• Title/Summary/Keyword: User Life

Search Result 1,399, Processing Time 0.029 seconds

Study of Multi-Resident Location Tracking Service Model Based on Context Information (상황정보 기반의 다중 거주자 위치 추적 서비스에 관한 연구)

  • Won, Jeong Chang;Man, Ko Kwang;Chong, Joo Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.141-150
    • /
    • 2014
  • In recent years, because of the development of ubiquitous technology in healthcare research is actively progress. Especially, healthcare service area is change to home for the elderly or patients from hospital. The technology to identify residents in a home is crucial for smart home application services. However, existing researches for resident identification have several problems. In this case, residents are needed to attach of various sensors on their body. Also relating private life, it is difficult to apply to resident's environment. In this paper, we used constraint-free sensor and unconscious sensor to solve these problems and we limited using of sensor and indoor environment in the way of working economical price systems. The way of multi-resident identification using only these limited sensors, we selected elements of personal identifications and suggested the methods in giving the weight to apply these elements to systems. And we designed the SABA mechanism to tract their location and identify the residents. It mechanism can distinguish residents through the sensors located each space and can finally identify them by using the records of their behaviors occurred before. And we applied the mechanism designed for applications to approve this location tracking system. We verified to the location tracking system performance according to the scenario.

The analysis of Complex Type and the Facility Status of Community Mixed-support Facility (공동체복합지원시설의 시설현황 및 복합유형 분석)

  • Kim, Sumi;Kim, Suk-Young
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.507-517
    • /
    • 2013
  • Welfare desire has been diversified according to the increase of economic level and rapid social change. The desire for comprehensive service on culture, medical, mental and information level has appeared. Accordingly, it is necessary to establish an integrated community mixed-support facility, a space of accepting administration, welfare, leisure, culture and informatization request in a small local community in the future. The community mixed-support facility is a meeting place of local resident for information change, various basic service and ultimately for activation of community in order to contribute to regeneration and activation of existing urban core. Thus, this study figured out general status of community mixed-support facility and physical mixed type and analyzed spatial characteristics. Current community mixed-support facility has insufficient program and space to participate in by local residents and to accommodate mixed function. The future planned community mixed-support facility must secure multiple opportunities for various types of life by returning time and cost to user through the introduction of creative mixed concept. While reflecting unique local characteristics, and considering diversity of users, it needs to make mixed facility to cope with social changes. This study is limited in that the study reached a conclusion by survey and analysis only. However, it is expected that the result can be used as basic research data for the planning of community mixed-support facility to cope with living conditions of local residents or realistic requirements.

An Analysis of Optimal Sequences for the Detection of Wake-up Signal in Disaster-preventing Broadcast (재난방송용 대기모드 해제신호 검출을 위한 최적 부호 성능 분석)

  • Park, Hae Yong;Jo, Bonggyun;Kim, Heung Mook;Han, Dong Seog
    • Journal of Broadcast Engineering
    • /
    • v.19 no.4
    • /
    • pp.491-501
    • /
    • 2014
  • Recently, the need for disaster-preventing broadcast has increased gradually to cope with natural disaster like earthquake and tsunami causing enormous losses of both life and property. In disaster-preventing broadcast system, the wake-up signal is used to alert user terminal and switch the current state of channel to the emergency channel, which is for the fast and efficient delivery of emergency information. In this paper, we propose the detection method of wake-up signal for disaster-preventing broadcast systems. The wake-up signals for disaster-preventing broadcast should have a good auto-correlation property in low power and narrow-band conditions that does not affect the existing digital television (DTV) system. The suitability of the m-sequence and complementary code (CC) is analyzed for wake-up signals according to signal to noise ratio. A wake-up signal is proposed by combining the direct sequence spread spectrum (DSSS) technique and pseudo noise (PN) sequences such as Barker and Walsh-Hadamard codes. By using the proposed method, a higher detecting performance can be achieved by the spreading gain compared to the single long m-sequence and the Golay code.

A Study on the Behavioral Characteristics of the Users and Preferences of the Bench and Pergolas in Busan Citizens' Parks (부산시민공원의 벤치 및 파고라 이용자 행태 특성 및 선호도 연구)

  • Wang, Dan;Yoon, Ji-Young
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.658-670
    • /
    • 2018
  • Busan Citizen Park has been taken as the research object in this paper to learn about the categories and types of resting facilities such as seats and Pergolas in the park and analyze the visitors' use patterns of bench and Pergolas. In addition, the analysis of the cultural features and preferences of bench and Pergolas will provide the basic data for the future design of resting facilities. After the research on the categories and types of bench and Pergolas and the evaluation factors through literature surveys, the type, location, and number of resting facilities including bench, Pergolas, sheds, etc. in the entire park have been investigated through field surveys. In addition, the behavioral map analysis has been created through the observation of the use patterns of bench and Pergolas in the morning and afternoon of each month, and the degree of preference and satisfaction of park bench and Pergolas has been grasped through questionnaires. The research results are as follows. Among the ten types of bench and Pergolas, the citizens like the mats and awnings + mats best. The environment is the most important factor for the mats with highest score, followed by the functional and regional factors. In addition, various activities such as eating in mats and sheds that block sunlight are Korean use patterns, which is very common in Korean daily life. These results show that bench and Pergolas in urban parks are not placed arbitrarily and the layout and design of bench and Pergolas should be completed based on behavior and preferences, which are influenced by cultural characteristics.

A Test Case Prioritization Technique via Value-Based Approach (가치기반 접근법을 통한 테스트 케이스 우선순위 기법)

  • Park, Hyun-Cheol;Ryu, He-Yeon;Baik, Jong-Moon
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.5
    • /
    • pp.353-360
    • /
    • 2009
  • Software, once developed, has a long life and evolves through numerous additions and modifications because of the faults, the changes in user requirements, the changes in environments, and so forth. With the evolution of the software, assuring the quality of the software is getting more difficult because of numerous versions of the software. Meanwhile, regression testing has been used to support the software testing activities and assure acquiring appropriate quality through several versions of software. Regression testing, however, is too expensive because it requires lots of test cases executions and the number of test cases increases sharply as the software evolves. For this reason, several techniques are suggested to help conducting regression testing then test case prioritization technique is understood the most effective and efficient technique to support regression testing. In this paper, we propose an approach, Historical Value-Based Approach, which is based on the use of historical information to estimate the current cost and fault severity for cost-cognizant test case prioritization. As a result of the proposed approach, software testers who perform regression testing prioritize their test cases more effectively so that the test effectiveness of them can be improved in terms of APFDc.

Analysis the Types of Consumer Damages Incurred by Using a Digital Contents (디지털콘텐츠 소비자 피해유형 분석)

  • Nam, Su-Jung;Lee, Eun-Hee;Park, Sang-Mi
    • Korean Journal of Human Ecology
    • /
    • v.16 no.6
    • /
    • pp.1197-1209
    • /
    • 2007
  • The advance of digital contents industry shifts the focus of consumptions; from analogue to digital ones. It gives significant impact on individual life as well as overall society and culture, and it leads to the increased consumption of digital contents. Nevertheless, current digital contents industry fails to secure the sufficient consumer protection systems including relevant rules and laws which regulate the distribution, use, and other transaction activities of digital contents and the efforts, on the part of contents providers, to provide information to consumers and to protect them. Digital contents, by its nature, is different from the existing products so that its nature is likely to cause unique consumer problems totally different from the offline transactions and the electrical transactions of existing products. This study, therefore, aims to identify the possible problems which may be incurred by consumers in their use of digital contents, specify the types of consumer damages, and provide the underlying materials to improve the systems related to digital contents and take legally complementary measures for consumer protection. To identify the types of consumer damages, this study analyzed the results from consumer counselling cases, experts opinion survey, and FGI. For consumer damage cases, this study analyzed the consumer complaints received by open consumer counselling sites of the Korea Consumer Agency and Seoul Electronic Commerce Center. For experts opinion survey, it conducted questionnaire survey of the group of experts from digital contents manufacturers or providers, and those who treated consumer damages directly. For FGI analysis, it organized a panel of students and employees who had used digital contents to understand the types of consumer damages. The results of this study can be summed up as follows. Based on the results from consumer counselling cases, experts opinion survey, and FGI analysis, the consumer damages related to digital contents can be classified, in their nature, into economic or financial damages (25 cases), emotional or psychological ones (15 cases), time-related ones (7 cases), physical ones (4 cases), and privacy-related ones (i.e. leakage of personal data)(3 cases). More specifying the types of damages, damages can be subdivided into contract-, charge-, maintenance-, use-, individual-related ones and other ones. Among them, both contract- and charge-related damages appeared only in the economic or financial damages, whereas user-specific individual damages appeared only in physical and emotional or psychological ones. On the other hand, maintenance- and use-related damages and other ones were observed in both categories of economical or financial damages and time-related ones. Use- and privacy-related damages, in particular, caused emotional or psychological damages.

A Study on User's Acceptance of Blockchain-based Copyright Distribution Platforms and Its Usage (소비자의 블록체인 기반 저작권 유통 플랫폼 수용의도와 이용행위에 관한 연구)

  • Yoo, Young-Hwan;Park, Hyeon-Suk
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.3
    • /
    • pp.59-72
    • /
    • 2019
  • Purpose - Blockchain technology, which has the characteristics of credibility, security, integrity and decentralization, has brought innovation to internet platforms that mediate peer to peer transactions, as well as changes to the contents distribution services. Blockchain-based copyright distribution platforms can solve problems which have been articulated on prior internet social networks: increased market dominance of platform business because of centralization with no reward to creators who upload on platforms, and lack of fairness, such as unfair profit distribution between the copyright holder and businesses. With this background, the current research confirmed the factors that affect the intention of usage and behaviors, targeting potential users of blockchain-based copyright distribution platforms. Research design, data, and methodology - Centered around the UTAUT2 Model, the research model was designed with 'Perceived Security' added as Construct, and 'Age' and 'Knowledge Level' added as moderating variables. For data, 607 responses were collected by an online survey, and 601 responses were included in the final analysis. We analyzed the research model and sample by using SPSS 23.0 and AMOS 23.0 on the collected responses. Results - First, results of research on whether Constructs make positive effects on Intention of use is: social influence, facilitating conditions, habit, and perceived security had positive effects on intention of use, and performance expectancy, effort expectancy, hedonic motivation, and economic value did not. Second, results of the research on whether facilitating condition, habit, and intention of use made an impact on using behaviors, it was shown that only habit and intention of use made positive effects. Third, in two groups divided by age above or under 40, group effort expectancy, intention of use, habit, and intention of use had controlling effects, and facilitating condition, intention of use, perceived security, and intention of use had effects in both groups. Conclusions - The research shows that no matter how great a blockchain-based platform is, if advantages of blockchain are not proved in various industries and utilized in real life like the internet, blockchain-based distribution systems will develop slowly. Rather than a short-term inducement emphasizing technology, there is a need for a strategic approach that can foster the environment.

Complexity Metrics for Analysis Classes in the Unified Software Development Process (Unified Process의 분석 클래스에 대한 복잡도 척도)

  • 김유경;박재년
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.71-80
    • /
    • 2001
  • Object-Oriented (OO) methodology to use the concept like encapsulation, inheritance, polymorphism, and message passing demands metrics that are different from structured methodology. There are many studies for OO software metrics such as program complexity or design metrics. But the metrics for the analysis class need to decrease the complexity in the analysis phase so that greatly reduce the effort and the cost of system development. In this paper, we propose new metrics to measure the complexity of analysis classes which draw out in the analysis phase based on Unified Process. By the collaboration complexity, is denoted by CC, we mean the maximum number of the collaborations can be achieved with each of the collaborator and detennine the potential complexity. And the interface complexity, is denoted by IC, shows the difficulty related to understand the interface of collaborators each other. We prove mathematically that the suggested metrics satisfy OO characteristics such as class size and inheritance. And we verify it theoretically for Weyuker' s nine properties. Moreover, we show the computation results for analysis classes of the system which automatically respond to questions of the it's user using the text mining technique. As we compared CC and IC to CBO and WMC, the complexity can be represented by CC and IC more than CBO and WMC. We expect to develop the cost-effective OO software by reviewing the complexity of analysis classes in the first stage of SDLC (Software Development Life Cycle).

  • PDF

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.