• Title/Summary/Keyword: 휴대기기

Search Result 760, Processing Time 0.027 seconds

Enhancing Visual Perception Using Color Processing Of Mobile Display (색상처리를 통한 감성 모바일 디스플레이)

  • Kang, Yun-Cheol;Ryu, Mi-Ohk;Park, Kyoung-Ju
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.697-702
    • /
    • 2008
  • Mobile display panel is small so that users are often difficult to perceive images clearly. About image we perceive much through colors and therefore we propose color fitting approach for clear perception even on the small and low quality LCD panels. Various color modifications have been studied and used in commercial software packages. For mobile usage, our approach instantly enhances color images by modifying colors in a way to contrast differences of them. The method includes tone enhancements (which contrast dark and bright sides) and color enhancements (which reduce saturation for pure colorants). Based on color theory, our method also modifies color values towards specified complementary and preference colors. We term this color fitting. This approach enables displaying photos, multimedia messages, videos and digital media broadcasting (DMB) for better perception in real-time on mobile devices. Index Terms.) color fitting, visualization on small display, mobile graphics, visual perception.

  • PDF

A Study on Facial Region Detection and Compression for Transmission of Mobile Avatar (모바일 아바타 전송을 위한 얼굴 영역 검출 및 압축에 관한 연구)

  • Choi Jae-Young;Hwang Seung-Ho;Yang Young-Kyu;Whangbo Taeg-Keun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.916-923
    • /
    • 2005
  • In recent times, mobile phones that play an important role in voice communication have became increasingly exciting due to the ability to transmit multimedia contents. However, user's communication cost and service usage fees for digital context exchange are still prohibitive. In this paper, we consider the task of transmitting a facial image in the context of mobile avatar generation. We present image compression as a useful technique to reduce service usage costs of data exchange in mobile communications. In view of this we propose an image compression algorithm that performs better than existing techniques. The suggested algorithm in this paper uses the location of significant coefficient on the wavelet image by detecting facial region as well as the spatial correlation between decomposed bands by wavelet transformation. The algorithm perform well and archives an efficient compression ratio. The proposed method recognizes location information of significant coefficient in advance, thus it is more suitable than existing general compression methods for mobile avatar generation systems.

  • PDF

Accelerating OpenVG and SVG Tiny with Multimedia Processors (멀티미디어 프로세서를 이용한 OpenVG 및 SVG Tiny의 가속)

  • Lee, Hwan-Yong;Baek, Nak-Hoon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.17 no.2
    • /
    • pp.37-43
    • /
    • 2011
  • OpenVG and SVG Tiny are the most widely used 2D vector graphics technologies for outputs in the various embedded environments including smart phones. Especially, to show high refresh rates on the high resolution screens, it is necessary to effectively accelerate them. Until now, OpenVG and SVG Tiny are available as hardware implementations such as the fully-dedicated graphics chips or full software implementations. Currently available vector graphics silicon chips are relatively expensive and require high power consumption. In contrast, previous full software implementations show lower performance even with almost 100% CPU usages, which would disrupt other multi-threaded applications, In this paper, we present a cost-effective way of accelerating both of OpenVG and SVG Tiny, based on the multimedia-processing hardware, which is wide-spread on the media devices and mobile phones. Through the effective use of these multimedia processors, we successfully accelerated OpenVG and SVG Tiny at least 3.5 times to at most 30 times, even with lower power consumption and lower CPU usage.

Applying Static Analysis to Improve Performance of Programs using Flash Memory Storage (플래시 메모리 저장 장치를 사용하는 프로그램의 성능 향상을 위한 정적 분석 기법의 응용)

  • Paik, Joon-Young;Cho, Eun-Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1177-1187
    • /
    • 2010
  • Flash memory becomes popular storage for small devices due to its efficiency, portability, low power consumption and large capacity. Unlike on hard disks, however, write operation on flash memory is much more expensive than read operation, so that it is critical for performance enhancement to reduce the number of executions of write operation. This paper proposes static analysis to rewrite a program to reduce the total number of write operations by merging writable data in a minimum number of pages. To achieve this, we collect information about writable areas by static analysis, and about frequently executed paths by profiling for practicality, and combine both to rewrite the application program to reallocate data. The performance enhancement gained from the proposed methods is shown using a FAST simulator.

Grid-based Cloaking Area Creation Scheme supporting Continuous Query Processing for Location-based Services of Peer-to-Peer Environment (P2P 환경의 위치 기반 서비스에서 연속적인 질의 처리를 지원하는 그리드 기반 Cloaking 영역 설정 기법)

  • Kim, Hyeong-Il;Lee, Ah-Reum;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.18 no.3
    • /
    • pp.53-62
    • /
    • 2010
  • Recent development in wireless communication technology, like GPS, and mobile equipments, like PDA and cellular phone, make location-based services (LBSs) popular. However, because, users continuously request a query to a server in the LBSs by using their exact locations, privacy information could be in danger. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, we, in this paper, propose a grid-based cloaking area creation scheme supporting continuous LBSs in peer-to-peer environment. The proposed scheme creates a cloaking area by using Chord protocol, so as to support the continuous LBSs in peer-to-peer environment. Finally, we show from a performance analysis that our cloaking scheme outperforms the existing cloaking schemes, in terms of service time.

A Design and Implementation of In/Out Bound Call Flow Module for SOHO CTI (SOHO CTI용 인/아웃바운드 콜 플로우 모듈 설계 및 구현)

  • Park Chan Il;Moon Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.71-84
    • /
    • 2005
  • Recently, the expert call center solution has become the center of interest, since finance and tele-marketing system, which is focused on a communication industry, have been increasing, Specially, the call center market is growing up with a supporting Caller-ID for a cellular phone in Korea, In the present, although large size companies are developing expensive solutions and instruments to service only for the big companies, there little solutions for SOHO markets, Therefore, in this paper we have shown a design and an implementation of a CTI system which is capable of in/outbound call processing by using CTI, and providing stable services by linking the customer's DB. And these functionalities have become possible by integrating functions of PBX and the computer control of the PBX. First, we have constructed call flows and analyzed packets for the standard communication through the PBX in call. Then, we have designed and implemented a middleware which linked a call between a client and a customer. Finally, we have constructed a database module for applying the CRM technology to the management of customer's contents.

  • PDF

3-Dimensional Finite Element Analysis for Collecting Structure of Combustible Metal Dust During Explosion (가연성 금속분진 폭발시 저장 및 포집용 구조물에 대한 3차원 유한요소 해석)

  • Jang, Chang-Bong;Yong, Jong-Won;Baek, Jong-Bae;Kwon, Hyuck-Myun;Ko, Jae-Wook
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.5
    • /
    • pp.19-24
    • /
    • 2011
  • Due to the latest industrial flow comes mainly switch to high-tech industries, combustible metals as Al, Mg, Li, Zn more require to use for the aircraft, car, cell phones, electronics and others. As a result, Increasing the processing of combustible metals due to increase in amount of combustible metals giving rise dust explosions also. Most Explosions caused by combustible metal dust, occurred in air cleaning device of local exhaust ventilation to capture and store the combustible dust. Therefore, this study was conducted to present and analyze technically that deformation and rupture shape of air cleaning device structure by Finite Element Analysis(FEA) rather than a simple prediction, in case of explosion occurs in an air cleaning device.

Estimation of Accessibility and Usability in Web Interaction for Personalized Ubiquitous Web Information Services (개인화된 유비쿼터스 웹 정보 서비스를 위한 웹 상호작용의 접근성 및 사용성 평가)

  • Kim, Yung-Bok
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.8
    • /
    • pp.512-521
    • /
    • 2008
  • Web-based information services should be evaluated for accessibility and usability with various types of Internet Web-browsing devices, interacting with web information servers. A reliable ubiquitous Web information server, accessible and usable with a variety of Web-browsing devices (e.g. a full-browsing mobile phone), should be a unified center for personalized ubiquitous Web information services as well as for business models based on personalized advertisements. We studied an estimation of the accessibility and usability in Web interaction for personalized ubiquitous Web information services, as metrics for real-time estimation. We show empirical results based on implementation and experiments in Korea, Japan and China, using a test-bed Web site ('ktrip.net') and single-character Korean domain names (e.g. 김.net, 이.net, 박.net, 최.net, ㄱ.net, ㄴ.net ... ㅎ.net, ㅏ.net, ... ㅔ.net, ㄱ.com, ㄴ.com ... ㅎ.com).

MADA Feedback Framework for Adaptive Inference Results of Situation Aware Services in Mobile Environments (모바일 상황인식 서비스의 추론 결과 적응을 지원하기 위한 MADA 피드백 프레임워크)

  • Shin, Soohye;Park, Joonseok;Yeom, Keunhyuk
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.7
    • /
    • pp.443-450
    • /
    • 2013
  • The high portability and mobility of mobile devices have given rise to critical concerns with regard to mobile situation-aware services that utilize user situation information in the mobile domain. Mobile situation-aware services for mobile devices are provided by collecting and analyzing data, from which the user situation is inferred through an inference system. However, the high mobility of the mobile domain has made it difficult to infer the required results. In addition, previous studies have not identified a systematic approach to modifying and adapting. In this paper, we propose a systematic feedback process model based on software cybernetics in order to address the abovementioned problems. Further, we propose a MADA(Monitoring, Analysis, Determinating, Adaptation) framework for the feedback process model. Thus, the proposed approach supports the development of self-adaptive mobile situation-aware services that can infer appropriate results and manage the inferred results systematically.

Design of Vehicle Security Authentication System Using Bluetooth 4.0 Technology (블루투스 4.0 기술을 이용한 차량용 보안인증 시스템 설계)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.325-330
    • /
    • 2017
  • Bluetooth 4.0 is a technology suitable for the Internet of things that is used for communication between various devices. This technology is suitable for developing a service by combining with automobiles. In this study, a security authentication system was designed by linking Bluetooth 4.0 technology and a vehicle system as an implementation example of an object internet service. A procedure was designed for security authentication and an authentication method is proposed using a data server. When the security authentication function is provided, various additional services can be developed using the information collection function of the risk notification and user action history. In addition, BLE (Bluetooth Low Energy) technology, which is a wireless communication technology that enables low-power communication and low-power communication in the process of the standardization and development of Bluetooth technology and technology, improves the battery life through the use of RFID or NFC This study expanded the range possible. The security service can be extended by expanding the scope of authentication by the contactless type. Using the proposed system, a customized service can be provided while overcoming the problems of an existing radio frequency (RF)-based system, portability, and battery usage problem.