• Title/Summary/Keyword: User's Sensitivity

Search Result 104, Processing Time 0.03 seconds

Method of Sensitivity Configuration of Gyro Sensor for Virtual Camera inside 3D Mobile Game (3D 모바일 게임 내의 가상카메라를 위한 자이로 센서의 민감도 설정 방법)

  • Baek, Insik;Kim, Jong-Kook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.1020-1022
    • /
    • 2014
  • In this paper, we present a method for smartphone users to have a better user experience when playing 3D mobile games using the gyro sensor. We designed the rotation of the virtual camera in the game world to be proportional to the real-world's rotation. We have also made the sensitivity configuration possible for users to manipulate.

Sensitivity Analysis of Decision Tree's Learning Effectiveness in Boolean Query Reformulation (불리언 질의 재구성에서 의사결정나무의 학습 성능 감도 분석)

  • 윤정미;김남호;권영식
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.4
    • /
    • pp.141-149
    • /
    • 1998
  • One of the difficulties in using the current Boolean-based information retrieval systems is that it is hard for a user, especially a novice, to formulate an effective Boolean query. One solution to this problem is to let the system formulate a query for a user from his relevance feedback documents in this research, an intelligent query reformulation mechanism based on ID3 is proposed and the sensitivity of its retrieval effectiveness, i.e., recall, precision, and E-measure, to various input settings is analyzed. The parameters in the input settings is the number of relevant documents. Experiments conducted on the test set of Medlars revealed that the effectiveness of the proposed system is in fact sensitive to the number of the initial relevant documents. The case with two or more initial relevant documents outperformed the case with one initial relevant document with statistical significances. It is our conclusion that formulation of an effective query in the proposed system requires at least two relevant documents in its initial input set.

  • PDF

Development of An Optimal Design Program for Open-Chain Dynamic Systems (불구속연쇄 동적시스템을 위한 최적설계 프로그램 개발)

  • 최동훈;한창수;이동수;서문석
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.1
    • /
    • pp.12-23
    • /
    • 1994
  • This paper proposes an optimal design software for the open-chain dynamic systems whose governing equations are expressed as differential equation. In this software, an input module and an automatic creation module of the equation of motion are developed to contrive the user's convenience. To analyze the equation of motion of the dynamic systems, variable-order and variable-stepsize Adams-Bashforth-Moulton predictor-corrector method is used to improve the efficiency. For the optimization and the design sensitivity analysis, ALM(augmented lagrange multiplier)method and adjoint variable method are adopted respectively. An output module with which the user can compare and investigate the analysis and the optimization results through tables and graphs is also provided. The developed software is applied to three typical dynamic response optimization problems, and the results compare very well with those available in the literature, demonstrating its effectiveness.

Location Information Sharing modeling Using Bluetooth between Vehicle and Mobile Phone (차량과 휴대 전화간의 블루투스를 이용한 위치정보 공유 모델링)

  • Kim, Jun-Hee;Kim, Jong-Ho;Kim, Yong-Deak
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.329-330
    • /
    • 2008
  • GPS which measured user's location information outdoors should be of poor sensitivity because of interference and jamming of different electromagnetic waves. Specially, it has a defect of low received rate in high-rise urban where reflection and refraction of satellite signal go well. In this paper, I propose user location information sharing modeling of both vehicle and mobile phone using bluetooth in urban.

  • PDF

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

ASUSD nuclear data sensitivity and uncertainty program package: Validation on fusion and fission benchmark experiments

  • Kos, Bor;Cufar, Aljaz;Kodeli, Ivan A.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.7
    • /
    • pp.2151-2161
    • /
    • 2021
  • Nuclear data (ND) sensitivity and uncertainty (S/U) quantification in shielding applications is performed using deterministic and probabilistic approaches. In this paper the validation of the newly developed deterministic program package ASUSD (ADVANTG + SUSD3D) is presented. ASUSD was developed with the aim of automating the process of ND S/U while retaining the computational efficiency of the deterministic approach to ND S/U analysis. The paper includes a detailed description of each of the programs contained within ASUSD, the computational workflow and validation results. ASUSD was validated on two shielding benchmark experiments from the Shielding Integral Benchmark Archive and Database (SINBAD) - the fission relevant ASPIS Iron 88 experiment and the fusion relevant Frascati Neutron Generator (FNG) Helium Cooled Pebble Bed (HCPB) Test Blanket Module (TBM) mock-up experiment. The validation process was performed in two stages. Firstly, the Denovo discrete ordinates transport solver was validated as a standalone solver. Secondly, the ASUSD program package as a whole was validated as a ND S/U analysis tool. Both stages of the validation process yielded excellent results, with a maximum difference of 17% in final uncertainties due to ND between ASUSD and the stochastic ND S/U approach. Based on these results, ASUSD has proven to be a user friendly and computationally efficient tool for deterministic ND S/U analysis of shielding geometries.

Development of a S/W for a Structural Analysis of Machine tools utilizing database (데이터베이스를 활용한 공작기계의 구조해석 프로그램 개발)

  • Shin, Jeong-Ho;Kwak, Byung-Man
    • Proceedings of the KSME Conference
    • /
    • 2000.11a
    • /
    • pp.446-451
    • /
    • 2000
  • In this paper, a S/W system for a structural analysis of machine tools has been suggested. The system is so designed to reduce manual interfacing effort. An object-oriented language is used for making a graphic user interface. In this system parametric modelling technique is applied to construct a FE model without much user intervention. The FE model is automatically updated when the design parameters are changed by user. Not only single FE analysis but also a trade-off analysis for calculating the sensitivity information of design variables is possible using this system. All data generated by this system are saved in the database. So it possible to retrieve the result later without another analysis. It is found that the design time can be reduced and unnecessary operation avoided using this system.

  • PDF

Implementation of User Posture Correction Application using Kinect (키넥트를 이용한 사용자 자세 교정 어플리케이션 구현)

  • Kim, Hyeon-Woo;Noh, Yun-Hong;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.275-276
    • /
    • 2016
  • In this paper, we were implemented the application to induce correct posture by recognizing the incorrect posture of the user. Implemented system uses kinect sensors to determine the user's position information, it has been developed posture determination algorithm that can determine the four wrong posture and correct posture. In addition to PC in order to improve the user convenience and accessibility, to implement real-time monitoring application that can determine the user's position in the smartphone. For the system of performance evaluation of and promote the attitude determination experiment to target the five college students, the experimental results sensitivity and specificity of it it was found that the attitude determination performance is excellent at 0.956.

  • PDF

Advisable Direction of Sensitivity-Quality Factors on Railroad Sector (철도분야의 감성품질 요소 정립방향)

  • Song, Min-Ho;Park, Jae-Hyun;Kwon, Sun-Bak;Song, Yong-Su
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2250-2255
    • /
    • 2011
  • There has been a growing interest toward railroad conjunction with opening of high-speed rail in 2004 and concurrent implementation of nation's green growth policies. Meanwhile, users' expectation on service of public transportation, especially railroad has been growing than since ever due to heightened quality of life, entering aging society, voice of equity for minorities, and greater interest in environments of communities. In order to come up with the expectations, actual improvements for user's convenience/comfort and its assessment strategies in terms of service quality level are necessary. This study defines the index of this aspect of service level as 'Sensitivity Quality'. This is conceived as one of the important factors to define travel cost as do the travel time and fare, but hardly taken into consideration when assessing a transportation system or policy-making for a transportation project. The elements included for the assessment of the sensitivity quality in this study are feeling of a ride, conformability and convenience what users feel and recognize using a train. This paper suggests that establishing sensitivity quality elements would contribute in foundation of assessing service quality and provide improved public transportation services through their scientific and objective development and management.

  • PDF

Design of Dynamic Location Privacy Protection Scheme Based an CS-RBAC (CS-RBAC 기반의 동적 Location Privacy 보호 구조 설계)

  • Song You-Jin;Han Seoung-Hyun;Lee Dong-Hyeok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.415-426
    • /
    • 2006
  • The essential characteristic of ubiquitous is context-awareness, and that means ubiquitous computing can automatically process the data that change according to space and time, without users' intervention. However, in circumstance of context awareness, since location information is able to be collected without users' clear approval, users cannot control their location information completely. These problems can cause privacy issue when users access their location information. Therefore, it is important to construct the location information system, which decides to release the information considering privacy under the condition such as location, users' situation, and people who demand information. Therefore, in order to intercept an outflow information and provide securely location-based information, this paper suggests a new system based CS-RBAC with the existing LBS, which responds sensitively as customer's situation. Moreover, it accommodates a merit of PCP reflecting user's preference constructively. Also, through privacy weight, it makes information not only decide to providing information, but endow 'grade'. By this method, users' data can be protected safely with foundation of 'Role' in context-aware circumstance.