• Title/Summary/Keyword: use of smart devices

Search Result 792, Processing Time 0.03 seconds

Research on Intention to Adopt Smart Wear: Based on Extended UTAUT Model (스마트웨어 수용의도 연구: 확장된 UTAUT 모형을 중심으로)

  • Sung, Heewon;Sung, Junghwan
    • Journal of Fashion Business
    • /
    • v.19 no.2
    • /
    • pp.69-84
    • /
    • 2015
  • The objective of this study is to investigate the intention to adopt smart wear, based on extended UTAUT model. We examined the effects of performance expectancy (PE), effort expectancy (EE), hedonic motivation (HE), social influence (SI), facilitating conditions (FC), and price value (PV) on the intended adoption of smart watch and smart shoes, respectively. In addition, moderating effects of gender, age, and innovation resistance were examined. An online survey was conducted, comprised of 2030 consumers who were aware of smart watch or smart shoes. In total, 393 responses were analyzed. About 50.4% were male, and 44.8% were in their 20's. An exploratory factor analysis generated five factors - PE & HM, EE, SI, FC, and PV- which were employed as independent variables in the multiple regression models. PE & HM, PV, and SI influenced on the intention to use both smart devices. FC showed the significant effect only on the intention to adopt the smart watch. In terms of gender differences, SI and PV were the important predictors of the intention to adopt the smart watch in the female group only. With respect to age difference, SI was very effective in explaining the intention of individuals in their 30's to adopt smart wear. Among the low innovation resistance group, SI was significant predictor, while PE & HE and PV were significant among the high resistance group. The findings provide useful information about the possibility of the adoption of smart wear, and new insight into market segmentation.

The Effects of Multi-Modality on the Use of Smart Phones

  • Lee, Gaeun;Kim, Seongmin;Choe, Jaeho;Jung, Eui Seung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.33 no.3
    • /
    • pp.241-253
    • /
    • 2014
  • Objective: The objective of this study was to examine multi-modal interaction effects of input-mode switching on the use of smart phones. Background: Multi-modal is considered as an efficient alternative for input and output of information in mobile environments. However, there are various limitations in current mobile UI (User Interface) system that overlooks the transition between different modes or the usability of a combination of multi modal uses. Method: A pre-survey determined five representative tasks from smart phone tasks by their functions. The first experiment involved the use of a uni-mode for five single tasks; the second experiment involved the use of a multi-mode for three dual tasks. The dependent variables were user preference and task completion time. The independent variable in the first experiment was the type of modes (i.e., Touch, Pen, or Voice) while the variable in the second experiment was the type of tasks (i.e., internet searching, subway map, memo, gallery, and application store). Results: In the first experiment, there was no difference between the uses of pen and touch devices. However, a specific mode type was preferred depending on the functional characteristics of the tasks. In the second experiment, analysis of results showed that user preference depended on the order and combination of modes. Even with the transition of modes, users preferred the use of multi-modes including voice. Conclusion: The order of combination of modes may affect the usability of multi-modes. Therefore, when designing a multi-modal system, the fact that there are frequent transitions between various mobile contents in different modes should be properly considered. Application: It may be utilized as a user-centered design guideline for mobile multi modal UI system.

An Empirical Study on Factors Affecting Customer Intention to Use Mobile Payment System in Vietnam (베트남 모바일결재시스템 수용의도에 영향을 미치는 요인에 관한 실증연구)

  • Nguyen, Phuong Y;Lee, Sung Taek;Kang, Wi Man;Kim, Jeong Suk;Gim, Gwang Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.171-184
    • /
    • 2015
  • Nowadays, mobile commerce is having an increasingly profound impact on our daily lives, and offer interesting and advantageous new services. Mobile payment is an emerging and important application of mobile commerce in smart work, enabling users to use their mobile devices (especially mobile phones) for paying goods and services wherever they go. The appearance of m-payment is expected to provide us a convenient and bright future to enjoy. That is the common trend on over the world, but in Vietnam, although the number of smart phone users has been increasing rapidly, the adoption of m-payment system still didn't succeed completely. The research reviewed literature regarding mobile payment services, analyzed the impact of customer characteristics and system characteristics on m-payment adoption in Vietnam. To analyze the adoption behaviors of m-payment users, m-payment research model which consists of three customer-characteristics (m-payment trust, personal innovativeness, m-payment knowledge) and four m-payment system characteristics (mobility, reachability, convenience, compatibility) were studied. The results indicate that perceived usefulness, trust, and compatibility are the important predictors to the intention to use m-payment. This study will assist m-payment services suppliers in implementing appropriate business models and service strategies to successfully attract customer to use m-payment in Vietnam, allowing managers to exert appropriate investment, time, and effort for m-payment system development in designing smart working.

Building Energy Time Series Data Mining for Behavior Analytics and Forecasting Energy consumption

  • Balachander, K;Paulraj, D
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.1957-1980
    • /
    • 2021
  • The significant aim of this research has always been to evaluate the mechanism for efficient and inherently aware usage of vitality in-home devices, thus improving the information of smart metering systems with regard to the usage of selected homes and the time of use. Advances in information processing are commonly used to quantify gigantic building activity data steps to boost the activity efficiency of the building energy systems. Here, some smart data mining models are offered to measure, and predict the time series for energy in order to expose different ephemeral principles for using energy. Such considerations illustrate the use of machines in relation to time, such as day hour, time of day, week, month and year relationships within a family unit, which are key components in gathering and separating the effect of consumers behaviors in the use of energy and their pattern of energy prediction. It is necessary to determine the multiple relations through the usage of different appliances from simultaneous information flows. In comparison, specific relations among interval-based instances where multiple appliances use continue for certain duration are difficult to determine. In order to resolve these difficulties, an unsupervised energy time-series data clustering and a frequent pattern mining study as well as a deep learning technique for estimating energy use were presented. A broad test using true data sets that are rich in smart meter data were conducted. The exact results of the appliance designs that were recognized by the proposed model were filled out by Deep Convolutional Neural Networks (CNN) and Recurrent Neural Networks (LSTM and GRU) at each stage, with consolidated accuracy of 94.79%, 97.99%, 99.61%, for 25%, 50%, and 75%, respectively.

RF Energy Harvesting and Charging Circuits for Low Power Mobile Devices

  • Ahn, Chang-Jun;Kamio, Takeshi;Fujisaka, Hisato;Haeiwa, Kazuhisa
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.4
    • /
    • pp.221-225
    • /
    • 2014
  • Low power RF devices, such as RFID and Zigbee, are important for ubiquitous sensing. These devices, however, are powered by portable energy sources, such as batteries, which limits their use. To mitigate this problem, this study developed RF energy harvesting with W-CDMA for a low power RF device. Diodes are required with a low turn on voltage because the diode threshold is larger than the received peak voltage of the rectifying antenna (rectenna). Therefore, a Schottky diode HSMS-286 was used. A prototype of RF energy harvesting device showed the maximum gain of 5.8dBi for the W-CDMA signal. The 16 patch antennas were manufactured with a 10 dielectric constant PTFT board. In low power RF devices, the transmitter requires a step-up voltage of 2.5~5V with up to 35 mA. To meet this requirement, the Texas Instruments TPS61220 was used as a low input voltage step-up converter. From the evaluated result, the achievable incident power of the rectenna at 926mV to operate Zigbee can be obtained within a distance of 12m.

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.3-12
    • /
    • 2006
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.

A Study on Evaluation for Improving the Usability of Mobile Web User Interface (모바일 웹 사용자 인터페이스의 사용성 향상을 위한 평가에 관한 연구)

  • Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.6 no.2
    • /
    • pp.185-199
    • /
    • 2016
  • Smart phone market launched Apple iPhone, and mobile devices having various sizes and operating system began to be enabled. The users search the necessary contents any time and everywhere by a smart phone. And they can use various contents immediately such as information, videos, music etc. Recently, digital devices including mobile has become a large proportion of in everyday life. Therefore, UI/UX which is responsible for the communication between the user and the mobile device is very important. It has been recognized as an important factor for users to determine how easy to use the mobile device. In this paper, it is discussed how to minimize the inconvenience of use while improving the convenience of the UI / UX that make up the mobile web. Then, it is presented an evaluation criteria of Mobile Web UI/UX for improving the usability of the mobile device.

A Study of Voice over Internet Protocol Encryption in Smart Phone (스마트폰을 이용한 VoIP 암호화 기술 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.281-284
    • /
    • 2011
  • Smart phone is being used in the job as the ubiquitous society will Without being restricted by the time and place and devices. The rapid increase in the use of smart phones has brought the activation of the mobile job. And government agencies have brought in the transition to a smart society. In this paper, using a Voice over Internet protocol(VoIP) service for your smart phones to enhance security is the study of encryption technologies. External and internal signals, and call encryption and security standards of administrative agencies is the study of VoIP. Smart phone VoIP service is a study that security of equipment certificate, the internal signal and call encryption. This paper will contribute what using smart phone VoIP security and usability In smart generation.

  • PDF

Study on the Attitudes toward Artificial Intelligence and Digital Literacy of Dental Hygiene Students

  • Seon-Ju Sim;Ji-Hye Kim;Min-Hee Hong;Su-Min Hong;Myung-Jin Lee
    • Journal of dental hygiene science
    • /
    • v.24 no.3
    • /
    • pp.171-180
    • /
    • 2024
  • Background: The Fourth Industrial Revolution highlights the importance of artificial intelligence (AI) and digital literacy in dental hygiene education. However, research on students' attitudes toward AI and their digital literacy levels is limited. Therefore, this study investigated the attitudes of dental hygiene students toward AI and digital literacy levels. Methods: In total, 167 dental hygiene students in Baekseok University participated in the study and provided informed consent. The survey tool included general characteristics, smartphone usage patterns, attitudes toward AI, and digital literacy levels. Attitudes toward AI and digital literacy based on general characteristics and smart device usage were analyzed using t-tests and one-way ANOVA. Correlations among attitudes toward AI, digital literacy awareness, and digital literacy behaviors were analyzed using Pearson's correlation analysis. The impact of AI attitudes and digital literacy awareness on digital literacy behavior was examined using linear regression analysis. Results: Students with higher interest in their major had more positive attitudes toward AI, and those with higher smart device usage showed increased AI attitudes and digital literacy (p<0.05). Simple frequency or duration of smartphone use did not affect digital literacy, but students who perceived their smart device usage positively and believed that they used smart devices effectively in their studies exhibited higher levels of digital literacy (p<0.05). A positive attitude toward AI is associated with higher levels of digital literacy (p<0.05). Digital literacy awareness and attitudes toward AI influenced digital literacy behavior (p<0.05). Conclusion: These results suggest that the qualified utilization and application of digital devices in dental hygiene education are important. Improving the educational curriculum is necessary; as a result, digital technology can be effectively utilized, and various educational programs should be introduced to enhance digital literacy.

A Mobile Voting DApp Implementation and Security Issues (모바일 투표 Dapp 실행 및 보안 이슈)

  • KHERLEN, NARANTUYA;Park, Jun Beom;Park, Jong Sou
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.290-292
    • /
    • 2019
  • Since the advent of blockchain and bitcoin, decentralization has been accelerating around the world as a public blockchain ethereum with smartcontract has begun. Developers can use Ethereum's blockchain development platform to develop "distributed applications" (DApp) running on a decentralized P2P network, and various types of devices from IoT to mobile can participate in a block-chain distributed environment have. Using Ethereum's blockchain development platform, developers can develop "Decentralized Application (DApp)" that run on a decentralized P2P network and various types of devices from IOT to mobile can participate in distributed blockchain environments. There are many ways to interact with the blockchain and the smart contract, but users tend to prefer the mobile methods due to their convenience and accessibility advantages. Therefore, the author developed an Android based voting DApp and researched related issues. Since the current development methods of DApp are not adequately researched and standardized, efficient methods for developing user-friendly DApp were studied. Because DApp has to spend a certain amount of fees to interact with blockchain, it has intensively investigated the gas problem of Smart Contract code and the security problem of code, and author would like to introduce it in this paper.

  • PDF