• 제목/요약/키워드: model based

Search Result 60,316, Processing Time 0.072 seconds

Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services (모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인)

  • No, Mi-Jin;Kim, Byung-Gon;Park, Soon-Chang
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.

A Feasibility Study of Goal-based Testing with a Task-based Test Model for Collective Adaptive Systems (군집 적응형 시스템의 목표 기반 테스트를 위한 태스크 기반 테스트 모델 적용 타당성 연구)

  • Lee, Cheonghyun;Jee, Eunkyoung;Lim, Yoo Jin;Bae, Doo-Hwan
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.393-398
    • /
    • 2016
  • Collective Adaptive System is an adaptive multi-agent system which accomplishes its goal by collaborating various agents. Because the collective property of the Collective Adaptive System is accomplished by the goal of the system being based on collaboration, testing the goal accomplishment and their interactions among heterogeneous agents is important. This paper presents a feasibility study of applying a model-based testing approach using task-based test model to a Collective Adaptive System. This paper describes additional information to be applied for Collective Adaptive System for future studies. To analyze our approach, we applied the proposed approach to a smart home system as a case study; our results indicated that we can systematically derive test cases to check whether the Collective Adaptive System successfully achieved its goals by modifying and extending the existing task model.

Spam Image Detection Model based on Deep Learning for Improving Spam Filter

  • Seong-Guk Nam;Dong-Gun Lee;Yeong-Seok Seo
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.289-301
    • /
    • 2023
  • Due to the development and dissemination of modern technology, anyone can easily communicate using services such as social network service (SNS) through a personal computer (PC) or smartphone. The development of these technologies has caused many beneficial effects. At the same time, bad effects also occurred, one of which was the spam problem. Spam refers to unwanted or rejected information received by unspecified users. The continuous exposure of such information to service users creates inconvenience in the user's use of the service, and if filtering is not performed correctly, the quality of service deteriorates. Recently, spammers are creating more malicious spam by distorting the image of spam text so that optical character recognition (OCR)-based spam filters cannot easily detect it. Fortunately, the level of transformation of image spam circulated on social media is not serious yet. However, in the mail system, spammers (the person who sends spam) showed various modifications to the spam image for neutralizing OCR, and therefore, the same situation can happen with spam images on social media. Spammers have been shown to interfere with OCR reading through geometric transformations such as image distortion, noise addition, and blurring. Various techniques have been studied to filter image spam, but at the same time, methods of interfering with image spam identification using obfuscated images are also continuously developing. In this paper, we propose a deep learning-based spam image detection model to improve the existing OCR-based spam image detection performance and compensate for vulnerabilities. The proposed model extracts text features and image features from the image using four sub-models. First, the OCR-based text model extracts the text-related features, whether the image contains spam words, and the word embedding vector from the input image. Then, the convolution neural network-based image model extracts image obfuscation and image feature vectors from the input image. The extracted feature is determined whether it is a spam image by the final spam image classifier. As a result of evaluating the F1-score of the proposed model, the performance was about 14 points higher than the OCR-based spam image detection performance.

Vibration Suppression Control for an Articulated Robot: Effects of Model-Based Control Applied to a Waist Axis

  • Itoh, Masahiko;Yoshikawa, Hiroshi
    • International Journal of Control, Automation, and Systems
    • /
    • v.1 no.3
    • /
    • pp.263-270
    • /
    • 2003
  • This paper deals with a control technique of eliminating the transient vibration of a waist axis of an articulated robot. This technique is based on a model-based control in order to establish the damping effect on the mechanical part. The control model is related to the velocity control loop, and it is composed of reduced-order electrical and mechanical parts. Using this model, the velocity of the load is estimated, which is converted to the motor shaft. The difference between the estimated load speed and the motor speed is calculated dynamically, and it is added to the velocity command to suppress the transient vibration of a waist axis of the robot arm. The function of this technique is to increase the cut-off frequency of the system and the damping ratio at the driven machine part. This control model is easily obtained from design or experimental data and its algorithm can be easily installed in a DSP. This control technique is applied to a waist axis of an articulated robot composed of a harmonic drive gear reducer and a robot arm with 5 degrees of freedom. Simulations and experiments show satisfactory control results to reduce the transient vibration at the end-effector.

Study on eBook Acquisition Model based on Patron-Driven Acquisitions (PDA(Patron-Driven Acquisitions) 방식 전자책 수서 모형에 관한 연구)

  • Cho, Jane
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.4
    • /
    • pp.105-121
    • /
    • 2015
  • PDA model is new collection development method not only corresponding user's demand, but also expensing acquisition budget effectively. In the PDA model, when the trigger that indicates user's demand reaches up to treshold, e-book is automatically purchased without librarian's interrogation. This study examines concept, basic principles, and current condition of operation about PDA and finds a way that could applicate to Korean university library foreign E-book consortium. Current model of university library e-book acquisition pursuit reduction of budget and utility value, but the selected collection is not based on user's demand. Therefore, it could be considerable to apply PDA or evidence based purchase model to foreign e-book acquisition consortium.

A Study on Semantic Based Indexing and Fuzzy Relevance Model (의미기반 인덱스 추출과 퍼지검색 모델에 관한 연구)

  • Kang, Bo-Yeong;Kim, Dae-Won;Gu, Sang-Ok;Lee, Sang-Jo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04b
    • /
    • pp.238-240
    • /
    • 2002
  • If there is an Information Retrieval system which comprehends the semantic content of documents and knows the preference of users. the system can search the information better on the Internet, or improve the IR performance. Therefore we propose the IR model which combines semantic based indexing and fuzzy relevance model. In addition to the statistical approach, we chose the semantic approach in indexing, lexical chains, because we assume it would improve the performance of the index term extraction. Furthermore, we combined the semantic based indexing with the fuzzy model, which finds out the exact relevance of the user preference and index terms. The proposed system works as follows: First, the presented system indexes documents by the efficient index term extraction method using lexical chains. And then, if a user tends to retrieve the information from the indexed document collection, the extended IR model calculates and ranks the relevance of user query. user preference and index terms by some metrics. When we experimented each module, semantic based indexing and extended fuzzy model. it gave noticeable results. The combination of these modules is expected to improve the information retrieval performance.

  • PDF

Kinect-based Motion Recognition Model for the 3D Contents Control (3D 콘텐츠 제어를 위한 키넥트 기반의 동작 인식 모델)

  • Choi, Han Suk
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.1
    • /
    • pp.24-29
    • /
    • 2014
  • This paper proposes a kinect-based human motion recognition model for the 3D contents control after tracking the human body gesture through the camera in the infrared kinect project. The proposed human motion model in this paper computes the distance variation of the body movement from shoulder to right and left hand, wrist, arm, and elbow. The human motion model is classified into the movement directions such as the left movement, right movement, up, down, enlargement, downsizing. and selection. The proposed kinect-based human motion recognition model is very natural and low cost compared to other contact type gesture recognition technologies and device based gesture technologies with the expensive hardware system.

A Choice-Based Competitive Diffusion Model with Applications to Mobile Telecommunication Service Market in Korea (선택관점의 경쟁확산모형과 국내 이동전화 서비스 시장에의 응용)

  • Jun, Duk-Bin;Kim, Seon-Kyoung;Cha, Kyung-Cheon;Park, Yoon-Seo;Park, Myoung-Hwan;Park, Young-Sun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.27 no.3
    • /
    • pp.267-273
    • /
    • 2001
  • While forecasting sales of a new product is very difficult, it is critical to market success. This is especially true when other products have a highly negative influence on the product because of competition effect. In this paper, we develop a choice-based competitive diffusion model and apply to the case where two digital mobile telecommunication services, that is, digital cellular and PCS services, compete. The basic premise is that demand patterns result from choice behavior, where customers choose a product to maximize their utility. In comparison with Bass-type competitive diffusion models, our model provides superior fitting and forecasting performance. The choice-based model is useful in that it enables the description of such competitive environments and provides the flexibility to include marketing mix variables such as price and advertising.

  • PDF

Analysis of end-plate connections at elevated temperatures

  • Lin, Shuyuan;Huang, Zhaohui;Fan, Mizi
    • Steel and Composite Structures
    • /
    • v.15 no.1
    • /
    • pp.81-101
    • /
    • 2013
  • In this paper a robust 2-noded connection element has been developed for modelling the bolted end-plate connection between steel beam and column at elevated temperatures. The numerical procedure described is based on the model proposed by Huang (2011), incorporating additional developments to more precisely determinate the tension, compression and bending moment capacities of end-plate connection in fire. The proper failure criteria are proposed to calculate the tension capacity for each individual bolt row. In this new model the connection failure due to bending, axial tension, compression and shear are considered. The influence of the axial force of the connected beam on the connection is also taken into account. This new model has the advantages of both the simple and component-based models. In order to validate the model a total of 22 tests are used. It is evident that this new connection model has ability to accurately predict the behaviour of the end-plate connection at elevated temperatures, and can be used to represent the end-plate connections in supporting performance-based fire resistance design of steel-framed composite buildings.

The development of knowledge service needs assessment model for small and medium-sized businesses (중소기업을 위한 지식서비스 수요 조사 모형 개발)

  • Maeng, Yun-ho;Yoo, Sun-Hi;Seo, Jinny
    • Knowledge Management Research
    • /
    • v.16 no.4
    • /
    • pp.169-190
    • /
    • 2015
  • The status of small and medium-sized enterprises has been changed into more independent business entities rather than simply subcontractor so that the utilization of specialized knowledge has been much more necessary for the survival in the market. However, small and medium-sized enterprises, it is difficult to sufficient investment in knowledge services due to limited resources relative to large enterprises and demand for knowledge services business of government support is growing. For this reason, it is important to measure accurately the demand for knowledge services of small and medium-sized enterprises in knowledge management for effective utilization of knowledge service. In this study, we analyzed previous studies on small and medium-sized enterprises knowledge services that can be utilized in a comprehensive way. As a result, we developed knowledge service needs assessment model based on five critical success factors for continual growth and 12 types of knowledge service. This model has been modified and supplemented through expert meeting using delphi research method and topic modeling analysis using secondary data. This study is attempted to appropriately measure necessary knowledge services for small and medium-sized enterprises so that generated the evaluation model of knowledge service demands, comprehensively dealing with core knowledge services for many kinds of business entities. It is expected that the developed model will be a useful tool to understand and evaluate knowledge services demands of enterprises.