providing portable internet services in 2.3 GHz frequency band and is scheduled in service in Korea starting in 2006. In this paper, multipath error is calculated using a two-ray model and compared with that of a CDMA system which is following IS-95. The OFDM system shows a maximum multipath error of 3 m while a CDMA system shows a maximum multipath error of 61 m. For this simulation, an early-late technique is used. This technique is usually used to match synchronization of signal in DLL(Delay Lock Loop).

TPB, TIB 및 중화기술의 통합적 모형에 의한 디지털 영상물 불법복제 의도에 관한 연구 (A Study on Intention to Pirate Digital Video by an Integrated Model of TPB, TIB, and Neutralization)

  • 노경수;심완준;신호균
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제23권4호
    • /
    • pp.197-219
    • /
    • 2014
  • Despite of continuous efforts to crack down on piracy using penalties and regulations, this unauthorized piracy market is still enormous. Since the moral hazard about this phenomenon is pervasive and continually upsets the major intellectual property markets, an alternative plan is required. The purpose of this study is to provide an objective insight for factors that affect people's digital video piracy behavior. The following two research propositions were the focus: what psychological factors affect piracy behavior and how are these factors related to one another? In order to accomplish the research aims, we reviewed literatures on the current state of piracy in South Korea, characteristics of digital contents, studies on criminal psychology and behavioral theories. Previous research in the fields of criminal theory indicated that neutralization, a form of rationalization, would help explain digital piracy intentions. Thus, this study developed a model that explains effects of neutralization techniques and tested the possibility of an integrated model with other behavioral theory such as TPB and TIB. Empirical results of the study(368 sample collected) showed that all the factors in TPB including Attitude to Piracy(+), Subjective Norm(-), Perceived Behavioral Control(+) had a significant impact on Piracy Intention. Moreover, two neutralization techniques, Condemn the Condemners(+) and Appeal to Higher Loyalties(+), had a significant effect on Piracy Intention. In addition, Past Behavior had strong impacts on Attitude(+), Perceived Behavioral Control(+) and Piracy Intention(+). In terms of Expected Profit, it had an impact on Attitude to Piracy positively. These findings suggest implications for protecting the current intellectual property markets, with many stakeholders in movies and media industries. There are some limitations as followed: first, the study did not consider other neutralization techniques, low level of deterrence and the other expected results despite the possibility of their effects. Second, the study needs improvements through longitudinal research because the cross-sectional research could not rule out the alternative explanations.

Development of a Control System for Automated Line Heating Process by an Object-Oriented Approach

  • Shin, Jong-Gye;Ryu, Cheol-Ho;Choe, Sung-Won
    • Journal of Ship and Ocean Technology
    • /
    • 제6권4호
    • /
    • pp.1-12
    • /
    • 2002
  • A control system for an automated line heating process is developed by use of object-oriented methodology. The main function of the control system is to provide real-time heating information to technicians or automated machines. The information includes heating location, torch speed, heating order, and others. The system development is achieved by following the five steps in the object-oriented procedure. First, requirements are specified and corresponding objects are determined. Then, the analysis, design, and implementation of the proposed system are sequentially carried out. The system consists of six subsystems, or modules. These are (1) the inference module with an artificial neural network algorithm, (2) the analysis module with the Finite Element Method and kinematics analysis, (3) the data access module to store and retrieve the forming information, (4) the communication module, (5) the display module, and (6) the measurement module. The system is useful, irrespective of the heating sources, i.e. flame/gas, laser, or high frequency induction heating. A newly developed automated line heating machine is connected to the proposed system. Experiments and discussions follow.