• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.035 seconds

An Application of TAM and TRI on the Factors Affecting Internet Banking Adoption in Bangladesh

  • AMIN, Md. Iftekharul;ERFAN, Nafis;NAVID, Mashrur;KHAN, Mohammed Shafiul Alam;ISLAM, Md. Shariful
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.9
    • /
    • pp.75-91
    • /
    • 2022
  • This study assesses the Internet banking adoption tendency by existing bank customers of Bangladesh. Currently, almost all the leading banks in the country have implemented Internet banking platforms. However, the active user count remains relatively low and there hasn't been any conclusive research on the drivers and inhibitors of Internet banking. This study evaluates the reasons and quantitatively establishes the factors leading to the adoption and usage continuance of internet banking by existing bank customers. Responses from 460 bank account holders were collected via online questionnaires using a purposive sampling approach, and a core conceptual framework based on Technology Acceptance Model (TAM) and Technology Readiness Index (TRI) was used. The study concluded that internet banking adoption is significantly impacted by the ease of use, customer service, and technology familiarity. Similarly, customer satisfaction is affected by the perceived value and the perceived risk. Through regression analysis, it was found that usage continuance is 89% explained by adoption and customer satisfaction. Multi-group moderation showed significant impact by groups divided based on usage frequency, income level, and age. Perceived risk weakened the impact of perceived value and technology familiarity on usage adoption. Additionally, perceived risk reduced the impact of consumer satisfaction and usage continuance.

The Development of a Haptic Interface for Interacting with BIM Elements in Mixed Reality

  • Cho, Jaehong;Kim, Sehun;Kim, Namyoung;Kim, Sungpyo;Park, Chaehyeon;Lim, Jiseon;Kang, Sanghyeok
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1179-1186
    • /
    • 2022
  • Building Information Modeling (BIM) is widely used to efficiently share, utilize and manage information generated in every phase of a construction project. Recently, mixed reality (MR) technologies have been introduced to more effectively utilize BIM elements. This study deals with the haptic interactions between humans and BIM elements in MR to improve BIM usability. As the first step in interacting with virtual objects in mixed reality, we challenged moving a virtual object to the desired location using finger-pointing. This paper presents the procedure of developing a haptic interface system where users can interact with a BIM object to move it to the desired location in MR. The interface system consists of an MR-based head-mounted display (HMD) and a mobile application developed using Unity 3D. This study defined two segments to compute the scale factor and rotation angle of the virtual object to be moved. As a result of testing a cuboid, the user can successfully move it to the desired location. The developed MR-based haptic interface can be used for aligning BIM elements overlaid in the real world at the construction site.

  • PDF

A Study on the Selection of Parameters and Application of SVM for Software Cost Estimation (소프트웨어 비용산정을 위한 SVM의 파라미터 선정과 응용에 관한 연구)

  • Kwon, Ki-Tae;Lee, Joon-Gil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.209-216
    • /
    • 2009
  • The accurate estimation of software development cost is important to a successful development in software engineering. This paper presents a software cost estimation method using a support vector machine. Support vector machine is one of the efficient techniques for classification, and it is the classification method of input data based on Maximum-Margin Hyperplane. But SVM has the problem of the selection of optimal parameters, because it is dependent on user's parameters. This paper selects optimized SVM parameters using advanced method, and estimates software development cost. The proposed approach outperform some recent results reported in the literature.

An Enhanced Function Point Model for Software Size Estimation: Micro-FP Model (소프트웨어 규모산정을 위한 기능점수 개선 Micro-FP 모형의 제안)

  • Ahn, Yeon-S.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.225-232
    • /
    • 2009
  • Function Point Method have been applied to measure software size estimation in industry because it supports to estimate the software's size by user's view not developer's. However, the current function point method has some problems for example complexity's upper limit etc. So, In this paper, an enhanced function point model. Micro FP model, was suggested. Using this model, software effort estimation can be more efficiently because this model has some regression equation. This model specially can be applied to estimate in detail the large application system's size Analysis results show that measured software size by this Micro FP model has the advantage with more correlative between the one of LOC, as of 10 applications operated in an large organization.

A Study on HCI Application based on Human Body Motion in Flight Game (활강 게임의 인체동작 기반 HCI 적용 연구)

  • Lim, Dohee;Baek, Jongwoo;Choi, Jiyoung;Jung, Heokyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.320-322
    • /
    • 2021
  • With the development of wireless Internet technology and the expansion of the game market, various forms of games are being developed that are mounted on various platforms, including mobile platforms. In this environment, ensuring the immersion of the game user's perspective will secure the game's competitiveness, so it is necessary to increase the immersion by satisfying each area presented by the Human Computer Interaction (HCI) theory. To this end, this high school implemented downhill games and experimented with kiosks by applying an interface that recognizes the human body's movements as a way to secure freedom and immersion of game users.

  • PDF

Optimal Moving Pattern Extraction of the Moving Object for Efficient Resource Allocation (효율적 자원 배치를 위한 이동객체의 최적 이동패턴 추출)

  • Cho, Ho-Seong;Nam, Kwang-Woo;Jang, Min-Seok;Lee, Yon-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.689-692
    • /
    • 2021
  • This paper is a prior study to improve the efficiency of offloading based on mobile agents to optimize allocation of computing resources and reduce latency that support user proximity of application services in a Fog/Edge Computing (FEC) environment. We propose an algorithm that effectively reduces the execution time and the amount of memory required when extracting optimal moving patterns from the vast set of spatio-temporal movement history data of moving objects. The proposed algorithm can be useful for the distribution and deployment of computing resources for computation offloading in future FEC environments through frequency-based optimal path extraction.

  • PDF

A Study on the Trends of User Authentication Technology and its Future Application in Metaverse (사용자 인증 기술 동향과 메타버스에서의 적용 방향 연구)

  • Lee, Chan Hee;Azzaoui, Abir EL;Gang, Jeong-Ho;Park, Ji-Su;Park, Jong Hyuk
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.216-218
    • /
    • 2022
  • 최근 공인인증서가 폐지되고 보다 발급이 간편하고 유효기간이 긴 사설인증서가 부상했다. 더불어 탈중앙화를 핵심 개념으로 하는 블록체인 기반 분산 신원 증명(Decentralized Identity, DID)기술이 대두되고 있다. 서비스 환경의 변화에 따라 사용자 인증 기술도 변화가 요구된다. 더욱이 메타버스라는 새로운 인터넷 환경이 조성되고 있는 바 현재 사용자 인증 기술의 동향을 살펴보고 미래에 사용자 인증이 나아갈 방향성을 제시하는 것은 의미가 있어 보인다. 본 논문에서는 사용자 인증 기술의 개요와 사용자 인증 기술의 변천과정을 시작으로 공개키 기반 구조(Public Key Infrastructure, PKI)와 분산 신원 증명을 중심으로 시장에서의 사용자 인증 기술의 동향을 살펴본다. 나아가 메타버스가 상용화되었을 시기에 사용자 인증 기술이 나아가야할 세가지 방향성(분산화, 플랫폼 초월, 생체 기반 인증 중심)을 제시한다.

Real-time RL-based 5G Network Slicing Design and Traffic Model Distribution: Implementation for V2X and eMBB Services

  • WeiJian Zhou;Azharul Islam;KyungHi Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2573-2589
    • /
    • 2023
  • As 5G mobile systems carry multiple services and applications, numerous user, and application types with varying quality of service requirements inside a single physical network infrastructure are the primary problem in constructing 5G networks. Radio Access Network (RAN) slicing is introduced as a way to solve these challenges. This research focuses on optimizing RAN slices within a singular physical cell for vehicle-to-everything (V2X) and enhanced mobile broadband (eMBB) UEs, highlighting the importance of adept resource management and allocation for the evolving landscape of 5G services. We put forth two unique strategies: one being offline network slicing, also referred to as standard network slicing, and the other being Online reinforcement learning (RL) network slicing. Both strategies aim to maximize network efficiency by gathering network model characteristics and augmenting radio resources for eMBB and V2X UEs. When compared to traditional network slicing, RL network slicing shows greater performance in the allocation and utilization of UE resources. These steps are taken to adapt to fluctuating traffic loads using RL strategies, with the ultimate objective of bolstering the efficiency of generic 5G services.

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

Evaluation of Multivariate Stream Data Reduction Techniques (다변량 스트림 데이터 축소 기법 평가)

  • Jung, Hung-Jo;Seo, Sung-Bo;Cheol, Kyung-Joo;Park, Jeong-Seok;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.889-900
    • /
    • 2006
  • Even though sensor networks are different in user requests and data characteristics depending on each application area, the existing researches on stream data transmission problem focus on the performance improvement of their methods rather than considering the original characteristic of stream data. In this paper, we introduce a hierarchical or distributed sensor network architecture and data model, and then evaluate the multivariate data reduction methods suitable for user requirements and data features so as to apply reduction methods alternatively. To assess the relative performance of the proposed multivariate data reduction methods, we used the conventional techniques, such as Wavelet, HCL(Hierarchical Clustering), Sampling and SVD (Singular Value Decomposition) as well as the experimental data sets, such as multivariate time series, synthetic data and robot execution failure data. The experimental results shows that SVD and Sampling method are superior to Wavelet and HCL ia respect to the relative error ratio and execution time. Especially, since relative error ratio of each data reduction method is different according to data characteristic, it shows a good performance using the selective data reduction method for the experimental data set. The findings reported in this paper can serve as a useful guideline for sensor network application design and construction including multivariate stream data.