• Title/Summary/Keyword: 모바일 컴퓨팅(Mobile computing)

Search Result 548, Processing Time 0.038 seconds

An Exploratory Study on the Proper Length of Article in Mobile Era (모바일 시대의 기사 길이에 관한 탐색적 연구)

  • Cheong, Yeon Goo;Cheong, Ye Hyun;Guo, YaQi;Lee, Pu Reum
    • Korean journal of communication and information
    • /
    • v.79
    • /
    • pp.140-164
    • /
    • 2016
  • What is an appropriate length of an article in the mobile era producing new tastes of contents combining computing and mobile communication? Is it still valid to have a lengthy article as high level journalism even in the mobile era? Is there any possibility to have a short article combination to give us readability and the amount of information? This study aims to find some answers to these questions. The length of articles were controlled with a field experiment; from an article of 346 syllables(including spaces between syllables) which does not need finger scrolling on a mobile phone to articles of 633, 1033, 1368 syllables(including spaces between syllables) which frequently appear in newspapers and broadcasting news program. All the main themes were same for 4 articles which have different length. Three hundred and eighty four students viewed one of the 4 articles through mobile phone or newspaper. Each participant checked their preference and evaluated quality on the article, were asked to recall contents of the article. In newspaper group, articles with 346 or 1033 syllables were highly evaluated. Mobile group seemed to prefer articles of 346 or 633 syllables. In conclusion, we need to consider various strategies shortening the length of an article into 346 or 633 syllables as a basic format to meet the neEds of mobile era.

  • PDF

3D Face Tracking using Particle Filter based on MLESAC Motion Estimation (MLESAC 움직임 추정 기반의 파티클 필터를 이용한 3D 얼굴 추적)

  • Sung, Ha-Cheon;Byun, Hye-Ran
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.883-887
    • /
    • 2010
  • 3D face tracking is one of essential techniques in computer vision such as surveillance, HCI (Human-Computer Interface), Entertainment and etc. However, 3D face tracking demands high computational cost. It is a serious obstacle to applying 3D face tracking to mobile devices which usually have low computing capacity. In this paper, to reduce computational cost of 3D tracking and extend 3D face tracking to mobile devices, an efficient particle filtering method using MLESAC(Maximum Likelihood Estimation SAmple Consensus) motion estimation is proposed. Finally, its speed and performance are evaluated experimentally.

A Scheduling Scheme for Conflict Avoidance On-demand Data Broadcast based on Query Priority and Marking (질의 우선순위와 마킹에 기초한 충돌 회피 온디맨드 데이터 방송 스케줄링 기법)

  • Kwon, Hyeokmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.61-69
    • /
    • 2021
  • On-demand broadcast is an effective data dissemination technique in mobile computing environments. This paper explores the issues for scheduling multi-data queries in on-demand broadcast environments, and proposes a new broadcast scheduling scheme named CASS. The proposed scheme prioritizes queries by reflecting the characteristics of multi-data queries, and selects the data that has not been broadcast in the query for the longest time as the broadcast data according to the query priority. Simulation is performed to evaluate the performance of CASS. The simulation results show that the proposed scheme outperforms other schemes in terms of the average response time since it can show highly desirable characteristics in the aspects of query data adjacency and data conflict rate.

Design of Middleware for Face Recognition based on WIPI Platform (WIPI 플랫폼 기반 얼굴인식 미들웨어 설계)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.3
    • /
    • pp.117-127
    • /
    • 2005
  • Proportionately with a rapid development of mobile instrument technology, the number of mobile contents utilizing computing environment's graphic technology or image processing is increasing. In this paper, I designed a middleware which supports facial detection and recognition system based WIPI(Wireless Internet Platform for Interoperability), the Korean standard mobile platform. The facial recognition middleware introduced the object oriented concepts, to apply to recognition security and other contents by using mobile camera. This can reduce the development time and cost by dividing process while developing software. Therefore, it would be applied to content security or technology transfer with other company. Facial recognition middleware system is composed of face detection module and face recognition module, and proposes the application contents design method based on WIPI platform.

  • PDF

Preventing ELF(Executable and Linking Format)-File-Infecting Malware using Signature Verification for Embedded Linux (임베디드 리눅스에서 서명 검증 방식을 이용한 악성 프로그램 차단 시스템)

  • Lee, Jong-Seok;Jung, Ki-Young;Jung, Daniel;Kim, Tae-Hyung;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.589-593
    • /
    • 2008
  • These days, as a side effect of the growth of the mobile devices, malwares for the mobile devices also tend to increase and become more dangerous. Because embedded Linux is one of the advanced OSes on mobile devices, a solution to preventing malwares from infecting and destroying embedded Linux will be needed. We present a scheme using signature verification for embedded Linux that prevents executallle-Infecting malwares. The proposed scheme works under collaboration between mobile devices and a server. Malware detection is delegated to the server. In a mobile device, only integrity of all executables and dynamic libraries is checked at kernel level every time by kernel modules using LSM hooks just prior to loading of executables and dynamic libraries. All procedures in the mobile devices are performed only at kernel level. In experiments with a mobile embedded device, we confirmed that the scheme is able to prevent all executable-Infecting malwares while minimizing damage caused by execution of malwares or infected files, power consumption and performance overheads caused by malware check routines.

User Adaptive Post-Processing in Speech Recognition for Mobile Devices (모바일 기기를 위한 음성인식의 사용자 적응형 후처리)

  • Kim, Young-Jin;Kim, Eun-Ju;Kim, Myung-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.338-342
    • /
    • 2007
  • In this paper we propose a user adaptive post-processing method to improve the accuracy of speaker dependent, isolated word speech recognition, particularly for mobile devices. Our method considers the recognition result of the basic recognizer simply as a high-level speech feature and processes it further for correct recognition result. Our method learns correlation between the output of the basic recognizer and the correct final results and uses it to correct the erroneous output of the basic recognizer. A multi-layer perceptron model is built for each incorrectly recognized word with high frequency. As the result of experiments, we achieved a significant improvement of 41% in recognition accuracy (41% error correction rate).

RFID/USN-based Chinese Situation Learning System Considering Chinese Characteristics (중국어 특징을 반영한 RFID/USN 기반 중국어 상황학습 시스템)

  • Piao, Jin Long;Kim, Han-Il;Kim, Seong-Baeg
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.1-8
    • /
    • 2010
  • As ubiquitous computing is evolving, RFID/USN technology is largely applied to various fields. Although there has been much research on the improvement of educational environment using RFID/USN technology, there has been little research on the learning improvement using it. So, in this paper, we used RFID/USN technology to find out the location and situation of students for Chinese situation learning system. We developed a mobile RFID middleware for Chinese situation learning system reflecting Chinese characteristics compared with English on PDA. In USN environment, we designed a USN system, which gets the situation information through a sensor network with sensors and sends them for helping learners study in situation learning. We took a pilot test to a small group for the analysis of the system.

  • PDF

Design and Implementation of Digital Door Lock by IoT (사물인터넷을 이용한 디지털 도어락, DDiT의 설계 및 구현)

  • Seo, Dae Gyu;Ko, Han Shin;Noh, Yong Deok
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.215-222
    • /
    • 2015
  • In this paper, the Digital DoorLock by Internet of Things (DDiT) is introduced. In order to implement DDiT, an integrated micro-controller platform, Arduino is used to control an existing digital doorlock and an android type smart phone is adopted as a mobile platform. One of the advantages of DDiT is that it can be added to an existing digital doorlock and a smart phone application is used as a digital key. Owing to the smart phone application, several other types of applications could also be made. Therefore, DDiT could be used effectively and conveniently in ordinary homes as well as in high security applications such as in hotels, institutes, and companies.

AR-based Message Annotation System for Personalized Assistance (개인화된 도움을 위한 증강현실기반 메시지 주석시스템)

  • Vinh, Nguyen Van;Jun, Hee-Sung
    • The KIPS Transactions:PartB
    • /
    • v.16B no.6
    • /
    • pp.435-442
    • /
    • 2009
  • We propose an annotation system, which allows users moving on an environment to receive personalized messages that are generated by exploiting contextual information. In the system, the context is defined as an entity including user's identity, location and time. Identity of user is a key data to enable personal aspect of generated message. For sensing the context, the proposed system uses AR(augmented reality) technology. Markers are attached to real objects for tracking user's location. AR can provide an effective annotating method to enhance human's perception and interaction abilities. The received message can be a virtual post-it or three-dimensional virtual model of object overlaid onto the real-world view. Experimental results show that the proposed system works well in real-time with high performance and it can be used as a mobile service for personalized messaging.

A study on of Stray Child Prevention App Using GPS and Bluetooth 'Kid Keeper' (GPS와 Bluetooth를 이용한 미아예방 '키드키퍼' 앱 개발 연구)

  • Kim, Sung Hwan;An, Guek Dong;Kim, Min Sub;Moon, Song Chul
    • Journal of Service Research and Studies
    • /
    • v.4 no.1
    • /
    • pp.61-70
    • /
    • 2014
  • We are being developed many applicaton of wireless mobile computing system environment with development of wireless internet technology and teminal eqipment. Lately, Modern Society increase terror of infant children and weak peoples. This study suggested missing child prevention and protection of infant children. When happened an emergency of missing child has risen, we suggest missing child prevention system. This system find position of missing child in fast time. We analysis and design and constructed missing child prevention system by bluetooth and GPS of wireless mobile environment.

  • PDF