• Title/Summary/Keyword: user environment characteristic

Search Result 111, Processing Time 0.027 seconds

Adaptive Parameter Estimation Method for Wireless Localization Using RSSI Measurements

  • Cho, Hyun-Hun;Lee, Rak-Hee;Park, Joon-Goo
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.6
    • /
    • pp.883-887
    • /
    • 2011
  • Location-based service (LBS) is becoming an important part of the information technology (IT) business. Localization is a core technology for LBS because LBS is based on the position of each device or user. In case of outdoor, GPS - which is used to determine the position of a moving user - is the dominant technology. As satellite signal cannot reach indoor, GPS cannot be used in indoor environment. Therefore, research and study about indoor localization technology, which has the same accuracy as an outdoor GPS, is needed for "seamless LBS". For indoor localization, we consider the IEEE802.11 WLAN environment. Generally, received signal strength indicator (RSSI) is used to obtain a specific position of the user under the WLAN environment. RSSI has a characteristic that is decreased over distance. To use RSSI at indoor localization, a mathematical model of RSSI, which reflects its characteristic, is used. However, this RSSI of the mathematical model is different from a real RSSI, which, in reality, has a sensitive parameter that is much affected by the propagation environment. This difference causes the occurrence of localization error. Thus, it is necessary to set a proper RSSI model in order to obtain an accurate localization result. We propose a method in which the parameters of the propagation environment are determined using only RSSI measurements obtained during localization.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

A Study on the User Behavior in the Outpatient Department of Psychiatry (외래진료부문 정신건강의학과 이용자 행태 관찰 연구)

  • Lee, Hyunji;Lee, Haekyung;Chai, Choulgyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.21 no.2
    • /
    • pp.45-53
    • /
    • 2015
  • Purpose: This study is to derive the behavioral characteristics of the users appear in the outpatient department of psychiatry. Methods: By referencing John Zeisel's Tools for environment-behavior research, observation of user behavior and expert interviews as a method of the study has been carried out. Results: The results of this study are as follows. First, adjacent placement among children, youth and regular the outpatient department of psychiatry is necessary and easy access to internal medicine department and family medicine department is required in order to allow cooperated treatments. Secondly, depending on the characteristics of the outpatient department of psychiatry treatment, adjustment of space requirement or the change of kinds of necessary space is required. Third, considering the psychological and behavioral characteristics of mental illness and guardians, various search for the environment that can support this. Implications: This study is a basic research for space improvement and evaluation of the outpatient department of psychiatry, and need to be followed by further study using various perspectives and methods.

Fuzzy Web Usage Mining for User Modeling

  • Jang, Jae-Sung;Jun, Sung-Hae;Oh, Kyung-Whan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.204-209
    • /
    • 2002
  • The interest of data mining in artificial intelligence with fuzzy logic has been increased. Data mining is a process of extracting desirable knowledge and interesting pattern ken large data set. Because of expansion of WWW, web data is more and more huge. Besides mining web contents and web structures, another important task for web mining is web usage mining which mines web log data to discover user access pattern. The goal of web usage mining in this paper is to find interesting user pattern in the web with user feedback. It is very important to find user's characteristic fer e-business environment. In Customer Relationship Management, recommending product and sending e-mail to user by extracted users characteristics are needed. Using our method, we extract user profile from the result of web usage mining. In this research, we concentrate on finding association rules and verify validity of them. The proposed procedure can integrate fuzzy set concept and association rule. Fuzzy association rule uses given server log file and performs several preprocessing tasks. Extracted transaction files are used to find rules by fuzzy web usage mining. To verify the validity of user's feedback, the web log data from our laboratory web server.

The Study on Park Designing for Users of Common Residential Room (공동주거 공간의 이용자 중심형 공원계획에 대한 연구)

  • Cho, Kyoung-Deuk
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.7 no.1
    • /
    • pp.35-42
    • /
    • 2007
  • Common residential environment is synthetic forms promote with organic organization of varied cultures and images. Users perceive and classify about these environments of feeling and atmosphere of each elements through their experiences and memories, not fixed point of view. In Korea, park designing of common residential room is in operation monotonously attach importance to economical efficiency without aesthetic structures, varied tries of materials, multiplicity, congruity of surrounding, and user-oriented plan. Recently, in policy of park designing has elements that obstruct to characteristic of environment because of applied to wrong guidelines which are end in investigation to model of an advanced countries'. In conclusion, this investigation shows improve on quality of park planning with the pivot of the matter is for users of common residential room. and park planning needs to multidimensional achieve.

  • PDF

Extended GTRBAC Model for Access Control Enforcement in Ubiquitous Environments (유비쿼티스 환경의 접근제어를 위한 확장된 GTRBAC 모델)

  • Hwang Yu-Dong;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.45-54
    • /
    • 2005
  • The existing access control models have the demerits that do not provide the limit function of using resources by time constraint, the restricted inheritance function as a superior role in role hierarchy, the delicate delegation policy and the limit function of using resources by the location information about a user for the access control in ubiquitous environment. This paper proposes an Extended-GTRBAC model is suited to the access control in ubiquitous environment by applying to sub-role concept of GTRBAC model that the application of resources can be restricted by the period and time and PBDM and considering the location information about a user on temporal constraint. The proposal model can restrict the inheritance of permission in role hierarchy by using sub-role, provide the delicate delegation policy such as user-to-user delegation, role to role delegation, multi-level delegation. multi-step delegation, and apply diverse and delicate access control policy which is suited the characteristic of ubiquitous environment by considering the location information about a user on temporal constraint.

  • PDF

Understanding the Pattern of Mobile-phone Tasks on the 'Situational Context' : Focused on the ESR(Extend, Synchronize, Replace) Model (모바일폰 사용 영역과 상황 기반의 컨텍스트 정의 및 사용 행위의 구조 분석을 통한 테스크 모델 제안)

  • Cho, Yun-Jin;Lee, Eun-Jong
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.158-164
    • /
    • 2008
  • This study was conducted for raising the considering the dynamical context of mobile phone use environment in the mobile-phone research. For this I identified the characteristic of the mobile phone use. The first characteristic is that the mobile phone is the context sensitive device. Also, it reflects the user's life pattern because it is the very personal device. I defined the context of mobile phone use with the basis on this identification of those characteristics. I referenced the definition, 'situational context', defining the mobile phone use context. Also, I set up the research scope within the user task that is influential from the situational context, I named this kind of task as the 'contextual task'. I developed the Contextual Task Model in this study. I named the model as the 'ESR Model'. The reason that I developed this contextual task model is that this model can help novice designers and designers unfamiliar with an application domain understand the user behavior and user centered design. And also this model can be effective to communicate each other, I identified the user's contextual tasks three kinds of model. First, the Extend Model includes user tasks that related to extending from user physical working space to the virtual level. Second model is Synchronize Model, which includes issues that lesson the blocking when use several functions at a time or sequentially. Third model is Replace Model, which is come from the characteristic of user life pattern to use the mobile phone. Finally, I proposed an application of this model, CIQ. Through the process to make CIQ I proved the effectiveness of this ESR Model.

  • PDF

A Study on the Implementation of PDM Integration Environment in Heterogeneous Distributed Environment (이기종 분산환경에서 PDM 통합환경 구현에 관한 연구)

  • 김형선
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.21 no.45
    • /
    • pp.33-45
    • /
    • 1998
  • The typical characteristic of PDM(Product Data Management) System seperates the databases to store the meta data and applications. Therefore, meta data contains the information for the location of file, user profiles, relationships between the files, and process. PDM utilizes these information efficiently and does file management, configuration management, and process management. In this view, the integration strategy of PDM is to merge data and process. In the view of architecture, the interface between data and application and the actions of each application execute seamlessly. This architecture is viewed as integrated data and process among enterprises and implemented with client/server technology in distributed process environment that interfaced with open object-oriented technology which is developed with business object in the object-oriented infrastructure. In this paper, we studied the definition, function, and scope of PDM and researched the core technologies to implement the PDM integration environment. We also researched the PDM utilization in distributed enterprise environment and implementation of PDM integration environment with this technical background.

  • PDF

The Impact of Fintech User and Product Characteristics on Intention for Continuous Use (핀테크의 사용자 특성과 제품 특성이 지속 사용의도에 미치는 영향)

  • Ha, Chang-Seung;Jung, Dae-Hyun
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.59-75
    • /
    • 2016
  • In the era of convergence, more attention is paid to development of Fintech which attempts for innovation of the financial transaction paradigm through ICT. Proliferation of Fintech to engraft finance-related services on mobile and ICT is found in various fields such as loans, investment and asset management in addition to simple payment or remittance services but awareness of consumers regarding the matter is rather low. Therefore, it is the time to conduct a research on various Fintech businesses. This thesis conducted an empirical research from the viewpoint of consumers to investigate influence on continuous use intention of Fintech users. From the user environment perspective, it was found that influence of innovativeness on satisfaction was not statistically significant. In case of the product characteristics, perceived risk did not have statistical significance on satisfaction.