• Title/Summary/Keyword: Usage control

Search Result 1,250, Processing Time 0.024 seconds

Children's cellular phone usage and relationships between the usage and self-efficacy and self-control (초등학생의 휴대전화이용 수준과 자기효능감 및 자기통제력과의 관계연구)

  • Lee, Gyeong-Seon;Lee, Jeong-Hwa
    • Korean Journal of Human Ecology
    • /
    • v.17 no.2
    • /
    • pp.271-278
    • /
    • 2008
  • This study was investigated elementary school children's cellular phone usage and relationships between the usage and their self-efficacy and self-control. The data were collected by boys(101) and girls(155) among 5th grades, boys(125) and girls(177) among 6th grades elementary school in Busan. The data analyzed with the frequency, percentage, mean, SD and t-test, ANOVA, Pearson's correlation in use of SPSS Win 12.0 program. The results from the research can be summarized as follows; First, there was no significant difference in the children's general usage of cellular phone in terms of grade and sex. Second, it was found in a couple of significant difference in the subcategories of the usage according to grades. The 6th grades children is higher scores than 5th grades in the 'control of cellular phone usage' and 'living trouble'. Third, there was correlated negatively between cellular phone usage and the children's self-efficacy/self-control.

A study on improvement of policing perfomance by usage parameter control in asynchronous transfer mode networks (ATM망에서 사용자 변수 제어에 의한 감시 성능 개선에 관한 연구)

  • 한길성;오창석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.6
    • /
    • pp.1480-1489
    • /
    • 1996
  • In ATM networks there are two methods in traffic control as schemes advancing the quality of service. One is reactive control after congestion and the other which is generally recommended, is preventive control before congestion, including connection admission control on call leel and usage parameter control, network parameter control, priority control and congestion control on cell level. In particular, usage parameter control is required for restricting the peak cell rate of bursy tracffic to the parameter negotiated at call set-up phase since the peak cell rate significantly influences the network quality of service. The scheme for progressing quality of service by usage parameter control is themethod using VSA(Virtual Scheduling Algorlithm) recommended ITU-T. The method using VSSA(Virtual Scheduling Suggested Algorlithm) in this paper is suggested by considering cell delay variation and token rate of leaky bucket, compared VSA and VSANT(Virtual Scheduling Algolithm with No Tolerance) with VSSA which polices violated cell probability of conformed peak cell rate and intentionally excessive peak cell rate. VSSA method using IPP(Interruped Poisson Process) model of input traffic source showed more quality of service than VSA and VSANT methods as usage parameter control because the suggested method reduced the violated cell probability of contformed peak cell rate and intentionally excessive peak cell rate.

  • PDF

A Design of Multimedia Content Management through Cloud Computing Paradigm (클라우드 컴퓨팅 파라다임을 통한 멀티미디어 컨텐츠 관리 설계)

  • Tolentino, Randy;Kim, Yong-Tae;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.343-349
    • /
    • 2012
  • Usage control models are the new breed of access control models that allow description of comprehensive policies for usage of protected content. In this paradigm, decisions regarding access to objects are not limited to request time only. It is coupled with the usage of the protected objects and becomes a continuous process carried out in parallel to the usage. The realization of usage control has been a long standing research problem to overcome the issue of loss of control in secure document dissemination. With the emergence of cloud computing, documents are stored in the cloud, the document viewers and editors themselves reside in the cloud and are accessed from thin clients such as browsers. We note that such scenarios provide an ideal opportunity for the realization of usage control for securing the usage of documents based on the stakeholders' policies. In this paper, we proposed Multimedia Content Management (MCM) for a better realization multimedia content in the cloud based applications. We designed a robust architecture to provide fine-grained control over usage of protected objects through the use of emerging cloud computing paradigm. We present the design principles for this realization and discuss our proposed architecture.

The Longitudinal Mediation Effect of Adaptive Game Use on the Relationship of Adolescents' Game Usage and Self-control (청소년의 게임이용시간과 자기통제의 관계에서 적응적 게임활용의 종단적 매개효과)

  • Jin, Byung Jun;Lee, Ji Hae
    • Korean Journal of Culture and Social Issue
    • /
    • v.28 no.3
    • /
    • pp.331-352
    • /
    • 2022
  • This study used a latent growth curve models(LGCM) to examine longitudinal changes in youth's game usage, self-control and the longitudinal mediation effect of adaptive game use in the relationship between game usage and self-control. A four-year longitudinal data of 863 adolescents from the Game User Panel Survey, provided through participation in the 2019 Game User Panel Research Conference hosted by the Korea Creative Contents Agency, was used to verify the longitudinal mediation effect of adaptive game use. SPSS 21 was used to verify the normality of variables from each wave, and to conduct correlation analysis. Mplus 6.12 was used to verify the longitudinal mediation effect. The results are as follows. First, game usage, self-control and adaptive game yielded linear temporal growth. Second, latent growth curve models showed that the direct effect of game usage on self-control was insignificant, but game usage had a significant indirect effect on self-control through adaptive game use. Continuous adaptive gaming increased self-control. Third, sobel test results showed that both the initial value and change rate of adaptive game use had a full-mediation effect, confirming the longitudinal mediation effect. This study verified the longitudinal change of self-control affected by change in game usage and adaptive game use.

A Mathematical Approach to Allocate the Contributions by Applying UPFCs to Transmission System Usage

  • Sedaghati, Alireza
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.158-163
    • /
    • 2005
  • Competitive electricity markets necessitate equitable methods for allocating transmission usage in order to set transmission usage charges and congestion charges in an unbiased and an open-accessed basis. So in competitive markets it is usually necessary to trace the contribution of each participant to line usage, congestion charges and transmission losses, and then to calculate charges based on these contributions. A UPFC offers flexible power system control, and has the powerful advantage of providing, simultaneously and independently, real-time control of voltage, impedance and phase angle, which are the basic power system parameters on which sys-tem performance depends. Therefore, UPFC can be used efficiently and flexibly to optimize line utilization and increase system capability and to enhance transmission stability and dampen system oscillations. In this paper, a mathematical approach to allocate the contributions of system users and UPFCs to transmission system usage is presented. The paper uses a dc-based load flow modeling of UPFC-inserted transmission lines in which the injection model of the UPFC is used. The relationships presented in the paper showed modified distribution factors that modeled impact of utilizing UPFCs on line flows and system usage. The derived relationships show how bus voltage angles are attributed to each of changes in generation, injections of UPFC, and changes in admittance matrix caused by inserting UPFCs in lines. The relationships derived are applied to two test systems. The results illustrate how transmission usage would be affected when UPFC is utilized. The relationships derived can be adopted for the purpose of allocating usage and payments to users of transmission network and owners of UPFCs used in the network. The relationships can be modified or extended for other control devices.

  • PDF

Consumption of Counterfeit Luxury Fashion Products Based on the Theory of Planned Behavior (계획된 행동이론을 적용한 명품 복제품의 사용과 재구매 행동에 관한 연구)

  • Jang, Jae Im;Choo, Ho Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.3
    • /
    • pp.433-445
    • /
    • 2015
  • This study examines factors that influence consumer behavior regarding the usage intentions and repurchasing behavior of counterfeits. Based on the Theory of Planned Behavior by Ajzen (1991), this study looks at the impact of attitude, subjective norm, perceived behavioral control, as well as the moral norm of consumers about intentions to use and repurchase counterfeits. An online survey was conducted on males and females over the age of 20 with previous experiences of purchasing counterfeits; subsequently, 209 responses were collected and analyzed. The covariance structure model was used to analyze the data in order to measure the factors that influence the usage of counterfeits and repurchasing behavior. The results show that attitude, subjective norm, and perceived behavioral control have significantly positive effects on usage intentions, while moral norm has a significantly negative effect on usage intentions. Usage intentions also have a significantly positive effect on repurchasing behavior and confirmed that usage intentions functions as the mediator. The variables that influence usage intentions are attitude, perceived behavioral control, moral norm, and subjective norm, in descending order. Consumer attitudes towards counterfeits is a major factor that influences usage intentions. Therefore, ethical problems should be emphasized to encourage a negative attitude towards counterfeits. This study identifies an important aspect to show that usage intentions toward counterfeits, and not purchasing intentions, influences repurchasing behavior. Findings are significant in that they reveal the role of the moral norm variable added to the TPB model.

Emergency Degree and Usage Frequency Analysis of Vehicle IP Composition Factors to Provide Safety Driving Environment (안전운전 환경 제공을 위한 자동차 IP 구성요소의 긴급도와 사용빈도 분석 -소비자 설문을 바탕으로-)

  • Paik, Seung-Youl;Park, Peom
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.3
    • /
    • pp.193-197
    • /
    • 1999
  • By the report of KISCO, the 54.20% of total disaster and the 20.87% of death disaster was caused by unsafe position-control. However, it is possible to decrease this kind of disaster rate by designing the control device in the consideration of safety. One of the most popular control device is vehicle instrument panel. Therefore, not only basic function but safe control under the driving environments should be considered when the vehicle instrument panel is designed. For safe control at the driving time, it is especially important to determine the priority of each part using emergency degree and usage frequency, and to set them with this priority for easy control position. In this paper, developing method to determine the priority of each part by pair-wise comparison for emergency degree and usage frequency was suggested and generated the mutual order weights to give them orders. To apply this method to the parts of instrument panel such as function button, audio, air conditioner, and other several detail parts, the direct questionnaire was implemented to drivers about the emergency degree and usage frequency of each part.

  • PDF

RFID Access Control Using Extended Usage Control Model (확장된 사용 제어 모델을 이용한 RFID 접근 제어)

  • Shin, Woo-Chul;Yoo, Sang-Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.127-144
    • /
    • 2007
  • This paper describes an Security Manager that integrally manages the Information Service related to RFID middleware, Object Name Service, and Web Service for upper level applications. In order to provide the access control of distributed RFID objects, Single-Sign-On has been implemented by extending existing UCON (Usage Control) model and SAML (Security Assertion Markup Language) assertions. The security technology of distributed RFID systems can be included in middleware and protect RFID information. In the future, it can be also applied to ubiquitous sensor networks.

  • PDF

Building the Data Mart on Antibiotic Usage for Infection Control (감염관리를 위한 항생제 사용량 데이터마트의 구축)

  • Rheem, Insoo
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.48 no.4
    • /
    • pp.348-354
    • /
    • 2016
  • Data stored in hospital information systems has a great potential to improve adequacy assessment and quality management. Moreover, an establishment of a data warehouse has been known to improve quality management and to offer help to clinicians. This study constructed a data mart that can be used to analyze antibiotic usage as a part of systematic and effective data analysis of infection control information. Metadata was designed by using the XML DTD method after selecting components and evaluation measures for infection control. OLAP-a multidimensional analysis tool-for antibiotic usage analysis was developed by building a data mart through modeling. Experimental data were obtained from data on antibiotic usage at a university hospital in Cheonan area for one month in July of 1997. The major components of infection control metadata were antibiotic resistance information, antibiotic usage information, infection information, laboratory test information, patient information, and infection related costs. Among them, a data mart was constructed by designing a database to apply antibiotic usage information to a star schema. In addition, OLAP was demonstrated by calculating the statistics of antibiotic usage for one month. This study reports the development of a data mart on antibiotic usage for infection control through the implementation of XML and OLAP techniques. Building a conceptual, structured data mart would allow for a rapid delivery and diverse analysis of infection control information.

Improved control structure to enhance user experience of smart phone (스마트 폰의 사용자 경험 증진을 위한 컨트롤 구조개선)

  • Lee, Youngju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.163-170
    • /
    • 2017
  • As the usage of smart phones continues to increase, the control UI, which users have to continue to use, sometimes finds a heavy burden on users. Therefore, in this study, we have studied the control user interface structure along with the theoretical background of the control user interface, and we have studied the role and usage of the control component based on it. Typical commonly used controls are button controls for transmission, selection controls for various selections, link controls for navigation, text controls for inputting characters, indicator controls for feedback on progress, A message control that displays information about warnings and errors, and a window control such as a dialog box. The structure of the control should be designed according to the use of the separated control to help the user efficiently use the control user interface. Based on the analysis of the theoretical usage of representative components belonging to the separated controls, we presented a new and correct way to use the control to improve the user experience. The use of improved control components will help to design the control structure efficiently and to improve the user experience.