• 제목/요약/키워드: Users' Response-based

검색결과 416건 처리시간 0.025초

길찾기(Wayfinding) 관련 국내 연구동향 분석 (Analysis of Research Trend on Wayfinding Issues in Korea)

  • 김영주
    • 한국실내디자인학회논문집
    • /
    • 제24권6호
    • /
    • pp.38-46
    • /
    • 2015
  • The purpose of this study was to identify the research trend through content analysis of the previous researches on wayfinding issues in the field of spatial design in Korea. Total 91 research articles published in domestic academic journals from 1991 to 2015 were collected through the online search and analyzed using descriptive statistics. As conceptual framework for content analysis, research article publication year, academic field based on journal title, research methodology, target space for analysis, and type of research purpose were included. The major findings were as follows. Substantially, wayfinding research in Korea was begun in 1990s and was peaked in the latter half of 2010s. Healthcare facilities including hospitals and nursing homes were most frequently analyzed as target space, i.e., research subject. Majority of the researches analyzed were published in the diverse journals of design area. In many cases, qualitative research methods such as spatial construction analysis using Space Syntax, field study, observation, interview, etc were used by the researchers frequently. It was found that the majority of researchers focused on behavioral and psychological response of space users in the process of wayfinding. For further study, it is recommended to extend the scope of analysis to sign system which support effective wayfinding. In addition, foreign academic journal articles should be included for in-depth analysis.

리눅스 기반 침입 방지를 위한 로그 분석 방법 연구 (Methodology of Log Analysis for Intrusion Prevention based on LINUX)

  • 임성화;이도현;김점구
    • 융합보안논문지
    • /
    • 제15권2호
    • /
    • pp.33-41
    • /
    • 2015
  • 보안성 향상을 위한 안전한 리눅스 시스템은 자료의 불법적인 유출과 위 변조를 막고 사용 원칙에 위배되는 행위의 추적을 위한 감사(audit)능력을 가지고 있어야 한다. 또한 시스템 관리 및 운영자의 책임과 사용자의 행위를 명확히 구분 지울 수 있는 로그관리가 반드시 이루어 져야 할 것이다. 본 논문에서는 리눅스 시스템의 보안 로그를 분석하여 침입차단 및 탐지에 활용하는 방법을 제안하였다. 이를 통해 시스템의 침입차단 상태와 침입탐지 상태, 그리고 파일 시스템의 무결성 변화를 실시간 확인하여 신속히 시스템의 문제를 해결할 수 있어 시스템의 신뢰성 향상에 크게 기여하게 될 것이다.

Compensation for Photovoltaic Generation Fluctuation by Use of Pump System with Consideration for Water Demand

  • Imanaka, Masaki;Sasamoto, Hideki;Baba, Jumpei;Higa, Naoto;Shimabuku, Masanori;Kamizato, Ryota
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.1304-1310
    • /
    • 2015
  • In remote islands, due to expense of existing generation systems, installation of photovoltaic cells (PVs) and wind turbines has a chance of reducing generation costs. However, in island power systems, even short-term power fluctuations change the frequency of grids because of their small inertia constant. In order to compensate power fluctuations, the authors proposed the power consumption control of pumps which send water to tanks. The power control doesn’t affect water users’ convenience as long as tanks hold water. Based on experimental characteristics of a pump system, this paper shows methods to determine reference power consumption of the system with compensation for short-term PV fluctuations while satisfying water demand. One method uses a PI controller and the other method calculates reference power consumption from water flow reference. Simulations with a PV and a pump system are carried out to find optimum parameters and to compare the methods. Results show that both PI control method and water flow calculation method are useful for satisfying the water demand constraint. The water demand constraint has a little impact to suppression of the short-term power fluctuation in this condition.

게임 '하스스톤'의 창조적·문화적인 한국어 의역에 대하여 (Creative and Cultural Free Korean Translation in the Game 'Hearthstone')

  • 원호혁;구본혁;김형엽
    • 한국게임학회 논문지
    • /
    • 제20권2호
    • /
    • pp.163-182
    • /
    • 2020
  • 본 연구는 '블리자드(Blizzard)'사(社)의 게임 '하스스톤(Hearthstone)'에 적용된 창조적·문화적 의역에 대해 확인하고 이에 대한 수용자들의 반응을 고찰하고자 한다. 본 연구에서는 의역의 기법에 대해 고찰한 뒤 다양한 의역 번역 전략이 '하스스톤'에 어떻게 적용되었으며 의역된 번역어들에 대한 수용자의 반응을 설문조사를 통해 확인하였다. 그 결과 수용자들은 번역어가 원어의 의미와 멀지 않은 번역을 선호했으나 대체할 적절한 단어가 없는 경우에는 다소 의미에 거리가 있어도 번역을 수용했다.

온라인 금융 상담 서비스에서 이모티콘 사용이 서비스 사용의도에 미치는 영향: 상담원 유형과 주관적 금융지식의 조절 효과 (Effects of Emoticons on Intention to Use in Online Financial Counseling Service: Moderating Roles of Agent Type and Subjective Financial Knowledge)

  • 강영선;최보름
    • 지식경영연구
    • /
    • 제20권4호
    • /
    • pp.99-118
    • /
    • 2019
  • Online financial counseling services are increasingly expanding with the rise of artificial intelligence-based chatbots. It is very important to examine the effects of emoticons noted as alternatives for communicating emotions in online communication between consumers and companies. In this paper, we examine how the use of emoticons affects the consumer's response and investigate the moderating roles of type of counseling agents (human vs. chatbot) and the consumer's subjective financial knowledge. The results show that the use of emoticon in the conversation brings a positive effect on the consumer's intention to use of online chat counseling service. When participants had relatively low subjective financial knowledge, they had higher intention to use online chat counseling services with emoticons only when the agent type was chatbot. When the type of counseling agent was human, this positive effect of the emoticon did not occur. On the other hand, when participants had relatively high subjective financial knowledge, they had higher intention to use online chat counseling service with emoticons only when the agent type was human. This study contributes to providing practical implications to build online chat counseling service using chatbot in the financial industry by studying users' intention depending on the type of agents and the level of their subjective knowledge.

웹 클러스터 시스템의 실시간 서버 상태를 기반으로 한 부하분산 방안 (A Load Distribution Technique of Web Clustering System based on the Real Time Status of Real Server)

  • 윤천균
    • 정보처리학회논문지A
    • /
    • 제12A권5호
    • /
    • pp.427-432
    • /
    • 2005
  • 웹 클러스터 시스템에서 사용자들의 접속 요구를 효율적으로 real 서버에 분산시키기 위하여 기존의 부하분산 알고리즘들과 현재 많이 사용중인 WLC(Weighted Least Connection) 알고리즘에 대하여 연구하였다. 이 부하분산 알고리즘들은 서버들의 부정확한 부하상태 파악과 파악 시점에 문제가 있어 서버들 간에 부하 불균형이 발생함으로써 효율성이 저하된다. 본 연구에서는 사용자의 접속 요청 시 broadcasting RPC(Remote Procedure Call)를 이용하여 서버들의 다양한 부하상태를 실시간으로 파악하여 부하를 분산하는 알고리즘을 제안하고, prototype을 구현하여 성능을 실험하였다. 실험 결과, real 서버 간 부하 불균형 현상이 기존 방법에 비하여 크게 향상되었고, 응답시간이 단축되는 효과로 웹 클러스터 시스템의 성능이 향상되었다.

Service Scheduling in Cloud Computing based on Queuing Game Model

  • Lin, Fuhong;Zhou, Xianwei;Huang, Daochao;Song, Wei;Han, Dongsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1554-1566
    • /
    • 2014
  • Cloud Computing allows application providers seamlessly scaling their services and enables users scaling their usage according to their needs. In this paper, using queuing game model, we present service scheduling schemes which are used in software as a service (SaaS). The object is maximizing the Cloud Computing platform's (CCP's) payoff via controlling the service requests whether to join or balk, and controlling the value of CCP's admission fee. Firstly, we treat the CCP as one virtual machine (VM) and analyze the optimal queue length with a fixed admission fee distribution. If the position number of a new service request is bigger than the optimal queue length, it balks. Otherwise, it joins in. Under this scheme, the CCP's payoff can be maximized. Secondly, we extend this achievement to the multiple VMs situation. A big difference between single VM and multiple VMs is that the latter one needs to decide which VM the service requests turn to for service. We use a corresponding algorithm solve it. Simulation results demonstrate the good performance of our schemes.

초음파 센서를 이용한 트레드밀의 자동속도 제어시스템 (An Automatic Speed Control System of a Treadmill with Ultrasonic Sensors)

  • 마누룽 오라리우스;윤정원
    • 제어로봇시스템학회논문지
    • /
    • 제17권5호
    • /
    • pp.505-511
    • /
    • 2011
  • In this paper, we have developed an automatic velocity control system of a small-sized commercial treadmill (belt length of 1.2 m and width of 0.5 m) which is widely used at home and health centers. The control objective is to automatically adjust the treadmill velocity so that the subject's position is maintained within the track when the subject walks at a variable velocity. The subject's position with respect to a reference point is measured by a low-cost sonar sensor located on the back of the subject. Based on an encoder sensor measurement at the treadmill motor, a state feedback control algorithm with Kalman filter was implemented to determine the velocity of the treadmill. In order to reduce the unnatural inertia force felt by the subject, a predefined acceleration limit was applied, which generated smooth velocity trajectories. The experimental results demonstrate the effectiveness of the proposed method in providing successful velocity changes in response to variable velocity walking without causing significant inertia force to the subject. In the pilot study with three subjects, users could change their walking velocity easily and naturally with small deviations during slow, medium, and fast walking. The proposed automatic velocity control algorithm can potentially be applied to any locomotion interface in an economical way without having to use sophisticated and expensive sensors and larger treadmills.

무선 데이타 방송 환경에서 읽기-전용 트랜잭션 처리 기법 (Read-only Transaction Processing in Wireless Data Broadcast Environments)

  • 이상근;김성석;황종선
    • 한국정보과학회논문지:데이타베이스
    • /
    • 제29권5호
    • /
    • pp.404-415
    • /
    • 2002
  • 본 논문에서는, 무선 데이타 방송 환경에서 여러 데이타 항목을 지정된 순서에 의해 접근해야 하는 읽기-전용 트랜잭션의 일관성 유지와 관련된 주제를 다룬다. 데이타 방송 환경에서 사용자는 항상 순차적으로 데이타에 접근하게 된다. 이러한 속성을 가진 환경에서, 본 논문은 기선언-기반 질의 최적화 방식을 제안하며, 이를 이용하여 지역 캐쉬와 관련된 두 가지 트랜잭션 실행 기법을 개발하였다. 또한 제안된 기법들을 수학적으로 분석함으로써 성능을 평가하였다. 평가 결과에 의해, 본 논문에서 제안한 기선언 방식이 응답 시간을 상당히 단축시켰으며, 작업량이 동적으로 변하더라도 훨씬 더 잘 적응될 수 있음을 알 수 있다.

IoT 제품의 안전 관리를 위한 기술 및 정책적 사후 보안관리 프레임워크 (Technology and Policy Post-Security Management Framework for IoT Electrical Safety Management)

  • 이동혁;박남제
    • 전기학회논문지
    • /
    • 제66권12호
    • /
    • pp.1879-1888
    • /
    • 2017
  • The Internet of Things (IoT) environment has been gradually approaching reality, and although it provides great convenience, security threats are increasing accordingly. For the IoT environment to settle safely, careful consideration of information security is necessary. Although many security measures in the design and development stages of IoT products have been studied thus far, apart from them, the establishment of systems and countermeasures for post management after the launch of IoT products is also very important. In the present paper, a technical and policy post-security management framework is proposed to provide secure IoT environments. The proposed framework defines the concrete response procedures of individual entities such as users, manufacturers, and competent authorities in the case of the occurrence of security flaws after launching IoT products, and performs appropriate measures such as software updates and recalls based on an assessment of the risk of security flaws.