• 제목/요약/키워드: Users' behaviors

Search Result 653, Processing Time 0.028 seconds

Analysis Method on the Free Drop Impact Condition of Spent Nuclear Fuel Shipping Casks (자유낙하충격조건에 있는 사용후핵연료 운반용기의 충격해석방법 연구)

  • 이재형;이영신;류충현;나재연
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2001.11b
    • /
    • pp.766-771
    • /
    • 2001
  • The package used to transport radioactive materials, which is called by cask, must be safe under normal and hypothetical accident conditions. These requirements for the cask design must be verified through test or finite element analysis. Since the cost for FE analysis is less than one for test. the verification by FE analysis is mainly used. But due to the complexity of mechanical behaviors. the results depends on how users apply the codes and it can cause severe errors during analysis. In this paper, finite element analysis is carried out for the 9 meters free drop and the puncture condition of the hypothetical accident conditions using LS-DYNA3D and ABAQUS/Explicit. We have investigated the analyzing technique for the free drop impact test of the cask and found several vulnerable cases to errors. The analyzed results were compared with each other. We have suggested a reliable and relatively simple analysis technique for the drop test of spent nuclear fuel casks.

  • PDF

A Specifying Method for Real-Time Software Requirement

  • Kim, Jung-Sool
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.1
    • /
    • pp.1-6
    • /
    • 1999
  • This paper is on the analysis for the real-time software requirement. This method can be used for TNPN(Timed Numerical Peri Net) as a easy communication means with real-users. It is based on the RTTL(Real Time Temporal Logic) for correctness the system. TNPN is used to represent a behavior specification language, the validity of specified behaviors in TNPN is expressed in RTTL, and analyzed through the teachability graph. Thus, the requirement between user and system is satisfied Using the example of shared track, the validity of the property of real-time(safetiness, responsiveness, liveness, priority) is verified. Also this framework if given to connection with a object, natually.

  • PDF

Mixed reality multi-person interaction research based on the calibration of the HoloLens devices

  • Qin, Zi Jie;Li, Ao Xuan;Lim, Hyotaek;Lee, Byung Gook
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.9
    • /
    • pp.1261-1267
    • /
    • 2021
  • Currently, the application of virtual reality technology is becoming more and more popular in all aspects of life. From virtual entertainment to industrial simulation, the new operation and working methods brought by virtual reality visualization technology have greater appeal and advantages. With the renewal and iteration of related equipment, more and more functions make its limitations continue to decrease, but its applicability continues to improve. Take the optically transparent head-mounted device as an example. It integrates more computer functions, presents and interacts in a virtual way, further integrates with daily behaviors, and shortens the distance between users and digital information.

User Behavior on Changing the Password from the Shadow Work View (그림자노동 차원에서 본 IT 사용자의 비밀번호 변경행동 연구)

  • Park, Sang Cheol
    • The Journal of Information Systems
    • /
    • v.28 no.2
    • /
    • pp.93-107
    • /
    • 2019
  • Purpose The purpose of this study is to explain the mechanism of user behaviors in password reset context based on descriptive data from conducting interviews. Specifically, this study attempted to describe the process of changing password from the shadow work perspective. Design/methodology/approach This study has interviewed 8 participants who can freely use numerous online web-sites. This study also employed the grounded theory methodology to analyze interview manuscripts. After conducting analyzing the manuscripts, this study has extracted 46 codes in the coding steps and ultimately presented 8 categories by combining similar concepts from those codes. Findings According to the results, this study provides new viewpoints to explain unique user behavior in the password reset context by capturing the shadow work based on the results. This study further offers practical implications to numerous practitioners by finding various codes, which related to users' reaction and behavior.

Effectiveness of e-health systems in improving hypertension management and awareness: a systematic review

  • Alotaibi, Mohamed;Ammad uddin, Mohammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.173-187
    • /
    • 2022
  • Recent studies have focused on self-management of hypertension using smart devices (cellular phones, tablets, watches). It has proven to be an effective tool for early detection and control of high Blood Pressure (BP) without affecting patients' daily routines. This systematic review surveys the existing self-monitoring systems, evaluate their effectiveness and compares the different approaches. We investigated the current systems in terms of various attributes, including methods used, sample size, type of investigation, inputs/ outputs, rate of success in controlling BP, group of users with higher response rate and beneficiaries, acceptability, and adherence to the system. We identified some limitations, shortcomings, and gaps in the research conducted recently studying the impact of mobile technology on managing hypertension. These shortcomings can generate future research opportunities and enable it to become more realistic and adaptive. We recommended including more observable factors and human behaviors that affect BP. Furthermore, we suggested that vital monitoring/logging and medication tuning are insufficient to improve hypertension control. There is also a need to observe and alter patient behavior and lifestyles.

Process for Automatic Requirement Generation in Korean Requirements Documents using NLP Machine Learning (NLP 기계 학습을 사용한 한글 요구사항 문서에서의 요구사항 자동 생성 프로세스)

  • Young Yun Baek;Soo Jin Park;Young Bum Park
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.88-93
    • /
    • 2023
  • In software engineering, requirement analysis is an important task throughout the process and takes up a high proportion. However, factors that fail to analyze requirements include communication failure, different understanding of the meaning of requirements, and failure to perform requirements normally. To solve this problem, we derived actors and behaviors using morpheme analysis and BERT algorithms in the Korean requirement document and constructed them as ontologies. A chatbot system with ontology data is constructed to derive a final system event list through Q&A with users. The chatbot system generates the derived system event list as a requirement diagram and a requirement specification and provides it to the user. Through the above system, diagrams and specifications with a level of coverage complied with Korean requirement documents were created.

  • PDF

MONITORING CONSTRUCTION PROCESSES: A SOLUTION USING WIRELESS TECHNOLOGY AND ONLINE COLLABORATIVE ENVIRONMENT

  • Sze-wing Leung;Stephen Mak;Bill L.P. Lee
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.50-60
    • /
    • 2007
  • The endeavor of this paper focuses on designing a monitoring system to provide a cost-effective solution on quality assurance for construction projects. The construction site monitoring system integrates a long-range wireless network, network cameras, and a web-based collaborative platform. The users of the system could obtain the most updated status of construction sites, such as behaviors of workers, project progress, and site events anywhere with Internet connectivity. It was carefully configured in order to maintain the reliability under the reactive conditions of the construction sites. This paper reports the architecture of the monitoring system and reviews the related technologies. The system has been implemented and tested on a construction site and promising results were obtained.

  • PDF

Consumer Behaviour Towards Purchasing Feng Shui Goods: An Empirical Study from Vietnam

  • NGHIEM-PHU, Binh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.1
    • /
    • pp.83-92
    • /
    • 2022
  • Religions and beliefs can affect the shopping behaviors of its followers and practitioners. However, the knowledge about the factors that motivate, facilitate and even constrain customers' purchase of spiritual goods, such as feng shui items, is limited. Therefore, in this study, I examined the reasons, facilitators, and constraints of purchasing spiritual goods from the buyers' perspective. Two research questions directed the examination process, including (1) why users buy spiritual goods? And (2) what factors may facilitate or constrain the purchase and use of spiritual goods? Using Vietnam's feng shui market as the context, I applied the autoethnographic and ethnographic methods to collect and analyze the data. I found that the two main reasons to purchase the feng shui items were the products' meaning and beauty. In addition, I observed three groups of factors that could facilitate or constrain the purchase and use of feng shui items, including information about the products and their sellers, disposable income and life stage of the buyers, and price and authenticity of the products. Finally, based on these findings, I discussed the practical implications for managing the spiritual goods market in Vietnam.

Promotion or Prevention? The Moderating Effect of Embedded External Reviews on Consumer Evaluations

  • Ziqiong Zhang;Le Wang;Shuchen Qiao;Zili Zhang
    • Journal of Smart Tourism
    • /
    • v.3 no.3
    • /
    • pp.5-15
    • /
    • 2023
  • Given the increasing information overload among users of online review websites, understanding the manner in which cognitive costs are reduced and efficient information is made reliable has become increasingly important. This study targets a unique consumer review design and explores how reviews from an external peer-to-peer site embedded in an online travel agency (OTA) website influence subsequent evaluation behaviors. The empirical results indicate that (1) embedded external reviews with a high average valence tend to strengthen the influence of the positive evaluation ratio while diminishing the effect of the review volume, and (2) embedded external reviews with a large variance strengthen the positive effect of the review volume while weakening the effect of the positive evaluation ratio on subsequent positive evaluations. The findings provide practical insights for consumers and online platforms.

The Association between Addictive, Habitual Smartphone Behaviors and Psychiatric Distress and The Role of Self-control in Association.

  • Jun-Hwan Mun;Ji-Hwan Park;Mi-Jung Rho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.61-73
    • /
    • 2023
  • As smartphone use is increasing within the middle-aged population, society should pay closer attention to the mental health problems associated with smartphone addiction. This study examines the possibility that depression, anxiety, and ADHD can be interpreted not only as negative aspects, but also as positive aspects, in an addiction-related individual. We used habitual and addictive smartphone behavior as the dependent variables; anxiety, ADHD, depression, and habitual smartphone use as the independent variables; and self-control as a moderating variable. Depression and ADHD in smartphone users were found to be associated with higher levels of addictive smartphone use. Anxiety was having negative effect on addictive smartphone use. However, habitual smartphone use didn't significantly affect addictive smartphone use. Further analysis indicated that depression, anxiety, and ADHD have mediating effects on habitual smartphone use. This study confirmed that psychological factors in adults, as well as habitual/addictive smartphone use and self-control, significantly influence smartphone overdependence.