• Title/Summary/Keyword: USER MANAGEMENT

Search Result 6,203, Processing Time 0.034 seconds

The Effects of Virtual Competitors on AR (Augmented Reality) Home Training System: Focusing on Immersion, Perceived Competition, and Learning Motivation (증강현실을 활용한 홈 트레이닝에서 가상 참여자의 영향: 몰입, 인지된 경쟁, 그리고 정보 습득의 욕구를 중심으로)

  • Choi, Sungho;Lee, Wonouk;Kim, Hyunju;Won, Jongseo;Lee, Jeehang;Lee, Yeonjoo;Kim, Jinwoo
    • Science of Emotion and Sensibility
    • /
    • v.20 no.3
    • /
    • pp.119-130
    • /
    • 2017
  • The purpose of the study is discovering the effects of virtual competitors on user in AR (Augment Reality) home training system. Specifically, the current research examined their effects on immersion, perceived competition, and leaning motivation. The paper tested three unexplored relationship. First, introducing virtual competitors in home training system will enhance user's immersion. Second, presenting virtual competitors in home training system will increase user's perceived competition. Third, virtual competitors in home training system will raise user's learning motivation. For empirical analysis, we developed home training system, which could check and give feedback automatically, based on user's posture. Using this AR home training system, the study empirically shows how and why virtual competitors affect users. The results give implications not only on service design; but also on the idea that virtual other could affect user's behavior.

A Study on Ways to Improve Safety Management through Analysis of Fire Cases in Multiple-user Buildings (다중이용업소의 화재사례 분석을 통한 안전관리 개선방안 연구)

  • Lee, Jae Wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.191-201
    • /
    • 2022
  • In this study, we are going to derive problems for fire and safety management in multiple-user Buildings and suggest improvement measures to prevent recurrence through analysis of legal operation status for safety management of multiple-user Buildings and case studies of large-scale fires in multiple-user Buildings. For this study, first, the current state of the industry and fire occurrence status were investigated through theoretical considerations of the multi-use industry, and then the previous research on the multi-use industry was analyzed. and by analyzing the legal and institutional status of multiple-user Buildings, problems were derived through cases such as the Jecheon fire in Chungcheongbuk-do, the Inhyeon-dong fire in Incheon, and the Songpa-gu fire in Seoul. As a result, first, the necessity of strengthening the initial fire response capability. Second, thorough maintenance and management of emergency exits. Third, the need for rational regulation of upholstery. Fourth, reinforcement of fire safety education and training. Fifth, strengthening of installation standards for firefighting and safety facilities. Sixth, we derive the result that it is necessary to raise awareness about safety management, compare and analyze it with legal and institutional contents, and suggest solutions accordingly. When looking at the causes of fires in multi-use buildings, building owners, business owners, and employees think that there is no possibility of a fire occurring in their business premises, so there is a lack of awareness. It is necessary to raise awareness through education and publicity of firefighters and related administrative agencies.

User Demand-based Grid Trade Management Model (사용자 요구기반의 그리드 거래 관리 모델)

  • Ma, Yong-Beom;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.11-21
    • /
    • 2006
  • Importance of and need for grid resource management have accelerated in accordance with increasing development of grid computing. However, it is very complex to distribute and utilize resources efficiently in geographically dispersed environments. This is due to the different access policies and constraints of grid resource owners. Users request resources according to their needs. Operators of a grid computing system need to be able to monitor the system states for reflecting these demands. So, a grid computing system needs a resource management policy that monitors states of resources and then allocates resources. This paper proposes a user demand-based grid trade management model that provides an efficient resource management by the trade allocation based on a users' demand and providers' supply strategy. To evaluate performance, this paper measures increasing rate of resource trades, average response time of trades, and processing time utilization. Firstly, the average increasing rates of trade are 585.7% and 322.6% higher than an auction model and a double auction model. Secondly, the average response time of the user demand-based grid trade management model is maintained between 3 and 5 simulation time. Finally, it is found that the processing time utilization is an average of 145.4% and 118.0% higher than an auction model and a double auction model. These empirical results demonstrate the usefulness of the user demand-based grid trade management model.

  • PDF

Design of Hand Gestures for Smart Home Appliances based on a User Centered Approach (스마트홈 내 기기와의 상호작용을 위한 사용자 중심의 핸드 제스처 도출)

  • Choi, Eun-Jung;Kwon, Sung-Hyuk;Lee, Dong-Hun;Lee, Ho-Jin;Chung, Min-K.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.38 no.3
    • /
    • pp.182-190
    • /
    • 2012
  • With the progress of both wire and wireless home networking technology, various projects on smart home have been carried out in the world (Harper, 2003), and at the same time, new approaches to interact with smart home systems efficiently and effectively have also been investigated. A gesture-based interface is one of these approaches. Especially with advance of gesture recognition technologies, a variety of research studies on gesture interactions with the functions of IT devices have been conducted. However, there are few research studies which suggested and investigated the use of gestures for controlling smart home appliances. In this research the gestures for selected smart home appliances are suggested based on a user centered approach. A total of thirty-eight functions were selected, and a total of thirty participants generated gestures for each function. Based on the Nielsen (2004), Lee et al. (2010) and Kuhnel et al. (2011), the gesture with the highest frequency for each function (Top gesture) has been suggested and investigated.

An User-driven Service Creation Architecture in Consumer Networking Environments (소비자 네트워킹 환경에서의 사용자 주도 서비스의 효율적 생성)

  • Jung, Yuchul;Kim, Jin-Young;Lee, Hyejin;Kim, Kwang-Young;Suh, Dongjun
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.479-487
    • /
    • 2016
  • In a Web 2.0 context, users are exposed to numerous smart devices and services that allow real-time interaction between users (or consumers) and developers (or producers). For the provisioning of new user-created services based on user's context, the data management of service creation experiences becomes a non-trivial task. This article introduces a data model for service creation and then proposes a service creation management architecture which enables new service creation using the data model, the management of the service creation data, and the semantic service discovery across internal/external service repositories. The article also explains the use of the proposed architecture with two different scenarios: home and mobile environments. The proposed architecture for service creation data management offers consistent and seamless handling of the service creation data throughout its usage lifecycle.

CEM-PF: Cost-Effective Mobility Management Scheme Based on Pointer Forwarding in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 포인터 포워딩에 기반한 비용효과적인 이동성관리 기법)

  • Park, Seung-Yoon;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.81-93
    • /
    • 2012
  • We propose efficient mobility management schemes based on pointer forwarding for Proxy Mobile IPv6 Networks(PMIPv6) with the objective to reduce the overall network traffic incurred by mobility management and packet delivery. The proposed schemes are per-user-based, i.e., the optimal threshold of the forwarding chain length that minimizes the overall network traffic is dynamically determined for each individual mobile user, based on the user's specific mobility and service patterns. We demonstrate that there exists an optimal threshold of the forwarding chain length, given a set of parameters characterizing the specific mobility and service patterns of a mobile user. We also demonstrate that our schemes yield significantly better performance than schemes that apply a static threshold to all mobile users. A comparative analysis shows that our pointer forwarding schemes outperform routing-based mobility management protocols for PMIPv6.

A Per-User-based Enhanced Distributed Mobility Management Scheme in PMIPv6 Networks (PMIPv6 네트워크에서 사용자 기반의 향상된 분산형 이동성 관리 기법)

  • Kong, Ki-Sik
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.111-118
    • /
    • 2016
  • Proxy mobile IPv6 (PMIPv6), which is a centralized mobility management protocol, are dependent on a local mobility anchor (LMA) to process all control and data traffics. Therefore, it has serious problems such as the tremendous traffic concentration into the core network and the triangle routing. In this paper, therefore, in order to alleviate these drawbacks, we propose a PMIPv6-based enhanced distributed mobility management scheme considering a user's traffic locality. Performance evaluation results indicate that in most cases, except for when a user's mobility rate is relatively very higher than the traffic rate, the proposed scheme shows better performance result than that of PMIPv6. Besides, it is demonstrated that the proposed scheme can be an effective alternative that can distribute the significant loads on the LMA of the core networks to the MAGs of the edge networks.

A design of Key Exchange Protocol for User Centered Home Network (사용자 중심의 홈네트워크를 위한 키 교환 프로토콜 설계)

  • 정민아
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.654-660
    • /
    • 2004
  • In this paper, we define that pervasive home network, which provides necessary services for user properties and removes distractions to improve the quality of human life. So, user can enjoy home network technology including devices and softwares at any place with no knowledge of networked home, devices, and softwares. In this home network, a mobile agent, called LAFA, can migrate to unfamiliar home network and control the necessary devices. For this environment, we design security management module for authenticating user and home server that access some other home networks, and for protecting text, multimedia data, and mobile agent that are transferred between home networks. The security management module is composed of a key exchange management module and an access control management module, for key exchange management module, we propose a key exchange protocol, which provides multimode of authentication mode and key exchange mode. One of these two modes is selected according to the data type.

User Authentication of a Smart City Management System (스마트시티 매니지먼트 시스템에서의 사용자인증보안관리)

  • Hwang, Eui-Dong;Lee, Yong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.53-59
    • /
    • 2019
  • In this paper, we introduce the UTOPIA Smart City Security Management System which manages a user authentication for smart cities. Because the smart city management system should take care of huge number of users and services, and various kinds of resources and facilities, and they should be carefully controlled, we need a specially designed security management system. UTOPIA is a smart city system based on ICT(Information and Communication Technology), and it has a three tier structure of UTOPIA portal system, UTOPIA processing system and UTOPIA infrastructure system. The UTOPIA processing system uses the smart city middleware named SmartUM. The UTOPIA Smart City Security Management System is implemented in the application security layer, which is the top layer of the SmartUM middleware, and the infrastructure security layer, which is the lowest layer. The UTOPIA Smart City security management system is built on the premise that it supports all existing user authentication technologies. This paper introduces the application security layer and describes the authentication management in the application security layer.

The Effect of Mobile EMR's Technological Characters on System Qualities and User Satisfaction (모바일 전자의무기록(EMR)의 기술적 특성이 시스템 품질과 사용자 만족에 미치는 영향)

  • Lee, In Tae
    • Korea Journal of Hospital Management
    • /
    • v.19 no.3
    • /
    • pp.43-52
    • /
    • 2014
  • We empirically show that the effect of mobile EMR's technological characters on system qualities and user satisfaction. For the study, the relationship among technological characters of mobile, EMR's system quality, EMR's information quality, and user satisfaction were modelled and validated with hypotheses. An empirical test was performed for a path model using structural equation modeling on samples of 148 nurses in hospitals from various size and region. This study find that, for the overall sample, there are positive relationships among the technological characters of mobile, EMR's system quality, EMR's information quality, and user satisfaction. And the results support that mobile is an effective method for EMR. Findings of this study have several theoretical and practical implications as follows : First, this study empirically tested the relationship among technological characters of mobile, EMR's system quality, EMR's information quality. Second, the study shows that the technological characters of mobile should be considered for advance of EMR system's quality in mobile environment. And lastly, this study can practically suggest mobile healthcare information system for process effectiveness.

  • PDF