• Title/Summary/Keyword: communication behaviors

Search Result 672, Processing Time 0.036 seconds

Communication Aid System For Dementia Patients (치매환자를 위한 대화 보조 시스템)

  • Sung-Ill Kim;Byoung-Chul Kim
    • Journal of Biomedical Engineering Research
    • /
    • v.23 no.6
    • /
    • pp.459-465
    • /
    • 2002
  • The goat of the present research is to improve the quality of life of both the elderly patients with dementia and their caregivers. For this Purpose, we developed a communication aid system that is consisted of three modules such as speech recognition engine, graphical agent. and database classified by a nursing schedule. The system was evaluated in an actual environment of nursing facility by introducing the system to an older mail patient with dementia. The comparison study was then carried out with and without system, respectively. The occupational therapists then evaluated subject"s reaction to the system by photographing his behaviors. The evaluation results revealed that the proposed system was more responsive in catering to needs of subject than professional caregivers. Moreover we could see that the frequency of causing the utterances of subject increased by introducing the system.

Big Data and Entertainment Content : Case Studies and Prospects (빅데이터와 엔터테인먼트 콘텐츠 : 사례연구 및 전망)

  • Kim, Hae Won;Lee, Mina
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.109-118
    • /
    • 2016
  • Big data, thanks to the development of data sciences, has been key words for economic development and governmental policies. This study reviewed how big data has been used with entertainment contents since the uses of big data in the fields have been more popular and the cases making successful business have been reported. To do ends, the changes in production, distribution, and consumption of entertainment contents have been characterized and prime cases have been introduced. Furthermore, Korean production companies of entertainment contents, Bloter and NEOTOUCHPOINT, were selected to investigate how big data has been utilized. It was found that the companies used big data to analyze consumers' behaviors and gain insights of content creation, such as identifying specific elements of enjoyments and conditions to share the contents with others. The domestic entertainment companies are preparing a full-scale of use of big data but, in order to take advantage of big data, collaboration between developers and experts in the field and specific goal-setting and model building are recommended.

Multi-Agent for Traffic Simulation with Vehicle Dynamic Model I : Development of Traffic Environment (차량 동역학을 이용한 멀티에이전트 기반 교통시뮬레이션 개발 I : 교통 환경 개발)

  • 조기용;권성진;배철호;서명원
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.12 no.5
    • /
    • pp.125-135
    • /
    • 2004
  • The validity of simulation has been well-established for decades in areas such as computer and communication system. Recently, the technique has become entrenched in specific areas such as transportation and traffic forecasting. Several methods have been proposed for investigating complex traffic flows. However, the dynamics of vehicles and their driver's characteristics, even though it is known that they are important factors for any traffic flow analysis, have never been considered sufficiently. In this paper, the traffic simulation using a multi-agent approach with considering vehicle dynamics is proposed. The multi-agent system is constructed with the traffic environment and the agents of vehicle and driver. The traffic environment consists of multi-lane roads, nodes, virtual lanes, and signals. To ensure the fast calculation, the agents are performed on the based of the rules to regulate their behaviors. The communication frameworks are proposed for the agents to share the information of vehicles' velocity and position. The model of a driver agent which controls a vehicle agent is described in the companion paper. The vehicle model contains the nonlinear subcomponents of engine, torque converter, automatic transmission, and wheels. The simulation has proceeded for an interrupted and uninterrupted flow model. The result has shown that the driver agent performs human-like behavior ranging from slow and careful to fast and aggressive driving behavior, and that the change of the traffic state is closely related with the distance and the signal delay between intersections. The system developed shows the effectiveness and the practical usefulness of the traffic simulation.

Internet Interconnection settlement model under Asymmetric Network Value Environment (비대칭적 네트워크 가치 환경에서의 인터넷망 대가정산 모형)

  • Lee, Sang Woo;Ko, Chang Youl;Choi, Sun Me
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.123-132
    • /
    • 2014
  • Internet is composed of many independent networks referred to as Internet Service Providers (ISPs) and each provider is generally interconnected based on a commercial agreement. Though many countries are engaged in deregulation in internet interconnection, there is still debate whether the large ISPs are unwilling to peer with small providers, have incentives to lower the quality of data transmission of transit operators or set the interconnection charge regarding the actual costs incurred by the interconnection. Korean government introduced regulations in internet interconnection after observing noticeable anti-competitive behaviors from 2005. This paper analyzes whether there is margin squeeze problem/market concentration, and suggests political proposals in Korean regulation status.

Detection Algorithm of Social Community Structure based on Bluetooth Contact Data (블루투스 접촉 데이터를 이용한 사회관계구조 검출 알고리즘)

  • Binh, Nguyen Cong;Yoon, Seokhoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.75-82
    • /
    • 2017
  • In this paper, we consider social network analysis that focuses on community detection. Social networks embed community structure characteristics, i.e., a society can be partitioned into many social groups of individuals, with dense intra-group connections and much sparser inter-group connections. Exploring the community structure allows predicting as well as understanding individual's behaviors and interactions between people. In this paper, based on the interaction information extracted from a real-life Bluetooth contacts, we aim to reveal the social groups in a society of mobile carriers. Focusing on estimating the closeness of relationships between network entities through different similarity measurement methods, we introduce the clustering scheme to determine the underlying social structure. To evaluate our community detection method, we present the evaluation mechanism based on the basic properties of friendship.

Doing social big data analytics: A reflection on research question, data format, and statistical test-Convergent aspects (소셜네트워크서비스 빅데이터 분석을 위한 연구문제 설정과 통계적 제 문제-융합적 관점)

  • Park, Han-Woo;Choi, Kyoung-ho
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.591-597
    • /
    • 2016
  • Research question and method play important roles in conducting a research in a scientifically valid way. In today's digitalized research environment, social network service (SNS) has rapidly become a new source of big data. While this shift provides new challenges for researchers in Korea, there is little scholarly discussion of how research questions can be framed and what statistical methods can be applied. This article suggests some basic but primary types of example questions for researchers employing social big data analytics. Further, we illustrate the interface of the intended data set specifically for SNS-mediated communication and information exchange behaviors. Lastly, a statistical test known as proper method for social big data is introduced.

A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service (블루투스 v4.1 비콘 기반 쿠폰 융합서비스에서의 보안위협 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • As the new technologies like IoT and Fintech appear which have not existed before, security threat ranges in existing system are increasing. Especially, IoT has increasing ranges to cause malicious behaviors in specific systems because related IT infrastructure ranges are increasing. Fintech also requires the innovation of traditional security system because it has new structure which didn't exist in the past. As IoT and Fintech technologies are commercialized and related markets are developing in the future, structural security threats could be connected to actual attacks and secondary attacks by the attackers' imbedding of back door in IoT internet devices through remote access. Customer's device cannot be compulsively controlled for security in new system where these various security threats exist. Therefore, these services should minimize the collected information, and now is the time to politically control the utilizing methods of the collected information. In this thesis, security threats are to be suggested which could occur in newly appearing mobile services like IoT and Fintech.

Analysis of Memory Write Reference Patterns in Mobile Applications (모바일 앱의 메모리 쓰기 참조 패턴 분석)

  • Lee, Soyoon;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.65-70
    • /
    • 2021
  • Recently, as the number of mobile apps rapidly increases, the memory size of smartphones keeps increasing. Smartphone memory consists of DRAM and as it is a volatile medium, continuous refresh operations for all cells should be performed to maintain the contents. Thus, the power consumption of memory increases in proportion to the DRAM size of the system. There are attempts to configure the memory system with low-power non-volatile memory instead of DRAM to reduce the power consumption of smartphones. However, non-volatile memory has weaknesses in write operations, so analysis of write behaviors is a prerequisite to realize this in practical systems. In this paper, we extract memory reference traces of mobile apps and analyze their characteristics specially focusing on write operations. The results of this paper will be helpful in the design of memory management systems consisting of non-volatile memory in future smartphones.

Paralinguistic Behavior as a Deception Cue (거짓말의 단서로서 준언어행위)

  • Kim, Daejoong;Park, Jihye
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.187-196
    • /
    • 2019
  • This experimental study examines whether paralinguistic behavior is a deception cue in an interrogation. 92 college students participated in an experiment and were randomly assigned to two conditions. Participant were then asked to take the money or not to take the money according to the condition they were assigned. Then participants had a face-to-face interrogation. During the interrogation, participants' paralinguistic behavior was recorded and used for coding and analysis. Results reveal that participants' paralinguistic behaviors differ depending on question types and deceptive paralinguistic cues are speech speed and fillers for the closed critical question and response latency, response length, and fillers for the open critical question. These findings implicate that part of paralinguistic behavior could be a deception cue and thus these cues might be applicable to deception detection in real world criminal investigations.

The Influence on the Information Security Stressor on Information Security Compliance Intention : Focusing on the Moderation of Authentic Leadership (정보보안 스트레서가 정보보안 준수 의도에 미치는 영향: 진성 리더십의 조절 효과 중심)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1101-1112
    • /
    • 2021
  • Organizations continue to increase investment in information security(IS) policies and technologies to prevent external intrusion and internal exposure to information assets. However, as the organization's regulations and behavioral requirements for strict IS policy increase, employees may induce negative behaviors through IS-related stress. The purpose of this study is to suggest the effects of challenge and hindrance stressors on IS compliance intentions and to confirm how authentic leadership moderates the positive and negative effects of stressors. We reflected employees of the organization who are applying IS policy to their work as a study target and applied a survey to obtain a sample for research hypothesis verification. As a result of analysis through structural equation modeling, challenge and hindrance stressors affected IS compliance intentions, and authentic leadership moderated the effects of stressors on compliance intention. Our research helps to establish insiders support strategies to achieve internal IS goals, because the results suggested stressor conditions and leaders' behavioral directions that influence employees IS compliance behavior.