• Title/Summary/Keyword: user grouping

Search Result 124, Processing Time 0.03 seconds

User Interface Design Model for Improving Visual Cohesion (가시적 응집도 향상을 위한 사용자 인터페이스 설계 모델)

  • Park, In-Cheol;Lee, Chang-Mog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5849-5855
    • /
    • 2011
  • As application development environment changes rapidly, importance of user interface design is increasing. Usually, most of designers are clustering by subjective method of individual to define objects that have relativity in design interface. But, interface which is designed without particular rules just adds inefficiency and complexity of business to user who use this system. Therefore, in this paper, we propose an object oriented design model that allows for flexible development by formalizing the user interface prototype in any GUI environment. The visual cohesion of the user interface is a new set of criteria which has been studied in relation to the user interface contents, and is founded on the basis of the cohesion of the interface as defined using basic software engineering concepts. The visual cohesion includes the issue of how each unit is arranged and grouped, as well as the cohesion of the business events which appear in the programming unit. The interface will become easier to understand and use if the business events are grouped by their inter-relevance within the user interface.

Development of Integrated Design System for Space Frame Structures (스페이스프레임 구조물의 통합설계시스템 개발)

  • Lee, Ju-Young;Lee, Jae-Hong
    • Journal of Korean Association for Spatial Structures
    • /
    • v.1 no.2 s.2
    • /
    • pp.59-66
    • /
    • 2001
  • This paper describes three modules for development of the Space Frame Integrated Design System(SFIDS). The Control Module is implemented to control the developed system. The Model Generation Module based on PATRAN user interface enables users to generate a complicated finite element model for space frame structures. The Optimum Design Module base on a branch of combinatorial optimization techniques which can realize the optimization of a structure having a large number of members designs optimum members of a space frame after evaluating analysis results. The Control Module and the Model Generation Module Is implemented by PATRAN Command Language(PCL) while C++ language is used in the Optimum Design Module. The core of the system is PATRAN database, in which the Model Generation Module creates information of a finite element model. Then, PATRAN creates Input files needed for the analysis program from the information of the finite element model in the database, and in turn, imports output results of analysis program to the database. Finally, the Optimum Design Module processes member grouping of a space frame based on the output results, and performs optimal member selection of a space frame. This process is repeated until the desired optimum structural members are obtained.

  • PDF

Complexity Reduction of Block-Layered QOSTC with Less Transmission Time (복잡도 감소와 전송시간이 덜 소요되는 블록 층의 준 직교 시공간코드 설계)

  • Abu Hanif, Mohammad;Lee, Moon-Ho;Hai, Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.48-55
    • /
    • 2012
  • Because of increasing complexity in maximum-likelihood (ML) decoding of four of higher antenna scenario, Partial Interference Cancellation (PIC) group decoding could be the perfect solution to reduce the decoding complexity occurs in ML decoding. In this paper, we separate the symbols the users in the layered basis and find the equivalent channel matrix. Based on the equivalent channel matrix we provide the grouping scheme. In our paper, we construct a block wise transmission technique which will achieve the desired code rate and reduce the complexity and provide less transmission time. Finally we show the different grouping performance.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System (사용자의 이동성을 고려한 멀티 에이전트 방식의 RFID 기반 지식 관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.

Design of knowledge search algorithm for PHR based personalized health information system (PHR 기반 개인 맞춤형 건강정보 탐사 알고리즘 설계)

  • SHIN, Moon-Sun
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.191-198
    • /
    • 2017
  • It is needed to support intelligent customized health information service for user convenience in PHR based Personal Health Care Service Platform. In this paper, we specify an ontology-based health data model for Personal Health Care Service Platform. We also design a knowledge search algorithm that can be used to figure out similar health record by applying machine learning and data mining techniques. Axis-based mining algorithm, which we proposed, can be performed based on axis-attributes in order to improve relevance of knowledge exploration and to provide efficient search time by reducing the size of candidate item set. And K-Nearest Neighbor algorithm is used to perform to do grouping users byaccording to the similarity of the user profile. These algorithms improves the efficiency of customized information exploration according to the user 's disease and health condition. It can be useful to apply the proposed algorithm to a process of inference in the Personal Health Care Service Platform and makes it possible to recommend customized health information to the user. It is useful for people to manage smart health care in aging society.

Dynamic Channel Assignment Scheme Using Graph Coloring in Femtocell Networks (펨토셀 네트워크에서 그래프 컬러링을 이용한 동적채널할당 방법)

  • Kim, Se-Jin;Cho, IlKwon;Kim, Yi-Kang;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.257-265
    • /
    • 2013
  • In this paper, we proposed a Dynamic Channel Assignment (DCA) scheme called Graph Coloring based DCA (GC-DCA) to improve system performance for downlink femtocell networks with high density femto Access Point (AP) deployments. The proposed scheme consists of two steps: one is a femto AP grouping step considering interference and the other is a DCA step considering Signal to Interference plus Noise Ratio (SINR) for femto User Equipments (UEs). Simulation results show that the proposed GC-DCA outperforms other schemes in terms of the mean femto UE capacity and probability of femto UEs which have capacities less than a given transmit rate.

Usability Evaluation of a Window Button Arrangement (윈도우 버튼 배열 구조의 사용성 평가)

  • Kim, Tae-Hun;Han, Seong-Ho;Gwon, Min-Jeong;Lee, Seung-Hui
    • Journal of the Ergonomics Society of Korea
    • /
    • v.25 no.2
    • /
    • pp.23-32
    • /
    • 2006
  • Window buttons located on a task bar provide information about windows that have been open as well as active. When the number of buttons on the task bar increases, the button size gets smaller and as a result, it is more difficult to identify. This study proposes new alternatives of presenting window buttons to search for a target button efficiently. An experiment was conducted to evaluate the usability of the new. Factors manipulated in the experiment include 'button arrangement methods' and 'order of buttons'. The 'button arrangement methods' factor is composed of three levels, 'one line', 'changeable line', and 'grouping buttons'. The 'order of buttons' factor is composed of three levels, 'fixed order', 'click-right', and 'order control by user'. The results showed that the main effects were significant in search time. In subjective satisfaction, the interaction effect was also significant. The results could be applied to the design of small screens such as PDA or cellular phones.

A Study on Internal Information Leakage Detection System by User Grouping (사용자 그룹화를 통한 내부 정보 유출 탐지 시스템에 관한 연구)

  • Shin, Hee Jin;Seo, Min Ji;Kim, Myung Ho;Park, Jin Ho
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.771-772
    • /
    • 2017
  • 내부 정보 유출 사고의 빈도가 높아지게 되면서 이러한 내부 정보 유출을 막기 위해 DLP(Data Loss Prevention), DRM(Digital Rights Management), DB 접근 통제 솔루션, 인터넷 접근 차단 솔루션과 같은 여러 가지 보안 솔루션을 적용하고 있으나, 내부 정보 유출을 시도하는 개인의 행동을 기반으로 개인을 탐지한다는 문제점을 가지고 있다. 본 논문에서는 개인이 아닌 조직으로 이루어진 내부 정보 유출의 행위를 탐지하고 대응하기 위해 보안로그를 위험 사용자들끼리 그룹화 하여 내부 정보 유출 여부를 판단하는 시스템을 제안한다.

Automated nonlinear design of reinforced concrete D regions

  • Amini Najafian, Hamidreza;Vollum, Robert L.
    • Structural Engineering and Mechanics
    • /
    • v.46 no.1
    • /
    • pp.91-110
    • /
    • 2013
  • This paper proposes a novel iterative procedure for the design of planar reinforced concrete structures in which the reinforcement is designed for stresses calculated in a nonlinear finite element analysis. The procedure is intended as an alternative to strut and tie modeling for the design of complex structures like deep beams with openings. Practical reinforcement arrangements are achieved by grouping the reinforcement into user defined horizontal and vertical bands. Two alternative strategies are proposed for designing the reinforcement which are designated A and B. Design constraints are specified in terms of permissible stresses and strains in the reinforcement and strains in the concrete. A case study of a deep beam with an opening is presented to illustrate the method. Comparisons are made between design strategies A and B of which B is shown to be most efficient. The resulting reinforcement weights are also shown to compare favorably with those previously reported in the literature.