Advertisement

A Study on the Learner Participation Interaction for Multi-modality Integration for Smart Devices

  • Jun Wook Lee
  • Gyujung Kim
  • Namje Park
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 339)

Abstract

This paper suggests a method to provide the users with better experiences in designing the products with integration of multiple functions and multitasks in aspects of modality. The studies on modality and interruption were carried out from the perspective of cognitive burden on the users when the modality before and after tasks are the same in continuous tasks based on multiple resource theory. Based on this, this study attempted to examine the multitasking support and types of modalities of tasks as well as the interruption orders and frequency when an interruption occurs during a task and how they affect the task performance.

Keywords

Multi-modality Smart Device Integration Interaction 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lee, K.H., Jung, S.K., Kim, H.J., Lee, I., Kim, J.: Interruption in Digital Convergence: Focused on Multi-Modality and Multi-Tasking. Journal of the Ergonomics Society of Korea 26(3), 67–80 (2007)CrossRefGoogle Scholar
  2. 2.
    Fensham, P.J.: Knowledge to Deal with Challenges to Science Education from Without and Within. In: The Professional Knowledge Base of Science Teaching, pp. 295–317 (2011)Google Scholar
  3. 3.
    Haigney, D.E.: Mobile phones and driving: A literature review. RoSPA, Birmingham (1997)Google Scholar
  4. 4.
    Neerincx, M.A., Van Doorne, H., Ruijsendaal, M.: Attuning computer-supported work to human knowledge and processing capacies in ship conter centers. In: Cognitive Task Analysis, pp. 341–361. Erlbaum, Mahwah (2000)Google Scholar
  5. 5.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  7. 7.
    Park, N.: Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488–496. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  8. 8.
    Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)CrossRefGoogle Scholar
  9. 9.
    Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  10. 10.
    Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467–474. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  12. 12.
    Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  13. 13.
    Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  14. 14.
    Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)Google Scholar
  15. 15.
    Park, N., Song, Y., Won, D., Kim, H.: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  16. 16.
    Park, N., Kim, H., Kim, S., Won, D.: Open Location-based Service using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  17. 17.
    Park, N., Kim, S., Won, D.: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. In: Wegrzyn-Wolska, K.M., Szczepaniak, P.S. (eds.) Advances in Intelligent Web Mastering. ASC, vol. 43, pp. 278–283. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  18. 18.
    Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation Leveraging Globally Networked RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  19. 19.
    Kim, Y.: Harmful-word Dictionary DB based Text Classification for Improving Performances of Precesion and Recall. Sungkyunkwan University, Ph.D. Thesis (2009)Google Scholar
  20. 20.
    Kim, Y., Park, N., Hong, D.: Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (ed.) Computers, Networks, Systems, and Industrial Engineering 2011. SCI, vol. 365, pp. 201–208. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  21. 21.
    Kim, Y., Park, N., Hong, D., Won, D.: Adult Certification System on Mobile RFID Service Environments. Journal of Korea Contents Association 9(1), 131–138 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Jun Wook Lee
    • 1
  • Gyujung Kim
    • 2
  • Namje Park
    • 2
  1. 1.Electronics and Telecommunications Research Institute (ETRI)DaejeonKorea
  2. 2.Department of Computer Education, Teachers CollegeJeju National UniversityJeju-siKorea

Personalised recommendations