• Title/Summary/Keyword: combined users

Search Result 345, Processing Time 0.024 seconds

The Safety Assessment of Wheelchair Occupants in Road Passenger Vehicles with the Frontal Crash: a Computer Simulation (시뮬레이션 기법을 이용한 차량내 전동휠체어 탑승자의 전방 충돌시 안전에 관한 연구)

  • Lee, Young-Shin;Lee, Ki-Du;Lim, Hyun Kyoon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.29 no.11 s.242
    • /
    • pp.1518-1526
    • /
    • 2005
  • With increasing need of transportation services for people with disabilities and the aged, wheelchairs are used as their assistive devices to participate in daily and recreational activities and as seats of motor vehicle. However, as wheelchairs are primarily designed fer mobility assistive devices, not for vehicle seats, wheelchair users may experience serious injury when they meet car crashes. To date, neither engineering guidance for a wheelchair mounting system on the vehicle floor nor safety assessment analysis by a car crash has been studied for the domestic users. In this paper, in accordance with the ANSVRESNA WC-19, a fixed vehicle mounted wheelchair occupant restraint system (FWORS), wheelchair integrated restraint system (WIRS), and wheelchair integrated x-bend restraint system (WIXRS) subjected to frontal impact (20 g, 48 U) were analyzed using compute. simulations for domestic users. We present surrogate wheelchair occupant safety by head injury criteria (HIC), motion criteria (MC), and combined injury criteria (CIC).

User Experience and the Multi-Stage Adoption of Mobile Apps

  • Kim, Ambrose;Kim, Kyoung-jae
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.2
    • /
    • pp.49-79
    • /
    • 2014
  • The adoption of technology has always been of interest to academicians and practitioners of the field of Management Information System. This is so because without proper and adequate adoption, technology-no matter how beneficial or advanced it may be-will be of little value to users. Numerous researches, such as the researches of the Technology Acceptance Model (TAM) or the Unified Theory of Acceptance and Use of Technology (UTAUT), had been conducted to understand the human nature in association with the adoption or rejection of technologies that have bombarded the users. The coming of smart technologies (i.e., smart phones and devices), however, seems to have fundamentally changed the environment for adoption. The ubiquity combined with mobility of technology, especially when it comes to mobile apps, seem to make the old PC era of two-stage-pre and post-adoption models obsolete. A new model of adoption that identifies the determinants of technology acceptance and continuance is needed for the smart age. To this end, this paper undertakes an empirical study, by analyzing 229 users of Social Networking Service (SNS) mobile apps, to identify the role of user experience on the multi-stage adoption of technology, and provides results that User Experience (UX) plays the crucial role of bridging the separate stages of pre and post adoption of technologies. The paper concludes by providing practical implications of the new model as it relates to mobile apps and technologies, and recommendations for further studies to get a better understanding of technology adoption in the smart age.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

Block Error Performance improvement of the DS/CDMA BPSK system with MRC Diversity and Channel coding Techniques in Nakagami Fading Channel. (Nakagami 페이딩 채널에서 MRC 다이버시티와 채널 부호화 기법을 사용한 DS/CDMA BPSK 시스템의 블록 오율 성능 개선)

  • 강희조;노재성;조성준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3A
    • /
    • pp.391-398
    • /
    • 2000
  • In this paper, MRC(Maximum Ratio Combine) diversity, (23, 12) Golay code, (7, 5) Reed-Solomon code, and (3, 1) majority selection code are employed to improve the performance of DS/CDMA BRSK in Nakagami fading channel. and MRC diversity combined with other coding techniques is suggested, with which, the performance of DS/CDMA BRSK is compared and analyzed. Also, system required Eb/N0 to meet BER=10-5 for multi user data communication is obtained according to each techniques. From the results, when each techniques is employed to DS/CDMA BRSK system. coding employed system shows better performance than diversity employed system. Especially, Golay code shows better performance than oter codes. also MRC diversity is employed, the number of multiple access user to meet data communication requirement of BER=10-5 can accomodate up to 8 users. and when each code is employed, Golay code, majority selection code, and Reed-Solomon code shows the capacity of 14, 12, and 10 user respectively. But MRC diversity combined with coding techniques can reduce restriction of multiple access user. However, it is desirable these combined technique are employed according to service types and requirements provided.

  • PDF

A study on Convergence of the Digital Contents Industry and Possibility of Exportation (디지털콘텐츠 산업의 융합화와 수출 가능성)

  • Chun, Byung-June;Choi, Dong-Gil
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.55-78
    • /
    • 2010
  • This study analyses recent development of digital contents industry. The purpose of this study is to show how the convergence phenomenon is occurring in the digital contents industry. Furthermore, this study examines the influence of digital convergence on the digital contents industry. The characteristics of the digital contents industry falls roughly into three features. To begin with, technical aspect of the industrial feature is that digitalized contents can be used in various digital devices, namely OSMU(One Source Multi Use). The second feature is related to protection of copyright against illegal file sharing and downloading. One final point is that platform for distribution channels has been universal by digital convergence. To sum up, the notable feature of digital contents industry is high value-added. Also, digital contents industry is composed of users, digital device, network, and universal contents. Users are the key component of digital contents industry, who is distinguished from consumers. Digital devices such as mobile phone, PDA can play all kinds of digital contents and make users communicate in two-ways. Portable devices also allow the users to consume digital contents at any place. Digital contents can be distributed by both wire and wireless networks. And most of transactions can be made through networks. There are three key issues about digital convergence. Entry barriers for market become lowered; the age of contents users is changed from old generation to young generation. And the form of contents devices is changing rapidly. Traditional contents field such as movie, music, broadcasting, publishing, animations are combined into one digital contents territory. As a result, this paper suggests that digital convergence phenomenon will be accelerating for the future. According to the result of this study, the advent of digital convergence and e-Commerce will have significant influence on trade of digital contents.

  • PDF

Effectiveness of Evaluation for Visiting Care Service Institution: From the User's Point of View (방문요양서비스 기관 평가의 효과성 : 이용자 관점에서)

  • Cho, Han-Ra
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.150-158
    • /
    • 2022
  • The purpose of this study is to confirm the effectiveness of the evaluation of long-term care insurance visiting care service institutions for the elderly from the user's point of view. To this end, data from a survey of 266 users collected through allocation sampling by region(14 cities and counties) in Jeollabuk-do and public data from 47 institutions were combined and analyzed using a multi-layered model. The main research results are as follows. First, among the five evaluation areas, the higher the score in the 'Rights·Responsibility' area, which is to give users a sense of rights and respect users, the higher the service quality and satisfaction. Second, among the five evaluation areas, the 'Rights·Responsibility' area had an effect on loyalty. In addition, it was found that the 'Outcome' area for satisfaction with institutions and employees and changes in users had an effect on loyalty. Third, it was found that 'Institutional Management', 'Environment·Safety', 'Process' did not affect service quality, satisfaction, and loyalty. Based on these results, it is proposed to reorganize the evaluation scale that users can recognize and that is faithful to the purpose.

Classifying and Implementing Different Types of Contradiction Resolution Strategies in TRIZ (TRIZ에서 모순해결전략의 유형 및 적용)

  • Choi, Sungwoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.381-396
    • /
    • 2015
  • The study proposes multiple TRIZ contradiction solution strategies for addressing PC (Physical Contradiction) and TC (Technical Contradiction) by implementing TRIZ cause-and-effect tree. The problem associated with TC of the ends is solved by PC of means which employs a causal relationship between causes and effects. The TRIZ contradiction solution strategies demonstrated in this research are classified into 3 types of combined strategy as follows: 1. To-Be PC and AS-Is PC, 2.To-Be PC and As-Is TC, 3.As-Is PC and To-Be TC. The combined strategy of To-Be PC and As-Is PC is similar to a divide-and-conquer technique. This strategy adopts parallel strategies using 4 separation principles in time, in space, between parts and the whole, and upon condition of two reversed-PCs. Moreover, its application elucidates the conflict relationship of two TCs from the study. The integrated 4 separation principles and 40 inventive principles present an effective synergy effect from the combination, and further addresses the problems in the TRIZ contradiction resolution strategies. Combined strategy of To-Be PC and As-Is TC implements the 40 inventive principles that To-Be PC of the means resolves the As-Is TC of the ends. Combined strategy of As-Is PC and To-Be TC also uses inventive principles to the As-Is PC of the means to solve the To-Be TC of the ends. In addition, propositional and logical relationship of necessary and sufficient conditions between TC and PC is used to support the validity of 3 TRIZ contradiction solution strategies. In addition, 3 other strategies of necessary and sufficient conditions validate the contraposition relationship of the truth table. This study discusses TRIZ case studies from National Quality Circle Contest from the years between 2011 and 2014 to provide the usage guidelines of TRIZ contradiction solutions for quality purposes. Examining analysis from the case studies and investigating combined strategies allows the users to obtain comprehensive understanding.

Towards Intelligent Web Interaction

  • Takama, Yasufumi
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.134-137
    • /
    • 2003
  • Both browsing and retrieval with search engines are major operations that establish the interaction between users and the Web. Although both operations are usually combined to locate information from the Web, recent growth of the Web has overtaken the potential of this conventional interaction. This paper proposes the concept of Retrieve, Browse, and Analyze (RBA)-based interactions, as the improvement of the conventional Retrieve and Browse (RB)-based interaction. The prototype interface based on RBA-based interaction is also presented.

  • PDF

Development of a task level automatic programming system for arc welding automation (아아크 용접 자동화를 위한 태스크 레벨 자동 프로그래밍 시스템 개발)

  • 박현자;이범희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1396-1399
    • /
    • 1996
  • With the progress in process automation, it becomes necessary that a robot should have various sophisticated capabilities. A robot programming language is a tool that can give a robot such capabilities without any change in robot architecture. Especially a task level automatic programming system enables a robot able to perform a job intelligently. Therefore anyone who is not an expert on welding or robot programming can easily use it. In this research, basic automatic welding program is combined with workspace information, which makes users do an arc welding job automatically.

  • PDF

Design and Implementation of FSQL System in Relational Database (관계형데이터베이스에서 FSQL 시스템의 설계 및 구현)

  • 김병섭;박순철
    • The Journal of Information Systems
    • /
    • v.6 no.2
    • /
    • pp.147-163
    • /
    • 1997
  • The usages of the relational database systems have been increased nowadays. However there is a constraint that the standard query language for a database system requests users to know the exact condition for a query. In this paper a FSQL(Fuzzy SQL) systems is proposed and implemented for the imprecise queries which do not include the exact condition. Moreover this system can supply the obvious results for the queries effectively. We define a simple fuzzy query language and use a method using the metadatabase to implement the FSQL system. This FSQL system can be combined with a relational database system without any painful effort.

  • PDF