• Title/Summary/Keyword: User Group

Search Result 1,686, Processing Time 0.037 seconds

Design of Intersection Simulation System for Monitoring and Controlling Real-Time Traffic Flow (실시간 교통흐름의 모니터링 및 제어를 위한 교차로 시뮬레이션 시스템 설계)

  • Jeong Chang-Won;Shin Chang-Sun;Joo Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.85-97
    • /
    • 2005
  • In this paper, we construct the traffic information database by using the acquired data from the traffic information devices installed in road network, and, by referring to this database, propose the intersection simulation system which can dynamically manage the real-time traffic flow for each section of road from the intersections, This system consists of hierarchical 3 parts, The lower layer is the physical layer where the traffic information is acquired on an actual road. The traffic flow control framework exists in the middle layer. The framework supports the grouping of intersection, the collection of real-time traffic flow information, and the remote monitoring and control by using the traffic information of the lower layer, This layer is designed by extending the distributed object group framework we developed. In upper layer, the intersection simulator applications controlling the traffic flow by grouping the intersections exist. The components of the intersection application in our system are composed of the implementing objects based on the Time-triggered Message-triggered Object(TMO) scheme, The intersection simulation system considers the each intersection on road as an application group, and can apply the control models of dynamic traffic flow by the road's status. At this time, we use the real-time traffic information collected through inter-communication among intersections. For constructing this system, we defined the system architecture and the interaction of components on the traffic flow control framework which supports the TMO scheme and the TMO Support Middleware(TMOSM), and designed the application simulator and the user interface to the monitoring and the controlling of traffic flow.

  • PDF

HTTP Adaptive Streaming Method for Service-compatible 3D Contents Based on MPEG DASH (MPEG DASH 기반 service-compatible 3D 콘텐츠 대상 HTTP adaptive streaming 적용방안)

  • Park, Gi-Jun;Lee, Gil-Bok;Lee, Jang-Won;Kim, Kyu-Heon
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.207-222
    • /
    • 2012
  • Recently, many consumer electronics manufacturers have produced 3D devices such as 3DTVs and 3D monitors as interests in a stereoscopic video service are getting increased. However, most of 3D services are focused on local storage or bandwidth guaranteed service since 3D stereoscopic video service require bandwidth more stable and larger. This property causes difficulties in seamless stereoscopic video streaming services under IP based open network environment that cannot guarantee quality of services. In order to achieve a seamless video streaming service the international standard organization MPEG (Moving Pictures Experts Group) has developed the adaptive HTTP streaming technology called as DASH (Dynamic Adaptive Streaming over HTTP). However, the DASH doesn't have obvious scheme which can express the two elementary video streams based service-compatible stereoscopic contents in one segment. Therefore, this paper proposes a scheme of efficient 3D adaptive streaming service based on the DASH, which covers not only frame-packing stereoscopic contents but also service-compatible ones. The 3D adaptive HTTP streaming scheme introduced in this paper is able to provide 3D contents with various qualities to user and also has benefit that single 3D content can be applied to a variety of devices.

A Study on the Natural Mapping between Burner and Switch of Gas Range by Color coding (가스레인지에 있어서 칼라코딩을 통한 버너와 스위치의 자연적 대응에 관한 연구)

  • 오해춘;홍지영
    • Archives of design research
    • /
    • v.16 no.2
    • /
    • pp.415-424
    • /
    • 2003
  • People store information not only in their Drain but also material things. Norman called it knowledge in the world. The general way to store the information is to paste labels. 4 burner gas range force user to make conceptual model between burner and switch to see labels. but those are cognitive stress. Norman suggested spatial analogies for natural mapping between display and control. However the way of his methods in spatial analogies was not compatible with kitchen atmosphere. To solve those problems 1 suggested color coding . This study hypothesized that the mapping between burner and switch is realized by color coding. To testy the hypothesis 1 compared A group using general gas range with B group using color coded gas range. The result showed difference between A and B in accuracy ( F (1, 38) = 17.892, p < 0.01) and response time ( F (1, 38) = 6.726 p < 0.05). The result of this test is to certify that color coding affect peoples by presenting the difference accuracy and response time. As result this study presents that color coding can be compatible the product having importance to certify in the design process.

  • PDF

A Study Funology for Reformatting to App Book: Focused on 'Moo, Baa, La La La!' of App Book (앱북(App Book)으로의 매체 전환을 위한 퍼놀로지(Funology)에 관한 연구: '무, 바, 라라라!(Moo, Baa, La La La!)' 앱북(App Book)을 중심으로)

  • Kwon, Jieun;Kim, Boyoung
    • Cartoon and Animation Studies
    • /
    • s.30
    • /
    • pp.221-243
    • /
    • 2013
  • Recently, traditional books based on printing on the paper have expanded to e-book media in smart device because of developing digital technology. Especially, app book applied application makes users' experience increase and provides immersion to them, because it allows them basically delivering information, educational effect and fun elements with multimedia technology. There are various experimental trials to make enhance effect of reformatting for application media. The purpose of this study is to analyze reformatting effect for app book with funology which is convergence of digital technology and a fun. Then this article would provide design guide and be applied to new application contents. For this research, the first of all, we would discuss concept and elements of funology by publication including thesis, articles, and books. Secondly, this article will be focused on 'Moo, Baa, La La La!' which is reformatting application for iPad to analyze type of funology. Thirdly, we would make sure that app book makes users get emotional effect comparing original book by FGI(Focus Group Interview). In conclusion, sensitive funology used the sound allows user emotional effect and they prefer to intuitive and immediate motion and response of interactive funology. In other way, funology of fun in itself which is strong concept in original book diminishes in app book. Then users concentrate interactive factors like game structure. This results make that app books could be created by strength of original contents and advantage of funology. Therefore this makes us expect the possibility of reformatting effect with funology and we need to discuss the points of issue that there are considerations and limitations to successful app book for users.

A Study on the Teaching of SW coding by Design-Thinking 5 Step Maker Model (Design-Thinking 5 Step 메이커 모형 적용 SW코딩 교수학습에 대한 연구)

  • Kim, Myung-sook;Chung, Jong-In;Kim, Chang-Suk;Kang, Shin-Cheon;Kim, Eui-jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.309-313
    • /
    • 2018
  • Maker Activity based Design-Thinking 5 Step is a better experience for providing the public with a better approach to design by sympathizing with human needs and exploring the public's potential desires. This paper studied the teaching method by applying the value of the Maker Training that emphasizes the importance of sharing and opening results with others after creating them based on the ideas of the learners using different tools, the basic mind of Design-Thinking with the observation and empathy about human beings and the derivation of user-centric results to the SW coding curriculum. For this purpose, we studied teaching methods by Design-thinking based on sections that require coding in the information classes of the secondary school curriculum. We demonstrated the class to a group of education experts by applying the syllabus of instruction. Then we collected evaluations and opinions of the experts and we modified the syllabus to reflect the collected assessment. Under the Design-thinking 5 step foundation, classes were demonstrated with a group of education experts, opinions collected, and suggestions collected were reflected on the assessment outcome. I think that It is an effective training opportunity to practice a widespread idea that enables infinite thinking and a convergence of thinking that brings out the best decision from a widespread idea.

  • PDF

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

Content Insertion Technology using Mobile MMT with CMAF (CMAF 기반 Mobile MMT를 활용한 콘텐츠 삽입 기술)

  • Kim, Junsik;Park, Sunghwan;Kim, Doohwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.25 no.4
    • /
    • pp.560-568
    • /
    • 2020
  • In recent years, as network technology develops, the usage of streaming services by users is increasing. However, the complexity of streaming services is also increasing due to various terminal environments. Even when streaming the same content, it is necessary to re-encode the content according to the type of service. In order to solve the complexity and latency of the streaming service, Moving Picture Experts Group (MPEG) has standardized the Common Media Application Format (CMAF). In addition, as content transmission using a communication network becomes possible, the Republic of Korea's Ultra High Definition (UHD) broadcasting standard has been enacted as a hybrid standard using a broadcasting network and a communication network. The hybrid service enables various services such as transmitting additional information of contents or providing user-customized contents through a communication network. The Republic of Korea's UHD transmission standard utilizes MPEG Media Transport (MMT), and Mobile MMT is an extension of MMT to provide mobile network-specific functions. This paper proposes a method of inserting CMAF contents suitable for various streaming services using signaling messages of MMT and Mobile MMT. In addition, this paper proposes a model for content insertion system in heterogeneous network environment using broadcasting and communication networks, and verifies the validity of the proposed technology by checking the result of content insertion.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

DOVE : A Distributed Object System for Virtual Computing Environment (DOVE : 가상 계산 환경을 위한 분산 객체 시스템)

  • Kim, Hyeong-Do;Woo, Young-Je;Ryu, So-Hyun;Jeong, Chang-Sung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.120-134
    • /
    • 2000
  • In this paper we present a Distributed Object oriented Virtual computing Environment, called DOVE which consists of autonomous distributed objects interacting with one another via method invocations based on a distributed object model. DOVE appears to a user logically as a single virtual computer for a set of heterogeneous hosts connected by a network as if objects in remote site reside in one virtual computer. By supporting efficient parallelism, heterogeneity, group communication, single global name service and fault-tolerance, it provides a transparent and easy-to-use programming environment for parallel applications. Efficient parallelism is supported by diverse remote method invocation, multiple method invocation for object group, multi-threaded architecture and synchronization schemes. Heterogeneity is achieved by automatic data arshalling and unmarshalling, and an easy-to-use and transparent programming environment is provided by stub and skeleton objects generated by DOVE IDL compiler, object life control and naming service of object manager. Autonomy of distributed objects, multi-layered architecture and decentralized approaches in hierarchical naming service and object management make DOVE more extensible and scalable. Also,fault tolerance is provided by fault detection in object using a timeout mechanism, and fault notification using asynchronous exception handling methods

  • PDF

The Antecedents of Need for Self-Presentation and the Effect on Digital Item Purchase Intention in an Online Community (온라인 커뮤니티에서 자기표현욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과)

  • Koh, Joon;Shin, Seon-Jin;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.117-144
    • /
    • 2008
  • Lots of virtual communities and online businesses presently derive their primary sources of revenues through advertising, but nevertheless are plagued with marginal profitability though they might possess a significant user base. In the light of the need for an efficacious business model, there have been recent insights of an online community in particular reaping profits through an innovative and lucrative revenue generation method that earns by selling digital items. There have been some obvious evidences (e.g., Cyworld, SecondLife, Habo Hotel, etc.) that online communities can be profitable through their unique business model of selling digital items. However, there is lack of understanding about the motivation of purchasing digital items. This study tries to identify the main motivators of digital item purchases based on social/individual identity theory and self-presentation theory. "Digital items", otherwise known as "virtual assets", may include online avatars, accessories for the avatars, decorative ornaments like furniture, digital wallpapers, skins, background music and virtual weapons used for Internet games. These digital items are employed by users for representation and articulation in the online space, especially to create and enhance their online profiles in web pages and games. Prices for digital items typically range from a few cents to a few dollars each. Based on the theoretical framework like social identity theory and self-presentation theory, we developed the research model and proposed seven hypotheses. An analysis of 225 members of Cyworld found that digital item purchase intention in virtual world is affected by both members' need for self-presentation and need for affiliation. We also found that the need for self-presentation is significantly increased by innovativeness of members, community group norm, and community involvement. We concluded that the need for self-presentation could be a key variable for profitable business model in online community service industry. However, neither individual self-efficacy nor the need for affiliation significantly influenced the need for self-presentation which triggers purchase intention of digital items. In term of the theoretical and practical contribution, this study can be a pioneering empirical research that investigates the purchase intention of digital items based on social identity theory and self-presentation theory in the online context. Also, the findings of our study are valuable and practical for practitioners in the market who wish to adopt or improve the business model of selling digital items in an online community. From the findings, it can be seen that innovativeness of users, community group norm, and community involvement are three significant factors that influence need for self-presentation of users which ultimately leads to their intentions to buy digital items. These findings put forth that virtual community providers and online businesses selling digital items should prioritize their efforts and focus on these three factors if they want to increase the sales of these digital items and generate greater revenues. This study provides important implications for academic researchers and practitioners to understand why the community members pay money for their digital items in virtual world and how the practitioners can increase the sales of digital items in an online community. A couple of limitations of the study and future research directions are also discussed.