• Title/Summary/Keyword: Social Computing

Search Result 486, Processing Time 0.026 seconds

A Study on Ubiquitous Environment and Furniture Design - Focus on Elements of Interior Design Trends -

  • Kim, Jong-Seo
    • Journal of the Korea Furniture Society
    • /
    • v.22 no.3
    • /
    • pp.160-173
    • /
    • 2011
  • Increased internet use under a ubiquitous environment may be called as a great human information space revolution followed by Industrial Revolution. This revolution is exerting its significant influence over all the industry as a whole with speed faster than that of any other times. Along with this trend, if furniture design field that leads living culture should fail to jump on this main stream without noticing it, it may be reduced to a unpopular field some day without any sign of recovery. Under this background, this study is intended to recognize a goal aiming at understanding our rapidly changing living environment and leading our way positively. Currently, our surrounding living environment is immersed in computers here and there and Mark Weiser once defined a system that moves in advance before an action as ubiquitous computing and in this respect, I am going to observe a detailed transformation process of space. First nature of the space may be defined as atoms, a physical space equivalent to a spatial element and Bits space that is untouchable is usually called as 2nd space and a combination of atoms and Bits is an intelligent space - 3rd space - that can be intelligible without touching it and finally, this space is called as a ubiquitous space. This spatial transformation is developed by several changes of living environment and we may call it as living trend or interior design trend. Transformation in terms of social perspective, space structural perspective and digital technique perspective may be enumerated. These transformations were surveyed based on its contents being implemented at a future housing exhibition hosted by 5 construction companies along with fusion of information furniture and furniture depending on each housing space. In conclusion, it could be realized that most of the companies were decorating future space by implementing ubiquitous environment as a success factor of future housing market. It may be meaningful to note once again that under an interior environment, a fusion of furniture and information furniture is required considering interior trend elements.

  • PDF

Design and Implementation of Customized Protocol and Smartphone App for the All-in-One Sensor Device

  • Bang, Jong-ho;Lee, Song-Yeon;Paik, Jong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Social issues for environmental pollution are continuously increasing globally. Especially, Users require services to measure environmental factors in indoor and outdoor and manage related data effectively and conveniently. According to this demand, sensors that can measure environmental factors in indoor and outdoor have been developed. However, since one sensor is composed of independent module, the interface of output data from each sensor is different. To solve the problem, we propose a customized protocol for low-power short-range wireless communication between smartphone using Bluetooth and All-in-One sensor device board and analyze the performance of the proposed customized protocol by developing program for performance verification of interface with user smartphone through Bluetooth. In addition, we implement a smartphone application using proposed protocol.

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF

HBase-based Automatic Summary System using Twitter Trending Topics (트위터 트랜딩 토픽을 이용한 HBase 기반 자동 요약 시스템)

  • Lee, Sanghoon;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.63-72
    • /
    • 2014
  • Twitter has been a popular social media platform where people post short messages of 140 characters or less via the web. A hashtag is a word or acronym created by Twitter users to open a discussion about certain topics and issues that have a very high percentage of trending. Since the hashtag posts are sorted by time, not relevancy, people who firstly use Twitter have had difficulty understanding their context. In this paper, we propose a HBase-based automatic summary system in order to reduce the difficulty of understanding. The proposed system combines an automatic summary method with a fuzzy system after storing the streaming data provided by Twitter API to the HBase. Throughout this procedure, we have eliminated the duplicate of contents in the hashtag posts and have computed scores between posts so that the users can access to the trending topics with relevancy.

Analysis on Issue Attributions between Twitter and Newspapers (트위터와 신문의 이슈 속성 비교 연구: MBC 파업을 중심으로)

  • Lee, Mina;Park, Chun Il;Moon, Jee Young
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.43-55
    • /
    • 2014
  • This study investigated how social issues are interpreted and presented in Twitter in comparison to newspapers, considering Twitter functions as the media for information transmission and public opinion formation. this study used one of Twitter's media agenda, MBC strike, and analyzed how Twitter and newspaper deal with the issue of the MBC strike differently. The content analysis was performed to examine the differences. The categories for the content analysis include; message format, information sources, perspectives to be expressed, the frame of human interests, and the frame of cause-assigning. The results found out significant differences between Twitter and newspapers, which are related to essential differences between Twitter and newspaper as communication media.

Bio-mimetic Recognition of Action Sequence using Unsupervised Learning (비지도 학습을 이용한 생체 모방 동작 인지 기반의 동작 순서 인식)

  • Kim, Jin Ok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.9-20
    • /
    • 2014
  • Making good predictions about the outcome of one's actions would seem to be essential in the context of social interaction and decision-making. This paper proposes a computational model for learning articulated motion patterns for action recognition, which mimics biological-inspired visual perception processing of human brain. Developed model of cortical architecture for the unsupervised learning of motion sequence, builds upon neurophysiological knowledge about the cortical sites such as IT, MT, STS and specific neuronal representation which contribute to articulated motion perception. Experiments show how the model automatically selects significant motion patterns as well as meaningful static snapshot categories from continuous video input. Such key poses correspond to articulated postures which are utilized in probing the trained network to impose implied motion perception from static views. We also present how sequence selective representations are learned in STS by fusing snapshot and motion input and how learned feedback connections enable making predictions about future input sequence. Network simulations demonstrate the computational capacity of the proposed model for motion recognition.

A Study on Factors Influencing User's Satisfaction of OTT Service (OTT 서비스의 이용만족도에 영향을 미치는 요인에 관한 연구)

  • Lee, heesung;Jin, Haiyan;Hwang, HaSung
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.93-100
    • /
    • 2017
  • In multi-media, multi-channel era, video viewing using various digital devices via the Internet, not the existing broadcasting network, is emerging as a new broadcasting viewing behavior. OTT service is regarded as the main service of this change of viewing behavior. It is a video service that can seamlessly use any content desired by the user at any time, at any time, any device, any contents, if the Internet connection is available. The purpose of this study is to investigate the factors affecting the satisfaction of OTT service by applying the technology acceptance model (TAM). As a result of analyzing through 303 questionnaires of the early users of OTT service, social pressure, perceived popularity, perceived cost, user reputation, individual innovation, and esthetics set as external factors in this study are partially affects perceived usefulness, perceived ease of use, and perceived enjoyment. In addition, perceived usefulness, ease of use, and enjoyment are directly influencing satisfaction. Based on these results, we discuss the theoretical and practical implications and propose future research direction.

An Efficient Damage Information Extraction from Government Disaster Reports

  • Shin, Sungho;Hong, Seungkyun;Song, Sa-Kwang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.55-63
    • /
    • 2017
  • One of the purposes of Information Technology (IT) is to support human response to natural and social problems such as natural disasters and spread of disease, and to improve the quality of human life. Recent climate change has happened worldwide, natural disasters threaten the quality of life, and human safety is no longer guaranteed. IT must be able to support tasks related to disaster response, and more importantly, it should be used to predict and minimize future damage. In South Korea, the data related to the damage is checked out by each local government and then federal government aggregates it. This data is included in disaster reports that the federal government discloses by disaster case, but it is difficult to obtain raw data of the damage even for research purposes. In order to obtain data, information extraction may be applied to disaster reports. In the field of information extraction, most of the extraction targets are web documents, commercial reports, SNS text, and so on. There is little research on information extraction for government disaster reports. They are mostly text, but the structure of each sentence is very different from that of news articles and commercial reports. The features of the government disaster report should be carefully considered. In this paper, information extraction method for South Korea government reports in the word format is presented. This method is based on patterns and dictionaries and provides some additional ideas for tokenizing the damage representation of the text. The experiment result is F1 score of 80.2 on the test set. This is close to cutting-edge information extraction performance before applying the recent deep learning algorithms.

Research Capability Enhancement System Based on Prescriptive Analytics (지시적 분석 기반 역량 강화 시스템)

  • Gim, Jangwon;Jung, Hanmin;Jeong, Do-Heon;Song, Sa-Kwang;Hwang, Myunggwon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.46-51
    • /
    • 2015
  • The explosive growth of data and the rapidly changing technical social evolution new analysis paradigm for predicting and reacting the future the past and present ig data. Prescriptive analysis has a fundamental difference because can support specific behaviors and results according to user's goals with defin researchers establish judgments and activities achiev the goals. However research methods not widely implemented and even the terminology, Prescriptive analysis, is still unfamiliar. This paper thus propose an infrastructure in the prescriptive analysis field with key considerations for enhancing capability of researchers through a case study based on InSciTe Advisory developed with scientific big data. InSciTe Advisory system s developed in 2013, and offers a prescriptive analytics report which contains various As-Is analysis results and To-Be analysis results 5W1H methodology. InSciTe Advisory therefore shows possibility strategy aims to reach a target role model group. Through the availability and reliability of the measurement model the evaluation results obtained relative advantage of 118.8% compared to Elsevier SciVal.

Data Replication and Migration Scheme for Load Balancing in Distributed Memory Environments (분산 인-메모리 환경에서 부하 분산을 위한 데이터 복제와 이주 기법)

  • Choi, Kitae;Yoon, Sangwon;Park, Jaeyeol;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.1
    • /
    • pp.44-49
    • /
    • 2016
  • Recently, data has been growing dramatically along with the growth of social media and digital devices. A distributed memory processing system has been used to efficiently process large amounts of data. However, if a load is concentrated in a certain node in distributed environments, a node performance significantly degrades. In this paper, we propose a load balancing scheme to distribute load in a distributed memory environment. The proposed scheme replicates hot data to multiple nodes for managing a node's load and migrates the data by considering the load of the nodes when nodes are added or removed. The client reduces the number of accesses to the central server by directly accessing the data node through the metadata information of the hot data. In order to show the superiority of the proposed scheme, we compare it with the existing load balancing scheme through performance evaluation.