• Title/Summary/Keyword: Potential User Needs

Search Result 86, Processing Time 0.026 seconds

HetNet Characteristics and Models in 5G Networks

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.27-32
    • /
    • 2022
  • The fifth generation (5G) mobile communication technology is designed to meet all communication needs. Heterogeneous networks (HetNets) are a new emerging network structure. HetNets have greater potential for radio resource reuse and better service quality than homogeneous networks since they can evolve small cells into macrocells. Effective resource allocation techniques reduce inter-user interference while optimizing the utilization of limited spectrum resources in HetNets. This article discusses resource allocation in 5G HetNets. This paper explains HetNets and how they work. Typical cell types in HetNets are summarized. Also, HetNets models are explained in the third section. The fourth component addresses radio resource control and mobility management. Moreover, future study in this subject may benefit from this article's significant insights on how HetNets function.

Problems in defining public library users as viewed through the 'book-room' phenomenon in Pusan (도서원현상을 통해 본 공공도서관 이용자에 대한 인식의 문제)

  • 김영기
    • Journal of Korean Library and Information Science Society
    • /
    • v.19
    • /
    • pp.145-209
    • /
    • 1992
  • This study, that is made by an on-the-spot survey and a library survey, is aimed at finding some problems in the recognition regarding public library users and suggesting the clue to solve the problems revealed in the way of having compared with 'Book-Room' and Public Library. Poor material was always a troublemaker in this study. Especially the part of 'Book-Room' phenomenon is wholly dependent upon a field survey, that is, interview with a 'book-room' clerks, gathering the advertising leaflets, a close observation on 'Book-Room', etc. There are little printed materials, much less precedent research theses. In the other parts of this paper, there are needed good statistical materials, but the nortion presented in the public library user statistics-for example pupil, students, housewives, old men, the generality of people, etc.- is so vague that it is insufficient and unhelpful for this study. In my judgment, with all these limitations, this article gets some results as follows : 1. 'Book-Room' is the cultural organization which is being operated by, for, of the community inhabitants and it takes on the character of movement - labor movement, cultural movement, and community movement. 2. The pioneer of the Book-Room is 'Yangso Hyupdong chohap' (which means good book- cooperative association) lasted from 1978 to the next year. 3. 'Arom'(means learning) Book-Room is the first real Book-Room at Seomyon district in Pusan established in 1987. 4. Book-Room can be classified by its character as 'Labor BookRoom' and 'Cultural Book-Room'. There are 10 Labor BookRooms and 4 Cultural Book-Rooms in Pusan. 5. Labor Book-Rooms organized themselves to 'Labor Book-Room conference'. 6. Book-Rooms have done their best to extort the needs and interests of the community inhabitants, but relatively public libraries do not, hence the majority of residents are neglected from the public library service. This is at Book-Rooms' back to have been spread so quickly. 7. There is a very large gap between the component ratio of community inhabitants by class and that of public library users by same criterion, that is, in the case of the former, the labor class goes beyond a half point, in the latter, the majority of public library user is composed of students and housewives. 8. Researchers and librarians have concentrated their attention and effort not upon whole residents in community but upon existing users at present time. They do not try to develope potential users. So, researchers' and librarians' recognition regarding the public library users needs to be changed. 9. The concept of 'core-user' may be the key to solve the problems related with public library users. For the purpose of ensuring the 'core-user', it is necessary to study the community and inhabitants.

  • PDF

User Centered Interface Design of Web-based Attention Testing Tools: Inhibition of Return(IOR) and Graphic UI (웹 기반 주의력 검사의 사용자 인터페이스 설계: 회귀억제 과제와 그래픽 UI를 중심으로)

  • Kwahk, Ji-Eun;Kwak, Ho-Wan
    • Korean Journal of Cognitive Science
    • /
    • v.19 no.4
    • /
    • pp.331-367
    • /
    • 2008
  • This study aims to validate a web-based neuropsychological testing tool developed by Kwak(2007) and to suggest solutions to potential problems that can deteriorate its validity. When it targets a wider range of subjects, a web-based neuropsychological testing tool is challenged by high drop-out rates, lack of motivation, lack of interactivity with the experimenter, fear of computer, etc. As a possible solution to these threats, this study aims to redesign the user interface of a web-based attention testing tool through three phases of study. In Study 1, an extensive analysis of Kwak's(2007) attention testing tool was conducted to identify potential usability problems. The Heuristic Walkthrough(HW) method was used by three usability experts to review various design features. As a result, many problems were found throughout the tool. The findings concluded that the design of instructions, user information survey forms, task screen, results screen, etc. did not conform to the needs of users and their tasks. In Study 2, 11 guidelines for the design of web-based attention testing tools were established based on the findings from Study 1. The guidelines were used to optimize the design and organization of the tool so that it fits to the user and task needs. The resulting new design alternative was then implemented as a working prototype using the JAVA programming language. In Study 3, a comparative study was conducted to demonstrate the excellence of the new design of attention testing tool(named graphic style tool) over the existing design(named text style tool). A total of 60 subjects participated in user testing sessions where their error frequency, error patterns, and subjective satisfaction were measured through performance observation and questionnaires. Through the task performance measurement, a number of user errors in various types were observed in the existing text style tool. The questionnaire results were also in support of the new graphic style tool, users rated the new graphic style tool higher than the existing text style tool in terms of overall satisfaction, screen design, terms and system information, ease of learning, and system performance.

  • PDF

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

A Study of Digital Library Service Records and User Privacy (디지털도서관서비스기록과 이용자프라이버시에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.187-214
    • /
    • 2012
  • Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users' privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users' privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies' enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

An Adaptive Learning System based on Learner's Behavior Preferences (학습자 행위 선호도에 기반한 적응적 학습 시스템)

  • Kim, Yong-Se;Cha, Hyun-Jin;Park, Seon-Hee;Cho, Yun-Jung;Yoon, Tae-Bok;Jung, Young-Mo;Lee, Jee-Hyong
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.519-525
    • /
    • 2006
  • Advances in information and telecommunication technology increasingly reveal the potential of computer supported education. However, most computer supported learning systems until recently did not pay much attention to different characteristics of individual learners. Intelligent learning environments adaptive to learner's preferences and tasks are desired. Each learner has different preferences and needs, so it is very crucial to provide the different styles of learners with different learning environments that are more preferred and more efficient to them. This paper reports a study of the intelligent learning environment where the learner's preferences are diagnosed using learner models, and then user interfaces are customized in an adaptive manner to accommodate the preferences. In this research, the learning user interfaces were designed based on a learning-style model by Felder & Silverman, so that different learner preferences are revealed through user interactions with the system. Then, a learning style modeling is done from learner behavior patterns using Decision Tree and Neural Network approaches. In this way, an intelligent learning system adaptive to learning styles can be built. Further research efforts are being made to accommodate various other kinds of learner characteristics such as emotion and motivation as well as learning mastery in providing adaptive learning support.

  • PDF

The Present and Future of Avata Fashion Market - The Strategic of Avata Fashion Marketing- (아바타 패션시장의 현재와 미래 -아바타 시장 패션 마케팅의 전략적 접근-)

  • 송영주
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.5 no.1
    • /
    • pp.47-57
    • /
    • 2003
  • Today there are increasing number of internet users. Internet is wide use of banking, shopping, school and studding. Also, internet is used in everyday living and its use is getting larger. Korea has the one of the most use of internet in the world. Most of houses have computer with internet, and there are alot of PC rooms in the streets. anyone can enjoy the internet anytime anywhere. Now, in internet there are group formed by community purpose. The 'dot com' companies was not making much of profit from their goods. However, they came out with an idea "avata" Soon, the avata became a hit and its known for its success. Avata is used for E-mail, name card, post stamp, and chatting. Also, Avata is very popular among chatting service, icon chatting, and 3D graphic chatting. Avata represent the user himself in internet and computer created imaginary space, and it connects between imaginary space and reality, also it exist between real name and nick name. Past years, the internet users were satisfied with their nick name, however resent year users wants to express them more. For the result the "Avata" is created to fulfill the need to express user themselves. There are three different ways to see how Korean react to fashion industry. first, Korea's land structure makes the density of population high, the transmission of information is very fast. Next, collectively is high among Koreans. Finally wide use to internet made the transmission of the fashion information much faster. The User wants to keep up with the fashion at the sametime they want to express themselves, and "avata" is the one that fulfill their needs. New technology and the desire to express themselves made the new term "avata industry". which was never existed before. In addition, the internet markets have potential power. Although, it is in start stage of avata industry. However, the experts say that its possibility of its development is not predictable. In conclusion, watch the development of a situation to analyze the avata industry and develop new avata fashion market.

  • PDF

Active Rule System Based on User's Emotional Margin for Power Saving Control (절전제어를 위한 사용자 감성마진 적용 능동규칙시스템)

  • Lee, Yonsik;Jang, Minseok;Kang, Sunkyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.119-124
    • /
    • 2014
  • In this paper, we propose the active rule system applying with emotional margin for power saving control. The proposed system in this paper is a part of the system which derives smart power saving by adjusting the illuminance using active rules within compromising the user's emotion. For this, we set the specific range of standard illuminance and the lower bound of user's emotional margin of illuminance based on measurements and analysis, and use these data in design of active rules. And then, we design and implement the active rule system using mobile agent. The mobile agent in the proposed system migrates to the destination sensor nodes, acquires and transmits sensor data according to the purpose and needs through the active rules, and directly executes the actions corresponding to the optional events(changed sensor data and/or time etc.). And then, we show the potential applicability of the proposed active rule system in various active sensor network applications through the interaction with the rule base and mobile sensor network middleware system.

Predicting IT-based Robot Adoption in Korea: By Integrating TAM and EDT (IT기반 로봇의 수용에 관한 연구: TAM과 EDT 모형의 통합관점)

  • Kim, Yoo-Jung;Lee, Hyung-Seok;Yoon, Jong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.237-245
    • /
    • 2010
  • Korea Communications Commission (KCC) has been providing the pilot service of URC(Ubiquitous Robot Companion), which is a network-based personal robot, to 1000 Korean households since 2006 to define potential users' needs and adoption behaviors. Personal innovativeness might play a critical role in adoption of URC services by users because much sophisticated and convergence technologies are incorporated into URC services. Also, defining not only perceived beliefs about URC services but also expected beliefs about them are very crucial to reduce disconfirmation between users' perception and expectation of URC services. From this point of view, this paper aimed to examine robot users' adoption behavior by considering constructs such as personal innovativeness, usefulness (perceived usefulness - expected usefulness, P-E), user attitude, and intention to use. The findings reveal that personal innovativeness is negatively related to usefulness (P-E) whereas usefulness (P-E) influences significantly and positively on user attitude. It is also shown that usefulness (P-E) and user attitude have strong positive effects on intention to use.

Quality Dimensions Affecting the Effectiveness of a Semantic-Web Search Engine (검색 효과성에 영향을 미치는 시맨틱웹 검색시스템 품질요인에 관한 연구)

  • Han, Dong-Il;Hong, Il-Yoo
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.1-31
    • /
    • 2009
  • This paper empirically examines factors that potentially influence the success of a Web-based semantic search engine. A research model has been proposed that shows the impact of quality-related factors upon the effectiveness of a semantic search engine, based on DeLone and McLean's(2003) information systems success model. An empirical study has been conducted to test hypotheses formulated around the research model, and statistical methods were applied to analyze gathered data and draw conclusions. Implications for academics and practitioners are offered based on the findings of the study. The proposed model includes three quality dimensions of a Web-based semantic search engine-namely, information quality, system quality and service quality. These three dimensions each have measures designed to collectively assess the respective dimension. The model is intended to examine the relationship between measures of these quality dimensions and measures of two dependent constructs, including individuals' net benefit and user satisfaction. Individuals' net benefit was measured by the extent to which the user's information needs were adequately met, whereas user satisfaction was measured by a combination of the perceived satisfaction with search results and the perceived satisfaction with the overall system. A total of 23 hypotheses have been formulated around the model, and a questionnaire survey has been conducted using a functional semantic search website created by KT and Hakia, so as to collect data to validate the model. Copies of a questionnaire form were handed out in person to 160 research associates and employees working in the area of designing and developing semantic search engines. Those who received the form, 148 respondents returned valid responses. The survey form asked respondents to use the given website to answer questions concerning the system. The results of the empirical study have indicated that, of the three quality dimensions, information quality was found to have the strongest association with the effectiveness of a Web-based semantic search engine. This finding is consistent with the observation in the literature that the aspects of the information quality should serve as a basis for evaluating the search outcomes from a semantic search engine. Measures under the information quality dimension that have a positive effect on informational gratification and user satisfaction were found to be recall and currency. Under the system quality dimension, response time and interactivity, were positively related to informational gratification. On the other hand, only one measure under the service quality dimension, reliability was found to have a positive relationship with user satisfaction. The results were based on the seven hypotheses that have been accepted. One may wonder why 15 out of the 23 hypotheses have been rejected and question the theoretical soundness of the model. However, the correlations between independent variables and dependent variables came out to be fairly high. This suggests that the structural equation model yielded results inconsistent with those of coefficient analysis, because the structural equation model intends to examine the relationship among independent variables as well as the relationship between independent variables and dependent variables. The findings offer some useful implications for owners of a semantic search engine, as far as the design and maintenance of the website is concerned. First, the system should be designed to respond to the user's query as fast as possible. Also it should be designed to support the search process by recommending, revising, and choosing a search query, so as to maximize users' interactions with the system. Second, the system should present search results with maximum recall and currency to effectively meet the users' expectations. Third, it should be capable of providing online services in a reliable and trustworthy manner. Finally, effective increase in user satisfaction requires the improvement of quality factors associated with a semantic search engine, which would in turn help increase the informational gratification for users. The proposed model can serve as a useful framework for measuring the success of a Web-based semantic search engine. Applying the search engine success framework to the measurement of search engine effectiveness has the potential to provide an outline of what areas of a semantic search engine needs improvement, in order to better meet information needs of users. Further research will be needed to make this idea a reality.