• Title/Summary/Keyword: User Control

Search Result 3,798, Processing Time 0.028 seconds

A Study on the Estimation of User′s Psychological Carrying Capacity in Mt. Chi-ak National Park Campsite (치악산국립공원 야영장의 이용자의 심리적 수용능력 추정에 관한 연구)

  • 권영선;이경재;송근준
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.16 no.1
    • /
    • pp.1-12
    • /
    • 1988
  • ^x This study was executed to measure the user's psychological carrying capacity in the National Park Campsite in the district of Temple Ku- Ryong as a model of analysis, which is made socio - psychological approach. The results are as follows ; 1. Since this Place hart a beautiful scenery and some cultural assets prosperties and lies near the metroplitan area, 67.5% of the user come from the district, such as Seoul, Inchon, Kyong - Ki Do, and the purpose of camping is to appease their stress and to promote friendly relationship one another. 2. Since most of the campers(86%) didn't recognize the injury of the natural environment, the enlightment movement and the public information for the protection of natural environment are urgent. And they thought that the good campsite is located near the stream(43.6%) or a quiet place(33.4%). 3. As the space per a man increase, the degree of their satisfactions showed the tendency to increase. The user's satisfaction were analyzed by three statistic methods, correlation, multiple regression and factor analysis. Affecting factors to the user's psychology by the varimax varimax rotated factor analysis were classified physical arts ecological satisfaction. 4. The carrying capacity of the campsite by the degree of psychological satisfaction of the user was measured. The result was that the proper space for one user campsite was 35m$^2$ 5. The 58% of the informants said that they root disturbed by the overcrowding in the campsite. But most of the users thought that it was not good to control the number of the users. And the 67.3% of the respondents answered that the best method was that we control the number of the users by order of arrival if we have to control it.

  • PDF

Multi-Modal Controller Usability for Smart TV Control

  • Yu, Jeongil;Kim, Seongmin;Choe, Jaeho;Jung, Eui S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.32 no.6
    • /
    • pp.517-528
    • /
    • 2013
  • Objective: The objective of this study was to suggest a multi-modal controller type for Smart TV Control. Background: Recently, many issues regarding the Smart TV are arising due to the rising complexity of features in a Smart TV. One of the specific issues involves what type of controller must be utilized in order to perform regulated tasks. This study examines the ongoing trend of the controller. Method: The selected participants had experiences with the Smart TV and were 20 to 30 years of age. A pre-survey determined the first independent variable of five tasks(Live TV, Record, Share, Web, App Store). The second independent variable was the type of controllers(Conventional, Mouse, Voice-Based Remote Controllers). The dependent variables were preference, task completion time, and error rate. The experiment consist a series of three experiments. The first experiment utilized a uni-modal Controller for tasks; the second experiment utilized a dual-modal Controller, while the third experiment utilized a triple-modal Controller. Results: The first experiment revealed that the uni-modal Controller (Conventional, Voice Controller) showed the best results for the Live TV task. The second experiment revealed that the dual-modal Controller(Conventional-Voice, Conventional-Mouse combinations) showed the best results for the Share, Web, App Store tasks. The third experiment revealed that the triple-modal Controller among all the level had not effective compared with dual-modal Controller. Conclusion: In order to control simple tasks in a smart TV, our results showed that a uni-modal Controller was more effective than a dual-modal controller. However, the control of complex tasks was better suited to the dual-modal Controller. User preference for a controller differs according the Smart TV functions. For instance, there was a high user preference for the uni-Controller for simple functions while high user preference appeared for Dual-Controllers when the task was complex. Additionally, in accordance with task characteristics, there was a high user preference for the Voice Controller for channel and volume adjustment. Furthermore, there was a high user preference for the Conventional Controller for menu selection. In situations where the user had to input text, the Voice Controller had the highest preference among users while the Mouse Type, Voice Controller had the highest user preference for performing a search or selecting items on the menu. Application: The results of this study may be utilized in the design of a controller which can effectively carry out the various tasks of the Smart TV.

Study on the Hybrid HRN Algorithm for Efficient Elevator Boarding Considering the Users' Waiting Time (사용자의 효율적인 엘리베이터 탑승 대기시간을 위한 Hybrid HRN Algorithm 연구)

  • Baek, Jin-Woo;Yeom, Gi-Hun;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.45-55
    • /
    • 2022
  • Currently, the Collective Control Algorithm is the most popular elevator algorithm. The Collective Control Algorithm allows the user to use the elevator when the direction of movement of the elevator and the direction of the user's destination are the same. However, the algorithm has a problem in that only one elevator responds to a user's call when the user's waiting time and using multiple elevators. To solve this problem, this paper proposes a new hybrid HRN algorithm based on the highest response ratio next (HRN) algorithm. In general, HRN Algorithm requires a user's boarding time and getting off time, but due to the nature of the elevator, it is difficult to predict the user's call in advance. Therefore, to overcome these limitations, this paper proposes Hybrid HRN Algorithm that considers the distance between the user's call location and the arrival location. This paper shows that Hybrid HRN Algorithm, proposed through experiments, has an average waiting time of 23.34 seconds, a standard deviation of 11.86, a total moving distance of 535.2m, a total operating time of 84sec, and a driving balance between the two elevators is 92m, which is superior to the previously suggested Collective Control, Zoning, and 3-Passage Algorithm.

An Access Control Model For The Authority Filtering in the Distributed Environment (분산환경에서의 권한필터링을 위한 접근제어 모델)

  • Min, Byong-Seok;Cho, Tae-Kyung;Shim, Won-Bo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.2
    • /
    • pp.250-256
    • /
    • 2007
  • Role-based Access Control (RBAC) model appears to be the most appropriate technique for access control to minimize the errors likely to occur in managing users and network resources. In this paper, we introduced the Work-concept RBAC model that is the result of the Work concept imported to the role based access control model. Using our extended access control model a user could select a work which is more abstract and more inclusive concept than role to do his work. Additionally even if the user has an authority through selecting a work, if a user has no relation to his assigned job, it will be automatically prohibited.

  • PDF

Automatic Generation of the Control Line Using Polygon based Vertex Search for Field-based Morphing (다각형 기반 정점 탐색에 의한 필드 기반 모핑의 제어선 자동 생성)

  • 이형진;김형민;곽노윤
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.377-384
    • /
    • 2004
  • The field based morphing requires the user to set most of the control lines manually which requires much time and skill to get satisfactory results. This thesis proposes a method to acquire semi-automation of image morphing through first acquiring shape information from the source image and the target image, then after the user manually designates the least amount of a pair of feature points, these are used as standards for polygon based vertex search to set the appropriate control line to the source mage and target image, and then using the ratio of control line lengths and space. Using the proposed method, the user can reduce the time setting the control line and unskilled persons can get natural image morphing results while designating the least amount control line.

  • PDF

DEVELOPMENT OF THE SOFTWARE FOR 30INCH TELESCOPE CONTROL SYSTEM AT KHAO (경희대학교 천문대 30인치 주망원경 TCS 소프트웨어 개발)

  • Mun, B.S.;Kim, S.J.;Jang, M.;Min, S.W.;Seol, K.H.;Moon, K.S.
    • Publications of The Korean Astronomical Society
    • /
    • v.21 no.2
    • /
    • pp.81-86
    • /
    • 2006
  • Even though 30inch optical telescope at Kyung Hee Astronomy Observatory has been used to produce a series of scientific achievements since its first light in 1992, numerous difficulties in operating of the telescope have hindered the precise observations needed for further researches. Since the currently used PC-TCS(Personal Computer based Telescope Control System) software based on ISA-bus type is outdated, it doesn't have a user friendly interface and make it impossible to scale. Also accumulated errors which are generated by discordance from input and output signals into a motion controller required new control system. Thus we have improved the telescope control system by updating software and modifying mechanical parts. We applied a new BLDC(brushless DC) servo motor system to the mechanical parts of the telescope and developed a control software using Visual Basic6.0. As a result, we could achieve a high accuracy in controlling of the telescope and use the user friendly GUI(Graphic User Interface).

An Implementation of Embedded SIP User Agent under Wireless LAN Area (Wireless LAN 환경에서 임베디드 SIP User Agent 구현)

  • Park Seung-Hwan;Lee Jae-Heung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.493-497
    • /
    • 2005
  • This paper is about the research of the User Agent implementation under wireless embedded environment, using SIP which is one of protocol components construct the VoIP system. The User Agent is made of the User Agent configuration block, the device thread block to control devices and the SIP stack block to process SIP messages. The device thread consists of the RTP thread and the sound lard device processing block. Futhermore, the SIP stack consist of the worker thread to process proxy events, the SIP transceiver and SIP thread to transfer and receive SIP messages. The H/W platform is a board included the Intel's XScale PXA255 processor, flash memory, SDRAM, Audio CODEC module and wireless LAN threough PCMCIA socket, furthermore a microphone and headphone is used by the audio 1/0. The system has embedded linux kernel 2.4.19. For embedded environment, the function of User Agent and SIP method is diminished. Finally, the resource of system could be reduced about $12.9\%$, compared to overall system resource, by minimizing peripherals control and excepting TCP.

Organization of Sensor System and User's Intent Detection Algorithm for Rehabilitation Robot (보행보조 재활로봇의 센서 시스템 구성 및 사용자 의도 감지 알고리즘)

  • Jung, Jun-Young;Park, Hyun-Sub;Lee, Duk-Yeon;Jang, In-Hun;Lee, Dong-Wook;Lee, Ho-Gil
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.10
    • /
    • pp.933-938
    • /
    • 2010
  • In this paper, we propose the organization of a sensor system and user's intent detection algorithm for walking assist rehabilitation robots. The main purpose of walking assist rehabilitation robots is assisting SCI patients to walk in normal environment. To use walking assist rehabilitation robot in normal environment, it is needed to consider various factors about user's safety and detection of user's intent and so on. For these purposes, we have analyzed the use case of rehabilitation robots and organized the system of sensors for walking assist rehabilitation robots and finally, we have developed the algorithm which is used to detect user's intent for those. We applied our proposal method in the rehabilitation robot, ROBIN, and verified their effectiveness by normal, not patient.

User Identification and Entrance/Exit Detection System for Smart Home (지능형 홈을 위한 사용자 식별 및 출입 감지 시스템)

  • Lee, Seon-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.248-253
    • /
    • 2008
  • This paper presents a sensing system for smart home which can detect an location transition events such as entrance/exit of a member and identify the user in a group at the same time. The proposed system is compose of two sub-systems; a wireless sensor network system and a database server system. The wireless sensing system is designed as a star network where each of sensing modules with ultrasonic sensors and a Bluetooth RF module connect to a central receiver called Bluetooth access point. We propose a method to discriminate a user by measuring the height of the user. The differences in the height of users is a key feature for discrimination. At the same time, the each sensing module can recognize whether the user goes into or out a room by using two ultrasonic sensors. The server subsystem is a sort of data logging system which read the detected event from the access point and then write it into a database system. The database system could provide the location transition information to wide range of context-aware applications for smart home easily and conveniently. We evaluate the developed method with experiments for three subjects in a family with the installation of the developed system into a real house.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.